home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 47.9 KB | 1,008 lines |
-
- Computer underground Digest Sun Nov 12, 1995 Volume 7 : Issue 89
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #7.88 (Sun, Nov 12, 1995)
-
- FIle 1--Religious Right Threatens to Shut Down Net: Call NOW
- FIle 2--VTW BillWatch #23: Digital Telephony overview
- FIle 3--FW: RE: letter to Congress
- FIle 4--Cu Digest Header Info (unchanged since 5 Nov, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Mon, 6 Nov 1995 13:43:13 -0500
- From: ACLUNATL@AOL.COM
- Subject: FIle 1--Religious Right Threatens to Shut Down Net: Call NOW
-
- Here are the advocacy instructions for individuals opposed to the Federal
- Online Indecency Legislation that we promised last week.
-
- ========================================================================
- CAMPAIGN TO STOP THE EXON/COATS COMMUNICATIONS DECENCY ACT
- (SEE THE LIST OF CAMPAIGN COALITION MEMBERS AT THE END)
-
- Update: -Latest News:
- The Christian Coalition is pushing Congress to censor
- the net more heavily than even Sen. J.J. Exon ever imagined.
- There is the very real possibility that they may succeed.
-
- You should be very worried. We are.
-
- -What You Can Do Now:
- Follow the directions below and call House Speaker
- Gingrich and Senate Leader Dole. Implore them
- to allow parents to make choices for their children, instead
- of government censors.
-
- Volunteer to join the fight by helping organize in your
- home town.
-
- CAMPAIGN TO STOP THE UNCONSTITUTIONAL COMMUNICATIONS DECENCY ACT
- Nov 2, 1995
-
- PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
- REDISTRIBUTE ONLY UNTIL December 1, 1995
- REPRODUCE THIS ALERT ONLY IN RELEVANT FORUMS
-
- ________________________________________________________________________
- CONTENTS
- The Latest News
- What You Can Do Now
- The letter from Ed Meese and the Christian Right
- Chronology of the CDA
- For More Information
- List Of Participating Organizations
-
- ________________________________________________________________________
- THE LATEST NEWS
-
- Since the very first day that Senator J.J. Exon (D-NE) proposed censorship
- legislation for the Internet, the Christian Right has pushed for the most
- restrictive regulations they could think of.
-
- The Religious Right (which does not necessarily speak for all religious
- people concerned with this issue) recently tipped their hand in a letter
- to Sen. Larry Pressler (R-SD) and Rep. Thomas Bliley (R-VA) requesting
- a new and more restrictive net censorship proposal.
-
- There are essentially three new dangerous elements of their campaign
- to shut down cyberspace:
-
-
- INTERNET PROVIDERS, ONLINE SERVICES, AND LIBRARIES CRIMINALLY LIABLE FOR
- EXPRESSION ONLINE
- The Religious Right has proposed to hold anyone who provides access to the
- Internet or other interactive media, including online services providers,
- ISP's, BBS's, Libraries, and Schools, criminally liable for all speech
- carried on the network.
-
- In order to avoid liability under this provision, service providers would be
- forced to monitor user's electronic communications to be assured that
- no "indecent" material is transmitted across their networks.
-
- This proposal is MORE RESTRICTIVE than the Exon Communications Decency Act,
- or any other net censorship legislation currently in Congress.
-
- In their letter to Congress, the Religious Right says:
-
- [Providers] would simply be required to avoid KNOWING violations of
- the law. [emphasis added]
-
- However, the "knowing" standard is vague enough that the mere knowledge
- that such material exists could be sufficient to trigger criminal liability.
- A single complaint or even a news report could force a service provider to
- take down a web page, remove posts to chat rooms or other discussion
- forums, or shut down listservs in order to avoid going to jail and facing
- huge fines.
-
-
- A STANDARD FOR INDECENCY
- The proposals pushed by the Christian Coalition relies on the
- unconstitutional "indecency standard". Like the Exon Communications
- Decency Act, the Christian Coalition seeks to regulate all indecent
- speech online.
-
- Indecency is a broad category that includes everything from George Carlin's
- "seven dirty words" to such classic novels and "The Catcher in the Rye" and
- "Lady Chatterly's Lover".
-
- The Supreme Court has ruled that restrictions on indecent speech are
- Constitutional only if they rely on the "least restrictive means". Broad
- indecency restrictions on interactive media do not satisfy the "least
- restrictive means" test, because interactive media allows users and
- parents tremendous control over the information they receive.
-
- Any legislation which attempts to apply an indecency restriction to the
- Internet is unconstitutional on its face.
-
- The Christian Coalition's proposal that relies on an indecency
- restriction contemplates dumbing down every conversation, web page,
- newsgroup, and mailing list on the Internet to the level of what is
- not offensive to children.
-
- What kind of discussions between adults are possible in an arena
- where everything has been reduced to the level of the Lion King?
-
-
- UNPRECEDENTED CONTROL OVER ONLINE SPEECH FOR THE FCC
- The Christian Coalition would give the FCC broad jurisdiction over
- cyberspace. It would allow the FCC jurisdiction over your online
- speech, and over the design Internet software, such as web browsers and
- filtering programs that parents can use to control their children's
- access to the Internet.
-
- The Internet has developed from a government project to a market-driven
- economic boom for thousands of businesses. Giving the FCC authority over
- this medium would significantly hinder the growth of this new industry.
-
- ________________________________________________________________________
- WHAT YOU CAN DO NOW
-
- 1. The proposals from the Religious Right will literally destroy online
- speech as we know it. The odds of stopping this are not certain.
-
- There is a very real chance that this legislation will pass, and
- we will experience a period of uncertainty and chilling of speech
- while an appropriate test case attempts to reach the Supreme Court
- (should it even get there!)
-
- The Religious Right has a strong grass-roots network. We need to
- counter their energy and ensure cyberspace is not lost due to them.
-
- IMMEDIATELY CALL House Speaker Gingrich (R-GA) and Senate Leader
- Dole (R-KS) and urge them to oppose the Christian Coalition's
- proposal.
-
- Name, Address, and Party Phone Fax
- ======================== ============== ==============
- R GA Gingrich, Newt 1-202-225-4501 1-202-225-4656
- R KS Dole, Robert 1-202-224-6521 1-202-224-8952
-
- If you're at a loss for words, try one of the following:
-
- Please oppose the recent proposal from the Religious Right to
- censor the Internet. The only effective way to address children's
- access to the Internet is through parental control tools outlined
- by the Cox/White/Wyden approach.
- or
- As a religious person and a parent, I oppose the Religious Right's
- attempts to censor the Internet. I am the best person to monitor
- my child's access to the Internet using parental control tools
- as outlined in the Cox/White/Wyden approach.
-
- 2. Join the online fight by becoming a volunteer for your district!
-
- Check to see if you're legislator is in the list below. If they are
- not, consult the free ZIPPER service that matches Zip Codes to
- Congressional districts with about 85% accuracy at:
-
- URL:http://www.stardot.com/~lukeseem/zip.html
-
- The conference committee legislators are:
- House: Barr (R-GA), Barton (R-TX), Berman (R-CA), Bliley (R-VA),
- Boucher (D-VA), Brown (D-OH), Bryant (D-TX), Buyer (R-IN),
- Conyers (D-MI), Dingell (D-MI), Eshoo (D-CA), Fields (R-TX),
- Flanagan (R-IL), Frisa (R-NY), Gallegly (R-CA), Goodlatte (R-VA),
- Gordon (D-TN), Hastert (R-IL), Hoke (R-OH), Hyde (R-IL),
- Jackson-Lee (D-TX), Klug (R-WI), Lincoln (D-AR), Markey (D-MA),
- Moorhead (R-CA), Oxley (R-OH), Paxon (R-NY), Rush (D-IL),
- Schaefer (R-CO), Schroeder (D-CO), Scott (D-VA), Stearns (R-FL),
- White (R-WA)
- Senate: Burns (R-MT), Exon (D-NE), Ford (D-KY), Gorton (R-WA),
- Hollings (D-SC), Inouye (D-HI), Lott (R-MS), McCain (R-AZ),
- Pressler (R-SD), Rockefeller (D-WV), Stevens (R-AK)
-
- If your legislator is on the conference committee, you have a chance
- to influence their vote on this issue with your power as a constituent.
- Volunteer to help educate your legislator by sending mail to
- volunteer@vtw.org. A coalition volunteer will be in touch with you.
-
- You can starting working to help spread the word in your district by
- sending this letter to five friends. Ask them to call Dole and Gingrich
- as well.
-
- 3. The People for the American Way (PFAW) and the American Civil Liberties
- Union are organizing a letter from ORGANIZATIONS to the Conference
- Committee to oppose the censorship provisions.
-
- If you are a representative of an organization that would like to
- signon to this letter, you should contact jlesser@pfaw.org IMMEDIATELY.
-
- 4. We can't suggest relaxing at this point. The stakes are too high, and
- the risk is too great. Everything now hangs in the balance.
-
- ________________________________________________________________________
- THE LETTER FROM ED MEESE AND THE CHRISTIAN RIGHT
-
- October 16, 1995
-
- The Honorable Thomas J. Bliley, Jr. Chairman
- Committee on Commerce
- United States House of Representatives
- Washington, DC 20515
-
- The Honorable Larry Pressler, Chairman
- Committee on Commerce, Science, and Transportation
- United States Senate
- Washington, DC 20510
-
- Re: Computer Pornography Provisions in Telecommunications Bill
-
- Dear Mr. Chairmen:
-
- We are writing to urge the conference committee seeking to reconcile the
- telecommunications bills passed by the House and Senate include in the
- final bill the strongest possible criminal law provisions to address the
- growing and immediate problem of computer pornography without any
- exemptions, defenses, or political favors of any kind accorded to those
- who knowingly participate in the distribution of obscenity to anyone or
- indecency to children. While there is no perfect solution to the problem
- of computer pornography, Congress could not hope to solve this problem by
- holding liable only some who are responsible for the problem.
-
- The recent Justice Department prosecution project targeting those who
- violated federal child pornography law using America On-Line is
- instructive in this regard. More than ninety individuals were targeted for
- prosecution although many others, perhaps as many as 3,000 according to
- one press report, were originally targeted by the Department of Justice as
- potential violators of child pornography laws. Apparently due to a
- shortage of investigative and prosecutorial resources, the project was
- limited. Since there are insufficient resources to investigate and
- prosecute but a fraction of those that are trafficking in child
- pornography by computer, then there will likely be even fewer resources
- available to investigate and prosecute those involved in obscenity and
- indecency.
-
- Thousands of individuals both in this country and abroad are regularly
- placing obscenity and indecency on the Internet. It is not possible to
- make anything more than a dent in the serious problem of computer
- pornography if Congress is willing to hold liable only those who place
- such material on the Internet while at the same time giving legal
- exemptions or defenses to service or access providers who profit from and
- are instrumental to the distribution of such material. The Justice
- Department normally targest the major offenders of laws. In obscenity
- cases prosecuted to date, it has targeted large companies which have been
- responsible for the nationwide distribution of obscenity and who have made
- large profits by violating federal laws. Prosecution of such companies has
- made a substantial impact in curbing the distribution of obscenity, with
- many such offenders going out of business altogether. So too will
- prosecution of access providers which _knowingly_ traffic in obscenity
- have a substantial impact, a far greater impact than just the prosecution
- of a person who places one or a few prohibited images on the Internet.
- Such a person could not traffic in pornography without the aid or
- facilitation of the service or access providers. Indeed, if Congress
- includes provisions protecting access or service providers in whatever
- bill is finally passed, it is likely that most in this country who are
- trafficking in indecency to children or obscenity would continue to do so
- since the threat of prosecution would be minuscule, given the numbers of
- those currently involved in this activity. It is also likely that those
- outside our country who are engaged in these activities would continue to
- do so since it would be nearly impossible to extradite them to the United
- States for prosecution. Thus, unless all who knowingly participate in such
- matters are subject to the law, the Internet will remain the same and
- Congress will have failed in its responsibilities to the children and
- families of America.
-
- Federal law has traditionally assigned equal liability both for those who
- commit a crime and those who aid and abet a crime. See Title 18 U.S.C.
- Code Section 2: "(a) whoever [sic] commits an offense against the United
- States or aids, abets, councils [sic], commands, induces, or procures its
- commission, is punishable as a principle [sic]." Service or access
- providers who knowingly participate in the distribution of indecency to
- children or in obscenity to anyone are aiders and abettors in the
- commission of those crimes and thus should have liability under any law
- Congress passes. Current federal law on child pornography provides no no
- exemption or defense for access providers. Thus, the child pornography law
- provides a strong deterrent against trafficking in child pornography for
- those who would otherwise knowingly participate in its distribution by
- computer whether pedophile or access provider.
-
- The changes in law which we support would not hold an access provider
- criminally liable for all illegal pornography on the Internet which their
- services may be used to obtain. Nor would it require that access providers
- check all communications to ensure that no violations of the law are
- occurring. They would simply be required to avoid knowing violations of
- the law. This is an obligation imposed on all citizens. Technology exists
- today for access providers, through a simple process, to target or flag
- and remove files containing objectionable material.
-
- We support the House-passed language insofar as it addresses obscenity by
- amendment Title 18, Sections 1462, 1465, and 1467 of the United States
- Code. The provision restricting transmission of indecency in the House-passed
- bill, an amendment to Section 1465, is inadequate, and we urge that it be
- substantially revised.
-
- Attached is the specific language we support which includes the House
- passed language on obscenity and includes revisions on both the House
- passed language on indecency, which would amend Title 18 and the
- Senate-passed language on indecency, which would amend Title 47. The
- combination of these provisions, we believe, would provide effective laws
- to curb obscenity and indecency on the Internet by establishing that all
- who knowingly participate in the distribution or facilitation of obscenity
- to anyone or indecency to children would be subject to the law.
-
- Thank you for your concern and attention to this matter.
-
-
- [signed]
-
- Edwin Meese III
-
- Ralph Reed
- Christian Coalition
-
- Donald E. Wildmon
- American Family Association
-
- Alan Sears, Former Executive Director
- Atty General's Commission on Pornography
-
- Phyllis Shafly
- Eagle Forum
-
- Beverly LaHaye
- Concerned Women for America
-
- Reverend Louis P. Sheldon
- Traditional Values Coalition
-
- Jay Sekulow
- American Center for Law and Justice
-
- Paul Weyrich
- Free Congress Foundation
-
- Paul McGeady
- Morality in Media
-
- Len Munsil
- National Family Legal Foundation
-
- Robert Peters
- Morality in Media
-
- Kenneth Sukhia
- Former United States Attorney, N.D., FL
- Former Chairman, Atty General's Advisory Committee
- Subcommittee on Child Exploitation and Obscenity
-
-
- --------------------------
-
-
- Section 1465 of Title 18, United States Code, is amended to punish
- distribution by computer of indecent material to minors by adding at the
- end the following:
-
- Whoever knowingly communicates, transmits, or makes available for
- communication or transmission, in or effecting interstate or foreign
- commerce an indecent communication by computer to any person the
- communicator or transmitter believes has not attained the age of 18 years
- of age, knowing that such communication will be obtained by a person
- believed to be under 18 years of age, shall be fined under this title or
- imprisoned not more than five years, or both.
-
- TITLE IV -- OBSCENE, HARASSING, AND WRONGFUL UTILIZATION OF
- TELECOMMUNICATIONS FACILITY
-
- SEC. 401. SHORT TITLE
- This title may be cited as the "Communications Decency Act of
- 1995".
-
- Sec. 402. OBSCENE OR HARASSING USE OF TELECOMMUNICATIONS FACILITIES UNDER
- THE COMMUNICATIONS ACT OF 1934
-
- Section 223 (47 U.S.C. 223) is amended --
- (1) by striking subsection (a) and inserting in lieu of [sic]:
- ``(a) Whoever--
- ``(1) in the District of Columbia or in interstate or foreign
- communications --
- ``(A) by means of telecommunications device knowingly--
- ``(i) makes, creates, or solicits, and
- ``(ii) initiates the transmission of,
- any comment, request, suggestion, proposal, image, or other
- communication which is obscene, lewd, lascivious, filthy, or
- indecent, with intent to annoy, abuse, threaten, or harass
- another person;
- ``(B) makes a telephone call or utilizes a
- telecommunications device, whether or not conversation or
- communication ensues, without disclosing his identity and
- with intent to annoy, abuse, threaten, or harass any person
- at the called number or who receives the communication;
- ``(C) makes or causes the telephone of another repeatedly
- or continuously to ring, with intent to harass any person at
- the called number; or
- ``(D) makes repeated telephone calls or repeatedly
- initiates communication with a telecommunications device,
- during which conversation or communication ensues, solely to
- harass any person at the called number or who receives the
- communication;
- ``(2) knowingly permits any telecommunications facility
- under his control to be used for any activity prohibited by
- paragraph (1) with the intent that it be used for
- such activity,
-
- shall be fined not more than $100,000 or imprisoned not more
- than two years, or both.''; and
-
- (2) by adding at the end the following new subsections:
-
- ``(d) Whoever--
- ``(1) knowingly within the United States or in foreign
- communications with the United States by means of
- telecommunications device makes or makes available any
- indecent communication in any form including any comment,
- request, suggestion, proposal, or image, to any person under
- 18 years of age regardless of whether the
- maker of such communication placed the call or initiated the
- communication; or
- ``(2) knowingly permits any telecommunications facility
- under such person's control to be used for an activity
- prohibited by paragraph (1) with the intent that it be
- used for such activity,
- shall be fined not more than $100,000 or imprisoned not more
- than two years or both.
- ``(e) Defenses to subsections (a) and (d), restrictions on
- access, judicial remedies respecting restrictions for
- persons providing information services and
- access to information services--
- "(1) It is a defense to prosecution that a person has complied
- with regulations designed to restrict access to indecent
- communications to those 18 years old or older as enacted by the
- Federal Communications Commission which shall prepare final
- regulations within 120 days of the passage of this bill. Until
- such regulations become effective, it is a defense to
- prosecution that the person has blocked or restricted access
- to indecent communications to any person under 18 years
- of age through the use of verified credit card, adult access
- code, or adult personal identification number (PIN).
- Nothing in this subsection shall be construed to treat
- enhanced information services as common carriage."
- "(2) No cause of action may be brought in any
- court or any administrative agency against any person on account
- of any activity which is not in violation of any law punishable
- by criminal or civil penalty, which activity the person has taken in
- good faith to implement a defense authorized under this section or
- otherwise to restrict or prevent the transmission of, or access to,
- a communication specified in this section.
- (f) Nothing in this subsection shall preclude any State or
- local government from enacting and enforcing laws and regulations
- which do not result in the imposition of inconsistent obligations on
- the provision of interstate services. Nothing in this subsection
- shall preclude any State or local government from governing conduct
- not covered by subsection (d)(2)."
- (g) Nothing in subsection (a), (d), or (e) or in the
- defenses to prosecution under (e) shall be construed
- to affect or limit the application or enforcement of any other
- Federal law.
- (h) The use of the term 'telecommunications device' in this
- section shall not impose new obligations on (one-way) broadcast
- radio or (one-way) broadcast television operators licensed by the
- Commission or (one-way) cable services registered with the
- Federal Communications Commission and covered by obscenity and
- indecency provisions elsewhere in this Act.
-
- Sec. 403. OBSCENE PROGRAMMING ON CABLE TELEVISION.
-
- Section 639 (47 U.S.C. 559) is amended by striking "10,000" and
- inserting "$100,000"
-
- Sec. 404. BROADCASTING OBSCENE LANGUAGE ON THE RADIO.
-
- Section 1466 of Title 18, United States Code, is amended by
- striking out "$10,000" and inserting "$100,000".
-
- Sec. 405 SEPARABILITY
-
- "(a) If any provision of this Title, including amendments to this
- Title of [sic] the application thereof to any person or circumstance is
- held invalid, the remainder of this Title and the application of such
- provision to other persons or circumstances shall not be affected
- thereby."
-
- ________________________________________________________________________
- CHRONOLOGY OF THE COMMUNICATIONS DECENCY ACT
-
- Sep 26, '95 Sen. Russ Feingold urges committee members to drop
- Managers Amendment and the CDA from the Telecommunications
- Deregulation bill
- Aug 4, '95 House passes HR1555 which goes into conference with S652.
- Aug 4, '95 House votes to attach Managers Amendment (which contains
- new criminal penalties for speech online) to
- Telecommunications Reform bill (HR1555).
- Aug 4, '95 House votes 421-4 to attach HR1978 to Telecommunications
- Reform bill (HR1555).
- Jun 30, '95 Cox and Wyden introduce the "Internet Freedom and Family
- Empowerment Act" (HR 1978) as an alternative to the CDA.
- Jun 21, '95 Several prominent House members publicly announce their
- opposition to the CDA, including Rep. Newt Gingrich (R-GA),
- Rep. Chris Cox (R-CA), and Rep. Ron Wyden (D-OR).
- Jun 14, '95 The Senate passes the CDA as attached to the Telecomm
- reform bill (S 652) by a vote of 84-16. The Leahy bill
- (S 714) is not passed.
- May 24, '95 The House Telecomm Reform bill (HR 1555) leaves committee
- in the House with the Leahy alternative attached to it,
- thanks to Rep. Ron Klink of (D-PA). The Communications
- Decency Act is not attached to it.
- Apr 7, '95 Sen. Leahy (D-VT) introduces S.714, an alternative to
- the Exon/Gorton bill, which commissions the Dept. of
- Justice to study the problem to see if additional legislation
- (such as the CDA) is necessary.
- Mar 23, '95 S314 amended and attached to the telecommunications reform
- bill by Sen. Gorton (R-WA). Language provides some provider
- protection, but continues to infringe upon email privacy
- and free speech.
- Feb 21, '95 HR1004 referred to the House Commerce and Judiciary
- committees
- Feb 21, '95 HR1004 introduced by Rep. Johnson (D-SD)
- Feb 1, '95 S314 referred to the Senate Commerce committee
- Feb 1, '95 S314 introduced by Sen. Exon (D-NE) and Gorton (R-WA).
-
- ________________________________________________________________________
- FOR MORE INFORMATION
-
- Web Sites
- URL:http://www.vtw.org/exon/
- URL:http://epic.org/
- URL:http://www.eff.org/pub/Alerts/
- URL:http://www.cdt.org/cda.html
- URL:http://outpost.callnet.com/outpost.html
-
- FTP Archives
- URL:ftp://ftp.cdt.org/pub/cdt/policy/freespeech/00-INDEX.FREESPEECH
- URL:ftp://ftp.eff.org/pub/Alerts/
-
- Gopher Archives:
- URL:gopher://gopher.panix.com/11/vtw/exon
- URL:gopher://gopher.eff.org/11/Alerts
-
- Email:
- vtw@vtw.org (put "send alert" in the subject line for the latest
- alert, or "send cdafaq" for the CDA FAQ)
- cda-info@cdt.org (General CDA information)
- cda-stat@cdt.org (Current status of the CDA)
-
- ________________________________________________________________________
- LIST OF PARTICIPATING ORGANIZATIONS
-
- In order to use the net more effectively, several organizations have
- joined forces on a single Congressional net campaign to stop the
- Communications Decency Act.
-
- American Civil Liberties Union * American Communication Association *
- American Council for the Arts * Arts & Technology Society * Association
- of Alternative Newsweeklies * biancaTroll productions * Boston
- Coalition for Freedom of Expression * Californians Against Censorship
- Together * Center For Democracy And Technology * Centre for Democratic
- Communications * Center for Public Representation * Citizen's Voice -
- New Zealand * Cloud 9 Internet *Computer Communicators Association *
- Computel Network Services * Computer Professionals for Social
- Responsibility * Cross Connection * Cyber-Rights Campaign * CyberQueer
- Lounge * Dutch Digital Citizens' Movement * ECHO Communications Group,
- Inc. * Electronic Frontier Canada * Electronic Frontier Foundation *
- Electronic Frontier Foundation - Austin * Electronic Frontiers
- Australia * Electronic Frontiers Houston * Electronic Frontiers New
- Hampshire * Electronic Privacy Information Center * Feminists For Free
- Expression * First Amendment Teach-In * Florida Coalition Against
- Censorship * FranceCom, Inc. Web Advertising Services * Friendly
- Anti-Censorship Taskforce for Students * Hands Off! The Net * Inland
- Book Company * Inner Circle Technologies, Inc. * Inst. for Global
- Communications * Internet On-Ramp, Inc. * Internet Users Consortium *
- Joint Artists' and Music Promotions Political Action Committee * The
- Libertarian Party * Marijuana Policy Project * Metropolitan Data
- Networks Ltd. * MindVox * MN Grassroots Party * National Bicycle
- Greenway * National Campaign for Freedom of Expression * National
- Coalition Against Censorship * National Gay and Lesbian Task Force *
- National Public Telecomputing Network * National Writers Union * Oregon
- Coast RISC * Panix Public Access Internet * People for the American Way
- * Republican Liberty Caucus * Rock Out Censorship * Society for
- Electronic Access * The Thing International BBS Network * The WELL *
- Voters Telecommunications Watch
-
- (Note: All 'Electronic Frontier' organizations are independent entities,
- not EFF chapters or divisions.)
-
- ------------------------------
-
- Date: Mon, 06 Nov 1995 23:11:31 -0500
- From: shabbir@VTW.ORG(Shabbir J. Safdar, VTW)
- Subject: FIle 2--VTW BillWatch #23: Digital Telephony overview
-
- (MODERATORS' NOTE: Another in the insightful commentaries from
- Shabbir Safdar of VTW BillWatch. To obtain full issues of
- Billwatch, see the URL at the end of this post)).
-
- EXTRACTED FROM:
-
- Issue #23, Date: Sun Nov 5 20:44:08 EST 1995
- End VTW BillWatch Issue #23, Date: Sun Nov 5 20:44:08 EST 1995
- VTW BillWatch #23
-
- VTW BillWatch: A weekly newsletter tracking US Federal legislation
- affecting civil liberties. BillWatch is published at the end of every
- week as long as Congress is in session. (Congress is in session)
-
- Do not remove this banner. See distribution instructions at the end.
-
- ..................
-
- COMMENTARY ON FBI WIRETAP PROPOSALS
- You'd have to be living without television, newspapers, or radio not to have
- seen all the flap over the FBI's proposal for wiretap funding. There has
- been a tremendous amount of misinformation in the press and on the net, so
- we'd like to take this opportunity to put all of this into perspective.
- Having opposed this legislative measure last year, we are painfully well-
- informed on the nature of the debate.
-
- The wiretapping plan you're seeing debated now is actually the funding
- phase of last year's "Digital Telephony" bill, now known as CALEA
- (Communications Assistance for Law Enforcement Act) Sponsored by Sen.
- Leahy (D-VT) and Rep. Edwards (previously D-CA), the bill was extremely
- controversial among civil liberties groups, but received very little
- mainstream press, and a moderate amount of debate on the Hill. The FBI
- had strongly suggested that advancing changes in technology would make it
- impossible for them to carry out court-authorized communications
- interceptions.
-
- Although they never produced public proof of a foiled interception, the
- general feel in Congress was to grant them the benefit of the doubt and
- give them a bill that would accomodate their needs. A bill was written
- that would require the telecommunications industry to build in wiretap
- functionality into their products, such as telephone switches.
-
- This is where the debate in the civil liberties community began. The
- Electronic Frontier Foundation used their connections and their position
- to hack up the bill to remove several provisions. The ability for any
- detective to issue an administrative subpoena (doesn't require a judge)
- to get transactional information such as who you called and for how long
- was removed, now requiring the approval of a judge. In addition, any
- inclusion of Internet services was removed. This meant that Netscape
- would not have to build in special wiretapping code should you fall under
- an a court-authorized interception order during an investigation.
-
- In addition, the FBI would now be forced to state publicly its requirements
- for wiretapping, and the justifications for the amount of wiretapping
- they wanted to do, so they could tell the communications companies what
- sorts of capability to build into their products. This probably seemed
- like a good compromise for the FBI at the time. They reduce the resistance
- to their bill, in exchange for which they had to publish some information
- that was probably semi-public anyway.
-
- They're probably kicking themselves now.
-
- The logic at the EFF was that Congress was going to pass such a bill this
- year anyway, so wouldn't we rather have one that improved privacy in some
- places and limited its scope in others, rather than let them get everything
- they want by working with legislators that are not privacy-savvy. Sort of
- an "enemy you know is less dangerous than one you don't" argument.
-
- Other groups disagreed. The Electronic Privacy Information Center (EPIC)
- and the Voters Telecommunications Watch both led an online campaign to
- fight the bill. In the end, the bill was passed without much floor debate
- and very little media attention.
-
- One stickler in all of this was the cost. The telecommunications industry
- said, rightfully so, that these additional features weren't market-driven
- (unless you're a Third World dictator buying telecommunications hardware
- to spy on your people) so they were basically being taxed unfairly. The FBI
- responded by saying that before any changes would be expected, the Federal
- Government would authorize the spending of US$500 million as reimbursement
- for their loss.
-
- This funding phase brings us to the present time. On Monday October 16 1995,
- the FBI published in the Federal Register it's requirements for
- wiretapping capacity. Civil liberties advocates salivated, knowing that
- for the first time in history, this backroom process that never saw any
- public accountability was going to be scrutinized in the light of day.
- Many civil liberties advocates hoped the media would finally report
- this as newsworthy, assuming that should the American people hear about
- it, they would be appalled.
-
- The media responded in spades, with paranoia about Big Brother and
- wiretapping abuses making front page news throughout the country. This
- couldn't have come at a worse time for the Administration. Reeling from
- the media flap over Waco and Ruby Ridge, law enforcement is not having its
- best public relations year. Civil liberties advocates went on the attack,
- deconstructing the published wiretap requirements and asking the FBI
- exactly what they needed all these wiretaps for.
-
- The root of the issue lies in a subtlety that no one anticipated. Civil
- liberties advocates thought the FBI, having previously conducted around 1,000
- interceptions per year, would simply publish a number that gave them some
- "growing room" given some assumption that crime was generally increasing.
-
- Instead, the FBI published percentages. The report in the Federal Register
- said that if a telephone switch can accomodate X number of subscribers,
- then the switch must be capable of performing X * Y% of interceptions
- SIMULTANEOUSLY, where Y% has a minimum amount of .05%, but can rise as
- high as 1% if you live in a geographic area with lots of crime.
-
- Here is where the debate begins, and the misinformation seeps in. When
- you look at the number of subscribers, that number may be much different
- depending on how you interpret it. Assume that the phone switch that
- serves your area has 1,000,000 subscribers on it, and you live in a
- high crime area, such as VTW's birthplace, New York City.
-
- The math is simple, 1% of 1,000,000 subscribers is 10,000 simultaneous
- wiretaps. Isn't this a little high? Not only have there been only about
- 1,000 wiretaps authorized in recent years, but they weren't all at once,
- and all within the same neighborhood!
-
- To their credit, the FBI says they were misinterpreted. A close look at
- the announcement in the Federal Register shows them to be right. However
- you should be just as alarmed. The FBI claims that just because a
- telephone switch can accomodate 1,000,000 people doesn't mean they can all
- pick up the phone and dial a friend at once. If you look closely at the
- notice in the Federal Register, it says:
-
- the percentage is applied to the engineered subscriber capacity of
- a switch
-
- Presumably, if they had meant total subscribers, they would have said
- total subscribers. It would be uncharacteristic of the FBI is ask for
- less than what they need. However this doesn't actually make the numbers
- so much better than you should be unconcerned. The number is still
- appalling higher than anything previously requested, and you should be very
- concerned.
-
- Take the phone switch in our previous example. Assume that only half the
- subscribers can actually pick up their handsets and make a call
- simultaneously. That cuts the actual number of simultaneous required
- interceptions to 5,000, and that's just in New York. It's unreasonable for
- our government to fund such an activity without the FBI explaining
- their reasons for needing this much capacity. Has there been a great leap
- in the last few years of crimes for which interceptions are the only
- available tool?
-
- The Electronic Privacy Information Center is fond of pointing out that
- interceptions in the last few years have been primarily for drugs and
- gambling. EPIC asserts that not one wiretap has been authorized in the
- investigation of domestic terrorism such as the World Trade Center or
- Oklahoma City bombings.
-
- The second misinterpretation of these figures is the common printing of
- the fact that the FBI wishes to wiretap every 1 in 400 or 1 in 100 telephones.
- We're not really sure how anyone came up with these numbers, as that would
- apply to specific geographic areas only, not the country as a whole. To
- blanketly print these numbers without actually talking about the area they
- apply to is to resort to unnecessary hysteria. The FBI's proposal is
- chilling enough that we don't need that much hyperbole to justify public
- concern.
-
- Two groups are conducting high profile campaigns on this issue. We
- urge you to follow them and stay informed. Here is an alphabetical
- list:
-
- The Center for Democracy and Technology (CDT) is a new organization staffed
- by many of the people who previously worked on this issue at the EFF. CDT
- is attempting to answer such questions as:
-
- * Has the FBI met all the public accountability and oversight criteria
- required by the statute?
-
- and
-
- * Does the requested capacity accurately reflect the needs of law
- enforcement?
-
- You can monitor their work by checking out their World Wide Web page at
- URL:http://www.cdt.org/
-
- The Electronic Privacy Information Center (EPIC) is conducting a campaign
- to deny funding for the bill, a continuation of last-year's campaign to
- prevent the passage of the bill itself. You can monitor their work by
- checking out their World Wide Web page at:
- URL:http://www.epic.org/
-
- .............
-
- You can receive BillWatch via email, fax, gopher or WWW:
-
-
- BillWatch can be found on the World Wide Web at
- http://www.vtw.org/billwatch/
-
- BillWatch can be found in Gopherspace at:
- gopher -p1/vtw/billwatch/ gopher.panix.com
-
- ((BillWatch administrative info snipped by CuD editors for
- parsimony--jt))
-
- ------------------------------
-
- Date: Tue, 7 Nov 95 23:31:14 PST
- From: jblumen@interramp.com
- Subject: FIle 3--FW: RE: letter to Congress
-
- Here is a copy of a letter I sent to all the conference committee members
- considering the CDA.
-
-
- Dear : :
-
- I am extremely concerned about the First Amendment implications
- of the Communications Decency Act and the similar manager's mark
- amendments that were passed by the House.
-
- I am an attorney and software company executive who first
- became involved with on-line legal issues in 1984. In 1987, I wrote
- Syslaw: The Sysop's Legal Manual, the first book on the law of cyberspace.
- With my colleague Mark Mangan, I am writing a book on the regulation of
- the Internet which will be published by Henry Holt in February.
-
- I believe the Congress is making a serious error by attempting
- to apply indecency law to the Internet. Both versions of the bill are
- over-inclusive and would throw out the baby with the bathwater.
-
- The Internet, especially the World Wide Web, is a medium for
- serious discussion of a wide variety of social issues including
- politics, ethics and law. Like much of the contents of any bookstore,
- these publications on the Internet might qualify as "indecent" under
- the extremely broad definition in both versions of the bill. Information
- resources and critical discussions relating to AIDS, rape, and pornography
- are just three examples. Please note that these bills make no exception
- for material which has serious political, literary, or scientific value;
- ironically, a polemic against pornography, if it describes what it opposes,
- is barred by the legislation as completely as an essay on the pleasures of
-
- pornography would be. If you pass this legislation unaltered, thousands of
- newsletters, documents, compilations of useful information and even works
- of literature will have to be removed from the Internet in order to avoid
- any risk of liability for the people who maintain them there.
-
-
- If you are not personally familiar with the Internet, you may
- think of it as the "porn shop" one Senator called it in the June debate
- on the CDA. Nothing could be further from the truth. The amount of
- pornography on the Internet is miniscule compared to the amount of
- serious, intellectual material that would have to be deleted if the
- legislation passes. In the 1957 case of Butler v. Michigan, the Supreme
- Court admonished the state that it could not legally set the level of
- public discourse to include only what is fit for children. That is exactly
- what the legislation will do to the Internet.
-
- Both the CDA and the manager's mark amendment are based on
- language derived from the laws pertaining to broadcast communications
- and telephony. Justice Cardozo said years ago that, in making new laws,
- we must proceed by history and analogy. The history of telecommunications
- law reveals that the rationale for government involvement in this arena is
- the scarcity of broadcast bandwidth and the phone company's historical
- status as a common carrier. Neither of these is the appropriate analogy
- for the Internet. The Net should be regarded as a constellation of
- printing presses and bookstores--computers used to create letters,
- essays, and compilations for people to read, and other computers used
- to store these works so that people may find and read them. As such,
- the Internet should be granted the full range of First Amendment
- protection to which print publications are entitled.
-
- Please let me recommend a book that may help you in the
- difficult task you have ahead of you. Written in 1983, Ithiel de
- Sola Pool's Technologies of Freedom (Harvard University Press)
- is a remarkably prescient analysis of the problems and pitfalls
- involved in regulating electronic communications. Pool says,
- "The onus is on us to determine whether free societies in the
- twenty-first century will conduct electronic communications
- under the conditions of freedom established for the domain of
- print through centuries of struggle, or whether that great
- achievement will become lost in a confusion about new technologies."
-
- Please think about the fact that the legislation--either version--
- would bar from the Internet any discussion, no matter how intellectual
- or serious, not considered fit for television or radio. Now, walk
- into your local bookstore and consider what percentage of the books
- there would need to be censored before they could appear on the Internet.
-
- In 1643, the English Parliament ordained a system of
- licensing printing presses and books and the great poet John
- Milton appealed for a return to reason. The order, he said, rather
- than suppressing scandalous and seditious literature, would "be primely
- to the discouragement of all learning, and the stop of Truth....he
- who destroys a good book, kills treason itself, kills the image of God,
- as it were, in the eye." Even bad books, he pointed out, serve their
- purpose, in that "they to a discreet and judicious reader serve in many
- respects to discover, to confute, to forewarn, and to illustrate." And
- this, of course, is the classic truth underlying our First Amendment:
- the antidote for bad speech is good speech, not censorship. The Congress,
- if it passes the indecency legislation before it, places itself on the
- wrong side of freedom of speech, just like that Parliament.
-
- I would encourage you to call me if I can answer any questions
- or provide further insight. I would particularly welcome the opportunity
- to take you and your colleagues on a tour of serious, legitimate
- Internet resources that would have to shut down to avoid the brunt
- of the legislation.
-
- Sincerely yours,
- Jonathan Blumen
-
- jblumen@interramp.com
- http://www.spectacle.org
-
- ------------------------------
-
- Date: Sun, 5 Nov 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: FIle 4--Cu Digest Header Info (unchanged since 5 Nov, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.89
- ************************************
-
-