home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Jan 7, 1996 Volume 8 : Issue 02
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.02 (Sun, Jan 7, 1996)
-
- File 1--FINAL REMINDER - Last issue of CuD from the UIUC SERVER
- File 2--Compuserve: "The whole story"
- File 3--Court Rules in Pentagon Cit
- File 4--CDT: Telecom Bill Overview and Proposal Text (FINALLY!)
- File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Sun, 7 Jan 1996 16:19:32 CST
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--FINAL REMINDER - Last issue of CuD from the UIUC SERVER
-
- ** CuD IS CHANGING SERVERS **
-
- THIS WILL LIKELY BE THE *FINAL* time we use the UIUC server. The
- next issue of CuD will be sent from the weber.ucsd.edu site.
-
- ==============
-
- On Wednesday, Cu Digest will be moving to a new server at
- weber.ucsd.edu. to continue to receive CuD, you must
- RE-SUBSCRIBE.
-
- Re-subbing is easy. Just send a message with this in the
- "Subject:" line
- SUBSCRIBE CU-DIGEST
-
- send it to:
-
- cu-digest-request@weber.ucsd.edu
-
- If you prefer to access CuD from Usenet, use
- comp.society.cu-digest
-
- If you prefer archives, you can use the ftp/www site at
- ftp.eff.org (or www.eff.org) or the CuD archives at:
- http://www.soci.niu.edu/~cudigest.
-
- We also hope to have a mail archive set up soon as well.
-
- You can still contact the moderators at:
- cudigest@sun.soci.niu.edu
- or tk0jut2@mvs.cso.niu.edu
-
- Please *DO NOT* send inquiries to the server at UIUC.
-
- Jim and Gordon
-
- ------------------------------
-
- Date: Sun, 7 Jan 1996 09:47:57 -0500 (EST)
- From: "Declan B. McCullagh" <declan+@CMU.EDU>
- Subject: File 2--Compuserve: "The whole story"
-
- Note the extent of the damage caused by CMU, Marty Rimm, and TIME's
- "Cyberporn" cover:
-
- "Last summer, a kind of hysteria about Internet
- pornography broke out in German media."
-
- Thanks, Michael, for posting this.
-
- -Declan
-
- ---------- Forwarded message begins here ----------
-
- From--michael_kunze@spiegel.de (Michael Kunze)
- Newsgroups--alt.censorship
- Subject--CIS censorship--The whole story
- Date--Sat, 06 Jan 1996 09:33:39 GMT
-
- Dear Nettizens,
-
- Some few fivehundred postings ago, I promised you let you have more
- details about the CompuServe censorship case investigated by the
- editorial staff of SPIEGEL online. It is not a story of evil but of
- people acting overambitious and ignorant. And it is not quite as
- simple as DrG might be wishing!
-
- To keep it short, here are the facts:
-
- In 1994, a Task Force called "AG EDV" was set up by the Bavarian
- Minister of Interior at the Police Headquarters in Munich. Initially,
- the Task Force was formed to search persons dealing with pornographic
- material via BTX the former online service of German Telekom and its
- work was limited to one year.
-
- For the moment, investigations of this Task Force ran successfully due
- to the assistance of Telekom. But simultaneously, people being
- suspected changed their ways of distributing either to closed BBS
- systems or chose more secret methods. So the Task Force was compelled
- to enhance their efforts and they raided Munich BBS systems.
- Furthermore, they studied computer magazines to find ads for
- pornographic CD-ROMs. During this operation they found what they were
- looking for, and "PC Direkt", a Ziff Davis publication, and some other
- magazine were forced to pulp some issues.
-
- All activities of the Task Force could not have happened, if they were
- not supported by a whole bunch of local prosecutors and judges.
- Sticking together, chatting, doing favours forms a part of the social
- life in Munich - in malicious words - the 'Munich swamp'.
-
- The prevailing opinion of the Task Force and of some prosecutors is
- that carriers of digital information could held responsible for the
- content of what they are spreading. This meaning matches exactly the
- content of the CDA. But this is only one point of view. Up to now,
- there doesn't exist any law or direction in Germany concerning
- responsibilities of ISPs or online services regarding contents they
- only do deliver. And so, judges decide from case to case. The German
- department of justice thinks that carriers could be held responsible
- if they deliver illegal content "deliberately". But then, could one
- call them "carriers"?
-
- Last summer, a kind of hysteria about Internet pornography broke out
- in German media. A few journalist had made their first steps in the
- Internet and discovered nasty postings in the
- alt.binaries.pictures.erotica Usenet hierarchy. A student of Erlangen
- University was seized because of spreading child porn via Usenet.
- Then, the "Time" article about Internet porn was published and quoted
- by nearly every German newspaper.
-
- I think at that time the Task Force planned to investigate the Usenet.
- Due to the facts that CIS had become a big ISP and their German office
- is located in Munich, CIS seemed to be a worthwhile target. Somehow
- the Task Force managed to get a search warrant to investigate the
- Munich CIS office on November, 22nd. However, the search was more or
- less like a visit. Let me quote the public prosecutor: CompuServe "was
- quite cooperative". "We sat together talking about chances to kick
- pornographic contents out of CompuServe's information system." The
- police officers just collected a copy of the CompuServe association
- contract and the address of the CEO.
-
- Two days later, CompuServe's German managers published that they "will
- do anything to support the work of German authorities fighting against
- pornography in Cyberspace". On December, 8th, CIS was handled a list
- of more than 200 newsgroups by the Task Force. In my opinion,
- interpreting the prosecutor and the CIS spokeswoman, this list was
- presented to CIS as containing "suspicious newsgroups". In the
- attached letter from the prosecutor it is said: "... it is left to
- CompuServe to take the necessary steps to avoid possible liabilities
- to punishment."
-
- So, if CompuServe should have ever had threats, it could have been
- only very small ones. But there is no reason to their German
- management to risk anything. CompuServe's approach is not to guarantee
- for "freedom of speech and information" but to make "money".
-
- When i interviewed the prosecutor, it soon became quite clear that his
- department had tried to bring CIS to court to get its legal position
- checked by some judges. Because of CIS servile tactics they had to
- give up their goal.
-
- The ominous list itself shows, how ignorant the members of the Task
- Force are about the Usenet. In my opinion, they just sampled all
- newsgroups containing words like "sex", "erotic", "gay" and so on and
- put the result onto the list.
-
- We have two in depth articles on the whole affair on our web server.
- One is an extended version of what i've posted here, the other deals
- with the CDA and the actual political and legal situation concerning
- the Internet. Unfortunately for US readers, these articles are in
- German because we didn't found the time to translate them. But i hope
- will can manage this until Monday 8th, 8:00 AM, EST. Then, you should
- point your browser to
-
- <http://hamburg.bda.de:800/bda/int/spon/online/excl03.html>
-
- or have a look at our complete online services at
-
- <http://www.spiegel.de>
-
- By the way, SPIEGEL online is the online department of the reputable
- German news magazin DER SPIEGEL.
-
-
- Greetings
- Michael
- --------------------------------------------------------------
- Michael Kunze Tel.:+49(0)40-3007-0
- Redaktion/editorial staff Fax :+49(0)40-3007-2986
- Spiegel Online
- Brandstwiete 19
- 20457 Hamburg / Germany
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- std. disclaimer: diese Meinung meins, exclusiv und immerdar
-
- ------------------------------
-
- Date: 5 Jan 1996 13:40:25 -0500
- From: "David Sobel" <sobel@EPIC.ORG>
- Subject: File 3--Court Rules in Pentagon Cit
-
- In a case litigated by EPIC staff, the federal appeals court in
- Washington, DC, has ordered the U.S. Secret Service to release
- information concerning a controversial "hacker" investigation.
- The January 2 ruling partially rejected the agency's three-year
- attempt to withhold documents concerning the 1992 "Pentagon City
- Mall Raid." In November of that year, a group of young people
- affiliated with the computer magazine "2600" were confronted by
- mall security personnel, local police officers and several
- unidentified individuals in the Virginia shopping mall. The group
- members were ordered to identify themselves and to submit to
- searches of their personal property. Their names were recorded
- and some of their property was confiscated.
-
- Computer Professionals for Social Responsibility (CPSR) filed suit
- in federal court in early 1993 seeking the release of relevant
- Secret Service records under the Freedom of Information Act. The
- litigation of the case has been handled by the Electronic Privacy
- Information Center (EPIC). In July 1994, U.S. District Judge
- Louis Oberdorfer ordered the Secret Service to release the vast
- majority of documents it maintains on the incident. The
- government appealed that decision to the U.S. Court of Appeals for
- the District of Columbia Circuit, which partially affirmed the
- lower court decision in the recent ruling.
-
- The appeals court rejected the agency's attempt to invoke a
- blanket claim of "source confidentiality" for all information
- involving investigations of computer crime, noting that "the
- Service offered no evidence that a fear of retaliation by hackers
- is sufficiently widespread to justify an inference that sources of
- information relating to computer crimes expect their identities
- and the information they provide to be kept confidential." The
- court did, however, uphold the agency's claim that information
- identifying particular individuals should be withheld from
- disclosure.
-
- Additional information, including the text of the appellate
- decision, is available at:
-
- http://www.epic.org/computer_crime/2600/
-
- ------------------------------
-
- Date: Thu, 4 Jan 1996 16:39:30 -0800 (PST)
- From: Declan McCullagh <declan@EFF.ORG>
- Subject: File 4--CDT: Telecom Bill Overview and Proposal Text (FINALLY!)
-
- From: CDT POLICY POST Number 33 January 4, 1996
-
- (1) TEXT OF LATEST VERSION OF THE CDA -- STILL UNCONSTITUTIONAL
-
- The House/Senate telecommunications reform conference committee has
- released a preliminary draft of the final telecommunications reform bill,
- which includes provisions which would impose broad government regulations
- on constitutionally protected speech online. The text of these provisions
- is attached below.
-
- The attached version of the CDA contains the changes approved at the
- December 6, 1995 conference committee meeting, where members voted to adopt
- Rep. Rick White's proposal but with significant changes, including a return
- to the unconstitutional "indecency" standard (See CDT Policy Post No. 32,
- 12/6/95).
-
- The conferees have made several important changes to the legislation, none
- of them are particularly favorable to cyberspace-rights advocates. Among
- other things, the latest draft:
-
- * Relies on the vague and blatantly unconstitutional "indecency"
- standard (Sec 502 (a) - (c))
-
- * Prohibits sending "indecent" material directly to a minor or making
- indecent material available for display in a manner available to a
- minor (including world wide web pages, ftp sites, or usenet
- newsgroups) (Sec 502 (d)).
-
- * No longer contains the provision of the Cox/Wyden/White bill
- prohibiting the FCC from imposing content or other regulations on the
- Internet or other interactive media.
-
- * Contains weaker protections for content providers who label content
- and enable others to block it (e.g., PICS) have been weakened (Sec 502
- (e)(5).
-
- * Would allow states to impose additional restrictions on non-commercial
- activities such as free-nets, BBS's, and non-profit content providers
- (Sec 502 (h)).
-
- * Creates a new crime for the solicitation of minors using a computer,
- the US mail, or any other means of interstate or foreign commerce (Sec
- 508).
-
- The full text of the new proposal is attached below.
-
- CDT believes that this proposal threatens the very existence of the
- Internet as a means for free expression, education, and political
- discourse. The proposal is an unwarranted, unconstitutional intrusion by
- the Federal government into the private lives of all Americans.
-
- NEXT STEPS: FINAL AGREEMENT NOT YET REACHED, VOTE COULD OCCUR SOON
-
- As you know, the CDA is part of the massive telecommunications reform
- legislation, which is currently being considered by a House/Senate
- conference committee.
-
- The conference committee has not reached agreement on several key issues,
- including whether the FCC should be permitted to regulate the Internet,
- broadcast ownership rules, and other issues. Reps. Rick White, Chris Cox,
- and others are currently fighting to retain the provisions baring the FCC
- from regulating online content. A final vote by the conferees to send the
- bill to the full congress will not occur until an agreement is reached on
- this and other outstanding issues.
-
- As of Thursday January 4, 1996, the conferees have NOT yet voted to send a
- version of the legislation to the Full House and Senate for a final vote.
- No vote has been scheduled, and House Speaker Newt Gingrich has stated that
- no vote will occur until Congress finishes work on the Budget.
-
- CDT will continue to fight these provisions, and will work to remove them
- from the final telecommunications bill. We are also preparing to fight this
- issue in court, if necessary.
-
- WHAT YOU CAN DO TO HELP
-
- The Voters Telecommunications Watch (VTW) has organized an online coalition
- (of which CDT is a member) against the net-censorship bill. To find out
- what you can do to fight this bill, visit VTW's web page
-
- URL:http://www.vtw.org/
-
- Or send email to vtw@vtw.org with 'send alert' in the subject line.
-
- ==---------------------------------------------------------------------==
- (2) TEXT OF THE PROPOSAL
-
- TITLE V - BROADCAST OBSCENITY AND VIOLENCE
-
- Subtitle A - Obscene, Harassing, and Wrongful Utilization of
- Telecommunications Facilities
-
- SEC. 501. SHORT TITLE.
-
- This title may be cited as the "Communications Decency Act of 1995".
-
- SEC. 502. OBSCENE OR HARASSING USE OF TELECOMMUNICATIONS
- FACILITIES UNDER THE COMMUNICATIONS ACT OF 1934.
-
- Section 223 (47 U.S.C. 223) is amended-
-
- (1) by striking subsection (a) and inserting in lieu thereof:
-
- "(a) Whoever ==
-
- "(1) in interstate or foreign communications-
- "(A) by means of a telecommunications device knowingly-
-
- "(i) makes, creates, or solicits, and
- "(ii) initiates the transmission of, any comment, request,
- suggestion, proposal, image, or other communication which is obscene,
- lewd, lascivious, filthy, or indecent, with intent to annoy, abuse,
- threaten, or harass an other person;
-
- "(B) by means of a telecommunications device knowingly-
-
- "(i) makes, creates, or solicits, and
- "(ii) initiates the transmission of, any comment, request,
- suggestion, proposal, image, or other communication which is obscene
- or indecent knowing that the recipient of the communication is under
- 18 years of age regard less of whether the maker of such communication
- placed the call or initiated the communication;
-
- "(C) makes a telephone call or utilizes a telecommunications
- device, whether or not conversation or communication ensues, without
- disclosing his identity and with intent to annoy, abuse, threaten, or
- harass any person at the called number or who receives the
- communication;
-
- "(D) makes or causes the telephone of another repeatedly or
- continuously to ring, with intent to harass a person at the called
- number; or
-
- "(E) makes repeated telephone calls or repeatedly initiates
- communication with a telecommunications device, during which
- conversation or communication ensues, solely to harass any person at
- the called number or who receives the communication;
-
- "(2) knowingly permits a telecommunications facility under his control
- to be used for any activity prohibited by paragraph (1) with the
- intent that it be used for such activity,
-
- shall be fined under title 18, United States Code, or imprisoned not more
- than two years, or both."; and
-
- (2) by adding at the end the following new sub sections:
-
- "(d) Whoever ==
-
- "(1) in interstate or foreign communications knowingly-
-
- "(A) uses an interactive computer service to send to a specific
- person or persons under 18 years of age, or
-
- "(B) uses any interactive computer service to display in a manner
- available to a person under 18 years of age,
-
- any comment, request suggestion, proposal, image, or other
- communication that, in context, depicts or describes, in terms patently
- offensive as measured by contemporary community standards, sexual or
- excretory activities or organs, regardless of whether the user of such
- service placed the call or initiated the communication; or
-
- "(2) knowingly permits any telecommunications facility under such
- person's control to be used for an activity prohibited by
- paragraph (1) with the intent that it be used for such activity,
-
- shall be fined under title 18, United States Code, or imprisoned not more
- than two years, or both.
-
- "(e) In addition to any other defenses available by
-
- "(1) No person shall be held to have violated subsection (a) or (d)
- solely for providing access or connection to or from a facility,
- system, or network not under that person's control, including
- transmission, downloading, intermediate storage, access software, or
- other related capabilities that are incidental to providing such
- access or connection that does not include the creation of the
- content of the communication.
-
- "(2) The defenses provided by paragraph (1) of this subsection shall
- not be applicable to a person who is a conspirator with an entity
- actively involved in the creation or knowing distribution of
- communications that violate this section, or who knowingly
- advertises the availability of such communications.
-
- "(3) The defenses provided in paragraph (1) of this subsection shall
- not be applicable to a person who provides access or connection to a
- facility, system, or network engaged in the violation of this
- section that is owned or controlled by such person.
-
- "(4) No employer shall be held liable under this section for the
- actions of an employee or agent unless the employee's or agent's
- conduct is within the scope of his employment or agency and the
- employer (A) having knowledge of such conduct, authorizes or
- ratifies such conduct, or (B) recklessly disregards such conduct.
-
- "(5) It is a defense to a prosecution under sub section (a) or (d)
- that a person-
-
- "(A) has taken in good faith, reasonable, effective, and
- appropriate actions under the circumstances to restrict or prevent
- access by minors to a communication specified in such subsections,
- which may involve any appropriate measures to restrict minors from
- such communications, including any method which is feasible under
- available technology; or
-
- "(B) has restricted access to such communication by requiring use
- of a verified credit card, debit account, adult access code, or
- adult personal identification number.
-
- "(6) The Commission may describe measures which are reasonable,
- effective, and appropriate to restrict access to prohibited
- communications under subsection (d). Nothing in this section
- authorizes the Commission to enforce, or is intended to provide the
- Commission with the authority to approve, sanction, or permit, the
- use of such measures. The Commission has no enforcement authority
- over the failure to utilize such measures. The Commission shall not
- endorse specific products relating to such measures. The use of such
- measures shall be admitted as evidence of good faith efforts for
- purposes of this paragraph in any action arising under subsection
- (d). Nothing in this section shall be construed to treat interactive
- computer services as comm. on carriers or telecommunications
- carriers.
-
- "(f)(1) No cause of action may be brought in any court or
- administrative agency against any person on account of any activity
- that is not in violation of any law punishable by criminal or civil
- penalty, and that the person has taken in good faith to implement a
- defense authorized under this section or otherwise to restrict or
- prevent the transmission of, or access to, a communication specified in
- this section.
-
- "(2) No State or local government may impose ant liability for
- commercial activities or actions by commercial entities, nonprofit
- libraries, or institutions of higher education in connection with an
- activity or action described in subsection (a)(2) or (d) that is
- inconsistent with the treatment of those activities or actions under
- this section: Provided, however, That nothing herein shall preclude any
- State or local government from enacting and enforcing complementary
- oversight, liability, and regulatory systems, procedures, and
- requirements, so long as such systems, procedures, and requirements
- govern only intrastate services and do not result in the imposition of
- inconsistent rights. duties or obligations on the provision of
- interstate services. nothing in this subsection shall preclude any
- State or local government from governing conduct not covered by this
- section.
-
- "(g) nothing in subsection (a), (d), (e), or (f) or in the defenses to
- prosecution under (a) or (d) shall be construed to affect or limit the
- application or enforcement of any other Federal law.
-
- "(h) For purposes of this section-
-
- "(1) The use of the term 'telecommunications device' in this section-
-
- "(A) shall not impose new obligations on broadcasting station
- licensees and cable operators covered by obscenity and indecency
- provisions elsewhere in this .Act; and
-
- "(B) does not include the use of an inter active computer service.
-
- "(2) The term 'interactive computer service' has the meaning provided in
- section 230(f)(2)
-
- "(3) The term 'access software' means software (including client or
- server software) or enabling tools that do not create or provide the
- content of the communication but that allow a user to do any one or more of
- the following:
-
- "(A) filter, screen, allow, or disallow content;
- "(B) pick, choose, analyze, or digest content; or
- "(C) transmit, receive, display, forward, cache, search, subset,
- organize, reorganize, or translate content.
-
- "(4) The term 'institution of higher education' has the meaning provided
- in section 1201 of the Higher Education Act of 1965 (20 U.S.C. 1141).
-
- "(5) The term 'library means a library eligible for participation in
- State-based plans for funds under title III of the Library Services and
- Construction Act (20 U.S.C. 355e et seq.).".
-
- SEC. 503. OBSCENE PROGRAMMING ON CABLE TELEVISION,
-
- Section 639 (47 U.S.C. 559) is amended by striking "not more than
- $10,000" and inserting "under title 18, United States Code,".
-
- SEC. 504. SCRAMBLING OF CABLE CHANNELS FOR NONSUBSCRIBERS.
-
- Part IV of title VI (47 U.S.C. 551 et se-q.) is amended by adding at
- the end the following:
-
- "SEC. 640. SCRAMBLING OF, CABLE CHANNELS FOR NONSUBSCRIBERS.
-
- "(a) SUBSCRIBER REQUEST.-Upon request by a cable service subscriber, a
- cable operator shall, without charge, fully- scramble or otherwise fully
- block the audio and video portion of each channel carrying such programming
- so that one not a subscriber does not receive it.
-
- "(b) DEFINITION.-As used in this section, the term 'scramble' means. to
- rearrange the content of the signal of the programming so that the program
- cannot be viewed or heard in an understandable manner.".
-
- SEC. 505. SCRAMBLING OF SEXUALLY EXPLICIT ADULT VIDEO SERVICE
- PROGRAMMING.
-
- (a) REQUIREMENT.-Part IV of title I (47 U.S.C. 551 et seq.), as amended
- by this Act, is further amended by adding at the end the following:
-
- "SEC. 641. SCRAMBLING OF SEXUALLY EXPLICIT ADULT VIDEO SERVICE
- PROGRAMMING.
-
- "(a) REQUIREMENT.-In providing sexually explicit adult programming or
- other programming that is indecent on any channel of its service primarily
- dedicated to sexually-oriented programming, a multichannel video
- programming distributor shall fully scramble or otherwise fully block the
- video and audio portion of such channel so that one not a subscriber to
- such channel or programming does not receive it.
-
- "(b) IMPLEMENTATION.-Until a multichannel video programming distributor
- complies with the requirement set forth in subsection (a), the distributor
- shall limit the access of children to the programming referred to in that
- subsection by not providing such program during the hours of the day (as
- determined by the Commission) when a significant number of children are
- likely to view it.
-
- "(c) DEFINITION.-As used in this section, the term 'scramble' means to
- rearrange the content of the signal of the programming so that the
- programming cannot be viewed or heard in an understandable manner.".
-
- "(b) EFFECTIVE DATE.-The amendment made b-y subsection (a) shall take
- effect 30 days after the date of the enactment of this Act.
-
- SEC. 606. CABLE OPERATOR REFUSAL TO CARRY CERTAIN PROGRAMS.
-
- (a) PUBLIC, EDUCATION, AND GOVERNMENTAL CHANNELS.-Section 611(e) (47
- U.S.C. 531(e)) is amended by inserting before the period the following: ",
- except a cable operator may refuse to transmit any public access program or
- portion of a public access program which contains obscenity, indecency, or
- nudity".
-
- (b) CABLE CHANNELS FOR COMMERCIAL USE. Section 612(c)(2) (47 U.S.C.
- 532(c)(2)) is amended by striking "an operator" and inserting "a cable
- operator may refuse to transmit any leased access program or portion of a
- leased access program which contains obscenity, indecency, or nudity and".
-
- SEC. 507. CLARIFICATION OF CURRENT LAWS REGARDING COMMUNICATION OF
- OBSCENE MATERIALS THROUGH THE USE OF COMPUTERS.
-
- (a) IMPORTATION OR TRANSPORTATION.-Section 1462 of title 18, United States
- Code, is amended-
-
- (1) in the first undesignated paragraph, by inserting "or
- interactive computer service (as defined in section 230(f)(2) of
- the Communications Act of 1934)" after "carrier"; and
-
- (2) in the second undesignated paragraph-
-
- (A) by inserting "or receives," after "takes";
-
- (B) by inserting "or interactive computer service (as defined in
- section 230(f)(2) of the Communications Act of 1934)" after "common
- carrier"; and
-
- (C) by inserting "or importation" after "carriage".
-
- (b) TRANSPORTATION FOR PURPOSES OF SALE OR DISTRIBUTION.-The first
- undesignated paragraph of section 1465 of title 18, United States Code, is
- amended -
-
- (1) by striking "transports in" and inserting "transports or
- travels in, or uses a facility or means of,";
-
- (2) by inserting "or an interactive computer service (as defined in
- section '230(f)(2) of the Communications Act of 1934) in or
- affecting such commerce" after "foreign commerce" the first place
- it appears;
-
- (3) by striking ", or knowingly travels in" and all that follows
- through "obscene material in inter state or foreign commerce," and
- inserting "of".
-
- (c) INTERPRETATION.-The amendments made by this section are clarifying and
- shall not be interpreted to limit or repeal any prohibition contained in
- sections 1462 and 1465 of title 18, United States Code, before such
- amendment, under the rule established in United States v. Alpers, 338 U.S.
- 680 (1950).
-
- SEC. 508. COERCION AND ENTICEMENT OF MINORS.
-
- Section 2422 of title 18, United States Code, is amended-
-
- (1) by inserting "(a)" before "Whoever knowingly"; and
-
- (2) by adding at. the end the following
-
- "(b) Whoever, using any facility or means of inter state or foreign
- commerce, including the mail, or within the special maritime and
- territorial jurisdiction of the United States, knowingly persuades,
- induces, entices, or coerces any individual who has not attained the age of
- 18 years to engage in prostitution or any sexual act for which person
- may be criminally prosecuted, or attempts to do so shall be fined under
- this title or imprisoned not more than 10 years, or both.".
-
- SEC. 509. ONLINE FAMILY EMPOWERMENT.
-
- Title II of the Communications Act of 1934 (47 U.S.C. 201 et seq.) is
- amended by adding at the end the following new section:
-
- "SEC. 230. PROTECTION FOR PRIVATE BLOCKING AND SCREENING OF OFFENSIVE
- MATERIAL
-
- "(a) FINDINGS.-The Congress finds the following:
-
- "(1) The rapidly developing array of Internet and other interactive
- computer services available to individual Americans represent an
- extraordinary advance in the availability of educational and
- informational resources to our citizens.
-
- "(2) These services offer users a great degree of control over the
- information that they receive, as well as the potential for even
- greater control in the future as technology develops.
-
- "(3) The Internet and other interactive computer services offer a
- forum for a true diversity of political discourse, unique opportunities
- for cultural development, and myriad avenues for intellectual activity.
-
- "(4) The Internet and other interactive computer services have
- flourished, to the benefit of all Americans. with a minimum of
- government regulation.
-
- "(5) Increasingly Americans are relying on interactive media for a
- variety of political, educational, cultural, and entertainment
- services.
-
- "(b) POLICY.- It is the policy of the United States-
-
- "(1) to promote the continued development of the Internet and other
- interactive computer services and other interactive media;
-
- "(2) to preserve the vibrant and competitive free market that
- presently exists for the Internet and other interactive computer
- services, unfettered by Federal or State regulation;
-
- "(3) to encourage the development of technologies which maximize
- user control over what in formation is received by individuals,
- families, and schools who use the Internet and other interactive
- computer services;
-
- "(4) to remove disincentives for the development and utilization of
- blocking and filtering technologies that empower parents to restrict
- their children's access to objectionable or inappropriate online
- material; and
-
- "(5) to ensure vigorous enforcement of Federal criminal laws to
- deter and punish trafficking in obscenity, stalking, and harassment by-
- means of computer.
-
- "(c) PROTECTION FOR 'GOOD SAMARITAN BLOCKING AND SCREENING OF OFFENSIVE
- MATERIAL.-
-
- "(1) TREATMENT OF PUBLISHER OR SPEAKER.-No provider or user of an
- interactive computer service shall be treated as the publisher or
- speaker of any information provided by another information content
- provider.
-
- "(2) CIVIL LIABILITY.-No provider or user of an interactive computer
- service shall be held liable on account of-
-
- "(A) any- action voluntarily taken in good faith to restrict
- access to or availability of material that the provider or user
- considers to be obscene, lewd, lascivious, filthy, excessively
- violent, harassing, or otherwise objectionable, whether or not
- such material is constitutionally protected; or
-
- "(B) any action taken to enable or make available to information
- content providers or others the technical means to restrict access
- to material described in paragraph (1).
-
- "(d) EFFECT ON OTHER LAWS.-
-
- "(1) NO EFFECT ON CRIMINAL. LAW.-Nothing in this section shall be
- construed to impair the enforcement of section 223 of this Act, chapter
- 71 (relating to obscenity) or 110 (relating to exploitation of
- children) of title 18, United States Code, or any other Federal
- criminal statute.
-
- "(2) NO EFFECT ON INTELLECTUAL PROPERTY LAW.-Nothing in this section
- shall be construed to limit or expand any law pertaining to
- intellectual property.
-
- "(3) STATE LAW.-Nothing in this section shall be construed to
- prevent any State from enforcing any State law that is consistent with
- this section. No cause of action may be brought and no liability may be
- imposed under any State or local law that is in consistent with this
- section.
-
- "(4) NO EFFECT ON COMMUNICATIONS PRIVACY LAW.-Nothing in this
- section shall be construed to limit the application of the Electronic
- Communications Privacy Act of 1986 or any of the amendments made by
- such Act, or any similar State law.
-
- "(f) DEFINITIONS.-As used in this section:
-
- "(1) INTERNET.-The term 'Internet' means the international computer
- network of both Federal and non-Federal interoperable packet switched
- data networks.
-
- "(2) INTERACTIVE COMPUTER SERVICE.-The term 'interactive computer
- service' means an information service, system, or access software
- provider that provides or enables computer access by multiple users to
- a computer server, including specifically a service or system that
- provides access to the Internet and such systems operated or services
- offered by libraries or educational institutions.
-
- "(3) INFORMATION CONTENT PROVIDER.-The term 'information content
- provider' means any per son or entity that is responsible, in whole or
- in part, for the creation or development of information provided
- through the Internet or any other interactive computer service.
-
- "(4) ACCESS SOFTWARE PROVIDER.-The term 'access software provider'
- means a provider of software (including client or server software), or
- enabling tools that do any one or more of the following
-
- "(A) filter, screen, allow, or disallow content;
- "(B) pick, choose, analyze, or digest content; or
- "(C) transmit, receive, display, forward cache, search, subset,
- organize, reorganize, or translate content.".
-
- [Footer info deleted for brevity]
-
- ------------------------------
-
- Date: Sun, 16 Dec 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.02
- ************************************
-
-