home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Mar 27, 1996 Volume 8 : Issue 25
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.25 (Wed, Mar 27, 1996)
-
- File 1-CONGRESS: Online Parental Control Act of 1996
- File 2-Review of ROAD WARRIORS
- File 3-Internet Book
- File 4-CDA Frequently Asked Questions
- File 5-Cu Digest Header Info (unchanged since 25 Mar, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 14 Mar 1996 11:47:33 -0800
- From: telstar@WIRED.COM(--Todd Lappin-->)
- Subject: File 1--CONGRESS: Online Parental Control Act of 1996
-
- Today in the House of Representatives, legislation was introduced to
- encourage parental empowerment on the Internet and eliminate the vague and
- overbroad "indecency" standard that became law under the Communications
- Decency Act.
-
- The new legislation, called the "Online Parental Control Act of 1996," was
- introduced by Rep. Anna Eshoo (D-CA), whose district includes much of
- California's Silicon Valley. Representatives Pelosi (D-CA), Dellums
- (D-CA), Farr (D-CA), Gejdenson (D-CT), and Woolsey (D-CA) are co-sponsors
- of the bill.
-
- (The full text of Rep. Eschoo's press release on the new legislation
- follows below.)
-
- The Online Parental Control Act of 1996 seeks to replace the "indecency"
- standard (which is mainly used to regulate speech in BROADCAST media) with
- the more narrowly-drawn "harmful to minors" standard which has already been
- upheld as constitutional in 48 states.
-
- My understanding is that "harmful to minors" is a PRINT-based standard, but
- I'll research this and send out a more detailed evaluation as soon as
- possible. In the meantime, I can say this: "harmful to minors" is viewed as
- a middle-of-the-road standard, and as such, it remains *highly*
- controversial. There are many who would argue that *any* attempt to
- restrict access to content other than obscenity (which does not enjoy First
- Amendment protection) is unwarranted.
-
- Stay tuned.
-
- All of this, by the way, comes on the heels of a bill (S 1567) Patrick
- Leahy introduced in the United States Senate last month in an effort to
- repeal the Communications Decency Act altogether.
-
- Spread the word!
-
- --Todd Lappin-->
- Section Editor
- WIRED Magazine
-
- ============================================================
-
- FOR IMMEDIATE RELEASE
- Lewis Roth
- CONTACT: (202) 225-8104
- March 14, 1996
-
- Eshoo Introduces Online Parental Control Act
- Legislation Strengthens Parental Control Of Online Materials,
- Eliminates "Indecency" Standard
-
- Washington, D.C.--Rep. Anna Eshoo (D-CA) today introduced the Online
- Parental Control Act of 1996 (OPCA) to strengthen the control parents
- have over their children's access to online materials, eliminate the
- "indecency" standard from the Communications Act of 1934, and provide
- additional defenses against liability for publishing online materials.
- Representatives Pelosi (D-CA), Dellums (D-CA), Farr (D-CA), Gejdenson
- (D-CT), and Woolsey (D-CA) are original cosponsors of OPCA.
-
- When the Telecommunications Reform Bill was signed into law earlier
- this year, it made sweeping changes to America's telecommunications
- policy. Among those changes was the establishment of a ban on using
- telecommunications devices to provide "indecent" materials to minors, as
- well as defenses against being held liable for a violation of that ban. For
- example, people could avoid liability by using software that blocks the
- access of minors to such materials or restricts access through the use
- of credit card numbers or adult access codes. Some U.S.
- Representatives, including Rep. Eshoo, opposed the "indecency"
- standard because the range of material it would ban was so broad that it
- violates the right to freedom of speech.
-
- The "indecency" standard is currently being challenged in court by a
- large coalition of free speech advocacy groups and high technology
- companies.
-
- "The Online Parental Control Act will encourage an open dialogue in
- Congress about the best way to both give parents control over what
- their children see online and protect the First Amendment rights of
- Internet users," said Rep. Eshoo. "My proposal builds on last year's
- efforts to reach a compromise on this issue by offering more incentives
- for the online community to provide families with better parental control
- technologies.
-
- "I'm supportive of efforts to address this issue in the courts, but I believe
- Congress also needs to offer a legislative solution. Given the political
- realities of the current Congress, I think OPCA offers the most realistic
- way to settle this dispute in a timely and effective manner."
-
- The Online Parental Control Act of 1996:
-
- Replaces the "indecency" standard with a "harmful to minors"
- standard;
- Establishes a definition for "harmful to minors;"
- Maintains the Communications Act of 1934's legal defenses
- against liability for people who choose to give parents technology that: 1)
- blocks or restricts access to online materials deemed obscene or harmful
- to minors, and 2) restricts access to such materials through adult access
- codes or credit card numbers;
- Adds two new defenses: 1) the use of labeling or segregating
- systems to restrict access to online materials, such as systems
- developed using the standards designed by the Platform for Internet
- Content Selection project (PICS), and 2) the use of other systems that
- serve the same function of the other defenses if they are as reasonable,
- effective, and appropriate as blocking, adult access code, and labeling
- technologies; and
- Protects providers or users of interactive computer services,
- information content providers, and access software providers from civil
- or criminal liability under state law for making available to minors materials
- that are indecent or harmful to minors if they take actions to qualify for
- the defenses mentioned above.
-
- "I'd rather have Mom and Dad monitoring their children's online viewing
- habits than the government," concluded Rep. Eshoo. "Technology offers
- the best opportunity for parents to manage what their kids have access
- to, and the Online Parental Control Act encourages those technologies to
- be developed more fully."
-
- The "indecency" standard is a vague term that has been subject to legal
- challenge by a wide range of free speech advocates and high
- technology companies. The broad nature of the "indecency" standard
- means that it could lead to a prohibition on material such as classic art
- like Michelangelo's David, classic literature like "Catcher In The Rye," and
- frank discussions about birth control, sexuality, or disease transmission.
- "Harmful to minors," on the other hand, already works successfully in 48
- states, more directly addresses speech that actually harms children, and
- passes constitutional muster.
-
- PICS is a cross-industry working group assembled under the auspices of
- MIT's World Wide Web Consortium to develop an easy-to-use content
- labeling and selection platform that empowers people worldwide to
- selectively control online content they receive through personal
- computers. The Recreational Software Advisory Council recently
- announced that it will soon implement a detailed voluntary ratings system,
- using PICS standards, that will let computer users filter out varying
- degrees of sex, violence, nudity, and foul language. Companies and
- groups supporting PICS include Apple, America Online, AT&T, the Center
- for Democracy and Technology, CompuServe, IBM, France Telecom,
- Prodigy, Providence Systems/Parental Guidance, Surf Watch Software,
- and Time Warner Pathfinder.
-
- For more information about the Online Parental Control Act of 1996,
- please contact Lewis Roth at (202) 225-8104 or look on the Internet at
- http://www-eshoo.house.gov/opca.html.
-
- ###
-
- +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+-
- This transmission was brought to you by....
-
- THE CDA INFORMATION NETWORK
-
- The CDA Information Network is a moderated mailing list providing
- up-to-the-minute bulletins and background on efforts to overturn the
- Communications Decency Act. To subscribe, send email to
- <majordomo@wired.com> with "subscribe cda-bulletin" in the message body.
-
- ------------------------------
-
- Date: Wed, 27 Mar 1996 22:51:01 EDT
- From: Jim Thomas <jthomas@well.sf.ca.us>
- Subject: File 2--Review of ROAD WARRIORS
-
- ROAD WARRIORS: Dreams and Nightmares along the Information Highway.
- By Daniel Burstein & David Kline. New York: Dutton. 466 pp. $24.95
- (cloth). Reviewed by: Jim Thomas (cudigest@sun.soci.niu.edu).
-
- I was conceived in 1941, the result of my father's ability to zip
- and unzip his fly quickly and with adroitness. This may explain why
- I wasn't born, say, in 1936, when only six percent of summer suits
- had zippers. By 1940, I learn from ROAD WARRIORS, nearly 90 percent
- of Princeton students had zippers. Therefore, I am.
-
- That's what I like about ROAD WARRIORS--hundreds of tiny factoids
- strewn about the text to spice up the prose and around which more
- profound points are made. The zipper anecdote, for example, is used
- to illustrate the relationship between technology, capitalism, and
- entreprenerial endurance (p. 15). It, and dozens of others,
- illustrate points and prod our thinking about computer technology,
- history, culture, and politics.
-
- ROAD WARRIORS has been hyped as a business text. The cover jacket is
- over-represented with admirable comments by CEOs and other business
- types, the book's promos focus on the business motif, and in the
- Chicago area, it can be found in the computer/business section of
- the chain bookstores. Bad marketing move: Burstein and Kline have
- strung together a fact-filled, intellectually eclectic, and
- insightful tome that fulfills like a text book, but reads like a
- novel.
-
- The authors argue that, underlying the computer technological
- revolution, lies an array of economic, political, ideological, and
- cultural processes reflect greed, vision, creativity, conflict, and
- courageous intelligence (p. 22). The volume draws both its title
- and its primary organizing metaphor from Mel Gibson's Road Warrior
- films, in which a futuristic society becomes fragmented and chaotic.
- Lacking strong centers of control or authority, individuals and
- groups vie for power and scrap for resources in staking-out and
- protecting their fiefdoms. In the Information Age, life imitates
- art:
-
- In the war rooms of the world's major business empires, a who's
- who of corporate generals are plotting their strategies,
- forging Machiavellian alliances and conspiring to outflank each
- other in an epic struggle for supremacy in these emerging
- Information Age markets (p. 35).
-
- Telecommunications and computer industry competition, mergers,
- innovation, commercialization, and transition in and among
- established companies and new or would-be entrpreneurs lock modern
- techno-economic road warriors in a battle for control of the
- Internet, information technology, and political and economic
- advantage in a war of capital, not just technology. Drawing from
- the Sony Betamax v. VHS video recorders as an example, the authors
- note that it's not necessarily who has the best product, but who is
- most adept at marketing. This is hardly a startling revelation. What
- is new is how the authors illustrate the marketing processes and
- trace out the social and political implications for the information
- age.
-
- There is no doubt that the Internet is a hot multi-billion dollar
- property.
-
- But what is far less certain is whether it can be effectively
- molded to serve corporate America's key financial and
- business-to-business requirements (p. 126).
-
- The authors map out the chapters in thematic sequence. Beginning
- with a brief summary of the impact of technological innovations in
- general and digital technology in particular, they lead us through
- the mergers of telephone, visual, and computer technology. The
- second section, "A Kingdom of Riches," describes the potential of
- the Internet both as an information medium and commercial gold mine.
- In a typically memorable twist of phrase, the authors note that the
- Internet's original near-invulnerabity to nuclear or other concerted
- attack is partly what makes bringing it under economic or political
- control so difficult: "...trying to make all the Internet's
- disparate parts work together smoothly and efficiently would be akin
- to trying to herd five million cats" (p. 127). Who, they ask
- rhetorically, would bet $10 billion on smooth herding? Yet, this
- challenge poses both problems and rewards for those willing to try.
- Drawing from the example of the struggle over digital media between
- telecoms and cable companies, the authors argue that companies that
- adopt the most creative and aggressively far-sighted policies will
- succeed, and those with the slows will lose market share or
- ultimately disappear into mergers and bankruptcies (p. 173). The
- broader implication, only hinted at but still obvious, is that the
- next round of change on the information highway, which the authors
- liken to a dirt road rather than an expressway, will be influenced
- more by capital than technological innovation. Failure to recognize
- this clouds analysis of the trends and directions of the
- techno-revolution, which in turn jeapordizes planning for a smoother
- transition in a period of dramatic social change.
-
- Who cares? We should. The authors cite Whtehead's observation that
- "The major advances in civilization are processes that all but wreck
- the societies in which they occur" (p. 317). They draw from the
- Industrial Revolution to illustrate the ironies of progress that
- simultaneously disrupts and disenfranchizes over the short term.
- Real and potential problems are the result of more than simply
- material changes--they also result from ideological and political
- conflicts, as they argue in describing how some health policies, for
- which remedies exist, are not implemented:
-
- Our society has become the first to be paralyzed in the face of
- a public health threat not from lack of scientific knowledge or
- equipment, but by absurd extensions of the concept of
- individual rights (p. 321).
-
- One can disagree with their their conclusion, as I do, but it
- doesn't change its value: Burstein and Kline 1) correctly insist on
- grounding an understanding of pressing Net issues in a broader
- socio-historical context, and 2) provoke the reader's thinking with
- well-reasoned observations that, even when we disagree, engage us in
- an intellectual exercise of response.
-
- ROAD WARRIORS is particularly valuable for playing on the ironies
- and contradictions of social change. Rather than simply laud the
- good and condemn the bad, they take the next step and work through
- the dialectical processes at play. Best of all, they avoid academic
- jargon, political buzzwords, and ideological ax-grinding (almost).
- As one (of many) examples, they summarize the dreams on the
- information highway, and then note:
-
- On the other side of the ledger, though, the nightmare scenarios
- are as frightening as the dream scenarios are inspiring:
- dehumanization in the face of so much technology; overdependence
- on systems and networks vulnerable to hacker and terrorist
- attack--or "only" to the vagaries of software bugs, power
- outages, and squirrels chewing up fiber-optic lines; governments
- and corporations increasingly able to play Big Brother in
- monitoring home activities; economic anarchy bred by a new order
- that doesn't respect intellectual poperty rights and steals
- usable "bits" at will; a society rendered irrational and
- illiterate by its infatuation with the image and the soundbite;
- teledemocracy that turns into Rush Limbaugh-style mob rule;
- global, generational, and class wars between info-rich and
- info-poor (p. 324).
-
- Rather than summarize the tensions between the good, the bad, and
- the ugly, they provide a cogent analysis in which they conclude
- that:
-
- At the heard of the political-economy of the Digital
- Revolution lies a troubling, foreboding enigma: we are taking a
- leap toward a society where the historic correlation between
- wealth creation and the input of labor power is severed--or at
- least becomes less highly correlated than it used to be (p.
- 325).
-
- From such a simple, single, sentence comes the generation of a
- myriad of hypotheses and theoretical revisions that could keep Phd
- students busy for the next decade.
-
- The authors have no answers to the problems of transition into the
- Information Age, but they argue strongly for a coherent, flexible,
- and non-fettering set of government policies. They conclude with
- eight "early-state ideas and provocations" (pp 357-359) to stimulate
- dialogue. These include: 1) Government strategies and policies that
- include economic incentives to preserve and stimulate domestic
- Info-technology; 2) Goverment articulation and stimulation of
- "social virtue," including educational and public service programs;
- and 3) Staying out of the business of regulating the content of
- Internet traffic.
-
- For about a nickel a page, relatively inexpensive by publishing
- standards, readers receive not only a compendium of insights, but a
- valuable reference resource. The inclusion of substantial interviews
- with CEOs John Malone and Ray Smith, and Reed Hundt, Chair of the
- FCC, are a nice touch. The thorough index makes retrieving
- information relatively easy.
-
- Some potential readers might avoid ROAD WARRIORS in the belief that
- it's simply another volume about business on the Internet. That's
- unfortunate. "Business" is only the hook that grabs other topics and
- issues, and the volume is not only useful for those with an interest
- in Cyberspace, but also for those interested in political economy,
- social change, and social policy. The paper back version would make
- an valuable class room supplement, and it's unfortunate that the
- publisher's marketing people seem not to recognize the significance
- of the volume.
-
- ------------------------------
-
- Date: Fri, 22 Mar 1996 17:13:03 -0500 (EST)
- From: Charles Platt <cp@panix.com>
- Subject: File 3--Internet Book
-
- A New Book Investigating Sex on the Internet
- is Pre-Published, Free, via the World Wide Web
-
- -------------------------------------------------------------
-
- While the fate of online freedoms is being determined by
- federal judges in Philadelphia, a contributing writer to
- Wired magazine has decided to give away his investigative
- book on the subject.
-
- Charles Platt spent six months gathering data about netporn
- for a book to be published later this year by HarperCollins.
-
- According to Platt, "My publishers hoped to rush the book
- into print. When their plans changed as a result of factors
- outside my control, I decided the material was so topical and
- so important, it should be placed freely on web sites."
-
- Titled ANARCHY ONLINE, the book is divided into two parts.
- The first deals with net crimes such as hacking, viruses, and
- data piracy. Platt includes first-hand descriptions of
- hackers and pirates and debunks myths created by melodramatic
- press coverage.
-
- Part Two of the book explores free speech online and examines
- netporn more frankly and in greater depth than has been
- achieved elsewhere. Platt concludes that although a genuine
- problem does exist, a "war on porn" will be as unwinnable,
- expensive, and divisive as the "war on drugs."
-
- Part Two of the book contains about 65,000 words and is being
- placed online in its entirety. It includes transcripts from
- pornographic IRC chat sessions and sexually oriented Usenet
- news groups; a look at pedophilia on America Online; a new,
- damning investigation of Martin Rimm (whose porn study was
- immortalized in Time magazine); and a reassessment of issues
- raised by Jake Baker (who faced years in jail after he placed
- sadistic stories on Usenet). Platt also examines federal
- attempts to control encryption; the Guardian Angels;
- anonymous remailers; repressive laws at the state level;
- content-filtering software; and content rating schemes. There
- are exclusive interviews with Scott Charney at the Department
- of Justice, Ann Beeson of ACLU, Louis Rossetto and Kevin
- Kelly of Wired magazine, anti-child-porn crusader Barry
- Crimmins, David Chaum of DigiCash, and Phil Zimmermann,
- creator of PGP. Many other industry figures and commentators
- make cameo appearances.
-
- Platt concludes that net fears have been exaggerated and
- demands for censorship are unwarranted. "Most people who want
- to censor the net don't use it and are willfully ignorant of
- it. They tend to be religious extremists and opportunistic
- legislators looking for a hot-button issue. I question their
- right to inflict laws on a community that they don't live in
- and know nothing about."
-
- Platt feels that if widely available methods are used to
- control access by children, the net can be safer than a day-
- care center. "My daughter started net surfing when she was
- 15. Even if children have totally unrestricted access, the
- net is still more benign than most real-world environments. I
- believe this is thoroughly substantiated by my book."
-
- ANARCHY ONLINE is freely available at
- http://anarchy-online.dementia.org/book/
-
- Charles Platt is the author of 40 books, ranging from
- computer guides to science fiction. His novel PROTEKTOR was
- published this year by Avon Books. He is a contributing
- writer to Wired magazine and has an article on net censorship
- in the current issue, dated April.
-
- Platt can be contacted at (212) 929 3983 or via email at
- cp@panix.com.
-
- ------------------------------
-
- Date: Wed, 13 Mar 96 22:44:37 PST
- From: jblumen@interramp.com
- Subject: File 4--CDA Frequently Asked Questions
-
- The Internet Censorship FAQ
-
-
- The Internet Censorship FAQ was created by Jonathan Wallace and Mark
- Mangan, co-authors of Sex, Laws and Cyberspace, a new book on
- Internet censorship from Henry Holt. (See
- http://www.spectacle.org/freespch/ for more information.) Some of
- the material in the following is taken from the book.
-
- Please redistribute this FAQ freely in relevant forums.
-
-
-
- Q: What threats of censorship exist for the Internet?
-
- A: The principal threat of Internet censorship today is the
- Communications Decency Act, a law passed by Congress and signed by
- the President in January, 1996 which would apply quite radical
- regulations to speech on the Internet.
-
- Q: What is the Communications Decency Act (CDA)?
-
- A: The CDA criminalizes "indecent" speech on the Internet. One
- section of the CDA defines indecency as speech depicting or
- describing sexual or excretory acts or organs in a patently
- offensive fashion under conetmporary community standards. Each of
- these clauses--indecent, depicting or describing, patently
- offensive, and contemporary community standards--hides a landmine
- threatening the future of freedom of speech in this country.
-
- i."Indecent"
-
- "Indecency" is a vague standard long used to prosecute explicit,
- outspoken speech in the Western world (for example, Radcliffe Hall's
- pathbreaking but actually very restrained lesbian novel, The Well of
- Loneliness, was indecent because of the phrase, "And that night,
- they were not divided.") Indecency laws are completely
- unconstitutional as applied to print media, while broadcast spectrum
- scarcity has been used as a rationale to continue applying such
- laws to broadcast media. Indecency laws in general, the CDA in
- particular, contain absolutely no exception for speech with
- scientific, literary, artistic or political value.
-
- ii. "Depicting or describing"
-
- The word "describes" confirms that pure text can be illegal under
- the CDA. Courts in recent decades have tacitly acknowledged that
- sexually explicit text cannot be held illegal under obscenity laws.
- Books such as Henry Miller's Tropic of Cancer and James Joyce's
- Ulysses, which were held years ago to be significant literary works
- and not obscene, could fall prey to the broader, vaguer CDA language
- if posted online.
-
- iii. "Sexual or excretory acts or functions"
-
- While the reaction of some observers to this, the core of the CDA's
- prohibition, may be "So what?", pause for a second to imagine that
- you enter your neighborhood bookstore and wave a magic wand.
- Immediately, all books infringing this definition vanish from the
- shelves. The shelves are now half or two thirds empty! Not only
- trashy bestsellers, but 19th century classics such as Zola's La
- Terre and Flaubert's Madame Bovary, modern literature such as Joyce,
- Miller, Nabokov and Burroughs, nonfiction works on health, aids,
- rape, and sexual fulfillment, and even
- all vanish from the shelves! All serious human discourse sooner or
- later touches on earthy topics, as history, metaphor or information.
- Under the CDA, speech which is quite legal in a book or magazine
- should be banned from the Internet.
-
- iv. "Patently offensive"
-
- This wording, which the CDA picked up from the Supreme Court's
- so-called Miller standard of obscenity, allows a jury to decide that
- material is illegal based on how the jury feels about it. Patent
- offensiveness is an extremely subjective standard; coupled with the
- contemporary community standard provision, below, it is a recipe for
- disaster. In a case called Eckstein v. Melson, the owner of a
- bookstore was threatened with prosecution if she continued carrying
- obscene, patently offensive materials. But when she asked the
- prosecutor, the police and numerous other public officials to tell
- her what she was carrying which was "patently offensive" (FBI agents
- raiding her shop had seized novels by John Updike, among other
- materials) no-one would tell her. A "patent offensiveness" standard
- means that you engage in explicit speech at your own peril.
-
- v. "Contemporary community standards"
-
- The 1973 Miller case on obscenity held that local communities could
- apply their own standards to determining whether material is
- obscene. This approach barely makes sense for works such as movies
- or magazines, which distributors can refrain from showing or selling
- in conservative jurisdictions. However, a 1994 case, U.S. v. Thomas
- (known as the Amateur Action case) upheld the conviction of two
- California sysops under Tennessee standards. Their crime had been to
- place obscene material on their California BBS which offended the
- ncommunity of Memphis, Tennessee. This result, now codified by the
- CDA's use of the "community standards" wording, means that material
- placed on the Internet anywhere must satisfy the standards of every
- community that has Internet access anywhere in the U.S. In other
- words, the standards of the most conservative community now apply to
- the entire Internet.
-
-
- Q: Is the CDA unconstitutional?
-
- A: Yes. The basic U.S. rule on freedom of speech is the First
- Amendment to the U.S. Constitution, which says:
-
- Congress shall make no law respecting an establishment of religion,
- or prohibiting the free exercise thereof, or abridging the freedom
- of speech, or of the press, or the right of the people peaceably to
- assemble, and to petition the Government for a redress of
- grievances.
-
- Supreme Court cases, notably including Butler v. Michigan (1957),
- have held that indecency standards cannot be applied to printed
- matter (that case overturned a law which banned books unfit for
- children). The extremist rationale of the CDA is that censorship
- which would be impermissible for the printed word is appropriate for
- the electronic word, and that works which are protected on paper are
- subject to censorship on a computer screen.
-
- There is no justification for treating the printed and electronic
- word differently. The consequences of doing so will become most
- apparent in the next century, as printed books and magazines
- continue to decline in importance compared to the sheer volume of
- words available online. If the full protection of the First
- Amendment applies only to books and magazines printed on paper, then
- the First Amendment will become a historical curiousity.
-
- Q: What rationales are advanced by the supporters of the CDA?
-
- A: The CDA's supporters advance two significant reasons for the law:
- it is necessary to protect children; it is constitutional because
- the Internet is no different than the telephone or broadcast media
- and may be regulated similarly. We will deal with each of these
- individually.
-
- Q: Is the CDA necessary to protect children?
-
- First, and as a dispositive matter, the constitutionality of the CDA
- cannot turn on whether it protects children, despite the emotional
- appeal of this issue. The Supreme Court in Butler v. Michigan did
- not spend a lot of time considering the state of youthful minds and
- the measures available to protect them; it held, instead, that
- setting all public discourse in Michigan at the level acceptable
- for children would be "burning down the house to roast the pig." A
- law banning books by Miller, Joyce, Burroughs and Nabokov might also
- protect children who might get hold of them, but would be completely
- unconstitutional under the First Amendment.
-
- Proponents of the CDA have completely ignored the fact that no child
- can connect to the Internet without the help of an adult. Signing
- up for an Internet account typically involves presenting a credit
- card to an ISP. Adults who wish to allow their children to surf the
- Net unsupervised can sign them up through a child-safe service like
- Prodigy. Childhood specialists universally criticize parents who
- allow their children to vegetate in front of the TV unsupervised;
- the Net raises the same issues of parental responsibility.
- Ironically, the same Congress that mandated the V-chip--which would
- allow parents to stop undesirable broadcasts at the TV--passed the
- CDA which addresses the same problem by eliminating undesirable
- speech from the entire Internet.
-
- A mature, measured approach to the problem of explicit online speech
- would involve parental supervision and local screening, not
- wide-ranging censorship. See the Voters' Telecommunications Watch
- Parental Control FAQ.
-
- Q: Is regulating the Net similar to regulating the telephone, radio
- or or TV?
-
- A: Not at all. The telephone and the broadcast media are all
- government-supervised monopolies, and Congress and the courts have
- recognized the government's right to supervise content as a result.
- However, the right of government intervention to ban indecent
- language recognized for these other communications media, though
- cited as a precedent for the CDA, is actually far less than the
- profound censorship the CDA envisions.
-
- The government and the phone company itself can play no role in
- regulating the contents of private conversations. In fact, the
- phone company, as a common carrier, is legally required to carry any
- kind of private communications without making any distinctions. In
- the 1980's, disturbed by the growth of adult 900-line services,
- Congress tried banning them; the Supreme Court held that indecent
- speech could not be banned from phone lines. Instead, Congress
- passed a law, which the Court upheld, mandating that 900-line
- services require credit cards or, if billed by the local phone
- company, be "reverse blocked" (you can't get access unless you
- request it from the local phone company in writing.) These
- regulations have allowed 900 line services to exist, while
- significantly blocking access to minors.
-
- By contrast, government involvement in radio and television is based
- on the "scarcity" doctrine, which holds that government censorship
- of content is justified by the government's role in assigning
- broadcast frequencies on a scarce spectrum. The Supreme Court, in
- the famous Pacifica (seven dirty words) case, held, as with the
- telephone, that indecent language cannot be completely banned from
- radio and television. Current FCC regulations allow indecent speech
- on broadcast media after ten o'clock at night.
-
- The Internet is not a "scarce" resource and anyone can attach a
- computer to it without asking the government's permission. Nor is it
- a government-licensed common carrier like the phone company.
- Moreover, the regulations which have been held constitutional for
- telephone, radio and TV merely seek to shift ("channel") explicit
- speech to a time or place where children cannot access it, but not
- to ban such speech entirely.
-
- Q: Doesn't the CDA merely attempt to channel indecent speech on the
- Internet?
-
- A: The CDA is extremely ambiguous on this point--with the result
- that the only safe thing to do is to avoid controversial speech
- entirely, as many users are already doing.
-
- Unlike laws pertaining to telephone, TV and radio, which clearly
- spell out what is safe (take a credit card, broadcast after ten
- p.m.), the CDA as written gives absolutely no guidance.
-
- None of the methods of channeling decreed for other media works
- well, or at all, on the Net. The only rational solution for
- channeling speech on the Net is the parental control solution the
- Congress rejected even as it was mandating the V-chip: promote the
- use of child-safe ISP providers and local software to screen
- undesirable speech.
-
- Q: What about the argument that the Internet is "pervasive"?
-
- A: Ithiel de Sola Pool, who in 1983 published a really prescient
- book called Technologies of Freedom, predicted that the doctrine of
- "pervasiveness" would someday be used to justify quite "radical"
- censorship. That day has arrived.
-
- "Pervasiveness" is an ill-thought out doctrine that has been around
- since the 1880's, when a court allowed a local phone company to deny
- service to a subscriber on the grounds that he used foul language.
- The court's reasoning was that the wires might get crossed, and
- another family might pick up its telephone to hear this man cursing!
-
- The "pervasiveness" of radio was frequently cited by Herbert Hoover
- and others to justify the FCC's role in the 1930's in censoring the
- contents of radio broadcasts. The concept simply describes the fact
- that a communications technology reaches into the home; radio, said
- Hoover, must be "clean and safe for home consumption". However,
- courts, which have frequently mentioned the pervasiveness argument
- in media cases, have never used it as a basis for upholding a scheme
- of censorship unless "scarcity" (see above) was also present.
-
- If pervasiveness, standing alone, justifies censorship, then it is
- hard to see why the Supreme Court overturned the state law in Butler
- v. Michigan, which outlawed books unfit for children. One would hope
- that books are also pervasive, with at least one or two of them
- invading most houses.
-
- Proponents of the CDA would argue that books must be brought into
- the house, while the Internet somehow comes in unbidden. The courts
- have given some credence to this argument, holding that broadcast
- waves pass the walls of your house whether you want them to or not.
- However, the Supreme Court has most recently suggested that the
- "pervasiveness" argument would not be valid for cable televsion,
- which it characterized as an invited guest in the home. This
- suggests that the Court would also find (as it should) that the
- Internet is also invited into the home and is not "pervasive."
-
- Q: What is being done to combat the CDA?
-
- A: The American Civil Liberties Union, Center for Democracy and
- Technology, and other organizations have filed lawsuits to hold the
- CDA unconstitutional. One of these lawsuits is scheduled for a
- hearing in federal court in Philadelphia at the end of March 1996,
- during which a three-judge panel will determine if the CDA is
- unconstitutional under the First Amendment. One of the authors of
- this FAQ, Jonathan Wallace, is a plaintiff in that lawsuit. (See
- http://www.spectacle.org/cda/cdamn.html for more information.)
-
- Q: Has a federal court restrained enforcement of the CDA?
-
- A: Only in part. The Philadelphia court said that one section of the
- CDA, which refers to indecency without defining it, is vague.
- However, upon a first look, the court did not think that the
- companion section, referring to "sexual or excretory acts or
- organs", was too vague. The court will take a more detailed look at
- the constitutionality of the CDA after the preliminary injunction
- hearing, which begins on March 21.
-
- In the meantime, the government has agreed not to bring any
- indictments under the CDA--but behavior that is occuring now may
- still be prosecuted after the court reaches its decision, assuming
- it leaves the CDA alive.
-
- Q: What is the relationship between the CDA and obscenity laws?
-
- A: Prior to the CDA, federal obscenity law already applied to
- material distributed on the Internet, as the Amateur Action case
- illustrates. Under that law, as interpreted by the 1973 Miller case,
- obscene materials are those which are (i)prurient and (ii)patently
- offensive under contemporary community standards and which (iii)
- lack significant scientific, literary, artistic or political
- ("SLAP") value. Cases in recent decades have indicated that only
- visual images--photographs and films--will be held obscene under
- this standard, as pure text is always found to have at least minimal
- literary value.
-
- The CDA makes illegal a large zone of speech which obscenity laws
- don't touch--material depicting or describing sexual or excretory
- acts or organs, which is not prurient, but is patently offensive to
- somebody, even though it has SLAP value.
-
- Q: Is it true that the CDA outlaws putting abortion information on
- the Internet?
-
- A: Its true. One section of the CDA confirms that the federal postal
- obscenity law, first passed in 1873, applies to cyberspace. That law
- included a section which hasn't been enforced in decades, but which
- is still on the books, making it illegal to pass abortion
- information across state lines. Congressional backers of the CDA
- claim they didn't intend to outlaw the communication of abortion
- information on the Internet, and President Clinton has said that he
- will not allow the Justice Department to enforce it. Nevertheless,
- the law is on the books, and could be enforced in a future
- presidential administration, if it is not thrown out by the federal
- court.
-
- Q: Where can I go for more information?
-
- A: Check out the following organizations:
-
- The American Civil Liberties Union http://www.aclu.org
-
- Voter's Telecommunications Watch http://www.vtw.org
-
- Electronic Frontier Foundation http://www.eff.org
-
- Center for Democracy and Technology http://www.cdt.org
-
-
- The Internet Censorship FAQ was created and distributed by Jonathan
- Wallace,jblumen@spectacle.org, and Mark Mangan, markm@bway.net.
-
- -----------------------------
- Jonathan Wallace
- The Ethical Spectacle
- http://www.spectacle.org
- Co-author, Sex, Laws and Cyberspace
- (Henry Holt, 1996)
- http://www.spectacle.org/freespch/
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 25 Mar, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.25
- ************************************
-
-
-