home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Apr 14, 1996 Volume 8 : Issue 30
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.30 (Sun, Apr 14, 1996)
-
- File 1--ACLU v. Reno trial update (4/12/96)
- File 2--The Computer Law Observer #17
- File 3--Mike Godwin: "The Backlash Against Free Speech on the Net"
- File 4--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Sat, 13 Apr 1996 08:24:22 -0700 (PDT)
- From: Declan McCullagh <declan@EFF.ORG>
- Subject: File 1--ACLU v. Reno trial update (4/12/96)
-
- ACLU v. RENO: TRIAL UPDATE
-
- * 1st Government Witness Acknowledges Difficulty in Finding Sexually
- Explicit Material Online
-
- * 2nd Government Witness Returns Monday to Conclude Testimony
-
- * Plaintiffs have option to rebut government case Monday
-
- FOR IMMEDIATE RELEASE
- Friday, April 12, 1996
-
- PHILADELPHIA -- Testifying for the government today, Special Agent Howard A.
- Schmidt acknowledged, in answer to skeptical questioning by a three-judge
- panel, that it is "highly unlikely" for anyone to come across sexually
- explicit sites on the Internet by accident.
-
- As the first witness for the government, Agent Schmidt began the morning with
- a live Internet tour and demonstration of a search for so-called indecency.
- The demonstration stopped short of actually displaying any of the images,
- but traced for the court the route by which Schmidt arrived at various web
- sites.
-
- Schmidt acknowledged -- under cross-examination -- that majority of the sites
- he found would have been off limits had he been running a software program
- such as SurfWatch, that blocks access to Internet sites considered
- inappropriate for children.
-
- Marjorie Heins, who conducted cross-examination for the ACLU, noted that
- Agent Schmidt's expertise -- and the government's case -- lies in focusing on
- a very narrow category of sexual material, much of which is already covered
- by existing obscenity law.
-
- "In today's testimony, the government attempted to divert the court's
- attention from the serious concerns of our plaintiffs by focusing on material
- that is highly inflammatory and largely irrelevant to this case," Heins said.
-
- The consolidated cases of ACLU v. Reno and ALA v. DOJ challenge provisions of
- the Communications Decency Act that criminalize making available to minors
- "indecent" or "patently offensive" speech.
-
- Under questioning by the judges, Agent Schmidt was asked how he would enforce
- the censorship law when confronted with a safe-sex information web-site that
- displayed an image illustrating how to put a condom on an erect penis.
-
- Agent Schmidt said that since the context was "educational, not purely for
- pleasure purposes," he would not censor the site but advise the publishers to
- post warnings.
-
- His answer was different when asked how he would rate an online copy of the
- controversial Vanity Fair magazine cover featuring the actress Demi Moore,
- nearly naked and eight months pregnant.
-
- In that case, Schmidt said, the Communications Decency Act would apply
- because the image was "for fun." He also said, in answer to a query from
- Judge Stuart Dalzell, that the community standard as to the offensive of the
- image might be different for Minnesota than it would for New York.
-
- "It is ironic that, according to the government, an explicit online image of
- an erect penis in an educational context would be acceptable, whereas Vanity
- Fair, a constitutionally protected publication containing a much less
- explicit image, would be censored," Heins said.
-
- Following Agent Schmidt's testimony, the final plaintiff witness, Dr. Albert
- Vezza, told the judges about PICS (Platform for Internet Content Selection),
- a new rating system designed to allow parents to control children's access to
- the Internet without censorship.
-
- Dr. Vezza is associate director of the MIT Laboratory for Computer Sciences
- and has chief responsibility for the PICS project. He was unable to testify
- earlier in the case due to scheduling conflicts.
-
- Dr. Vezza said he expected that wide industry acceptance of the PICS standard
- would enable any number of "third-party" organizations such as the PTA, the
- Christian Coalition or the Boy Scouts of America to rate content for Internet
- users.
-
- The second and final government witness, Dr. Dan Olsen, a professor of
- computer science at Brigham Young University, took the stand in the
- mid-afternoon.
-
- Dr. Olsen acknowledged that the PICS standard would allow parents to control
- their children's Internet viewing according to their own values or via a
- rating system devised by a trusted organization.
-
- He also acknowledged that a system he had conceived in which Internet sites
- must be labelled by the content originator, would not allow for such an
- independent rating scheme.
-
- While plaintiff lawyers completed cross-examination of Dr. Olsen today, he
- will return on Monday for redirect by government lawyers and to answer any
- questions the judges may have.
-
- It is now anticipated that Monday, April 15, will be the last day of trial in
- ACLU v Reno. Plaintiff lawyers will have the opportunity on Monday (instead
- of April 26) to call witnesses to rebut the governments's testimony.
- However, the ACLU and ALA coalitions did not indicate which witnesses, if
- any they would call.
-
- Because the April 26 rebuttal day is no longer necessary, the next date in
- court is set for June 3, when the three-judge panel will hear oral arguments
- from both plaintiffs and defendants.
-
- The judges are expected to issue a ruling some time in the weeks following.
- Under expedited provisions, any appeal on rulings regarding the new
- censorship law will be made directly to the U.S. Supreme Court.
-
- Lawyers for the ACLU appearing before the judges are Christopher Hansen,
- Marjorie Heins, Ann Beeson, and Stefan Presser, legal director of the ACLU of
- Pennsylvania.
-
- ------------------------------
-
- Date: Thu, 28 Mar 1996 13:25:03 +0100
- From: "William S. Galkin" <wgalkin@EARTHLINK.NET>
- Subject: File 2--The Computer Law Observer #17
-
- *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
- THE COMPUTER LAW OBSERVER
- *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
- March 28, 1996 (#17)
-
- =====================================
- GENERAL INFO: The Computer Law Observer is distributed (usually) every
- other week for free and is prepared by William S. Galkin, Esq. The
- Observer is specifically designed for both lawyers and non-lawyers. To
- subscribe, send e-mail to wgalkin@earthlink.net. All information
- contained in The Computer Law Observer is for the benefit of the
- recipients, and should not be relied on or considered as legal advice.
- Copyright 1996 by William S. Galkin.
- =====================================
-
- *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
- AT THE LIMITS OF LAWFUL SECRECY
- *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
-
- [This is the fourth of a series of articles discussing privacy rights in
- the digital age.]
-
- Philip Zimmermann is now a folk hero in privacy rights circles - and a
- hot commodity in commercial circles. Zimmermann is also extremely
- relieved. Last January, the U.S. Justice Department informed him that it
- was dropping the 3-year criminal investigation against him for illegally
- exporting a munition. The munition was not rarified uranium. It was
- encryption software posted on the Internet. The Zimmermann investigation
- was widely publicized and has played an important role in bringing the
- encryption debate out in the open and into the halls of Congress.
-
- The Zimmermann story is not over yet. Because, while Silicon Valley
- CEO's and venture capitalists are wooing him with eyes on his current
- "privacy" project - a software program for telephones which he claims
- will make wiretapping virtually impossible - law enforcement officials
- will likely continue to closely watch his activities.
-
- CRYPTOGRAPHY -
-
- Cryptography is the ancient art of concealing the content of a message
- by scrambling the text. Historically, it was used for communicating
- military secrets. Now, the secrets might be commercial, personal,
- political or criminal, and communicated over the Internet.
-
- A would-be reader of an encrypted message must have a "key" to
- descramble the message. Encryption software, the modern method of
- encryption, uses a mathematical algorithm to scramble a message.
-
- There are two primary forms of encryption software: single-key systems
- and two-key systems. In a single-key system, the data is encrypted and
- decrypted using the same key. The weaknesses of the single-key system
- are that the key is not completely secret because both the sender and
- the receiver must have the key. Additionally, at some point prior to the
- first encrypted communication, the key itself must be communicated in an
- manner that does not use the same encryption method.
-
- A two-key system, also known as a public key system does not have these
- weaknesses. This system uses two keys, one private and the other public.
- The public key is given out freely and will encrypt a message. However,
- only the private key, which does not need to be communicated to anyone,
- can decrypt the message. It is practically impossible to determine the
- private key from an examination of the public key.
-
- ENCRYPTION REGULATIONS -
-
- The Bureau of Export Administration (BXA), under the U.S. Commerce
- Department, controls licensing for most exports from the U.S. However,
- the BXA is excluded from controlling items listed on the U.S. Munitions
- List. The Munitions List designations are made by the State Department
- with the concurrence of the Defense Department, and are contained in the
- International Traffic in Arms Regulations (ITAR).
-
- The Munitions List includes things like grenades, torpedoes, and
- ballistic missiles. The list also includes "cryptographic (including key
- management) systems, equipment, assemblies, modules, integrated
- circuits, components or software with the capability of maintaining
- secrecy or confidentiality of information or information systems."
-
- The State Department relies on the National Security Agency's (NSA)
- expertise when deciding what encryption programs to include on the
- Munitions List. The NSA, a member of the U.S. Intelligence Community
- under the Defense Department, is responsible for decoding the signals of
- foreign governments and collecting information for counterintelligence
- purposes. The NSA review process is classified and not available to the
- public. However, generally, if the NSA cannot relatively easily break an
- encryption algorithm, it will not approve it for export.
-
- A violation of the export restrictions on encryption can result in a
- maximum criminal penalty of $1 million and 10 years in prison or a
- maximum civil penalty of $500,000 and a three-year export ban.
-
- There are no restrictions on encryption systems contained in software
- marketed solely in the U.S. Most other countries do not restrict export
- of encryption software. However, in France, the private use of
- cryptology is not permitted, unless the government is provided with the
- private key.
-
- EFFECTIVENESS OF THE LAW -
-
- It is questionable how well the current law achieves its objectives. The
- encryption export restrictions are intended to protect the national
- security of the U.S. However, since much sophisticated encryption
- software is now being developed out of the U.S., it is unclear how
- important these restrictions remain. Additionally, national security is
- threatened from both internal as well as external sources. Therefore,
- since there are currently no restrictions on the use, development or
- distribution of encryption software in the U.S., these restrictions play
- little role in guarding against internal threats.
-
- The law also produces some strange results. Encryption software can be
- imported into the U.S., but the same software cannot later be taken out
- of the U.S. A U.S. citizen can develop sophisticated encryption software
- abroad and have it marketed internationally, but cannot do the same if
- the development occurs in the U.S. The State Department has ruled that
- a book on applied cryptology, which contains source code for strong
- encryption algorithms may be exported, but the verbatim text of the
- source code when on a computer disk cannot.
-
- CHANGES IN THE LAW -
-
- The government has been moving in two directions at once. While there
- has been some lifting of the restrictions on the export of encryption
- software, there have also been developments indicating that the
- government desires to gain a "back door" to allow law enforcement
- officials the ultimate ability to access any encrypted message.
-
- One example of the lifting of restrictions was in 1992, when mass
- marketed software with "light" encryption was made subject to an
- expedited 15-day or 7-day review by the State Department. This increased
- the likelihood that export licenses would be granted for such software.
- Additionally, effective this year, under certain circumstances, a U.S.
- citizen may temporarily take encryption software abroad for personal
- use.
-
- However, at the same time the export restrictions are being lightened,
- several government initiatives have attempted to grant the government
- skeleton keys to access encrypted messages, such as the 1993 Clipper
- Chip initiative and the Escrowed Encryption Standard mandated for the
- federal government. Both of these developments seek to provide the
- government with the ability to access private keys. Furthermore, there
- has even been mention of seeking to criminalize the use of encryption in
- the U.S., unless private keys are escrowed with the government, as is
- currently the law in France.
-
- Most recently, on March 5, 1996, Sen Patrick Leahy (D-VT) introduced the
- Encrypted Communications Privacy Act of 1996 (S. 1587). If it becomes
- law, the Act would (1) remove export restrictions for "generally
- available" encryption software, (2) shift authority for export decisions
- from the State Department and NSA to the Commerce Department, (3)
- criminalize the use of encryption to obstruct the investigation of a
- felony, and (4) regulate disclosure of encryption keys by key escrow
- agents.
-
- The Act would greatly loosen the restrictions on exporting encryption
- software. However, it would still probably be up to the NSA to determine
- what software is "generally available." Furthermore, since the exclusion
- will be limited to encryption software that is generally available, U.S.
- companies will always be lagging behind foreign competitors, because
- U.S. companies will not be permitted to take the lead in the
- international marketing of cutting edge encryption products.
-
- Lastly, some have expressed concern over two features of the Act. One is
- that the Act sets forth the first instance in the U.S. of specifically
- criminalizing the use of encryption. And second, if private key escrow
- is intendeed to remain voluntary why is so much of the Act devoted to
- escrow issues?
-
- The encryption debate has a long way to go and reflects a fundamental
- struggle between ensuring personal freedom while providing the
- government with the means of maintaining a safe society.
-
- -- END --
-
- ABOUT THE AUTHOR: Mr. Galkin is an attorney in private practice in
- Owings Mills, Maryland. He is also the adjunct professor of Computer Law
- at the University of Maryland School of Law. He is a graduate of New
- York University School of Law and has concentrated his private practice
- on intellectual property, computer and technology law issues since 1986.
- He represents small startup, midsized and large companies, across the
- U.S. and internationally, dealing with a wide range of legal issues
- associated with computers and technology, such as developing, marketing
- and protecting software, purchasing and selling complex computer
- systems, and launching and operating a variety of online business
- ventures.
-
- ===> Mr. Galkin is available for consultation with individuals and
-
- companies, and can be reached as follows: E-MAIL:
- wgalkin@earthlink.net/TELEPHONE: 410-356-8853/FAX: 410-356-8804/MAIL:
- 10451 Mill Run Circle, Suite 400, Owings Mills, Maryland 21117.
-
- ------------------------------
-
- Date: Wed, 6 Mar 1996 10:22:50 -0800 (PST)
- From: Declan McCullagh <declan@EFF.ORG>
- Subject: File 3--Mike Godwin: "The Backlash Against Free Speech on the Net"
-
- [Feel free to redistribute. -Declan]
-
-
- Speech by Mike Godwin, Online Counsel for the Electronic Frontier Foundation
- "Fear of Freedom: The Backlash Against Free Speech on the 'Net"
-
- This is the luncheon speech given by Mike Godwin at a technology conference,
- "New Media Technology: True Innovations or Electric Fork?," jointly
- sponsored by the Freedom Forum Pacific Coast Center and The Freedom Forum
- Media Studies Center. The conference was held in the Pacific Coast Center,
- Jack London Square, Oakland, California, Feb. 13, 1996. The luncheon was
- held next door at Scott's Seafood Restaurant. Mr. Godwin was introduced by
- Adam Clayton Powell III, director of technology studies and programs at the
- Media Studies Center. Mr. Powell concluded his introduction by mentioning
- Mr. Godwin's unusual e-mail address.
-
- MIKE GODWIN
-
- I'm often asked why I chose the username "mnemonic." I use it on almost
- every system on which I have an account. I chose it long ago because of a
- William Gibson short story, "Johnny Mnemonic," a science-fiction short
- story from 1981.I've used it for many years and I didn't anticipate when I
- picked it more than a decade ago that suddenly cyberspace would be making
- national headlines.
-
- William Gibson is the science fiction novelist who invented the term
- "cyberspace" more than a decade ago. He probably never anticipated quite the
- set of controversies that we're facing today. Most of them don't involve
- high tech computer hackers or huge multinational corporations with monster
- databases in cyberspace. Instead they involve something that's very
- fundamental and personal to Americans. They involve freedom of speech and
- privacy.
-
- To give you an idea about the backlash against freedom of speech on the
- Net, let me tell you a little about what happened when I set up my first
- home page on the Worldwide Web.
-
- When you get a home page, you're never quite sure what to put on it. I
- had some pictures of myself that I didn't like much. But I also have lots
- of baby pictures and I liked those a lot. And I thought everybody in the
- world ought to be able to see them. So I scanned them in and I put them up
- on my home page, and then I got e-mail from someone who said, "Aren't you
- afraid that by putting a picture of your child on the Internet you're
- going to invite child molesters to target your child as a potential
- victim?"
-
- This is how far we have come.
-
- The Internet which the press and public has seen as a threat, as a
- cornucopia of pornography, was once upon a time seen as a boon to the
- nation and to the world. But now there is a dismaying backlash against
- freedom of speech on the Net.
-
- I'd like to take you back to the dim dawn of time: 1993. Remember when
- there was so much hype about the information superhighway, that it made
- the cover of Time magazine? We were told that 500 channels of all sorts of
- content would somehow make its way into our home. Every library, school,
- hospital, and home would have a connection to the Internet. And everyone,
- literally everyone, could potentially be a publisher.
-
- Three measly years later the Internet is widely perceived as a threat.
- Why? Because everyone is a publisher! Because there are way more than 500
- channels of this stuff! And because it will be connected to every library,
- school, hospital and home! Many of the people publishing on the Internet
- will not have been to journalism school! Many of them will say things that
- offend other people! Many of them will publish their own opinions without
- any notion of what is fair play, or nice, or middle-of-the-road
- politically correct.
-
- This is frightening people. It's even more frightening to see how these
- fears of the Net have played out in the media and in the United States
- Congress.
-
- The original hype about the Internet was justified. There is something
- very different from other kinds of communications media about the medium
- of the Net.
-
- Previously, we used the telephone, which is a one-to-one medium. Telephone
- conversations are intimate. They're two-way, there's lots of information
- going back and forth. But you don't reach a mass audience on a telephone.
- Telephones work best as one-to-one media. And there's no greater proof of
- this than to try to participate in a conference call. Conference calls are
- attempts to use telephones as many-to-many media and they're always
- exasperating.
-
- For even longer, we've had one-to-many media, from one central source to
- large audiences. These include the newspaper, a couple of centuries-old
- technology. Movies. Broadcasting. These media have a certain power to
- reach large audiences, but what they gain in power they lose in intimacy
- and feedback. You may see all sorts of things on TV, but it's very hard to
- get your opinions back to the broadcaster or back to the editor of the
- newspaper. Even the narrow channels that we're allowed, whether op ed
- pages or letters to the editor or the nanosecond of time to answer a
- televised editorial, are wholly inadequate. You never really get anything
- like equal time, no matter what the FCC has said.
-
- The Net and computer technology has changed all this. It is the first
- many-to-many medium. It is the first medium that combines all the powers
- to reach a large audience that you see in broadcasting and newspapers with
- all the intimacy and multi-directional flow of information that you see in
- telephone calls. It is both intimate and powerful.
-
- Another way this medium is different is pure cost. It takes many millions
- of dollars to start up a daily newspaper. If you were to succeed -- this
- is not the best year to do this, by the way -- you will find that it's an
- expensive process. You have to be highly capitalized to reach audiences of
- hundreds of thousands, or if you're lucky, millions.
-
- But now everybody can afford a PC and a modem. And the minimal cost of
- connecting to the Net can reach audiences far larger than the ones reached
- by any city's Times-Herald Picayune, or even the New York Times or Time
- magazine. We're talking global.
-
- This is a shift in power. It grants to individual citizens the full
- promise of the First Amendment's Freedom of the Press. The national
- information infrastructure or the information superhighway or the Net or
- whatever you're in the mood to call it makes it possible to reach your
- audience no matter who your audience is and no matter where they are.
- There's no editor standing between you and your readers -- changing what
- you want to say, changing your content, shortening it or lengthening it or
- altering it to make it "acceptable."
-
- I often think of poets. It's been a long time since a volume of poetry has
- regularly stood up on the best seller list. People who are poets, and we
- have a lot of good poets around these days, don't often succeed
- commercially, or sell. even a few thousand copies of a volume of poetry.
- But if that poet puts his material on the Internet, he can reach literally
- every single person who would ever understand his masterpiece. And that is
- a fundamental shift.
-
- So why the backlash? Why the fear? I think part of it is that people get
- on line and discover that it makes some things easier and more accessible.
- Itis possible for some people to find pornography on the Internet. It is
- also possible to get so called "dangerous information." And it's probable
- for people to say bad things about each other.
-
- So people think there ought to be some new kind of control, either legal
- or social. I remember the immense national headlines surrounding the
- prosecution of a Milpitas, California couple who operated a micro-computer
- bulletin board system. They were prosecuted in Memphis, Tennessee. It was
- quite a good story, because prosecutors in Memphis had reached all the way
- across the country to get a gentleman who was selling adult material out
- of his house on a computer. But I noticed that the stories were expanded
- into a perception of a general problem. The problem of pornography or
- obscenity on the Net.
-
- This change in perception is widespread. Someone recently asked me how
- many hours a day I spend on line. I said, I spend six or eight hours, some
- days even more, I work on line. And he actually said, "It must be bad with
- all that pornography.
- " I never see pornography on the Internet," I said.
- "You're kidding," he said.
- "No, I guess there's some out there, but I never go looking for it, I have
- work to do."
- He thought that when you turned on your computer and connected it to the
- Internet, pornographic images simply flooded over the computer monitor
- into your face. What's worse, he thought that maybe they flooded over the
- computer monitor into your child's face. To judge from the question I had
- about putting my child's picture on the Web, some people think that child
- molesters can reach through the computer screen and grab your child out of
- your living room.
-
- How did we get this amount of fear, and how does it reflect itself in
- other ways?. I can think of one other example. It involves Howard Kurtz,
- the esteemed media critic of the Washington Post. Mr. Kurtz, who is widely
- regarded, and rightfully so, as an astute critic of the traditional media,
- wrote two stories in the course of about a year about the Net.
-
- The first story involved a Los Angeles Times article by a fellow named
- Adam Bauman that somehow conflated hackers, pornography, spies and
- cryptography in one story. It was kind of amazing to see all that stuff in
- one story. It was as if Mr. Bauman had had a check list of hot button
- issues on the Internet. The story was widely criticized for not being
- logical, not being coherent, not justifying his assertions, and people
- said bad things about Mr. Bauman on the Net. Howard Kurtz, the media
- critic, looked at the story and did he think how terrible that the L.A.
- Times to run this terrible story? No. He was horrified that people on the
- Internet would say bad things about reporters. Sometimes they use impolite
- language. Now how many of us have never wished we could use impolite
- language to a reporter? The Internet enables us to do that.
-
- The second Howard Kurtz column involved Time magazine's cover story from
- last summer which featured the height of what turned out to be a patently
- fraudulent study of so called cyberporn from a con artist at Carnegie
- Mellon University. The person has since been exposed, and part of the
- reason he was exposed was that there were a lot of reporters, a lot of
- amateur reporters on the Net who looked into his research, who read his
- study and criticized it and who looked into the past of the person who
- wrote the study, and they discovered he'd done similar cons before. There
- was a lot of criticism of Time magazine and of the author of that story
- for buying into the hype about so called cyberporn. When Mr. Kurtz wrote
- about this controversy, did he criticize Time magazine or the reporter who
- wrote that story? No. In fact, he criticized the Internet for being so
- nasty to that poor fellow at Time for hyping the fake crisis of cyberporn.
-
- I was thinking about Mr. Kurtz' columns and I found that they dovetail
- very nicely with a very common complaint that one hears about speech on
- the Internet. People say you know, we think the First Amendment is a great
- thing, but we never thought there'd be all these people using it so
- irresponsibly. Don't you think there ought to be a law. There are other
- matters that have used to press our hot buttons about the Internet, to
- make us fear on-line communication.
-
- They involve things like cryptography, the ability of every citizen to
- make his or her communications or data truly private, truly secret, truly
- protected from prying eyes.
-
- And they involve things like copyright. For those of you who have been
- following the discussion of copyright on the Net, you know that Bruce
- Lehman of the Patent and Trade Office has authored a report that would
- turn practically everything anyone does with any intellectual property on
- line into a copyright infringement. If you browse it without a license,
- that's an infringement. If you download it, that's an infringement. If you
- look at it on your screen, that's an infringement. Three strikes and
- you're out and you go to federal copyright prison!
-
- There's also the sense that there's dangerous information on the Net.
- People are very troubled by the fact that you can log in and hunt around
- and find out how to build a bomb, even a bomb of the sort that was used to
- blow up a building in Oklahoma City. The Washington Post, interestingly
- enough, faced the issue of whether to publish the instructions on how to
- make a fertilizer bomb of the sort that was used in Oklahoma City. When
- they published in the story how the bomb was built, many people wrote into
- the Washington Post and said, "You shouldn't have published that stuff,
- people will get ideas! They will use that information to build bombs!" The
- Washington Post editors, I think quite rightly, concluded that the people
- reading the Washington Post were not the people who were building bombs.
- That the people who were building bombs already knew how to do it.
-
- But there's the sense that if this information is available on the
- Internet, it's vastly more destructive to society than if it's available
- in a library. After all, *children don't go to libraries*. I remember that
- after the Oklahoma City bombing, I started getting a lot of calls in my
- office at the Electronic Frontier Foundation from reporters who said,
- "Tell me more about bomb-making information on the Internet -- we're doing
- a follow-up on the Oklahoma City bombing."
-
- Now, if you actually followed that story one of the things you know for
- sure is that there seems to be *no connection* between computer technology
- and the suspects in the Oklahoma City bombing. There doesn't seem to be
- any evidence that any information from the Net was ever used in relation
- to the Oklahoma City bombing. So why were people calling asking me about
- dangerous information on the Net?
-
- I have a theory. I think it goes something like this. They knew that the
- chief suspect was a fellow named Tim McVeigh. And they knew that Tim
- McVeigh might be associated with militia groups. And they knew that some
- militia groups used bulletin board systems to communicate. And they knew
- that bulletin board systems were "kind of like the Internet." And they
- knew that there was information on the Internet, therefore there was a
- connection between bomb making information on the Internet and the
- Oklahoma City bombing. It was very interesting to see how these little
- assumptions about the connection between the Net and bomb-making
- information propagated throughout the media. (So far as we know, by the
- way, there is no connection between Tim McVeigh
- and computer technology except that at one point he is said to have
- believed that he had a computer chip implanted in a very delicate place
- during the Gulf War.)
-
- Let me tell you a little bit about how the Net is misrepresented both to
- the media and to the general public, and also to Congress. We hear about
- the mythical child that finds pornography on line within 30 seconds of
- logging on. You know, *I* can't even find pornography on line in 30
- seconds of logging on. In fact, I can't find *anything* within 30 seconds
- of logging on.
-
- The second myth is that the Net is very much like broadcasting, therefore
- deserves the kind of regulation that the Federal Communications Commission
- administers to the broadcasting entities around the country. My own
- feeling is this: "Why shouldn't anything that's legal in a Barnes and
- Noble Bookstore or in the New York Public Library be legal on line?"
-
- I ask this question again and again, and I had a debate one Sunday on a
- Seattle radio station with a fellow from Morality in Media, Bob Peters. I
- raised this question and Bob Peters responded: "But, Mike, computers come
- into our home!" And I said "Well, you know, Bob, *books* come into my
- home! And yet you wouldn't be able to limit the content of books the way
- you want to limit the content of computer networks. We would think it was
- totally a violation of the First Amendment to impose the kinds of
- restrictions that you would impose on the Net on the publishers of books."
-
- Why should the rules be any different? And yet you hear again and again
- there ought to be new laws required to regulate the Net. That the Net is
- currently unregulated in some way. That cases like the Milpitas couple who
- were prosecuted in Memphis illustrate the need for new laws. Never mind
- the fact that they were successfully prosecuted under old laws.
-
- How can one equate the Net and broadcasting? I mean up to now, the nicest
- thing that you could say about the broadcasting medium and the legal
- regime that governs it was this: Those limits don't apply to any other
- medium. The FCC doesn't control newspapers or books, and isn't that great?
-
- The justification constitutionally for special regulation of content of
- broadcasting has essentially been twofold. The notion that broadcasting
- frequencies are scarce so therefore require the government to step in, and
- not only allocate them, but govern their use for the public good. And
- secondly, the notion that broadcasting is pervasive in some way. That it
- creeps into the home in a special way that makes it uniquely different
- from other media.
-
- Regardless of whether you accept these justifications for content control
- over the air waves, the fact is the Internet is nothing like broadcasting
- in either way. Internet communication is not scarce. Every time you add a
- computer to the Internet you've expanded the size of the Internet. It is
- not pervasive because you don't have people pushing content into your
- home, you have people logging on and pulling content from all over the
- world. It is not the case that you log on and have stuff pushed at you
- that you don't want to see. It is a fundamentally choice-driven medium, a
- choice-driven form for communication very much like a bookstore, a
- newsstand or a library, and therefore deserving of the same strong First
- Amendment protections.
-
- For those of you who weren't paying attention this year, the United States
- Congress passed an omnibus telecommunications reform act. I think most of
- the provisions there won a lot of popular support. The telecommunications
- regulatory regime was very old and needed to be updated. There are debates
- about how the balances ultimately ought to be struck, but there was a wide
- consensus on the need to deregulate the traditional telecommunications
- industries. Compare the fact that in one small section of the bill, the
- "Communications Decency Amendment," we find the federal government, whose
- competence to regulate all the other media has been indeed questioned,
- imposing new regulations on content on the Net and with little, if any,
- constitutional justification. You see, this isn't about pornography. This
- isn't about obscene materials. This is about something called "indecency,"
- a far broader category that you might think involves pornography, but in
- fact, it encompasses quite a bit more.
-
- For example, a George Carlin comedy routine has been restricted under the
- name of indecency. The Allen Ginsburg classic poem, "Howl," has been
- restricted from radio because it was deemed by one court to be indecent.
- Various other kinds of material from the high to the low, from Allen
- Ginsburg to Jackie Collins' novels, cannot be spoken or uttered on the
- radio. Now why is that? The FCC has special power and the government and
- the congress has special power to control content in the broadcasting
- arena. But where's the justification for the expansion of that federal
- authority to this new medium that holds the power of granting freedom of
- the press to every citizen. Where does the Constitution say the government
- can do that? Where does the First Amendment say the government can do
- that?
-
- Everybody more or less knows something about what qualifies as obscene.
- You know it has something to do with "community standards," right? And
- with appealing to the "prurient interest." A work has to be a patently
- offensive depiction of materials banned by state statute and appeal to the
- prurient interest to be obscene and it also has to meet one other
- requirement. It also has to lack serious literary, artistic, social,
- political or scientific value. That's how something is classified as
- "obscene."
-
- The reason that religious fundamentalist lobbying groups want to expand
- the notion of indecency to the Net is that they are very troubled by the
- test for obscenity. They regard the serious literary, artistic, social and
- political clause of the test for what is obscene to be a sort of an escape
- clause for pornographers. What they would really like to be able to do is
- to prosecute anyone who distributes content in any way other than by
- printing ink on dead trees under a far broader censorship law that has no
- provision for artistic value or social importance.
-
- That is something I find very, very frightening. This is not about
- protecting children. We've heard it again and again, we're trying to
- protect our children from bad content on the Net. But this is not about
- protecting children. This is not about pornography. (I wish it were about
- pornography. That's easy to talk about.) But it's about a far broader
- class of speech. So the Communications Decency Amendment is not really
- about protecting children, it's about silencing adults. We were sold the
- Internet, we were sold the information superhighway as this great global
- library of resources. Now you have people in Congress and people on the
- religious right who want to reduce the public spaces of the Net to the
- children's room of the library.
-
- I think we can do better than that, and I think American citizens can be
- trusted with more than that. It should be remembered whenever we look at
- how to apply the First Amendment to any medium--be it the Net or anything
- else--that the purpose of the First Amendment is to protect speech that is
- offensive, troubling, or disturbing because nobody ever tries to ban the
- bland, pleasant, untroubling speech. This new law, the Communications
- Decency Amendment, creates immense problems for anyone who's a provider,
- for anyone who's a user. In fact, the interests of the industry and the
- interests of the consumers are essentially the same.
-
- And the media have a special responsibility not only to make these issues
- clear but also not to play to our fears anymore. Because the fact is,
- Americans are nervous about sex, we're nervous about our children, and
- we're nervous about computers. So if you combine all of those into a
- newspaper story, you could pretty much drive anyone into a frenzy of
- anxiety. And the impulse to regulate is always there.
-
- But you'd better think twice before calling for new regulation because
- these are the rules that we are all going to play under in the 21st
- century. It is important to understand that this is the first time in
- history the power of a mass medium lies in the hands of potentially
- everybody. For the first time the promise of freedom of the press will be
- kept for everyone. A. J. Liebling famously commented that freedom of the
- press belongs to those who own one. Well, we all own one now.
-
- The Net is an immense opportunity for an experiment in freedom of speech
- and democracy. The largest scale experiment this world has ever seen. It's
- up to you and it's up to me and it's up to all of us to explore that
- opportunity, and it's up to all of us not to lose it. I'm a parent myself,
- as you know. And I worry about my child and the Internet all the time,
- even though she's too young to have logged on yet. Here's what I worry
- about. I worry that 10 or 15 or 20 years from now she will come to me and
- say, "Daddy, where were you when they took freedom of the press away from
- the Internet?" And I want to be able to say I was there -- and I helped
- stop that from happening.
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 4--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.30
- ************************************
-
-
-