home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 53.3 KB | 1,041 lines |
- Computer underground Digest Wed Jun 12, 1996 Volume 8 : Issue 44
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.44 (Wed, Jun 12, 1996)
-
- File 1--Fed Court Rules Communications Decency Act Unconstitutional
- File 2--Excerpts from the CDA Decision (re 96-963)
- File 3--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 12 Jun 1996 08:55:37 -0700
- From: editor@eff.org
- Subject: File 1--Fed Court Rules Communications Decency Act Unconstitutional
-
- EFFector Online Volume 09 No. 08 June 12 1996 editors@eff.org
- A Publication of the Electronic Frontier Foundation ISSN 1062-9424
-
- ------------------------------------------------
-
- Groups challenging the law prepare for government appeal to the Supreme Court
-
-
- Electronic Frontier Foundation
- PRESS RELEASE
-
- Contacts: Stanton McCandlish, Online Activist, +1 415 436 9333
- Mike Godwin, Staff Counsel, +1 510 548 3290
- Shari Steele, Staff Counsel, +1 301 375 8856
-
- Philadelphia -- "Just as the strength of the Internet is chaos, so the
- strength of our liberty depends upon the chaos and cacophony of the
- unfettered speech the First Amendment protects."
-
- With these ringing words, a Philadelphia federal court has struck down a law
- today that would have criminalized constitutionally protected speech on the
- Internet and other online forums.
-
- In what civil libertarians are hailing as a victory for everyone who uses
- computer communications, a three-judge panel in Philadelphia's federal
- court ruled in a unanimous decision that the controversial
- "Communications Decency Act" (CDA) violates the U.S. constitutional
- guarantees of freedom of speech and of the press.
-
- "First of all, are pleased to see the court vindicate our vision of the Net
- as a medium protected by the First Amendment," said Lori Fena, executive
- director of the Electronic Frontier Foundation (EFF), watchdog group
- established to protect civil liberties, and promote responsibility, in
- computer communications. "Secondly, we are delighted that the court has gone
- beyond striking down the law, and has stated positively what constitutional
- principles must govern any attempt to regulate the most democratic mass
- medium the world has ever seen."
-
- Said EFF Chairman Esther Dyson: "This is a day for individual citizens, for
- families, and for public and private organizations online to celebrate."
-
- "The judges recognized that CDA was a wholly inappropriate exercise of
- governmental power under the Constitution," said Mike Godwin, EFF staff
- counsel. "The law would have abridged one of the freedoms that Americans
- treasure most, and a freedom that is central to any democratic society," he
- said.
-
- Godwin applauded the members of the coalition that challenged the law in
- federal court. "We and the other plaintiffs persuaded them that the
- government cannot constitutionally impose this sort of overreaching, and
- duplicative regulation of content in the online world," Godwin said.
-
- Dyson stated that the decision stands for one of EFF's principal positions
- regarding free speech online: "We believe in free speech at the source -- and
- in the empowerment of any audience for that speech to control what they see.
-
- "This decision takes the responsibility for controlling and accessing speech
- on the Net out of the hands of government and puts it back in the hands of
- parents and other individuals where it belongs," she said. "Individuals
- already have the technical means to make their own choices about what they
- and their children read and see," Dyson said.
-
- Godwin noted that existing anti-obscenity laws, together with low-cost
- technological solutions, offer a more efficient, less intrusive answer to
- questions about protecting children in the online world.
-
- "The government kept saying that this was a crisis that required harsher
- censorship in the online world than in any other communications medium,"
- Godwin said. "In fact, we showed that it's possible to promote both freedom
- of speech and family values -- that the two goals don't oppose each other."
-
- While the plaintiffs are pleased with the victory, Fena said, "it's no time
- to be complacent." A collection of poorly drafted state laws has followed in
- the wake of the passage of the CDA, and the issues these statutes raise must
- be addressed as well, she said.
-
- "What's as compelling as the language of this decision," Godwin said, "is the
- breadth of the opposition to this legislation," He noted that two large
- groups of plaintiffs, including EFF, the American Civil Liberties Union, the
- Electronic Privacy Information Center, People for the American Way, the
- American Library Association, Microsoft, and Apple Computer, had challenged
- the recently passed law in Philadelphia's federal court. Even Administration
- officials have privately and publicly voiced their concerns. The plaintiffs
- must now prepare for the government's planned appeal to the United States
- Supreme Court, Godwin said, citing a provision of the Telecommunications
- Reform Act of 1996, which prescribes such a direct appeal when a provision of
- the telecom act is found unconstitutional in a lower court..
-
- Godwin also commented that "this may be the most rapidly distributed federal
- court opinion in American history." Sites all over the over the Net would be
- carrying the full text of the opinion almost as soon as the judges hand it
- down, he said, noting that the court is providing copies of the opinion on
- computer diskettes as well as through more traditional means.
-
- The constitutional challenge to the Communications Decency Act has been
- grounded in four basic arguments -- that the law is unconstitutionally
- overbroad (criminalizing protected speech), that it is unconstitutionally
- vague (making it difficult for individuals and organizations to comply),
- that it fails what the judiciary calls the "least restrictive means" test for
- speech regulation, and that there is no basic constitutional authority under
- the First Amendment to engage in this type of content regulation in any
- nonbroadcast medium.
-
- "We are confident the Supreme Court will uphold the Philadelphia court's
- decision," Godwin said.
-
-
- To reach EFF board chairman Esther Dyson or executive director Lori Fena,
- please contact EFF's main office at +1 415 436 9333.
-
- ------------------------------
-
- Date: Wed, 12 Jun 1996 16:23:28 -0500
- From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
- Subject: File 2--Excerpts from the CDA Decision (re 96-963)
-
- ((MODERATORS' NOTE: The following are a few excerpts from the CDA
- decision. The complete text is about a quarter of a meg and over
- 4,400 lines. It was provided by the Center for Democracy and
- Technology. For complete information on the Congressional Decency
- Act (CDA) (including the full decision text) contact the CDT homepage at:
- http://www.cdt.org
-
- The full text can also be found on CuD's homepage at:
- http://www.soci.niu.edu/~cudigest/cda/cdadec1))
-
- =========================================
-
- IN THE UNITED STATES DISTRICT COURT
- FOR THE EASTERN DISTRICT OF PENNSYLVANIA
-
-
- AMERICAN CIVIL LIBERTIES UNION, : CIVIL ACTION
- et al., :
- :
- v. :
- :
- JANET RENO, Attorney General of :
- the United States : No. 96-963
-
- _____________________________________________________________
-
- AMERICAN LIBRARY ASSOCIATION, : CIVIL ACTION
- INC., et al., :
- :
- v. :
- :
- UNITED STATES DEP'T OF JUSTICE, :
- et al. : No. 96-1458
-
-
-
- Before: Sloviter, Chief Judge, United States Court of Appeals
- for the Third Circuit; Buckwalter and Dalzell, Judges,
- United States District Court for the Eastern District
- of Pennsylvania
-
-
- June 11, 1996
-
-
- ADJUDICATION ON MOTIONS FOR PRELIMINARY INJUNCTION
-
-
- <snip>
-
- The parties were afforded expedited discovery in
- connection with the motions for preliminary injunction, and they
- cooperated with Judge Dalzell, who had been assigned the case
- management aspects of the litigation. While the discovery was
- proceeding, and with the agreement of the parties, the court
- began receiving evidence at the consolidated hearings which were
- conducted on March 21 and 22, and April 1, 12 and 15, 1996. In
- order to expedite the proceedings, the parties worked closely
- with Judge Dalzell and arranged to stipulate to many of the
- underlying facts and to place much of their cases in chief before
- the court by sworn declarations, so that the hearings were
- largely devoted to cross-examination of certain of the witnesses
- whose declarations had been filed. The parties submitted
- proposed findings of fact and post-hearing memoranda on April 29,
- and the court heard extensive oral argument on May 10, 1996.[4]
-
- ..................
-
- II.
- FINDINGS OF FACT
- All parties agree that in order to apprehend the legal
- questions at issue in these cases, it is necessary to have a
- clear understanding of the exponentially growing, worldwide
- medium that is the Internet, which presents unique issues
- relating to the application of First Amendment jurisprudence and
- due process requirements to this new and evolving method of
- communication. For this reason all parties insisted on having
- extensive evidentiary hearings before the three-judge court.
- The court's Findings of fact are made pursuant to Fed. R. Civ. P.
- 52(a). The history and basic technology of this medium are not
- in dispute, and the first forty-eight paragraphs of the following
- Findings of fact are derived from the like-numbered paragraphs of
- a stipulation[8] the parties filed with the court.[9]
- The Nature of Cyberspace
- The Creation of the Internet and the Development of Cyberspace
- 1. The Internet is not a physical or tangible entity,
- but rather a giant network which interconnects innumerable
- smaller groups of linked computer networks. It is thus a network
- of networks. This is best understood if one considers what a
- linked group of computers -- referred to here as a "network" --
- is, and what it does. Small networks are now ubiquitous (and are
- often called "local area networks"). For example, in many United
- States Courthouses, computers are linked to each other for the
- purpose of exchanging files and messages (and to share equipment
- such as printers). These are networks.
- 2. Some networks are "closed" networks, not linked to
- other computers or networks. Many networks, however, are
- connected to other networks, which are in turn connected to other
- networks in a manner which permits each computer in any network
- to communicate with computers on any other network in the system.
- This global Web of linked networks and computers is referred to
- as the Internet.
- 3. The nature of the Internet is such that it is very
- difficult, if not impossible, to determine its size at a given
- moment. It is indisputable, however, that the Internet has
- experienced extraordinary growth in recent years. In 1981, fewer
- than 300 computers were linked to the Internet, and by 1989, the
- number stood at fewer than 90,000 computers. By 1993, over
- 1,000,000 computers were linked. Today, over 9,400,000 host
- computers worldwide, of which approximately 60 percent located
- within the United States, are estimated to be linked to the
- Internet. This count does not include the personal computers
- people use to access the Internet using modems. In all,
- reasonable estimates are that as many as 40 million people around
- the world can and do access the enormously flexible communication
- Internet medium. That figure is expected to grow to 200 million
- Internet users by the year 1999.
- 4. Some of the computers and computer networks that
- make up the Internet are owned by governmental and public
- institutions, some are owned by non-profit organizations, and
- some are privately owned. The resulting whole is a
- decentralized, global medium of communications -- or "cyberspace"
- -- that links people, institutions, corporations, and governments
- around the world. The Internet is an international system. This
- communications medium allows any of the literally tens of
- millions of people with access to the Internet to exchange
- information. These communications can occur almost
- instantaneously, and can be directed either to specific
- individuals, to a broader group of people interested in a
- particular subject, or to the world as a whole.
- 5. The Internet had its origins in 1969 as an
- experimental project of the Advanced Research Project Agency
- ("ARPA"), and was called ARPANET. This network linked computers
- and computer networks owned by the military, defense contractors,
- and university laboratories conducting defense-related research.
- The network later allowed researchers across the country to
- access directly and to use extremely powerful supercomputers
- located at a few key universities and laboratories. As it
- evolved far beyond its research origins in the United States to
- encompass universities, corporations, and people around the
- world, the ARPANET came to be called the "DARPA Internet," and
- finally just the "Internet."
- 6. From its inception, the network was designed to be
- a decentralized, self-maintaining series of redundant links
- between computers and computer networks, capable of rapidly
- transmitting communications without direct human involvement or
- control, and with the automatic ability to re-route
- communications if one or more individual links were damaged or
- otherwise unavailable. Among other goals, this redundant system
- of linked computers was designed to allow vital research and
- communications to continue even if portions of the network were
- damaged, say, in a war.
- 7. To achieve this resilient nationwide (and
- ultimately global) communications medium, the ARPANET encouraged
- the creation of multiple links to and from each computer (or
- computer network) on the network. Thus, a computer located in
- Washington, D.C., might be linked (usually using dedicated
- telephone lines) to other computers in neighboring states or on
- the Eastern seaboard. Each of those computers could in turn be
- linked to other computers, which themselves would be linked to
- other computers.
- 8. A communication sent over this redundant series of
- linked computers could travel any of a number of routes to its
- destination. Thus, a message sent from a computer in Washington,
- D.C., to a computer in Palo Alto, California, might first be sent
- to a computer in Philadelphia, and then be forwarded to a
- computer in Pittsburgh, and then to Chicago, Denver, and Salt
- Lake City, before finally reaching Palo Alto. If the message
- could not travel along that path (because of military attack,
- simple technical malfunction, or other reason), the message would
- automatically (without human intervention or even knowledge) be
- re-routed, perhaps, from Washington, D.C. to Richmond, and then
- to Atlanta, New Orleans, Dallas, Albuquerque, Los Angeles, and
- finally to Palo Alto. This type of transmission, and re-routing,
- would likely occur in a matter of seconds.
- 9. Messages between computers on the Internet do not
- necessarily travel entirely along the same path. The Internet
- uses "packet switching" communication protocols that allow
- individual messages to be subdivided into smaller "packets" that
- are then sent independently to the destination, and are then
- automatically reassembled by the receiving computer. While all
- packets of a given message often travel along the same path to
- the destination, if computers along the route become overloaded,
- then packets can be re-routed to less loaded computers.
- 10. At the same time that ARPANET was maturing (it
- subsequently ceased to exist), similar networks developed to link
- universities, research facilities, businesses, and individuals
- around the world. These other formal or loose networks included
- BITNET, CSNET, FIDONET, and USENET. Eventually, each of these
- networks (many of which overlapped) were themselves linked
- together, allowing users of any computers linked to any one of
- the networks to transmit communications to users of computers on
- other networks. It is this series of linked networks (themselves
- linking computers and computer networks) that is today commonly
- known as the Internet.
- 11. No single entity -- academic, corporate,
- governmental, or non-profit -- administers the Internet. It
- exists and functions as a result of the fact that hundreds of
- thousands of separate operators of computers and computer
- networks independently decided to use common data transfer
- protocols to exchange communications and information with other
- computers (which in turn exchange communications and information
- with still other computers). There is no centralized storage
- location, control point, or communications channel for the
- Internet, and it would not be technically feasible for a single
- entity to control all of the information conveyed on the
- Internet.
-
- <snip>
-
- Restricting Access to Unwanted On-Line Material[12]
-
- PICS
- 49. With the rapid growth of the Internet, the
- increasing popularity of the Web, and the existence of material
- online that some parents may consider inappropriate for their
- children, various entities have begun to build systems intended
- to enable parents to control the material which comes into their
- homes and may be accessible to their children. The World Wide
- Web Consortium launched the PICS ("Platform for Internet Content
- Selection") program in order to develop technical standards that
- would support parents' ability to filter and screen material that
- their children see on the Web.
- 50. The Consortium intends that PICS will provide the
- ability for third parties, as well as individual content
- providers, to rate content on the Internet in a variety of ways.
- When fully implemented, PICS-compatible World Wide Web browsers,
- Usenet News Group readers, and other Internet applications, will
- provide parents the ability to choose from a variety of rating
- services, or a combination of services.
- 51. PICS working group [PICS-WG] participants include
- many of the major online services providers, commercial internet
- access providers, hardware and software companies, major internet
- content providers, and consumer organizations. Among active
- participants in the PICS effort are:
-
- Adobe Systems, Inc.
- Apple Computer
- America Online
- AT&T
- Center for Democracy and Technology
- CompuServe
- Delphi Internet Services
- Digital Equipment Corporation
- IBM
- First floor
- First Virtual Holdings Incorporated
- France Telecom
- FTP Software
- Industrial Technology Research Institute of Taiwan
- Information Technology Association of America
- Institut National de Recherche en Informatique et
- en Automatique (INRIA)
- Interactive Services Association
- MCI
- Microsoft
- MIT/LCS/World Wide Web Consortium
- NCD
- NEC
- Netscape Communications Corporation
- NewView
- O'Reilly and Associates
- Open Market
- Prodigy Services Company
- Progressive Networks
- Providence Systems/Parental Guidance
- Recreational Software Advisory Council
- SafeSurf
- SoftQuad, Inc.
- Songline Studios
- Spyglass
- SurfWatch Software
- Telequip Corp.
- Time Warner Pathfinder
- Viacom Nickelodeon[13]
-
-
- 52. Membership in the PICS-WG includes a broad cross-
- section of companies from the computer, communications, and
- content industries, as well as trade associations and public
- interest groups. PICS technical specifications have been agreed
- to, allowing the Internet community to begin to deploy products
- and services based on the PICS-standards.
- 53. Until a majority of sites on the Internet have
- been rated by a PICS rating service, PICS will initially function
- as a "positive" ratings system in which only those sites that
- have been rated will be displayed using PICS compatible software.
- In other words, PICS will initially function as a site inclusion
- list rather than a site exclusion list. The default
- configuration for a PICS compatible Internet application will be
- to block access to all sites which have not been rated by a PICS
- rating service, while allowing access to sites which have a PICS
- rating for appropriate content.[14]
-
- Software
- 54. For over a year, various companies have marketed
- stand alone software that is intended to enable parents and other
- adults to limit the Internet access of children. Examples of
- such software include: Cyber Patrol, CYBERsitter, The Internet
- Filter, Net Nanny, Parental Guidance, SurfWatch, Netscape Proxy
- Server, and WebTrack. The market for this type of software is
- growing, and there is increasing competition among software
- providers to provide products.
-
- Cyber Patrol
- 55. As more people, particularly children, began to
- use the Internet, Microsystems Software, Inc. decided to develop
- and market Internet software intended to empower parents to
- exercise individual choice over what material their children
- could access. Microsystems' stated intent is to develop a
- product which would give parents comfort that their children can
- reap the benefits of the Internet while shielding them from
- objectionable or otherwise inappropriate materials based on the
- parents' own particular tastes and values. Microsystems'
- product, Cyber Patrol, was developed to address this need.
- 56. Cyber Patrol was first introduced in August 1995,
- and is currently available in Windows and Macintosh versions.
- Cyber Patrol works with both direct Internet Access providers
- (ISPs, e.g., Netcom, PSI, UUnet), and Commercial Online Service
- Providers (e.g., America Online, Compuserv, Prodigy, Microsoft).
- Cyber Patrol is also compatible with all major World Wide Web
- browsers on the market (e.g., Netscape, Navigator, Mosaic,
- Prodigy's Legacy and Skimmer browsers, America Online, Netcom's
- NetCruiser, etc.). Cyber Patrol was the first parental
- empowerment application to be compatible with the PICS standard.
- In February of 1996, Microsystems put the first PICS ratings
- server on the Internet.
- 57. The CyberNOT list contains approximately 7000
- sites in twelve categories. The software is designed to enable
- parents to selectively block access to any or all of the twelve
- CyberNOT categories simply by checking boxes in the Cyber Patrol
- Headquarters (the Cyber Patrol program manager). These
- categories are:
- Violence/Profanity: Extreme cruelty, physical or
- emotional acts against any animal or person which are
- primarily intended to hurt or inflict pain. Obscene
- words, phrases, and profanity defined as text that uses
- George Carlin's seven censored words more often than
- once every fifty messages or pages.
-
- Partial Nudity: Full or partial exposure of the human
- anatomy except when exposing genitalia.
-
- Nudity: Any exposure of the human genitalia.
-
- Sexual Acts (graphic or text): Pictures or text
- exposing anyone or anything involved in explicit sexual
- acts and lewd and lascivious behavior, including
- masturbation, copulation, pedophilia, intimacy and
- involving nude or partially nude people in
- heterosexual, bisexual, lesbian or homosexual
- encounters. Also includes phone sex ads, dating
- services, adult personals, CD-ROM and videos.
-
- Gross Depictions (graphic or text): Pictures or
- descriptive text of anyone or anything which are
- crudely vulgar, deficient in civility or behavior, or
- showing scatological impropriety. Includes such
- depictions as maiming, bloody figures, indecent
- depiction of bodily functions.
-
- Racism/Ethnic Impropriety: Prejudice or discrimination
- against any race or ethnic culture. Ethnic or racist
- jokes and slurs. Any text that elevates one race over
- another.
-
- Satanic/Cult: Worship of the devil; affinity for evil,
- wickedness. Sects or groups that potentially coerce
- individuals to grow, and keep, membership.
-
- Drugs/Drug Culture: Topics dealing with the use of
- illegal drugs for entertainment. This would exclude
- current illegal drugs used for medicinal purposes
- (e.g., drugs used to treat victims of AIDS). Includes
- substances used for other than their primary purpose to
- alter the individual's state of mind such as glue
- sniffing.
-
- Militant/Extremist: Extremely aggressive and combative
- behaviors, radicalism, advocacy of extreme political
- measures. Topics include extreme political groups that
- advocate violence as a means to achieve their goal.
-
- Gambling: Of or relating to lotteries, casinos,
- betting, numbers games, on-line sports or financial
- betting including non-monetary dares.
-
- Questionable/Illegal: Material or activities of a
- dubious nature which may be illegal in any or all
- jurisdictions, such as illegal business schemes, chain
- letters, software piracy, and copyright infringement.
-
- Alcohol, Beer & Wine: Material pertaining to the sale
- or consumption of alcoholic beverages. Also includes
- sites and information relating to tobacco products.
-
-
- 58. Microsystems employs people to search the Internet
- for sites containing material in these categories. Since new
- sites are constantly coming online, Microsystems updates the
- CyberNOT list on a weekly basis. Once installed on the home PC,
- the copy of Cyber Patrol receives automatic updates to the
- CyberNOT list over the Internet every seven days.
- 59. In February of 1996, Microsystems signed a
- licensing arrangement with CompuServe, one of the leading
- commercial online services with over 4.3 million subscribers.
- CompuServe provides Cyber Patrol free of charge to its
- subscribers. Microsystems the same month signed a licensing
- arrangement with Prodigy, another leading commercial online
- service with over 1.4 million subscribers. Prodigy will provide
- Cyber Patrol free of charge of its subscribers.
- 60. Cyber Patrol is also available directly from
- Microsystems for $49.95, which includes a six month subscription
- to the CyberNOT blocked sites list (updated automatically once
- every seven days). After six months, parents can receive six
- months of additional updates for $19.95, or twelve months for
- $29.95. Cyber Patrol Home Edition, a limited version of Cyber
- Patrol, is available free of charge on the Internet. To obtain
- either version, parents download a seven day demonstration
- version of the full Cyber Patrol product from the Microsystems
- Internet World Wide Web Server. At the end of the seven day
- trial period, users are offered the opportunity to purchase the
- complete version of Cyber Patrol or provide Microsystems some
- basic demographic information in exchange for unlimited use of
- the Home Edition. The demographic information is used for
- marketing and research purposes. Since January of 1996, over
- 10,000 demonstration copies of Cyber Patrol have been downloaded
- from Microsystems' Web site.
- 61. Cyber Patrol is also available from Retail outlets
- as NetBlocker Plus. NetBlocker Plus sells for $19.95, which
- includes five weeks of updates to the CyberNOT list.
- 62. Microsystems also sells Cyber Patrol into a
- growing market in schools. As more classrooms become connected
- to the Internet, many teachers want to ensure that their students
- can receive the benefit of the Internet without encountering
- material they deem educationally inappropriate.
- 63. Microsystems is working with the Recreational
- Software Advisory Council (RSAC), a non-profit corporation which
- developed rating systems for video games, to implement the RSAC
- rating system for the Internet.
- 64. The next release of Cyber Patrol, expected in
- second quarter of this year, will give parents the ability to use
- any PICS rating service, including the RSAC rating service, in
- addition to the Microsystems CyberNOT list.
- 65. In order to speed the implementation of PICS and
- encourage the development of PICS-compatible Internet
- applications, Microsystems maintains a server on the Internet
- which contains its CyberNOT list. The server provides software
- developers with access to a PICS rating service, and allows
- software developers to test their products' ability to interpret
- standard PICS labels. Microsystems is also offering its PICS
- client test program for Windows free of charge. The client
- program can be used by developers of PICS rating services to test
- their services and products.
-
- SurfWatch
- 66. Another software product, SurfWatch, is also
- designed to allow parents and other concerned users to filter
- unwanted material on the Internet. SurfWatch is available for
- both Apple Macintosh, Microsoft Windows, and Microsoft Windows 95
- Operating Systems, and works with direct Internet Access
- Providers (e.g., Netcom, PSI, UUnet, AT&T, and more than 1000
- other Internet Service Providers).
- 67. The suggested retail price of SurfWatch Software
- is $49.95, with a street price of between $20.00 and $25.00. The
- product is also available as part of CompuServe/Spry Inc.'s
- Internet in a Box for Kids, which includes access to Spry's Kids
- only Internet service and a copy of SurfWatch. Internet in a Box
- for Kids retails for approximately $30.00. The subscription
- service, which updates the SurfWatch blocked site list
- automatically with new sites each month, is available for $5.95
- per month or $60.00 per year. The subscription is included as
- part of the Internet in a Box for Kids program, and is also
- provided as a low-cost option from Internet Service Providers.
- 68. SurfWatch is available at over 12,000 retail
- locations, including National stores such as Comp USA, Egghead
- Software, Computer City, and several national mail order outlets.
- SurfWatch can also be ordered directly from its own site on the
- World Wide Web, and through the Internet Shopping Network.
- 69. Plaintiffs America Online (AOL), Microsoft
- Network, and Prodigy all offer parental control options free of
- charge to their members. AOL has established an online area
- designed specifically for children. The "Kids Only" parental
- control feature allows parents to establish an AOL account for
- their children that accesses only the Kids Only channel on
- America Online.[15]
- 70. AOL plans to incorporate PICS-compatible
- capability into its standard Web browser software, and to make
- available to subscribers other PICS-compatible Web browsers, such
- as the Netscape software.
- 71. Plaintiffs CompuServe and Prodigy give their
- subscribers the option of blocking all access to the Internet, or
- to particular media within their proprietary online content, such
- as bulletin boards and chat rooms.
- 72. Although parental control software currently can
- screen for certain suggestive words or for known sexually
- explicit sites, it cannot now screen for sexually explicit images
- unaccompanied by suggestive text unless those who configure the
- software are aware of the particular site.
- 73. Despite its limitations, currently available user-
- based software suggests that a reasonably effective method by
- which parents can prevent their children from accessing sexually
- explicit and other material which parents may believe is
- inappropriate for their children will soon be widely available.
-
- <snip>
-
- III.
- CONCLUSIONS OF LAW
- Plaintiffs have established a reasonable probability of
- eventual success in the litigation by demonstrating that ..
- 223(a)(1)(B) and 223(a)(2) of the CDA are unconstitutional on
- their face to the extent that they reach indecency. Sections
- 223(d)(1) and 223(d)(2) of the CDA are unconstitutional on their
- face. Accordingly, plaintiffs have shown irreparable injury, no
- party has any interest in the enforcement of an unconstitutional
- law, and therefore the public interest will be served by granting
- the preliminary injunction. Elrod v. Burns, 427 U.S. 347, 373-74
- (1976); Hohe v. Casey, 868 F.2d 69, 72 (3d Cir.), cert. denied,
- 493 U.S. 848 (1989); Acierno v. New Castle County, 40 F.3d 645,
- 653 (3d Cir. 1994). The motions for preliminary injunction will
- therefore be granted.
- The views of the members of the Court in support of
- these conclusions follow.
-
-
- SLOVITER, Chief Judge, Court of Appeals for the Third Circuit:
-
- A.
- Statutory Provisions
-
- As noted in Part I, Introduction, the plaintiffs'
- motion for a preliminary injunction is confined to portions of
- two provisions of the Communications Decency Act of 1996, .
- 223(a) and . 223(d), which they contend violate their First
- Amendment free speech and Fifth Amendment due process rights. To
- facilitate reference, I set forth those provisions in full.
- Section 223(a), the "indecency" provision, subjects to criminal
- penalties of imprisonment of no more than two years or a fine or
- both anyone who:
- 1) in interstate or foreign communications . . .
- (B) by means of a telecommunications device
- knowingly --
-
- (i) makes, creates, or solicits, and
-
- (ii) initiates the transmission of,
- any comment, request, suggestion, proposal, image,
- or other communication which is obscene or
- indecent, knowing that the recipient of the
- communication is under 18 years of age, regardless
- of whether the maker of such communication placed
- the call or initiated the communication; . . .
-
- (2) knowingly permits any telecommunications facility
- under his control to be used for any activity
- prohibited by paragraph (1) with the intent that it be
- used for such activity.
-
- (emphasis added).
- The term "telecommunications device" is specifically
- defined not to include "the use of an interactive computer
- service," as that is covered by section 223(d)(1).
- Section 223(d), the "patently offensive" provision,
- subjects to criminal penalties anyone who:
- (1) in interstate or foreign communications knowingly--
-
- (A) uses an interactive computer service to send to a
- specific person or persons under 18 years of age, or
-
- (B) uses any interactive computer service to display in
- a manner available to a person under 18 years of age,
- any comment, request, suggestion, proposal, image or
- other communication that, in context, depicts or
- describes, in terms patently offensive as measured by
- contemporary community standards, sexual or excretory
- activities or organs, regardless of whether the use of
- such service placed the call or initiated the
- communication; or
-
- (2) knowingly permits any telecommunications facility
- under such person's control to be used for an activity
- prohibited by paragraph (1) with the intent that it be
- used for such activity.
-
-
- (emphasis added).
- Two aspects of these provisions stand out. First, we
- are dealing with criminal provisions, subjecting violators to
- substantial penalties. Second, the provisions on indecent and
- patently offensive communications are not parallel.
- The government uses the term "indecent" interchangeably
- with "patently offensive" and advises that it so construes the
- statute in light of the legislative history and the Supreme
- Court's analysis of the word "indecent" in FCC v. Pacifica
- Foundation, 438 U.S. 726 (1978). However, the CDA does not
- define "indecent." Notwithstanding Congress' familiarity with
- Pacifica, it enacted . 223(a), covering "indecent"
- communications, without any language confining "indecent" to
- descriptions or depictions of "sexual or excretory activities or
- organs," language it included in the reference to "patently
- offensive" in . 223(d)(1)(B). Nor does . 223(a) contain the
- phrase "in context," which the government believes is relevant.
- The failure to define "indecent" in . 223(a) is thus
- arguably a negative pregnant and subject to "the rule of
- construction that an express statutory requirement here,
- contrasted with statutory silence there, shows an intent to
- confine the requirement to the specified instance." Field v.
- Mans, 116 S.Ct. 437, 442 (1995). See also Gozlon-Peretz v.
- United States, 498 U.S. 395, 404 (1991) ("'[W]here Congress
- includes particular language in one section of a statute but
- omits it in another section of the same Act, it is generally
- presumed that Congress acts intentionally and purposely in the
- disparate inclusion or exclusion'") (quoting Russello v. United
- States, 464 U.S. 16, 23 (1983)).
- Plaintiffs note the difference but do not press this as
- a basis for distinguishing between the two sections in their
- preliminary injunction arguments and therefore I will also use
- the words interchangeably for this purpose, leaving open the
- issue for consideration at the final judgment stage if it becomes
- relevant.
- B.
- Preliminary Injunction Standard
- To obtain a preliminary injunction, plaintiffs must
- establish that they are likely to prevail on the merits and that
- they will suffer irreparable harm if injunctive relief is not
- granted. We also must consider whether the potential harm to the
- defendant from issuance of a temporary restraining order
- outweighs possible harm to the plaintiffs if such relief is
- denied, and whether the granting of injunctive relief is in the
- public interest. See Campbell Soup Co. v. ConAgra, Inc., 977
- F.2d 86, 90-91 (3d Cir. 1992); Bradley v. Pittsburgh Bd. of
- Educ., 910 F.2d 1172, 1175 (3d Cir. 1990).
- In a case in which the injury alleged is a threat to
- First Amendment interests, the finding of irreparable injury is
- often tied to the likelihood of success on the merits. In Elrod
- v. Burns, 427 U.S. 347 (1976), the Supreme Court emphasized that
- "the loss of First Amendment freedoms, for even minimal periods
- of time, unquestionably constitutes irreparable injury." Id. at
- 373 (citing New York Times Co. v. United States, 403 U.S. 713
- (1971)).
- Subjecting speakers to criminal penalties for speech
- that is constitutionally protected in itself raises the spectre
- of irreparable harm. Even if a court were unwilling to draw that
- conclusion from the language of the statute itself, plaintiffs
- have introduced ample evidence that the challenged provisions, if
- not enjoined, will have a chilling effect on their free
- expression. Thus, this is not a case in which we are dealing
- with a mere incidental inhibition on speech, see Hohe v. Casey,
- 868 F.2d 69, 73 (3d Cir.), cert. denied, 493 U.S. 848 (1989), but
- with a regulation that directly penalizes speech.
- Nor could there be any dispute about the public
- interest factor which must be taken into account before a court
- grants a preliminary injunction. No long string of citations is
- necessary to find that the public interest weighs in favor of
- having access to a free flow of constitutionally protected
- speech. See, e.g., Turner Broadcasting System, Inc. v. FCC, 114
- S. Ct. 2445, 2458 (1994); Virginia Bd. of Pharmacy v. Virginia
- Citizens Consumer Council, 425 U.S. 748, 763-65 (1976).
- Thus, if plaintiffs have shown a likelihood of success
- on the merits, they will have shown the irreparable injury needed
- to entitle them to a preliminary injunction.
-
- C.
- Applicable Standard of Review
- The CDA is patently a government-imposed content-based
- restriction on speech, and the speech at issue, whether
- denominated "indecent" or "patently offensive," is entitled to
- constitutional protection. See Sable Communications of
- California, Inc. v. FCC, 492 U.S. 115, 126 (1989). As such, the
- regulation is subject to strict scrutiny, and will only be upheld
- if it is justified by a compelling government interest and if it
- is narrowly tailored to effectuate that interest. Sable, 492
- U.S. at 126; see also Turner Broadcasting, 114 S. Ct. at 2459
- (1994). "[T]he benefit gained [by a content-based restriction]
- must outweigh the loss of constitutionally protected rights."
- Elrod v. Burns, 427 U.S. at 363.
- The government's position on the applicable standard
- has been less than pellucid but, despite some references to a
- somewhat lesser burden employed in broadcasting cases, it now
- appears to have conceded that it has the burden of proof to show
- both a compelling interest and that the statute regulates least
- restrictively. Tr. of Preliminary Injunction Hearing at 121 (May
- 10, 1996). In any event, the evidence and our Findings of Fact
- based thereon show that Internet communication, while unique, is
- more akin to telephone communication, at issue in Sable, than to
- broadcasting, at issue in Pacifica, because, as with the
- telephone, an Internet user must act affirmatively and
- deliberately to retrieve specific information online. Even if a
- broad search will, on occasion, retrieve unwanted materials, the
- user virtually always receives some warning of its content,
- significantly reducing the element of surprise or "assault"
- involved in broadcasting. Therefore, it is highly unlikely that
- a very young child will be randomly "surfing" the Web and come
- across "indecent" or "patently offensive" material.
-
- The Reach of the Statute
-
- Whatever the strength of the interest the government
- has demonstrated in preventing minors from accessing "indecent"
- and "patently offensive" material online, if the means it has
- chosen sweeps more broadly than necessary and thereby chills the
- expression of adults, it has overstepped onto rights protected by
- the First Amendment. Sable, 492 U.S. at 131.
- The plaintiffs argue that the CDA violates the First
- Amendment because it effectively bans a substantial category of
- protected speech from most parts of the Internet. The
- government responds that the Act does not on its face or in
- effect ban indecent material that is constitutionally protected
- for adults. Thus one of the factual issues before us was the
- likely effect of the CDA on the free availability of
- constitutionally protected material. A wealth of persuasive
- evidence, referred to in detail in the Findings of Fact, proved
- that it is either technologically impossible or economically
- prohibitive for many of the plaintiffs to comply with the CDA
- without seriously impeding their posting of online material which
- adults have a constitutional right to access.
- With the possible exception of an e-mail to a known
- recipient, most content providers cannot determine the identity
- and age of every user accessing their material. Considering
- separately content providers that fall roughly into two
- categories, we have found that no technology exists which allows
- those posting on the category of newsgroups, mail exploders or
- chat rooms to screen for age. Speakers using those forms of
- communication cannot control who receives the communication, and
- in most instances are not aware of the identity of the
- recipients. If it is not feasible for speakers who communicate
- via these forms of communication to conduct age screening, they
- would have to reduce the level of communication to that which is
- appropriate for children in order to be protected under the
- statute. This would effect a complete ban even for adults of
- some expression, albeit "indecent," to which they are
- constitutionally entitled, and thus would be unconstitutional
- under the holding in Sable, 492 U.S. at 131.
- Even as to content providers in the other broad
- category, such as the World Wide Web, where efforts at age
- verification are technically feasible through the use of Common
- Gateway Interface (cgi) scripts (which enable creation of a
- document that can process information provided by a Web visitor),
- the Findings of Fact show that as a practical matter, non-
- commercial organizations and even many commercial organizations
- using the Web would find it prohibitively expensive and
- burdensome to engage in the methods of age verification proposed
- by the government, and that even if they could attempt to age
- verify, there is little assurance that they could successfully
- filter out minors.
- The government attempts to circumvent this problem by
- seeking to limit the scope of the statute to those content
- providers who are commercial pornographers, and urges that we do
- likewise in our obligation to save a congressional enactment from
- facial unconstitutionality wherever possible. But in light of
- its plain language and its legislative history, the CDA cannot
- reasonably be read as limited to commercial pornographers. A
- court may not impose a narrowing construction on a statute unless
- it is "readily susceptible" to such a construction. Virginia v.
- American Booksellers Ass'n, 484 U.S. 383, 397 (1988). The court
- may not "rewrite a . . . law to conform it to constitutional
- requirements." Id. Although we may prefer an interpretation of
- a statute that will preserve the constitutionality of the
- statutory scheme, United State v. Clark, 445 U.S. 23, 27 (1980),
- we do not have license to rewrite a statute to "create
- distinctions where none were intended." American Tobacco Co. v.
- Patterson, 456 U.S. 63, 72 n.6 (1982); see also Consumer Party v.
- Davis, 778 F.2d 140, 147 (3d Cir. 1985). The Court has often
- stated that "absent a clearly expressed legislative intention to
- the contrary, [statutory] language must ordinarily be regarded as
- conclusive." Escondido Mut. Water Co. v. La Jolla Band of
- Mission Indians, 466 U.S. 765, 772 (1984)(quoting North Dakota v.
- United States, 460 U.S. 300, 312 (1983)).
- It is clear from the face of the CDA and from its
- legislative history that Congress did not intend to limit its
- application to commercial purveyors of pornography. Congress
- unquestionably knew how to limit the statute to such entities if
- that was its intent, and in fact it did so in provisions relating
- to dial-a-porn services. See 47 U.S.C. . 223(b)(2)(A)
- (criminalizing making any indecent telephone communication "for
- commercial purposes"). It placed no similar limitation in the
- CDA. Moreover, the Conference Report makes clear that Congress
- did not intend to limit the application of the statute to content
- providers such as those which make available the commercial
- material contained in the government's exhibits, and confirms
- that Congress intended "content regulation of both commercial and
- non-commercial providers." Conf. Rep. at 191. See also, 141
- Cong. Rec. S8089 (daily ed. June 9, 1995) (Statement of Senator
- Exon).
- The scope of the CDA is not confined to material that
- has a prurient interest or appeal, one of the hallmarks of
- obscenity, because Congress sought to reach farther. Nor did
- Congress include language that would define "patently offensive"
- or "indecent" to exclude material of serious value. It follows
- that to narrow the statute in the manner the government urges
- would be an impermissible exercise of our limited judicial
- function, which is to review the statute as written for its
- compliance with constitutional mandates.
- I conclude inexorably from the foregoing that the CDA
- reaches speech subject to the full protection of the First
- Amendment, at least for adults.[1] In questions of the witnesses
- and in colloquy with the government attorneys, it became evident
- that even if "indecent" is read as parallel to "patently
- offensive," the terms would cover a broad range of material from
- contemporary films, plays and books showing or describing sexual
- activities (e.g., Leaving Las Vegas) to controversial
- contemporary art and photographs showing sexual organs in
- positions that the government conceded would be patently
- offensive in some communities (e.g., a Robert Mapplethorpe
- photograph depicting a man with an erect penis).
-
- <snip>
-
- 3. The Effect of the CDA and the Novel Characteristics
- of Internet Communication
- Over the course of five days of hearings and many
- hundreds of pages of declarations, deposition transcripts, and
- exhibits, we have learned about the special attributes of
- Internet communication. Our Findings of fact -- many of them
- undisputed -- express our understanding of the Internet. These
- Findings lead to the conclusion that Congress may not regulate
- indecency on the Internet at all.
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 3--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.44
- ************************************
-
-
-