Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 07 Issue 22
Computer underground Digest Sun Mar 19, 1995 Volume 7 : Issue 22
ISSN 1004-042X
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Semi-retiring Shadow Archivist: Stanton McCandlish
Correspondent Extra-ordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Monster Editor: Loch Nesshrdlu
CONTENTS, #7.22 (Sun, Mar 19, 1995)
File 1--CuD Listserv at UIUC having some problems
File 2--Cliff Stoll can't say that: "Silicon Snake Oil" reviewed
File 3--RE: File 4--S. 314, Realism, Unanswered Questions (fwd)
File 4--J. Baker/U of Mich Speech Case -- Chic Trib Excerpt)
File 5--Campaign to Defeat Comm. Decency Act (Mar 17 Update)
File 6--Reprint of Textof SB 314
File 7--Cu Digest Header Info (unchanged since 19 Mar, 1995)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Fri, 18 Mar 1995 15:24:43 (CST)
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 1--CuD Listserv at UIUC having some problems
The UIUC Listserv continues having some problems. People subscribing to
CuD with standard internet addresses should be relatively
unaffected. Those with BITNET addresses will likely not
receive CuD this (or next) issue.
This means that folks unsubbing, whether through us or through the
listserv, may not get unsubbed for a few more days. Those adding
directly through the listserv should wait a few days, and then
re-submit the request.
Jim
Sorry for the inconvenience.......
Jim and Gordon
------------------------------
Date: 19 Mar 95 14:42:00 EST
From: George C. Smith <70743.1711@compuserve.com>
Subject: File 2--Cliff Stoll can't say that: "Silicon Snake Oil" reviewed
"CLIFF STOLL CAN'T SAY THAT, CAN HE?" or NOTHIN' BUT GOOD TIMES
AHEAD IN "SILICON SNAKE OIL"
I don't know if Cliff Stoll ever met historian Christopher Lasch, but
if he did they certainly would have had a lot to talk about. Just
before his death, Lasch closed his last book, "The Revolt of the
Elites" with a biting assessment of the current mania with technology:
"Those wonderful machines that science has enabled us to construct
have not eliminated drudgery, as . . . other false prophets so
confidently predicted, but they have made it possible to imagine
ourselves as masters of our fate. In an age that fancies itself as
disillusioned, this is the one illusion - the illusion of mastery that
remains as tenacious as ever."
Stoll's "Silicon Snake Oil: Second Thoughts on the Information
Highway" (Doubleday) is steel-plated with the same underlying idea,
that much of what is said blindly exTOLLing <heh-heh, couldn't resist>
networks, interconnectivity and computing is illusory - at best
exaggerated, at worst, completely fabricated. Of course, there have
been other books which hoe the same row. Lauren Ruth Wiener's
"Digital Woes" and Theodore Roszak's The Cult of Information," both
excellent, come to mind. But neither deliver the same engaging
personal style Stoll effortlessly inserts into "SSO" which is a
greater read for it.
The book deals directly with the mysterious mental disease that is now
infecting large numbers of seemingly rational and very vocal people:
That computers are the new philosopher stones of American society,
capable of transforming the lead of inequality, crumbling public
education; unresponsive, corrupt political processes; stagnant career
opportunity; or the moribund sex life into different varieties of
revitalized techno-alchemical gold. And it means for the greater part
of the making of "Silicon Snake Oil," Stoll must have been sleeping
with his bullshit detector plugged in. However, he's more gracious,
calling it his "bogometer."
To wit:
"In physics, you measure the brightness of light with a photometer and
voltages with a voltmeter. Bogosity -- the degree to which something
is bogus - is measured with a bogometer," Stoll writes.
"Alan November, a consultant for the Glenbrook high schools in
Illinois, believes that today's students are in the test preparation
business. In the May/June 1994 issue of _Electronic Learning_, he
says that pupils will soon build information products that can be used
by clients around the world. Teachers, in turn, will become brokers
'connecting our students to others across the nets who will help them
create and add to their knowledge.' That one pegged my bogometer."
Mine too.
Passages like these are a delight to the closet curmudgeon. A mere
thirty pages earlier, Stoll notes "I've also noticed that the computer
cognoscenti hang on to their jobs by creating systems where they are
at the chokepoints of the organizations. Workers who don't know
computers get trampled, discounted or pushed to the side."
As for information being free? Bah, Stoll indicates. "I hear this
from those who duplicate software or break into computers. It's
techno-Marxism -- abolish private property and we'll all be happy."
The Free Software Foundation, writes Stoll, claims "that copyrights
harm society by preventing the free flow of information." You can
tell he doesn't believe much of it. Slogans and cyber-aphorisms of
this nature are conveniences in 1995, usually used to rationalize the
process of someone else, but never the individual spouting said
cliches, being ripped off.
I would suspect little, if any, of this will endear Stoll to the
disciples of the church of Toffler now encamped within the gilded
walls of the mainstream media. That's good. He also has doubtless
alienated the cypherpunks movement by essentially stating that while
their technical accomplishments are neat, the problem they're trying
to solve - the preservation of information privacy through the employ
of cumbersome, almost unusable anonymous remailers and cumbersome,
almost unusable encryption technology - looms trivial in the global
picture. In fact, "Silicon Snake Oil" gores so many sacred cows in
cyberspace it's guaranteed the author will be regarded like a
dysenteric hog loose in the streets of Mecca on some parts of the net.
That would be a shame because "Silicon Snake Oil" has genuine heart.
There's not a mean bone in it; neither will you find the sour breath
of the corrosive cynic. Paradoxically, Stoll confounds the reader's
expectations by appearing to be a hopeless romantic in everyday life,
and, by contrast, the nets, where he is up to his neck in connections
and still very obviously in love with the pulse of the cursor. In the
end, "Silicon Snake Oil" is saying the future could be a pretty dim,
brutish place if we trade the critical and analytical capacity, stuff
that ain't broke, a real voice on the end of the telephone line or the
tough teacher for the newest software, indigestible floods of
valueless, curiosity-numbing information or glib futurology that is
simply faster and louder than real life. That's a great message from
a killer of a book.
[George Smith is the author of "The Virus Creation Labs"
(American Eagle).]
------------------------------
Date: Sat, 18 Mar 1995 00:35:45 -0600 (CST)
From: Computer Underground Digest <cudigest@SUN.SOCI.NIU.EDU>
Subject: File 3--RE: File 4--S. 314, Realism, Unanswered Questions (fwd)
Bruce Johnson <JOHNSON@tonic.pharm.arizona.edu> wrote:
Tim King 'sez
>>Brad Hicks wrote:
>> If you want it to be legal for people to use [the Internet for
>>
>> would be illegal over a phone line under the existing law]...
>> well, then say so!
>>To which Rhys Weatherley replied:
>> Very few free speech supporters, myself included, want that
>> kind of crap distributed on the Internet or anywhere...
>Um... Er... This does seem to be the point. The question is not
>whether anyone _wants_ it to happen. I'm sure that no one _wants_ it
>to happen. The question is whether or not "you want it to be legal."
This is classic sensitive waffling on free speech...everyone is in
favor of it, but they'd really rather that it be restricted to speech
they're comfortable with. If no one_wants_it to happen, then why are
the alt.binaries and alt.sex groups consistently in the highest
traffic and usage groups on the net? The whole point of the
exepmtion of common carriers from obscenity laws to date is to allow
them to operate, period; as any efforts at censorship will run them
afoul of the various Electronic Privacy acts, such as the Wiretap
Act. S.314 requires operators of BBS's and Net services to
excersise just suchcensorship, to protect themselves from liability.
Yet they are, in all senses of the word, common carriers...you do not
have to be a giant monopolistic corporate entity to be one. They are
providing a connection service, not a content service; there is no
legal reason on earth that they should have to be responsible for the
content of what they are conveying, any more that the phone company
is. Drug deals, insider trading, and even murder conspiracies are
conducted by phone every day, yet the phone company is not held as a
co-conspirator, nor are they held on liability charges for the
millions of sex-line calls made using their networks each day.
However, this is precisely what this proposed law is setting out to
do for computer networks. This bill is a chilling attack on out
first amendment rights using a convenient scapegoat (remember no one
really _wants_ people to be passing around pornography) in a new, and
largely legally uncharted communications medium. Were I to go in for
conspiracy theory, I'd almost suspect that the large telcos were
behind this bill...it removes a heck of a lot of competition, and
when they finally bring networking to the unwashed masses, they'll
have their historical protections as common carriers and phalanxes of
lawyers, congress-critters and pr flacks to throw against it.
------------------------------
Date: Thu, 16 Mar 1995 18:28:56 -0600
From: cud@SUN.SOCI.NIU.EDU(CuD Moderators)
Subject: File 4--J. Baker/U of Mich Speech Case -- Chic Trib Excerpt)
Source: The Chicago Tribune, 12 March, 1995 (Perspective Section, p. 1)
By: Joan H. Lowenstein
HOW FREE IS SPEECH IN CYBERSPACE?
While other University of Michigan students worked on their tans
over spring break, one sophomore sat in a federal prison cell
typically occupied by extortionists and drug dealers.
The U.S. attorney in Detroit argued that 20-year-old Jake Baker was
a time bomb-so likely to commit a serious crime like rape or murder
that he shouldn't be allowed out of jail.
Baker, who was finally released on bail Friday, says he's a
political prisoner, a 1st Amendment hero who is being punished for
testing the limits of free speech in cyberspace. His lawyers say he
spent a month in jail for a crime that may consist of nothing more
than exceptionally bad manners.
They may be right.
((The story summarizes the case -- see CuD # for details))
Sex on the information superhighway is no different from sex on the
old information dirt roads like books and magazines. But the risk of
the unknown can be scary, and people typically react to new
communication technologies by trying to rein them in.
The advent of the printing press so stunned the medieval Catholic
Church that it had to create an imprimatur to control the output of
all texts. When radio became popular, Congress passed laws that made
sure the government could control the airwaves in case of war. And
more recently, the proliferation of cable television has sparked
legislation-so far unsuccessful-that attempts to regulate sex and
violence.
((The reporter provides an accurate summary of SB 314 - the "Decency"
Bill))
Ironically, had the University of Michigan acted quietly to
determine whether anyone was really in danger, alt.sex.stories readers
might never have known that the victim in Baker's story was a real
person. But instead, university President James Duderstadt summarily
suspended Baker from school, bringing on considerable media attention
and revealing the woman.
((The story provides additional information on the background -- see
CuD #)).
A Detroit federal grand jury has since indicted Baker for violating
Section 875(c) of the U.S. Criminal Code: "Whoever transmits in
interstate or foreign commerce any communication containing any threat
to kidnap any person or any threat to injure the person of another
shall be fined not more than $1,000 or imprisoned not more than 5
years, or both."
Citing his "gut feeling" that he wouldn't want his daughter out on
the streets if Baker were set free, a federal magistrate in Detroit at
first denied bond.
The case has attracted attention because it's the first time the
federal government has made an Internet posting the subject of the
anti-threat law. But the medium is not as important as the message in
determining the merit of Baker's primary defense-that he was
exercising his 1st Amendment right to freedom of expression.
((The story summarizes and excerpts parts of the story from the
indictment))
It's not the first time a person charged under the threat statute
has claimed exaggerated or offensive language shouldn't be punished.
In November 1974, when PLO Chairman Yasser Arafat was scheduled to
address the United Nations in New York, Jewish Defense League member
Russell Kelner called a news conference and, in response to a question
from a television reporter, said, "We are planning to assassinate Mr.
Arafat, just the way any other murderer is treated."
((The story summarizes the case, noting that the US Supreme Court drew
on a 1969 decision upholding a statute prohibiting threatening the
President of the US)).
Jake Baker's conduct doesn't begin to reach the severity of true
threats punished under this rarely used statute.
In one case prosecuted under the law, the threatening language was,
"I am going to blow your brains out." In another, a woman's
ex-boyfriend left a message on her answering machine that said, "Your
husband's health will take a turn for the worse and you will be
widowed."
Although the woman he named in the fictional story could bring a
civil suit against him for invasion of privacy or infliction of
emotional distress, it seems unlikely that prosecutors will be able to
show that Jake Baker made the kind of unequivocal and immediate threat
the courts have required for conviction on the criminal charge.
((A brief discussion of internet participation deleted)
Baker's case has been assigned to Detroit Federal Judge Avern Cohn,
a jurist who has often shown his sensitivity to the 1st Amendment.
Five years ago, Cohn severely chastised the University of Michigan
for enacting a speech code that violated the free speech rights of its
students.
Although it can foist some of the blame on the FBI, the university
soon may have to extend its wrist before the judge once again.
------------------------------
Date: Sun, 19 Mar 1995 14:08:03 -0600
From: Stephen Smith <libertas@COMP.UARK.EDU>
Subject: File 5--Campaign to Defeat Comm. Decency Act (Mar 17 Update)
CAMPAIGN TO STOP THE US COMMUNICATIONS DECENCY ACT (S. 314/H.R. 1004)
(Note this is not the electronic "defeat S314" petition)
Update: - Telecomm Reform bill scheduled for markup Thu 3/23/95
- Sen. Leahy (D-VT) expresses "serious concerns", seeks
alternatives that protect free speech
- Coalition Internet campaign has an impact
PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
DO NOT REDISTRIBUTE AFTER MAY 1, 1995
DO NOT REPRODUCE THIS ALERT IN NON-POLITICAL FORUMS
Mar. 17, 1995
Distributed by the Voters Telecommunications Watch (vtw@vtw.org)
---------------------------------------------------------------------
[3/17/95:
Yet even more organizations have joined us. Welcome aboard!
Next week (Mar 23, 1995) the telecomm reform bill will be marked up in
the Commerce committee. If the Communications Decency Act is added to
the reform bill as an amendment, it will be *very difficult to stop*.
The result of this bill becoming a law will be to change the nature of
the Internet as we know it. The volume of information we take for
granted will slow to a trickle.
Win this battle, and we've won the fight for this year and stopped the
bill. Lose it and we'll be on the ropes in the Senate for the rest
of the session.
Only you can make the difference, and it will only take two minutes.
-Shabbir]
---------------------------------------------------------
In order to use the net more effectively, the following organizations
have joined forces on a single Congressional net campaign to stop the
Communications Decency Act, S. 314 (in alphabetical order):
the American Civil Liberties Union (ACLU),
the American Communication Association (ACA),
the Center for Democracy and Technology (CDT),
the Center for Public Representation (CPR),
the Computer Communicators Association (CCA),
the Computing Professionals for Social Responsibility (CPSR),
the CyberQueer Lounge, an online resource for the gay community,
the Electronic Frontier Foundation (EFF),
(Note the above DC-based EFF has no local chapters)
the Electronic Frontier Foundation-Austin (EFF-Austin),
the Electronic Frontiers Australia, (EFA)
the Electronic Frontiers Houston, (EFH)
the Electronic Privacy Information Center (EPIC),
the Florida Coalition Against Censorship (FCAC),
the Hands Off! the Net petition drive,
the National Coalition Against Censorship, (NCAC)
the National Libertarian Party, (NLP),
the National Public Telecomputing Network (NPTN),
the National Writers Union (UAW Local 1981 AFL-CIO), (NWU)
the People for the American Way (PFAW),
the Society for Electronic Access (SEA), and
the Voters Telecommunications Watch (VTW)
These organizations are using the Voters Telecommunications Watch (VTW)
as a conduit for legislative feedback. When you contact Congress about the
Communications Decency Act and send your feedback to vtw@vtw.org, that
information is being fed back to all participating organizations.
If your organization would like to sign on to this campaign and receive
legislative feedback, contact vtw@vtw.org. (Note the Fidonet and FTN
mailing directions below)
-------------------------------------------------------------
CONTENTS
What you can do
Introduction
Background
Current status of S. 314/H.R. 1004
Where can I learn more about the bill? (URL & Fidonet/FTN included)
Where will I learn about updates to this alert?
Current list of participating organizations
---------------------------------------------------------------------
WHAT YOU CAN DO (IN ONLY TWO MINUTES)
1. Contact Sen. Larry Pressler (R-SD, Commerce Committee Chairman),
Sen. J.J. Exon (D-NE, sponsor of the bill), and Sen. Bob Packwood (ROR,
Chairman, Communications Subcommittee).
Note: although contacting your own Senators is important, these
members hold the keys at this point in time. If you want to contact
your own Senators, that's great, but between now and Thursday Pressler,
Exon and Packwood are the ones to focus on.
Time is of the essence: *Phone calls* are best, faxes only partially
effective, email has the least impact.
P ST Name and Address Phone Fax
= == ======================== ============== ==============
R SD Pressler, Larry 1-202-224-5842 1-202-224-1259*
243 RSOB larry_pressler@pressler.senate.gov
Washington, D.C. 20510
*Note this is the Senate Commercommittee's fax machine
D NE Exon, J. J. 1-202-224-4224 1-202-224-5213
528 HSOB
Washington, D.C. 20510
R OR Packwood, Robert 1-202-224-5244 1-202-228-3576
259 RSOB
Washington, D.C. 20510
Urge them to keep S.314 from being incorporated into
telecommunications reform legislation and to support Senator Leahy's
efforts to explore alternatives to the Exon bill. Follow the communique
at the bottom if you need to.
2. Feel free to use the following communique:
SAMPLE COMMUNIQUE
I'm a resident of _______. Please support Senator Leahy's
efforts to explore alternatives to S. 314. Please keep S. 314
out of the telecommunications reform bill, and remove S. 314
from the fast track.
Thanks.
See below for a brief description of Leahy's initiative. His letter
to CDT is in the VTW gopher.
Concern over S.314 is not limited to the U.S. Among many international
expressions of support, two have stood out in the first two weeks.
EF-Australia is a member of the growing coalition, and IndiaNet has
circulated our alert widely. If you are not a citizen of the United States
you can still express your concern. A sample message to Senator Pressler
follows:
Dear Senator Pressler:
The Exon bill will cripple the U.S. portion of the Internet
and thereby devastate the growing global information community.
Internation commerce and social and political cooperation will
suffer greatly. I urge you to refrain from incorporating S.314
into any telecommunications reform legislation and to support
Senator's Leahy initiatives to explore alternatives to S314.
Both US citizens and non-US citizens should remember to be polite
when speaking to legislators, even their own.
3. DON'T FORGET TO DROP A NOTE TO VTW@VTW.ORG to tell us who you contacted.
(See below for FTN -> Internet emailing instructions.)
We'll tally the results and feed them back to all participating
organizations. It's crucial we have this feedback, even if you just
got a form letter, or a "thank you" to your phone call.
Please, when you report back, tell us what state you are in! This
will help us track constituent calls, which are the most effective.
4. Feel good about yourself. You've just participated in democracy
without leaving your seat.
5. (Extra bonus activism) Pass this alert to your friends, especially if
they're in South Dakota, Nebraska, or Oregon. These states need to
have as much constituent contact with their Senators as possible.
Also, you might send a thank-you note to Sen. Patrick Leahy (D-VT) for
his continuing efforts on behalf of free speech and the free flow of
information in cyberspace. He can be reached at:
P ST Name and Address Phone Fax
= == ======================== ============== ==============
D VT Leahy, Patrick J. 1-202-224-4242 1-202-224-3595
433 RSOB senator_leahy@leahy.senate.gov
Washington, D.C. 20510
Don't forget to Cc: vtw@vtw.org on your mail to him, so we can tally
the response.
---------------------------------------------------------------------
INTRODUCTION
Dear Net Citizens:
Legislation has been introduced before the Senate which would severely
restrict your freedom of speech, halt the free flow of information on
the net, and require all telecommunications carriers to censor your
public and private communications.
The "Communications Decency Act of 1995" (S. 314), introduced in early
February by Senators Exon (D-NE) and Gorton (R-WA), would place
substantial criminal liability on telecommunications carriers (including
traditional telephone networks, Internet service providers, commercial
online services such as America Online and Compuserve, and independent
BBS's) whenever their networks are used to transmit any material
which is deemed indecent or harassing. In order to avoid these penalties,
carriers would be forced to restrict the activities of their subscribers
and censor all public and private communications.
We must act quickly to stop the progress of S. 314. The bill may soon
be incorporated into Senate telecommunications reform legislation, which
is currently being drafted by the Senate Commerce Committee. The
telecommunications reform bill may be introduced as early as mid March,
and is expected to be considered on a fast track. If S. 314 is included
in this bill, it will be extremely difficult to change or remove and
could pass quickly.
We are asking you to join us in urging key members of the Senate to
prevent S. 314 from being included in Senate telecommunications reform
measures and to hold open, public hearings on the issue.
---------------------------------------------------------------------
CURRENT STATUS OF S. 314/H.R. 1004
The bill was introduced on February 1, 1995 by Senators Exon (D-NE) and
Gorton (R-WA). It is currently pending before the Senate Commerce
Committee (chaired by Senator Pressler (R-SD)).
No committee action has been scheduled as of March 9, 1995.
The telecommunications reform bill is scheduled for hearing starting
March 21, 1995. It is possible that S. 314 will be folded into the
bill during markup next week.
H.R. 1004 (worded the same as S. 314) was introduced on February 21,
1995 in the House by Representative Johnson (SD) and has been referred
to the House Commerce and Judiciary committees.
No committee actions in the House have been scheduled as of March 17, 1995.
---------------------------------------------------------------------
BACKGROUND
S. 314 would expand current law restricting indecency and harassment on
telephone services to all telecommunications providers and expand
criminal liability to all content carried by all forms of
telecommunications networks. The bill would amend Section 223 of the
Communications Act (47 U.S.C. 223), which requires carriers to take
steps to prevent minors from gaining access to indecent audiotext and
criminalizes harassment accomplished over interstate telephone lines.
If enacted, S. 314 would compel service providers to severely restrict
your online activities. Your access to email, discussion lists, usenet,
the world wide web, gopher, and ftp archives would be substantially
reduced or cut off entirely. The bill would also force providers to
closely monitor and pre-screen your electronic mail, and refuse to
transmit any message or other content which may be considered to be
indecent.
This bill poses a significant threat to freedom of speech and the free
flow of information in cyberspace. The bill also raises fundamental
questions about the right of government to control content on
communications networks, as well as the locus of liability for content
carried in these new communications media.
Recently, Sen. Patrick Leahy (D-VT) has requested the Center for
Democracy and Technology's Public Interest/Industry working group IWG
(Interactive Working Group) to explore other solutions to the problems
that S. 314 attempts to solve. The working group must be allowed to
examine current legislation and explore technical alternatives that are
consistent with the First Amendment and the free flow of information.
We've received over 400 messages in two weeks, with our log showing
over 700 letters, faxes, phone calls, and email messages (many people
contacted more than one Senator. At least two respondents wrote all 19
members of the committee!) Of course many more people have probably
contacted Congress without sending that note to VTW.
Almost 200 messages went to Pressler, who may be getting the point.
His staff told one caller, "Why are you calling us? It's Exon's bill!"
(This is why phone calls to Pressler are so important.)
One citizen wrote to Senator Gorton, a co-sponsor:
"I, frankly, am amazed at the audacity of your proposed
bill. We are not children sir, nor do we need your
misplaced guidance in raising our children!"
Along the same lines, another wrote to his own Senator:
"While I am pleased, being an enthusiastic supporter of
anti-harassment legislation, with many of the provisions of
this bill, I am frankly astounded and appalled with others."
Someone came up with metaphor that frankly we aren't clever enough to
have thought of:
"A few years ago, a tanker laden with a crude, noxious substance
ran aground in the virginal territories of the Alaskan coastline.
It poisoned the land and sea for many miles around.... We are now
faced with another 'Exon Valdez'... a vehicle filled with crude
legislation, currently at risk of running ashore on our pristine
rights."
Finally, someone writing to Pressler spoke for all of us to all of us:
"At a time when communications between ordinary citizens has
been all but drowned out by the barrage of mass media, online
communication has become the last bastion of real citizen
deliberation and has become the "public square" so to speak,
of the nation. This bill would destroy this great experiment
in the rejuvenation of grassroots democracy. Please do all
you can to prevent its passage."
We are encouraged by the success so far of the campaign, and hope that
you take the time to participate at this crucial time.
---------------------------------------------------------------------
WHERE CAN I LEARN MORE ABOUT THE BILL? (URL INCLUDED)
The Voters Telecommunications Watch has set up a gopher page where
you can get a copy of the bill (including analyses by the American
Civil Liberties Union, the Center for Democracy and Technology, the
Electronic Messaging Association, and others). Here's the URL:
WWW URL: gopher://gopher.panix.com/11/vtw/exon
Gopher command : gopher -p 1/vtw/exon gopher.panix.com
If you have difficulty getting to this gopher page, or if you don't
have access to Mosaic/gopher, drop a note to:
vtw@vtw.org
BBS Network Users:
You can FREQ the files from the EFF BBS, 1:109/1108, 1-202-861-1224.
The "magicword" for a list of relevant files is S314. You do NOT have to be
nodelisted to get the files, or in any particular network. Just create a
dummy nodelist entry with our phone number if you need to do so.
Those in QWK nets or otherwise not able to File REQuest can download the
files manually from the BBS, in the ALERTS file area. Feel free to login
as ANONYMOUS, password GUEST to bypass newuser questionnaires.
To send mail to vtw@vtw.org from FidoNet or other FTN systems, create a
netmail message to your local UUCP host. Search the nodelist for the
GUUCP flag, and use the address of that system:
To: UUCP, [GUUCP system's address here. "To:" name MUST be set to UUCP]
From: [you]
Subject--S.314
---------------------------------------------------------------
To: vtw@vtw.org
[Message starts here on 3rd line. The second "To:" line with the internet
email address MUST be the first line of the message body, and the blank
line following that is REQUIRED. Mail will not be delivered by the gateways
without it.]
To email one of the Senators in the list above, just put the Senator's email
address in place of "vtw@vtw.org" in the above example.
If you are unsure whether your FTN has an Internet gateway, or suspect it
may use something other than a GUUCP nodelist flag, ask your network
coordinators.
-----------------------------------------------------------------
---------------------------------------------------------------------
WHERE WILL I LEARN ABOUT UPDATES TO THIS ALERT?
We will post updates to this alert in three places:
-On the account vtw@panix.com (finger vtw@panix.com)
-On Usenet (comp.org.eff.talk, comp.org.cpsr.talk, and alt.privacy)
-Through our announcements mailing list, vtw-announce@vtw.org.
To subscribe, simply send a message to listproc@vtw.org with the
following in the message body:
subscribe vtw-announce Firstname Lastname
---------------------------------------------------------------------
CURRENT LIST OF PARTICIPATING ORGANIZATIONS
At this time, the following organizations have signed onto this
campaign and are receiving the legislative feedback that VTW is compiling:
American Civil Liberties Union (ACLU), infoaclu@aclu.org
American Communication Association (ACA), comminfo@cavern.uark.edu
Center for Democracy and Technology (CDT), ask@cdt.org
Center for Public Representation (CPR), mgpritch@facstaff.wisc.edu
Computer Communicators Association (CCA), community@pigpen.demon.co.uk
Computing Professionals for Social Responsibility (CPSR), cpsr@cpsr.org
CyberQueer Lounge, tomh@cyberzine.org
(Note that the DC-based EFF has no local chapters)
Electronic Frontier Foundation (EFF), ask@eff.org
Electronic Frontier Foundation-Austin (EFF-Austin), eff-austin@tic.com
Electronic Frontiers Australia (EFA), efa-info@efa.org.au
Electronic Frontiers Houston (EFH), efh@efh.org
Electronic Privacy Information Center (EPIC), info@epic.org
Florida Coalition Against Censorship (FCAC), PIPKING@mail.firn.edu
Hands Off! the Net petition drive, slowdog@wookie.net
National Coalition Against Censorship (NCAC), ncac@netcom.com
National Libertarian Party (NLP), lphq@access.digex.net
National Public Telecomputing Network (NPTN), info@nptn.org
National Writers Union (UAW Local 1981 AFL-CIO), kip@world.std.com
People for the American Way (PFAW), jlessern@reach.com
Society for Electronic Access (SEA), sea@sea.org
Voters Telecommunications Watch (VTW), vtw@vtw.org
Note that the Voters Telecommunications Watch does not speak for these
organizations. Any opinions contained herein are those of the author,
and not necessarily endorsed by participating organizations.
------------------------------
Date: Sun 19 Mar 1995 19:19:22 CST
From: CuD Moderators <cudigest@mindvox.phantom.com>
Subject: File 6--Reprint of Textof SB 314
((MODERATORS' NOTE: Here, from ftp.eff.org's site, is the text of
the original statute and the changes that are proposed.
For more information, also check out slowdog's homepage at:
http://www.phantom.com/~slowdog
==============
47 USC 223 (1992)
Sec. 223. [Obscene or harassing telephone calls in the District
of Columbia or in interstate or foreign communications]
OBSCENE OR HARASSING UTILIZATION OF TELECOMMUNICATIONS
DEVICES AND FACILITIES IN THE DISTRICT OF COLUMBIA OR IN
INTERSTATE OR FOREIGN COMMUNICATIONS"
(a) Whoever--
(1) in the District of Columbia or in interstate or foreign
communication by means of [telephone] TELECOMMUNICATIONS
DEVICE--
(A) [makes any comment, request, suggestion or proposal]
MAKES, TRANSMITS, OR OTHERWISE MAKES AVAILABLE ANY COMMENT,REQUEST,
SUGGESTION, PROPOSAL, IMAGE, OR OTHER COMMUNICATION which is
obscene, lewd, lascivious, filthy, or indecent;
[(B) makes a telephone call, whether or not conversation ensues,
without disclosing his identity and with intent to annoy, abuse,
threaten, or harass any person at the called number;]
"(B) MAKES A TELEPHONE CALL OR UTILIZES A TELECOMMUNICATIONS
DEVICE, WHETHER OR NOT CONVERSATION OR COMMUNICATIONS
ENSUES,WITHOUT DISCLOSING HIS IDENTITY AND WITH INTENT TO ANNOY,
ABUSE, THREATEN, OR HARASS ANY PERSON AT THE CALLED NUMBER OR WHO
RECEIVES THE COMMUNICATION;
(C) makes or causes the telephone of another repeatedly or
continuously to ring, with intent to harass any person at the
called number; or
[(D) makes repeated telephone calls, during which conversation
ensues, solely to harass any person at the called number; or]
(D) MAKES REPEATED TELEPHONE CALLS OR REPEATEDLY INITIATES
COMMUNICATION WITH A TELECOMMUNICATIONS DEVICE, DURING WHICH
CONVERSATION OR COMMUNICATION ENSUES, SOLELY TO HARASS ANY PERSON
AT THE CALLED NUMBER OR WHO RECEIVES THE COMMUNICATION,
(2) knowingly permits any [telephone facility]
TELECOMMUNICATIONS FACILITY under his control to be used
for any purpose prohibited by this section, shall be fined not more
than $[50,000]100,000 or imprisoned not more than [six months] TWO
YEARS, or both.
(b)(1) Whoever knowingly--
(A) within the United States, by means of [telephone]
TELECOMMUNICATIONS DEVICCE, makes (directly or by recording device)
any obscene communication for commercial purposes to any person,
regardless of whether the maker of such communication placed the
call or INITIATED THE COMMUNICATION; or
(B) permits any [telephone facility] TELECOMMUNICATIONS
FACILITY under such person's control to be used for an activity
prohibited by subparagraph (A), shall be fined in accordance with
title 18, United States Code, or imprisoned not more than two
years, or both.
(2) Whoever knowingly--
(A) within the United States, [by means of telephone],
makes BY MEANS OF TELEPHONE OR TELECOMMUNICATIONS DEVICE, MAKES,
TRANSMITS, OR MAKES AVAILABLE(directly or by recording device) any
indecent communication for commercial purposes which is available
to any person under 18 years of age or to any other person without
that person's consent, regardless of whether the maker of such
communication placed the call OR INITIATED THE COMMUNICATION; or
(B) permits any [telephone facility] TELECOMMUNICATIONS
FACILITY under such person's control to be used for an activity
prohibited by subparagraph (A), shall be fined not more than
$[50,000] 100,000 or imprisoned not more than [six months]
TWO YEARS, or both.
(3) It is a defense to prosecution under paragraph (2) of this
subsection that the defendant restrict access to the prohibited
communication to persons 18 years of age or older in accordance
with subsection (c) of this section and with such procedures as the
Commission may prescribe by regulation.
(4) In addition to the penalties under paragraph (1), whoever,
within the United States, intentionally violates paragraph
(1) or (2) shall be subject to a fine of not more than $[50,000]
100,000 for each violation. For purposes of this paragraph, each
day of violation shall constitute a separate violation.
(5)(A) In addition to the penalties under paragraphs (1), (2),
and (5), whoever, within the United States, violates paragraph (1)
or (2) shall be subject to a civil fine of not more than $[50,000]
100,000 for each violation. For purposes of this paragraph, each
day of violation shall constitute a separate violation.
(B) A fine under this paragraph may be assessed either--
(i) by a court, pursuant to civil action by the Commission or
any attorney employed by the Commission who is designated by the
Commission for such purposes, or
(ii) by the Commission after appropriate administrative
proceedings.
(6) The Attorney General may bring a suit in the appropriate
district court of the United States to enjoin any act or practice
which violates paragraph (1) or (2). An injunction may be granted
in accordance with the Federal Rules of Civil Procedure.
(c)(1) A common carrier within the District of Columbia or
within any State, or in interstate or foreign commerce, shall not,
to the extent technically feasible, provide access to a
communication specified in subsection (b) from the
telephone of any subscriber who has not previously requested in
writing the carrier to provide access to such communication if the
carrier collects from subscribers an identifiable charge for such
communication that the carrier remits, in whole or in part, to the
provider of such communication.
(2) Except as provided in paragraph (3), no cause of action may
be brought in any court or administrative agency against any common
carrier, or any of its affiliates, including their officers,
directors, employees, agents, or authorized representatives on
account of--
(A) any action which the carrier demonstrates was taken in good
faith to restrict access pursuant to paragraph (1) of this
subsection; or
(B) any access permitted--
(i) in good faith reliance upon the lack of any representation
by a provider of communications that communications provided by
that provider are communications specified in subsection (b), or
(ii) because a specific representation by the provider did not
allow the carrier, acting in good faith, a sufficient period to
restrict access to communications described in subsection (b).
(3) Notwithstanding paragraph (2) of this subsection, a provider
of communications services to which subscribers are denied access
pursuant to paragraph (1) of this subsection may bring an action
for a declaratory judgment or similar action in a court. Any such
action shall be limited to the question of whether the
communications which the provider seeks to provide fall within
the category of communications to which the carrier will provide
access only to subscribers who have previously requested such
access.
*********************************************
NOTE: This version of the text shows the actual text of current law as
it would be changed. For the bill itself, which consists of unreadable
text such as:
[...]
(1) in subsection (a)(1)--
(A) by striking out `telephone' in the matter above
subparagraph (A) and inserting `telecommunications device';
(B) by striking out `makes any comment, request,
suggestion, or proposal' in subparagraph (A) and inserting
`makes, transmits, or otherwise makes available any
comment, request, suggestion, proposal, image, or other
communication';
(C) by striking out subparagraph (B) and inserting the
following:
`(B) makes a telephone call or utilizes a
[...]
See:
ftp.eff.org, /pub/EFF/Legislation/Bills_new/s314.bill
gopher.eff.org, 1/EFF/Legislation/Bills_new, s314.bill
http://www.eff.org/pub/EFF/Legislation/Bills_new/s314.bill
------------------------------
Date: Sun, 19 Mar 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 19 Mar, 1995)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB <your name>
Send it to LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: Bits against the Empire BBS: +39-464-435189
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu:80/~cudigest
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #7.22
************************************