Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 09 Issue 04

  


Computer underground Digest Sun Jan 19, 1997 Volume 9 : Issue 04
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.04 (Sun, Jan 19, 1997)

File 1--Solid Oak Blocking Software & Ethical Spectacle
File 2--IP: going to InfoWar (fwd)
File 3--If Operating Systems Were Airlines (fwd)
File 4--Sidgmore/PC Week (on Growth of UUNET Backbone) (fwd)
File 5--Internet Forum In Italy Subjected To Censorship
File 6--GovAcc97.002: 7th Conference on Computers, Freedom & Privacy
File 7--ALA/ACLU file lawsuit challenging New York "CDA" law
File 8--Enough is Never Enough -- pro-CDA alliances, from TNNN
File 9--SUPREMES: Court Date Set, DoJ Brief Filed
File 10--Cu Digest Header Info (unchanged since 13 Dec, 1996)


CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sun, 19 Jan 1997 14:36:55 -0800
From: Jonathan Wallace <jw@bway.net>
Subject: 1--Solid Oak Blocking Software & Ethical Spectacle

FOR IMMEDIATE RELEASE

Contact: Jonathan Wallace
jw@bway.net

NEW YORK CITY, January 19, 1997--In an apparent act of
retaliation against a critic of the company, Solid Oak Sofware
has added The Ethical Spectacle (http://www.spectacle.org) to
the list of Web sites blocked by its Cybersitter software.

The Ethical Spectacle is a monthly Webzine examining
the intersection of ethics, law and politics
in our society, which recently urged its readers not to
buy Cybersitter because of Solid Oak's unethical behavior.
The Ethical Spectacle is edited by Jonathan Wallace, a New York-
based software executive and attorney who is the co-author,
with Mark Mangan, of Sex, Laws and Cyberspace (Henry Holt, 1996),
a book on Internet censorship.

"In the book," Wallace said, "we took the position--
naively, I now think--that use of blocking software by parents
was a less restrictive alternative to government censorship.
We never expected that publishers of blocking software would
block sites for their political content alone, as Solid Oak
has done."

Solid Oak describes its product as blocking sites
which contain obscene and indecent material, hate speech,
and advocacy of violence and illegal behavior. In late 1996,
computer journalists Declan McCullagh (declan@well.com)
and Brock Meeks (brock@well.com) broke the story that
Cybersitter blocked the National Organization for
Women site (http://www.now.org)
along with other political and feminist organizations.
In addition, the product blocked entire domains such as
well.com, maintained by the venerable Well online service.

McCullagh and Meeks implied that they had received an inner
look at the Cybersitter database of blocked sites from someone
who had reverse engineered the software. Shortly afterwards,
Solid Oak asked the FBI to begin a criminal investigation of
the two journalists and accused college student Bennett Haselton
(bennett@peacefire.org) of being their source.
Though McCullagh, Meeks and Haselton all
denied he was the source (or that anything illegal
had occurred), Solid Oak president Brian Milburn called
Haselton an "aspiring felon" and threatened to add
his Internet service provider to the blocked list if it did
not muzzle Haselton.

Haselton came to Milburn's attention by founding Peacefire,
a student organization opposing censorship. On his Web pages
(http://www.peacefire.org), Haselton posted an essay called
"Where Do We Not Want You to Go Today?" criticizing
Solid Oak. The company promptly added Peacefire to its
blocked list, claiming that Haselton had reverse
engineered its software, an allegation for which the
company has never produced any evidence.

"At that point," Wallace said, "I felt Milburn was
acting like the proverbial 800-pound gorilla. I added a
link to the Spectacle top page called 'Don't Buy Cybersitter'
(http://www.spectacle.org/alert/peace.html).
Anyone clicking on the link would see a copy of Bennett's
'Where Do We Not Want You to Go' page with some added
material, including my thoughts on the inappropriateness
of Solid Oak's behavior. I wrote the company, informing
them of my actions and telling them that they
misrepresent their product when they claim it blocks only
indecent material, hate speech and the like."

Solid Oak has now responded by blocking The
Ethical Spectacle. "I wrote to Milburn and to
Solid Oak technical support demanding an explanation,"
Wallace said. "I pointed out that The Spectacle does not fit
any of their published criteria for blocking a site.
I received mail in return demanding that I cease writing
to them and calling my mail 'harassment'--with a copy
to the postmaster at my ISP."

Wallace continued: "With other critics such as Declan,
Brock and Bennett, Solid Oak has claimed reverse
engineering of its software, in supposed violation
of its shrink-wrapped license. I have never downloaded,
purchased or used Cybersitter, nor had any access to
its database. I believe that Solid Oak's sole reason
for blocking my site is the 'Don't Buy Cybersitter'
page, criticizing the company's bullying behavior."


The Ethical Spectacle includes the internationally
respected An Auschwitz Alphabet
(http://www.spectacle.org/695/ausch.html), a compilation
of resources pertaining to the Holocaust. "Sixty
percent of the Spectacle's traffic consists of visitors to the
Holocaust materials," Wallace said. "Schoolteachers have
used it in their curricula, it was the subject of a lecture at
a museum in Poland some weeks ago, and every month, I get
letters from schoolchildren thanking me for placing it
online. Now, due to Solid Oak's actions, Cybersitter's
claimed 900,000 users will no longer have access to it."

Solid Oak can be contacted at blocking.problems@solidoak.com,
or care of its president, Brian Milburn (bmilburn@solidoak.com.)

-----------------------------------------------
Jonathan Wallace
The Ethical Spectacle http://www.spectacle.org
Co-author, Sex, Laws and Cyberspace http://www.spectacle.org/freespch/

"We must be the change we wish to see in the world."--Gandhi

------------------------------

Date: Wed, 8 Jan 1997 13:06:00 -0800 (PST)
From: Stanton McCandlish <mech@EFF.ORG>
Subject: 2--IP: going to InfoWar (fwd)

These excerpts from Edupage, aside from warning of increasing US
executive branch policymaking involving the Internet, likely to
have some kind of negative fallout whatever good it may do, also
demonstrates an increasingly frequent rhetorical device and logic flaw:
The Administration's intelligence people say that the Net is the fastest
growing method of economic espionage, as if this were a meaningful
statement out of the context of the facts surrounding it. The Net is also
the fastest growing way to make new friends, to ask and answer questions
among colleagues, to play games, to get in arguments, to organize events,
to... I'm strongly reminded of the contorted reasoning of many
well-meaning organizations who are in a panic over online neo-nazis and
pornographers. *Of course* racists, porn merchants, and spies use the Net.
The also use telephones and microwave ovens just like anyone else. Why
the press even bothers to listen to claims like this, much less report them
as "news" is beyond me. It should be immediately apparent to any writer
following such a story that the Net, like any technology, will be used by
everyone with access to it, whether they be moms, rabbis, students or
scam artists.

It think it is sensible that NACIC is warning businesses of Net-related
security risks - there are many genuine ones. It even bolsters our
own position that such risks combined with the National Security Agency's
anti-encryption public policy stance is ironically harming the very national
security interests NSA is charged with protecting.

But it cannot be sensible for NACIC to make alarmist statements like
"All requests for information received via the Internet should be viewed
with suspicion". Are corporate webmasters supposed to call the CIA next
time someone asks them "what is your URL?" or "Where do I find more
information on your products or services?" Had Edupage simply been
summarizing I would not have worried much, but that "all requests" line
appears to be a direct quote from NACIC's report, the full text of which
I'll certainly be looking for.


Dave Farber typed:
> Date--Wed, 08 Jan 1997 11:17:48 -0500
> From--Dave Farber <farber@cis.upenn.edu>
> Subject--IP--going to InfoWar
>
> >From Edunews:
>
> INTERNET IS NO.1 CHOICE FOR FOREIGN SNOOPERS
> A report released by the National Counterintelligence Center (NACIC)
> indicates that the Internet is the fastest growing method used by foreign
> entities to gather intelligence about U.S. companies. "All requests for
> information received via the Internet should be viewed with suspicion," says
> the report, which urges caution in replying to requests coming from foreign
> countries or foreign governments, particularly with regard to questions
> about defense-related technology. NACIC works in close coordination with
> the CIA, but is an autonomous agency reporting the National Security
> Council. (BNA Daily Report for Executives 6 Jan 97 A15)
>
> DOD URGES "INFORMATION CZAR" APPOINTMENT
> The U.S. Department of Defense has recommended establishing a new
> "information-warfare" czar in the Defense Department and an
> "information-warfare" center within U.S. intelligence agencies. A report
> released by a task force appointed by the Defense Science Board calls for
> spending $580 million in R&D over the coming years, mainly in the private
> sector, to develop new software and hardware to provide security, such as a
> system for automatically tracing cracker attacks back to their source. The
> task force also recommends changing the laws so that the Pentagon can
> legally pursue and repel those who attempt to hack into DoD computer
> systems, injecting their computers with "a polymorphic virus that wipes out
> the system, takes it down for weeks." A Defense Department spokesman notes
> that the Advanced Research Projects Agency is working on an "electronic
> immune system" that could detect invaders and mobilize against them. (Wall
> Street Journal 6 Jan 97 B2)

------------------------------

Date: Wed, 18 Dec 1996 21:49:53 -0600
From: Avi Bass <te0azb1@corn.cso.niu.edu>
Subject: 3--If Operating Systems Were Airlines (fwd)

((MODERATORS' NOTE: Fowarded from another list; Original author unknown))

If Operating Systems Were Airlines

DOS Air:
Passengers walk out onto the runway, grab hold of the plane, push t
until it gets in the air, hop on, then jump off when it hits the
ground. They grab the plane again, push it back into the air, hop
on, jump off....

Mac Airways:
The cashiers, flight attendants, and pilots all look the same, talk
the same, and act the same. When you ask them questions about the
flight,they reply that you don't want to know, don't need to know,
and would you please return to your seat and watch the movie.

Windows Airlines:
The terminal is net and clean, the attendants courteous, the pilots
capable The fleet of Lear jets the carrier operates takes off
without a hitch, pushes above the clouds and, at 20,000 feet,
explodes without warning.

OS/2 Skyways:
The terminal is almost empty - only a few prospective passengers
mill about. The announcer says that a flight has departed, although
no planes appear to be on the runway. Airline personnel apologize
profusely to customers in hushed voices pointing from time to time
to the sleek, powerful jets outside.
They tell each passenger how great the flight will be on these new
jets and how much safer it will be than Windows Airlines, but they
will have to wait a little longer for the technicians to finish the
flight systems.
Maybe until mid-1995. Maybe longer.

Fly Windows NT:
Passengers carry their seats out onto the tarmac and place them in
the outline of a plane. They sit down, flap their arms, and make
jet swooshing sounds as if they are flying.

Unix Express:
Passengers bring a piece of the airplane and a box of tools with
them to the airport. They gather on the tarmac, arguing about what
kind of plane they want to build. The passengers split into groups
and build several different aircraft but give them all the same
name. Only some passengers reach their destinations, but all of
them believe thay arrived.

------------------------------

Date: Mon, 16 Dec 1996 18:35:41 -0500 (EST)
From: "noah@enabled.com" <noah@enabled.com>
Subject: 4--Sidgmore/PC Week (on Growth of UUNET Backbone) (fwd)

Source -Noah

---------- Forwarded message ----------
Date--Mon, 16 Dec 1996 16:26:23 -0500 (EST)
From--"Scott A. Davis" <sdavis@UU.NET>
To--dfoxlist@banzai-institute.org

You guys want to read some frightening statistics? UUNET's backbone in
three years, according to our CEO, will be 1000 times the size of today's
existing internet...

-------------------------------------------------------------
Great article in this weeks edition of PC Week from Johns keynote speech
last Thursday at Mecklermedia's Internet World Conference in New York. It
quotes most of the key elements from his speech and be found at

http://www.pcweek.com/news/1209/12muu.html

or is cut and pasted below.

__________________________________________________

December 12, 1996 12:00 PM ET

UUNet chief sees telecom/ISP mergers as
the wave of the future
By Margaret Kane


NEW YORK -- In a speech that was part pitch and part prognostication,
UUNet with communications services provider MFS Communications Co. Inc.
was the right move and where he thinks the telecommunications industry
will end up.

In the past six months, UUNet has not only merged with MFS but also has
announced a proposed merger with long-distance carrier WorldCom Inc. The
joining of two telecommunications companies with an Internet company is
the wave of the future, Sidgmore told an Internet World audience here this
morning in a keynote address.

ISPs (Internet service providers) that do not control their facilities
will not survive, he predicted.

Sidgmore based his pronouncement on the exploding demand for bandwidth,
which brings with it exploding costs for ISPs.

"UUNet alone will have an Internet [backbone] in three years that is 1,000
times the size of the whole Internet network today," he said. Because
bandwidth accounts for roughly 54 percent of an ISP's total cost, the only
companies that will survive will be those that are part of a core telco.

"We don't see how to escape from the arithmetic here," he said.

Sidgmore agreed with analysts' predictions that the number of ISPs will
drop sharply in the near future, predicting that companies would split
into two markets: ISPs that own their own networks, like UUNet, and ISPs
that provide value-added reselling of those network services.

But UUNet will not get out of the service business. Indeed, Sidgmore took
time to announce the introduction of a pair of "extranet" services that
will allow businesses to employ Internet protocols to share information
with associates and partners. ExtraLink is a VPN (virtual private network)
with full Internet connectivity based on UUNet's backbone and MFS' local
access. ExtraLink Remote will allow users with a VPN to permit secure,
remote dial-up access to mobile users or affinity groups. The services are
slated to be available commercially in February.

The demand for bandwidth will not just affect ISPs, Sidgmore continued.
Telcos also will be changed by the Internet, mainly because of how cheap
it is to send faxes over the Internet.

Sidgmore said faxes make up 50 percent of international telecommunications
traffic. That puts telcos in a vulnerable position, he said, citing the
cost of a 42-page fax sent from New York to Los Angeles. By fax, it's
about $10. By Internet, it's about 10 cents.

"The Internet is not about being 10 percent better or 10 percent cheaper,"
he said. "It's about being 10 times better and 10 times cheaper."

"Think about the vulnerability of the core telecom companies. What's at
stake is not the $20 billion voice market, it's the $900 billion market
worldwide," he said. "That's why all the telecom companies worldwide have
scrambled to derive Internet strategies."

Not surprisingly, Sidgmore said the one thing that could hurt the growth
of the Internet is the government.

"How can we screw it up? One way is to get them involved," he said, to
applause from the crowd. "You could argue that they had the chance. The
government had control of the Internet for 25 years, and nothing happened.
We think the government should declare success, and move on to health
care."

------------------------------

Date: Mon, 2 Dec 1996 12:08:20 -0500 (EST)
From: Noah Robischon <noah@pathfinder.com>
Subject: 5--Internet Forum In Italy Subjected To Censorship

From: http://netday.iworld.com/business/NATW.html

In what is widely thought to be the first instance of Net
censorship in Italy, an e-mail forum called Lisa has been removed
from the computers of Bologna University. At issue were
defamatory messages that were circulated among members of the
list. The messages did not concern the themes of the list, but
were insults directed at the members of another online group
called Citt=E1 Invisible (Invisible City). "They were very
serious affirmations. In another context they would have led to
legal action," said Lucio Picci, president of Citt=E1 Invisible
and the object of many of the insulting messages. Laura Caponi,
the forum moderator, says she was not consulted before the
decision was taken, adding that "pressure" was exerted on the
university to close the list. The university stated that its
network belongs to the ministry of education and that it is
obliged to exercise some control over users' activities. (The
Guardian, Britain; November 28, 1996)

------------------------------

Date: Fri, 17 Jan 1997 17:19:02 -0800
From: jwarren@WELL.COM(Jim Warren)
Subject: 6--GovAcc97.002: 7th Conference on Computers, Freedom & Privacy

The Consitution "guarantee" NOTHING. It merely proposes. Diligent citizen
vigilence and personal activism provides the *only* guarantee -- and it's
only good for as long as *we* continuously invest *our* time, energy and
resources.
--preacher-jim


&&&&&&&&&&&&&&&&&&&&


The Seventh Conference on Computers, Freedom, and Privacy
March 11-14, 1997
San Francisco Airport Hyatt Regency; Burlingame, California

Date: Wed, 8 Jan 1997 18:11:09 -0800 (PST)
From: Bruce R Koball <bkoball@well.com>

CFP'97 : Commerce & Community

CFP'97 will assemble experts, advocates, and interested people
from a broad spectrum of disciplines and backgrounds in a balanced
public forum to address the impact of new technologies on society.
This year's theme addresses two of the main drivers of social and
technological transformation. How is private enterprise changing
cyberspace? How are traditional and virtual communities reacting?
Topics in the wide-ranging main track program will include:

PERSPECTIVES ON CONTROVERSIAL SPEECH
THE COMMERCIAL DEVELOPMENT OF THE NET
GOVERNMENTAL & SOCIAL IMPLICATIONS OF DIGITAL MONEY
INTERNATIONAL PERSPECTIVES ON CRYPTOGRAPHY
CYPHERPUNKS & CYBERCOPS
REGULATION OF ISPs
SPAMMING
INFOWAR
INTELLECTUAL PROPERTY AND INFO-PROPERTY
THE 1996 ELECTIONS: CREATING A NEW DEMOCRACY
THE COMING COLLAPSE OF THE NET

CFP'97 will feature parallel-track lunchtime workshops during the
main conference on topics including:

THE CASE AGAINST PRIVACY HOW A SKIPTRACER OPERATES
CYBERBANKING HOW THE ARCHITECTURE REGULATES
RIGHTS IN AVATAR CYBERSPACE NATIONAL I.D. CARDS
PUBLIC KEY INFRASTRUCTURES EUROPEAN IP LAW
SEXUAL HARASSMENT IN CYBERSPACE VIRTUAL COMMUNITIES
DOMAIN NAMES ARCHIVES, INDEXES & PRIVACY
GOVERNMENT REGULATION OF ECASH CRYPTO AND THE 1st AMENDMENT

The conference will also offer a number of in-depth tutorials on
subjects including:

* The Economics of the Internet
* Regulation of Internet Service Providers
* The Latest in Cryptography
* The Constitution in Cyberspace
* Info War: The Day After
* Personal Information and Advertising on the Net
* Transborder Data Flows and the Coming European Union
* Intellectual Property Rights on the Net: A Primer


INFORMATION

A complete conference brochure and registration information are
available on our web site at: http://www.cfp.org

For an ASCII version of the conference brochure and registration
information, send email to: cfpinfo@cfp.org

For additional information or questions, call: 415-548-2424


&&&&&&&&&&&&&&&&&&&&


An old languange teachers' joke:
They call people who can speak three languages, "tri-lingual."
They call people who can speak two languages, "bi-lingual."
But the call people who can speak only one language, "American."

------------------------------

Date: Tue, 14 Jan 1997 08:43:52 -0800 (PST)
From: Declan McCullagh <declan@well.com>
Subject: 7--ALA/ACLU file lawsuit challenging New York "CDA" law

From - fight-censorship@vorlon.mit.edu

[Visit netlynews.com for the rest of the story. Another reason to follow
the New York case is that a successful challenge to its "harmful to
minors" ban could create a useful precedent in fighting a CDA 2.0, which
likely will have such language. --Declan]

***********

The Netly News Network
http://netlynews.com

A Civil (Libertarian) War
by Declan McCullagh (declan@well.com)
January 14, 1997

On a frosty winter morning last February, Shabbir Safdar and a
gaggle of VTW loyalists trekked to Albany, New York, to protest a
state bill that would muzzle the Net. "This was our first time doing
any state-level lobbying," Safdar says. "We managed to convince them
to take some stuff out of the law." But his efforts didn't stop the
measure from wending its way through the legislature: In September,
Governor George Pataki signed it into law.

Today the ACLU sued New York State in federal court, charging that
the law is unconstitutional. New York now takes its place among two
dozen states battling similar local legislation that would criminalize
certain forms of Net speech. In Georgia, for instance, merely having
an anonymous user name could be illegal. Virginia restricts state
employees' rights to view sexually explicit material -- college
professors who might want to use the Net in, say, an English lit class
have to exercise extreme caution. Forget the Communications Decency
Act: A kind of civil war is being waged across half the U.S.

The ALA v. Pataki lawsuit, filed in the Southern District of New
York, involves 14 plaintiffs including the American Library
Association, the American Booksellers Association Foundation for Free
Expression, Panix, Echo and the ACLU. The coalition, which is asking
for a permanent injunction, maintains that the law unconstitutionally
stifles online speech and unduly interferes with interstate commerce.
The law amends the penal code by making it a criminal offense
punishable by seven years in prison to distribute pictures or text
"which (are) harmful to minors."

We here at The Netly News are ardent advocates of free speech, of
course -- we held a joint teach-in on the New York law in the fall. So
I spoke to Ann Beeson, a staff attorney at the ACLU, who's spent the
last year attacking other state laws and the CDA in court. Why should
netizens care about this law if they don't live in New York? I asked
her.

"Because New York can extradite you," she replied.

But what if it's not a crime where I live?

"It doesn't make a difference," Beeson said. "There's no question
that New York could try to extradite you if you put up a web site that
has material harmful to minors on it."

[...]

------------------------------

Date: Fri, 17 Jan 1997 18:04:35 -0800 (PST)
From: Declan McCullagh <declan@well.com>
Subject: 8--Enough is Never Enough -- pro-CDA alliances, from TNNN

From - fight-censorship@vorlon.mit.edu

[Attached are two excerpts from the article. For the rest, check out:
http://cgi.pathfinder.com/netly/textonly/1,1035,549,00.html --Declan]

********

The Netly News Network
http://netlynews.com/

Enough Is Never Enough
By Declan McCullagh (declan@well.com)
January 17, 1997

A broad coalition of conservative and anti-pornography groups and
individuals will file legal briefs next Tuesday in the Supreme Court
supporting the government's defense of the Communications Decency Act,
The Netly News has learned.

The alliance includes longtime supporters of the act, such as
Enough is Enough, Focus on the Family, and the National Association of
Evangelicals. Members of Congress will join a separate brief that the
National Law Center for Children and Families is preparing.

But a letter from the attorney representing the coalition asked
the ACLU for permission to file a brief "on behalf of" 59 plaintiffs,
including such unlikely participants as the National Association for
the Advancement of Colored People, PBS, SafeSurf... and Netscape.

Netscape? The company that lobbied against the CDA? A firm with a
reputation of putting their balls on the chopping block when fighting
for Net-issues on Capitol Hill? Netscape was as shocked as I was to
learn about their participation. "It wasn't authorized by me or my
office. This is flabbergasting," Peter Harter, public policy counsel
for Netscape, said. "I'd be crucified if this happened."

[...]

In their brief, which argues sociological rather than legal
points, the groups hope to highlight the "dangers" of pornography
online. They plan to supply the court with "legislative facts" to
support the position Congress took when crafting the bill. The
document also will include statistics discussing the effects of the
Internet on children and the availability of material covered by the
law. (Marty Rimm, where are you now?)

Donna Rice-Hughes from Enough is Enough says: "It discusses three
primary areas of our concern: letting the court know the problems on
the Internet. Adult pornography, indecency, and child porn as well. A
section on the harms of pornography. And a section dealing with the
compliance issues: Is it feasible technically to comply with the CDA?"

[...]

Chris Stamper and Noah Robischon contributed to this report.

------------------------------

Date: Wed, 22 Jan 1997 13:44:14 -0700
From: --Todd Lappin-- <telstar@wired.com>
Subject: 9--SUPREMES: Court Date Set, DoJ Brief Filed

THE CDA DISASTER NETWORK
January 22, 1997


Quietly and without much fanfare, the run-up to the Supreme Court's review
of the Communications Decency Act has now gotten underway.

I have two major pieces of news to report:

First, we now know when we'll have our day in the nation's highest court.

It's official -- on Wednesday March 19, 1997 at 10 AM, the nine justices of
the US Supreme Court will hear oral arguments in the case of Janet Reno,
Attorney General of the United States v. American Civil Liberties Union et
al. Mark your calendars and datebooks, because March 19 will be a watershed
moment in the history of free speech on the Internet.

In another piece of important news, on Tuesday, January 21, 1997 the US
Department of Justice filed their first brief in support of the CDA before
the Supreme Court.

(A full text version of the DoJ brief is available at:
http://www.cdt.org/ciec/SC_appeal/970121_DOJ_brief.html )

I received a copy of the DoJ brief last night, and after spending a few
hours pouring through its 14,000 words, I can promise you that this
document won't win any literary prizes for 1997.

In truth, the thing reads with all the passion of a coroner's report. But
the cold detachment does nothing to diminish the thinness of the
Government's argument that the CDA is fully constitutional and that "there
are no alternatives that would be equally effective in advancing the
Government's interests" in shielding minors from inappropriate material.

Elsewhere, Janet Reno's footsoldiers claim, "Because the CDA's restrictions
are all facially constitutional, and because any infirmity in those
provisions could not justify the [Philadelphia] district court's sweeping
injunction, the district court's judgment should be reversed."

How does the Government reach this stunning conclusion?

It begins with a bizarre argument that censoring the Internet is an
effective way to defend the ideals of the First Amendment. The DoJ brief
says:

"Parents and their children have a First Amendment right to receive
information and acquire knowledge ... and the Internet has unmatched
potential to facilitate that interest. Much of the Internet's potential as
an educational and informational resource will be wasted, however, if
people are unwilling to avail themselves of its benefits because they do
not want their children harmed by exposure to patently offensive sexually
explicit material. The government therefore not only has an especially
strong interest in protecting children from patently offensive material on
the Internet, it has an equally compelling interest in furthering the First
Amendment interest of all Americans to use what has become an unparalleled
educational resource."

In other words, the Government's defense of Internet censorship boils down
to a paternalistic, "tough love" argument that "this hurts me more than it
hurts you."

The DoJ then moves on to cite a 1968 case as justification for the
provisions of the CDA which prohibit the sending of indecent material to
children with knowledge that the recipient is under 18:

"Those provisions are essentially no different from the prohibition on the
sale of indecent material to minors upheld in Ginsberg v. New York. Like
that prohibition, the transmission and specific child provisions [of the
CDA] directly prevent the dissemination of indecent material to children
without prohibiting adult access to that material."

The problem here is that no viable systems currently exist that allow
noncommercial Internet publishers to verify the age of individuals
receiving potentially "indecent" online material. (Consider, for example,
that as the publisher of this mailing list, it is impossible for me to
verify how old you are as you read this message.) The DoJ glosses over this
issue of age verification with a dreamy glance toward the technological
future, saying:

"Those who post indecent material on Web sites for commercial purposes can
ensure that only adults have access to their material by requiring a credit
card number or an adult ID. Similarly, operators of noncommercial Web sites
can use adult verification services for that purpose. There are also ways
to communicate through other Internet applications that would not expose
children to indecency. And, as technology evolves, the opportunities for
adult-to-adult communication of indecent material will expand even further"

What will these "opportunities for adult-to-adult communication" look like?
The DoJ seems to have two scenarios in mind -- both of which seem absurd
when applied to the Internet.

The first assumes that the Internet can be regulated much like broadcast
television. Citing the 1978 Supreme Court case of FCC v. Pacifica, the
brief argues:

"Just as it was constitutional for the FCC to channel indecent broadcasts
to times of the day when children most likely would not be exposed to them,
so Congress could channel indecent communications to places on the Internet
where children are unlikely to obtain them. Indeed, there is a stronger
justification for the display provision than there was for the restriction
approved in Pacifica. The indecency problem on the Internet is much more
pronounced than it is on broadcast stations."

So what is to be done? Here the DoJ moves on to make it's second
assumption -- that censorship will consign all "indecent" online material
to an Internet "red light district" that minors cannot enter. Again
relying on earlier precedents, the DoJ puts forth the idea that:

"City of Renton v. Playtime Theatres, Inc. (1986) and Young v. American
Mini Theatres, Inc. (1976) also support the constitutionality of the [CDA's
provisions which ban the display of "indecent" material in areas where they
can be seen by minors]. In effect, the display provision operates as an
adult "cyberzoning" restriction, very much like the adult theater zoning
ordinances upheld in Renton and Young. Just as the cities of Detroit and
Renton could direct adult theaters away from residential neighborhoods, so
Congress could direct purveyors of indecent material away from areas of
cyberspace that are easily accessible to children."

Of course, the only feasible way to create such a system of "cyberzoning"
would be to deploy a less restrictive system that uses filtering software
to facilitate parental control and shield minors from inappropriate online
material. However, citing the ostensible "wisdom" of Congress, the DoJ
explicitly rejects this approach:

"Congress reasonably determined that commercial software that attempts to
screen out indecent information only partially addresses the problem. Such
software cannot identify all existing sexually explicit sites; it cannot
keep pace with the rapid emergence of numerous new sexually explicit sites;
it places the entire burden on parents; and it is owned by only a small
fraction of Americans."

Finally, the DoJ challenges the Philadelphia court's decision that the
CDA's speech restrictions are unconstitutionally vague. (The CDA, you will
recall, uses criminal penalties to restrict the dissemination of material
that, "in context, depicts or describes, in terms patently offensive as
measured by contemporary community standards, sexual or excretory
activities or organs.")

Does that mean that the CDA's "indecency" provisions effectively ban the
use of George Carlin's so-called "Seven Dirty Words" in cyberspace?
Classic works of literature that contain sexual content? AIDS education
information?

Sure seems that way. Yet the DoJ wants the Supreme Court to pretend
otherwise. They argue:

"The historical meaning of the CDA's indecency definition and the CDA's
legislative history indicate that the kind of graphic pictures that appear
in soft-porn and hard-core porn magazines almost always would be covered,
while material having scientific, educational, or news value almost always
would not be covered. There may be borderline cases in which it is
difficult to determine on which side of the line particular material falls.
But that does not show that the CDA's definition of indecency is
unconstitutionally vague."

We'll see what the Supremes have to say about all this come March.

And in the meantime...

Work the network!

--Todd Lappin-->
Section Editor
WIRED Magazine


+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
This transmission was brought to you by....

THE CDA DISASTER NETWORK

The CDA Disaster Network is a moderated distribution list providing
up-to-the-minute bulletins and background on efforts to overturn the
Communications Decency Act. To subscribe, send email to
<majordomo@wired.com> with "subscribe cda-bulletin" in the message body. To
unsubscribe, send email to <info-rama@wired.com> with "unsubscribe
cda-bulletin" in the message body.

------------------------------

Date: Thu, 15 Dec 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: 10--Cu Digest Header Info (unchanged since 13 Dec, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #9.04
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT