Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 08 Issue 28

  


Computer underground Digest Sun Apr 7, 1996 Volume 8 : Issue 28
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.28 (Sun, Apr 7, 1996)

File 1--Singapore leader condemns Net as porn, bomb-building haven
File 2--Computers, Porn, the Law and the Media (One day in the UK)
File 3--German Internet Update (3/29/96)
File 4--Re: Australia's New South Wales tries net-censorship
File 5--Letter to the Minister of Justice (Canada)
File 6--ACM/IEEE Letter on Crypto
File 7--NETRADIO--"CYBERSPACE LAW for NONLAWYERS" E-Mail Seminar (fwd)
File 8--Formal FCC Complaint Filed Against I-Phone
File 9--Re: Formal FCC Complaint Filed Against I-Phone
File 10--IMPACT: U. Penn on CDA
File 11--Cu Digest Header Info (unchanged since 7 Apr, 1996)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Fri, 8 Mar 1996 02:57:14 -0500 (EST)
From: "Declan B. McCullagh" <declan+@CMU.EDU>
Subject: File 1--Singapore leader condemns Net as porn, bomb-building haven

ASEAN members include Malaysia, the Philippines, Thailand, Singapore,
Brunei, Indonesia and Vietnam. So if I'm keeping track properly, China,
the U.S., the E.C., Middle Eastern nations, and ASEAN all have said they
want greater controls on the Net. The unanimity is amazing.

Also today, Reuters reports that the first Sri Lankan cybercafes are opening
up...

-Declan

---------- Forwarded message begins here ----------

March 7, 1996

SINGAPORE (Reuter) - ASEAN information ministers warned
Thursday there was a dark side to the information technology
revolution and agreed to establish a regulatory body to oversee
the Internet invasion.
A joint press statement issued by the ministers said they
would set up the regulatory body by the end of the year to come
up with ``appropriate responses'' to the Internet.

[...]

The ministers earlier expressed concern about pornographic
content in cyberspace and information on the Internet that could
spread racial and religious tension within their countries.

------------------------------

Date: Tue, 2 Apr 1996 14:39:14 -0600
From: David G. Bell <dbell@zhochaka.demon.co.uk>
Subject: File 2--Computers, Porn, the Law and the Media (One day in the UK)

Computers, Pornography, the Law, and the Media -- One Day in the UK.

Today, the 2nd of April 1996, British Police forces raided 40 houses
looking for child pornography. In a court in Birmingham, two men plead
guilty when a judge ruled that computer images were photographs. And,
somehow, BBC Radio News managed to combine these two stories into the
usual 'Internet Pornography' story, despite a police denial that
computers were involved in the first story.

In fact, it was said by one police officer that video recordings were
the most common sort of material they encountered. Oddly enough, the
only recording medium mentioned in the news bulletins were 'computer
disks', while a longer report managed to bring in the Internet and
involve the 'usual suspects'.

------------------------------

Date: Mon, 1 Apr 1996 19:13:29 -0800 (PST)
From: Declan McCullagh <declan@EFF.ORG>
Subject: File 3--German Internet Update (3/29/96)

I'm cleaning out my mailbox now that I'm back from CFP, and found this. I
heard a common theme from the non-Americans at CFP -- if America, the
world's "freest" country, can engage in online censorship, then so can
they...

-Declan

---------- Forwarded message ----------
Date--Sat, 30 Mar 1996 07:08:14 -0800 (PST)
From--Jay Holovacs <holovacs@styx.ios.com>
Subject--News From Germany


The following is excerpted from Nando News Website, check it out for more
info.
_________________________________________________________________

GERMANY PLANS BILL TO PUNISH INTERNET INDECENCY
___________________________________________________________

Copyright © 1996 Nando.net
Copyright © 1996 Reuter Information Service

BONN (Mar 29, 1996 10:27 a.m. EST) - Germany's justice minister is
planning a new law making clear companies who provide access to the
Internet are not expected to police cyberspace on the lookout for
pornography or neo-Nazi propaganda.

Edzard Schmidt-Jortzig told reporters on Thursday night that firms who
offer a link to the worldwide computer network would only be punished
if they discovered illegal material was available via their service
and did nothing about it.

"Someone who opens a door cannot know what the people who walk through
it are going to be carrying," he said. "And if there were body
searches for everyone going through your door, people would simply
choose to go through another."

...

Internet regulation has been a particularly prickly issue in Germany.
Child pornography investigators searched the Munich offices of access
provider CompuServe in November and found several Internet pages they
considered illegal.

Authorities are also investigating several other online services as
part of a probe into pornographic and neo-Nazi material found on the
Internet.

But so far prosecutors have not been able to bring any charges, partly
because legal experts are unsure where new companies stand under laws
drafted long before they existed.


-----------------------------------------------------------------------
Jay Holovacs <holovacs@ios.com>

------------------------------

Date: Sat, 6 Apr 1996 10:03:30 -0500 (EST)
From: "Declan B. McCullagh" <declan+@CMU.EDU>
Subject: File 4--Re: Australia's New South Wales tries net-censorship

My growing collection of international Net-censorship attempts is at:
http://www.cs.cmu.edu/~declan/zambia/

-Declan

---------- Forwarded message begins here ----------

SYDNEY, April 3 (UPI) -- People will face a maximum penalty of one
year in jail or fines of $7,800 ($10,000 Australian) if caught
transmitting or advertising pornographic material on the Internet, the
New South Wales government announced Tuesday.
Corporations would face stiffer penalties, Attorney General Jeff Shaw
said at a press conference.
Under the state government's tough new legislation soon to be
introduced, it will be illegal to transmit, advertise, permit access to
and retrieve of pornographic material on-line.
The new laws will also cover computer games that include violence and
sexual activity, Shaw said.
He said the move to penalize people who peddle and download porn was
necessary to protect children, but he admitted policing the legislation
could be ``difficult.''

------------------------------

Date: Sun, 17 Mar 1996 23:19:17 -0500
From: Dov Wisebrod <sherlock@io.org>
Subject: File 5--Letter to the Minister of Justice (Canada)

Folks,

The following letter is in the mail.

It is a response to a pending amendment to the Canadian Criminal Code
revising the law of search and seizure of computer systems and data. While
not a Canadian Communications Decency Act, the legislative Bill reflects as
much misunderstanding of computers and computer mediated communication as
the infamous American Act.

The letter was prepared through the combined efforts of Dov Wisebrod, Daniel
Shap, David Fruitman, and John Kingdon. It has been sent to the Minister of
Justice (Hon. Allan Rock), the Department of Justice's advisor on computer
law (Donald Piragoff), the Federal Privacy Commissioner (Bruce Phillips),
and the local Member of Parliament (Tony Ianno).

Please distribute widely.

Dov

----------------------------------------------

The Legal Group for the Internet in Canada
206 St. George St., Suite 603
Toronto, Ontario, Canada M5R 2N6
http://www.io.org/~logic
logic@io.org - (416) 963-9434

March 18, 1996

The Honourable Allan Rock
Minister of Justice
Attorney General of Canada
Department of Justice
239 Wellington Street
Ottawa, Ontario K1A 0H8

Dear Mr. Rock:

Re: Bill C-118
"An Act to amend the Criminal Code and to amend certain other Acts"

The Legal Group for the Internet in Canada ("LoGIC") is a conduit for the
exchange of information and ideas about policies concerning emerging
communication and information technologies. We are devoted to ensuring
informed public, legislative, and regulatory responses to these
technologies, which at present are manifest most profoundly in the Internet.
We want to ensure that new laws and regulations have no detrimental effects
on the free and interactive communication of information.

We are concerned about certain proposed amendments to the Criminal Code
contained within Bill C-118 (as it was identified while passing First
Reading during the last complete session of the Legislature). Our concerns
relate to section 41 of the Bill. Section 41 proposes to amend the existing
Criminal Code section 487, which sets out information required for search
warrants.

For your immediate reference, we have attached to this letter the text of
section 487 as it would appear after being amended. The proposed amendments
are highlighted by capitalization. Our comments and recommendations with
respect to the substance of these provisions follow.

Comments
--------

The proposed amendments would introduce new subsections 487(2.1) and
487(2.2) providing for the search and seizure of computer systems and data.
Our primary concern is that the provisions do not adequately reflect the
complexities of computer use and communication. In particular, the
provisions do not accord with the distributed nature of the medium,
including the distribution of users of a particular computer system and the
distribution of data accessible by the system. The proposed amendments
ignore the globally distributed nature of data and its users.

The new subsection 487(2.1)(a) would provide that a person authorized to
search a computer system for data may use any computer system in the
building "to search any data contained in or available to the computer
system." The quoted language does not distinguish between the two sources
of data. However, there is good reason to treat data available to the
computer system differently from data contained within it. Data available
to the system may be physically located outside of the jurisdiction of the
issuer of the warrant, potentially bringing the persons authorizing and
conducting the search into conflict with foreign law. A similar concern is
identified and addressed in the existing subsection 487(2), which provides
for modified search warrants in circumstances where the subject of the
search "is believed to be in any other territorial division" within Canada.
In the context of the search of a computer system, it is quite probable that
the data available to the computer system includes data located in
jurisdictions outside of Canada. The international nature of the difficulty
calls for a solution beyond that offered by subsection 487(2). It is
necessary to have two distinct sets of provisions, one of which governs the
search of data "contained in" a computer system and another specifically
designed to address the difficulty of searching data "available to" a
computer system. The words "or available to" should be removed from the
proposed amendment to both subsections 487(2.1)(a) and 487(2.2)(a).

In addition, the proposed amendments do not respect the privacy rights of
persons whose data may be contained in or available to the computer system
subject to the search. The disregard for privacy rights may be seen in two
related ways. First, data available to the system may include data
contained in other computer systems and available only by password access to
those other systems. The other computer systems may be within the control,
ownership, and reasonable expectation of privacy of persons unrelated to the
subject and purpose of the search warrant. The provisions thus create a
"backdoor" to search computer systems for which a warrant has not directly
been issued. Similarly, data contained in the computer system may be
subject to the control, ownership, and reasonable expectation of privacy of
other persons. For instance, if the computer system subject to the search
is used to provide an online service to subscribers, it may contain the
private data of those subscribers. This data may include electronic
correspondence or other information sent by the subscribers to others, as
well as electronic information sent by others to the subscribers. Again, a
"backdoor" is created by the new provisions to infringe the reasonable
expectation of privacy of both the sender and the recipient of this
electronic information.

These concerns are intensified by the language of the proposed subsection
487(2.2). The subsection would provide that any warrant authorizing the
search of any building or place also authorizes the search of "any data
contained in or available to" any computer system at that location. The
proposed language explicitly authorizes the search of computer data without
requiring any information to be sworn in support of the reasons for the
search. There is no requirement of any substantive review by a judge
authorizing the search of data. In effect, the proposed subsection creates
a default authorization to search data. Given the problems inherent in any
search involving a computer system, a judicial review of the information
justifying the search of data is essential in all cases. The authorizing
judge must be presented with clear and reasonably precise reasons and
guidelines for the intended search and seizure. This is necessary to ensure
that both the purpose and conduct of the search is justified. In order to
maintain these protective measures in the procedure for authorizing a
search, the proposed default authority must be removed.

Finally, we are concerned about the potential for self-incriminatory
activity by the person whose property is the subject of a search.
Subsection 487(2.1) would authorize the person conducting the search to use
the computer system in order to search, reproduce, and seize data.
Subsection 487(2.2), while similar, would add that the person whose property
is being searched "shall, on presentation of the warrant, permit the person
carrying out the search" to use the computer system. It is unclear from
this language whether the person whose property is being searched is
required to take positive steps to assist the person carrying out the
search. Our concern is that the inherent vagueness of the proposed
provision allows for such an interpretation. If the computer system is
accessible only by first supplying a password, the person may have to supply
it. If the data being searched is encrypted, the person may have to provide
the decryption key. This would amount to being compelled to assist in the
discovery of evidence against oneself, which is inconsistent with the most
fundamental principles of criminal law. The proposed amendment should be
rewritten to remedy its potentially dangerous vagueness.

Recommendations
---------------

o Remove the words "or available to" from the proposed amendment.

o Require a search warrant for a computer system to describe the type of
data authorized to be searched.

o Require a search warrant for data to limit the computer systems
authorized to be searched.

o Do not provide for default authorization to search computer systems.

o Do not compel potentially self-incriminatory activity from the person
whose property is being searched.

Thank you for the time taken to consider our comments and recommendations.
We would be pleased to confer with you further. Daniel Shap, a co-founder
of The Legal Group for the Internet in Canada, has previously commented at
length on this subject. His 1993 paper, entitled "Search and Seizure of
Canadian Computer Environments," was prepared for, and is in the possession
of, Donald Piragoff of the Department of Justice. It is also available on
the Internet's World Wide Web at:
http://www.io.org/~logic/papers/ds-search.htm

The Legal Group for the Internet in Canada may be contacted at the above
street and Internet addresses and telephone number. We look forward to
hearing from you.

Yours very truly,

[Signed]

Dov Wisebrod
L o G I C
The Legal Group for the Internet in Canada

c.c. Donald Piragoff
Department of Justice

Bruce Phillips
Federal Privacy Commissioner

Tony Ianno
Member of Parliament


SECTION 41: INFORMATION FOR SEARCH WARRANTS
-----------------------------------------------

487
---

(1) A justice who is satisfied by information on oath in Form 1 that there
are reasonable grounds to believe that there is in a building, receptacle or
place
(a) anything on or in respect of which any offence against this Act or any
other Act of Parliament has been or is suspected to have been committed,
(b) anything that there are reasonable grounds to believe will afford
evidence with respect to the commission of an offence, or will reveal the
whereabouts of a person who is believed to have committed an offence,
against this Act or any other Act of Parliament, or
(c) anything that there are reasonable grounds to believe is intended to be
used for the purpose of committing any offence against the person for which
a person may be arrested without warrant,

may at any time issue a warrant under his hand authorizing a person named
therein or a peace officer

(d) to search the building, receptacle or place for any such thing and to
seize it, and
(e) subject to any other Act of Parliament, to, as soon as practicable,
bring the thing seized before, or make a report in respect thereof to, the
justice or some other justice for the same territorial division in
accordance with section 489.1.

(2) Where the building, receptacle or place in which anything mentioned in
subsection (1) is believed to be is in any other territorial division, the
justice may issue his warrant in like form modified according to the
circumstances, and the warrant may be executed in the other territorial
division after it has been Endorsed, in Form 28, by a justice having
jurisdiction in that territorial division.

(2.1) A PERSON AUTHORIZED UNDER THIS SECTION TO SEARCH A COMPUTER SYSTEM IN
A BUILDING OR PLACE FOR DATA MAY
(A) USE OR CAUSE TO BE USED ANY COMPUTER SYSTEM AT THE BUILDING OR PLACE TO
SEARCH ANY DATA CONTAINED IN OR AVAILABLE TO THE COMPUTER SYSTEM;
(B) REPRODUCE OR CAUSE TO BE REPRODUCED ANY DATA IN THE FORM OF A PRINT-OUT
OR OTHER INTELLIGIBLE OUTPUT;
(C) SEIZE THE PRINT-OUT OR OTHER OUTPUT FOR EXAMINATION OR COPYING; AND
(D) USE OR CAUSE TO BE USED ANY COPYING EQUIPMENT AT THE PLACE TO MAKE
COPIES OF THE DATA.

(2.2) EVERY PERSON WHO IS IN POSSESSION OR CONTROL OF ANY BUILDING OR PLACE
IN RESPECT OF WHICH A SEARCH IS CARRIED OUT UNDER THIS SECTION SHALL, ON
PRESENTATION OF THE WARRANT, PERMIT THE PERSON CARRYING OUT THE SEARCH
(A) TO USE OR CAUSE TO BE USED ANY COMPUTER SYSTEM AT THE BUILDING OR PLACE
TO SEARCH ANY DATA CONTAINED IN OR AVAILABLE TO THE COMPUTER SYSTEM FOR DATA
THAT THE PERSON IS AUTHORIZED BY THIS SECTION TO SEARCH FOR;
(B) TO OBTAIN A HARD COPY OF THE DATA AND TO SEIZE IT; AND
(C) TO USE OR CAUSE TO BE USED ANY COPYING EQUIPMENT AT THE PLACE TO MAKE
COPIES OF THE DATA.

(3) A search warrant issued under this section may be in the form set out as
Form 5 in Part XXVIII, varied to suit the case.

(4) An endorsement that is made on a warrant as provided for in subsection
(2) is sufficient authority to the peace officers or the persons to whom it
was originally directed and to all peace officers within the jurisdiction of
the justice by whom it is endorsed to execute the warrant and to deal with
the things seized in accordance with section 489.1 or as otherwise provided
by law.

(6) Subsections 487(2) and (4) apply, with such modifications as the
circumstances require, to a warrant issued under subsection (1).

------------------------------

Date: 1 Apr 1996 16:25:03 -0500
From: "Dave Banisar" <banisar@EPIC.ORG>
Subject: File 6--ACM/IEEE Letter on Crypto

Reply to: ACM/IEEE Letter on Crypto


Association For Computing Machinery
Office of US Public Policy
666 Pennsylvania Avenue SE
Suite 301
Washington, DC 20003 USA
(tel) 202/298-0842 (fax) 202/547-5482

Institute of Electronics and Electrical Engineers
United States Activities
1828 L Street NW
Suite 1202
Washington, DC 20036-5104 USA
(tel) 202/785-0017 (fax) 202/785-0835

April 2, 1996

Honorable Conrad Burns
Chairman, Subcommittee on Science, Technology and Space
Senate Commerce, Science and Transportation Committee
US Senate SD-508
Washington, DC 20510

Dear Chairman Burns:

On behalf of the nation's two leading computing and engineering
associations, we are writing to support your efforts, and the efforts of
the other cosponsors of the Encrypted Communications Privacy Act, to
remove unnecessarily restrictive controls on the export of encryption
technology. The Encrypted Communications Privacy Act sets out the
minimum changes that are necessary to the current export controls on
encryption technology. However, we believe that the inclusion of issues
that are tangential to export, such as key escrow and encryption in
domestic criminal activities, is not necessary. The relaxation of
export controls is of great economic importance to industry and users,
and should not become entangled in more controversial matters.

Current restrictions on the export of encryption technology harm
the interests of the United States in three ways: they handicap American
producers of software & hardware, prevent the development of a secure
information infrastructure, and limit the ability of Americans using new
online services to protect their privacy. The proposed legislation will
help mitigate all of these problems, though more will need to be done to
assure continued US leadership in this important hi-tech sector.

Technological progress has moved encryption from the realm of
national security into the commercial sphere. Current policies, as well
as the policy-making processes, should reflect this new reality. The
legislation takes a necessary first step in shifting authority to the
Commerce Department and removing restrictions on certain encryption
products. Future liberalization of export controls will allow Americans
to excel in this market.

The removal of out-dated restrictions on exports will also enable
the creation of a Global Information Infrastructure sufficiently secure
to provide seamless connectivity to customers previously unreachable by
American companies. The United States is a leader in Internet
commerce. However, Internet commerce requires cryptography. Thus
American systems have been hindered by cold-war restraints on the
necessary cryptography as these systems have moved from the laboratory
to the marketplace. This legislation would open the market to secure,
private, ubiquitous electronic commerce. The cost of not opening the
market may include the loss of leadership in computer security
technologies, just at the time when Internet users around the world will
need good security to launch commercial applications.

For this legislation to fulfill its promise the final approval of
export regulations must be based on analysis of financial and commercial
requirements and opportunities, not simply on the views of experts in
national security cryptography. Therefore, we urge you to look at ways
to further relax restrictive barriers.

Finally, the legislation will serve all users of electronic
information systems by supporting the development of a truly global
market for secure desktop communications. This will help establish
private and secure spaces for the work of users, which is of particular
interest to the members of the IEEE/USA and the USACM.

On behalf of the both the USACM and the IEEE/USA we look forward
to working with you on this important legislation to relax export
controls and promote the development of a robust, secure, and reliable
communications infrastructure for the twenty-first century.

Please contact Deborah Rudolph in the IEEE Washington Office at
(202) 785-0017 or Lauren Gelman in the ACM Public Policy Office at (202)
298-0842 for any additional information.


Sincerely,


Barbara Simons, Ph.D.3
Chair, U.S. Public Policy
Committee of ACM


Joel B. Snyder, P.E.
Vice President, Professional Activities and
Chair, United States Activities Board

cc: Members of the Subcommittee on
Science, Technology and Space

------------------------------

Date: Fri, 22 Mar 1996 08:43:12 -0600
From: Michael Lazar <d10mhl1@corn.cso.niu.edu>
Subject: File 7--NETRADIO--"CYBERSPACE LAW for NONLAWYERS" E-Mail Seminar (fwd)

Thought this would be of interest to many of you...

---------- Forwarded message ----------
Date--Wed, 20 Mar 1996 09:11:22 EST -0500
From--Chuck Poulton <poulton@wksu.kent.edu>

------- Forwarded Message Follows -------

Prof. Larry Lessig, University of Chicago Law School
Prof. David Post, Georgetown University Law Center
Prof. Eugene Volokh, UCLA School of Law
and the Cyberspace Law Institute and Counsel Connect present

************** CYBERSPACE LAW for NONLAWYERS **************

a FREE e-mail Internet seminar
(one message every 2-3 days)
Over 8000 subscribers already

* Learn the basic principles of -- and unlearn some common
myths about --
- copyright law,
- free speech law,
- libel law,
- privacy law,
- contract law, and
- trademark law
as they apply on the Net, from three of the top experts in
the law of cyberspace.

* The seminar is aimed at educated laypeople, not primarily at
lawyers. Low on legalese and Latin.

* This is a low-traffic distribution list, NOT a discussion
list. Subscribers will get one message (a few paragraphs
long) every few days.

* The seminar will start in April or May, but you should sign
up now -- send a message with the text

SUBSCRIBE CYBERSPACE-LAW yourfirstname yourlastname

to LISTPROC-REQUEST@COUNSEL.COM


****************************************************************

Larry Lessig clerked for U.S. Supreme Court Justice Antonin
Scalia, and now teaches constitutional law and the law of
cyberspace. He's written about law and cyberspace for the
Yale Law Journal and the University of Chicago Legal Forum
(forthcoming).

David Post practiced computer law for six years, then clerked
for U.S. Supreme Court Justice Ruth Bader Ginsburg, and now
teaches constitutional law, copyright law, and the law of
cyberspace. He's written about law and cyberspace for the
University of Chicago Legal Forum (forthcoming) and the Journal
of Online Law, and writes a monthly column on law and
technology issues for the American Lawyer.

Eugene Volokh worked as a computer programmer for 12 years,
and is still partner in a software company that sells the
software he wrote for the Hewlett-Packard Series 3000. He
clerked for U.S. Supreme Court Justice Sandra Day O'Connor, and
now teaches constitutional law and copyright law. He's written
about law and cyberspace for the Yale Law Journal, Stanford Law
Review, Michigan Law Review (forthcoming), and the University
of Chicago Legal Forum (forthcoming).

------------------------------

Date: Sun, 31 Mar 1996 21:46:53 +4200 (CST)
From: "Bob Izenberg" <bei@AUSTIN.AUS.SIG.NET>
Subject: File 8--Formal FCC Complaint Filed Against I-Phone

# ACTA Internet Phone Petition (RM No. 8775)
#
# BEFORE THE FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554
#
# In the Matter of
#
# THE PROVISION OF INTERSTATE AND INTERNATIONAL INTEREXCHANGE
# TELECOMMUNICATIONS SERVICE VIA THE "INTERNET" BY NON-TARIFFED,
# UNCERTIFIED ENTITIES

Is the whole ACTA complaint based on the marketing of this
category of software as an "Internet telephone"? If the phone
analogy is the one that we go with in evaluating the merits of
the ACTA position, to which part of the regulated telephone
network does the Internet Phone software correspond? It is
not the service, for the software providers have no responsibility
for actual transmission of voice traffic. It is not the telephone
network, for the transmission facilities used by the software are
provided by third parties who have no business relationship with
the software providers. If we look for what part of the physical
telephone world is close in function to the software to which the
ACTA objects, it is the telephone set itself. It, coupled with
the computer upon which it runs, places calls which cannot be
completed without substantial support hardware and software
provided by other companies and organizations. It does not
seem to be a long distance offering in the sense that AT&T,
Sprint, MCI, and other traditional long distance companies
are.... Not unless you do not differentiate between the
Internet Phone software itself and the mechanisms that carry
the information which it exchanges.

------------------------------

Date: Wed, 3 Apr 1996 13:44:13 -0800
From: Barry Gold <barry@locus.com>
Subject: File 9--Re: Formal FCC Complaint Filed Against I-Phone

It strikes me that respondents in this rulemaking have two good,
simple, responses:

1. We're not selling phone services, we're selling "phones". As far
as I know, these companies charge nothing for calls, they simply sell
(or rent) their software for a fixed price. The software runs on
standard equipment, connecting to existing wiring (telephone modem,
ISDN, or T1/2/3 link). This makes it phone equipment -- it attaches
to existing lines -- not service.

2. Assuming they lose and the FCC issues the ruling requested by the
ATCA:
Surprise! We've put our software in the public domain! It's now
available on all SimTel mirrors and on sites in the UK, France,
Australia, Finland, etc.

(In other words, you can shut us down, but it won't stop the s/w
from being used and in fact it will be used more widely as
freeware than ever before! Kill us and our death spasms will
injure you more than we ever did alive.)

Now obviously, outcome 1 is preferred, for several reasons:

a. It allows I-Phone, etc. to continue making money to support further
development and support of their software. In the longer run, all
products need support and extensions to continue to exist in the
marketplace.

b. Response 2 would damage the phone companies, but would also remove
the incentive for anybody else to enter the market.

Unfortunately, there are some providers who can't use response #1 as
an escape, because they provide connection to the local phone network
at the other end, rather than just selling/renting ("licensing")
software. But maybe some creative soul on this list can figure out a
way for them to beat this rap, too.

------------------------------

Date: Wed, 21 Feb 1996 11:54:11 -0800 (PST)
From: telstar@WIRED.COM(--Todd Lappin-->)
Subject: File 10--IMPACT: U. Penn on CDA

Witness the dread "chilling effect."

This letter from Stanley Chodorow, Provost at the University of
Pennsylvania, demonstrates the tough position that many university
administrators now find themselves in as a result of the Communications
Decency Act.

Almost reluctantly, Provost Chodrow points out, "Members of the Penn
community should be aware that although enforcement of the 'indecency'
provision is temporarily barred, the bill's other provisions are and will
remain in effect unless overturned or repealed. Those provisions subject
violators to substantial criminal penalties. Individuals or institutions
that make information or materials available on electronic networks have
an obligation to comply with the statute."

The full text of Chodorow's letter follows below.

--Todd Lappin-->
Section Editor
WIRED Magazine

===============================================


To the Penn community:

Recent federal legislation has significant implications for all members of
the Penn community who use telecommunications or electronic networks. The
Telecommunications Act of 1996 , signed into law by President Clinton on
February 8, includes provisions, known as the Communications Decency Act,
that prohibit dissemination of certain materials to persons under the age
of 18.

One provision prohibits using a telecommunications device to make and
transmit any "obscene or indecent" communication to anyone known to be
under 18. Another prohibits using any "interactive computer service" to
display, in a manner available to anyone under 18, any communication that,
"in context, depicts or describes, in terms patently offensive as measured
by contemporary community standards, sexual or excretory activities or
organs." While the terms "indecent" and "patently offensive" are not
defined in the law and their meaning is unclear, the terms may be
construed to include materials with literary, scientific, artistic, or
educational value.

The constitutionality of these provisions has been challenged in Federal
court on the grounds that they prohibit speech protected by the First
Amendment and are impermissibly vague and overbroad. The court has entered
an order that temporarily bars enforcement of the prohibition against
"indecent" communications, but the order does not bar enforcement of the
Act's other provisions. Penn believes the constitutional challenges are
important and should be resolved quickly, because we believe the Act may
chill the free exchange of ideas and information that is central to the
University's mission. It may also significantly restrict the development
and usefulness of new forms of electronic communication.

Members of the Penn community should be aware, however, that although
enforcement of the "indecency" provision is temporarily barred, the bill's
other provisions are and will remain in effect unless overturned or
repealed. Those provisions subject violators to substantial criminal
penalties. Individuals or institutions that make information or materials
available on electronic networks have an obligation to comply with the
statute. Individuals who distribute information through the University's
computing resources are responsible for the content they provide and may
wish to evaluate the material they make available in light of the Act's
requirements. The University is unable to prevent information that is
posted to publicly accessible resources, such as newsgroups and homepages,
from becoming available to persons under the age of 18.

We regret the uncertainty and disruption caused by this legislation and
will try to keep you informed (via Almanac and the University's home
page on the WorldWideWeb) of significant developments as they occur.

Stanley Chodorow
Provost

------------------------------

Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 11--Cu Digest Header Info (unchanged since 7 Apr, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #8.28
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT