Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 09 Issue 91
Computer underground Digest Wed Dec 17, 1997 Volume 9 : Issue 91
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #9.91 (Wed, Dec 17, 1997)
File 1--Text of S 1482: "No Electronic Theft Act"
File 2--Internet Risks and Liability
File 3--Policy Post 3.15 -- CDT, EFF, CPSR Call on FCC to Protect
File 4--The Big Lie : AAS editorial on "Cyberspace Issues"
File 5--Computer humor
File 6--Cu Digest Header Info (unchanged since 7 May, 1997)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Fri, 28 Nov 1997 14:54:12 -0800 (PST)
From: CuDigest <cudigest@sun.soci.niu.edu>
Subject: File 1--Text of S 1482: "No Electronic Theft Act"
((Moderators' Note: Thanks to the person who sent this over
(but who's address was garbled on arrival)).
Union Calendar No. 198
105th CONGRESS
1st Session
A BILL
To amend the provisions of titles 17 and 18, United States Code, to
provide greater copyright protection by amending criminal copyright
infringement provisions, and for other purposes.
October 23, 1997
Reported with an amendment, committed to the Committee of the Whole
House on the State of the Union, and ordered to be printed
HR 2265 RH
105th CONGRESS
1st Session
[Report No. 105-339]
To amend the provisions of titles 17 and 18, United States Code, to
provide greater copyright protection by amending criminal copyright
infringement provisions, and for other purposes.
IN THE HOUSE OF REPRESENTATIVES
July 25, 1997
Mr. GOODLATTE (for himself, Mr. COBLE, Mr. FRANK of Massachusetts,
and Mr. CANNON) introduced the following bill; which was
referred to the Committee on the Judiciary
October 23, 1997
Additional sponsors: Mr. DELAHUNT, Mr. GALLEGLY, and Mr. Clement
October 23, 1997
Reported with an amendment, committed to the Committee of the Whole
House on the State of the Union, and ordered to be printed
[STRIKE OUT ALL AFTER THE ENACTING CLAUSE AND INSERT THE PART
PRINTED IN ITALIC]
[FOR TEXT OF INTRODUCED BILL, SEE COPY OF BILL AS INTRODUCED ON
JULY 25, 1997]
A BILL
To amend the provisions of titles 17 and 18, United States Code, to
provide greater copyright protection by amending criminal copyright
infringement provisions, and for other purposes.
[Italic->] Be it enacted by the Senate and House of
Representatives of the United States of America in Congress
assembled, [<-Italic]
SECTION 1. SHORT TITLE.
This Act may be cited as the `No Electronic Theft (NET) Act'.
SEC. 2. CRIMINAL INFRINGEMENT OF COPYRIGHTS.
(a) DEFINITION OF FINANCIAL GAIN- Section 101 of title 17, United
States Code, is amended by inserting after the undesignated
paragraph relating to the term `display', the following new
paragraph:
`The term `financial gain' includes receipt, or expectation
of receipt, of anything of value, including the receipt of
other copyrighted works.'.
(b) CRIMINAL OFFENSES- Section 506(a) of title 17, United States
Code, is amended to read as follows:
`(a) CRIMINAL INFRINGEMENT- Any person who infringes a copyright
willfully either--
`(1) for purposes of commercial advantage or private
financial gain, or
`(2) by the reproduction or distribution, including by
electronic means, during any 180-day period, of 1 or more
copies or phonorecords of 1 or more copyrighted works, which
have a total retail value of more than $1,000,
shall be punished as provided under section 2319 of title 18.'.
(c) LIMITATION ON CRIMINAL PROCEEDINGS- Section 507(a) of title
17, United States Code, is amended by striking `three' and
inserting `5'.
(d) CRIMINAL INFRINGEMENT OF A COPYRIGHT- Section 2319 of title
18, United States Code, is amended--
(1) in subsection (a), by striking `subsection (b)' and
inserting `subsections (b) and (c)';
(2) in subsection (b)--
(A) in the matter preceding paragraph (1), by striking
`subsection (a) of this section' and inserting `section
506(a)(1) of title 17'; and
(B) in paragraph (1)--
(i) by inserting `including by electronic means,'
after `if the offense consists of the reproduction or
distribution,'; and
(ii) by striking `with a retail value of more than
$2,500' and inserting `which have a total retail value
of more than $2,500'; and
(3) by redesignating subsection (c) as subsection (e) and
inserting after subsection (b) the following:
`(c) Any person who commits an offense under section 506(a)(2) of
title 17--
`(1) shall be imprisoned not more than 3 years, or fined in
the amount set forth in this title, or both, if the offense
consists of the reproduction or distribution of 10 or more
copies or phonorecords of 1 or more copyrighted works, which
have a total retail value of $2,500 or more;
`(2) shall be imprisoned not more than 6 years, or fined in
the amount set forth in this title, or both, if the offense is
a second or subsequent offense under paragraph (1); and
`(3) shall be imprisoned not more than 1 year, or fined in
the amount set forth in this title, or both, if the offense
consists of the reproduction or distribution of 1 or more
copies or phonorecords of 1 or more copyrighted works, which
have a total retail value of more than $1,000.
`(d)(1) During preparation of the presentence report pursuant to
Rule 32(c) of the Federal Rules of Criminal Procedure, victims of
the offense shall be permitted to submit, and the probation officer
shall receive, a victim impact statement that identifies the victim
of the offense and the extent and scope of the injury and loss
suffered by the victim, including the estimated economic impact of
the offense on that victim.
`(2) Persons permitted to submit victim impact statements shall
include--
`(A) producers and sellers of legitimate works affected by
conduct involved in the offense;
`(B) holders of intellectual property rights in such works; and
`(C) the legal representatives of such producers, sellers,
and holders.'.
(e) UNAUTHORIZED FIXATION AND TRAFFICKING OF LIVE MUSICAL
PERFORMANCES- Section 2319A of title 18, United States Code, is
amended--
(1) by redesignating subsections (d) and (e) as subsections
(e) and (f), respectively; and
(2) by inserting after subsection (c) the following:
`(d) VICTIM IMPACT STATEMENT- (1) During preparation of the
presentence report pursuant to Rule 32(c) of the Federal Rules of
Criminal Procedure, victims of the offense shall be permitted to
submit, and the probation officer shall receive, a victim impact
statement that identifies the victim of the offense and the extent
and scope of the injury and loss suffered by the victim, including
the estimated economic impact of the offense on that victim.
`(2) Persons permitted to submit victim impact statements shall
include--
`(A) producers and sellers of legitimate works affected by
conduct involved in the offense;
`(B) holders of intellectual property rights in such works; and
`(C) the legal representatives of such producers, sellers,
and holders.'.
(f) TRAFFICKING IN COUNTERFEIT GOODS OR SERVICES- Section 2320 of
title 18, United States Code, is amended--
(1) by redesignating subsections (d) and (e) as subsections
(e) and (f), respectively; and
(2) by inserting after subsection (c) the following:
`(d)(1) During preparation of the presentence report pursuant to
Rule 32(c) of the Federal Rules of Criminal Procedure, victims of
the offense shall be permitted to submit, and the probation officer
shall receive, a victim impact statement that identifies the victim
of the offense and the extent and scope of the injury and loss
suffered by the victim, including the estimated economic impact of
the offense on that victim.
`(2) Persons permitted to submit victim impact statements shall
include--
`(A) producers and sellers of legitimate goods or services
affected by conduct involved in the offense;
`(B) holders of intellectual property rights in such goods or
services; and
`(C) the legal representatives of such producers, sellers,
and holders.'.
(g) DIRECTIVE TO SENTENCING COMMISSION- (1) Under the authority
of the Sentencing Reform Act of 1984 (Public Law 98-473; 98 Stat.
1987) and section 21 of the Sentencing Act of 1987 (Public Law
100-182; 101 Stat. 1271; 18 U.S.C. 994 note) (including the
authority to amend the sentencing guidelines and policy
statements), the United States Sentencing Commission shall ensure
that the applicable guideline range for a defendant convicted of a
crime against intellectual property (including offenses set forth
at section 506(a) of title 17, United States Code, and sections
2319, 2319A, and 2320 of title 18, United States Code) is
sufficiently stringent to deter such a crime and to adequately
reflect the additional considerations set forth in paragraph (2) of
this subsection.
(2) In implementing paragraph (1), the Sentencing Commission
shall ensure that the guidelines provide for consideration of the
retail value and quantity of the items with respect to which the
crime against intellectual property was committed.
SEC. 3. INFRINGEMENT BY UNITED STATES.
Section 1498(b) of title 28, United States Code, is amended by
striking `remedy of the owner of such copyright shall be by action'
and inserting `action which may be brought for such infringement
shall be an action by the copyright owner'.
SEC. 4. CLARIFICATION OF LIABILITY FOR COPYRIGHT INFRINGEMENT.
Except as expressly provided in this Act, nothing in this Act or
the amendments made by this Act modifies liability for copyright
infringement, including the standard of willfulness for criminal
infringement.
------------------------------
Date: Wed, 17 Dec 1997 14:38:56 -0500 (EST)
From: Steve Worona <slw1@cornell.edu>
Subject: File 2--Internet Risks and Liability
INTERNET RISKS AND LIABILITY
An Intensive One-Day Workshop
Los Angeles, California
January 30, 1998
(See bottom of this memo for additional dates and locations.)
WHO SHOULD ATTEND:
* Webmasters
* Web-content developers
* Lawyers
* Risk managers
* Librarians
* Judicial administrators
* Public relations directors
TOPICS:
The Internet
* What's the Internet all about?
* Live demonstrations and examples
* Today's technology: capabilities and challenges
* Why traditional computer security isn't enough
Computer Law and Policy
* How to avoid liability
* Recent cases and legislation
* Developing effective policies and practices
* Common mistakes and how to avoid them
* Policy pros and cons
Key Areas of Potential Liability
* Copyright
* Public information and privacy
* Defamation and harassment
* Pornography, obscenity, and indecency
When Precautions Fail
* Your rights and responsibilities
* Gathering evidence without compromising prosecution
* Taking preemptive action
* Working cooperatively with law enforcement
INVITATION
from Charles W. Jermy, Associate Dean
Cornell School of Continuing Education and Summer Sessions
As you know well, colleges and universities are in the midst of an
information technology revolution. Faculty, staff, students, alumni,
and the general public are using information resources and technologies
in new and transforming ways. The Internet and the World Wide Web have
become indispensable tools, not just for research and instruction, but
for numerous business functions as well: admissions, grade reporting,
student services, public information, development, and much more.
As we rely on the Web to share information with individuals both inside
and outside our organizations, we also take on a new spectrum of risks
and liabilities. Those who depend on information technology to do
their jobs need guidance on the often very confusing legal requirements
governing that technology. The Internet Risks and Liability Workshop
is an intensive one-day program that identifies the most effective
procedures for ensuring the legal and ethical use of the Internet for a
variety of business purposes.
The presenters explain -- in non-technical, jargon-free language -- how
the Internet really works and what the relevant laws mean. They
highlight current legislation and case law, illustrated by live
Internet demonstrations. They also describe effective practices for
limiting institutional risk and liabilities, while upholding the
principles of intellectual property and free expression. The program
concludes with guidance on developing institution-specific Internet
policies and practicies.
As never before, information technology professionals, legal counsel,
and policy makers must work together to determine the steps our
institutions should take to thrive in the Information Age. I hope you
will plan on participating in the program.
PRESENTERS
Marjorie W. Hodges, J.D.
Policy Advisor, Office of Information Technologies, and Director,
Computer Policy and Law Program, Cornell University
Marjorie W. Hodges is a frequent speaker on the legal and ethical
aspects of computer policies. A contributing editor of the national
quarterly Synthesis: Law and Policy in Higher Education, Ms. Hodges is
recognized as a national authority in the field of computer policy and
law. She is the leader of the CAUSE Policy Constituent Group and is a
contributing author of the monograph "Contemporary Issues in Judicial
Affairs," in which she addresses First Amendment issues and computer
policy in higher education.
Steven L. Worona
Assistant to the Vice President for Information Technologies, and
Director, Computer Policy and Law Program, Cornell University
Steven L. Worona has worked in the field of computer-mediated
information storage and delivery for over twenty-five years. Mr.
Worona is the creator of Cornell's CUinfo, the first campus-wide
information system. He was also a principal developer of the PL/C
compiler at Cornell, and of the XCELL+ factory simulation system
marketed commercially by Express Software Products, Inc. Mr. Worona
serves on a wide variety of technical committees and task forces in the
academic computing field and has spoken and consulted internationally
on current applications and future trends in computer-based
communication.
Hodges and Worona are the authors of "Legal Underpinnings for Creating
Campus Computer Policy" and "The First Amendment in Cyberspace," both
published recently in CAUSE/EFFECT magazine.
PROGRAM INFORMATION
Internet Risks and Liability will be held in the Sheraton Gateway Hotel
at 6101 West Century Boulevard, Los Angeles, California, which is
conveniently located next to the Los Angeles International Airport.
Participants should plan to arrive for registration on Friday, January
30, at 8:00 a.m. and to leave no earlier than 5:00 p.m.
The program charge for Internet Risks and Liability is $475. This
includes course materials, continental breakfast, and refreshment
breaks. Continuing Education Units (CEUs) will be available to program
participants. Please register early to secure a space in the workshop
as enrollment is limited. Persons whose cancellations are received in
writing by January 15 will receive a full refund. Cancellations
received after January 15 are subject to a $100 cancellation fee.
Substitutions may be made prior to January 27.
For additional information and application forms, please call (607)
255-7259 or e-mail us at cusp@cornell.edu. See also
<http://www.sce.cornell.edu/html/irl.html>
ACCOMMODATIONS
Participants should make their own reservations by calling the Sheraton
Gateway Hotel directly at (310) 642-1111. Please indicate that you
will be attending Internet Risks and Liability in order to qualify for
the special rate of $99 per night (single or double occupancy). Early
reservations are recommended. Room availability and rates cannot be
guaranteed after January 8. Twenty-four-hour airport shuttle service
is available.
ADDITIONAL DATES AND LOCATIONS
February 16, 1998 Chapel Hill, NC
March 25, 1998 Baltimore, MD
April 24, 1998 Dallas, TX
The 3-day Computer Policy and Law Annual Seminar will take place at
Cornell University (Ithaca, NY) on July 8-10, 1998.
------------------------------
Date: Tue, 16 Dec 1997 10:15:28 -0500
From: Graeme Browning <gbrowning@CDT.ORG>
Subject: File 3--Policy Post 3.15 -- CDT, EFF, CPSR Call on FCC to Protect
The Center for Democracy and Technology /____/ Volume 3, Number 15
---------------------------------------------------------------
A briefing on public policy issues affecting civil liberties online
-------------------------------------------------------------
CDT POLICY POST Volume 3, Number 15 Decenber 16, 1997
CONTENTS: (1) Civil Liberties Groups Call on FCC to Protect Privacy, Security
as FBI Pushes Digital Telephony Law
(3) How to Subscribe/Unsubscribe
(4) About CDT, Contacting us
** This document may be redistributed freely with this banner intact **
Excerpts may be re-posted with permission of <gbrowning@cdt.org>
|PLEASE SEE END OF THIS DOCUMENT FOR SUBSCRIPTION INFORMATION|
_______________________________________________________________
(1) CIVIL LIBERTIES GROUPS CALL ON FCC TO PROTECT PRIVACY, SECURITY AS FBI
PUSHES DIGITAL TELEPHONY LAW
Dec. 15 -- Three leading online civil liberties groups have urged the
Federal Communications Commission (FCC) to find that the FBI is trying
improperly to enhance its surveillance capabilities, and is overlooking key
privacy rights, under a controversial 1994 wiretap law.
The Center for Democracy and Technology (CDT), Computer Professionals for
Social Responsibility (CPSR), and the Electronic Frontier Foundation (EFF)
asked the FCC on December 12 to take a more active role in protecting
privacy as telephone companies and the FBI struggle to implement the new
wiretap law. The three groups urged the FCC not to focus solely on
personnel security practices and recordkeeping among the telephone
companies affected by the law, as it has been doing, but instead to broaden
its examination by demanding that the digital technology the companies plan
to use be made tamperproof.
The Comments, along with detailed background information on CALEA, will be
posted soon at http://www.cdt.org/digi_tele/
CALEA BACKGROUND
Congress enacted the Communications Assistance for Law Enforcement Act
(CALEA), more commonly called the "digital telephony" law, in October 1994.
The law requires telecommunications carriers--primarily local telephone
companies and wireless service providers--to upgrade their switching
equipment and computer software so that law enforcement officials can
perform wiretaps and other forms of electronic surveillance despite the
addition of new technologies.
Congress passed CALEA to assuage the concern of law enforcement that new
digital modes of transmitting information could render wiretapping
obsolete. Like so many new technologies, however, digital telephony can be
a boon to the pursuer as well as to the wrongdoer. With digital telephony
law enforcement officials can amass much more detailed information on a
private citizen's calling habits than ever before. The debate over CALEA
depends, at least in part, on whether it will be implemented in a way that
maintains law enforcement's traditional surveillance capabilities, or
whether government will use it as an excuse to exploit the full
surveillance capabilities of digital technology.
Fcc Proceeding Fails To Give Adequate Attention To Privacy
In October, the FCC issued a "Notice of Proposed Rulemaking" seeking
comments from the communications industry, law enforcement agencies and the
public on CALEA. The notice focused almost entirely on two areas: the
telephone companies' recordkeeping and personnel security practices, and
the definition of key terms in the 1994 law. CDT and the other two groups
joining in last Friday's filing argue that the Commission has overlooked
the issue of privacy in its efforts to flesh out the law, despite Congress'
clear directives in the statute that privacy be protected.
While the FCC's proposed rules require more detailed recordkeeping and
background checks on phone company employees, Congress specifically called
for systems designed to protect the privacy of communications not
authorized to be intercepted. In CDT's view, this requires telephone
companies to withhold information which law enforcement doesn't have
specific legal authority to intercept. As telephone companies increasingly
adopt packet switching protocols, the separation of call content from
packet addressing information becomes critical to ensure that law
enforcement doesn't receive call content without probable cause.
IMPLEMENTATION DELAYED
A series of disputes has delayed the implementation of the law. In the past
two years the FBI has twice attempted to draft notices to telephone
companies outlining how many wiretap intercepts they can be required, under
the law, to perform at one time in any given service area. Both of these
drafts have been roundly criticized for proposing a surveillance capacity
that far exceeds traditional law enforcement needs. On the separate
question of capability, the telecommunications industry earlier this year
proposed a compliance standard that calls for switching software upgrades
to make interceptions easier. But the FBI opposed adopting that standard
because it doesn't go far enough to satisfy the Bureau's demands for
enhanced surveillance capabilities. For example, the industry standard
calls for tracking capabilities in wireless telephones. The FBI, however,
wants other features, such as the ability to continue monitoring parties on
a conference call even after the person named in the surveillance order has
left the call. The FBI also wants telecommunications carriers to be
required to provide law enforcement with more detailed information on a
citizen's calling practices.
COMPUTER SECURITY
Computers increasingly control telecommunications switching, and most of
the telephone companies' efforts to comply with CALEA will involve changes
to the software that controls switching within the companies' central
offices. Carriers will soon be establishing computerized surveillance
administration functions, that, in turn, may be networked with other system
administration functions and also linked to computers located outside the
switching office. All in all, the changes could leave the carriers' systems
vulnerable to employees bent on doing mischief, or to malicious hackers.
Because of this possibility, CDT, EFF and CPSR have urged the FCC to
examine the security of these new software protocols. Among the factors
that CDT believes the FCC should require are:
* System integrity. Both hardware and software systems must be tamperproof.
Most systems have a maintenance function that allows "backdoor" access,
which
could be used to subvert the entire system.
* Simple authentication for individual system users. Fixed passwords for user
identification are inherently dangerous because they reside in the system's
memory and can be plucked out by technology-savvy wrongdoers.
* System-to-system authentication. When whole systems within the telephone
industry are networked to each other, it's equally important that each
system
be able to authenticate contact with another system.
* Audit trails which the industry can use to review surveillance activity.
* Intrusion detection programs within the telephone systems themselves which
will help identify when a surveillance technology is being put to an
improper
use.
FOR FURTHER INFORMATION CONTACT:
James X. Dempsey, Staff Counsel, Center for Democracy and Technology
+1.202.637.9800, <jdempsey@cdt.org>
________________________________________________________________
(3) SUBSCRIPTION INFORMATION
Be sure you are up to date on the latest public policy issues affecting
civil liberties online and how they will affect you! Subscribe to the CDT
Policy Post news distribution list. CDT Policy Posts, the regular news
publication of the Center For Democracy and Technology, are received by
more than 13,000 Internet users, industry leaders, policy makers and
activists, and have become the leading source for information about
critical free speech and privacy issues affecting the Internet and other
interactive communications media.
To subscribe to CDT's Policy Post list, send mail to
majordomo@cdt.org
in the BODY of the message (leave the SUBJECT LINE BLANK), type
subscribe policy-posts
If you ever wish to remove yourself from the list, send mail to the
above address with a subject of:
unsubscribe policy-posts
_______________________________________________________________
(4) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING US
The Center for Democracy and Technology is a non-profit public interest
organization based in Washington, DC. The Center's mission is to develop
and advocate public policies that advance democratic values and
constitutional civil liberties in new computer and communications
technologies.
Contacting us:
General information: info@cdt.org
World Wide Web: URL:http://www.cdt.org/
FTP URL:ftp://ftp.cdt.org/pub/cdt/
Snail Mail: The Center for Democracy and Technology
1634 Eye Street NW * Suite 1100 * Washington, DC 20006
(v) +1.202.637.9800 * (f) +1.202.637.0968
------------------------------
Date: Thu, 4 Dec 1997 00:36:07 +0000
From: David Smith <bladex@bga.com>
Subject: File 4--The Big Lie : AAS editorial on "Cyberspace Issues"
Source -- fight-censorship@vorlon.mit.edu
Below is an editorial that ran in Wednesday's Austin American Statesman.
My response letter is appended below, and I encourage other
fight-censorship subscribers to write letters to the editors of their
local newspapers. We can yak to each other till the cows come home
but we need to express our ideas in other forums and other audiences as
well.
There are some things I didn't address in my letter that I want to bring
up online -- namely that the issues of children, adult material, and
filtering is difficult enough without the Statesman deliberately
distorting the experience of what it is like to be online.
Out of the thousands and thousands of websites that I have looked at in
my life I can only remember two instances of "uninvited smut". Once
because I didn't read the preceding link page closely enough and the
second where someone was making the point about how rarely this happens.
Also, being sent an e-mail solicitation to join or look at a sexually
explicit site is not the same as being sent pornography.
Anyone with an e-mail address knows that if there is pornography on your
screen, it's because you took deliberate actions and steps to place it
there. That's what it is like to be online but you would never know
that from reading their editorial page.
Cyberspace issues
Austin American Statesman
Wednesday, December 03, 1997
It is axiomatic that the federal government should tread lightly around
the Internet. The U.S. Supreme Court said so clearly this year in
striking down the Communications Decency Act, Congress' attempt to block
online pornography.
But that doesn't mean the World Wide Web should be a sexual free-fire
zone where anything goes whether you want it or not. Anyone with an
e-mail address can attest to the flood of sexually explicit messages and
solicitations that greet the user nowadays.
A conference in Washington this week is exploring ways to make the
Internet safe for children and adults who wish not to be entertained by
the smut available in cyberspace. They have their work cut out for them
because any screening or rating system is greeted by screeches of
protest from the civil libertarians who won't care what the children
see.
It isn't in the government's interest, and possibly not within its
grasp, to be the online censor. The solution to uninvited smut via
computer should be improving the technology in the marketplace.
Among the issues being explored at the Washington conference are
filtering software and ratings programs. President Clinton has called
for universal self-rating for Internet companies, but that idea has had
a tepid reception so far.
It is in the best interest of the online companies and Internet
providers to offer a filtering system that works. Twice as many
households with children have computers as households without children.
Those families have a vital interest in protecting their children from
the sexually explicit offerings on the Internet.
Free speech critics complain the filtering systems filter too much,
blocking protected speech as well as pornography. Some family-oriented
groups claim they don't filter enough and smut creeps in.
Although self-rating has flopped so far, third-party ratings may hold
the answer for the civil libertarians and those concerned about
pornography online. Under that system, a third-party rates the Web
publishers and the individual user can choose the rating he or she
prefers.
As for the sleazy e-mail messages, Congress is considering bills to make
it a criminal act to offer sexual content to minors through e-mail. That
may or may not pass Supreme Court muster.
But there, too, the answer may lie in improved technology that will
allow those who want everything to get it and those who wish to protect
themselves and their families from sleazy solicitors to do so.
--- end of editorial -----
Letter to the Editorial
December 3, 1997
The computer magazine Family PC recently polled 750 subscribers about
family life online. While a majority expressed concerns about their
children accessing sexually explicit material, 73% of them felt that
monitoring their children's use of the Internet, being involved in their
children's activities, and setting specific rules for participation
would be their approach and strategy to guiding and raising their
children online. This is what parents do in real life.
In your editorial about cyberspace issues, however, the only solutions
to these social and moral issues you think are worth discussing involve
sitting around and waiting for the technology that will save us.
If you truly want to help parents, cut back on the screeching and
fear-mongering about all the bad things that could happen to children
online and replace it with some of the common sense advice available at
sites like Safe Kids Online (http://www.safekids.com) and Netparents
(http://www.netparents.org). You might sell less newspapers but you'll
be doing everyone involved a favor.
* * *
http://www.zdnet.com/familypc/content/kidsafety/results.html -- Family
PC Survey
http://www.io.com/~kinnaman/pchealth/draft.html -- TISPA page on
filtering software & parental guides to the Internet as required by
HB1300.
David Smith
david_smith@unforgettable.com
http://www.realtime.net/~bladex
File under : Internet activist
------------------------------
Date: Tue, 16 Dec 1997 12:19:54 -0600
From: Jerrold Zar <T80JHZ1@WPO.CSO.NIU.EDU>
Subject: File 5--Computer humor
Here's some lunchtime humor I received on an Internet list
from a John Longreco:
~~~ The Techno Terms Dictionary ~~~
486 - The average IQ needed to understand a PC.
State-of-the-art - Any computer you can't afford.
Obsolete - Any computer you own.
Microsecond - The time it takes for your state-of-the-art
computer to become obsolete.
G3 - Apple's new Macs that make you say "Gee, three times
faster than the computer I bought for the same price a
Microsecond ago."
Syntax Error - Walking into a computer store and saying "Hi,
I want to buy a computer and money is no object."
Hard Drive - The sales technique employed by computer
salesmen, esp. after a Syntax Error.
GUI - What your computer becomes after spilling your coffee
on it. (pronounced "gooey")
Keyboard - The standard way to generate computer errors.
Mouse - An advanced input device to make computer errors
easier to generate.
Floppy - The state of your wallet after purchasing a
computer.
Portable Computer - A device invented to force businessmen
to work at home, on vacation, and on business trips.
Disk Crash - A typical computer response to any critical
deadline.
Power User - Anyone who can format a disk from DOS.
System Update - A quick method of trashing ALL of your
software.
------------------------------
Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 6--Cu Digest Header Info (unchanged since 7 May, 1997)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #9.91
************************************