Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 09 Issue 90

  


Computer underground Digest Sun Dec 14, 1997 Volume 9 : Issue 90
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.90 (Sun, Dec 14, 1997)

File 1--Online Copyright Cases Can Simply Be Difficult.
File 2--The Digital Citizen: More Nonsense from *Wired*
File 3--XS4ALL files complaint with Chief Public Prosecu
File 4--"Hackers" hit Yahoo.com - leave "ransom" note
File 5--Mitnick Supporters Deny Yahoo Hack
File 6--Child Protection and Parental Empowerment / Interactive Media
File 7--Technological Breakthrough (humor)
File 8--Cu Digest Header Info (unchanged since 7 Dec, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sun, 14 Dec 1997 14:29:27 -0500
From: "David J. Loundy" <David@LOUNDY.COM>
Subject: File 1--Online Copyright Cases Can Simply Be Difficult.

Published in the Chicago Daily Law Bulletin, December 11, 1997 at page 6.
------------------------------------------------------------------------

Online Copyright Cases Can Simply Be Difficult.

Copyright 1997 by David Loundy
Archived at http://www.Loundy.com/CDLB/
To subscribe, send the message
"subscribe" to Loundy-request@netural.com

------------------------------------------------------------------------
When discussing copyright issues on-line, there are a lot of esoteric
questions that can be asked about unusual situations. Some of these
situations are merely fodder for law school exams, and some revolve around
threatened or actual litigation. A recent federal case, however, has a
refreshingly simple set of facts-- unfortunately it shows that some
difficult questions about the finer interpretation of copyright law are not
easy to avoid in a digital setting.

The relevant facts of Marobie-FL v. National Association of Fire Equipment
Distributors, No. 96 C 2966 (N.D. Ill. Nov. 13, 1997) are as follows:

The National Association of Fire Equipment Distributors, or NAFED, has a
web page. The operator of the web page received an offer for some
"clip-art." He sent off a few blank disks, and received them back full of
computer images of firefighter-related art. He placed the images on NAFED's
web page for anyone to download as a courtesy provided by NAFED, and
advertised their presence.

The images, however, were copyrighted property of plaintiff Marobie-FL,
doing Business as Galactic Software. When sales of the clip art plummeted,
and Marobie learned it was because the images were available for free on
NAFED's web page, Marobie, sued NAFED, and, for good measure, Northwest
Nexus, NAFED's Internet service provider which hosted NAFED's web page.

Was there a copyright infringement? Sure. Finding infringement in such a
case is something of a no-brainer. The plaintiff had a valid copyright, and
unlicensed copies were made.

Unfortunately, Judge Robert W. Gettleman went further than necessary in
finding a copyright infringement of the plaintiff's work. The judge held
that NAFED's acts constituted a reproduction of the plaintiff's work in
violation of its exclusive right to make reproductions, as provided in 17
U.S.C. Section 106(1). The court cited the Playboy Enterprises, Inc. v.
Frena case (839 F.Supp. 1552 (M.D. Fla. 1993) as precedent. Unfortunately,
the Judge continued with an argument that was made in the Playboy case and
found a violation of the exclusive right to distribute copyrighted works, a
right protected by 17 U.S.C. Section 106(3).

In neither case, however, was the distribution right violated.

Section 106(3) of the Copyright Act protects the right "to distribute
copies . . . of the copyrighted work to the public by sale, or other
transfer of ownership, or by rental lease or lending." Section 101 of the
Copyright Act defines a copy as "material objects . . . in which a work is
fixed by any method now known or later developed, and from which the work
can be perceived, reproduced, or otherwise communicated, either directly or
with the aid of a machine or device."

Where are the copies in this case?

The original floppy disks are copies. The webmaster's hard drive
constitutes a copy. Northwest's computers' hard disks are also copies. Were
any of these copies distributed by NAFED? No. All of these copies remain
with their initial owners. NAFED did not give its hard disks to web surfers
who called up its web page and downloaded the copyrighted clip art. Rather,
NAFED reproduced a portion of the contents of the hard disk for the web
surfers. There is clearly a reproduction at issue, but there is no
distribution.

The first defense NAFED offered is that it was an innocent infringer, and
thus, any damages should be sharply reduced. NAFED argued that the images
did not have a copyright notice, nor did the disk containing the images.
The Copyright Act, however, does not require a notice. Furthermore, the
court pointed out that the legal copies of Marobie's disks did have a
copyright notice-- the disks NAFED claims are lacking copyright notices are
those of NAFED's webmaster, who sent the disks to an unknown source in
order to acquire the infringing clip art.

Of course, no copyright case would be complete without a claim that the
infringer's use is a fair one, and thus protected by 17 U.S.C. Section 107.
And, of course, the argument is often a losing one.

Gettleman found that even though NAFED is a non-profit company, and did not
sell the clip art, the use could still be considered a commercial one. The
judge held that NAFED would benefit from making Marobie's work available on
its web page by promoting NAFED's association and raising advertising
revenue, all without paying the customary price for the use of the works.
Furthermore, the works were not used for traditional fair uses such as
criticism, teaching, news reporting and the like. The type of material
copied-- creative pictures-- also constituted a strike against the
defendant's fair use claim, as did the fact that three of the plaintiff's
five disks were copied in their entirety, and each of the three copied
disks was subject to a separate copyright. The final fair use factor,
potential damage to the market for the copyrighted work, was presumed from
NAFED's use of the work.

The analysis of the Internet service provider's liability is where this
case demonstrates some of the complexities of on-line copyright law. There
have been a number of cases, such as MAI Systems Corp. v. Peak Computer,
Inc., 991 F.2d 511 (9th Cir. 1993) that have held that loading software
into a computer's Read-Only Memory (RAM) constitutes the creation of a
copy. Based on the aforementioned definition of a copy, this seems like an
appropriate finding. Northwest, however, argued that based on how the
technology works in the case of its web server, although the copyrighted
work passed through its computer's RAM, there was no "fixation" of the work
in that RAM. In the words of the statute, the argument is that the work is
not "sufficiently permanent or stable to permit it to be perceived,
reproduced, or otherwise communicated for more than a transitory duration."
It is the transitory duration portion of the definition that was
Northwest's hook.

Northwest asserted that its system made the reproductions so quickly that a
complete copy was never even present in its system's RAM. Northwest also
argued that its situation was not analogous to that of MAI, or, more
specifically to that in Religious Technology Center v. Netcom On-Line
Communications Services, Inc., 907 F. Supp. 1361 (N.D. Cal. 1995 (available
on the Internet at http://www.Loundy.com/CASES/RTC_v_Netcom.html), because,
in both MAI and Netcom, the work was present in the computers' RAM for a
much longer period of time.

The judge rejected this argument, focusing on the "perception" aspect,
rather than the "transitory duration" aspect. The court seized on the
language from the definition of "copies" and argues that the "copies"
generated by Northwest could still be perceived "with the aid of a machine
or device" and thus, Northwest was making reproductions of the protected
works. The court missed that Northwest appeared to be challenging whether
there is a "fixation"-- which requires that a copy exist for "more than a
transitory duration." To find against Northwest on this issue, as the issue
was framed by Northwest, would be to find that other similar means of
digital transmission-- such as the transmission of telephone calls via
fiber-optics or satellites, or digital broadcasting of radio, television,
or some portable phones-- all constitute the creation of potentially
infringing copies by the service provider. The court did acknowledge that
it may be the web surfer who was "fixing" the copies, but nonetheless the
court rejected Northwest's argument that its computers were not copying the
plaintiff's works.

Gettleman did, however, accept Northwest's argument that, based on the
Netcom case, Northwest should not be held liable for any such copies that
were made. The Netcom court refused to hold a service provider strictly
liable for its machine's passive operation. Here also, the court found that
there was no active involvement on the part of the service provider-- all
Northwest did was provide "the means to copy, distribute or display
plaintiff's works, much like the owner of a public copying machine used by
a third party to copy protected material."

While this may be the just result based on the lack of participation or
knowledge of the service provider, it is not a necessary result under the
Copyright Act. This fact was illustrated in the recent Playboy Enterprises,
Inc. v. Webbworld case (No. 3-96-CV-3222-DES, (N.D. Tex., June 27, 1997).
In the Webbworld case, the judge made a distinction (based on a perhaps
inaccurate interpretation of the facts) between the Netcom case and the
facts in front of it, and held that a service provider could be held liable
for 'automated' copyright infringements. The Webbworld case was not
addressed in Gettleman's opinion.

Cases such as this show that where there is a clear infringement of a
copyright on-line, remedies are available against the truly responsible
party. Although there may be arguments put forth to justify or excuse
infringements, the law is really more clear than many people make it out to
be. However, the law as it applies to service providers is often not nearly
so clear. In some cases, such as Webbworld, the service provider is a bad
actor, and copyright holders should clearly have a remedy. In cases such as
Marobie, the service provider really should have some insulation from
liability. However, cases such as this illustrate that these are complex
issues, the subtleties and implications of which are often missed in court
decisions.


______________________________________________________________________
David J. Loundy | E-Mail: David@Loundy.com
| WWW: http://www.Loundy.com/
Davis, Mannix & McGrath | Listserv (for my Technology
125 S. Wacker Drive, Suite 1700 | Law column): Send a message
Chicago, IL 60606-4402 | reading "subscribe" to
Phone: (312) 332-0954 | Loundy-request@netural.com

------------------------------

Date: Mon, 1 Dec 1997 14:32:06 -0500
From: Stephen Talbott <stevet@MERLIN.ALBANY.NET>
Subject: File 2--The Digital Citizen: More Nonsense from *Wired*

NETFUTURE

Technology and Human Responsibility

--------------------------------------------------------
Issue #61 Copyright 1997 Bridge Communications December 1 1997
-----------------------------------------------------------
Editor: Stephen L. Talbott (stevet@oreilly.com)

On the Web: http://www.oreilly.com/people/staff/stevet/netfuture/
You may redistribute this newsletter for noncommercial purposes.


The Digital Citizen: More Nonsense from *Wired*
-----------------------------------

Always specializing in missing the point, *Wired* magazine succeeds more
spectacularly than usual in its December issue. The cover article by Jon
Katz (a *Wired* contributing editor) celebrates the "first in-depth poll"
of the digitally Connected, and reports that they are "optimistic,
tolerant, civic-minded, and radically committed to change."

Almost all conventional wisdom about digital culture -- especially as
conveyed in recent years by journalists, politicians, intellectuals,
and other fearful guardians of the existing order -- is dead wrong.
The Internet, it turns out, is not a breeding ground for disconnection,
fragmentation, paranoia, and apathy .... The online world encompasses
many of the most informed and participatory citizens we have ever had
or are likely to have.

The poll, sponsored by *Wired* and Merrill Lynch Forum, assures us that
the Connected are more likely than the Unconnected to know who the chief
justice of the United States is; to believe in change, racial diversity,
and a better future; to have confidence in the two-party political system;
and to read books.

All of which, we're told, puts the lie to the "countless tales of
perversion, porn, hatemongering, violence, addiction, and other perils"
that mainstream journalism is forever disseminating.

The common stereotype of the Internet as a haven for isolated geeks who
are unaware of important events occurring outside their cavelike
bedrooms can now be exploded as an inaccurate myth. The same goes for
the caricature of technology as a civic virus that breeds disaffection
from politics.

(Despite repeated allusions to them, Katz never tells us exactly which
publications constitute this Net-bashing mainstream. He seems to have in
mind those often silly articles that some publications occasionally run,
dramatizing the "dark side of the Net." The tabloid-urge, unfortunately,
*is* a part of mainstream journalism. But this fact is wholly compatible
with the dominant reality Katz ignores. Where is the mainstream
publication whose education pages are trying to brake the lemming-rush to
wire our schools, or whose business pages do not urge the centrality of
everything high-tech for our economic future, or whose feature pages do
not lionize the latest, hot, high-tech start-ups along with their CEOs, or
whose editorial pages fail to treat the "information superhighway" as a
sacred cow that should be encouraged to wander unimpeded into every corner
of our culture, or whose Christmas buyers' guides are not doing everything
possible to stimulate consumer interest in the coolest high-tech gadgets?)

Katz' primary mission is to let us know beyond any doubt that

clearly, there is now evidence that technology promotes democracy,
citizenship, knowledge, literacy, and community.

I have three comments:

First, until very recently the critiques of digital culture were
necessarily directed at the culture's earlier, "purer" manifestations --
what we might call the John Perry Barlow phase of the Net, when a heady
mixture of libertarianism, warmed-over counterculture, and technological
optimism ruled the day. It was a time when the networked computer could
be embraced wholesale as the redemptive substitute for rotten social
institutions. This electronic culture was rooted in the research
departments, computer engineering organizations, underground publications,
university computer science programs, and bulletin board networks that
incubated the modern Net and brought it to birth.

It's hardly surprising that the various utopian disaffections, cultural
distortions, and imbalances of that earlier phase have been diluted by the
more recent arrival of the masses.

Second, the poll results reflect the education, political power, economic
strength, and faith in the existing order characteristic of a relatively
privileged class -- namely, those who are *able* to get connected and are
equipped to capitalize on their connections. And, again, it is hardly
surprising to find that the more educated, better-off folks are also
better-read, more politically engaged, and so on.

I have little doubt that a poll taken during the first decade or two of
the television era would likewise have shown a relatively well off,
better-educated, better-read, and politically engaged audience. There
were, at the same time, widespread, positive expectations about the future
of television-influenced education, culture, and politics. So what?

Third, Katz' answer to the "so what?" is missing. He doesn't supply a
single sentence to support his contention that "technology promotes
democracy, citizenship, knowledge, literacy, and community." A poll
purporting to show what sort of user has connected during the build-up of
the Net tells us nothing at all about the effects the Net will "promote"
in these users. For that you would need to track these users over time.

Meanwhile, he might have remembered television. Regardless of the well-
intentioned involvements and expectations of those who took up television,
it would not be easy today to argue that television strengthened community
or encouraged democratic participation or redeemed education. But, in any
case, my point is that the argument needs to be *made*, not just assumed.
Until Katz offers at least a shred of evidence that the Net will indeed
prove salutary, his claim remains suspended in mid-air, lacking all
support.

It is hard to believe that the editors of a major publication would offer
such a massive non sequitur as a dramatic cover feature. The giddy sense
of exultation and triumph with which Katz and *Wired* herald this poll of
1444 Americans is, for me, the most telling aspect of the article.
Whatever may be the case with Net users as a whole, *these* folks
apparently remain in the Barlow, wish-fulfillment phase of cyberspatial
development.

It's an especially unhealthy phase. Katz welcomes a poll result showing
extraordinary confidence among the Connected in their ability to master
and direct the forces of technological change. We who are connected
certainly do have good reason to believe we can ride these forces for
personal advantage -- I am certainly making the attempt -- and that may be
enough to sustain considerable enthusiasm for a time. But for any of us,
at this point in history, to fancy ourselves masters of the self-driven,
global, technological juggernaut is the sheerest fantasy.

The sober effort to *achieve* such mastery is, of course, exactly what's
needed. Unfortunately, there still aren't many signs of sobriety at
*Wired*.

==============

Current and past issues of NETFUTURE are available on the Web:
http://www.oreilly.com/people/staff/stevet/netfuture/
To subscribe to NETFUTURE, send an email message like this:
To: listserv@infoserv.nlc-bnc.ca
subscribe netfuture yourfirstname yourlastname
No Subject line is needed.

------------------------------

From: "Maurice Wessling" <maurice@XS4ALL.NL>
Date: Mon, 15 Dec 1997 12:47:12 +0000
Subject: File 3--XS4ALL files complaint with Chief Public Prosecu

Press release

15 december 1997

XS4ALL files complaint with Chief Public Prosecutor

XS4ALL Internet Friday filed a complaint with Chief Public
Prosecutor Vrakking in Amsterdam against the Examining
Magistrate and Public Prosecutor who ordered XS4ALL on
October 31st to tap the Internet traffic of one of its
users.

The Ministry of Justice had based its instruction on Article
125i of the Code of Criminal Procedure. On November 13th
XS4ALL refused to comply, as in its view this lacked all
legal basis. Failure to comply with legal instructions is a
penal offence.

Given all the reactions that XS4ALL has meanwhile received,
it is reinforced in its view that the Ministry has exceeded
its remit. On the basis of Article 125i of the Code of
Criminal Procedure, tapping is not something that can be or
should be requested. XS4ALL believes that the attempt by the
Ministry to compel it to cooperate in applying illegal
methods of investigation should not be allowed to pass off
without sanction. XS4ALL is urging that an early trial case
be brought so that a penal court can pronounce on the
finding and the action of the civil servants involved.

XS4ALL has therefore filed a complaint on the basis of
Articles 365 of the Code of Criminal Procedure and article
140 of the Penal Code. Article 365 of the Code of Criminal
Procedure implies 'coercion' by a civil servant, whereby a
civil servant abuses his authority and compels someone to do
something. In this case, the civil servants involved knew
that the instruction was not founded in law and abused their
authority by still demanding that their instruction be
followed. Furthermore, publications also reveal that the
same instruction has been given to various other Internet
Providers and that there were lengthy discussions with them.
There are therefore adequate grounds for suspecting the
civil servants involved of participation in an organisation
engaged in committing crimes; Article 140 of the Penal Code
applies.

XS4ALL feels obliged in principle to protect its users'
privacy. Furthermore, XS4ALL has a commercial interest, as
it must not run the risk of users bringing proceedings under
civil law on account of unlawful acts. This could happen
with such an intervention by the provider not based on law.
Finally, from the social point of view it is important that
means of detection have an adequate legal basis. Complying
with the injunction could serve as an undesired precedent
which could have a major impact on the privacy of all
Internet providers in the Netherlands.

XS4ALL does not have any view of the nature of the police
investigation or the suspected crimes. Nor will XS4ALL make
any statement regarding the content of the investigation,
the region where it is occurring or the identity of the
civil servants involved, as it is not its intention that the
investigation should founder.

For further details of this case (incl. previous press
releases and articles):

http://www.xs4all.nl/

or contact
XS4ALL
Maurice Wessling
Telephone: +31 20 3987681 / 3987654
email: maurice@xs4all.nl

------------------------------

Date: Wed, 17 Dec 1997 23:35:10 -0600
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 4--"Hackers" hit Yahoo.com - leave "ransom" note

In an article titled HACKERS IN YAHOO! LEAVE RANSOM NOTE the
December 10, '97, Chicago Tribune reported that "hackers" broke
into Yahoo.com, the popular launching place for linking to
topical sites, and "demanded the release of an imprisoned comrade
and threatened to unleash a crippling computer virus if he is not
freed." According to the article:

Computer-security experts were skeptical of the hackers'
claim that they had implanted such a virus.

The hackers, calling themselves PANTS/HAGIS, got into
Yahoo!'s World Wide Web site Monday night, leaving a digital
ransom note.

"For the past month, anyone who has viewed Yahoo's page &
used their search engine, now has a logic bomb/worm
implanted deep within their computer," it read. "On
Christmas Day 1998, the logic bomb part of this `virus' will
become active, wreaking havoc upon the entire planet's
networks."

The article reported that an antidote will be made available "if
hacker Kevin Mitnick is released. Mitnick was indicted last year
on charges involving a multimillion-dollar crime wave in
cyberspace."

The article indicates that the message was up for only 10 to 15
minutes. A Yahoo.com spokesperson indicated that there was no
virus.

------------------------------

Date: Sat, 13 Dec 1997 12:01:17 -0500
From: "Evian S. Sim" <evian@escape.com>
Subject: File 5--Mitnick Supporters Deny Yahoo Hack

COMPUTERGRAM INTERNATIONAL
New York, Published: December 15 1997
Issue Number 3311
MITNICK SUPPORTERS DENY YAHOO HACK

The group running The Official Kevin Mitnick web site
(http://www.kevinmitnick.com) has denied it is linked to, or knows who is
behind, the curiously named PANTS/HAGIS Alliance which was allegedly
responsible for the hacking stunt pulled on Yahoo on Tuesday (CI No 3,303).
A spokesperson for the site told Computergram International that although
it appreciates the hackers' interest and enthusiasm in helping Kevin
Mitnick, it would like to distance itself from their activities. The site
creators released this statement: "The charges against Kevin have been
grossly exaggerated and the fact that he's been held three years without
bail makes you wonder what kind of government we have. However, vandalizing
web pages, sending out computer viruses (or threatening to do so) and
writing ransom notes are not methods we condone, suggest or encourage."
However, as a result of the Yahoo stunt and subsequent reporting of it, the
Mitnick site, which explains the charges against Kevin Mitnick and the
conditions in which he is kept, has received more than 37,000 visits.

------------------------------

Date: Sun, 16 Nov 1997 12:50:43 -0600
From: jthomas3@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 6--Child Protection and Parental Empowerment / Interactive Media

((MODERATORS' NOTE: From the Center for Democracy and
Technology homepage comes this letter signed by CDT and
many other organizations that somehow slipped through the
publication cue's cracks last month)).

----

Child Protection and Parental Empowerment in Interactive Media

The Honorable Larry Pressler
Chairman
Senate Commerce Committee
United States Senate
Washington, DC 20510


The Honorable Thomas J. Bliley, Jr.
Chairman
House Committee on Commerce
United States House of Representatives
Washington, DC, 20515


The Honorable Ernest F. Hollings
Ranking Democrat
Senate Committee on Commerce
United States Senate
Washington, DC 20510


The Honorable John D. Dingell
Ranking Democrat
House Committee on Commerce
United States House of Representatives
Washington, DC, 20515


The Honorable Henry Hyde
Chairman
House Judiciary Committee
United States House of Representatives
Washington, DC, 20515


November 9, 1995

Dear Senator Pressler, Senator Hollings, Representative Bliley, and
Representative Dignell:

For the past year, Congress has struggled with the question of how
best to protect children from inappropriate material online. As the
telecommunications conferees work to reconcile competing approaches to
this issue we urge a consensus policy that empowers families, places
liability on creators of illegal content instead of passive service
providers, and avoids constitutionally suspect new laws that will only
delay enforcement. We write as a broad coalition of representatives
from the online service, computer hardware and software, and
telecommunications and electronic industries, the advertising
industry, newspaper and library associations, and public interest
organizations, who believe that the interests of children, free
expression, and the continued viability of the Internet and
interactive media can best be served by combining a deregulatory
approach to encourage the development of parental empowerment
technology along with vigorous enforcement of criminal laws that are
crafted according to settled constitutional principles.

A comprehensive and effective policy approach to this issue should be
based on the following principles:

* Parental Empowerment: Maximum reliance on, and encouragement of,
private sector innovation to produce technologies that enable
parents, not government regulators, to choose what is best for
their own children.

* No vicarious liability: Due to the tremendous flow of information
through both public and private networks, holding service
providers, systems, access software providers, or any other third
parties liable for the content of illegal messages created by
persons not under their authority or control will be ineffective
at protecting children as well as a threat to the privacy of
users. Groups such as the United States Chamber of Commerce have
expressedconcern on this issue, as well.

* Enforceable, narrowly tailored, and constitutionally sound
criminal laws: Any new criminal laws should be focused on bad
actors and based on constitutionally sound standards. Existing
proposals, which rely on the vague and untested indecency
standard, do not fall into such a category.

* Uniform national policy: Given the national, and even global,
nature of online services, uniform national rules governing
liability are essential. Permitting state regulation of content in
interactive media would force service providers and systems to
conform to inconsistent and contradictory regulations and
undermine the national interest.



Recognizing the power of interactive technology to help solve the
problem of protecting children, the House passed the Cox-Wyden-White
bill on a 420-4 vote in order to encourage the market to provide
parents screening and filtering options to protect minors. Even since
the Congress began considering this issue this year, great advances
have been made in parental empowerment technologies. Thus, the
Interactive Working Group, with the support of its members, would
welcome the opportunity to demonstrate these technologies as well as
to brief the conferees on additional cooperative efforts now underway
in the private sector. Relying on parents, not the government, to make
choices about the content that they and their families receive assures
maximum respect for First Amendment rights of adults to receive and
transmit constitutionally-protected material, and allows families, not
bureaucrats, to determine what information is most consistent with
their own moral values.

Recent FBI child pornography arrests demonstrate that vigorous law
enforcement efforts are already working to punish illegal behavior
online. We would welcome the opportunity to brief you on ongoing
efforts to assist law enforcement in cases where criminal activity has
occurred. To the extent new criminal laws are needed, they must be
drafted in a constitutionally sound manner, both to avoid enforcement
delays and to assure respect for the free speech and privacy rights of
Internet users. We believe it is possible to craft a criminal statute
that punishes those who provide truly harmful material to children in
a manner that both targets the serious offenses about which some
conservative family groups are most concerned, and that also will
withstand constitutional scrutiny. In particular, rather than relying
on the vague and constitutionally suspect "indecency" standard,
Congress should instead consider the "harmful to minors" standard
within the framework of Title 18 of the United Sates Code. This
standard is used in numerous state statutes and has been found
constitutional by the United States Supreme Court.

We look forward to working with all of you in an effort to identify a
solution to this problem that assures maximum protection for children,
while relying on the innovative energy of the high technology market
to meet evolving needs of parents online.

Sincerely,



America Online Inc.
American Advertising Federation
American Association of Advertising Agencies
American Association of Law Libraries
American Library Association
American Society of Newspaper Editors
Association of National Advertisers
AT&T<br> Bell Atlantic
Business Software Alliance
Center for Democracy and Technology
Coalition for Networked Information
Commercial Internet eXchange
Compuserve Inc.
Computer & Communications Industry Association
Consumer Electronics Manufacturers Association
Cox Enterprises
Discovery Channel
Electronic Frontier Foundation
Electronic Messaging Association
Institute for Electrical and Electronic Engineers - United States
Activities
Information Technology Association of America
MCI
Microsoft Corporation
Microsystems Software
National Cable Television Association
National Newspaper Association
Netscape Communications Corp.
Newspaper Association of America
Pacific Telesis
Recreational Software Advisory Council
Software Industry Coalition
Software Publishers Association
SurfWatch Software
TCI
The Media Institute
Time Warner Inc.






cc: Members of the Conference Committee on telecommunications reform
legislation

------------------------------

Date: Thu, 4 Dec 1997 23:30:11 -0600
From: Avi Bass <te0azb1@corn.cso.niu.edu>
Subject: File 7--Technological Breakthrough (humor)

((MODERATORS' NOTE: This report on a Technological Breakthrough
was passed along to CuD by Avi Bass of "NewsPlace"
<http://www.niu.edu/newsplace/>)).

Technological Report: Announcing the new Built-in Orderly Organized
Knowledge device called B.O.O.K.

The "BOOK" is a revolutionary breakthrough in technology: No wires, no
electric circuits, no batteries, nothing to be connected or switched on.
It's so easy to use even a child can operate it. Just lift its cover!
Compact and portable, it can be used anywhere-even sitting in an armchair
by the fire-yet it is powerful enough to hold as much information as a
CD-ROM disc.

Here's how it works...

Each BOOK is constructed of sequentially numbered sheets of paper
(recyclable), each capable of holding thousands of bits of information.
These pages are locked together with a custom-fit device called a binder
which keeps the sheets in their correct sequence. Opaque PaperTechnology
(OPT) allows manufacturers to use both sides of the sheet, doubling the
information density and cutting costs in half.

Experts are divided on the prospects for further increases in information
density; for now BOOKs with more information simply use more pages. This
makes them thicker and harder to carry, and has drawn some criticism from
the mobile computing crowd. Each sheet is scanned optically, registering
information directly into your brain. A flick of the finger takes you to
the next sheet. The BOOK may be taken up at any time and used by merely
opening it. The BOOK never crashes and never needs rebooting, though like
other display devices it can become unusable if dropped overboard. The
"browse" feature allows you to move instantly to any sheet, and move
forward or backward as you wish. Many come with an "index" feature, which
pinpoints the exact location of any selected information for instant
retrieval.

An optional "BOOKmark" accessory allows you to open the BOOK to the exact
place you left it in a previous session-even if the BOOK has been closed.
BOOKmarks fit universal design standards; thus, a single BOOKmark can be
used in BOOKs by various manufacturers. Conversely, numerous bookmarkers
can be used in a single BOOK if the user wants to store numerous views at
once. The number is limited only by the number of pages in the BOOK.

The media is ideal for long term archive use, several field trials have
proven that the media will still be readable in several centuries, and
because of its simple user interface it will be compatible with future
reading devices.

You can also make personal notes next to BOOK text entries with an
optional programming tool, the Portable Erasable Nib Cryptic
Intercommunication Language Stylus (Pencils). Portable, durable, and
affordable, the BOOK is being hailed as the entertainment wave of the
future. The BOOK's appeal seems so certain that thousands of content
creators have committed to the platform.

Look for a flood of new titles soon.

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 8--Cu Digest Header Info (unchanged since 7 May, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

In ITALY: ZERO! BBS: +39-11-6507540

UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #9.90
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT