Computer underground Digest Sun Apr 14, 1996 Volume 8 : Issue 30 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.30 (Sun, Apr 14, 1996) File 1--ACLU v. Reno trial update (4/12/96) File 2--The Computer Law Observer #17 File 3--Mike Godwin: "The Backlash Against Free Speech on the Net" File 4--Cu Digest Header Info (unchanged since 7 Apr, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Sat, 13 Apr 1996 08:24:22 -0700 (PDT) From: Declan McCullagh Subject: File 1--ACLU v. Reno trial update (4/12/96) ACLU v. RENO: TRIAL UPDATE * 1st Government Witness Acknowledges Difficulty in Finding Sexually Explicit Material Online * 2nd Government Witness Returns Monday to Conclude Testimony * Plaintiffs have option to rebut government case Monday FOR IMMEDIATE RELEASE Friday, April 12, 1996 PHILADELPHIA -- Testifying for the government today, Special Agent Howard A. Schmidt acknowledged, in answer to skeptical questioning by a three-judge panel, that it is "highly unlikely" for anyone to come across sexually explicit sites on the Internet by accident. As the first witness for the government, Agent Schmidt began the morning with a live Internet tour and demonstration of a search for so-called indecency. The demonstration stopped short of actually displaying any of the images, but traced for the court the route by which Schmidt arrived at various web sites. Schmidt acknowledged -- under cross-examination -- that majority of the sites he found would have been off limits had he been running a software program such as SurfWatch, that blocks access to Internet sites considered inappropriate for children. Marjorie Heins, who conducted cross-examination for the ACLU, noted that Agent Schmidt's expertise -- and the government's case -- lies in focusing on a very narrow category of sexual material, much of which is already covered by existing obscenity law. "In today's testimony, the government attempted to divert the court's attention from the serious concerns of our plaintiffs by focusing on material that is highly inflammatory and largely irrelevant to this case," Heins said. The consolidated cases of ACLU v. Reno and ALA v. DOJ challenge provisions of the Communications Decency Act that criminalize making available to minors "indecent" or "patently offensive" speech. Under questioning by the judges, Agent Schmidt was asked how he would enforce the censorship law when confronted with a safe-sex information web-site that displayed an image illustrating how to put a condom on an erect penis. Agent Schmidt said that since the context was "educational, not purely for pleasure purposes," he would not censor the site but advise the publishers to post warnings. His answer was different when asked how he would rate an online copy of the controversial Vanity Fair magazine cover featuring the actress Demi Moore, nearly naked and eight months pregnant. In that case, Schmidt said, the Communications Decency Act would apply because the image was "for fun." He also said, in answer to a query from Judge Stuart Dalzell, that the community standard as to the offensive of the image might be different for Minnesota than it would for New York. "It is ironic that, according to the government, an explicit online image of an erect penis in an educational context would be acceptable, whereas Vanity Fair, a constitutionally protected publication containing a much less explicit image, would be censored," Heins said. Following Agent Schmidt's testimony, the final plaintiff witness, Dr. Albert Vezza, told the judges about PICS (Platform for Internet Content Selection), a new rating system designed to allow parents to control children's access to the Internet without censorship. Dr. Vezza is associate director of the MIT Laboratory for Computer Sciences and has chief responsibility for the PICS project. He was unable to testify earlier in the case due to scheduling conflicts. Dr. Vezza said he expected that wide industry acceptance of the PICS standard would enable any number of "third-party" organizations such as the PTA, the Christian Coalition or the Boy Scouts of America to rate content for Internet users. The second and final government witness, Dr. Dan Olsen, a professor of computer science at Brigham Young University, took the stand in the mid-afternoon. Dr. Olsen acknowledged that the PICS standard would allow parents to control their children's Internet viewing according to their own values or via a rating system devised by a trusted organization. He also acknowledged that a system he had conceived in which Internet sites must be labelled by the content originator, would not allow for such an independent rating scheme. While plaintiff lawyers completed cross-examination of Dr. Olsen today, he will return on Monday for redirect by government lawyers and to answer any questions the judges may have. It is now anticipated that Monday, April 15, will be the last day of trial in ACLU v Reno. Plaintiff lawyers will have the opportunity on Monday (instead of April 26) to call witnesses to rebut the governments's testimony. However, the ACLU and ALA coalitions did not indicate which witnesses, if any they would call. Because the April 26 rebuttal day is no longer necessary, the next date in court is set for June 3, when the three-judge panel will hear oral arguments from both plaintiffs and defendants. The judges are expected to issue a ruling some time in the weeks following. Under expedited provisions, any appeal on rulings regarding the new censorship law will be made directly to the U.S. Supreme Court. Lawyers for the ACLU appearing before the judges are Christopher Hansen, Marjorie Heins, Ann Beeson, and Stefan Presser, legal director of the ACLU of Pennsylvania. ------------------------------ Date: Thu, 28 Mar 1996 13:25:03 +0100 From: "William S. Galkin" Subject: File 2--The Computer Law Observer #17 *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+ THE COMPUTER LAW OBSERVER *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+ March 28, 1996 (#17) ===================================== GENERAL INFO: The Computer Law Observer is distributed (usually) every other week for free and is prepared by William S. Galkin, Esq. The Observer is specifically designed for both lawyers and non-lawyers. To subscribe, send e-mail to wgalkin@earthlink.net. All information contained in The Computer Law Observer is for the benefit of the recipients, and should not be relied on or considered as legal advice. Copyright 1996 by William S. Galkin. ===================================== *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+ AT THE LIMITS OF LAWFUL SECRECY *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+ [This is the fourth of a series of articles discussing privacy rights in the digital age.] Philip Zimmermann is now a folk hero in privacy rights circles - and a hot commodity in commercial circles. Zimmermann is also extremely relieved. Last January, the U.S. Justice Department informed him that it was dropping the 3-year criminal investigation against him for illegally exporting a munition. The munition was not rarified uranium. It was encryption software posted on the Internet. The Zimmermann investigation was widely publicized and has played an important role in bringing the encryption debate out in the open and into the halls of Congress. The Zimmermann story is not over yet. Because, while Silicon Valley CEO's and venture capitalists are wooing him with eyes on his current "privacy" project - a software program for telephones which he claims will make wiretapping virtually impossible - law enforcement officials will likely continue to closely watch his activities. CRYPTOGRAPHY - Cryptography is the ancient art of concealing the content of a message by scrambling the text. Historically, it was used for communicating military secrets. Now, the secrets might be commercial, personal, political or criminal, and communicated over the Internet. A would-be reader of an encrypted message must have a "key" to descramble the message. Encryption software, the modern method of encryption, uses a mathematical algorithm to scramble a message. There are two primary forms of encryption software: single-key systems and two-key systems. In a single-key system, the data is encrypted and decrypted using the same key. The weaknesses of the single-key system are that the key is not completely secret because both the sender and the receiver must have the key. Additionally, at some point prior to the first encrypted communication, the key itself must be communicated in an manner that does not use the same encryption method. A two-key system, also known as a public key system does not have these weaknesses. This system uses two keys, one private and the other public. The public key is given out freely and will encrypt a message. However, only the private key, which does not need to be communicated to anyone, can decrypt the message. It is practically impossible to determine the private key from an examination of the public key. ENCRYPTION REGULATIONS - The Bureau of Export Administration (BXA), under the U.S. Commerce Department, controls licensing for most exports from the U.S. However, the BXA is excluded from controlling items listed on the U.S. Munitions List. The Munitions List designations are made by the State Department with the concurrence of the Defense Department, and are contained in the International Traffic in Arms Regulations (ITAR). The Munitions List includes things like grenades, torpedoes, and ballistic missiles. The list also includes "cryptographic (including key management) systems, equipment, assemblies, modules, integrated circuits, components or software with the capability of maintaining secrecy or confidentiality of information or information systems." The State Department relies on the National Security Agency's (NSA) expertise when deciding what encryption programs to include on the Munitions List. The NSA, a member of the U.S. Intelligence Community under the Defense Department, is responsible for decoding the signals of foreign governments and collecting information for counterintelligence purposes. The NSA review process is classified and not available to the public. However, generally, if the NSA cannot relatively easily break an encryption algorithm, it will not approve it for export. A violation of the export restrictions on encryption can result in a maximum criminal penalty of $1 million and 10 years in prison or a maximum civil penalty of $500,000 and a three-year export ban. There are no restrictions on encryption systems contained in software marketed solely in the U.S. Most other countries do not restrict export of encryption software. However, in France, the private use of cryptology is not permitted, unless the government is provided with the private key. EFFECTIVENESS OF THE LAW - It is questionable how well the current law achieves its objectives. The encryption export restrictions are intended to protect the national security of the U.S. However, since much sophisticated encryption software is now being developed out of the U.S., it is unclear how important these restrictions remain. Additionally, national security is threatened from both internal as well as external sources. Therefore, since there are currently no restrictions on the use, development or distribution of encryption software in the U.S., these restrictions play little role in guarding against internal threats. The law also produces some strange results. Encryption software can be imported into the U.S., but the same software cannot later be taken out of the U.S. A U.S. citizen can develop sophisticated encryption software abroad and have it marketed internationally, but cannot do the same if the development occurs in the U.S. The State Department has ruled that a book on applied cryptology, which contains source code for strong encryption algorithms may be exported, but the verbatim text of the source code when on a computer disk cannot. CHANGES IN THE LAW - The government has been moving in two directions at once. While there has been some lifting of the restrictions on the export of encryption software, there have also been developments indicating that the government desires to gain a "back door" to allow law enforcement officials the ultimate ability to access any encrypted message. One example of the lifting of restrictions was in 1992, when mass marketed software with "light" encryption was made subject to an expedited 15-day or 7-day review by the State Department. This increased the likelihood that export licenses would be granted for such software. Additionally, effective this year, under certain circumstances, a U.S. citizen may temporarily take encryption software abroad for personal use. However, at the same time the export restrictions are being lightened, several government initiatives have attempted to grant the government skeleton keys to access encrypted messages, such as the 1993 Clipper Chip initiative and the Escrowed Encryption Standard mandated for the federal government. Both of these developments seek to provide the government with the ability to access private keys. Furthermore, there has even been mention of seeking to criminalize the use of encryption in the U.S., unless private keys are escrowed with the government, as is currently the law in France. Most recently, on March 5, 1996, Sen Patrick Leahy (D-VT) introduced the Encrypted Communications Privacy Act of 1996 (S. 1587). If it becomes law, the Act would (1) remove export restrictions for "generally available" encryption software, (2) shift authority for export decisions from the State Department and NSA to the Commerce Department, (3) criminalize the use of encryption to obstruct the investigation of a felony, and (4) regulate disclosure of encryption keys by key escrow agents. The Act would greatly loosen the restrictions on exporting encryption software. However, it would still probably be up to the NSA to determine what software is "generally available." Furthermore, since the exclusion will be limited to encryption software that is generally available, U.S. companies will always be lagging behind foreign competitors, because U.S. companies will not be permitted to take the lead in the international marketing of cutting edge encryption products. Lastly, some have expressed concern over two features of the Act. One is that the Act sets forth the first instance in the U.S. of specifically criminalizing the use of encryption. And second, if private key escrow is intendeed to remain voluntary why is so much of the Act devoted to escrow issues? The encryption debate has a long way to go and reflects a fundamental struggle between ensuring personal freedom while providing the government with the means of maintaining a safe society. -- END -- ABOUT THE AUTHOR: Mr. Galkin is an attorney in private practice in Owings Mills, Maryland. He is also the adjunct professor of Computer Law at the University of Maryland School of Law. He is a graduate of New York University School of Law and has concentrated his private practice on intellectual property, computer and technology law issues since 1986. He represents small startup, midsized and large companies, across the U.S. and internationally, dealing with a wide range of legal issues associated with computers and technology, such as developing, marketing and protecting software, purchasing and selling complex computer systems, and launching and operating a variety of online business ventures. ===> Mr. Galkin is available for consultation with individuals and companies, and can be reached as follows: E-MAIL: wgalkin@earthlink.net/TELEPHONE: 410-356-8853/FAX: 410-356-8804/MAIL: 10451 Mill Run Circle, Suite 400, Owings Mills, Maryland 21117. ------------------------------ Date: Wed, 6 Mar 1996 10:22:50 -0800 (PST) From: Declan McCullagh Subject: File 3--Mike Godwin: "The Backlash Against Free Speech on the Net" [Feel free to redistribute. -Declan] Speech by Mike Godwin, Online Counsel for the Electronic Frontier Foundation "Fear of Freedom: The Backlash Against Free Speech on the 'Net" This is the luncheon speech given by Mike Godwin at a technology conference, "New Media Technology: True Innovations or Electric Fork?," jointly sponsored by the Freedom Forum Pacific Coast Center and The Freedom Forum Media Studies Center. The conference was held in the Pacific Coast Center, Jack London Square, Oakland, California, Feb. 13, 1996. The luncheon was held next door at Scott's Seafood Restaurant. Mr. Godwin was introduced by Adam Clayton Powell III, director of technology studies and programs at the Media Studies Center. Mr. Powell concluded his introduction by mentioning Mr. Godwin's unusual e-mail address. MIKE GODWIN I'm often asked why I chose the username "mnemonic." I use it on almost every system on which I have an account. I chose it long ago because of a William Gibson short story, "Johnny Mnemonic," a science-fiction short story from 1981.I've used it for many years and I didn't anticipate when I picked it more than a decade ago that suddenly cyberspace would be making national headlines. William Gibson is the science fiction novelist who invented the term "cyberspace" more than a decade ago. He probably never anticipated quite the set of controversies that we're facing today. Most of them don't involve high tech computer hackers or huge multinational corporations with monster databases in cyberspace. Instead they involve something that's very fundamental and personal to Americans. They involve freedom of speech and privacy. To give you an idea about the backlash against freedom of speech on the Net, let me tell you a little about what happened when I set up my first home page on the Worldwide Web. When you get a home page, you're never quite sure what to put on it. I had some pictures of myself that I didn't like much. But I also have lots of baby pictures and I liked those a lot. And I thought everybody in the world ought to be able to see them. So I scanned them in and I put them up on my home page, and then I got e-mail from someone who said, "Aren't you afraid that by putting a picture of your child on the Internet you're going to invite child molesters to target your child as a potential victim?" This is how far we have come. The Internet which the press and public has seen as a threat, as a cornucopia of pornography, was once upon a time seen as a boon to the nation and to the world. But now there is a dismaying backlash against freedom of speech on the Net. I'd like to take you back to the dim dawn of time: 1993. Remember when there was so much hype about the information superhighway, that it made the cover of Time magazine? We were told that 500 channels of all sorts of content would somehow make its way into our home. Every library, school, hospital, and home would have a connection to the Internet. And everyone, literally everyone, could potentially be a publisher. Three measly years later the Internet is widely perceived as a threat. Why? Because everyone is a publisher! Because there are way more than 500 channels of this stuff! And because it will be connected to every library, school, hospital and home! Many of the people publishing on the Internet will not have been to journalism school! Many of them will say things that offend other people! Many of them will publish their own opinions without any notion of what is fair play, or nice, or middle-of-the-road politically correct. This is frightening people. It's even more frightening to see how these fears of the Net have played out in the media and in the United States Congress. The original hype about the Internet was justified. There is something very different from other kinds of communications media about the medium of the Net. Previously, we used the telephone, which is a one-to-one medium. Telephone conversations are intimate. They're two-way, there's lots of information going back and forth. But you don't reach a mass audience on a telephone. Telephones work best as one-to-one media. And there's no greater proof of this than to try to participate in a conference call. Conference calls are attempts to use telephones as many-to-many media and they're always exasperating. For even longer, we've had one-to-many media, from one central source to large audiences. These include the newspaper, a couple of centuries-old technology. Movies. Broadcasting. These media have a certain power to reach large audiences, but what they gain in power they lose in intimacy and feedback. You may see all sorts of things on TV, but it's very hard to get your opinions back to the broadcaster or back to the editor of the newspaper. Even the narrow channels that we're allowed, whether op ed pages or letters to the editor or the nanosecond of time to answer a televised editorial, are wholly inadequate. You never really get anything like equal time, no matter what the FCC has said. The Net and computer technology has changed all this. It is the first many-to-many medium. It is the first medium that combines all the powers to reach a large audience that you see in broadcasting and newspapers with all the intimacy and multi-directional flow of information that you see in telephone calls. It is both intimate and powerful. Another way this medium is different is pure cost. It takes many millions of dollars to start up a daily newspaper. If you were to succeed -- this is not the best year to do this, by the way -- you will find that it's an expensive process. You have to be highly capitalized to reach audiences of hundreds of thousands, or if you're lucky, millions. But now everybody can afford a PC and a modem. And the minimal cost of connecting to the Net can reach audiences far larger than the ones reached by any city's Times-Herald Picayune, or even the New York Times or Time magazine. We're talking global. This is a shift in power. It grants to individual citizens the full promise of the First Amendment's Freedom of the Press. The national information infrastructure or the information superhighway or the Net or whatever you're in the mood to call it makes it possible to reach your audience no matter who your audience is and no matter where they are. There's no editor standing between you and your readers -- changing what you want to say, changing your content, shortening it or lengthening it or altering it to make it "acceptable." I often think of poets. It's been a long time since a volume of poetry has regularly stood up on the best seller list. People who are poets, and we have a lot of good poets around these days, don't often succeed commercially, or sell. even a few thousand copies of a volume of poetry. But if that poet puts his material on the Internet, he can reach literally every single person who would ever understand his masterpiece. And that is a fundamental shift. So why the backlash? Why the fear? I think part of it is that people get on line and discover that it makes some things easier and more accessible. Itis possible for some people to find pornography on the Internet. It is also possible to get so called "dangerous information." And it's probable for people to say bad things about each other. So people think there ought to be some new kind of control, either legal or social. I remember the immense national headlines surrounding the prosecution of a Milpitas, California couple who operated a micro-computer bulletin board system. They were prosecuted in Memphis, Tennessee. It was quite a good story, because prosecutors in Memphis had reached all the way across the country to get a gentleman who was selling adult material out of his house on a computer. But I noticed that the stories were expanded into a perception of a general problem. The problem of pornography or obscenity on the Net. This change in perception is widespread. Someone recently asked me how many hours a day I spend on line. I said, I spend six or eight hours, some days even more, I work on line. And he actually said, "It must be bad with all that pornography. " I never see pornography on the Internet," I said. "You're kidding," he said. "No, I guess there's some out there, but I never go looking for it, I have work to do." He thought that when you turned on your computer and connected it to the Internet, pornographic images simply flooded over the computer monitor into your face. What's worse, he thought that maybe they flooded over the computer monitor into your child's face. To judge from the question I had about putting my child's picture on the Web, some people think that child molesters can reach through the computer screen and grab your child out of your living room. How did we get this amount of fear, and how does it reflect itself in other ways?. I can think of one other example. It involves Howard Kurtz, the esteemed media critic of the Washington Post. Mr. Kurtz, who is widely regarded, and rightfully so, as an astute critic of the traditional media, wrote two stories in the course of about a year about the Net. The first story involved a Los Angeles Times article by a fellow named Adam Bauman that somehow conflated hackers, pornography, spies and cryptography in one story. It was kind of amazing to see all that stuff in one story. It was as if Mr. Bauman had had a check list of hot button issues on the Internet. The story was widely criticized for not being logical, not being coherent, not justifying his assertions, and people said bad things about Mr. Bauman on the Net. Howard Kurtz, the media critic, looked at the story and did he think how terrible that the L.A. Times to run this terrible story? No. He was horrified that people on the Internet would say bad things about reporters. Sometimes they use impolite language. Now how many of us have never wished we could use impolite language to a reporter? The Internet enables us to do that. The second Howard Kurtz column involved Time magazine's cover story from last summer which featured the height of what turned out to be a patently fraudulent study of so called cyberporn from a con artist at Carnegie Mellon University. The person has since been exposed, and part of the reason he was exposed was that there were a lot of reporters, a lot of amateur reporters on the Net who looked into his research, who read his study and criticized it and who looked into the past of the person who wrote the study, and they discovered he'd done similar cons before. There was a lot of criticism of Time magazine and of the author of that story for buying into the hype about so called cyberporn. When Mr. Kurtz wrote about this controversy, did he criticize Time magazine or the reporter who wrote that story? No. In fact, he criticized the Internet for being so nasty to that poor fellow at Time for hyping the fake crisis of cyberporn. I was thinking about Mr. Kurtz' columns and I found that they dovetail very nicely with a very common complaint that one hears about speech on the Internet. People say you know, we think the First Amendment is a great thing, but we never thought there'd be all these people using it so irresponsibly. Don't you think there ought to be a law. There are other matters that have used to press our hot buttons about the Internet, to make us fear on-line communication. They involve things like cryptography, the ability of every citizen to make his or her communications or data truly private, truly secret, truly protected from prying eyes. And they involve things like copyright. For those of you who have been following the discussion of copyright on the Net, you know that Bruce Lehman of the Patent and Trade Office has authored a report that would turn practically everything anyone does with any intellectual property on line into a copyright infringement. If you browse it without a license, that's an infringement. If you download it, that's an infringement. If you look at it on your screen, that's an infringement. Three strikes and you're out and you go to federal copyright prison! There's also the sense that there's dangerous information on the Net. People are very troubled by the fact that you can log in and hunt around and find out how to build a bomb, even a bomb of the sort that was used to blow up a building in Oklahoma City. The Washington Post, interestingly enough, faced the issue of whether to publish the instructions on how to make a fertilizer bomb of the sort that was used in Oklahoma City. When they published in the story how the bomb was built, many people wrote into the Washington Post and said, "You shouldn't have published that stuff, people will get ideas! They will use that information to build bombs!" The Washington Post editors, I think quite rightly, concluded that the people reading the Washington Post were not the people who were building bombs. That the people who were building bombs already knew how to do it. But there's the sense that if this information is available on the Internet, it's vastly more destructive to society than if it's available in a library. After all, *children don't go to libraries*. I remember that after the Oklahoma City bombing, I started getting a lot of calls in my office at the Electronic Frontier Foundation from reporters who said, "Tell me more about bomb-making information on the Internet -- we're doing a follow-up on the Oklahoma City bombing." Now, if you actually followed that story one of the things you know for sure is that there seems to be *no connection* between computer technology and the suspects in the Oklahoma City bombing. There doesn't seem to be any evidence that any information from the Net was ever used in relation to the Oklahoma City bombing. So why were people calling asking me about dangerous information on the Net? I have a theory. I think it goes something like this. They knew that the chief suspect was a fellow named Tim McVeigh. And they knew that Tim McVeigh might be associated with militia groups. And they knew that some militia groups used bulletin board systems to communicate. And they knew that bulletin board systems were "kind of like the Internet." And they knew that there was information on the Internet, therefore there was a connection between bomb making information on the Internet and the Oklahoma City bombing. It was very interesting to see how these little assumptions about the connection between the Net and bomb-making information propagated throughout the media. (So far as we know, by the way, there is no connection between Tim McVeigh and computer technology except that at one point he is said to have believed that he had a computer chip implanted in a very delicate place during the Gulf War.) Let me tell you a little bit about how the Net is misrepresented both to the media and to the general public, and also to Congress. We hear about the mythical child that finds pornography on line within 30 seconds of logging on. You know, *I* can't even find pornography on line in 30 seconds of logging on. In fact, I can't find *anything* within 30 seconds of logging on. The second myth is that the Net is very much like broadcasting, therefore deserves the kind of regulation that the Federal Communications Commission administers to the broadcasting entities around the country. My own feeling is this: "Why shouldn't anything that's legal in a Barnes and Noble Bookstore or in the New York Public Library be legal on line?" I ask this question again and again, and I had a debate one Sunday on a Seattle radio station with a fellow from Morality in Media, Bob Peters. I raised this question and Bob Peters responded: "But, Mike, computers come into our home!" And I said "Well, you know, Bob, *books* come into my home! And yet you wouldn't be able to limit the content of books the way you want to limit the content of computer networks. We would think it was totally a violation of the First Amendment to impose the kinds of restrictions that you would impose on the Net on the publishers of books." Why should the rules be any different? And yet you hear again and again there ought to be new laws required to regulate the Net. That the Net is currently unregulated in some way. That cases like the Milpitas couple who were prosecuted in Memphis illustrate the need for new laws. Never mind the fact that they were successfully prosecuted under old laws. How can one equate the Net and broadcasting? I mean up to now, the nicest thing that you could say about the broadcasting medium and the legal regime that governs it was this: Those limits don't apply to any other medium. The FCC doesn't control newspapers or books, and isn't that great? The justification constitutionally for special regulation of content of broadcasting has essentially been twofold. The notion that broadcasting frequencies are scarce so therefore require the government to step in, and not only allocate them, but govern their use for the public good. And secondly, the notion that broadcasting is pervasive in some way. That it creeps into the home in a special way that makes it uniquely different from other media. Regardless of whether you accept these justifications for content control over the air waves, the fact is the Internet is nothing like broadcasting in either way. Internet communication is not scarce. Every time you add a computer to the Internet you've expanded the size of the Internet. It is not pervasive because you don't have people pushing content into your home, you have people logging on and pulling content from all over the world. It is not the case that you log on and have stuff pushed at you that you don't want to see. It is a fundamentally choice-driven medium, a choice-driven form for communication very much like a bookstore, a newsstand or a library, and therefore deserving of the same strong First Amendment protections. For those of you who weren't paying attention this year, the United States Congress passed an omnibus telecommunications reform act. I think most of the provisions there won a lot of popular support. The telecommunications regulatory regime was very old and needed to be updated. There are debates about how the balances ultimately ought to be struck, but there was a wide consensus on the need to deregulate the traditional telecommunications industries. Compare the fact that in one small section of the bill, the "Communications Decency Amendment," we find the federal government, whose competence to regulate all the other media has been indeed questioned, imposing new regulations on content on the Net and with little, if any, constitutional justification. You see, this isn't about pornography. This isn't about obscene materials. This is about something called "indecency," a far broader category that you might think involves pornography, but in fact, it encompasses quite a bit more. For example, a George Carlin comedy routine has been restricted under the name of indecency. The Allen Ginsburg classic poem, "Howl," has been restricted from radio because it was deemed by one court to be indecent. Various other kinds of material from the high to the low, from Allen Ginsburg to Jackie Collins' novels, cannot be spoken or uttered on the radio. Now why is that? The FCC has special power and the government and the congress has special power to control content in the broadcasting arena. But where's the justification for the expansion of that federal authority to this new medium that holds the power of granting freedom of the press to every citizen. Where does the Constitution say the government can do that? Where does the First Amendment say the government can do that? Everybody more or less knows something about what qualifies as obscene. You know it has something to do with "community standards," right? And with appealing to the "prurient interest." A work has to be a patently offensive depiction of materials banned by state statute and appeal to the prurient interest to be obscene and it also has to meet one other requirement. It also has to lack serious literary, artistic, social, political or scientific value. That's how something is classified as "obscene." The reason that religious fundamentalist lobbying groups want to expand the notion of indecency to the Net is that they are very troubled by the test for obscenity. They regard the serious literary, artistic, social and political clause of the test for what is obscene to be a sort of an escape clause for pornographers. What they would really like to be able to do is to prosecute anyone who distributes content in any way other than by printing ink on dead trees under a far broader censorship law that has no provision for artistic value or social importance. That is something I find very, very frightening. This is not about protecting children. We've heard it again and again, we're trying to protect our children from bad content on the Net. But this is not about protecting children. This is not about pornography. (I wish it were about pornography. That's easy to talk about.) But it's about a far broader class of speech. So the Communications Decency Amendment is not really about protecting children, it's about silencing adults. We were sold the Internet, we were sold the information superhighway as this great global library of resources. Now you have people in Congress and people on the religious right who want to reduce the public spaces of the Net to the children's room of the library. I think we can do better than that, and I think American citizens can be trusted with more than that. It should be remembered whenever we look at how to apply the First Amendment to any medium--be it the Net or anything else--that the purpose of the First Amendment is to protect speech that is offensive, troubling, or disturbing because nobody ever tries to ban the bland, pleasant, untroubling speech. This new law, the Communications Decency Amendment, creates immense problems for anyone who's a provider, for anyone who's a user. In fact, the interests of the industry and the interests of the consumers are essentially the same. And the media have a special responsibility not only to make these issues clear but also not to play to our fears anymore. Because the fact is, Americans are nervous about sex, we're nervous about our children, and we're nervous about computers. So if you combine all of those into a newspaper story, you could pretty much drive anyone into a frenzy of anxiety. And the impulse to regulate is always there. But you'd better think twice before calling for new regulation because these are the rules that we are all going to play under in the 21st century. It is important to understand that this is the first time in history the power of a mass medium lies in the hands of potentially everybody. For the first time the promise of freedom of the press will be kept for everyone. A. J. Liebling famously commented that freedom of the press belongs to those who own one. Well, we all own one now. The Net is an immense opportunity for an experiment in freedom of speech and democracy. The largest scale experiment this world has ever seen. It's up to you and it's up to me and it's up to all of us to explore that opportunity, and it's up to all of us not to lose it. I'm a parent myself, as you know. And I worry about my child and the Internet all the time, even though she's too young to have logged on yet. Here's what I worry about. I worry that 10 or 15 or 20 years from now she will come to me and say, "Daddy, where were you when they took freedom of the press away from the Internet?" And I want to be able to say I was there -- and I helped stop that from happening. ------------------------------ Date: Thu, 21 Mar 1996 22:51:01 CST From: CuD Moderators Subject: File 4--Cu Digest Header Info (unchanged since 7 Apr, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.30 ************************************