Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 07 Issue 54

  


(Cu Digest Homepage: http://www.soci.niu.edu/~cudigest


Computer underground Digest Wed Jun 28, 1995 Volume 7 : Issue 54
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
la Triviata: Which wine goes best with Unix?


CONTENTS, #7.54 (Wed, Jun 28, 1995)

File 1--More information about the Wish Book BBS(fwd)
File 2--Against Intellectual Property..
File 3-- 3,000 AOL Computer Users to be Raided
File 4--Obscenity in Cyberspace
File 5--Cato Study Release: Exon bill would "lobotomize the Internet"
File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Wed, 28 Jun 1995 08:10:00 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 1--More information about the Wish Book BBS(fwd)

---------- Forwarded message ----------

From--lorne.shantz@twb.com@INTERNET at #EMAIL

Organization: The Wish Book BBS (602)258-7113/Phoenix, Az.

Dear friends,

This letter is to inform you of the ongoing saga of the State of
Arizona against Lorne Shantz of The Wish Book BBS. PLEASE, repost this
to anyone and everyone that you want to. Don't bother to ask
permission, just do it! For moderators: if you see this message and it
isn't in your conference and you want it there, please copy it over to
that conference!

As some of you may have already heard... There was a hearing to
dismiss or remand the case on the 22nd June. The judge ordered the
case remanded back to the Grand Jury. This means the county attornies
office will have to start over! They will be able to use the same
evidence but they have to go back to the grand jury.

If any of you are unfamiliar with the AOP, as SYSOP's, should maybe
become aware of what they are and who they represent. The Association
of On-line proffesionals defends SYSOPS's. That is their claim to
fame. From the capital, to local issues. Many don't know this. What
follows is an article that Mr. Dave McClure is releasing in the AOP
Newsletter. He can be reached at dave.mcclure@aop.org

At the end of his news article is the defense fund info for any of you
that may have missed it and would like to help us defend Lorne Shantz
against this mess. The legal bills are staggering not to mention he is
fired and hasn't been able to get a job. He NEEDS your help badly!
=========================================================

=By Dave McClure
dave.mcclure@aop.org

IN OLD ARIZONA

Lorne Shantz has spent the last 15 years as an Arizona State Trooper.
He's a decent, law-abiding citizen who worked hard to build a popular,
well run and legal BBS. What they're doing to him in Arizona is a crime.

In Maricopa County, prosecutors are trying to convict Shantz on a
variety of obscenity charges that could send him to jail for life.

The outcome of the trial may be a moot point -- they've already ruined
him financially, seized his system and gotten him fired from his job as
an officer of the Arizona Department of Public Safety and pilot for
three former governors. His reputation has been smeared almost beyond
repair.

Two years ago, the county opened the investigation based on the
allegations made by a snitch. The allegations were that The Wish Book
BBS Shantz has operated sicne 1988, had illegal copies of Microsoft
software.

The Investigation did turn up a copy of the MS mouse driver. Microsoft
rightly requested that Shantz cease and desist, and he apologized for
the oversight and removed the offending file.

It should have ended there. But in a county with a prosecutor up for
reelection, the case has taken a nasty turn. Based on other allegations,
investigators went looking for obscene pictures. They didn't find any.
Shantz had tough policies about uploads, restricted access by minors and
generally did everything required to run a clean system.

Not deterred by this lack of evidence, they raided the premises last
November and seized the BBS. After carefully weeding through the 9
gigabytes or so of files, they still found nothing.

Except some CD-ROMs. The Wish Book Had 20 of them online, the usual
blend of shareware and adult pictures that can be purchased anywhere
through leading computer magazines.

The prosecutor found images on the CD-ROM that Shantz didn't even know
were there. Beastiality files, defection files and a few of unidentified
females whose thigh might belong to a person under the age of 18. Not
many files, a few out of thousands.

Most sysops run such CD-ROMS on their BBS systems. They do so in the
belief that because CDs are openly sold everywhere, they offer some
protection against undesirable or obscene content. Not so, in this case.

What's disturbing about this case is that is isn't about obscenity or a
major offense -- even the prosecutor's office characterizes the case as
a minor point of law. It's about pride and reelection.

They tried to bust the BBS for copyright infringement, and didn't have a
case. They looked for obscenity on the BBS and came up dry. But after
spending two years and untold thousands of taxpayers dollars, they can't
afford to let it drop -- if they don't slam him with a major felony,
someone is bound to ask why they are wasting dollars to prosecute this
case instead of real crimes.

Lorne Shantz isnt' a pornographer. He's not a panderer of obscenity, or
kiddie-porn, or illegal software. He's a clean SysOp and a good cop
whose reputation has been mangled by a snitch looking for a reduced
sentence and a prosecutor too proud to do the right thing.

Is the prosecutor's pride -- Or reelection -- worth a man's reputation?

We don't think so. That's why AOP has decided to step into the case in
support of Lorne Shantz.
=============================================================
End of article

The defense fund info for any wishing to help Lorne Shantz out:

The defense fund is called the "Lorne Shantz Defense Fund." The address
is c/o Jeff Adcock, P.O. Box 273, Litchfield Park, Az. 85340, or call
Jeff Adcock (brother-in-law) at 602-877-9638. We accept money, checks,
credit cards, anything. Please, we need your help and we need your
support. (if you choose to use a credit card, you will need to go
through the credit card door at the BBS numbers listed below)

602-258-7113
602-252-4472

------------------------------

Date: 27 Jun 1995 16:07:17 +1000
From: "Brian Martin" <Brian_Martin@UOW.EDU.AU>
Subject: File 2--Against Intellectual Property..

From--S. Keith Graham
Date--Thu, Jun 22, 1995 8:47

============================================================
Overall, your article appears to be fairly well researched
and persuasive, but a couple of points:

While trademarks can be abused, they are much narrower than any of the
other forms of intellectual property. Much like the "Right of
Attribution", trademarks provide the consumer some assurance of the
quality and contents of a product. (And trademarks are fundamental
in markets well afield of the "information marketplace.")

Your essay didn't mention trademarks (outside of the initial list of
types of property), so I don't have any idea where you stand on
trademarks. (For whatever its worth, I've heard that
the Former Soviet Union considers establishing a system of trademark
to be a very high priority, because without it, competition in any
marketplace is impossible.) I believe that, without a right of
attribution/trademark, a marketplace simply can not function.

Second, in the environment you suggest, I don't see how a movie like
_Jurrasic_Park_ could ever get made. The large works, that require
tens of millions of dollars to be "fronted", would not have a visible
mechanism to reclaim their investment. (Well, it is possible that
the theaters could be owned by the film producers, and every effort made
by the film producers to prevent illicit copies being made; but this is
applying physical copy protection which is counter to your proposals.)

So how do you propose the money travel from those interested in seeing
such a movie into the hands of those who (might) be making that movie
in the future? Or how do you propose that the investors will regain
their investments (plus a profit for risk) after release?
(Similiar arguements can be made for other large, tightly coordinated
efforts such as large, integrated software projects.)

(A copyright of a few years would however, cover the initial release,
home video sales, cable release, and public network release which comprises
the majority of the profit related to your average movie. This might be
a much better situation than the current "life+50". And it is more than
sufficient for the lifetime of most software products.)

Third, without all information producers being employees of the public,
I don't see a method whereby money can get from the consumers to the
producers. (And I believe that making information producers employees
of the government is not in anyone's best interests.)

Last, in a free economy, if "raw data" is equally available, non-entertainment
data will be provided as close to "cost" (including labor of the preparers)
as possible. If there is a market for hyper-text versions of the
U.S. Code of Laws, several companies will each lower their prices until
the net result is "at cost" information. This does assume, however,
that the raw data is equally available. (And copyright does give them
the ability to protect their investment in converting the raw data
into useful information. Without that protection, the copier has a
much lower cost than the producer, and the producer has no source of income
since he can't eliminate that portion of his costs.) Again, since in
most fields, "raw data" is quickly out of date, a short term copyright
is sufficient.

Last, the compensation of entertainers (and other works) should
be representative of the *quality* of their work, just as in other
fields. If the market judges an author's work of much higher quality,
I have no objection to their being compensated at a much higher rate
than others. (Similiary, I will pay more for a higher quality car than
for a car from a company that is known for reliability problems.)

And in a world with limited resources, I don't see any kind of
serious social changes like the ones you suggest. All of your
arguments based on such social changes are, unfortionately,
overcome by that fact. However, shortening the copyright term
(or otherwise altering the copyright law to encourage more free-flowing
information) can be successfully argued from the current social model.
If you choose to go for another round of revisions, I'd strongly
suggest an approach based on the current economic model (and suggestions
for changes that may perhaps influence that model) rather than
looking for an "alternative history" of what might have been.

Keith Graham
vapspcx@cad.gatech.edu


============================================================

********************
Reply by Brian Martin


Keith Graham raises some intriguing and challenging points concerning
intellectual property.

* He is quite correct that I concentrated on copyright and patents and
not on trademarks, which are not such a source of exploitation. Just a
few comments. Trademarks can used in ways that have little to do with
quality assurance. For example, when the holders of the trademarks in
the Olympic rings or Jurassic Park license their symbols for use with
toys or hamburger chains, it says very little about quality. It's also
amusing to see green groups scrambling to register "Green Party", as
if holding the legal right to a word certifies a group's greenness.
Peter Drahos made the point to me that trademarks are valuable to
consumers when they indicate the origin of goods, but that trafficking
in trademarks -- selling and buying them -- should be opposed.

A movie like Jurassic Park be made without copyright laws? This is a
tricky question since it assumes the value of the movie Jurassic Park
and ignores the other movies that might be produced if such a large
slab of money did not go to a single project. In other words, it
ignores the opportunity cost of Jurassic Park.

Another point is that Jurassic Park is more than a movie -- it is a
marketing package. It is planned as a combined marketing operation
involving movie, toys, T-shirts and all sorts of commercial spinoffs.
It is by no means obvious that such an enterprise, which is built on
intellectual property, is an efficient or wise way to allocate
economic resources.

There are other possible ways to imagine large investments in movie
and other projects. For example, viewers of a previous feature or a
short might be asked to contribute a small amount toward sponsoring a
certain director or project.

However, the most important point is that intellectual property
benefits large corporations and large projects at the expense of
others. Without intellectual property, there would be an enormous
diversification of production, with many local and indigenous
enterprises becoming viable. The difficulty is that it's only possible
to see what is produced now, not what is *not* available now due to
intellectual property.

* Today, very few information producers make a living directly from
their personal ownership of information. Almost all intellectual
property is owned by large organisations (government or corporate).
For those few writers or inventors who rely on royalties, it is
possible to imagine a number of alternative economic models to provide
a livelihood. One possibility is a guaranteed annual income (provided
by government or by a local community). Another is for writers to
rely more on journalism, which happened in the 1800s when there was no
copyright in the US. Another is for authors to obtain payments based
on the number of copies of their books in libraries, as currently
operates in a number of countries; this "public lending right" scheme
could also operate without copyright. Another possibility is for
writers and inventors to request "subscriptions" to support work on
their next project. This is the way many "alternative" journals
operate today, depending as much on contributions as on subscriptions.

* Today, some entertainers actually like pirate tapes of their
concerts to be made and distributed. This increases their visibility,
increases sales of future releases and increases audiences at
concerts.

* I agree that shortening copyright terms makes a lot of sense. For
movies most of the money comes in during the first few weeks or
months. For television and radio, post-broadcast sales usually are a
minor consideration. So why have copyright terms been increasing? The
most plausible explanation is that the institution of intellectual
property is being used by vested interests against the common good. If
rational reform was a reasonable prospect, then I probably wouldn't
bother making a case against intellectual property. It is because
intellectual property is so readily used to exploit those who can
least afford it -- especially third world peoples -- that think that
it would be better to abolish intellectual property altogether.

* Peter Drahos, a lawyer who has studied the politics of intellectual
property, things the term "intellectual property" is itself
misleading. He thinks "monopoly privilege in ideas" is a better
description of what's involved. It's by no means obvious that economic
efficiency is best promoted by a legally guaranteed right of monopoly
use over years or decades.

* My view is that extension of property rights to information is
neither inevitable nor necessarily beneficial. My case is against
intellectual property altogether. If others want to push for shorter
copyright terms and other such changes, that's fine too. There's no
single correct answer or strategy.

------------------------------

Date: Mon, 26 Jun 95 16:48:35 EDT
From: Jon Hagee <MCLHAGEE@UKCC.UKY.EDU>
Subject: File 3-- 3,000 AOL Computer Users to be Raided

This might be a correction on the "30,000" to be raided story. Here's
what I believe was mentioned on the Limbaugh show:

* Today's USA Today has the following short story which
Rush referred to before the hour:

"The FBI intends to raid the homes and businesses of more than
3,000 people who are suspected of viewing child pornography on
their computers, the Cincinnati Enquirer reported. The FBI began
the investigation after discovering some America Online customers
violated federal law by posting electronic-mail pictures of naked
children, some engaged in sex acts with adults and animals. The
FBI would not comment on the report. No date was given for the
raids, expected within a few weeks."

I didn't see the Cincinnati newspaper. You might want to check that
out also.

------------------------------

Date: Thu, 22 Jun 1995 18:35:39 CST
From: pmarks@CCTR.UMKC.EDU
Subject: File 4--Obscenity in Cyberspace

OBSCENITY IN CYBERSPACE

[The following post is adapted from a paper on the Thomas AABBS
case that has been well-publicized in CuD. I thought newer reader
who are wondering might want to see what the issues are and what
the fuss is about. Right now, we are facing serious threats to
civil liberties brought on by near-hysteria over "bad things" net
users might or might not engage in. The best way to guard against
overreaction is to be well-informed and then act as watchdogs over
the legislature.]

[Oh yes. The following post does contain explicit language that
may be offensive to some individuals .... if rash develops,
discontinue use.]


ABSTRACT

In 1994, many users of the Internet were alarmed when a jury in
Memphis, Tennessee convicted Robert and Carleen Thomas on charges of
transmitting obscene images via computer modem from a bulletin board
service they operated in Miltipas, California. The case sets a
precedent in federal court and expands the definition of "local
community standards" into the generally unregulated realm of computer
based communications. This paper focuses attention on First Amendment
freedom and the implications of this case in "cyberspace."

INTRODUCTION

Robert and Carleen Thomas, of Miltipas, California operated the
Amateur Action Bulletin Board Service (AABBS) which offered sexually
explicit images to members who filled out an application and paid a
subscription fee. The images were stored on their BBS computer in
Graphic Interchange File (GIF) format and could be transferred to a
member's computer for viewing only by using a computer modem and
standard telephone lines. The GIF files so obtained could be seen as
images on a computer screen with the appropriate software.

FACTS OF THE CASE

In March of 1991, the San Jose Police Department conducted an
undercover investigation of Robert and Carleen Thomas resulting in a
search warrant alleging trafficking in obscene material and child
pornography. On January 20, 1992 San Jose, California police raided
the home of Robert and Carleen Thomas seizing all of their computer
equipment, video tapes, and records. According to investigators Greg
Gunsky and Mark McIninch, since no child pornography was found, all
confiscated equipment was returned and no charges were filed. (CuD,
Vol. 4: Issue 09, Feb. 28, 1992 and Vol. 6: Issue 33, Apr. 14, 1994.)

On July 10, 1993, Postal Inspectors in Memphis contacted the AABBS by
computer. They determined that the system operator (SysOp) was
offering to sell computer GIF images of young girls via modem
transmission over interstate telephone lines.

[There appears to be a discrepancy here since by the wording of
the affidavit for warrant, the investigation began in advance of
the citizen complaint.]

On July 26, 1993, Postal Inspectors in Memphis received a complaint
from an unnamed citizen who identified himself as an avid computer
"hacker." He stated that he had encountered a computer bulletin board
system (BBS) offering photos and videos of nude children, named the
Amateur Action bulletin Board System (AABBS).

On August 20, 1993, Postal Inspector David H. Dirmeyer, in Memphis,
using a computer contacted the AABBS using the phone number provided
by the citizen hacker. Using the fictitious name Lance White, he
mailed a completed application form to the California address
indicated. On August 26, 1993, Dirmeyer (as Lance White) gained
membership and began a standard "sting" operation. He traded messages
with Thomas indicating that he had hard-core pornographic materials
Thomas might be interested in.

From September 3 to October 19, 1993 inspector Dirmeyer downloaded the
following GIF files from AABBS:

AA-L2209.GIF "HE FUCKS A PIG! SHE FUCKS A DOG AND A HUGE PIG! KINKY"
AA-12217.GIF "KINKY! HORNY GIRLS SUCK HORSES! BIG HORSE COCK IN HER
TWAT!"
AA-08589.GIF "SHE SUCKS HER SON'S COCK! FATHER IS FUCKING HIS
DAUGHTER"
AA-8278.GIF "FULL SCREEN VIEW! A HAIRLESS PUSSY NAILED TO A TABLE!"
AA-7153.GIF "MOTHER IS WATCHING HER DAUGHTER FUCK BIG COCK! NO TITS!"
AA-8682.GIF "HE MAKES HIS DAUGHTER SUCK COCK! SHE IS FISTING HER SISTER"
AA-11935.GIF "HE FUCKS HIS DAUGHTERS HAIRLESS CUNT! SHE FISTS HER MOTHER!"
AA-15198.GIF "BLONDE LOLITA HAS NO TITS! SUCKS HUGE COCK AND DRINKS
SPERM!"
AA-13216.GIF "PUSSY PENETRATION! HORNY BRUNETTE GETS FUCKED BY A
HORSE!"
AA-13517.GIF "HORNY BLONDE JACKS OFF HORSE! HORSE CUM ON HER HAND!"
AA-13521.GIF "CLOSE-UP! BIG HORSE COCK IN HER CUNT! HORSE CUM ON HER
LEG"
AA-16587.GIF "SHE SUCKS THICK DOG COCK! DOG SPERM ON HER LIPS AND
CHIN"
AA-17623.GIF "YOUNG ASIAN HAS A THICK CLIT! DRINKS PISS FROM AN
UNCUT COCK!"

On January 6, 1994 Postal Inspector David H. Dirmeyer filed an
affidavit for a search warrant of the property of Robert and Carleen
Thomas. (CuD, Vol. 6: Issue 33, Apr. 14, 1994.)

On January 15, 1994 in a conversation with H. Keith Henson of San
Jose, California inspector Dirmeyer stated that it was a "normal
investigative procedure" to send unsolicited child pornography to an
investigation target and then execute a search warrant within minutes
of its receipt. (CuD, Vol. 6: Issue 35, Apr. 19, 1994)

On January 25, 1994 a Federal Grand Jury in Memphis Tennessee indicted
Robert and Carleen Thomas of several obscenity charges including six
counts of transporting computer generated images from California to
Tennessee in violation of Title 18, United States Code, Section 1465.
On February 3, 1994 the Thomas's were arrested in California by US
Postal Inspectors (Ducar, Frank L., US Postal Inspection Service News
Release, San Francisco, CA, Feb. 3, 1994).

On July 21, 1994 the Thomas' were indicted on separate child
pornography charges in Salt Lake City, Utah. They were charged on
eleven counts of sexual exploitation of minors involving the AABBS.
(Conley, Chris. The Commercial Appeal, Memphis, TN, Jul. 23, 1994)

On July 28, 1994 the Memphis jury told the District Judge that they
split on two counts. The judge ordered them to deliberate for a third
day on the remaining counts involving interstate transport of
obscenity and child pornography.

On July 29, 1994 Robert and Carleen Thomas were convicted on 11
counts of transmitting obscenity through interstate phone lines via
their members-only computer bulletin board. Each count carries up to
five years in prison and a $250,000 fine. The Thomases remained free
on $ 20,000 bail. No sentencing date was set. (Corrigan, Patricia and
AP. St. Louis Post-Dispatch, St. Louis, Jul. 29, 1994)

On December 2, 1994 Judge Julia Gibbons of Federal District Court
sentenced Robert Thomas to three years and one month in prison. His
wife, Carleen, received two and a half years. Federal sentencing
rules require them to serve the full terms. (Associated Press. "Jail
for couple over computer pornography" The New York Times, New York,
Dec. 3, 1994, Sec 1: Page 9, Col. 3)

THE FIRST AMENDMENT ISSUES

The US Supreme Court decision in the case of Miller v. California, 413
US 15 (1973) established a three part test to determine if material is
obscene and therefore not protected by the First Amendment:

a. Whether the average person, applying contemporary community
standards, would find that the work, taken as a whole, appeals
to the prurient interest.
b. Whether the work depicts or describes in a patently offensive
way, sexual conduct, which may be specifically defined by
applicable state law and which may include but not be limited to:
1. Patently offensive representations or descriptions of
ultimate sexual acts, normal or perverted, actual or
simulated.
2. Patently offensive representations or descriptions of
masturbation, excretory functions and lewd exhibition of the
genitals.
c. Whether the work taken as a whole lacks serious artistic,
political, literary, or scientific value.

The postal investigators used the local community standards of the
Western District of Tennessee to meet tests (a) and (b) since that is
the location where the transmitted images were received, and (c) was
determined by the "reasonable person" test (once again, using the
community standards of Memphis).

This decision was in many was unsatisfactory because the court avoided
the sticky issue of defining obscenity, instead, each local
jurisdiction must establish its own standard. Obviously, standards
vary widely from one community to another.

The editors of the CuD expressed worry that "if a text, gif, or other
file is legal in one state, what are the implications of such a file
is accessed by someone from another state where the file(s) may not be
legal? Given the permeable borders of cyberspace, can prosecutors
apply local laws to other states and thereby invoke federal law
enforcement power? If so, this could mean that the most restrictive
laws in one jurisdiction are the de facto threshold of legal tolerance
universally. (Thomas, Jim and Meyer, Gordon, eds. The CuD, Apr. 14,
1994, Vol. 6: Issue 33)

In a CNN interview Robert Thomas and his attorney Richard Williams
told correspondent Brian Cabell they felt the AABBS was singled out
because it was one of the largest adult oriented BBS' and if the Feds
could shut them down, they could "chill the First Amendment
expressions of everybody else in [the computer pornography] business"
(Cabell, Brian. Cable Network News, Jul. 27, 1994).

The Thomas' case may well become a civil liberties/first amendment
textbook example. The defendants offer for sale material that would
be clearly objectionable to many (but not necessarily all) people.
When investigated locally by the San Jose police, the material was not
found to be obscene by San Francisco community standards. Not
surprisingly, sexually graphic images with descriptions such as "SHE
SUCKS HER SON'S COCK! FATHER IS FUCKING HIS DAUGHTER" were found to be
totally offensive to the community standards of Memphis, Tennessee.

The San Francisco Examiner opined that this was a case of prosecutors
"shopping" for a venue The troubling question in the age of on-line
communications is that material assessable by computer is virtually
available everywhere in the world simultaneously. Anyone, anywhere,
with a computer and a modem (and a credit card) can log on to a
bulletin board service and download thousands of images. "Electronic
communication has made earlier definitions of a community [standard]
all but obsolete" (San Francisco Examiner Aug.. 24, 1994, 4th ed.).

Christianity Today, however, applauds the conviction and warns readers
that "cyberporn" is threatening to invade the American home. The
National Coalition Against Pornography (NCAP) fears easy access to the
information superhiway will expose children to unlimited sources of
obscene and pornographic materials. "Antipornography advocates hope
to stimulate greater public awareness and more prosecution of
obscenity delivered by computer modem" (Zipperer, John. Sep 12, Vol.
38: No 10, pg. 42)

In an interview on National Public Radio's "All Things Considered,"
attorney Mike Godwin of the Electronic Freedom Foundation (EFF)
cautioned that anyone operating a system connected to the internet has
reason to be concerned. Goodwin saw this decision placing the
responsibility for complying with community standards expanded beyond
the locality in which the system operates to include the standards of
every conceivable locality in which the data can be accessed.

Godwin sees two flaws with this. "You can either accept the idea of
geographic communities; in which case, you say there's something wrong
with Memphis dictating the standards of California. Or, you can say
the whole idea of geographic communities is bankrupt and we need to
revisit that reasoning in the Supreme Court. And I would be happy
with either approach."

Reporter John McChesney voiced the NCAP concern about computer
literate children easily accessing pornography over the net. Godwin
thought this danger was overstated. Most of the really hard-core
material requires payment by credit card. So unless one can establish
that children are getting their own credit cards and signing up on
these systems, Godwin sees this as consenting adults in transactions
with other consenting adults. (McChesney, John. "All Things
Considered" National Public Radio, Jul. 29, 1994)

IMMEDIATE EFFECTS

The conviction has already had a chilling effect on the electronic
community. Most major universities are connected to the internet, and
carry millions of files on the usenet news groups covering every
imaginable topic. Many of these topics are potentially offensive to
some readers:

alt.sex.bestiality Happiness is a warm puppy.
alt.sex.bondage Tie me, whip me, make me read the net!
alt.sex.enemas Cleansing the bowels as an erotic act.
alt.sex.fetish.amputee Sexual attraction to missing body parts.
alt.sex.intergen Robbing the cradle and the grave.
alt.sex.magazines Magazines with sticky pages
alt.sex.movies The ins and outs of certain movies.
alt.sex.necrophilia Dead people as stimulus.
alt.sex.pedophilia Discussing attraction to children.
alt.sex.pictures Gigabytes of copyright violations.
alt.sex.services The oldest profession.
alt.sex.spanking Bondage for beginners.
alt.sex.strip-clubs Strip clubs and exotic dancers
alt.sex.telephone Discussion of phone sex services
alt.sex.voyeurism A lot of lurkers in this group.

It is even possible that individuals trading messages and files in
such groups may even conspire to commit illegal activites, ie.
exchange materials that are, in fact, obscene and illegal. To deal
with this, many Usenet providers publish a standard disclaimer
explaining that it is impossible to filter through gigabytes of data
in order to eliminate files that may "contain material which could be
in violation of federal, state, and/or local laws .... individuals
posting newsitems are responsible for their content." The law may now
hold the system operators liable for the content, and may use the
community standards of the location in which the files are downloaded.

Some system administrators, in the wake of the Thomas' conviction,
made unilateral decisions to remove groups they felt might get them
into trouble. One system removed "pictures.tasteless" with a message
to users that "the conviction by a jury in a conservative town
effectively imposed its community standards throughout the nation"
("New thought police patrol superhighway" Chicago Sun-Times,
editorial, Aug. 3, 1994, pg. 37).

Carnegie Mellon University's academic council temporarily stopped
carrying Usenet groups that made any reference to "sex." This had the
unfortunate side effect of eliminating groups devoted to scientific,
medical, and social research as well as anonymous support groups for
sexual abuse recovery. "The student council pointed out that the
administration was restricting the reading matter of adults to what
was acceptable for children. The American Civil Liberties Union
complained that the ban was overly broad and included discussions of
sexual matters that were clearly protected speech." The decision was
finally reversed. (Elmer-Dewitt, Philip. "Censoring Cyberspace" Time,
1994)

CONCLUSION

The Thomas' case will undoubtedly go to appeal, and may establish new
law in doing so. I question the applicability of the 1983 Miller
decision for local community standards in the face of rapid
technological advances. Crooks may use the telephone to plot a bank
robbery, but the phone company is not considered to be an accessory to
the crime. Perhaps the same analogy should be applied to an
information carrier, so that they are not directly responsible for the
information content. Otherwise, system operators face the daunting
task of filtering every message or file and then determining if it
might violate the community standards of any community with access to
telephones. Even blocking certain area codes from access will not
always work, because users can "telnet" through various providers so
that the system they communicate cannot determine where the caller
really originates from. By the standards established in the Thomas
case, any major university could have been used as a sting target just
as easily.


*********************************************************************


REFERENCES

CuD, Vol. 6: Issue 35, Apr. 19, 1994. Thomas, Jim and Gordon Meyer,
eds. The Computer Underground Digest, Apr. 14, 1994, Vol. 6: Issue 33.

Ducar, Frank L., US Postal Inspection Service News Release, San
Francisco, CA, Feb. 3, 1994.

Conley, Chris. The Commercial Appeal, Memphis, TN, Jul. 23, 1994.

Corrigan, Patricia and Associated Press, St. Louis Post-Dispatch, St.
Louis, Jul. 29, 1994.

Associated Press. "Jail for couple over computer pornography" The New
York Times, New York, Dec. 3, 1994, Sec 1: Page 9, Col. 3.


Cabell, Brian. Cable Network News, Jul. 27, 1994.

San Francisco Examiner, Aug.. 24, 1994, 4th ed.

Zipperer, John. Christianity Today, Sep 12, Vol. 38: No 10, pg. 42.

McChesney, John. "All Things Considered" National Public Radio, Jul.
29, 1994.

"New thought police patrol superhighway" Chicago Sun-Times, editorial,
Aug. 3, 1994, pg. 37.

Elmer-Dewitt, Philip. "Censoring Cyberspace" Time, 1994.



------------------------------

Date: Wed, 28 Jun 1995 08:10:50 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 5--Cato Study Release: Exon bill would "lobotomize the Internet"

---------- Forwarded message ----------

From--tedwards@Glue.umd.edu (Thomas Grant Edwards)
Subject--Cato Study Release--Exon bill would "lobotomize the Internet"
Date: 26 Jun 1995 21:26:46 -0400


STUDY RELEASE

June 24, 1995

Exon bill would "lobotomize the Internet," study says

The Communications Decency Act, sponsored by Sen. James Exon (D-
Neb.) and passed by the Senate 84-16 on June 14, could severely
restrict the free flow of information that characterizes the
digital age, says a new study from the Cato Institute.

In "New Age Comstockery: Exon vs. the Internet" (Policy Analysis
no. 232), First Amendment lawyer Robert Corn-Revere writes, "The
law threatens to lobotomize the Internet by superimposing
essentially the same legal standard that stifled the publication
of literature in America for nearly 60 years under the Comstock
law."

Passed in 1873, the Comstock law prohibited the use of the mails
to send any publication or photograph deemed "obscene, lewd,
lascivious," or of "indecent character."

Incompatible with free expression

Corn-Revere says the bill is unnecessary and incompatible with a
culture of free expression.

After the Comstock law was passed, literature in America was
severely censored for 60 years. Authors like Tolstoy, D. H.
Lawrence, Theodore Dreiser, and Edmund Wilson were victims
of the obscenity laws, and American readers were denied
access to their books.
FCC regulation of indecency has made the agency a "national
censorship board," which has clearly had a chilling effect
on broadcasters.
Computers and modems offer parents much more control over
access to material than do telephone or television. Online
services and Internet providers are giving parents a range
of options for blocking objectionable material.

Why it matters

The telecommunications bill now goes to the House, where Speaker
Newt Gingrich has shown an understanding of the potential
benefits and the requirements of the information age. The
digital age offers unprecedented access to information and
unparalleled opportunities for pluralism in speech and
publishing. Government intrusion into the content available on
the Internet can only impede that progress.

The full text of this study is available at Cato's Web site.
(http://www.cato.org/main/home.html)

------------------------------

Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CUDIGEST
Send it to LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: Bits against the Empire BBS: +39-464-435189
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #7.54
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT