home *** CD-ROM | disk | FTP | other *** search
Text File | 1992-07-14 | 29.3 KB | 617 lines | [TEXT/EDIT] |
- ########## ########## ########## | AMERICA ONLINE FLAP|
- ########## ########## ########## | A sensible position|
- #### #### #### | |
- ######## ######## ######## | COMPUSERVE|
- ######## ######## ######## | A sensible decision|
- #### #### #### | |
- ########## #### #### | SUN MICROSYSTEMS GRANT TO EFF|
- ########## #### #### | A new and improved eff.org in 1992|
- |
- THE EFF PIONEER AWARDS: CALL FOR NOMINATIONS |
- |
- =====================================================================|
- EFFector Online January 7, 1992 Volume 2, Number 3|
- =====================================================================|
-
- In this issue:
- THE AMERICA ONLINE FLAP
- SUN MICROSYSTEMS MAKES MAJOR EQUIPMENT GRANT TO EFF
- THE COMPUSERVE CASE
- THE EFF AND FREE ENTERPRISE
- EFF at SCAT
- THE FIRST ANNUAL PIONEER AWARDS:CALL FOR NOMINATIONS
-
- -==--==--==-<>-==--==--==-
-
- THE AMERICA ONLINE FLAP
-
- Three weeks ago, Roger Dietz of Fremont, California, revealed to the
- media that he had received GIF files of sex acts via email to his
- account on America Online. The files apparently featured people who
- were underage.
-
- Dietz, an adult, had been posing as a gay 13-year-old boy in the public
- chat rooms of America Online for some time. His announcement that what
- appeared to be "kiddie porn" was sent to him caused a number of news
- organizations such as CNN, local and national newspapers, and Newsweek
- to follow up on the story.
-
- As many participants of the nets know, the "discovery" that computer
- networks contain and transmit adult material via email, and sometimes as
- files accessible to members of the network or BBS is something that
- recurs with some regularity on both the public and commercial systems.
- When it does, it poses severe problems for the managers of those networks.
-
- Although explicit sexual material has been part of the American scene
- for many years, the fact that it can be transmitted through computer
- networks is news to many people. When the material is reported to
- involve underage people, most people feel uneasy, mystified, and angry.
- Since the technology and legal nature of email is not well understood by
- the majority of citizens, many people wonder why the management of
- computer networks cannot actively police their systems to odious or
- potentially illegal material. Faced with this problem, Steve Case,
- President of America Online, said to Newsweek's John Schwartz: "People
- ask, 'How can you permit this? It's the same question that could be
- asked of the postmaster general."
-
- Going into more detail online, Case posted the following message to all
- members of America Online:
- -------------------------------------------------
- Message to AO members from Steve Case:
-
- RESTATEMENT OF OUR POLICY
-
- I'd like to remind all of you that we have established rules regarding
- the use of this service, which we call "Terms of Service." These rules
- are posted in the online customer support area. Our goal is to foster
- the development of an "electronic community" that honors the principles
- of freedom of expression, while also recognizing that some community
- standards are needed for the service to grow.
-
- Recently two troubling problems have come to our attention. The first
- is a report that some members are using the service to commit illegal
- activities. A member has forwarded to us copies of messages he received
- which contained graphic files that may constitute child pornography.
- Because a member chose to forward these files to us, we were able to
- intervene and we are working with the authorities to pursue the matter.
- We obviously were unaware of this act until the files were forwarded to
- us, as our policy is that all private communications -- including
- e-mail, instant messages, and private chat rooms -- are strictly
- private, and we do not, will not, and legally cannot monitor any private
- communications. But if we are alerted to a potential offense and we are
- sent evidence, as we were in this particular case, we will vigorously
- pursue the matter.
-
- This first problem dealt with the illegal use of private communications.
- The second deals with the abuse by a handful of members of the public
- communications features. Recently, there has been an increase in online
- behavior that we -- and we think most members -- find to be offensive.
- This has included the use of vulgar language in public areas (chat rooms
- and/or message boards), the creation of inappropriate screen names
- and/or room names, and the sending of unsolicited, harassing Instant
- Messages to some members.
-
- Our desire is to trust the judgment of our members, and to err on the
- side of free expression. We don't want to aggressively police public
- areas to make sure everyone is abiding by the Terms of Service.
- However, we aren't going to let this type of unwanted behavior by a few
- ruin the service for us all. Let this serve as a warning to those few
- people who are creating the problem: shape up or ship out.
-
- Steve Case, President
- America Online, Inc.
- (reposted by permission of America Online)
- -------------------------------------------------
-
- -==--==--==-<>-==--==--==-
- Reviving A Computer After A Fire
-
- If a computer's plastic casing has not been deformed by the heat, which
- begins to happen at 250 degrees F, then the computer will work.
- --Dean Sheridan, electronics technician and deaf actor,
- Torrance, California.**
- -==--==--==-<>-==--==--==-
-
- SUN MICROSYSTEMS MAKES MAJOR EQUIPMENT GRANT TO EFF
-
- We are pleased to announce that Sun Microsystems has awarded The
- Electronic Frontier Foundation a substantial equipment grant for 1992.
- This grant will enable us to go forward with a number of technical
- upgrades and other projects we have been putting off for some time due
- to the limitations on our equipment.
-
- For many months, the trusty Sun 4/110 (eff.org) which handles almost all
- our Internet traffic (including the EFF's anonymous ftp archives, the
- mailing lists we host, our USENET feed, and our WAIS server) has been
- pushed to its limits. In order to upgrade our systems and provide
- better service to the net and our members, we began last summer to
- pursue a grant from Sun Microsystems that would allow us to modify and
- upgrade our system.
-
- The major feature of the grant is a new SPARCStation 2, as well as an
- upgrade to a SPARCStation 2 from our current 4/110. With two machines,
- each more powerful than our current system, we will be able to provide
- more and faster ftp, WAIS, and mailing list service without making the
- system unusable for "normal work".
-
- In addition, we have been granted a SPARCStation IPX (to be used for
- software development), two SPARCStation ELCs, which will be used for
- administrator workstations (allowing us to run window systems, long
- compiles, and the like without bogging everything down), and a large
- amount of additional disk space (much of which will go to ftp archives,
- additional WAIS databases, and the like).
-
- We are making the final arrangements now, and hope to have the new
- machines phased in over the course of February. (People who have been
- using 192.88.144.3 or 'eff.org' for ftp or WAIS please note that that
- address *will change*. Use ftp.eff.org or wais.eff.org, respectively,
- instead, as those will always point to the right machine for the job.)
-
- The Electronic Frontier Foundation would like to extend its heartfelt
- thanks to all the people at Sun Microsystems for this strong vote of
- confidence in our mission and our work.
-
- -==--==--==-<>-==--==--==-
- Brenner's Rule of Pausing Programmers
- If an expert pauses while testing a new program, that's where the
- beginner will fail. -- Norman Brenner, Fleetwood, New York **
- -==--==--==-<>-==--==--==-
-
- THE COMPUSERVE CASE:
- A STEP FORWARD IN FIRST AMENDMENT PROTECTION FOR ONLINE SERVICES.
- By Mike Godwin (mnemonic@eff.org)
-
- By now you may have heard about the summary-judgment decision in Cubby,
- Inc. v. CompuServe, a libel case. What you may not know is why the
- decision is such an important one. By holding that CompuServe should not
- be liable for defamation posted by a third-party user, the court in this
- case correctly analyzed the First Amendment needs of most online
- services. And because it's the first decision to deal directly with
- these issues, this case may turn out to be a model for future decisions
- in other courts.
-
- The full name of the case, which was decided in the Southern District of
- New York, is Cubby Inc. v. CompuServe. Basically, CompuServe contracted
- with a third party for that user to conduct a special-interest forum on
- CompuServe. The plaintiff claimed that defamatory material about its
- business was posted a user in that forum, and sued both the forum host
- and CompuServe. CompuServe moved for, and received, summary judgment in
- its favor.
-
- Judge Leisure held in his opinion that CompuServe is less like a
- publisher than like a bookstore owner or book distributor. First
- Amendment law allows publishers to be liable for defamation, but not
- bookstore owners, because holding the latter liable would create a
- burden on bookstore owners to review every book they carry for
- defamatory material. This burden would "chill" the distribution of
- books (not to mention causing some people to get out of the bookstore
- business) and thus would come into serious conflict with the First
- Amendment.
-
- So, although we often talk about BBSs as having the rights of publishers
- and publications, this case hits on an important distinction. How are
- publishers different from bookstore owners? Because we expect a
- publisher (or its agents) to review everything prior to publication. But
- we *don't* expect bookstore owners to review everything prior to sale.
- Similarly, in the CompuServe case, as in any case involving an online
- service in which users freely post messages for the public (this
- excludes Prodigy), we wouldn't expect the online-communications service
- provider to read everything posted *before* allowing it to appear.
-
- It is worth noting that the Supreme Court case on which Judge Leisure
- relies is Smith v. California--an obscenity case, not a defamation case.
- Smith is the Supreme Court case in which the notion first appears that
- it is generally unconstitutional to hold bookstore owners liable for
- content. So, if Smith v. California applies in a online-service or BBS
- defamation case, it certainly ought to apply in an obscenity case as well.
-
- Thus, Cubby, Inc. v. CompuServe sheds light not only on defamation law
- as applied in this new medium but on obscenity law as well. This
- decision should do much to clarify to concerned sysops what their
- obligations and liabilities are under the law.
-
- ----------
- Highlights of the CompuServe decision (selected by Danny Weitzner):
-
- "CompuServe's CIS [CS Information Service] product is in essence an
- electronic, for-profit library that carries a vast number of
- publications and collects usage and membership fees from its subscribers
- in return for access to the publications. CompuServe and companies like
- it are at the forefront of the information industry revolution. High
- technology has markedly increased the speed with which information is
- gathered and processed; it is now possible for an individual with a
- personal computer, modem, and telephone line to have instantaneous
- access to thousands of news publications from across the United States
- and around the world. While CompuServe may decline to carry a given
- publication altogether, in reality, once it does decide to carry a given
- publication, it will have little or no editorial control over that
- publication's contents. This is especially so when CompuServe carries
- the publication as part of a forum that is managed by a company
- unrelated to CompuServe. "... CompuServe has no more editorial control
- over ... [the publication in question] ... than does a public library,
- book store, or newsstand, and it would be no more feasible for
- CompuServe to examine every publication it carries for potentially
- defamatory statements than it would for any other distributor to do so."
- "...Given the relevant First Amendment considerations, the appropriate
- standard of liability to be applied to CompuServe is whether it knew or
- had reason to know of the allegedly defamatory Rumorville statements."
-
- Cubby, Inc. v. CompuServe, Inc. (90 Civ. 6571, SDNY)
-
- -==--==--==-<>-==--==--==-
- Writing A Computer Program
-
- No good computer program can be written by more than ten people; the
- best programs are written by one or two people. -- Phil A. Schrodt,
- Associate Professor, Northwestern University, Evanston, Illinois **
- -==--==--==-<>-==--==--==-
-
- THE EFF AND FREE ENTERPRISE
- by Mitchell Kapor
-
- [Over the past few weeks, there has been a thread in our Internet
- discussion group, comp.org.eff.talk, about the EFF's position regarding
- free enterprise and the future of the National Public Network. As can
- often happen in this volatile medium, there was some confusion over
- where the organization stands on this issue. To clarify this, EFF
- President, Mitchell Kapor, wrote the following response to the group.]
-
- I post this to clear up confusion about EFF positions which may have
- been created by posters imputing positions to the EFF.
-
- The EFF does not believe the U.S. government should own or control a
- national public network. We do not believe that the Internet or NREN
- should be extended by government fiat into everyone's home.
-
- In the context of the Internet, we would like to see a transition as
- speedy as possible to private ownership, management, and control of
- network facilities which serve or could serve competitive markets. If
- university access to networks is to be subsidized, it should be on the
- basis of direct grants to institutions which are to be used for the
- purchase of network services.
-
- What keeps the Internet glued together today is access to common network
- facilities provided through NSF-subsidized or free connections to a
- backbone network owned and controlled by a single private entity, ANS.
- The NSF recently announced that in 1993 it would begin a transition to a
- regime in which there would be multiple backbone awardees. This will
- bring affairs one step closer to a truly open regime. It should be
- pointed out that the NSF and other agencies are interested in
- stimulating the development of networking regimes (such as gigabit
- networks) which are at the leading edge of technology, hence
- pre-competitive state. This provides one principled rationale for
- government involvement.
-
- With respect to the public switched telephone network, over the next
- decade,or as soon as technology permits, we should move away from
- government mandated local exchange monopolies and toward competitive
- provision of local telephone service. After a period of time, if there
- is real competition,and we avoid the dangers of explosive decompression
- >from sudden removal of all government controls, it should be possible
- to deregulate.
-
- At the same time, development of the market for content-based
- information services could be spurred long before that with the
- deployment of a ubiquitous, affordable platform based on ISDN. We see no
- purpose in delaying this for either local loop competition or the
- development of a universal, national broadband network, both of which
- are far off (and both of which we support). To do so will likely require
- government action, through some combination of legislation and FCC and
- state regulation. It was in this narrow context and no broader one that
- we originally advocated the appropriateness of regulation to achieve
- these ends.
-
- -==--==--==-<>-==--==--==-
- The Professional Tools Rule
- Engineers and computer programmers need equipment equal to one year's
- earnings to work at top speed. Anything less slows them down.
- -- William Blake, engineering manager, New Haven, Connecticut**
- -==--==--==-<>-==--==--==-
-
- EFF at SCAT:
- Speaking to the Special Computer Attack Team
- by Mike Godwin
-
- [One of the jobs of the Electronic Frontier Foundation is to build
- bridges between different communities with an interest in computer-based
- communications. One of the most important communities is law
- enforcement. In December, Mike Godwin, staff counsel for EFF,spoke to a
- meeting of the Special Computer Attack Team (SCAT). This is his report.]
-
- The Special Computer Attack Team is a joint federal-state organization
- whose mission is to share information and resources in handling computer
- crime in that region. I met with them at their invitation in Indianapolis.
-
- I spoke for over two and a half hours, and we touched on most of the
- civil-liberties issues with which EFF is concerned.
-
- I told SCAT that perhaps the main things they'd heard about EFF is that
- it was a hacker defense fund and is suing some government agents and
- prosecutors. I explained that we *aren't* a "hacker defense fund," and
- stressed that being alert to the issues I would raise in my presentation
- is a way of minimizing the risk of a lawsuit in their cases.
-
- We discussed the issues raised by seizing equipment. "You can't seize
- equipment under a search warrant that you don't have probable cause to
- believe is evidence of a crime," I said.
-
- They responded by talking about forfeiture laws.
-
- "Can you seize forfeitable stuff that's not evidence under an
- *evidentiary* search warrant?" I asked them.
-
- They admitted that this was improper procedure.
-
- I went on to explain that the reason this improper procedure is almost
- never questioned is that, when law-enforcement agents engage in this
- kind of improper, overbroad search, the cost of litigation to recover
- invariably exceeds the cost of the equipment. At present the major
- remedy for overbroad searches is the Exclusionary Rule--the Supreme
- Court-imposed rule that says that improperly seized evidence can't be
- used in court.
-
- But the problem is that the Exclusionary Rule is *no remedy at all* in
- cases in which the government seized items that were *not* evidence. If
- you are a defendant your lawyer won't expend time and effort to seek
- suppression of the "evidence" of the illegally seized laser printer if
- the printer is not in fact incriminatory.
-
- These considerations left me with making what were essentially *moral*
- arguments that law enforcement should limit its seizures since from a
- legal standpoint, they have few risks. "Everyone in this room has sworn
- to uphold the law," I said. "Upholding the law means not seizing as
- 'evidence' equipment and other items that you don't have probable cause
- to believe *is* evidence."
-
- We also talked about searches of third-party non-targets.(Steve Jackson
- Games is a case in point about what can go wrong in a search of a third
- party). I said, "Imagine how it feels when, although you would have
- gladly cooperated with an investigation if asked, the police come and
- seize your BBS and shut it down." Even if they weren't worried about
- about legal action, I argued, they should worry about public faith in
- law enforcement when they run roughshod over law-abiding citizens.
-
- In addition, I pointed out that duplicate computer files are admissible
- as evidence under federal law, and using duplicate files is a way of
- making searches less intrusive. But it was clear from the discussion
- that ensued that most of the people at this meeting hated not seizing
- the equipment. They admitted that they found it "convenient" to take
- computers away to examine at leisure. When I became a bit angry about
- "convenience" trumping the right to a reasonable, particular search, one
- of the attendees "explained" that by "convenient" he meant "necessary in
- some cases."
-
- Finally, I told the SCAT members that the law shouldn't treat a
- third-party sysop differently than it treats IBM; if a subpoena is good
- enough to get computer records from IBM, it's also appropriate for a
- third-party sysop of a hobbyist BBS. They seemed to accept this.
-
- Overall, I came away from the Indianapolis presentation with two
- feelings. First, I was certain that we had made a good impression on
- them, that they'd found the presentation thought-provoking and
- informative, that we may had won some of them over on some issues.
- Second, I was depressed because I realized how few legal remedies there
- are for the victims of overbroad computer seizures, be they suspects or
- third parties. We have a long way to go here, complicated by the fact
- that most seizure and forfeiture decisions in recent years have been
- built on drug cases. I can only hope that as computer-based
- communication becomes more and more part of mainstream American life,
- policy makers will realize the need for new remedies and protections.
-
- -==--==--==-<>-==--==--==-
- Dealing with A Computer
- When dealing with a computer, a good rule to remember is to treat it as
- you would a small, retarded (but very obedient) child. -- Bob Horton,
- consultant and writer, St. Petersburg, Flordia **
- -==--==--==-<>-==--==--==-
-
- THE ELECTRONIC FRONTIER FOUNDATION'S FIRST ANNUAL PIONEER AWARDS
- CALL FOR NOMINATIONS
- (Attention: Please feel free to repost to all systems worldwide.)
-
- In every field of human endeavor,there are those dedicated to expanding
- knowledge,freedom,efficiency and utility. Along the electronic frontier,
- this is especially true. To recognize this,the Electronic Frontier
- Foundation has established the Pioneer Awards. The first annual Pioneer
- Awards will be given at the Second Annual Computers, Freedom, and
- Privacy Conference in Washington, D.C. in March of 1992.
-
- All valid nominations will be reviewed by a panel of outside judges
- chosen for their knowledge of computer-based communications and the
- technical, legal, and social issues involved in networking.
-
- There are no specific categories for the Pioneer Awards, but the following
- guidelines apply:
-
- 1) The nominees must have made a substantial contribution to the
- health, growth, accessibility, or freedom of computer-based
- communications.
-
- 2) The contribution may be technical, social, economic or cultural.
-
- 3) Nominations may be of individuals, systems, or organizations in
- the private or public sectors.
-
- 4) Nominations are open to all, and you may nominate more than one
- recipient. You may nominate yourself or your organization.
-
- 5) All nominations, to be valid, must contain your reasons, however
- brief, on why you are nominating the individual or organization,
- along with a means of contacting the nominee, and your own contact
- number. No anonymous nominations will be allowed.
-
- 6) Every person or organization, with the single exception of EFF
- staff members, are eligible for Pioneer Awards.
-
- You may nominate as many as you wish, but please use one form per
- nomination. You may return the forms to us via email to
-
- pioneer@eff.org
-
- You may mail them to us at:
- Pioneer Awards, EFF,
- 155 Second Street
- Cambridge MA 02141.
-
- You may FAX them to us at:
- +1 617 864 0866
-
- Just tell us the name of the nominee, the phone number or email address
- at which the nominee can be reached, and, most important, why you feel
- the nominee deserves the award. You can attach supporting
- documentation. Please include your own name, address, and phone number.
-
- We're looking for the Pioneers of the Electronic Frontier that have made
- and are making a difference. Thanks for helping us find them,
-
- The Electronic Frontier Foundation
-
- -------EFF Pioneer Awards Nomination Form------
-
- Please return to the Electronic Frontier Foundation via email to:
- pioneer@eff.org
- or via surface mail to EFF 155 Second Street, Cambridge, MA 02141 USA;
- or via FAX to +1 617 864 0866
-
-
- Nominee:_________________________________________________________________
-
- Title: __________________________________________________________________
-
- Company/Organization:____________________________________________________
-
- Contact number or email address: ________________________________________
-
- Reason for nomination:___________________________________________________
-
- _________________________________________________________________________
-
- _________________________________________________________________________
-
- _________________________________________________________________________
-
- _________________________________________________________________________
-
- _________________________________________________________________________
-
- _________________________________________________________________________
-
- _________________________________________________________________________
-
- _________________________________________________________________________
-
- _________________________________________________________________________
-
- _________________________________________________________________________
-
- Your name and contact number:____________________________________________
-
- _________________________________________________________________________
-
- Extra documentation attached: _______
-
- -------EFF Pioneer Awards Nomination Form------
-
- -==--==--==-<>-==--==--==-
- Designing a Computer System
- Making a design change when a computer system is nearly complete will
- cost about ten times as much as making the change before the work has
- started. -- Clifton Royston, programmer/analyst, Nukualofa, Tonga**
- -==--==--==-<>-==--==--==-
-
- MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
-
- In order to continue the work already begun and to expand our efforts
- and activities into other realms of the electronic frontier, we need the
- financial support of individuals and organizations.
-
- If you support our goals and our work, you can show that support by
- becoming a member now. Members receive our quarterly newsletter,
- EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
- have an electronic address that can be reached through the Net), and
- special releases and other notices on our activities. But because we
- believe that support should be freely given, you can receive these
- things even if you do not elect to become a member.
-
- Your membership/donation is fully tax deductible.
-
- Our memberships are $20.00 per year for students, $40.00 per year for
- regular members. You may, of course, donate more if you wish.
-
- Our privacy policy: The Electronic Frontier Foundation will never, under
- any circumstances, sell any part of its membership list. We will, from
- time to time, share this list with other non-profit organizations whose
- work we determine to be in line with our goals. But with us, member
- privacy is the default. This means that you must actively grant us
- permission to share your name with other groups. If you do not grant
- explicit permission, we assume that you do not wish your membership
- disclosed to any group for any reason.
-
- ---------------- EFF@eff.org MEMBERSHIP FORM ---------------
-
- Mail to: The Electronic Frontier Foundation, Inc.
- 155 Second St. #23
- Cambridge, MA 02141
-
- I wish to become a member of the EFF I enclose:$__________
- $20.00 (student or low income membership)
- $40.00 (regular membership)
- $100.00(Corporate or company membership.
- This allows any organization to
- become a member of EFF. It allows
- such an organization, if it wishes
- to designate up to five individuals
- within the organization as members.)
-
- [ ] I enclose an additional donation of $___________
-
- Name:______________________________________________________
-
- Organization:______________________________________________
-
- Address: __________________________________________________
-
- City or Town: _____________________________________________
-
- State:_______ Zip:________ Phone:( )_____________(optional)
-
- FAX:( )____________________(optional)
-
- Email address: ______________________________
-
- I enclose a check [ ].
- Please charge my membership in the amount of $_____________
- to my Mastercard [ ] Visa [ ] American Express [ ]
-
- Number:____________________________________________________
-
- Expiration date: ____________
-
- Signature: ________________________________________________
-
- Date:______________________
-
- I hereby grant permission to the EFF to share my name with
- other non-profit groups from time to time as it deems
- appropriate [ ].
- Initials:___________________________
-
- -==--==--==-<>-==--==--==-
- Avoiding Mistakes
- When writing a software program, your chances of making a mistake double
- with each telephone interruption. --R.L. Liming, Indianapolis, Indiana**
-
- ** These "rules of thumb" are from NEVER TRUST A CALM DOG and other
- Rules of Thumb by Tom Parker (Harper/Collins, 1990). Reprinted by
- permission of the author.
- =====================================================================|
- EFFector Online is published by |
- The Electronic Frontier Foundation |
- 155 Second Street, Cambridge MA 02141 |
- Phone: +1 617 864 0665 FAX: +1 617 864 0866 |
- Internet Address: eff@eff.org |
- Reproduction of this publication in electronic media is encouraged |
- To reproduce signed articles individually, |
- please contact the authors for their express permission. |
- =====================================================================|
-