Computer underground Digest Sun Jan 7, 1996 Volume 8 : Issue 02 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.02 (Sun, Jan 7, 1996) File 1--FINAL REMINDER - Last issue of CuD from the UIUC SERVER File 2--Compuserve: "The whole story" File 3--Court Rules in Pentagon Cit File 4--CDT: Telecom Bill Overview and Proposal Text (FINALLY!) File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Sun, 7 Jan 1996 16:19:32 CST From: CuD Moderators <tk0jut2@mvs.cso.niu.edu> Subject: File 1--FINAL REMINDER - Last issue of CuD from the UIUC SERVER ** CuD IS CHANGING SERVERS ** THIS WILL LIKELY BE THE *FINAL* time we use the UIUC server. The next issue of CuD will be sent from the weber.ucsd.edu site. ============== On Wednesday, Cu Digest will be moving to a new server at weber.ucsd.edu. to continue to receive CuD, you must RE-SUBSCRIBE. Re-subbing is easy. Just send a message with this in the "Subject:" line SUBSCRIBE CU-DIGEST send it to: cu-digest-request@weber.ucsd.edu If you prefer to access CuD from Usenet, use comp.society.cu-digest If you prefer archives, you can use the ftp/www site at ftp.eff.org (or www.eff.org) or the CuD archives at: http://www.soci.niu.edu/~cudigest. We also hope to have a mail archive set up soon as well. You can still contact the moderators at: cudigest@sun.soci.niu.edu or tk0jut2@mvs.cso.niu.edu Please *DO NOT* send inquiries to the server at UIUC. Jim and Gordon ------------------------------ Date: Sun, 7 Jan 1996 09:47:57 -0500 (EST) From: "Declan B. McCullagh" <declan+@CMU.EDU> Subject: File 2--Compuserve: "The whole story" Note the extent of the damage caused by CMU, Marty Rimm, and TIME's "Cyberporn" cover: "Last summer, a kind of hysteria about Internet pornography broke out in German media." Thanks, Michael, for posting this. -Declan ---------- Forwarded message begins here ---------- From--michael_kunze@spiegel.de (Michael Kunze) Newsgroups--alt.censorship Subject--CIS censorship--The whole story Date--Sat, 06 Jan 1996 09:33:39 GMT Dear Nettizens, Some few fivehundred postings ago, I promised you let you have more details about the CompuServe censorship case investigated by the editorial staff of SPIEGEL online. It is not a story of evil but of people acting overambitious and ignorant. And it is not quite as simple as DrG might be wishing! To keep it short, here are the facts: In 1994, a Task Force called "AG EDV" was set up by the Bavarian Minister of Interior at the Police Headquarters in Munich. Initially, the Task Force was formed to search persons dealing with pornographic material via BTX the former online service of German Telekom and its work was limited to one year. For the moment, investigations of this Task Force ran successfully due to the assistance of Telekom. But simultaneously, people being suspected changed their ways of distributing either to closed BBS systems or chose more secret methods. So the Task Force was compelled to enhance their efforts and they raided Munich BBS systems. Furthermore, they studied computer magazines to find ads for pornographic CD-ROMs. During this operation they found what they were looking for, and "PC Direkt", a Ziff Davis publication, and some other magazine were forced to pulp some issues. All activities of the Task Force could not have happened, if they were not supported by a whole bunch of local prosecutors and judges. Sticking together, chatting, doing favours forms a part of the social life in Munich - in malicious words - the 'Munich swamp'. The prevailing opinion of the Task Force and of some prosecutors is that carriers of digital information could held responsible for the content of what they are spreading. This meaning matches exactly the content of the CDA. But this is only one point of view. Up to now, there doesn't exist any law or direction in Germany concerning responsibilities of ISPs or online services regarding contents they only do deliver. And so, judges decide from case to case. The German department of justice thinks that carriers could be held responsible if they deliver illegal content "deliberately". But then, could one call them "carriers"? Last summer, a kind of hysteria about Internet pornography broke out in German media. A few journalist had made their first steps in the Internet and discovered nasty postings in the alt.binaries.pictures.erotica Usenet hierarchy. A student of Erlangen University was seized because of spreading child porn via Usenet. Then, the "Time" article about Internet porn was published and quoted by nearly every German newspaper. I think at that time the Task Force planned to investigate the Usenet. Due to the facts that CIS had become a big ISP and their German office is located in Munich, CIS seemed to be a worthwhile target. Somehow the Task Force managed to get a search warrant to investigate the Munich CIS office on November, 22nd. However, the search was more or less like a visit. Let me quote the public prosecutor: CompuServe "was quite cooperative". "We sat together talking about chances to kick pornographic contents out of CompuServe's information system." The police officers just collected a copy of the CompuServe association contract and the address of the CEO. Two days later, CompuServe's German managers published that they "will do anything to support the work of German authorities fighting against pornography in Cyberspace". On December, 8th, CIS was handled a list of more than 200 newsgroups by the Task Force. In my opinion, interpreting the prosecutor and the CIS spokeswoman, this list was presented to CIS as containing "suspicious newsgroups". In the attached letter from the prosecutor it is said: "... it is left to CompuServe to take the necessary steps to avoid possible liabilities to punishment." So, if CompuServe should have ever had threats, it could have been only very small ones. But there is no reason to their German management to risk anything. CompuServe's approach is not to guarantee for "freedom of speech and information" but to make "money". When i interviewed the prosecutor, it soon became quite clear that his department had tried to bring CIS to court to get its legal position checked by some judges. Because of CIS servile tactics they had to give up their goal. The ominous list itself shows, how ignorant the members of the Task Force are about the Usenet. In my opinion, they just sampled all newsgroups containing words like "sex", "erotic", "gay" and so on and put the result onto the list. We have two in depth articles on the whole affair on our web server. One is an extended version of what i've posted here, the other deals with the CDA and the actual political and legal situation concerning the Internet. Unfortunately for US readers, these articles are in German because we didn't found the time to translate them. But i hope will can manage this until Monday 8th, 8:00 AM, EST. Then, you should point your browser to <http://hamburg.bda.de:800/bda/int/spon/online/excl03.html> or have a look at our complete online services at <http://www.spiegel.de> By the way, SPIEGEL online is the online department of the reputable German news magazin DER SPIEGEL. Greetings Michael -------------------------------------------------------------- Michael Kunze Tel.:+49(0)40-3007-0 Redaktion/editorial staff Fax :+49(0)40-3007-2986 Spiegel Online Brandstwiete 19 20457 Hamburg / Germany ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ std. disclaimer: diese Meinung meins, exclusiv und immerdar ------------------------------ Date: 5 Jan 1996 13:40:25 -0500 From: "David Sobel" <sobel@EPIC.ORG> Subject: File 3--Court Rules in Pentagon Cit In a case litigated by EPIC staff, the federal appeals court in Washington, DC, has ordered the U.S. Secret Service to release information concerning a controversial "hacker" investigation. The January 2 ruling partially rejected the agency's three-year attempt to withhold documents concerning the 1992 "Pentagon City Mall Raid." In November of that year, a group of young people affiliated with the computer magazine "2600" were confronted by mall security personnel, local police officers and several unidentified individuals in the Virginia shopping mall. The group members were ordered to identify themselves and to submit to searches of their personal property. Their names were recorded and some of their property was confiscated. Computer Professionals for Social Responsibility (CPSR) filed suit in federal court in early 1993 seeking the release of relevant Secret Service records under the Freedom of Information Act. The litigation of the case has been handled by the Electronic Privacy Information Center (EPIC). In July 1994, U.S. District Judge Louis Oberdorfer ordered the Secret Service to release the vast majority of documents it maintains on the incident. The government appealed that decision to the U.S. Court of Appeals for the District of Columbia Circuit, which partially affirmed the lower court decision in the recent ruling. The appeals court rejected the agency's attempt to invoke a blanket claim of "source confidentiality" for all information involving investigations of computer crime, noting that "the Service offered no evidence that a fear of retaliation by hackers is sufficiently widespread to justify an inference that sources of information relating to computer crimes expect their identities and the information they provide to be kept confidential." The court did, however, uphold the agency's claim that information identifying particular individuals should be withheld from disclosure. Additional information, including the text of the appellate decision, is available at: http://www.epic.org/computer_crime/2600/ ------------------------------ Date: Thu, 4 Jan 1996 16:39:30 -0800 (PST) From: Declan McCullagh <declan@EFF.ORG> Subject: File 4--CDT: Telecom Bill Overview and Proposal Text (FINALLY!) From: CDT POLICY POST Number 33 January 4, 1996 (1) TEXT OF LATEST VERSION OF THE CDA -- STILL UNCONSTITUTIONAL The House/Senate telecommunications reform conference committee has released a preliminary draft of the final telecommunications reform bill, which includes provisions which would impose broad government regulations on constitutionally protected speech online. The text of these provisions is attached below. The attached version of the CDA contains the changes approved at the December 6, 1995 conference committee meeting, where members voted to adopt Rep. Rick White's proposal but with significant changes, including a return to the unconstitutional "indecency" standard (See CDT Policy Post No. 32, 12/6/95). The conferees have made several important changes to the legislation, none of them are particularly favorable to cyberspace-rights advocates. Among other things, the latest draft: * Relies on the vague and blatantly unconstitutional "indecency" standard (Sec 502 (a) - (c)) * Prohibits sending "indecent" material directly to a minor or making indecent material available for display in a manner available to a minor (including world wide web pages, ftp sites, or usenet newsgroups) (Sec 502 (d)). * No longer contains the provision of the Cox/Wyden/White bill prohibiting the FCC from imposing content or other regulations on the Internet or other interactive media. * Contains weaker protections for content providers who label content and enable others to block it (e.g., PICS) have been weakened (Sec 502 (e)(5). * Would allow states to impose additional restrictions on non-commercial activities such as free-nets, BBS's, and non-profit content providers (Sec 502 (h)). * Creates a new crime for the solicitation of minors using a computer, the US mail, or any other means of interstate or foreign commerce (Sec 508). The full text of the new proposal is attached below. CDT believes that this proposal threatens the very existence of the Internet as a means for free expression, education, and political discourse. The proposal is an unwarranted, unconstitutional intrusion by the Federal government into the private lives of all Americans. NEXT STEPS: FINAL AGREEMENT NOT YET REACHED, VOTE COULD OCCUR SOON As you know, the CDA is part of the massive telecommunications reform legislation, which is currently being considered by a House/Senate conference committee. The conference committee has not reached agreement on several key issues, including whether the FCC should be permitted to regulate the Internet, broadcast ownership rules, and other issues. Reps. Rick White, Chris Cox, and others are currently fighting to retain the provisions baring the FCC from regulating online content. A final vote by the conferees to send the bill to the full congress will not occur until an agreement is reached on this and other outstanding issues. As of Thursday January 4, 1996, the conferees have NOT yet voted to send a version of the legislation to the Full House and Senate for a final vote. No vote has been scheduled, and House Speaker Newt Gingrich has stated that no vote will occur until Congress finishes work on the Budget. CDT will continue to fight these provisions, and will work to remove them from the final telecommunications bill. We are also preparing to fight this issue in court, if necessary. WHAT YOU CAN DO TO HELP The Voters Telecommunications Watch (VTW) has organized an online coalition (of which CDT is a member) against the net-censorship bill. To find out what you can do to fight this bill, visit VTW's web page URL:http://www.vtw.org/ Or send email to vtw@vtw.org with 'send alert' in the subject line. ==---------------------------------------------------------------------== (2) TEXT OF THE PROPOSAL TITLE V - BROADCAST OBSCENITY AND VIOLENCE Subtitle A - Obscene, Harassing, and Wrongful Utilization of Telecommunications Facilities SEC. 501. SHORT TITLE. This title may be cited as the "Communications Decency Act of 1995". SEC. 502. OBSCENE OR HARASSING USE OF TELECOMMUNICATIONS FACILITIES UNDER THE COMMUNICATIONS ACT OF 1934. Section 223 (47 U.S.C. 223) is amended- (1) by striking subsection (a) and inserting in lieu thereof: "(a) Whoever == "(1) in interstate or foreign communications- "(A) by means of a telecommunications device knowingly- "(i) makes, creates, or solicits, and "(ii) initiates the transmission of, any comment, request, suggestion, proposal, image, or other communication which is obscene, lewd, lascivious, filthy, or indecent, with intent to annoy, abuse, threaten, or harass an other person; "(B) by means of a telecommunications device knowingly- "(i) makes, creates, or solicits, and "(ii) initiates the transmission of, any comment, request, suggestion, proposal, image, or other communication which is obscene or indecent knowing that the recipient of the communication is under 18 years of age regard less of whether the maker of such communication placed the call or initiated the communication; "(C) makes a telephone call or utilizes a telecommunications device, whether or not conversation or communication ensues, without disclosing his identity and with intent to annoy, abuse, threaten, or harass any person at the called number or who receives the communication; "(D) makes or causes the telephone of another repeatedly or continuously to ring, with intent to harass a person at the called number; or "(E) makes repeated telephone calls or repeatedly initiates communication with a telecommunications device, during which conversation or communication ensues, solely to harass any person at the called number or who receives the communication; "(2) knowingly permits a telecommunications facility under his control to be used for any activity prohibited by paragraph (1) with the intent that it be used for such activity, shall be fined under title 18, United States Code, or imprisoned not more than two years, or both."; and (2) by adding at the end the following new sub sections: "(d) Whoever == "(1) in interstate or foreign communications knowingly- "(A) uses an interactive computer service to send to a specific person or persons under 18 years of age, or "(B) uses any interactive computer service to display in a manner available to a person under 18 years of age, any comment, request suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs, regardless of whether the user of such service placed the call or initiated the communication; or "(2) knowingly permits any telecommunications facility under such person's control to be used for an activity prohibited by paragraph (1) with the intent that it be used for such activity, shall be fined under title 18, United States Code, or imprisoned not more than two years, or both. "(e) In addition to any other defenses available by "(1) No person shall be held to have violated subsection (a) or (d) solely for providing access or connection to or from a facility, system, or network not under that person's control, including transmission, downloading, intermediate storage, access software, or other related capabilities that are incidental to providing such access or connection that does not include the creation of the content of the communication. "(2) The defenses provided by paragraph (1) of this subsection shall not be applicable to a person who is a conspirator with an entity actively involved in the creation or knowing distribution of communications that violate this section, or who knowingly advertises the availability of such communications. "(3) The defenses provided in paragraph (1) of this subsection shall not be applicable to a person who provides access or connection to a facility, system, or network engaged in the violation of this section that is owned or controlled by such person. "(4) No employer shall be held liable under this section for the actions of an employee or agent unless the employee's or agent's conduct is within the scope of his employment or agency and the employer (A) having knowledge of such conduct, authorizes or ratifies such conduct, or (B) recklessly disregards such conduct. "(5) It is a defense to a prosecution under sub section (a) or (d) that a person- "(A) has taken in good faith, reasonable, effective, and appropriate actions under the circumstances to restrict or prevent access by minors to a communication specified in such subsections, which may involve any appropriate measures to restrict minors from such communications, including any method which is feasible under available technology; or "(B) has restricted access to such communication by requiring use of a verified credit card, debit account, adult access code, or adult personal identification number. "(6) The Commission may describe measures which are reasonable, effective, and appropriate to restrict access to prohibited communications under subsection (d). Nothing in this section authorizes the Commission to enforce, or is intended to provide the Commission with the authority to approve, sanction, or permit, the use of such measures. The Commission has no enforcement authority over the failure to utilize such measures. The Commission shall not endorse specific products relating to such measures. The use of such measures shall be admitted as evidence of good faith efforts for purposes of this paragraph in any action arising under subsection (d). Nothing in this section shall be construed to treat interactive computer services as comm. on carriers or telecommunications carriers. "(f)(1) No cause of action may be brought in any court or administrative agency against any person on account of any activity that is not in violation of any law punishable by criminal or civil penalty, and that the person has taken in good faith to implement a defense authorized under this section or otherwise to restrict or prevent the transmission of, or access to, a communication specified in this section. "(2) No State or local government may impose ant liability for commercial activities or actions by commercial entities, nonprofit libraries, or institutions of higher education in connection with an activity or action described in subsection (a)(2) or (d) that is inconsistent with the treatment of those activities or actions under this section: Provided, however, That nothing herein shall preclude any State or local government from enacting and enforcing complementary oversight, liability, and regulatory systems, procedures, and requirements, so long as such systems, procedures, and requirements govern only intrastate services and do not result in the imposition of inconsistent rights. duties or obligations on the provision of interstate services. nothing in this subsection shall preclude any State or local government from governing conduct not covered by this section. "(g) nothing in subsection (a), (d), (e), or (f) or in the defenses to prosecution under (a) or (d) shall be construed to affect or limit the application or enforcement of any other Federal law. "(h) For purposes of this section- "(1) The use of the term 'telecommunications device' in this section- "(A) shall not impose new obligations on broadcasting station licensees and cable operators covered by obscenity and indecency provisions elsewhere in this .Act; and "(B) does not include the use of an inter active computer service. "(2) The term 'interactive computer service' has the meaning provided in section 230(f)(2) "(3) The term 'access software' means software (including client or server software) or enabling tools that do not create or provide the content of the communication but that allow a user to do any one or more of the following: "(A) filter, screen, allow, or disallow content; "(B) pick, choose, analyze, or digest content; or "(C) transmit, receive, display, forward, cache, search, subset, organize, reorganize, or translate content. "(4) The term 'institution of higher education' has the meaning provided in section 1201 of the Higher Education Act of 1965 (20 U.S.C. 1141). "(5) The term 'library means a library eligible for participation in State-based plans for funds under title III of the Library Services and Construction Act (20 U.S.C. 355e et seq.).". SEC. 503. OBSCENE PROGRAMMING ON CABLE TELEVISION, Section 639 (47 U.S.C. 559) is amended by striking "not more than $10,000" and inserting "under title 18, United States Code,". SEC. 504. SCRAMBLING OF CABLE CHANNELS FOR NONSUBSCRIBERS. Part IV of title VI (47 U.S.C. 551 et se-q.) is amended by adding at the end the following: "SEC. 640. SCRAMBLING OF, CABLE CHANNELS FOR NONSUBSCRIBERS. "(a) SUBSCRIBER REQUEST.-Upon request by a cable service subscriber, a cable operator shall, without charge, fully- scramble or otherwise fully block the audio and video portion of each channel carrying such programming so that one not a subscriber does not receive it. "(b) DEFINITION.-As used in this section, the term 'scramble' means. to rearrange the content of the signal of the programming so that the program cannot be viewed or heard in an understandable manner.". SEC. 505. SCRAMBLING OF SEXUALLY EXPLICIT ADULT VIDEO SERVICE PROGRAMMING. (a) REQUIREMENT.-Part IV of title I (47 U.S.C. 551 et seq.), as amended by this Act, is further amended by adding at the end the following: "SEC. 641. SCRAMBLING OF SEXUALLY EXPLICIT ADULT VIDEO SERVICE PROGRAMMING. "(a) REQUIREMENT.-In providing sexually explicit adult programming or other programming that is indecent on any channel of its service primarily dedicated to sexually-oriented programming, a multichannel video programming distributor shall fully scramble or otherwise fully block the video and audio portion of such channel so that one not a subscriber to such channel or programming does not receive it. "(b) IMPLEMENTATION.-Until a multichannel video programming distributor complies with the requirement set forth in subsection (a), the distributor shall limit the access of children to the programming referred to in that subsection by not providing such program during the hours of the day (as determined by the Commission) when a significant number of children are likely to view it. "(c) DEFINITION.-As used in this section, the term 'scramble' means to rearrange the content of the signal of the programming so that the programming cannot be viewed or heard in an understandable manner.". "(b) EFFECTIVE DATE.-The amendment made b-y subsection (a) shall take effect 30 days after the date of the enactment of this Act. SEC. 606. CABLE OPERATOR REFUSAL TO CARRY CERTAIN PROGRAMS. (a) PUBLIC, EDUCATION, AND GOVERNMENTAL CHANNELS.-Section 611(e) (47 U.S.C. 531(e)) is amended by inserting before the period the following: ", except a cable operator may refuse to transmit any public access program or portion of a public access program which contains obscenity, indecency, or nudity". (b) CABLE CHANNELS FOR COMMERCIAL USE. Section 612(c)(2) (47 U.S.C. 532(c)(2)) is amended by striking "an operator" and inserting "a cable operator may refuse to transmit any leased access program or portion of a leased access program which contains obscenity, indecency, or nudity and". SEC. 507. CLARIFICATION OF CURRENT LAWS REGARDING COMMUNICATION OF OBSCENE MATERIALS THROUGH THE USE OF COMPUTERS. (a) IMPORTATION OR TRANSPORTATION.-Section 1462 of title 18, United States Code, is amended- (1) in the first undesignated paragraph, by inserting "or interactive computer service (as defined in section 230(f)(2) of the Communications Act of 1934)" after "carrier"; and (2) in the second undesignated paragraph- (A) by inserting "or receives," after "takes"; (B) by inserting "or interactive computer service (as defined in section 230(f)(2) of the Communications Act of 1934)" after "common carrier"; and (C) by inserting "or importation" after "carriage". (b) TRANSPORTATION FOR PURPOSES OF SALE OR DISTRIBUTION.-The first undesignated paragraph of section 1465 of title 18, United States Code, is amended - (1) by striking "transports in" and inserting "transports or travels in, or uses a facility or means of,"; (2) by inserting "or an interactive computer service (as defined in section '230(f)(2) of the Communications Act of 1934) in or affecting such commerce" after "foreign commerce" the first place it appears; (3) by striking ", or knowingly travels in" and all that follows through "obscene material in inter state or foreign commerce," and inserting "of". (c) INTERPRETATION.-The amendments made by this section are clarifying and shall not be interpreted to limit or repeal any prohibition contained in sections 1462 and 1465 of title 18, United States Code, before such amendment, under the rule established in United States v. Alpers, 338 U.S. 680 (1950). SEC. 508. COERCION AND ENTICEMENT OF MINORS. Section 2422 of title 18, United States Code, is amended- (1) by inserting "(a)" before "Whoever knowingly"; and (2) by adding at. the end the following "(b) Whoever, using any facility or means of inter state or foreign commerce, including the mail, or within the special maritime and territorial jurisdiction of the United States, knowingly persuades, induces, entices, or coerces any individual who has not attained the age of 18 years to engage in prostitution or any sexual act for which person may be criminally prosecuted, or attempts to do so shall be fined under this title or imprisoned not more than 10 years, or both.". SEC. 509. ONLINE FAMILY EMPOWERMENT. Title II of the Communications Act of 1934 (47 U.S.C. 201 et seq.) is amended by adding at the end the following new section: "SEC. 230. PROTECTION FOR PRIVATE BLOCKING AND SCREENING OF OFFENSIVE MATERIAL "(a) FINDINGS.-The Congress finds the following: "(1) The rapidly developing array of Internet and other interactive computer services available to individual Americans represent an extraordinary advance in the availability of educational and informational resources to our citizens. "(2) These services offer users a great degree of control over the information that they receive, as well as the potential for even greater control in the future as technology develops. "(3) The Internet and other interactive computer services offer a forum for a true diversity of political discourse, unique opportunities for cultural development, and myriad avenues for intellectual activity. "(4) The Internet and other interactive computer services have flourished, to the benefit of all Americans. with a minimum of government regulation. "(5) Increasingly Americans are relying on interactive media for a variety of political, educational, cultural, and entertainment services. "(b) POLICY.- It is the policy of the United States- "(1) to promote the continued development of the Internet and other interactive computer services and other interactive media; "(2) to preserve the vibrant and competitive free market that presently exists for the Internet and other interactive computer services, unfettered by Federal or State regulation; "(3) to encourage the development of technologies which maximize user control over what in formation is received by individuals, families, and schools who use the Internet and other interactive computer services; "(4) to remove disincentives for the development and utilization of blocking and filtering technologies that empower parents to restrict their children's access to objectionable or inappropriate online material; and "(5) to ensure vigorous enforcement of Federal criminal laws to deter and punish trafficking in obscenity, stalking, and harassment by- means of computer. "(c) PROTECTION FOR 'GOOD SAMARITAN BLOCKING AND SCREENING OF OFFENSIVE MATERIAL.- "(1) TREATMENT OF PUBLISHER OR SPEAKER.-No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider. "(2) CIVIL LIABILITY.-No provider or user of an interactive computer service shall be held liable on account of- "(A) any- action voluntarily taken in good faith to restrict access to or availability of material that the provider or user considers to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected; or "(B) any action taken to enable or make available to information content providers or others the technical means to restrict access to material described in paragraph (1). "(d) EFFECT ON OTHER LAWS.- "(1) NO EFFECT ON CRIMINAL. LAW.-Nothing in this section shall be construed to impair the enforcement of section 223 of this Act, chapter 71 (relating to obscenity) or 110 (relating to exploitation of children) of title 18, United States Code, or any other Federal criminal statute. "(2) NO EFFECT ON INTELLECTUAL PROPERTY LAW.-Nothing in this section shall be construed to limit or expand any law pertaining to intellectual property. "(3) STATE LAW.-Nothing in this section shall be construed to prevent any State from enforcing any State law that is consistent with this section. No cause of action may be brought and no liability may be imposed under any State or local law that is in consistent with this section. "(4) NO EFFECT ON COMMUNICATIONS PRIVACY LAW.-Nothing in this section shall be construed to limit the application of the Electronic Communications Privacy Act of 1986 or any of the amendments made by such Act, or any similar State law. "(f) DEFINITIONS.-As used in this section: "(1) INTERNET.-The term 'Internet' means the international computer network of both Federal and non-Federal interoperable packet switched data networks. "(2) INTERACTIVE COMPUTER SERVICE.-The term 'interactive computer service' means an information service, system, or access software provider that provides or enables computer access by multiple users to a computer server, including specifically a service or system that provides access to the Internet and such systems operated or services offered by libraries or educational institutions. "(3) INFORMATION CONTENT PROVIDER.-The term 'information content provider' means any per son or entity that is responsible, in whole or in part, for the creation or development of information provided through the Internet or any other interactive computer service. "(4) ACCESS SOFTWARE PROVIDER.-The term 'access software provider' means a provider of software (including client or server software), or enabling tools that do any one or more of the following "(A) filter, screen, allow, or disallow content; "(B) pick, choose, analyze, or digest content; or "(C) transmit, receive, display, forward cache, search, subset, organize, reorganize, or translate content.". [Footer info deleted for brevity] ------------------------------ Date: Sun, 16 Dec 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.02 ************************************