Computer underground Digest    Wed  Nov 12, 1997   Volume 9 : Issue 83
                           ISSN  1004-042X

       Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Field Agent Extraordinaire:   David Smith
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.83 (Wed, Nov 12, 1997)

File 1--The Mind of a Censor
File 2--States Won't appeal ALA v. Pataki, et. al
File 3--Response to Bell in #9.82
File 4-- Does Technology Set Us Free?
File 5--Cu Digest Header Info (unchanged since 7 May, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Mon, 10 Nov 1997 07:37:50 -0800
From: Jonathan Wallace <jw@bway.net>
Subject: File 1--The Mind of a Censor

THE MIND OF A CENSOR

by Jonathan Wallace jw@bway.net

On the Web there lives a genial fellow named David Burt.  An
Oregon librarian, Burt operates the Filtering Facts Web page, at
http://www.filteringfacts.org. Burt's mission is to persuade the
world that censorware belongs in public libraries.

He describes Filtering Facts as a nonprofit corporation formed
under Oregon law which has as its goals to "educate the public and
media about Internet software filters; encourage libraries to
adopt filters; persuade the American Library Association to
rescind its Resolution on the use of filtering software in
libraries, and adopt a more tolerant view of filtering."

Burt says his sole concern is pornography on the Internet.  His
organization's FAQ reveals that he works closely with two
fundamentalist organizations, Family Friendly Libraries and Donna
Rice Hughes' group, Enough is Enough.  In fact, a good deal of
Burt's FAQ is cut and pasted from an Enough is Enough brochure,
including the following:

"[P]ornography is addictive and progressive in nature for many who
consume it. It affects their thinking and behavior and often leads
them to commit sexual crimes against innocent victims, usually
children and women."

Burt's Web page claims that he does not support state-mandated
filtering in libraries,  and he also claims to think that there
are alternatives to filtering which will work to keep porn out of
libraries. But when you debate Burt, he never seems to agree that
there is an alternative--he just believes that librarians ought to
want to install censorware.

Members of Declan McCullagh's Fight-Censorship list, which Burt
frequents, are constantly calling Burt's attention to the flaws of
particular censorware products, particularly the socially
valuable, First Amendment-protected sites which they block. Burt's
usual response is to try to justify the blocking, though he will
sometimes admit that a site has been blocked in error. However, he
does not think the blocking of sites such as the EFF archive, the
National Organization for Women, the AIDS Quilt site, the MIT
Student Association for Free Expression and my  own Ethical
Spectacle constitute a fatal flaw preventing the use of censorware
in libraries. Instead, Burt likes to point out that the products
endorsed on his site, such as Cyberpatrol and Bess, allow the user
to configure the products so as to allow access to blocked sites.
In the event of an erroneously blocked site, he says, just ask the
librarian to help you get access to it.

In September, several members of the Fight-Censorship list
collaborated in the preparation of an article which went out over
my byline, about a product that Burt then endorsed, X-Stop from
Log-On Data Corporation. The piece revealed that X-Stop, which was
marketed to libraries as blocking only legally obscene material in
its so-called "Felony Load" version, actually blocked the Quaker
website, the National Journal of Sexual Orientation law, the
Heritage Foundation, and The Ethical Spectacle.  Burt and one of
his backers, Family Friendly Libraries, immediately issued
statements withdrawing their endorsement of the product.

I sent mail congratulating Burt on his willingness to back away
from a dishonestly marketed product. Burt and I had exchanged
private email on and off for months, and though our disagreements
were very deep, we had always maintained a cordial tone; Burt had
even complimented me for not flaming him, and had described me on
Fight-Censorship as being one of the people there with something
interesting to say. In a debate that blew up on the list after the
X-Stop article, I began to press Burt about the blocking of The
Ethical Spectacle by six of the leading censorware products. Since
my site contained nothing prurient, and was dedicated to the
discussion of ideas on a fairly dry and intellectual level, didn't
he see a systemic problem in the fact it was blocked by so many
products?

Perhaps Burt regretted backing off of his endorsement of X-Stop;
maybe he now thought that if he kept abandoning software which
blocked my site and others, he would have nothing left to endorse.
At any rate, there promptly appeared the following missive to the
list (really more of a missile than a missive):

 "[T]he  filtering vendors I talk to think that you are playing
games with them, putting
 lurid articles like this full of foul language and reference to
sex and drugs, then claiming that
 'your site is blocked when it is about the free discussion of
ideas'."

The "lurid article" Burt was referring to was a short story of
mine in the October issue of the Spectacle, entitled The Fall-Out.
Part of a series of stories and related fragments entitled Kazoo
Concerto, this story describes how a salesman, Ken Copeland,
decides to make the world manifest the perfect wife for him.  He
calls up every stock-brokerage in New York City, describing to the
receptionist a woman stockbroker he claims to have met but whose
name he cannot remember.  On the eleventh phone call, a
receptionist says, "Oh, you must mean Donna Ray." After eliciting
information about her from the receptionist, Ken meets Donna,
charms her, dates her and is prepared to propose when Donna
announces that she has decided to leave the brokerage and go to
social work school. She attributes her decision to a sister who is
often sick, but doesn't reveal the nature of the illness to Ken.
The real woman has now modified herself so that she no longer fits
Ken's fantasy. Ken has an image of life with Donna that persuades
him not to propose to her:

"He had a vision in which she inhabited his apartment, his
wonderful bachelor pad where so many women had passed, and her
combs and bras and bobby pins were in every corner. Her cold cream
and contact lens solution. Her little socks under the pillow.
Every night when he came home she was already there. With thick
books on 'Case Management' and  'The Introductory Lectures on
Psychoanalysis.'.... And she would work with people who drooled
and slobbered, who were fat, smelly and drugged, or who were
smelly and elderly and festooned with dripping IV's and wires. And
then every once in a while a phone call would come, and they would
rush out at three in  the morning to an emergency room to meet the
mongoloid or drug-addicted or MS-stricken or AIDS-suffering or
suicidal sister."

I was so startled by Burt's accusation that the story was full of
references to sex and drugs that I went back and re-read it
closely. There are no descriptions of sex acts or people's bodies
in the story; this is as explicit as it gets:

"Their lovemaking the weekend before had been a shock to him; he
had been so careful to stay away from women who might fall in love
with him that he had long forgotten how exciting it was to make
love to someone who was infatuated with you. He understood that
love was a feedback system, because it was easy and tempting to be
infatuated by someone else's infatuation. It was simple vanity,
the vanity of the master salesperson, to be almost in love with
someone because they loved you."

Burt's claim that The Fall-Out referred to drug use was even more
baffling. The only mentions of drugs in the story are in the first
paragraph I quoted above.  In Ken's vision of married life with
Donna, he sees her working with people who are "fat, smelly and
drugged".  He imagines rushing to the hospital in the middle of
the night on account of the "mongoloid or drug-addicted or
MS-stricken or AIDS-suffering or suicidal sister."

Burt is correct at least that the story contains a few four letter
words, none used in a sexual context.  In a series of
conversations with his boss and friend, Lyle Doggett, who
disapproves of his wooing of Donna, Ken and Lyle exchange a few
"Fuck you's" and at one point Ken tells Lyle to "eat a bag of shit
and bark at the moon." I was reproducing the familiar dialog of
people I work with every day. In context, a few four letter words
scattered through the text, don't seem to me to add up to a
prurient, evil or dangerous work, spreading its tentacles across
the Net to corrupt the minds of children.

Ironically, as a result of Burt's attack a lot of Fight-Censorship
list members read The Fall-Out; most had friendly things to say
about it, but were unanimous that the story failed to appeal to
any prurient interest, favored marriage and opposed libertinage,
and was actually far blander in its content than the works of many
noted authors of the last fifty years whose works are presumably
collected in David Burt's library.  People like Henry Miller,
Anais Nin, and Norman Mailer, for example.

Why is all of this significant? People flame each other on the Net
every day, and its not news. Burt took a cheap shot at me, but why
is it worth writing about?

Burt's reaction to The Fall-Out is worth discussing because he
behaved like a classic censor, and a close look at his behavior
gives  insight into the mind of a censor. He never read the work
he was judging; he didn't even know it was a work of fiction,
since he called it an article.  He didn't know, or didn't care,
that the only references to drugs were to medication and to Ken's
vision that Donna had an addicted sister. At best, Burt searched
the text of The Fall-Out looking for some keywords, and found
them. He failed to do what any court in the world would do in a
constitutional determination--he never looked at the work in
context. But he felt entitled, based on the few moments he spent
with the story, to classify it as "lurid" and to accuse the author
of playing games. And then he backed up the latter accusation by
referring to some unspecified filtering vendors, whom he never
named.

In fact, each of these vendors builds its blacklist of blocked
sites by following the same approach David Burt followed with The
Fall-Out. Underpaid human beings, some of them part-timers and
none of them librarians, looks at a site for a few minutes, scan
for occurrences of words like "fuck", "sex" or "gay", and make a
hasty determination to add the site to a blocked list.  But that's
OK with Burt--if your site doesn't belong on the list, just
contact the company. Never mind that The Ethical Spectacle site
consists of hundreds of URL's, each of which I would have to check
with the product installed just to learn that a particular page of
mine was blocked. Never mind that not every censorware vendor will
unblock a page. Burt also suggests you can get the librarian to
bypass the software. But how many people will approach the
librarian and say, "Please disable the blocking software, so I can
look at 'Humans and Their Pornography'" (the issue of The Ethical
Spectacle blocked by I-Gear for its extremely nonprurient
discussion of the comparative thought of Nadine Strossen, Wendy
McElroy and Catharine MacKinnon)?

Another thing I learned from my run-in with David Burt.  When
someone launches The Big Lie at your work, its easy to get
defensive. Within minutes I was playing on a  field laid out by
Burt--counting occurrences of "fuck", debating whether the story
promoted good morals, was bland or sexy, etc.

It shouldn't matter. Literature, as Proust said, is a mirror held
up to life. It is not the quality of the life that makes great
art, it is the quality of the mirror. Madame Bovary was a great
mirror held up to a sad, dishonest life. The prosecutor who chased
Flaubert, and that work, for indecency confused the subject of the
work with the author's moral stand.  He, and David Burt, stand
with the silly scientists in 1950's monster movies who intone,
"There are some things man was not meant to know." Will we really
protect our children if we insulate them equally from art and
life? Granted, some parents may answer this question with a loud
"Yes".  Since that parent can teach values and has the authority
to decide what his child sees,  must we really block art and life
from the library? And, most interesting of all, since David Burt
doesn't want The Fall-Out visible on the library computer, why
would he make an exception for it printed on paper and on the
shelves of his library? Or for Henry Miller? Burt won't say he
wants books off the shelves--but if not, he's got a hell of a
double standard.

Two weeks ago in Loudoun County, Virginia, the library board of
trustees voted the U.S.'s most restrictive Internet policy,
ordering mandatory blocking even for adult users of the library's
terminals. The director of libraries for the county offered a
compromise solution, in which the entire Internet would be blocked
except for sites reviewed and approved by a librarian. Dixie
Sanner, of Burt's partner organization Enough is Enough, responded
that putting library staff in charge of selecting Internet content
is "like putting the wolf in charge of the henhouse."

David Burt should be known by his deeds and by the company he
keeps. He claims to be concerned only by porn, but attacks The
Fall-Out. He says he only wants to filter the Net, but travels
with the same people who turn up to protest when a library buys a
copy of "Heather Has Two Mommies."

David Burt is entitled to his opinions. But they don't deserve to
be converted to practice in the First-Amendment enriched air of a
public library.

     ----------------------------------

The Fall-Out can be found at
http://www.spectacle.org/kazoo/fallout.html.
If you read the story, let me know what you
think; you might also want to copy your comments
to David Burt, who can be reached at
David_Burt@filteringfacts.org.

------------------------------

Date: Fri, 17 Oct 1997 18:19:13 GMT
From: owner-cyber-liberties@aclu.org
Subject: File 2--States Won't Appeal ALA v. Pataki, et. al

Cyber-liberties Update
October 17, 1997


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

ACLU Victories Final, States Will Not Appeal ALA v. Pataki, ACLU v. Miller


Decisions in the two federal cases in New York and Georgia, that struck
down Internet censorship laws in those states, will not be appealed by the
states, said Ann Beeson, an ACLU national staff attorney and member of the
legal teams in the New York, Georgia and federal cases.

The two decisions were handed down by the courts this summer and gave
states deadlines until which time they could appeal.  The deadlines have
now passed making the decisions final, Beeson stated.

"These decisions are extremely important given the continuing effort by
states to regulate speech on the Internet.  The New York and Georgia
decisions say that, whatever limits the Supreme Court sets on Congress's
power to regulate the Internet, states are prohibited from acting to censor
online expression," she said.

"Taken together, these decisions send a very important and powerful message
 to
legislators in the other 48 states that they should keep their hands off
the Internet,"
Beeson added.

The New York case, American Library Association v. Pataki, dealt with a law
virtually identical to the federal Communications Decency Act, which the
Supreme Court held was unconstitutional earlier this summer.  Judge Loretta
A. Preska ruled that the law violated the Commerce Clause of the U.S.
Constitution because it attempted to regulate activity beyond the state's
borders.

In the Georgia case, ACLU v. Miller, Judge Marvin Shoob found a law banning
anonymous speech on the Internet to be an unconstitutional restriction on
free speech that "affords prosecutors and police officers with substantial
room for selective prosecution of persons who express minority viewpoints."


The court agreed with the ACLU, Electronic Frontiers Georgia and others
that the
statute was unconstitutionally vague and overbroad because it barred online
users from using pseudonyms or communicating anonymously over the Internet.
The Act also unconstitutionally restricted the use of links on the World
Wide Web which allows users to connect to other sites.

The N.Y. decision can be found at: http://www.aclu.org/court/nycdadec.html>
The Georgia decision can be found at
<http://www.aclu.org/court/aclugavmiller.html> .

   +++++++++++++++++

About Cyber-Liberties Update:

ACLU Cyber-Liberties Update Editor:
Cassidy Sehgal (Cassidy_Sehgal@aclu.org)
American Civil Liberties Union
National Office 125 Broad Street,
New York, New York 10004

To subscribe to the ACLU Cyber-Liberties Update, send a message to
majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
message. To terminate your subscription, send a message to
majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.

The Cyber-Liberties Update is archived at
http://www.aclu.org/issues/cyber/updates.html

Are you an ACLU member? To become a card carrying member visit the ACLU web
site  <http://www.newmedium.com/aclu/join.html> For general information
about the ACLU, write to info@aclu.org.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cassidy Sehgal         		   |To receive the biweekly
Cassidy_Sehgal@aclu.org 	   |ACLU Cyber-Liberties Update
http://www.aclu.org		   |email: majordomo@aclu.org
http://www.gilc.org                    |body of message:
                                                   |subscribe
 cyber-liberties

take the pledge: <http://www.firstamendment.org>

Lynn Decker
Coordinator of Online Programs
ACLU National Office
125 Broad Street, New York, NY
See us on the web at <http://www.aclu.org>

and on America Online keyword: ACLU




This Message was sent to
cyber-liberties




------------------------------

Date: Mon, 10 Nov 1997 15:01:24 -0600 (CST)
From: Wade Riddick <riddick@MAIL.LA.UTEXAS.EDU>
Subject: File 3--Response to Bell in #9.82

	Please allow me to respond to Bruce J. Bell's post in CuD #9.82
regarding my article in #9.77.  Some of the items are silly, but since
these remarks were made in a public forum I feel the need to reply
publicly.
	First, I must address a general misinterpretation of the goal I
have in mind.  According to Mr. Bell, my plan for world domination is to
"design all computers to refuse to duplicate data with a copyright
notice."  I don't know whose fault this misinterpretation is.
	I apologize to those readers who may have gotten that impression
from my BYTE commentary.  I did not, in fact, ever say "the ease with
which digital information can be duplicated runs against the best
interests of society as a protector of intellectual property."  The editor
said that when he struck "some people say" from the start of that
sentence.  (Frankly I'm sure everyone would have rather had an extra two
hundred words on the page than my ugly mug to look at, but Mr. Bell might
disagree).
	I do not think I made this mistake in the letter I sent to CuD.  I
hope it's clear I believe just the opposite - that the ease with which
digital materials can be manipulated has the potential to vastly reduce
distribution costs and open up the market.  One gets the impression from
Mr. Bell's response that I'm advocating the opposite - a rosy world where
copyright holders are at the mercy of large media publishers with the
might and power to enforce their rights.
	Aren't we already there?
	If you've looked at the DVD spec lately, you know computers are
already being hobbled by encryption 'protections' by forces outside the
industry.  This article was merely my attempt to balance the forces
involved in a reasonable manner that recognized the rights of consumers,
authors and the needs of the free market in general.  In fact the most
enthusiastic response my ideas have received to date has been from
associations of authors and composers who are often at odds with the large
publishing houses.
	I direct those of you with an interest in my philosophy about the
ownership of copyrighted material in the digital domain to my previous
works in CuD and to the BYTE web site.  Now as to the specifics of Mr.
Bell's criticisms...
	He compares my proposal to the ill-fated Clipper Chip and then
goes on to ask, "why would anybody buy crippled computers when un-crippled
ones are available?"  I have to ask if Mr. Bell has looked at the DVD
drives being sold and if he's aware of what the media industry is trying
to do to digital video. These devices already employ encryption.  They are
essentially crippled computers and people are already buying them.
	Furthermore, his analogy to the Clipper chip is flawed in that
Clipper applied to two way phone conversations.  Encryption has long been
used as a distribution strategy for salable goods.  Also, plenty of
'Clipper'-like open accounting procedures are provided for in many digital
currency schemes.  They have to be or the financial institutions involved
would have criminal charges filed against them (something I'm sure we'd
all support, depending on the particular bank...).
	Moving on...

>Although I'm sure this kind of proposal is a wet-dream to people in the
>recording industry, the movie industry, and the FBI, I doubt it will
>receive any kind of welcome from the computer industry, or from ISP's, or
>from the lowly consumer.

	I cannot pretend to know the sexual predilections of these groups
and I can only refer Mr. Bell to my concluding analysis of the conflicting
interests involved in settling this issue which he appears not to have
read.  I omit the FBI for reasons I make clear in the letter (and if it's
Mr. Bell's assertion that the government shouldn't have the right to issue
search warrants to assist the victims of crime, he ought to stop being coy
and just say so).  I also point out that this proposal will be anything
but an orgiastic financial fantasy to the distribution arms of the
entertainment industry.  If he disputes these conclusions of mine, he
ought to attack my premises and reasoning instead of just saying I said
something else.
	As to the second half of the quotation, ISPs are *already* being
beaten in the head with the "liability stick," as Mr. Bell puts it.  I
fail to see how by profiting from this beating they are any worse off.
	As to the issue of consumer liability, he's absolutely right.
Consumers *ought* to be liable for their own private property.  It's their
responsibility.  That's the way the economy works.  When you leave your
car door open and the keys in the ignition, you don't go blaming the owner
of the asphalt parking lot when someone steals your car.  Nor do you unzip
a backup copy of your Chevy and drive off.
	I will merely note in passing that the issue of who bears the
piracy cost has always been a problem for intellectual property since it
borders on the realms of both public and private goods.  The liability
stick has long been out there.  Although - hypothetically speaking, of
course - it might be fun to whack AOL in the head, that's not me out there
doing it.  (And I'm not even certain I should be flattered by the
accusation).
	About watermarks Mr. Bell states,

>Consider that deliberate 'pirates' could take the simple expedient of
>finding multiple copies of the original work.  Any elements in the
>plaintext that are identical between all instances could not be used to
>identify the original purchaser; while elements that differ are those
>that may contain purchaser information, and can be scrambled, deleted, or
>even ignored...

	More technically adept readers should stop me if I'm wrong here,
but watermarks are by their nature indelible.  You can't strip them from a
picture without ruining the value of the picture.  The same applies
sounds.  (Of course text is another matter and is the weakest item to
protect, but I don't see why I should feed Mr. Bell ammunition when his
gun doesn't work).  A pirate could, hypothetically, substitute one
watermark for another and even mix them up into composites - assuming the
overall structure of the work isn't protected - but in this case he's just
managed to steal a bunch of different items at once.

>Digital watermarking is an interesting concept, and it may be useful for
>some things, but it is not useful as a copy-protection scheme.

	I hope this has been explained to the companies buying and selling
watermark technology.  If it's not a copy-protection scheme, then I don't
know what it is.

>No matter what auxiliary "tamper-resistant" hardware is installed on the
>computer, once the data is in a form suitable for display and manipulation
>by the software, there is no practical way this hardware can keep the
>software from saving the plaintext data.

	I have never made the claim that this method is full-proof for
preventing piracy.  The goal here is two fold: 1) to raise the risks and
hence the costs associated with digital piracy which will then 2) allow
digital distribution to become widespread and vastly lower the transaction
costs involved, increasing the likelihood that consumers will adhere to
the system and purchase the relatively cheap product as opposed to going
with a pirated good.
	For most users, it's assumed that breaking into the system will be
difficult, risky or undesirable relative to sticking with the status quo.
(This won't be true if large chains continue to monopolize distribution
and charge a premium as they tend to do for music CDs, but there is an
anti-trust remedy for this).  On the pirate side, I count on a number of
accounting methods to reduce the volume of material reentering the
legitimate channels.  I won't go into the specifics any more than I
already have in my writings but if Mr. Bell has a particular hole in mind,
he's welcome to bring it up.
	As to the implementation end of things.
	While I haven't wanted to restrict publishing, neither has it been
my objective to prevent users from writing their own software (the ten
gigabyte developers kits and interface libraries already do this quite
effectively, but how the programming industry restricts entry into its
ranks through needless complexity is another matter...)  I'd rather see
the world of publishing opened up to consumers in a way that they can
collect a good profit and be more than hobbyists.  When you consider how
digital cash cards work and think about the other items in the digital
economy that programmers won't have access to go mucking around in, this
isn't overly burdensome.

>all other OS's must necessarily be forbidden, and no modified, unapproved
>versions can be tolerated."

	While it is true that in order for this standard to work, it must
be adhered to, it is not true that it will only work on one operating
system.  The last I checked, PCI cards, for example, ran under a lot of
different operating systems.  Nor is it true that "copyright-enabled
programs will be unable to store anything."  They can store the encrypted
data anywhere they want.  That's the whole beauty of the system.

>I submit that no software developer would accept the requirements and
>limitations necessary for this proposal, even if they could sell it in a
>market where software without these limitations is available.  Perhaps
>they, too, must be made liable for all users of their product..."

	I see no reason to advocate something that's already in the law.
Anyone who builds and releases tools with the explicit purpose of stealing
another's intellectual property is already liable.  Indeed, I would hope
software developers welcome proposals to reduce the rather large piracy
rate robbing them of billions of dollars a year.
	Furthermore, I was intentionally vague about how such a system
could be designed.  There are several ways of doing it.  One would hope it
became implemented entirely through operating system calls, thus rendering
the process transparent and relieving the programmer of mucking around in
the details.
	Now, on the Mr. Bell's final point, "who will pay for developing
this software?"  He asserts that "there is no 'information superhighway'
general expense account."
	Well, duh.
	He goes on to say that "the mere fact that Mr. Riddick would
mention such a cockeyed concept as a putative source of funding is
astounding."  That's probably why I don't.  The letter is addressed to a
congressman and the phrase is meant to suggest that Congress doesn't
necessarily need to expend any large sums of money to settle this issue.
It's simply not feasible in the current political environment anyway.
	"The question of who would pay the costs for such a program is not
trivial."  Indeed, it's not.  A great deal of time, money and effort is
being spent to develop the digital highway but it's being done through the
private sector.  I merely meant to show that the costs of building such a
copyright system are small relative to that of deploying high speed data
pipes into every home, that industry - through various combinations - is
already finding ways of sharing this burden and that new software will
have to be written anyway to confirm to a variety of new standards, this
present one excepted.  In any event, one of the most serious cost issues
so far hasn't been in copyright management software, it's been in
micropayments - something far more fundamental.  I have confidence these
hurdles will be overcome.
	Also consider the costs involved in *not* solving this issue.
It's perfectly feasible to deliver all operating systems through one
vender (a place we're quickly heading).  It's also possible to deliver all
the country's oil through one company or its entertainment through
cartels.  Do you want to do that?
	This brings me to my final point about Mr. Bell's criticisms.
It's pretty clear that, given the enormous pressures involved, something's
going to change the status quo on copyright law.  Mr. Bell fails to
propose a more attractive alternative, explain why it's better or why it
might be less expensive.  In fact, he fails to take any account at all of
the profits lost to piracy, the potential liability costs faced by ISPs if
the law is changed/reinterpreted or the transaction costs that would be
raised should our goods be delivered through a cartelized publishing
industry.
	I hope this reply doesn't leave you with the impression that I
reject criticism from any given venue out of hand; I try to welcome it.
Some very thorny legal problems remain with respect particularly to fair
use and privacy rights.  Arriving at any solution to the digital copyright
problem will require a lot of compromising, both political and technical.
But opinions which do not offer feasible alternatives or fail to even
recognize existing truths about the state of current affairs are
non-starters for us all.

Wade Riddick
Department of Government
University of Texas

------------------------------

Date: Tue, 4 Nov 1997 22:28:22 -0600 (CST)
From: Computer underground Digest <cudigest@SUN.SOCI.NIU.EDU>
Subject: File 4-- Does Technology Set Us Free?

  Does Technology Set Us Free?
  ----------------------------

In the *New York Times Magazine's* special issue on technology (September
28, 1997), staff writer John Tierney argues that, while technology cannot
change human nature, it biases us toward becoming better people in a
better world.

One of his contentions is that computers, like all gadgets, will get
simpler to use.  Hypnotized by the evolution of particular features, he
loses sight of the increasing complexity of context made possible by this
evolution.  So, in welcoming the automobile's conversion from an
unreliable, high-maintenance machine to the relatively care-free device of
today, he fails to ask whether the accordingly lengthened daily commute is
in fact easier and less stressful now than in the bad old days.

(The logic of this kind of oversight, which I have called the Great
Technological Deceit, has proven irresistible to the cheerleaders of
technology.  See "Is Technological Improvement What We Want?" in NF #38.)

As part of his argument for a blessed evolution of technology beyond its
early limitations, Tierney remarks that

   the phone didn't become wholly civilized until people were freed to
   ignore it by the invention of the answering machine -- a contraption
   that was despised before coming to be regarded as a necessity.

He should have added that the answering machine *remains* one of the most
despised pieces of technology.  And he might then have asked, How well are

Source - NetFuture (#59)
we mastering technology when the machines we despise become universal
necessities?

Tierney covers a lot of other ground in much the same, unreflective
manner.  For example, he assures us that technology is solving our
environmental problems, decentralizing governments and defanging
dictators, saving us from the couch potato syndrome (there's the
obligatory quotation from George Gilder), shortening the work week,
presenting us with an unprecedented agricultural abundance, and giving us
more control over our lives, bodies, and genes.

The problem running through it all is his unrelieved focus upon externals.
Yet the decisive risk of technology has never been external.  It has from
the first been recognized as the risk of losing our souls.

Tierney comes tantalizingly close to acknowledging the real issue, only to
drive past it:

   Although new technology is often described as a Faustian bargain,
   historically it has involved a trade-off not between materialism and
   spirituality -- lugging water from the well was not a spiritually
   uplifting exercise for most people, no matter how much it might appeal
   to the Unabomber -- but between individual freedom and social virtue.

Unfortunately, Tierney says nothing further about this trade-off between
individual freedom and social virtue, except to deny that it applies in
the Age of Information.

   The Internet may look like a dangerously anarchic world, but it's
   actually fairly similar to the ancient environment in which humans
   evolved to become the most cooperative, virtuous creatures on earth.

All this has something to do with the way our Pleistocene brains are
"naturally inclined" toward exchanging information on the Net, and leads
Tierney to his deepest attempt to analyze online communication:

   A surprising number [of Net users] seem to be acting out of pure
   goodwill.

We can be thankful for the goodwill, but is there nothing more to say
about the complex social impacts of electronic, networked communication?

As to Tierney's preference for freedom over "spirituality," two things
need saying.  The first is that, if lugging water from the well is not a
spiritually uplifting exercise as such, neither is drawing water from the
tap or, for that matter, doing the work that pays for the water system,
appliances, sewage disposal, pollution control, and all the rest.  Tierney
has failed to see that *what* we do, conceived in outward terms, is never
the critical thing, but rather *how* we do it and what it means to us.

Helena Norberg-Hodge, who has spent many years in the Himalayan mountain
state of Ladakh, writes,

   Tourists see people carrying loads on their backs and walking long
   distances over high mountain passes and say, "How terrible; what a life
   of drudgery."  They forget that they have traveled thousands of miles
   and spent thousands of dollars for the pleasure of walking through the
   same mountains with heavy backpacks.  They also forget how much their
   bodies suffer from the lack of use at home.  During working hours they
   get no exercise, so they spend their free time trying to make up for
   it.  Some will even drive to a health club -- across a polluted city in
   rush hour -- to sit in a basement, pedaling a bicycle that does not go
   anywhere.  And they actually pay for the privilege.  (*Ancient Futures:
   Learning from Ladakh*, Sierra Club, 1992, p. 96)

The mountain tourists, like Tierney when he imagines lugging water, have
unwittingly become alienated from their own activities -- an alienation in
which the role of technology is surely suspect.

The second thing is this:  the freedom Tierney hails must itself be an
inner, spiritual quality if it is to have any enduring virtue.  Aleksandr
Solzhenitsyn pointed to this quality when he wrote of the Gulag:

   From the moment you go to prison you must put your cozy past firmly
   behind you.  At the very threshold, you must say to yourself:  "My life
   is over, a little early to be sure, but there's nothing to be done
   about it.  I shall never return to freedom.  I am condemned to die --
   now or a little later.  But later on, in truth, it will be even harder,
   and so the sooner the better.  I no longer have any property
   whatsoever.  For me those I love have died, and for them I have died.
   From today on, my body is useless and alien to me.  Only my spirit and
   my conscience remain precious and important to me."

   Confronted by such a prisoner, the interrogation will tremble.

It is not that freedom is impossible without terrible loss.  But the loss
does strip away everything incidental, enabling us to recognize freedom's
essence and the interior source of its power.  Despite external
circumstances, Solzhenitsyn, not his interrogator, was the truly free
individual.  No other power than *this* freedom can defeat tyranny.

I would agree with Tierney that freedom is the decisive gift of
technology. However, it is not a ready-made gift; it is the reward for our
resistance to the invitations of the machine.  It is the consequence of
our struggle to raise ourselves above the machine.  And the more this gift
comes within our grasp, the more impossible it becomes to say that
technology makes us better.  Why?  Because to the extent we become free,
we determine ourselves from within, and therefore cannot be determined by
technology from without.

The case for pessimism about technology is not the mirror image of
Tierney's optimism.  It is not a matter of saying that the material
circumstances of our lives have really worsened.  No, the case for
pessimism lies in the degree to which technology has blinded us to what it
would mean for things to get better.  We cannot in freedom surmount the
challenge of our machines so long as we fail to recognize it.

SLT

 +++++++++++++++

NETFUTURE is a newsletter concerning technology and human responsibility.
Publication occurs roughly once per week or two.  Editor of the newsletter
is Steve Talbott, a senior editor at O'Reilly & Associates.  Where rights
are not explicitly reserved, you may redistribute this newsletter for
noncommercial purposes.  You may also redistribute individual articles in
their entirety, provided the NETFUTURE url and basic subscription
information are attached.

Current and past issues of NETFUTURE are available on the Web:

    http://www.ora.com/people/staff/stevet/netfuture/

To subscribe to NETFUTURE, send an email message like this:

    To: listproc@online.ora.com

    subscribe netfuture yourfirstname yourlastname

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 5--Cu Digest Header Info (unchanged since 7 May, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

         In ITALY: ZERO! BBS: +39-11-6507540

  UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
    Web-accessible from: http://www.etext.org/CuD/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #9.83
************************************