EFFector Online January 7, 1992

 ########## ########## ########## |                AMERICA ONLINE FLAP|

########## ########## ########## |                A sensible position|

####       ####       ####       |                                   |

########   ########   ########   |                         COMPUSERVE|

########   ########   ########   |                A sensible decision|

####       ####       ####       |                                   |

########## ####       ####       |      SUN MICROSYSTEMS GRANT TO EFF|

########## ####       ####       | A new and improved eff.org in 1992|

                                                                     |

             THE EFF PIONEER AWARDS: CALL FOR NOMINATIONS            |

                                                                     |

=====================================================================|

EFFector Online           January 7, 1992          Volume 2, Number 3|

=====================================================================|

    

     In this issue:

THE AMERICA ONLINE FLAP

  SUN MICROSYSTEMS MAKES MAJOR EQUIPMENT GRANT TO EFF

  THE COMPUSERVE CASE

      THE EFF AND FREE ENTERPRISE

      EFF at SCAT

  THE FIRST ANNUAL PIONEER AWARDS:CALL FOR NOMINATIONS

    

       -==--==--==-<>-==--==--==-

    

THE AMERICA ONLINE FLAP

    

Three weeks ago, Roger Dietz of Fremont, California, revealed to the

media that he had received GIF files of sex acts via email to his

account on America Online.  The files apparently featured people who

were underage.


Dietz, an adult, had been posing as a gay 13-year-old boy in the public

chat rooms of America Online for some time.  His announcement that what

appeared to be "kiddie porn" was sent to him caused a number of news

organizations such as CNN, local and national newspapers, and Newsweek

to follow up on the story.


As many participants of the nets know, the "discovery" that computer

networks contain and transmit adult material via email, and sometimes as

files accessible to members of the network or BBS is something that

recurs with some regularity on both the public and commercial systems.

When it does, it poses severe problems for the managers of those networks.


Although explicit sexual material has been part of the American scene

for many years, the fact that it can be transmitted through computer

networks is news to many people.  When the material is reported to

involve underage people, most people feel uneasy, mystified, and angry.

Since the technology and legal nature of email is not well understood by

the majority of citizens, many people wonder why the management of

computer networks cannot actively police their systems to odious or

potentially illegal material.  Faced with this problem, Steve Case,

President of America Online, said to Newsweek's John Schwartz: "People

ask, 'How can you permit this? It's the same question that could be

asked of the postmaster general."


Going into more detail online, Case posted the following message to all

members of America Online:

-------------------------------------------------

Message to AO members from Steve Case:


RESTATEMENT OF OUR POLICY


I'd like to remind all of you that we have established rules regarding

the use of this service, which we call "Terms of Service." These rules

are posted in the online customer support area.  Our goal is to foster

the development of an "electronic community" that honors the principles

of freedom of expression, while also recognizing that some community

standards are needed for the service to grow.


Recently two troubling problems have come to our attention.  The first

is a report that some members are using the service to commit illegal

activities.  A member has forwarded to us copies of messages he received

which contained graphic files that may constitute child pornography.

Because a member chose to forward these files to us, we were able to

intervene and we are working with the authorities to pursue the matter.

We obviously were unaware of this act until the files were forwarded to

us, as our policy is that all private communications -- including

e-mail, instant messages, and private chat rooms -- are strictly

private, and we do not, will not, and legally cannot monitor any private

communications.  But if we are alerted to a potential offense and we are

sent evidence, as we were in this particular case, we will vigorously

pursue the matter.


This first problem dealt with the illegal use of private communications.

The second deals with the abuse by a handful of members of the public

communications features.  Recently, there has been an increase in online

behavior that we -- and we think most members -- find to be offensive.

This has included the use of vulgar language in public areas (chat rooms

and/or message boards), the creation of inappropriate screen names

and/or room names, and the sending of unsolicited, harassing Instant

Messages to some members.


Our desire is to trust the judgment of our members, and to err on the

side of free expression.  We don't want to aggressively police public

areas to make sure everyone is abiding by the Terms of Service.

However, we aren't going to let this type of unwanted behavior by a few

ruin the service for us all. Let this serve as a warning to those few

people who are creating the problem: shape up or ship out.


            Steve Case, President

            America Online, Inc.

(reposted by permission of America Online)

-------------------------------------------------


       -==--==--==-<>-==--==--==-

    Reviving A Computer After A Fire


If a computer's plastic casing has not been deformed by the heat, which

begins to happen at 250 degrees F, then the computer will work.

  --Dean Sheridan, electronics technician and deaf actor,

         Torrance, California.**

       -==--==--==-<>-==--==--==-


  SUN MICROSYSTEMS MAKES MAJOR EQUIPMENT GRANT TO EFF


We are pleased to announce that Sun Microsystems has awarded The

Electronic Frontier Foundation a substantial equipment grant for 1992.

This grant will enable us to go forward with a number of technical

upgrades and other projects we have been putting off for some time due

to the limitations on our equipment.


For many months, the trusty Sun 4/110 (eff.org) which handles almost all

our Internet traffic (including the EFF's anonymous ftp archives, the

mailing lists we host, our USENET feed, and our WAIS server) has been

pushed to its limits.  In order to upgrade our systems and provide

better service to the net and our members, we began last summer to

pursue a grant from Sun Microsystems that would allow us to modify and

upgrade our system.


The major feature of the grant is a new SPARCStation 2, as well as an

upgrade to a SPARCStation 2 from our current 4/110.  With two machines,

each more powerful than our current system, we will be able to provide

more and faster ftp, WAIS, and mailing list service without making the

system unusable for "normal work".


In addition, we have been granted a SPARCStation IPX (to be used for

software development), two SPARCStation ELCs, which will be used for

administrator workstations (allowing us to run window systems, long

compiles, and the like without bogging everything down), and a large

amount of additional disk space (much of which will go to ftp archives,

additional WAIS databases, and the like).


We are making the final arrangements now, and hope to have the new

machines phased in over the course of February.  (People who have been

using 192.88.144.3 or 'eff.org' for ftp or WAIS please note that that

address *will change*.  Use ftp.eff.org or wais.eff.org, respectively,

instead, as those will always point to the right machine for the job.)


The Electronic Frontier Foundation would like to extend its heartfelt

thanks to all the people at Sun Microsystems for this strong vote of

confidence in our mission and our work.


       -==--==--==-<>-==--==--==-

Brenner's Rule of Pausing Programmers

If an expert pauses while testing a new program, that's where the

beginner will fail. -- Norman Brenner, Fleetwood, New York **

       -==--==--==-<>-==--==--==-

    

  THE COMPUSERVE CASE:

   A STEP FORWARD IN FIRST AMENDMENT PROTECTION FOR ONLINE SERVICES.

   By Mike Godwin (mnemonic@eff.org)


By now you may have heard about the summary-judgment decision in Cubby,

Inc. v. CompuServe, a libel case. What you may not know is why the

decision is such an important one. By holding that CompuServe should not

be liable for defamation posted by a third-party user, the court in this

case correctly analyzed the First Amendment needs of most online

services. And because it's the first decision to deal directly with

these issues, this case may turn out to be a model for future decisions

in other courts.


The full name of the case, which was decided in the Southern District of

New York, is Cubby Inc. v. CompuServe. Basically, CompuServe contracted

with a third party for that user to conduct a special-interest forum on

CompuServe. The plaintiff claimed that defamatory material about its

business was posted a user in that forum, and sued both the forum host

and CompuServe. CompuServe moved for, and received, summary judgment in

its favor.


Judge Leisure held in his opinion that CompuServe is less like a

publisher than like a bookstore owner or book distributor. First

Amendment law allows publishers to be liable for defamation, but not

bookstore owners, because holding the latter liable would create a

burden on bookstore owners to review every book they carry for

 defamatory material. This burden would "chill" the distribution of

books (not to mention causing some people to get out of the bookstore

business) and thus would come into serious conflict with the First

Amendment.


So, although we often talk about BBSs as having the rights of publishers

and publications, this case hits on an important distinction. How are

publishers different from bookstore owners?  Because we expect a

publisher (or its agents) to review everything prior to publication. But

we *don't* expect bookstore owners to review everything prior to sale.

Similarly, in the CompuServe case, as in any case involving an online

service in which users freely post messages for the public (this

excludes Prodigy), we wouldn't expect the online-communications service

provider to read everything posted *before* allowing it to appear.


It is worth noting that the Supreme Court case on which Judge Leisure

relies is Smith v. California--an obscenity case, not a defamation case.

Smith is the Supreme Court case in which the notion first appears that

it is generally unconstitutional to hold bookstore owners liable for

content. So, if Smith v. California applies in a online-service or BBS

defamation case, it certainly ought to apply in an obscenity case as well.


Thus, Cubby, Inc. v. CompuServe sheds light not only on defamation law

as applied in this new medium but on obscenity law as well. This

decision should do much to clarify to concerned sysops what their

obligations and liabilities are under the law.


----------

Highlights of the CompuServe decision (selected by Danny Weitzner):


"CompuServe's CIS [CS Information Service] product is in essence an

electronic, for-profit library that carries a vast number of

publications and collects usage and membership fees from its subscribers

in return for access to the publications. CompuServe and companies like

it are at the forefront of the information industry revolution. High

technology has markedly increased the speed with which information is

gathered and processed; it is now possible for an individual with a

personal computer, modem, and telephone line to have instantaneous

access to thousands of news publications from across the United States

and around the world.  While CompuServe may decline to carry a given

publication altogether, in reality, once it does decide to carry a given

publication, it will have little or no editorial control over that

publication's contents.  This is especially so when CompuServe carries

the publication as part of a forum that is managed by a company

unrelated to CompuServe.  "... CompuServe has no more editorial control

over ... [the publication in question] ... than does a public library,

book store, or newsstand, and it would be no more feasible for

CompuServe to examine every publication it carries for potentially

defamatory statements than it would for any other distributor to do so."

"...Given the relevant First Amendment considerations, the appropriate

standard of liability to be applied to CompuServe is whether it knew or

had reason to know of the allegedly defamatory Rumorville statements."


Cubby, Inc. v. CompuServe, Inc. (90 Civ. 6571, SDNY)


       -==--==--==-<>-==--==--==-

       Writing A Computer Program


No good computer program can be written by more than ten people; the

best programs are written by one or two people. -- Phil A. Schrodt,

Associate Professor, Northwestern University, Evanston, Illinois **

       -==--==--==-<>-==--==--==-

    

      THE EFF AND FREE ENTERPRISE

   by Mitchell Kapor

    

[Over the past few weeks, there has been a thread in our Internet

discussion group, comp.org.eff.talk, about the EFF's position regarding

free enterprise and the future of the National Public Network.  As can

often happen in this volatile medium, there was some confusion over

where the organization stands on this issue. To clarify this, EFF

President, Mitchell Kapor, wrote the following response to the group.]


I post this to clear up confusion about EFF positions which may have

been created by posters imputing positions to the EFF.


The EFF does not believe the U.S. government should own or control a

national public network. We do not believe that the Internet or NREN

should be extended by government fiat into everyone's home.


In the context of the Internet, we would like to see a transition as

speedy as possible to private ownership, management, and control of

network facilities which serve or could serve competitive markets.  If

university access to networks is to be subsidized, it should be on the

basis of direct grants to institutions which are to be used for the

purchase of network services.


What keeps the Internet glued together today is access to common network

facilities provided through NSF-subsidized or free connections to a

backbone network owned and controlled by a single private entity, ANS.

The NSF recently announced that in 1993 it would begin a transition to a

regime in which there would be multiple backbone awardees. This will

bring affairs one step closer to a truly open regime. It should be

pointed out that the NSF and other agencies are interested in

stimulating the development of networking regimes (such as gigabit

networks) which are at the leading edge of technology, hence

pre-competitive state. This provides one principled rationale for

government involvement.


With respect to the public switched telephone network, over the next

decade,or as soon as technology permits, we should move away from

government mandated local exchange monopolies and toward competitive

provision of local telephone service. After a period of time, if there

is real competition,and we avoid the dangers of explosive decompression

>from sudden removal of all government controls, it should be possible

to deregulate.


At the same time, development of the market for content-based

information services could be spurred long before that with the

deployment of a ubiquitous, affordable platform based on ISDN. We see no

purpose in delaying this for either local loop competition or the

development of a universal, national broadband network, both of which

are far off (and both of which we support). To do so will likely require

government action, through some combination of legislation and FCC and

state regulation.  It was in this narrow context and no broader one that

we originally advocated the appropriateness of regulation to achieve

these ends.


       -==--==--==-<>-==--==--==-

      The Professional Tools Rule

Engineers and computer programmers need equipment equal to one year's

earnings to work at top speed.  Anything less slows them down.

    -- William Blake, engineering manager, New Haven, Connecticut**

       -==--==--==-<>-==--==--==-

    

      EFF at SCAT:

      Speaking to the Special Computer Attack Team

     by Mike Godwin


[One of the jobs of the Electronic Frontier Foundation is to build

bridges between different communities with an interest in computer-based

communications.  One of the most important communities is law

enforcement.  In December, Mike Godwin, staff counsel for EFF,spoke to a

meeting of the Special Computer Attack Team (SCAT). This is his report.]


The Special Computer Attack Team is a joint federal-state organization

whose mission is to share information and resources in handling computer

crime in that region. I met with them at their invitation in Indianapolis.


I spoke for over two and a half hours, and we touched on most of the

civil-liberties issues with which EFF is concerned.


I told SCAT that perhaps the main things they'd heard about EFF is that

it was a hacker defense fund and is suing some government agents and

prosecutors. I explained that we *aren't* a "hacker defense fund," and

stressed that being alert to the issues I would raise in my presentation

is a way of minimizing the risk of a lawsuit in their cases.


We discussed the issues raised by seizing equipment. "You can't seize

equipment under a search warrant that you don't have probable cause to

believe is evidence of a crime," I said.


They responded by talking about forfeiture laws.


"Can you seize forfeitable stuff that's not evidence under an

*evidentiary* search warrant?" I asked them.


They admitted that this was improper procedure.


I went on to explain that the reason this improper procedure is almost

never questioned is that, when law-enforcement agents engage in this

kind of improper, overbroad search, the cost of litigation to recover

invariably exceeds the cost of the equipment. At present the major

remedy for overbroad searches is the Exclusionary Rule--the Supreme

Court-imposed rule that says that improperly seized evidence can't be

used in court.


But the problem is that the Exclusionary Rule is *no remedy at all* in

cases in which the government seized items that were *not* evidence.  If

you are a defendant your lawyer won't expend time and effort to seek

suppression of the "evidence" of the illegally seized laser printer if

the printer is not in fact incriminatory.


These considerations left me with making what were essentially *moral*

arguments that law enforcement should limit its seizures since from a

legal standpoint, they have few risks. "Everyone in this room has sworn

to uphold the law," I said. "Upholding the law means not seizing as

'evidence' equipment and other items that you don't have probable cause

to believe *is* evidence."


We also talked about searches of third-party non-targets.(Steve Jackson

Games is a case in point about what can go wrong in a search of a third

party). I said, "Imagine how it feels when, although you would have

gladly cooperated with an investigation if asked, the police come and

seize your BBS and shut it down." Even if they weren't worried about

about legal action, I argued, they should worry about public faith in

law enforcement when they run roughshod over law-abiding citizens.


In addition, I pointed out that duplicate computer files are admissible

as evidence under federal law, and using duplicate files is a way of

making searches less intrusive. But it was clear from the discussion

that ensued that most of the people at this meeting hated not seizing

the equipment.  They admitted that they found it "convenient" to take

computers away to examine at leisure. When I became a bit angry about

"convenience" trumping the right to a reasonable, particular search, one

of the attendees "explained" that by "convenient" he meant "necessary in

some cases."


Finally, I told the SCAT members that the law shouldn't treat a

third-party sysop differently than it treats IBM; if a subpoena is good

enough to get computer records from IBM, it's also appropriate for a

third-party sysop of a hobbyist BBS. They seemed to accept this.


Overall, I came away from the Indianapolis presentation with two

feelings.  First, I was certain that we had made a good impression on

them, that they'd found the presentation thought-provoking and

informative, that we may had won some of them over on some issues.

Second, I was depressed because I realized how few legal remedies there

are for the victims of overbroad computer seizures, be they suspects or

third parties. We have a long way to go here, complicated by the fact

that most seizure and forfeiture decisions in recent years have been

built on drug cases. I can only hope that as computer-based

communication becomes more and more part of mainstream American life,

policy makers will realize the need for new remedies and protections.


       -==--==--==-<>-==--==--==-

Dealing with A Computer

When dealing with a computer, a good rule to remember is to treat it as

you would a small, retarded (but very obedient) child. -- Bob Horton,

consultant and writer, St. Petersburg, Flordia **

       -==--==--==-<>-==--==--==-


    THE ELECTRONIC FRONTIER FOUNDATION'S FIRST ANNUAL PIONEER AWARDS

  CALL FOR NOMINATIONS

   (Attention: Please feel free to repost to all systems worldwide.)


In every field of human endeavor,there are those dedicated to expanding

knowledge,freedom,efficiency and utility. Along the electronic frontier,

this is especially true. To recognize this,the Electronic Frontier

Foundation has established the Pioneer Awards.  The first annual Pioneer

Awards will be given at the Second Annual Computers, Freedom, and

Privacy Conference in Washington, D.C. in March of 1992.


All valid nominations will be reviewed by a panel of outside judges

chosen for their knowledge of computer-based communications and the

technical, legal, and social issues involved in networking.


There are no specific categories for the Pioneer Awards, but the following

guidelines apply:


   1) The nominees must have made a substantial contribution to the

      health, growth, accessibility, or freedom of computer-based

      communications.


   2) The contribution may be technical, social, economic or cultural.


   3) Nominations may be of individuals, systems, or organizations in

      the private or public sectors.


   4) Nominations are open to all, and you may nominate more than one

      recipient. You may nominate yourself or your organization.


   5) All nominations, to be valid, must contain your reasons, however

      brief, on why you are nominating the individual or organization,

      along with a means of contacting the nominee, and your own contact

      number. No anonymous nominations will be allowed.


   6) Every person or organization, with the single exception of EFF

      staff members, are eligible for Pioneer Awards.


You may nominate as many as you wish, but please use one form per

nomination. You may return the forms to us via email to


             pioneer@eff.org


You may mail them to us at:

             Pioneer Awards, EFF,

             155 Second Street

             Cambridge MA 02141.


You may FAX them to us at:

             +1 617 864 0866


Just tell us the name of the nominee, the phone number or email address

at which the nominee can be reached, and, most important, why you feel

the nominee deserves the award.  You can attach supporting

documentation.  Please include your own name, address, and phone number.


We're looking for the Pioneers of the Electronic Frontier that have made

and are making a difference. Thanks for helping us find them,


The Electronic Frontier Foundation


              -------EFF Pioneer Awards Nomination Form------


Please return to the Electronic Frontier Foundation via email to:

          pioneer@eff.org

or via surface mail to EFF 155 Second Street, Cambridge, MA 02141 USA;

or via FAX to +1 617 864 0866



Nominee:_________________________________________________________________


Title: __________________________________________________________________


Company/Organization:____________________________________________________


Contact number or email address: ________________________________________


Reason for nomination:___________________________________________________


_________________________________________________________________________


_________________________________________________________________________


_________________________________________________________________________


_________________________________________________________________________


_________________________________________________________________________


_________________________________________________________________________


_________________________________________________________________________


_________________________________________________________________________


_________________________________________________________________________


_________________________________________________________________________


Your name and contact number:____________________________________________


_________________________________________________________________________


Extra documentation attached: _______


    -------EFF Pioneer Awards Nomination Form------

    

       -==--==--==-<>-==--==--==-

      Designing a Computer System

Making a design change when a computer system is nearly complete will

cost about ten times as much as making the change before the work has

started. -- Clifton Royston, programmer/analyst, Nukualofa, Tonga**

       -==--==--==-<>-==--==--==-


    MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION


In order to continue the work already begun and to expand our efforts

and activities into other realms of the electronic frontier, we need the

financial support of individuals and organizations.


If you support our goals and our work, you can show that support by

becoming a member now. Members receive our quarterly newsletter,

EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you

have an electronic address that can be reached through the Net), and

special releases and other notices on our activities.  But because we

believe that support should be freely given, you can receive these

things even if you do not elect to become a member.


Your membership/donation is fully tax deductible.


Our memberships are $20.00 per year for students, $40.00 per year for

regular members.  You may, of course, donate more if you wish.


Our privacy policy: The Electronic Frontier Foundation will never, under

any circumstances, sell any part of its membership list.  We will, from

time to time, share this list with other non-profit organizations whose

work we determine to be in line with our goals.  But with us, member

privacy is the default. This means that you must actively grant us

permission to share your name with other groups. If you do not grant

explicit permission, we assume that you do not wish your membership

disclosed to any group for any reason.


---------------- EFF@eff.org MEMBERSHIP FORM ---------------


Mail to: The Electronic Frontier Foundation, Inc.

         155 Second St. #23

         Cambridge, MA 02141


I wish to become a member of the EFF  I enclose:$__________

            $20.00 (student or low income membership)

            $40.00 (regular membership)

            $100.00(Corporate or company membership.

                    This allows any organization to

                    become a member of EFF. It allows

                    such an organization, if it wishes

                    to designate up to five individuals

                    within the organization as members.)


    [  ] I enclose an additional donation of $___________


Name:______________________________________________________


Organization:______________________________________________


Address: __________________________________________________


City or Town: _____________________________________________


State:_______ Zip:________ Phone:(    )_____________(optional)


FAX:(    )____________________(optional)


Email address: ______________________________


I enclose a check [  ].

Please charge my membership in the amount of $_____________

to my Mastercard [  ]  Visa [  ]  American Express [  ]


Number:____________________________________________________


Expiration date: ____________


Signature: ________________________________________________


Date:______________________


I hereby grant permission to the EFF to share my name with

other non-profit groups from time to time as it deems

appropriate   [ ].

                       Initials:___________________________


       -==--==--==-<>-==--==--==-

   Avoiding Mistakes

When writing a software program, your chances of making a mistake double

with each telephone interruption. --R.L. Liming, Indianapolis, Indiana**


** These "rules of thumb" are from NEVER TRUST A CALM DOG and other

Rules of Thumb by Tom Parker (Harper/Collins, 1990). Reprinted by

permission of the author.

=====================================================================|

                   EFFector Online is published by                   |

                  The Electronic Frontier Foundation                 |

                 155 Second Street, Cambridge MA 02141               |

              Phone: +1 617 864 0665 FAX: +1 617 864 0866            |

                     Internet Address: eff@eff.org                   |

 Reproduction of this publication in electronic media is encouraged  |

               To reproduce signed articles individually,            |

          please contact the authors for their express permission.   |

=====================================================================|


Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS