########## ########## ########## | AMERICA ONLINE FLAP| ########## ########## ########## | A sensible position| #### #### #### | | ######## ######## ######## | COMPUSERVE| ######## ######## ######## | A sensible decision| #### #### #### | | ########## #### #### | SUN MICROSYSTEMS GRANT TO EFF| ########## #### #### | A new and improved eff.org in 1992| | THE EFF PIONEER AWARDS: CALL FOR NOMINATIONS | | =====================================================================| EFFector Online January 7, 1992 Volume 2, Number 3| =====================================================================| In this issue: THE AMERICA ONLINE FLAP SUN MICROSYSTEMS MAKES MAJOR EQUIPMENT GRANT TO EFF THE COMPUSERVE CASE THE EFF AND FREE ENTERPRISE EFF at SCAT THE FIRST ANNUAL PIONEER AWARDS:CALL FOR NOMINATIONS -==--==--==-<>-==--==--==- THE AMERICA ONLINE FLAP Three weeks ago, Roger Dietz of Fremont, California, revealed to the media that he had received GIF files of sex acts via email to his account on America Online. The files apparently featured people who were underage. Dietz, an adult, had been posing as a gay 13-year-old boy in the public chat rooms of America Online for some time. His announcement that what appeared to be "kiddie porn" was sent to him caused a number of news organizations such as CNN, local and national newspapers, and Newsweek to follow up on the story. As many participants of the nets know, the "discovery" that computer networks contain and transmit adult material via email, and sometimes as files accessible to members of the network or BBS is something that recurs with some regularity on both the public and commercial systems. When it does, it poses severe problems for the managers of those networks. Although explicit sexual material has been part of the American scene for many years, the fact that it can be transmitted through computer networks is news to many people. When the material is reported to involve underage people, most people feel uneasy, mystified, and angry. Since the technology and legal nature of email is not well understood by the majority of citizens, many people wonder why the management of computer networks cannot actively police their systems to odious or potentially illegal material. Faced with this problem, Steve Case, President of America Online, said to Newsweek's John Schwartz: "People ask, 'How can you permit this? It's the same question that could be asked of the postmaster general." Going into more detail online, Case posted the following message to all members of America Online: ------------------------------------------------- Message to AO members from Steve Case: RESTATEMENT OF OUR POLICY I'd like to remind all of you that we have established rules regarding the use of this service, which we call "Terms of Service." These rules are posted in the online customer support area. Our goal is to foster the development of an "electronic community" that honors the principles of freedom of expression, while also recognizing that some community standards are needed for the service to grow. Recently two troubling problems have come to our attention. The first is a report that some members are using the service to commit illegal activities. A member has forwarded to us copies of messages he received which contained graphic files that may constitute child pornography. Because a member chose to forward these files to us, we were able to intervene and we are working with the authorities to pursue the matter. We obviously were unaware of this act until the files were forwarded to us, as our policy is that all private communications -- including e-mail, instant messages, and private chat rooms -- are strictly private, and we do not, will not, and legally cannot monitor any private communications. But if we are alerted to a potential offense and we are sent evidence, as we were in this particular case, we will vigorously pursue the matter. This first problem dealt with the illegal use of private communications. The second deals with the abuse by a handful of members of the public communications features. Recently, there has been an increase in online behavior that we -- and we think most members -- find to be offensive. This has included the use of vulgar language in public areas (chat rooms and/or message boards), the creation of inappropriate screen names and/or room names, and the sending of unsolicited, harassing Instant Messages to some members. Our desire is to trust the judgment of our members, and to err on the side of free expression. We don't want to aggressively police public areas to make sure everyone is abiding by the Terms of Service. However, we aren't going to let this type of unwanted behavior by a few ruin the service for us all. Let this serve as a warning to those few people who are creating the problem: shape up or ship out. Steve Case, President America Online, Inc. (reposted by permission of America Online) ------------------------------------------------- -==--==--==-<>-==--==--==- Reviving A Computer After A Fire If a computer's plastic casing has not been deformed by the heat, which begins to happen at 250 degrees F, then the computer will work. --Dean Sheridan, electronics technician and deaf actor, Torrance, California.** -==--==--==-<>-==--==--==- SUN MICROSYSTEMS MAKES MAJOR EQUIPMENT GRANT TO EFF We are pleased to announce that Sun Microsystems has awarded The Electronic Frontier Foundation a substantial equipment grant for 1992. This grant will enable us to go forward with a number of technical upgrades and other projects we have been putting off for some time due to the limitations on our equipment. For many months, the trusty Sun 4/110 (eff.org) which handles almost all our Internet traffic (including the EFF's anonymous ftp archives, the mailing lists we host, our USENET feed, and our WAIS server) has been pushed to its limits. In order to upgrade our systems and provide better service to the net and our members, we began last summer to pursue a grant from Sun Microsystems that would allow us to modify and upgrade our system. The major feature of the grant is a new SPARCStation 2, as well as an upgrade to a SPARCStation 2 from our current 4/110. With two machines, each more powerful than our current system, we will be able to provide more and faster ftp, WAIS, and mailing list service without making the system unusable for "normal work". In addition, we have been granted a SPARCStation IPX (to be used for software development), two SPARCStation ELCs, which will be used for administrator workstations (allowing us to run window systems, long compiles, and the like without bogging everything down), and a large amount of additional disk space (much of which will go to ftp archives, additional WAIS databases, and the like). We are making the final arrangements now, and hope to have the new machines phased in over the course of February. (People who have been using 192.88.144.3 or 'eff.org' for ftp or WAIS please note that that address *will change*. Use ftp.eff.org or wais.eff.org, respectively, instead, as those will always point to the right machine for the job.) The Electronic Frontier Foundation would like to extend its heartfelt thanks to all the people at Sun Microsystems for this strong vote of confidence in our mission and our work. -==--==--==-<>-==--==--==- Brenner's Rule of Pausing Programmers If an expert pauses while testing a new program, that's where the beginner will fail. -- Norman Brenner, Fleetwood, New York ** -==--==--==-<>-==--==--==- THE COMPUSERVE CASE: A STEP FORWARD IN FIRST AMENDMENT PROTECTION FOR ONLINE SERVICES. By Mike Godwin (mnemonic@eff.org) By now you may have heard about the summary-judgment decision in Cubby, Inc. v. CompuServe, a libel case. What you may not know is why the decision is such an important one. By holding that CompuServe should not be liable for defamation posted by a third-party user, the court in this case correctly analyzed the First Amendment needs of most online services. And because it's the first decision to deal directly with these issues, this case may turn out to be a model for future decisions in other courts. The full name of the case, which was decided in the Southern District of New York, is Cubby Inc. v. CompuServe. Basically, CompuServe contracted with a third party for that user to conduct a special-interest forum on CompuServe. The plaintiff claimed that defamatory material about its business was posted a user in that forum, and sued both the forum host and CompuServe. CompuServe moved for, and received, summary judgment in its favor. Judge Leisure held in his opinion that CompuServe is less like a publisher than like a bookstore owner or book distributor. First Amendment law allows publishers to be liable for defamation, but not bookstore owners, because holding the latter liable would create a burden on bookstore owners to review every book they carry for defamatory material. This burden would "chill" the distribution of books (not to mention causing some people to get out of the bookstore business) and thus would come into serious conflict with the First Amendment. So, although we often talk about BBSs as having the rights of publishers and publications, this case hits on an important distinction. How are publishers different from bookstore owners? Because we expect a publisher (or its agents) to review everything prior to publication. But we *don't* expect bookstore owners to review everything prior to sale. Similarly, in the CompuServe case, as in any case involving an online service in which users freely post messages for the public (this excludes Prodigy), we wouldn't expect the online-communications service provider to read everything posted *before* allowing it to appear. It is worth noting that the Supreme Court case on which Judge Leisure relies is Smith v. California--an obscenity case, not a defamation case. Smith is the Supreme Court case in which the notion first appears that it is generally unconstitutional to hold bookstore owners liable for content. So, if Smith v. California applies in a online-service or BBS defamation case, it certainly ought to apply in an obscenity case as well. Thus, Cubby, Inc. v. CompuServe sheds light not only on defamation law as applied in this new medium but on obscenity law as well. This decision should do much to clarify to concerned sysops what their obligations and liabilities are under the law. ---------- Highlights of the CompuServe decision (selected by Danny Weitzner): "CompuServe's CIS [CS Information Service] product is in essence an electronic, for-profit library that carries a vast number of publications and collects usage and membership fees from its subscribers in return for access to the publications. CompuServe and companies like it are at the forefront of the information industry revolution. High technology has markedly increased the speed with which information is gathered and processed; it is now possible for an individual with a personal computer, modem, and telephone line to have instantaneous access to thousands of news publications from across the United States and around the world. While CompuServe may decline to carry a given publication altogether, in reality, once it does decide to carry a given publication, it will have little or no editorial control over that publication's contents. This is especially so when CompuServe carries the publication as part of a forum that is managed by a company unrelated to CompuServe. "... CompuServe has no more editorial control over ... [the publication in question] ... than does a public library, book store, or newsstand, and it would be no more feasible for CompuServe to examine every publication it carries for potentially defamatory statements than it would for any other distributor to do so." "...Given the relevant First Amendment considerations, the appropriate standard of liability to be applied to CompuServe is whether it knew or had reason to know of the allegedly defamatory Rumorville statements." Cubby, Inc. v. CompuServe, Inc. (90 Civ. 6571, SDNY) -==--==--==-<>-==--==--==- Writing A Computer Program No good computer program can be written by more than ten people; the best programs are written by one or two people. -- Phil A. Schrodt, Associate Professor, Northwestern University, Evanston, Illinois ** -==--==--==-<>-==--==--==- THE EFF AND FREE ENTERPRISE by Mitchell Kapor [Over the past few weeks, there has been a thread in our Internet discussion group, comp.org.eff.talk, about the EFF's position regarding free enterprise and the future of the National Public Network. As can often happen in this volatile medium, there was some confusion over where the organization stands on this issue. To clarify this, EFF President, Mitchell Kapor, wrote the following response to the group.] I post this to clear up confusion about EFF positions which may have been created by posters imputing positions to the EFF. The EFF does not believe the U.S. government should own or control a national public network. We do not believe that the Internet or NREN should be extended by government fiat into everyone's home. In the context of the Internet, we would like to see a transition as speedy as possible to private ownership, management, and control of network facilities which serve or could serve competitive markets. If university access to networks is to be subsidized, it should be on the basis of direct grants to institutions which are to be used for the purchase of network services. What keeps the Internet glued together today is access to common network facilities provided through NSF-subsidized or free connections to a backbone network owned and controlled by a single private entity, ANS. The NSF recently announced that in 1993 it would begin a transition to a regime in which there would be multiple backbone awardees. This will bring affairs one step closer to a truly open regime. It should be pointed out that the NSF and other agencies are interested in stimulating the development of networking regimes (such as gigabit networks) which are at the leading edge of technology, hence pre-competitive state. This provides one principled rationale for government involvement. With respect to the public switched telephone network, over the next decade,or as soon as technology permits, we should move away from government mandated local exchange monopolies and toward competitive provision of local telephone service. After a period of time, if there is real competition,and we avoid the dangers of explosive decompression >from sudden removal of all government controls, it should be possible to deregulate. At the same time, development of the market for content-based information services could be spurred long before that with the deployment of a ubiquitous, affordable platform based on ISDN. We see no purpose in delaying this for either local loop competition or the development of a universal, national broadband network, both of which are far off (and both of which we support). To do so will likely require government action, through some combination of legislation and FCC and state regulation. It was in this narrow context and no broader one that we originally advocated the appropriateness of regulation to achieve these ends. -==--==--==-<>-==--==--==- The Professional Tools Rule Engineers and computer programmers need equipment equal to one year's earnings to work at top speed. Anything less slows them down. -- William Blake, engineering manager, New Haven, Connecticut** -==--==--==-<>-==--==--==- EFF at SCAT: Speaking to the Special Computer Attack Team by Mike Godwin [One of the jobs of the Electronic Frontier Foundation is to build bridges between different communities with an interest in computer-based communications. One of the most important communities is law enforcement. In December, Mike Godwin, staff counsel for EFF,spoke to a meeting of the Special Computer Attack Team (SCAT). This is his report.] The Special Computer Attack Team is a joint federal-state organization whose mission is to share information and resources in handling computer crime in that region. I met with them at their invitation in Indianapolis. I spoke for over two and a half hours, and we touched on most of the civil-liberties issues with which EFF is concerned. I told SCAT that perhaps the main things they'd heard about EFF is that it was a hacker defense fund and is suing some government agents and prosecutors. I explained that we *aren't* a "hacker defense fund," and stressed that being alert to the issues I would raise in my presentation is a way of minimizing the risk of a lawsuit in their cases. We discussed the issues raised by seizing equipment. "You can't seize equipment under a search warrant that you don't have probable cause to believe is evidence of a crime," I said. They responded by talking about forfeiture laws. "Can you seize forfeitable stuff that's not evidence under an *evidentiary* search warrant?" I asked them. They admitted that this was improper procedure. I went on to explain that the reason this improper procedure is almost never questioned is that, when law-enforcement agents engage in this kind of improper, overbroad search, the cost of litigation to recover invariably exceeds the cost of the equipment. At present the major remedy for overbroad searches is the Exclusionary Rule--the Supreme Court-imposed rule that says that improperly seized evidence can't be used in court. But the problem is that the Exclusionary Rule is *no remedy at all* in cases in which the government seized items that were *not* evidence. If you are a defendant your lawyer won't expend time and effort to seek suppression of the "evidence" of the illegally seized laser printer if the printer is not in fact incriminatory. These considerations left me with making what were essentially *moral* arguments that law enforcement should limit its seizures since from a legal standpoint, they have few risks. "Everyone in this room has sworn to uphold the law," I said. "Upholding the law means not seizing as 'evidence' equipment and other items that you don't have probable cause to believe *is* evidence." We also talked about searches of third-party non-targets.(Steve Jackson Games is a case in point about what can go wrong in a search of a third party). I said, "Imagine how it feels when, although you would have gladly cooperated with an investigation if asked, the police come and seize your BBS and shut it down." Even if they weren't worried about about legal action, I argued, they should worry about public faith in law enforcement when they run roughshod over law-abiding citizens. In addition, I pointed out that duplicate computer files are admissible as evidence under federal law, and using duplicate files is a way of making searches less intrusive. But it was clear from the discussion that ensued that most of the people at this meeting hated not seizing the equipment. They admitted that they found it "convenient" to take computers away to examine at leisure. When I became a bit angry about "convenience" trumping the right to a reasonable, particular search, one of the attendees "explained" that by "convenient" he meant "necessary in some cases." Finally, I told the SCAT members that the law shouldn't treat a third-party sysop differently than it treats IBM; if a subpoena is good enough to get computer records from IBM, it's also appropriate for a third-party sysop of a hobbyist BBS. They seemed to accept this. Overall, I came away from the Indianapolis presentation with two feelings. First, I was certain that we had made a good impression on them, that they'd found the presentation thought-provoking and informative, that we may had won some of them over on some issues. Second, I was depressed because I realized how few legal remedies there are for the victims of overbroad computer seizures, be they suspects or third parties. We have a long way to go here, complicated by the fact that most seizure and forfeiture decisions in recent years have been built on drug cases. I can only hope that as computer-based communication becomes more and more part of mainstream American life, policy makers will realize the need for new remedies and protections. -==--==--==-<>-==--==--==- Dealing with A Computer When dealing with a computer, a good rule to remember is to treat it as you would a small, retarded (but very obedient) child. -- Bob Horton, consultant and writer, St. Petersburg, Flordia ** -==--==--==-<>-==--==--==- THE ELECTRONIC FRONTIER FOUNDATION'S FIRST ANNUAL PIONEER AWARDS CALL FOR NOMINATIONS (Attention: Please feel free to repost to all systems worldwide.) In every field of human endeavor,there are those dedicated to expanding knowledge,freedom,efficiency and utility. Along the electronic frontier, this is especially true. To recognize this,the Electronic Frontier Foundation has established the Pioneer Awards. The first annual Pioneer Awards will be given at the Second Annual Computers, Freedom, and Privacy Conference in Washington, D.C. in March of 1992. All valid nominations will be reviewed by a panel of outside judges chosen for their knowledge of computer-based communications and the technical, legal, and social issues involved in networking. There are no specific categories for the Pioneer Awards, but the following guidelines apply: 1) The nominees must have made a substantial contribution to the health, growth, accessibility, or freedom of computer-based communications. 2) The contribution may be technical, social, economic or cultural. 3) Nominations may be of individuals, systems, or organizations in the private or public sectors. 4) Nominations are open to all, and you may nominate more than one recipient. You may nominate yourself or your organization. 5) All nominations, to be valid, must contain your reasons, however brief, on why you are nominating the individual or organization, along with a means of contacting the nominee, and your own contact number. No anonymous nominations will be allowed. 6) Every person or organization, with the single exception of EFF staff members, are eligible for Pioneer Awards. You may nominate as many as you wish, but please use one form per nomination. You may return the forms to us via email to pioneer@eff.org You may mail them to us at: Pioneer Awards, EFF, 155 Second Street Cambridge MA 02141. You may FAX them to us at: +1 617 864 0866 Just tell us the name of the nominee, the phone number or email address at which the nominee can be reached, and, most important, why you feel the nominee deserves the award. You can attach supporting documentation. Please include your own name, address, and phone number. We're looking for the Pioneers of the Electronic Frontier that have made and are making a difference. Thanks for helping us find them, The Electronic Frontier Foundation -------EFF Pioneer Awards Nomination Form------ Please return to the Electronic Frontier Foundation via email to: pioneer@eff.org or via surface mail to EFF 155 Second Street, Cambridge, MA 02141 USA; or via FAX to +1 617 864 0866 Nominee:_________________________________________________________________ Title: __________________________________________________________________ Company/Organization:____________________________________________________ Contact number or email address: ________________________________________ Reason for nomination:___________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ Your name and contact number:____________________________________________ _________________________________________________________________________ Extra documentation attached: _______ -------EFF Pioneer Awards Nomination Form------ -==--==--==-<>-==--==--==- Designing a Computer System Making a design change when a computer system is nearly complete will cost about ten times as much as making the change before the work has started. -- Clifton Royston, programmer/analyst, Nukualofa, Tonga** -==--==--==-<>-==--==--==- MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION In order to continue the work already begun and to expand our efforts and activities into other realms of the electronic frontier, we need the financial support of individuals and organizations. If you support our goals and our work, you can show that support by becoming a member now. Members receive our quarterly newsletter, EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you have an electronic address that can be reached through the Net), and special releases and other notices on our activities. But because we believe that support should be freely given, you can receive these things even if you do not elect to become a member. Your membership/donation is fully tax deductible. Our memberships are $20.00 per year for students, $40.00 per year for regular members. You may, of course, donate more if you wish. Our privacy policy: The Electronic Frontier Foundation will never, under any circumstances, sell any part of its membership list. We will, from time to time, share this list with other non-profit organizations whose work we determine to be in line with our goals. But with us, member privacy is the default. This means that you must actively grant us permission to share your name with other groups. If you do not grant explicit permission, we assume that you do not wish your membership disclosed to any group for any reason. ---------------- EFF@eff.org MEMBERSHIP FORM --------------- Mail to: The Electronic Frontier Foundation, Inc. 155 Second St. #23 Cambridge, MA 02141 I wish to become a member of the EFF I enclose:$__________ $20.00 (student or low income membership) $40.00 (regular membership) $100.00(Corporate or company membership. This allows any organization to become a member of EFF. It allows such an organization, if it wishes to designate up to five individuals within the organization as members.) [ ] I enclose an additional donation of $___________ Name:______________________________________________________ Organization:______________________________________________ Address: __________________________________________________ City or Town: _____________________________________________ State:_______ Zip:________ Phone:( )_____________(optional) FAX:( )____________________(optional) Email address: ______________________________ I enclose a check [ ]. Please charge my membership in the amount of $_____________ to my Mastercard [ ] Visa [ ] American Express [ ] Number:____________________________________________________ Expiration date: ____________ Signature: ________________________________________________ Date:______________________ I hereby grant permission to the EFF to share my name with other non-profit groups from time to time as it deems appropriate [ ]. Initials:___________________________ -==--==--==-<>-==--==--==- Avoiding Mistakes When writing a software program, your chances of making a mistake double with each telephone interruption. --R.L. Liming, Indianapolis, Indiana** ** These "rules of thumb" are from NEVER TRUST A CALM DOG and other Rules of Thumb by Tom Parker (Harper/Collins, 1990). Reprinted by permission of the author. =====================================================================| EFFector Online is published by | The Electronic Frontier Foundation | 155 Second Street, Cambridge MA 02141 | Phone: +1 617 864 0665 FAX: +1 617 864 0866 | Internet Address: eff@eff.org | Reproduction of this publication in electronic media is encouraged | To reproduce signed articles individually, | please contact the authors for their express permission. | =====================================================================| Downloaded From P-80 International Information Systems 304-744-2253 12yrs+