Previous Index Thread

Cu Digest, #8.02

Computer underground Digest    Sun  Jan 7, 1996   Volume 8 : Issue 02
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.02 (Sun, Jan 7, 1996)

File 1--FINAL REMINDER - Last issue of CuD from the UIUC SERVER
File 2--Compuserve: "The whole story"
File 3--Court Rules in Pentagon Cit
File 4--CDT: Telecom Bill Overview and Proposal Text (FINALLY!)
File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sun,  7 Jan 1996 16:19:32 CST
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 1--FINAL REMINDER - Last issue of CuD from the UIUC SERVER

                   ** CuD IS CHANGING SERVERS **

THIS WILL LIKELY BE THE *FINAL* time we use the UIUC server. The
next issue of CuD will be sent from the weber.ucsd.edu site.

==============

On Wednesday, Cu Digest will be moving to a new server at
weber.ucsd.edu. to continue to receive CuD, you must
RE-SUBSCRIBE.

Re-subbing is easy. Just send a message with this in the
   "Subject:" line
           SUBSCRIBE CU-DIGEST

send it to:

   cu-digest-request@weber.ucsd.edu

If you prefer to access CuD from Usenet, use
    comp.society.cu-digest

If you prefer archives, you can use the ftp/www site at
ftp.eff.org (or www.eff.org) or the CuD archives at:
http://www.soci.niu.edu/~cudigest.

We also hope to have a mail archive set up soon as well.

You can still contact the moderators at:
        cudigest@sun.soci.niu.edu
or      tk0jut2@mvs.cso.niu.edu

Please *DO NOT* send inquiries to the server at UIUC.

Jim and Gordon

------------------------------

Date: Sun,  7 Jan 1996 09:47:57 -0500 (EST)
From: "Declan B. McCullagh" <declan+@CMU.EDU>
Subject: File 2--Compuserve: "The whole story"

Note the extent of the damage caused by CMU, Marty Rimm, and TIME's
"Cyberporn" cover:

       "Last summer, a kind of hysteria about Internet
        pornography broke out in German media."

Thanks, Michael, for posting this.

-Declan

---------- Forwarded message begins here ----------

From--michael_kunze@spiegel.de (Michael Kunze)
Newsgroups--alt.censorship
Subject--CIS censorship--The whole story
Date--Sat, 06 Jan 1996 09:33:39 GMT

Dear Nettizens,

Some few fivehundred postings ago, I promised you let you have more
details about the CompuServe censorship case investigated by the
editorial staff of SPIEGEL online. It is not a story of evil but of
people acting overambitious and ignorant. And it is not quite as
simple as DrG might be wishing!

To keep it short, here are the facts:

In 1994, a Task Force called "AG EDV" was set up by the Bavarian
Minister of Interior at the Police Headquarters in Munich. Initially,
the Task Force was formed to search persons dealing with pornographic
material via BTX the former online service of German Telekom and its
work was limited to one year.

For the moment, investigations of this Task Force ran successfully due
to the assistance of Telekom. But simultaneously, people being
suspected changed their ways of distributing  either to closed BBS
systems or chose more secret methods. So the Task Force was compelled
to enhance their efforts and they raided Munich BBS systems.
Furthermore, they studied computer magazines to find ads for
pornographic CD-ROMs. During this operation they found what they were
looking for, and "PC Direkt", a Ziff Davis publication, and some other
magazine were forced to pulp some issues.

All activities of the Task Force could not have happened, if they were
not supported by a whole bunch of local prosecutors and judges.
Sticking together, chatting, doing favours forms a part of the social
life in Munich - in malicious words - the 'Munich swamp'.

The prevailing opinion of the Task Force and of some prosecutors is
that carriers of digital information could held responsible for the
content of what they are spreading. This meaning matches exactly the
content of the CDA. But this is only one point of view. Up to now,
there doesn't exist any law or direction in Germany concerning
responsibilities of ISPs or online services regarding contents they
only do deliver. And so, judges decide from case to case. The German
department of justice thinks that carriers could be held responsible
if they deliver illegal content "deliberately". But then, could one
call them "carriers"?

Last summer, a kind of hysteria about Internet pornography broke out
in German media. A few journalist had made their first steps in the
Internet and discovered nasty postings in the
alt.binaries.pictures.erotica Usenet hierarchy. A student of Erlangen
University was seized because of spreading child porn via Usenet.
Then, the "Time" article about Internet porn was published and quoted
by nearly every German newspaper.

I think at that time the Task Force planned to investigate the Usenet.
Due to the facts that CIS had become a big ISP and their German office
is located in Munich, CIS seemed to be a worthwhile target. Somehow
the Task Force managed to get a search warrant to investigate the
Munich CIS office on November, 22nd.  However, the search was more or
less like a visit. Let me quote the public prosecutor: CompuServe "was
quite cooperative". "We sat together talking about chances to kick
pornographic contents out of CompuServe's information system." The
police officers just collected a copy of the CompuServe association
contract and the address of the CEO.

Two days later, CompuServe's German managers published that they "will
do anything to support the work of German authorities fighting against
pornography in Cyberspace". On December, 8th, CIS was handled a list
of more than 200 newsgroups by the Task Force. In my opinion,
interpreting the prosecutor and the CIS spokeswoman, this list was
presented to CIS as containing "suspicious newsgroups". In the
attached letter from the prosecutor it is said: "... it is left to
CompuServe to take the necessary steps to avoid possible liabilities
to punishment."

So, if CompuServe should have ever had threats, it could have been
only very small ones. But there is no reason to their German
management to risk anything. CompuServe's approach is not to guarantee
for "freedom of speech and information" but  to make "money".

When i interviewed the prosecutor, it soon became quite clear that his
department had tried to bring CIS to court to get its legal position
checked by some judges. Because of CIS servile tactics they had to
give up their goal.

The ominous list itself shows, how ignorant the members of the Task
Force are about the Usenet. In my opinion, they just sampled all
newsgroups containing words like "sex", "erotic", "gay" and so on and
put the result onto the list.

We have two in depth articles on the whole affair on our web server.
One is an extended version of what i've posted here, the other deals
with the CDA and the actual political and legal situation concerning
the Internet. Unfortunately for US readers, these articles are in
German because we didn't found the time to translate them. But i hope
will can manage this until Monday 8th, 8:00 AM, EST. Then, you should
point your browser to

<http://hamburg.bda.de:800/bda/int/spon/online/excl03.html>

or have a look at our complete online services at

<http://www.spiegel.de>

By the way, SPIEGEL online is the online department of the reputable
German news magazin DER SPIEGEL.


Greetings
Michael
--------------------------------------------------------------
Michael Kunze                          Tel.:+49(0)40-3007-0
Redaktion/editorial staff              Fax :+49(0)40-3007-2986
Spiegel Online
Brandstwiete 19
20457 Hamburg / Germany
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
std. disclaimer: diese Meinung meins, exclusiv und immerdar

------------------------------

Date: 5 Jan 1996 13:40:25 -0500
From: "David Sobel" <sobel@EPIC.ORG>
Subject: File 3--Court Rules in Pentagon Cit

In a case litigated by EPIC staff, the federal appeals court in
Washington, DC, has ordered the U.S. Secret Service to release
information concerning a controversial "hacker" investigation.
The January 2 ruling partially rejected the agency's three-year
attempt to withhold documents concerning the 1992 "Pentagon City
Mall Raid."  In November of that year, a group of young people
affiliated with the computer magazine "2600" were confronted by
mall security personnel, local police officers and several
unidentified individuals in the Virginia shopping mall.  The group
members were ordered to identify themselves and to submit to
searches of their personal property.  Their names were recorded
and some of their property was confiscated.

Computer Professionals for Social Responsibility (CPSR) filed suit
in federal court in early 1993 seeking the release of relevant
Secret Service records under the Freedom of Information Act.  The
litigation of the case has been handled by the Electronic Privacy
Information Center (EPIC).  In July 1994, U.S. District Judge
Louis Oberdorfer ordered the Secret Service to release the vast
majority of documents it maintains on the incident.  The
government appealed that decision to the U.S. Court of Appeals for
the District of Columbia Circuit, which partially affirmed the
lower court decision in the recent ruling.

The appeals court rejected the agency's attempt to invoke a
blanket claim of "source confidentiality" for all information
involving investigations of computer crime, noting that "the
Service offered no evidence that a fear of retaliation by hackers
is sufficiently widespread to justify an inference that sources of
information relating to computer crimes expect their identities
and the information they provide to be kept confidential."  The
court did, however, uphold the agency's claim that information
identifying particular individuals should be withheld from
disclosure.

Additional information, including the text of the appellate
decision, is available at:

        http://www.epic.org/computer_crime/2600/

------------------------------

Date: Thu, 4 Jan 1996 16:39:30 -0800 (PST)
From: Declan McCullagh <declan@EFF.ORG>
Subject: File 4--CDT: Telecom Bill Overview and Proposal Text (FINALLY!)

From:  CDT POLICY POST Number 33                      January 4, 1996

 (1) TEXT OF LATEST VERSION OF THE CDA -- STILL UNCONSTITUTIONAL

 The House/Senate telecommunications reform conference committee has
 released a preliminary draft of the final telecommunications reform bill,
 which includes provisions which would impose broad government regulations
 on constitutionally protected speech online. The text of these provisions
 is attached below.

 The attached version of the CDA contains the changes approved at the
 December 6, 1995 conference committee meeting, where members voted to adopt
 Rep. Rick White's proposal but with significant changes, including a return
 to the unconstitutional "indecency" standard (See CDT Policy Post No. 32,
 12/6/95).

 The conferees have made several important changes to the legislation, none
 of them are particularly favorable to cyberspace-rights advocates. Among
 other things, the latest draft:

 * Relies on the vague and blatantly unconstitutional "indecency"
   standard (Sec 502 (a) - (c))

 * Prohibits sending "indecent" material directly to a minor or making
   indecent material available for display in a manner available to a
   minor (including world wide web pages, ftp sites, or usenet
   newsgroups) (Sec 502 (d)).

 * No longer contains the provision of the Cox/Wyden/White bill
   prohibiting the FCC from imposing content or other regulations on the
   Internet or other interactive media.

 * Contains weaker protections for content providers who label content
   and enable others to block it (e.g., PICS) have been weakened (Sec 502
   (e)(5).

 * Would allow states to impose additional restrictions on non-commercial
   activities such as free-nets, BBS's, and non-profit content providers
   (Sec 502 (h)).

 * Creates a new crime for the solicitation of minors using a computer,
   the US mail, or any other means of interstate or foreign commerce (Sec
   508).

 The full text of the new proposal is attached below.

 CDT believes that this proposal threatens the very existence of the
 Internet as a means for free expression, education, and political
 discourse. The proposal is an unwarranted, unconstitutional intrusion by
 the Federal government into the private lives of all Americans.

 NEXT STEPS: FINAL AGREEMENT NOT YET REACHED, VOTE COULD OCCUR SOON

 As you know, the CDA is part of the massive telecommunications reform
 legislation, which is currently being considered by a House/Senate
 conference committee.

 The conference committee has not reached agreement on several key  issues,
 including whether the FCC should be permitted to regulate the Internet,
 broadcast ownership rules, and other issues. Reps. Rick White, Chris Cox,
 and others are currently fighting to retain the provisions baring the FCC
 from regulating online content. A final vote by the conferees to send the
 bill to the full congress will not occur until an agreement is reached on
 this and other outstanding issues.

 As of Thursday January 4, 1996, the conferees have NOT yet voted to send a
 version of the legislation to the Full House and Senate for a final vote.
 No vote has been scheduled, and House Speaker Newt Gingrich has stated that
 no vote will occur until Congress finishes work on the Budget.

 CDT will continue to fight these provisions, and will work to remove them
 from the final telecommunications bill. We are also preparing to fight this
 issue in court, if necessary.

 WHAT YOU CAN DO TO HELP

 The Voters Telecommunications Watch (VTW) has organized an online coalition
 (of which CDT is a member) against the net-censorship bill. To find out
 what you can do to fight this bill, visit VTW's web page

  URL:http://www.vtw.org/

 Or send email to vtw@vtw.org with 'send alert' in the subject line.

 ==---------------------------------------------------------------------==
 (2) TEXT OF THE PROPOSAL

         TITLE V - BROADCAST OBSCENITY AND VIOLENCE

 Subtitle A - Obscene, Harassing, and Wrongful Utilization of
              Telecommunications Facilities

 SEC. 501. SHORT TITLE.

 This title may be cited as the "Communications Decency Act of 1995".

 SEC. 502. OBSCENE OR HARASSING USE OF TELECOMMUNICATIONS
           FACILITIES UNDER THE COMMUNICATIONS ACT OF 1934.

   Section 223 (47 U.S.C. 223) is amended-

 (1) by striking subsection (a) and inserting in lieu thereof:

 "(a) Whoever ==

 "(1) in interstate or foreign communications-
      "(A) by means of a telecommunications device knowingly-

         "(i) makes, creates, or solicits, and
         "(ii) initiates the transmission of, any comment, request,
  suggestion, proposal, image, or other communication which is obscene,
  lewd, lascivious, filthy, or indecent, with intent to annoy, abuse,
  threaten, or harass an other person;

      "(B) by means of a telecommunications device knowingly-

         "(i) makes, creates, or solicits, and
         "(ii) initiates the transmission of, any comment, request,
  suggestion, proposal, image, or other communication which is obscene
  or indecent knowing that the recipient of the communication is under
  18 years of age regard less of whether the maker of such communication
  placed the call or initiated the communication;

      "(C) makes a telephone call or utilizes a telecommunications
  device, whether or not conversation or communication ensues, without
  disclosing his identity and with intent to annoy, abuse, threaten, or
  harass any person at the called number or who receives the
  communication;

      "(D) makes or causes the telephone of another repeatedly or
  continuously to ring, with intent to harass a person at the called
  number; or

      "(E) makes repeated telephone calls or repeatedly initiates
  communication with a telecommunications device, during which
  conversation or communication ensues, solely to harass any person at
  the called number or who receives the communication;

  "(2) knowingly permits a telecommunications facility under his control
       to be used for any activity prohibited by paragraph (1) with the
       intent that it be used for such activity,

 shall be fined under title 18, United States Code, or imprisoned not more
 than two years, or both."; and

 (2) by adding at the end the following new sub sections:

 "(d) Whoever ==

  "(1) in interstate or foreign communications knowingly-

      "(A) uses an interactive computer service to send to a specific
  person or persons under 18 years of age, or

      "(B) uses any interactive computer service to display in a manner
  available to a person under 18 years of age,

  any comment, request suggestion, proposal, image, or other
  communication that, in context, depicts or describes, in terms patently
  offensive as measured by contemporary community standards, sexual or
  excretory activities or organs, regardless of whether the user of such
  service placed the call or initiated the communication; or

   "(2) knowingly permits any telecommunications facility under such
        person's control to be used for an activity prohibited by
        paragraph (1) with the intent that it be used for such activity,

 shall be fined under title 18, United States Code, or imprisoned not more
 than two years, or both.

  "(e) In addition to any other defenses available by

     "(1) No person shall be held to have violated subsection (a) or (d)
     solely for providing access or connection to or from a facility,
     system, or network not under that person's control, including
     transmission, downloading, intermediate storage, access software, or
     other related capabilities that are incidental to providing such
     access or connection that does not include the creation of the
     content of the communication.

     "(2) The defenses provided by paragraph (1) of this subsection shall
     not be applicable to a person who is a conspirator with an entity
     actively involved in the creation or knowing distribution of
     communications that violate this section, or who knowingly
     advertises the availability of such communications.

     "(3) The defenses provided in paragraph (1) of this subsection shall
     not be applicable to a person who provides access or connection to a
     facility, system, or network engaged in the violation of this
     section that is owned or controlled by such person.

     "(4) No employer shall be held liable under this section for the
     actions of an employee or agent unless the employee's or agent's
     conduct is within the scope of his employment or agency and the
     employer (A) having knowledge of such conduct, authorizes or
     ratifies such conduct, or (B) recklessly disregards such conduct.

     "(5) It is a defense to a prosecution under sub section (a) or (d)
     that a person-

        "(A) has taken in good faith, reasonable, effective, and
      appropriate actions under the circumstances to restrict or prevent
      access by minors to a communication specified in such subsections,
      which may involve any appropriate measures to restrict minors from
      such communications, including any method which is feasible under
      available technology; or

        "(B) has restricted access to such communication by requiring use
      of a verified credit card, debit account, adult access code, or
      adult personal identification number.

     "(6) The Commission may describe measures which are reasonable,
     effective, and appropriate to restrict access to prohibited
     communications under subsection (d). Nothing in this section
     authorizes the Commission to enforce, or is intended to provide the
     Commission with the authority to approve, sanction, or permit, the
     use of such measures. The Commission has no enforcement authority
     over the failure to utilize such measures. The Commission shall not
     endorse specific products relating to such measures. The use of such
     measures shall be admitted as evidence of good faith efforts for
     purposes of this paragraph in any action arising under subsection
     (d). Nothing in this section shall be construed to treat interactive
     computer services as comm. on carriers or telecommunications
     carriers.

  "(f)(1) No cause of action may be brought in any court or
  administrative agency against any person on account of any activity
  that is not in violation of any law punishable by criminal or civil
  penalty, and that the person has taken in good faith to implement a
  defense authorized under this section or otherwise to restrict or
  prevent the transmission of, or access to, a communication specified in
  this section.

  "(2) No State or local government may impose ant liability for
  commercial activities or actions by commercial entities, nonprofit
  libraries, or institutions of higher education in connection with an
  activity or action described in subsection (a)(2) or (d) that is
  inconsistent with the treatment of those activities or actions under
  this section: Provided, however, That nothing herein shall preclude any
  State or local government from enacting and enforcing complementary
  oversight, liability, and regulatory systems, procedures, and
  requirements, so long as such systems, procedures, and requirements
  govern only intrastate services and do not result in the imposition of
  inconsistent rights. duties or obligations on the provision of
  interstate services. nothing in this subsection shall preclude any
  State or local government from governing conduct not covered by this
  section.

  "(g) nothing in subsection (a), (d), (e), or (f) or in the defenses to
  prosecution under (a) or (d) shall be construed to affect or limit the
  application or enforcement of any other Federal law.

  "(h) For purposes of this section-

   "(1) The use of the term 'telecommunications device' in this section-

     "(A) shall not impose new obligations on broadcasting station
     licensees and cable operators covered by obscenity and indecency
     provisions elsewhere in this .Act; and

     "(B) does not include the use of an inter active computer service.

   "(2) The term 'interactive computer service' has the meaning provided in
 section 230(f)(2)

   "(3) The term 'access software' means software (including client or
 server software) or enabling tools that do not create or provide the
 content of the communication but that allow a user to do any one or more of
 the following:

      "(A) filter, screen, allow, or disallow content;
      "(B) pick, choose, analyze, or digest content; or
      "(C) transmit, receive, display, forward, cache, search, subset,
           organize, reorganize, or translate content.

  "(4) The term 'institution of higher education' has the meaning provided
 in section 1201 of the Higher Education Act of 1965 (20 U.S.C. 1141).

  "(5) The term 'library means a library eligible for participation in
 State-based plans for funds under title III of the Library Services and
 Construction Act (20 U.S.C. 355e et seq.).".

 SEC. 503. OBSCENE PROGRAMMING ON CABLE TELEVISION,

   Section 639 (47 U.S.C. 559) is amended by striking "not more than
 $10,000" and inserting "under title 18, United States Code,".

 SEC. 504. SCRAMBLING OF CABLE CHANNELS FOR NONSUBSCRIBERS.

     Part IV of title VI (47 U.S.C. 551 et se-q.) is amended by adding at
 the end the following:

 "SEC. 640. SCRAMBLING OF, CABLE CHANNELS FOR NONSUBSCRIBERS.

     "(a) SUBSCRIBER REQUEST.-Upon request by a cable service subscriber, a
 cable operator shall, without charge, fully- scramble or otherwise fully
 block the audio and video portion of each channel carrying such programming
 so that one not a subscriber does not receive it.

     "(b) DEFINITION.-As used in this section, the term 'scramble' means. to
 rearrange the content of the signal of the programming so that the program
 cannot be viewed or heard in an understandable manner.".

 SEC. 505. SCRAMBLING OF SEXUALLY EXPLICIT ADULT VIDEO SERVICE
           PROGRAMMING.

    (a) REQUIREMENT.-Part IV of title I (47 U.S.C. 551 et seq.), as amended
 by this Act, is further amended by adding at the end the following:

 "SEC. 641. SCRAMBLING OF SEXUALLY EXPLICIT ADULT VIDEO SERVICE
            PROGRAMMING.

    "(a) REQUIREMENT.-In providing sexually explicit adult programming or
 other programming that is indecent on any channel of its service primarily
 dedicated to sexually-oriented programming, a multichannel video
 programming distributor shall fully scramble or otherwise fully block the
 video and audio portion of such channel so that one not a subscriber to
 such channel or programming does not receive it.

    "(b) IMPLEMENTATION.-Until a multichannel video programming distributor
 complies with the requirement set forth in subsection (a), the distributor
 shall limit the access of children to the programming referred to in that
 subsection by not providing such program during the hours of the day (as
 determined by the Commission) when a significant number of children are
 likely to view it.

    "(c) DEFINITION.-As used in this section, the term 'scramble' means to
 rearrange the content of the signal of the programming so that the
 programming cannot be viewed or heard in an understandable manner.".

    "(b) EFFECTIVE DATE.-The amendment made b-y subsection (a) shall take
 effect 30 days after the date of the enactment of this Act.

 SEC. 606. CABLE OPERATOR REFUSAL TO CARRY CERTAIN PROGRAMS.

  (a) PUBLIC, EDUCATION, AND GOVERNMENTAL CHANNELS.-Section 611(e) (47
 U.S.C. 531(e)) is amended by inserting before the period the following: ",
 except a cable operator may refuse to transmit any public access program or
 portion of a public access program which contains obscenity, indecency, or
 nudity".

  (b) CABLE CHANNELS FOR COMMERCIAL USE. Section 612(c)(2) (47 U.S.C.
 532(c)(2)) is amended by striking "an operator" and inserting "a cable
 operator may refuse to transmit any leased access program or portion of a
 leased access program which contains obscenity, indecency, or nudity and".

 SEC. 507. CLARIFICATION OF CURRENT LAWS REGARDING COMMUNICATION OF
           OBSCENE MATERIALS THROUGH THE USE OF COMPUTERS.

  (a) IMPORTATION OR TRANSPORTATION.-Section 1462 of title 18, United States
 Code, is amended-

      (1) in the first undesignated paragraph, by inserting "or
      interactive computer service (as defined in section 230(f)(2) of
      the Communications Act of 1934)" after "carrier"; and

      (2) in the second undesignated paragraph-

        (A) by inserting "or receives," after "takes";

        (B) by inserting "or interactive computer service (as defined in
      section 230(f)(2) of the Communications Act of 1934)" after "common
      carrier"; and

        (C) by inserting "or importation" after "carriage".

  (b) TRANSPORTATION FOR PURPOSES OF SALE OR DISTRIBUTION.-The first
 undesignated paragraph of section 1465 of title 18, United States Code, is
 amended -

      (1) by striking "transports in" and inserting "transports or
      travels in, or uses a facility or means of,";

      (2) by inserting "or an interactive computer service (as defined in
      section '230(f)(2) of the Communications Act of 1934) in or
      affecting such commerce" after "foreign commerce" the first place
      it appears;

      (3) by striking ", or knowingly travels in" and all that follows
      through "obscene material in inter state or foreign commerce," and
      inserting "of".

  (c) INTERPRETATION.-The amendments made by this section are clarifying and
 shall not be interpreted to limit or repeal any prohibition contained in
 sections 1462 and 1465 of title 18, United States Code, before such
 amendment, under the rule established in United States v. Alpers, 338 U.S.
 680 (1950).

 SEC. 508. COERCION AND ENTICEMENT OF MINORS.

 Section 2422 of title 18, United States Code, is amended-

       (1) by inserting "(a)" before "Whoever knowingly"; and

       (2) by adding at. the end the following

   "(b) Whoever, using any facility or means of inter state or foreign
 commerce, including the mail, or within the special maritime and
 territorial jurisdiction of the United States, knowingly persuades,
 induces, entices, or coerces any individual who has not attained the age of
 18 years to engage in prostitution or any sexual act for which     person
 may be criminally prosecuted, or attempts to do so shall be fined under
 this title or imprisoned not more than 10 years, or both.".

 SEC. 509. ONLINE FAMILY EMPOWERMENT.

 Title II of the Communications Act of 1934 (47   U.S.C. 201 et seq.) is
 amended by adding at the end the following new section:

 "SEC. 230. PROTECTION FOR PRIVATE BLOCKING AND SCREENING OF OFFENSIVE
            MATERIAL

  "(a) FINDINGS.-The Congress finds the following:

     "(1) The rapidly developing array of Internet and other interactive
  computer services available to individual Americans represent an
  extraordinary advance in the availability of educational and
  informational resources to our citizens.

     "(2) These services offer users a great degree of control over the
  information that they receive, as well as the potential for even
  greater control in the future as technology develops.

     "(3) The Internet and other interactive computer services offer a
  forum for a true diversity of political discourse, unique opportunities
  for cultural development, and myriad avenues for intellectual activity.

     "(4) The Internet and other interactive computer services have
  flourished, to the benefit of all Americans. with a minimum of
  government regulation.

     "(5) Increasingly Americans are relying on interactive media for a
  variety of political, educational, cultural, and entertainment
  services.

  "(b) POLICY.- It is the policy of the United States-

     "(1) to promote the continued development of the Internet and other
  interactive computer services and other interactive media;

     "(2) to preserve the vibrant and competitive free market that
  presently exists for the Internet and other interactive computer
  services, unfettered by Federal or State regulation;

     "(3) to encourage the development of technologies which maximize
  user control over what in formation is received by individuals,
  families, and schools who use the Internet and other interactive
  computer services;

     "(4) to remove disincentives for the development and utilization of
  blocking and filtering technologies that empower parents to restrict
  their children's access to objectionable or inappropriate online
  material; and

     "(5) to ensure vigorous enforcement of Federal criminal laws to
  deter and punish trafficking in obscenity, stalking, and harassment by-
  means of computer.

  "(c) PROTECTION FOR 'GOOD SAMARITAN BLOCKING AND SCREENING OF OFFENSIVE
   MATERIAL.-

     "(1) TREATMENT OF PUBLISHER OR SPEAKER.-No provider or user of an
  interactive computer service shall be treated as the publisher or
  speaker of any information provided by another information content
  provider.

     "(2) CIVIL LIABILITY.-No provider or user of an interactive computer
  service shall be held liable on account of-

       "(A) any- action voluntarily taken in good faith to restrict
       access to or availability of material that the provider or user
       considers to be obscene, lewd, lascivious, filthy, excessively
       violent, harassing, or otherwise objectionable, whether or not
       such material is constitutionally protected; or

       "(B) any action taken to enable or make available to information
       content providers or others the technical means to restrict access
       to material described in paragraph (1).

  "(d) EFFECT ON OTHER LAWS.-

     "(1) NO EFFECT ON CRIMINAL. LAW.-Nothing in this section shall be
  construed to impair the enforcement of section 223 of this Act, chapter
  71 (relating to obscenity) or 110 (relating to exploitation of
  children) of title 18, United States Code, or any other Federal
  criminal statute.

     "(2) NO EFFECT ON INTELLECTUAL PROPERTY LAW.-Nothing in this section
  shall be construed to limit or expand any law pertaining to
  intellectual property.

     "(3) STATE LAW.-Nothing in this section shall be construed to
  prevent any State from enforcing any State law that is consistent with
  this section. No cause of action may be brought and no liability may be
  imposed under any State or local law that is in consistent with this
  section.

     "(4) NO EFFECT ON COMMUNICATIONS PRIVACY LAW.-Nothing in this
  section shall be construed to limit the application of the Electronic
  Communications Privacy Act of 1986 or any of the amendments made by
  such Act, or any similar State law.

  "(f) DEFINITIONS.-As used in this section:

     "(1) INTERNET.-The term 'Internet' means the international computer
  network of both Federal and non-Federal interoperable packet switched
  data networks.

     "(2) INTERACTIVE COMPUTER SERVICE.-The term 'interactive computer
  service' means an information service, system, or access software
  provider that provides or enables computer access by multiple users to
  a computer server, including specifically a service or system that
  provides access to the Internet and such systems operated or services
  offered by libraries or educational institutions.

    "(3) INFORMATION CONTENT PROVIDER.-The term 'information content
  provider' means any per son or entity that is responsible, in whole or
  in part, for the creation or development of information provided
  through the Internet or any other interactive computer service.

    "(4) ACCESS SOFTWARE PROVIDER.-The term 'access software provider'
  means a provider of software (including client or server software), or
  enabling tools that do any one or more of the following

      "(A) filter, screen, allow, or disallow content;
      "(B) pick, choose, analyze, or digest content; or
      "(C) transmit, receive, display, forward cache, search, subset,
           organize, reorganize, or translate content.".

[Footer info deleted for brevity]

------------------------------

Date: Sun, 16 Dec 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
         In ITALY: ZERO! BBS: +39-11-6507540
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #8.02
************************************