From: edi...@eff.org Subject: EFFector Online 08.14 * Discrediting of Rimm Study Derails Grassley Date: 1995/07/26 Message-ID: <3v70ea$2il@eff.org> X-Deja-AN: 107053031 x-eff_membership_queries_to: members...@eff.org distribution: world approved: edi...@eff.org sender: m...@eff.org followup-to: comp.org.eff.talk,alt.politics.datahighway,misc.legal.computing, alt.privacy,alt.activism.d,alt.society.civil-liberty,alt.society.civil-liberties, alt.bbs.allsysop admin: b...@eff.org errors-to: b...@eff.org summary: 1) Summary of S.892 hearing; 2) Godwin's EFF S.892 testimony organization: Electronic Frontier Foundation x-url: http://www.eff.org/pub/EFF/Newsletters/EFFector/ keywords: EFF,EFFector,activism,activist,Electronic Frontier Foundation, Grassley bill,S.892,S 892,S892,Senator Grassley,Sen. Grassley,Grassley, Mike Godwin,mnemonic,Protection of Children From Computer Pornography Act of 1995 reply-to: edi...@eff.org newsgroups: comp.org.eff.news,comp.org.eff.talk,alt.politics.datahighway, alt.censorship,misc.legal,misc.legal.computing,alt.activism,alt.activism.d, comp.org.cspr.talk,alt.society.civil-liberty,alt.society.civil-liberties, alt.bbs.allsysop x-eff_general_info: i...@eff.org ========================================================================= ________________ _______________ _______________ /_______________/\ /_______________\ /\______________\ \\\\\\\\\\\\\\\\\/ ||||||||||||||||| / //////////////// \\\\\________/\ |||||________\ / /////______\ \\\\\\\\\\\\\/____ |||||||||||||| / ///////////// \\\\\___________/\ ||||| / //// \\\\\\\\\\\\\\\\/ ||||| \//// ========================================================================= EFFector Online Volume 08 No. 14 July 26, 1995 edit...@eff.org A Publication of the Electronic Frontier Foundation ISSN 1062-9424 IN THIS ISSUE: "Cyberporn" Hearing and Exposure of Flaws in Rimm Study EFF's Mike Godwin Testifies Against Grassley Censorship Bill Calendar of Events Quote of the Day What YOU Can Do Administrivia * See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more information on current EFF activities and online activism alerts! * ---------------------------------------------------------------------- Subject: "Cyberporn" Hearing and Exposure of Flaws in Rimm Study ---------------------------------------------------------------- A July 24 hearing chaired by Senator Charles Grassley (R-Iowa) on the issues surrounding children's getting access to so-called "indecent" material on the Internet, did not go exactly as planned for the Senator. In the absence of Sen. Grassley's planned star witness -- a self-styled expert on online pornography named Martin Rimm -- ranking minority member Sen. Patrick Leahy (D-Vermont) effectively controlled the hearing. Grassley's attempt to center his hearing on Rimm's controversial pornography study had backfired. Though the Iowa Senator had termed it the "only comprehensive study dealing with pornography in cyberspace", now, thanks to recent articles discussing the motives and ethics of its undergraduate author, Grassley was forced to disavow it: "Now under criticism, that study is under review as it should be." EFF lawyer Mike Godwin had taken the lead weeks before in coordinating efforts to challenge former CMU student Martin Rimm's "study" of sexually oriented material online and Time magazine's decision to promote it as the basis of a cover story on "cyberporn." Time has been widely criticized for promoting the study without allowing any prior critical review of it by independent experts. Working with EFF interns Beth Noveck and Ben Manevitz, Godwin had arranged for copies of the study to get into the hands of reporters and academics across the country. This in turn had generated press coverage that led both to the discrediting of the Rimm study (which is riddled with methodological flaws and unsupportable conclusions) and to Time magazine's seemingly unprecedented disavowal of its own cover story in a followup article only three weeks later.. "The Rimm affair shows the potential of the Net for both political action and academic inquiry," Godwin said. "A decade ago, the study and its author might have been accepted without question for months, continuing to distort public-policy debates about regulation of the Net." Godwin sought evaluations of the Rimm study from professors Donna Hoffman of Vanderbilt and Jim Thomas of Northern Illinois University, as well of from pioneer Internet researcher Brian Reid of DEC. He also helped ensure that the first critique of the Rimm study, from EFF Policy Fellow David Post, a professor at Georgetown University Law Center, was quickly and widely circulated. In subsequent weeks, Godwin became a clearinghouse of information about the so'called "CMU study" and its controversial author. It is widely believed that the critical response to the Rimm article is what led to Rimm's removal last week from the witness list for the July 24 hearing sponsored by Sen. Grassley, who is sponsoring legislation purportedly aimed at protecting children from so-called "indecent" content online. At the hearing, Sen. Leahy commented that, "he [Rimm] got disinvited when the study that everyone embraced as gospel was a little bit less than that. I would expect any time now to see _Time_ say that even great media can be conned." In point of fact, _Time_ Senior Editor Philip Elmer-Dewitt has essentially done so, in public forums on the WELL, the online service where much of the dirt on the Rimm study was unearthed and examine. "The voice you didn't hear at that hearing," Godwin later said, "was that of would-be star witness Martin Rimm, who may have hoped his study would establish him as the national expert in online pornography." Once Rimm and his questionable study were discredited, Godwin said, "the hearing lost a lot of drama, but it gained a lot of balance." There was still some drama, however. Two women, one a minor, testified that they had been stalked online, and anti-porn lobbyists demanded legislation to "fix" the online porn problem. Sen. Leahy's questioning, however, revealed that the problems are already covered by local, state and federal law. Leahy concluded, of course, that the problem was one of law enforcement resources, not any imaginary gaping holes in the law itself. Sen. Leahy was also had critical words for the majority of his colleagues: "The Senate went in willy-nilly and passed this legislation [the similar Exon/Gorton Comm. Decency Act]. Most senators who voted wouldn't have the foggiest idea of how to get on the Internet." In his turn, journalist Barry Crimmins noted, for whatever reason, that he was a victim of childhood sexual abuse, and warned that America Online, the popular online service, is a den of iniquity: "I am here to tell the American people that not only are their children unsafe on America Online, their children are unsafe because of it." This may have been just a bit too much for even those Senators ready to believe in Internet horror stories. Grassley himself tried to cut Crimmins off to no avail. These antics do not appear to have been enough, fortunately, to turn this hearing into a media circus, or a censors' feeding frenzy, unlike the recent hearing on "violent" materials on the Internet. By and large, sensible testimony ruled the day. Jerry Berman, representing the Center for Democracy and Technology, and the Interactive Working Group (a coaltion of non-profit and industry organizations, including EFF and many others), delivered solid oral testimony, showing the Grassley anti-porn bill to be an unconstitutional attempt to ban protected speech. EFF Staff Counsel Mike Godwin submitted written testimony, which appears below. Also combatting hysterical testimony from anti-porn group Enough is Enough were Michael Hart of the Project Gutenberg electronic library, AOL's general counsel, and the exec. dir. of the Recreational Software Advisory Council. Several important ideas were aired without serious challenge in the hearing, mostly by Sen. Leahy and Sen. Russ Feingold (D-Wisconsin): * The Exon and Grassley legislation is inconsistent with the current Congress' and Administration's expressed goal of "keeping government off our backs" * The legislation is unlikely to solve the problems they purport to solve * The right and responsibility to decide what is and is not appropriate for a child lies with that child's parents * Current law already suffiently covers this area * Software tools and special services will enable individuals to "filter" online content for themselves and their children. * These censorship bills fail to distinguish between obscenity, which is illegal (though defined different in different jurisdictions), and indecency, which is constitutionally protected and subject to regulatory control only under specific and very narrowly defined circumstances. * The legislation would chill speech not only directly, in attacking indecency, but indirectly by, in effect, requiring online services such as Netcom, the WELL, AOL or local BBSs, to become full-time censors, and forcing them to censor anything that *might* conceivably be indecent. Otherwise, they would be in grave danger of prosecution. Sen. Exon attempted to rebuff civil libertarians' concerns by claiming that he is being "viciously attacked", and by repeating tired arguments that such legislation will "protect children." However, we think reason finally prevailed in this debate, and that the time is right to push forward. Please see the "What You Can Do" section of this newsletter. [Thanks to Declan McCullagh for comparing his notes from the hearing with ours.] ------------------------------ Subject: EFF's Mike Godwin Testifies Against Grassley Censorship Bill --------------------------------------------------------------------- Testimony of Mike Godwin Staff Counsel of the Electronic Frontier Foundation (EFF) Regarding The "Protection of Children From Computer Pornography Act of 1995" (S.892) before the Senate Judiciary Committee July 24, 1995 I. The Challenge of a New Medium My name is Mike Godwin, and I am staff counsel for the Electronic Frontier Foundation. I'd like to thank you, Mr. Chairman, on behalf of my organization, the Electronic Frontier Foundation, for allowing EFF to submit testimony concerning the important issues, and significant problems, we believe are raised by S. 892. One of our goals at EFF is to assist policymakers and legislators in developing a framework to understand the legal and social significance of what is, in effect, a wholly new medium -- computer communications. EFF is dedicated to expanding and preserving the democratic potential of this new medium, whose social and political significance may ultimately exceed that of the very first mass medium, the printing press. The issues raised by computer communications transcend partisan politics and require of us all that we stretch our imaginations -- the worst mistake we can make on the threshold of this revolution is to assume that this new medium is, so far as the Constitution and laws of the United States are concerned, essentially the same as broadcasting, or more or less similar to telephony. Computer communications -- and especially those communications that depend on computer networks of national or global reach, raise new problems and questions for lawmakers. At the same time, this medium promises to be the fulfillment of our oldest First Amendment values. But I come here not just as a lawyer who is concerned about the First Amendment. I'm also a father. My little girl will be the first person in my family to have grown up with the Internet. As a parent, I'm deeply concerned with protecting Ariel from bad material and from bad people. And this concern is the other reason for my being here -- I want to help ensure that whatever legislation or policy comes from Congress regarding the Internet will help me as a parent in protecting my little girl, while at the same time ensuring that she's able to benefit fully from access to the Net. While I do want to talk a bit about some of the Constitutional issues raised by S. 892, I don't want to duplicate the thoughtful, thorough analysis submitted to this committee by Jerry Berman of the Center for Democracy and Technology. Instead, I want to focus on giving you a better historical and technical understanding of why computer communications are fundamentally new and different from previous communications media. Now, figuring out the proper legal framework for the Net is tricky. Even if you didn't know anything else about computer communications, you'd know it's tricky from one simple fact: you've got Rush Limbaugh and Newt Gingrich and the ACLU on one side of the issue, and Senators Robert Dole and Dianne Feinstein on the other side. What this tells us, I think, is that one's approach to making policy about computer communications derives less from one's political affiliations than it does from how one sees it in relation to traditional communications media. You see, the more you know about computer networks and the Internet, the clearer it becomes that the these networks are different in several respects from traditional communications media such as print, broadcasting, and the telephone. And these differences, once grasped, entail that top-down, government-centered approaches to protecting children will be ineffective. They also entail that the "least restrictive means" test of First Amendment jurisprudence will lead to different results in this medium from those results we've seen in traditional media, such as telephony. (See, e.g., Sable Communications v. FCC, 1989). We begin with what I promise will be a short history of the Internet. II. The Humble Beginnings In spirit, at least, the Internet--the global "network of networks" that is increasingly the link among commercial online providers, businesses, government, computer bulletin-board systems, and other modes of computer communications -- was conceived 30 years ago by Paul Baran, a RAND Corporation researcher. In a highly theoretical paper, Baran addressed a quintessentially Cold War problem: How could U.S. authorities successfully communicate in the aftermath of a nuclear war? The problem was that traditional communications network designs were vulnerable to strategic attacks. Hubs and main arteries could be destroyed, isolating whole sections of the country. And any central control authority would be a particularly enticing target for a surgical strike. Baran developed a theory of a truly decentralized, "distributed" communications network, with no central authority, and no main hubs or arteries. Any given communication on the network was sliced into what later were called "packets," and each packet was separately addressed, then thrust by the network in the general direction of the communication's destination. Each packet might take a separate route across the network, and some of those routes might involve serious detours (a packet might travel from Chicago to Seattle by way of Texas, for example). If a particular route had been damaged by natural disaster or military attack, a given packet would simply continue trying new routes until it found one that worked. The recipient computer on the far end would collect each packet as it arrived and assemble it in the correct order. This kind of network design probably sounds highly inefficient. That's because it is -- but it is also highly robust, and it turns out to be very difficult to guarantee that you've stopped a given message from reaching its destination. Baran's theoretical design remained just that -- theory -- for several years. Then, in 1969, a group of engineers working for ARPA (the federal government's Advanced Research Projects Agency), actually planted the first seeds of what later became known as the Internet. Although these engineers had never heard of Paul Baran or his paper, they'd brought his theory to fruition anyway. And once the RAND Corporation and other early participants in this network recognized that ARPA had implemented a working version of Baran's concept, they lost no time in playing up the military value of the new network (which turned out to be a plus when seeking appropriations under the constraints of the Mansfield Amendment). At first it was called the ARPAnet -- only later was the term "Internet" coined. The new network grew quickly: in late 1969, there were only four computers on the network, but by 1972 there were 37 sites. By the 1990s, the number of computer sites on the Internet had grown exponentially -- in 1992, Internet sites numbered in the hundreds of thousands; this year they number in the millions. One reason the Internet grew so rapidly is that one doesn't have to construct special wires or conduits to connect to it -- connectivity depend on software standards, and not on hardware. And connecting to the Internet cost the taxpayer little or nothing, since each node was independent, and had to handle its own financing and its own technical requirements. It is no wonder that communications traffic on the Internet has increased 1000 times between January 1988 and October 1994. Also fueling the explosive growth of the Internet was the increasing availability and decreasing price of desktop computers. Any one of the desktop (or even laptop) computers commonly sold today can become part of the Internet. III. Democratic and Economic Opportunities But the cheapness of computing power these days tells only part of the story. The rest lies in the answer to the question of why so many people want to be connected to the Internet. While there are many uses of the Internet -- e-mail, long-distance computing, file transfers, searches of remote databases -- there is no doubt that one of the most compelling reasons people are excited about the Internet is freedom of speech. You see, unlike every other mass medium that has ever existed, the Internet (and similar computer networks) has no central authority. There is no person in charge of the "printing press," no "editor-in-chief," no holder of a broadcast license. Americans have discovered that one can reach a large audience on the Internet without having to assemble a lot of capital or seek the approval of an editor. In this the Internet is similar to the telephone (no one tries to edit your phone conversations while they're happening), but the potential scope of the communications are far greater. While it might take millions of dollars to start on urban newspaper or TV station, it takes only a few hundred dollars to reach large audiences. If, as A.J. Liebling once commented, freedom of the press belongs to those who own one, the Internet suggests that we all may someday own one. In short, the First Amendment's free-press clause, which many citizens still take to be a right reserved to the highly capitalized media establishment, has suddenly become a meaningful right for every individual American. This kind of empowerment of individuals is something new under the sun, and it blurs traditional distinction between "content producers" and "consumers" (everyone on these computer networks can produce "content"). This may blur the line between reporter and reader -- to take only the most recent example: it was an ad-hoc group of individual Internet users who assembled the material that demonstrated the flaws in the Martin Rimm/Carnegie Mellon pornography study that you may have heard about. And while the mainstream media might have taken months to discover the study's flaws, these individuals uncovered them in mere weeks. To touch briefly on some other things that make this medium different: since computer hardware and software are ubiquitous and less expensive all the time, the medium cannot be considered a "scarce" resource in the way the Supreme Court characterized the broadcasting spectrum in Red Lion. And since content is primarily "pulled" by user choices rather than "pushed" by content producers, the medium lacks the "pervasive" character of broadcasting that was central to the Court's decision in the Pacifica case. Finally, the relatively low cost of acquiring access to the Internet means that would-be entrepreneurs face relatively low barriers to entry into this new market. Now that the government no longer plays even a nominal role in administering the Internet, the international network of networks is becoming a playing field for pure capitalism. To start a successful business on the Internet, you don't need to be a millionaire, and you don't need venture capital -- all you need is a good idea. Ill-considered regulation, however, could thwart both the democratic and the economic promise of computer communications. S. 892, with its clear intent to impose new duties and broader legal risks for service providers, would simultaneously chill freedom of speech and distort the market for services by raising barriers to entry. What exacerbates this problem is that a provider's liability for content hinges not on legal obscenity, but on the far broader, far vaguer concept of "indecency," a term imported from the realm of broadcasting regulation whose meaning has never been defined by either Congress or the Supreme Court. And even if the term had been defined, it would be inapplicable to a medium that is neither "scarce" nor "pervasive" in the Constitutional senses of those terms. Our federal government's special role in regulating the content of the broadcast media and of the dial-a-porn services is grounded in particular factual findings about the characteristics of those media. There have been no such findings with regard to computer communications, and, given the nature of the medium as discussed above, it is difficult to see how there could be. Compounding the "chilling effect" this legislation would have on lawful speech is the sheer ineffectiveness of the measure when it comes to willfully illegal communications. Because of the decentralized, "bomb-proof" nature of the Internet, an individual provider's decision to censor certain content may have no effect at all with regard to its general availability. This is especially true when one remembers that an increasing number of Internet sites are operated in foreign countries, and their owners, while theoretically extraditable and prosecutable in the United States, would rarely be meaningfully deterred -- they know that only a very few foreign offenders will ever be pursued by a U.S. attorney. In general, a foreign criminal using computer networks to commit a crime in the United States can dodge both the providers' attempts at monitoring and the law-enforcement agencies' attempts at policing by originating message traffic offshore or by routing illegal information through a chain of intermediate sites that obscures its origin. S. 892 would not even pose a meaningful threat to those who prey on children -- no limit on "indecency" prevents the solicitation of innocent children with nonobscene, nonindecent speech. IV. A Better Approach. As a parent who happens to be a lawyer, I know that federal and state laws already define a framework for the prosecution of those trafficking in obscenity, those who possess or distribute child pornography, and those who prey on children. It is clear that the legal tools are in place, but Senator Grassley's instincts are right when he perceives that there is still a gap in the defense of children that needs to be filled. One thing we know about those who engage in child sexual abuse, for example, is that they are rarely deterred by legal risks -- even in the face of likely prosecution they are driven by their sickness to continue preying on children. And as a parent I can assure you that it is little comfort to me to know that if such an offender harms my child, that person may be caught, prosecuted, and imprisoned at some point -- the damage, which may last a lifetime, has already been done. This is why I believe that the right role for Congress to play is to encourage the development of software filters that prevent my child and others from being harmed in the first place. Recall that the basic technology we're talking about here is the computer -- the most flexible, programmable, "intelligent" technology we build and market. Filtering software enables parents to screen certain language, certain kinds of content, certain people, or certain areas on the networks from their children. Such an approach does no damage to First Amendment values (it does not, for example, put a nonlawyer hobbyist who operates a tiny computer bulletin-board system in the position of having to determine what is "indecent"), yet it does solve the problems (e.g., solicitation through nonindecent communications, or offenders who conceal the origin of their harmful communications) that S. 892 has no hope of addressing. Furthermore, since such tools are designed to be customizable, parents are empowered to set their own standards of what is acceptable for their children, rather than relying on what the nonelected officials at the FCC choose to include under the definition of "indecency." For example, even if the FCC determines that detailed information about safe-sex techniques is not indecent, a parent who believes that her children should receive all their sexual information from her and not from the Internet could customize the family computer's "filters" to block that information. V. Conclusions We already have the laws in place. Federal and state laws prohibit the distribution of obscenity, every state I know of has laws prohibiting the exposure of children to inappropriate or harmful material. Federal and state laws prohibit child porn and child abuse, regardless of the medium used to facilitate it. Speaking as a concerned parent and a lawyer, I believe the question isn't "Do we need more criminal laws?" -- it's "What can we do to supplement the legal framework with policies and tools that empower parents to protect their children and preserve the values of their families?" And answering that question will require the Congress to draft laws and support policies that are grounded not in simplistic analogies to old media, but in a thorough understanding of this new medium and of what makes it different. Members of the committee, you are at a crossroads. Down one road lies a future in which parental rights are supported by a Congress that has abandoned the outdated, big-government approach to solving social problems. Like the parents and children whose letters to you follow my statement here, we hope for a Congress that does not set the First Amendment and welfare of families against eachother, but that instead chooses policies that strengthen both. [end] ******** The letters referred to are available in the archived version of the testimony, at: http://www.eff.org/pub/Alerts/s892_eff_godwin_072495.testimony ftp.eff.org, /pub/Alerts/s892_eff_godwin_072495.testimony gopher.eff.org, 1/Alerts, s892_eff_godwin_072495.testimony ------------------------------ Subject: Calendar of Events --------------------------- This schedule lists EFF events, and those we feel might be of interest to our members. EFF events (those sponsored by us or featuring an EFF speaker) are marked with a "*" instead of a "-" after the date. Simlarly, government events, such as deadlines for comments on reports or testimony submission, are marked with "!" in place of the "-" after the date. If you know of an event of some sort that should be listed here, please send info about it to Stanton McCandlish (m...@eff.org) The latest full version of this calendar, which includes material for later in the year as well as the next couple of months, is available from: ftp: ftp.eff.org, /pub/EFF/calendar.eff gopher: gopher.eff.org, 1/EFF, calendar.eff http://www.eff.org/pub/EFF/calendar.eff Updated: July 26, 1995 * 1995 Aug. 1 - TOOLS '95, Technology of Object-Oriented Languages and Sustems; Santa Barbara, California. Contact: +1 805 685 1006 (voice), +1 805 685 6869 (fax) Email: to...@tools.com Aug. 3- 5 - 4th Annual Conference on Multimedia in Education and Industry; Asheville, North Carolina. Contact: +1 803 737 7440 Email: bi...@ccmail.orst.edu Aug. 4- 6 * DEF CON III; the Tropicana Hotel, Las Vegas, Nevada; "a convention for the "underground" elements of the computer culture...the Hackers, Phreaks, Hammies, Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties Groups, CypherPunks, Futurists, Artists, Etc." Members of the enforcement & security communities are also regularly in attendance. EFF co-founder John Perry Barlow and EFF Online Services Coordinator Selena Sol are featured speakers. Email: dtang...@defcon.org or l...@netsys.com - The Digital Dialectic: A Conference on the Convergence of Technology, Media & Theory; Ahmanson Auditorium, Art Center College of Design, Pasadena, Calif. Panelists include: Robert Stein, Florian Brody, George Landow, Peter Lunenfeld, Lev Manovich, Erkki Huhtamo, Brenda Laurel, Christian Mueller, William J. Mitchell, N. Katherine Hayles, Michael Heim, Carol Gigliotti. This is a free event, attendance limited to 423. Event scheduled for just before SIGGRAPH. Contact: +1 818 568 4710 (voice), +1 818 795 0819 (fax) Email: pet...@artcenter.edu Aug. 4- 9 - Seminar on Academic Computing '95: Tough Choices, Radical Opportunities; Snowmass Village, Colorado. Email: br...@ccmail.orst.edu WWW: http://www.princeton.edu/~sac/ Aug. 6- 11 - SIGGRAPH '95 - International Conference on Computer Graphics and Interactive Techniques; Los Angeles, Calif.; sponsored by the Assoc. for Computing Machinery. See also Digital Dialectic, Aug. 4-6. Email: siggrap...@siggraph.org Aug. 8- 9 *! US NII Advisory Council meeting; Seattle, Wash. Open to the public; members of this civilian council include EFF board members Esther Dyson and David Johnson. Contact: +1 212 482 1835 (voice) Aug. 8- 11 - Rural Cellular Association; Las Vegas, Nevada. Contact: +1 800 722 1872 (voice) Aug. 9- 11 - 11th Annual Conferenceon Distance Teaching and Learning; Madison, Wisconsin. Contact: +1 800 462 0876, +1 608 262 2061 http://epd222.engr.wisc.edu/disted/distED.html Aug. 10- 12 - Tenth Annual Conference on Computing and Philosophy (CAP); Pittsburgh, Philadelphia. Contact: +1 412 268 7643 (voice) Email: r...@andrew.cmu.edu Aug. 12 - Electronic Frontiers Houston Free Cryptography Workshop: How to Use PGP; South Coast Computing offices, 1811 Bering St., Ste. 100, Houston, Texas. Contact: +1 713 799 1044 Email: e...@efh.org URL: http://www.efh.org/ Aug. 13- 15 - Hot Chips Symposium VII, a Symposium on High-Performace Chips; Stanford University, Stanford, California. Sponsored by IEEE Computer Society Technical Committee on Microprocessors. http://dice.scu.edu/HotChips or http:/www.hot.org/hotchips Contact: +1 415 941 6699 (voice) Email: r.stew...@hot.org Aug. 13- 16 - Conference on Organizational Computing Systems (COOCS'95); Silicon Valley Sheraton, Milpitas, Calif.; sponsored by the Assoc. of Computing Machinery. Contact: +1 408 456 7667 (voice), +1 408 456 7050 (fax) Email: kswen...@ossi.com Aug. 14- 18 - Computers in Context: Joining Forces in Design; Aarhus, Denmark. Contact: Computers in Context, Aarhus University, Dept. of Computer Science, Bldg. 540, Ny Munkegade 116, DK-8000 Aarhus C, Denmark. Aug. 16- 19 - Libraries of the Future - IFLA; Istanbul, Turkey. Email: mkutu...@servis.net.tr - AI-ED'95: 7th World Conference on Artificial Intelligence in Education. Washington, DC. Sponsor: The Association for the Advancement of Computing in Education Contact: +1 804 973 3987 (voice) Email: a...@virginia.edu Aug. 16- 20 - ONE BBSCon '95; Tampa Conv. Ctr., Tampa, Florida Largest BBS sysop/user convention in the world Contact: +1 303 693 5253 (voice) Aug. 18 - Registration deadline for Challenging Marketplace Solutions to Problems in the Economics of Information (see Sep. 18 below). Aug. 18- 20 - National Independent Politics Summit; Pittsburgh, Penn. Aug. 19- 23 - Telecommunities '95, International Community Networking Conference and Annual General Meeting of Telecommunities Canada; University of Victoria, Victoria, British Columbia, Canada. Contact: +1 604 721 8746 (voice), +1 604 721 8774 (fax) Aug. 21- 23 * Progress and Freedom Foundation Conference; Aspen, Colorado. Speakers include EFF boardmembers Esther Dyson, Steward Brand and John Perry Barlow. Contact: +1 202 484 2312 - WebEdge II, the Second Macintosh World Wide Web Developers' Conference; Austin, TX. Contact: +! 512 326 8307 Email: m...@webedge.com http://www.webedge.com Aug. 21- 24 - 4th International Conference on Image Management and Communication (IMAC 95); Hawaii. Contact: +1 202 687 7955 (voice), +1 202 784 3479 http://www.imac.georgetown.edu go to ISIS Homepage Aug. 21- 24 - 12th International Conference on Computer Communication; Seoul, Korea. Advance registration deadline: July 25 Contact: +82 2 588 9246 (voice), +82 2 521 1352 (fax) Email: icc-...@krnic.net Aug. 21- 25 - KnowRight '95, International Congress on Intellectual Property Rights for Specialized INformation, Knowledge and New Technoligies; Vienna, Austria. Contact: +43 1 5120235 (voice), +43 1 5120235 9 (fax) Email: o...@vm.univie.ac.at Aug. 22 - National Association of Telecommunications Officers and Advisers Annual Meeting; Assistant Sec. of Commerce Larry Irving scheduled to speak. Albuquerqu, NM. Aug. 25 - 9th Congressional District Telecommunications Conference (sponsored by US Congressman Rick Boucher); Roanoke, Virginia. Assistant Sec. of Commerce Larry Irving scheduled to speak. Aug. 28- 29 - 1995 CAUSE/CNI Midwest Regional Conference; Northwestern University, Evanston, Illinois. Contact: +1 202 296 5098 (voice), +1 202 872 0884 (fax) Email: p...@cni.org http://www.cni.org/CNI.homepage.html Aug. 28- Sep. 1 - ACM SIGCOMM 1995, Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications; Cambridge, Massachusetts. Contact: +1 908 582 3384 (voice), +1 908 582 5857 (fax) Email: kes...@research.att.com URL: http://www.acm.org/sigcomm/sigcomm95/ ------------------------------ Subject: Quote of the Day ------------------------- "Censorship is the strongest drive in human nature; sex is a weak second." - Phil Kerby Find yourself wondering if your privacy and freedom of speech are safe when bills to censor the Internet are swimming about in a sea of of surveillance legislation and anti-terrorism hysteria? Worried that in the rush to make us secure from ourselves that our government representatives may deprive us of our essential civil liberties? Concerned that legislative efforts nominally to "protect children" will actually censor all communications down to only content suitable for the playground? Join EFF! Even if you don't live in the U.S., the anti-Internet hysteria will soon be visiting a legislative body near you. If it hasn't already. ------------------------------ Subject: What YOU Can Do ------------------------ * The Communications Decency Act & Other Censorship Legislation The Communications Decency Act and similar legislation pose serious threats to freedom of expression online, and to the livelihoods of system operators. The legislation also undermines several crucial privacy protections. Business/industry persons concerned should alert their corporate govt. affairs office and/or legal counsel. Everyone should write to their own Representatives and ask them to support Rep. Klink's alternative legislation, already folded into the House telecom reform bill, and ask their legislators to oppose any efforts to remove the Klink language from the bill and replace it with the CDA or similar censorship legislation. Explain, quickly and clearly, why the CDA is dangerous, and urge efforts to prevent its introduction in any form. For more information on what you can do to help stop this and other dangerous legislation, see: ftp.eff.org, /pub/Alerts/ gopher.eff.org, 1/Alerts http://www.eff.org/pub/Alerts/ If you do not have full internet access, send your request for information to a...@eff.org. * The Anti-Electronic Racketeering Act This bill is unlikely to pass in any form, being very poorly drafted, and without much support. However, the CDA is just as bad and passed with flying colors [the jolly roger?] in the Senate. It's better to be safe than sorry. If you have a few moments to spare, writing to, faxing, or calling your Congresspersons to urge opposition to this bill is a good idea. If you only have time to do limited activism, please concentrate on the CDA instead. That legislation is far more imminent that the AERA. * Find Out Who Your Congresspersons Are Writing letters to, faxing, and phoning your representatives in Congress is one very important strategy of activism, and an essential way of making sure YOUR voice is heard on vital issues. EFF has lists of the Senate and House with contact information, as well as lists of Congressional committees. (A House list is included in this issue of EFFector). These lists are available at: ftp.eff.org, /pub/Activism/Congress_cmtes/ gopher.eff.org, 1/EFF/Issues/Activism/Congress_cmtes http://www.eff.org/pub/Activism/Congress_cmtes/ The full Senate and House lists are senate.list and hr.list, respectively. Those not in the U.S. should seek out similar information about their own legislative bodies. EFF will be happy to archive any such information provided. If you are having difficulty determining who your Representatives are, try contacting your local League of Women Voters, who maintain a great deal of legislative information. * Join EFF! You *know* privacy, freedom of speech and ability to make your voice heard in government are important. You have probably participated in our online campaigns and forums. Have you become a member of EFF yet? The best way to protect your online rights is to be fully informed and to make your opinions heard. EFF members are informed and are making a difference. Join EFF today! For EFF membership info, send queries to members...@eff.org, or send any message to i...@eff.org for basic EFF info, and a membership form. ------------------------------ Administrivia ============= EFFector Online is published by: The Electronic Frontier Foundation 1667 K St. NW, Suite 801 Washington DC 20006-1605 USA +1 202 861 7700 (voice) +1 202 861 1258 (fax) +1 202 861 1223 (BBS - 16.8k ZyXEL) +1 202 861 1224 (BBS - 14.4k V.32bis) Membership & donations: members...@eff.org Legal services: sste...@eff.org Hardcopy publications: p...@eff.org General EFF, legal, policy or online resources queries: a...@eff.org Editor: Stanton McCandlish, Online Services Mgr./Activist/Archivist (m...@eff.org) This newsletter printed on 100% recycled electrons. Reproduction of this publication in electronic media is encouraged. Signed articles do not necessarily represent the views of EFF. To reproduce signed articles individually, please contact the authors for their express permission. Press releases and EFF announcements may be reproduced individ- ually at will. To subscribe to EFFector via email, send message body of "subscribe effector-online" (without the "quotes") to lists...@eff.org, which will add you to a subscription list for EFFector. Back issues are available at: ftp.eff.org, /pub/EFF/Newsletters/EFFector/ gopher.eff.org, 1/EFF/Newsletters/EFFector http://www.eff.org/pub/EFF/Newsletters/EFFector/ To get the latest issue, send any message to effector-reflec...@eff.org (or e...@eff.org), and it will be mailed to you automagically. You can also get the file "current" from the EFFector directory at the above sites at any time for a copy of the current issue. HTML editions available at: http://www.eff.org/pub/EFF/Newsletters/EFFector/HTML/ at EFFweb. HTML editions of the current issue sometimes take a day or longer to prepare. ------------------------------ End of EFFector Online v08 #14 Digest ************************************* $$ -- <A HREF="http://www.eff.org/~mech/"> Stanton McCandlish </A><HR><A HREF="mailto:m...@eff.org"> m...@eff.org </A><P><A HREF="http://www.eff.org/"> Electronic Frontier Foundation </A><P><A HREF="http://www.eff.org/1.html"> Online Services Mgr. </A>