About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Fed Court Rules Communications Decency Act Unconst


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Computer underground Digest Wed Jun 12, 1996 Volume 8 : Issue 44
ISSN 1004-042X

Editor: Jim Thomas ([email protected])
News Editor: Gordon Meyer ([email protected])
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.44 (Wed, Jun 12, 1996)

File 1--Fed Court Rules Communications Decency Act Unconstitutional
File 2--Excerpts from the CDA Decision (re 96-963)
File 3--Cu Digest Header Info (unchanged since 7 Apr, 1996)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Wed, 12 Jun 1996 08:55:37 -0700
From: [email protected]
Subject: File 1--Fed Court Rules Communications Decency Act Unconstitutional

EFFector Online Volume 09 No. 08 June 12 1996 [email protected]
A Publication of the Electronic Frontier Foundation ISSN 1062-9424

------------------------------------------------

Groups challenging the law prepare for government appeal to the Supreme Court

Electronic Frontier Foundation
PRESS RELEASE

Contacts: Stanton McCandlish, Online Activist, +1 415 436 9333
Mike Godwin, Staff Counsel, +1 510 548 3290
Shari Steele, Staff Counsel, +1 301 375 8856

Philadelphia -- "Just as the strength of the Internet is chaos, so the
strength of our liberty depends upon the chaos and cacophony of the
unfettered speech the First Amendment protects."

With these ringing words, a Philadelphia federal court has struck down a law
today that would have criminalized constitutionally protected speech on the
Internet and other online forums.

In what civil libertarians are hailing as a victory for everyone who uses
computer communications, a three-judge panel in Philadelphia's federal
court ruled in a unanimous decision that the controversial
"Communications Decency Act" (CDA) violates the U.S. constitutional
guarantees of freedom of speech and of the press.

"First of all, are pleased to see the court vindicate our vision of the Net
as a medium protected by the First Amendment," said Lori Fena, executive
director of the Electronic Frontier Foundation (EFF), watchdog group
established to protect civil liberties, and promote responsibility, in
computer communications. "Secondly, we are delighted that the court has gone
beyond striking down the law, and has stated positively what constitutional
principles must govern any attempt to regulate the most democratic mass
medium the world has ever seen."

Said EFF Chairman Esther Dyson: "This is a day for individual citizens, for
families, and for public and private organizations online to celebrate."

"The judges recognized that CDA was a wholly inappropriate exercise of
governmental power under the Constitution," said Mike Godwin, EFF staff
counsel. "The law would have abridged one of the freedoms that Americans
treasure most, and a freedom that is central to any democratic society," he
said.

Godwin applauded the members of the coalition that challenged the law in
federal court. "We and the other plaintiffs persuaded them that the
government cannot constitutionally impose this sort of overreaching, and
duplicative regulation of content in the online world," Godwin said.

Dyson stated that the decision stands for one of EFF's principal positions
regarding free speech online: "We believe in free speech at the source -- and
in the empowerment of any audience for that speech to control what they see.

"This decision takes the responsibility for controlling and accessing speech
on the Net out of the hands of government and puts it back in the hands of
parents and other individuals where it belongs," she said. "Individuals
already have the technical means to make their own choices about what they
and their children read and see," Dyson said.

Godwin noted that existing anti-obscenity laws, together with low-cost
technological solutions, offer a more efficient, less intrusive answer to
questions about protecting children in the online world.

"The government kept saying that this was a crisis that required harsher
censorship in the online world than in any other communications medium,"
Godwin said. "In fact, we showed that it's possible to promote both freedom
of speech and family values -- that the two goals don't oppose each other."

While the plaintiffs are pleased with the victory, Fena said, "it's no time
to be complacent." A collection of poorly drafted state laws has followed in
the wake of the passage of the CDA, and the issues these statutes raise must
be addressed as well, she said.

"What's as compelling as the language of this decision," Godwin said, "is the
breadth of the opposition to this legislation," He noted that two large
groups of plaintiffs, including EFF, the American Civil Liberties Union, the
Electronic Privacy Information Center, People for the American Way, the
American Library Association, Microsoft, and Apple Computer, had challenged
the recently passed law in Philadelphia's federal court. Even Administration
officials have privately and publicly voiced their concerns. The plaintiffs
must now prepare for the government's planned appeal to the United States
Supreme Court, Godwin said, citing a provision of the Telecommunications
Reform Act of 1996, which prescribes such a direct appeal when a provision of
the telecom act is found unconstitutional in a lower court..

Godwin also commented that "this may be the most rapidly distributed federal
court opinion in American history." Sites all over the over the Net would be
carrying the full text of the opinion almost as soon as the judges hand it
down, he said, noting that the court is providing copies of the opinion on
computer diskettes as well as through more traditional means.

The constitutional challenge to the Communications Decency Act has been
grounded in four basic arguments -- that the law is unconstitutionally
overbroad (criminalizing protected speech), that it is unconstitutionally
vague (making it difficult for individuals and organizations to comply),
that it fails what the judiciary calls the "least restrictive means" test for
speech regulation, and that there is no basic constitutional authority under
the First Amendment to engage in this type of content regulation in any
nonbroadcast medium.

"We are confident the Supreme Court will uphold the Philadelphia court's
decision," Godwin said.

To reach EFF board chairman Esther Dyson or executive director Lori Fena,
please contact EFF's main office at +1 415 436 9333.

------------------------------

Date: Wed, 12 Jun 1996 16:23:28 -0500
From: [email protected](Computer underground Digest)
Subject: File 2--Excerpts from the CDA Decision (re 96-963)

((MODERATORS' NOTE: The following are a few excerpts from the CDA
decision. The complete text is about a quarter of a meg and over
4,400 lines. It was provided by the Center for Democracy and
Technology. For complete information on the Congressional Decency
Act (CDA) (including the full decision text) contact the CDT homepage at:
http://www.cdt.org

The full text can also be found on CuD's homepage at:
http://www.soci.niu.edu/~cudigest/cda/cdadec1))

=========================================

IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF PENNSYLVANIA

AMERICAN CIVIL LIBERTIES UNION, : CIVIL ACTION
et al., :
:
v. :
:
JANET RENO, Attorney General of :
the United States : No. 96-963

_____________________________________________________________

AMERICAN LIBRARY ASSOCIATION, : CIVIL ACTION
INC., et al., :
:
v. :
:
UNITED STATES DEP'T OF JUSTICE, :
et al. : No. 96-1458


Before: Sloviter, Chief Judge, United States Court of Appeals
for the Third Circuit; Buckwalter and Dalzell, Judges,
United States District Court for the Eastern District
of Pennsylvania

June 11, 1996

ADJUDICATION ON MOTIONS FOR PRELIMINARY INJUNCTION

<snip>

The parties were afforded expedited discovery in
connection with the motions for preliminary injunction, and they
cooperated with Judge Dalzell, who had been assigned the case
management aspects of the litigation. While the discovery was
proceeding, and with the agreement of the parties, the court
began receiving evidence at the consolidated hearings which were
conducted on March 21 and 22, and April 1, 12 and 15, 1996. In
order to expedite the proceedings, the parties worked closely
with Judge Dalzell and arranged to stipulate to many of the
underlying facts and to place much of their cases in chief before
the court by sworn declarations, so that the hearings were
largely devoted to cross-examination of certain of the witnesses
whose declarations had been filed. The parties submitted
proposed findings of fact and post-hearing memoranda on April 29,
and the court heard extensive oral argument on May 10, 1996.[4]

..................

II.
FINDINGS OF FACT
All parties agree that in order to apprehend the legal
questions at issue in these cases, it is necessary to have a
clear understanding of the exponentially growing, worldwide
medium that is the Internet, which presents unique issues
relating to the application of First Amendment jurisprudence and
due process requirements to this new and evolving method of
communication. For this reason all parties insisted on having
extensive evidentiary hearings before the three-judge court.
The court's Findings of fact are made pursuant to Fed. R. Civ. P.
52(a). The history and basic technology of this medium are not
in dispute, and the first forty-eight paragraphs of the following
Findings of fact are derived from the like-numbered paragraphs of
a stipulation[8] the parties filed with the court.[9]
The Nature of Cyberspace
The Creation of the Internet and the Development of Cyberspace
1. The Internet is not a physical or tangible entity,
but rather a giant network which interconnects innumerable
smaller groups of linked computer networks. It is thus a network
of networks. This is best understood if one considers what a
linked group of computers -- referred to here as a "network" --
is, and what it does. Small networks are now ubiquitous (and are
often called "local area networks"). For example, in many United
States Courthouses, computers are linked to each other for the
purpose of exchanging files and messages (and to share equipment
such as printers). These are networks.
2. Some networks are "closed" networks, not linked to
other computers or networks. Many networks, however, are
connected to other networks, which are in turn connected to other
networks in a manner which permits each computer in any network
to communicate with computers on any other network in the system.
This global Web of linked networks and computers is referred to
as the Internet.
3. The nature of the Internet is such that it is very
difficult, if not impossible, to determine its size at a given
moment. It is indisputable, however, that the Internet has
experienced extraordinary growth in recent years. In 1981, fewer
than 300 computers were linked to the Internet, and by 1989, the
number stood at fewer than 90,000 computers. By 1993, over
1,000,000 computers were linked. Today, over 9,400,000 host
computers worldwide, of which approximately 60 percent located
within the United States, are estimated to be linked to the
Internet. This count does not include the personal computers
people use to access the Internet using modems. In all,
reasonable estimates are that as many as 40 million people around
the world can and do access the enormously flexible communication
Internet medium. That figure is expected to grow to 200 million
Internet users by the year 1999.
4. Some of the computers and computer networks that
make up the Internet are owned by governmental and public
institutions, some are owned by non-profit organizations, and
some are privately owned. The resulting whole is a
decentralized, global medium of communications -- or "cyberspace"
-- that links people, institutions, corporations, and governments
around the world. The Internet is an international system. This
communications medium allows any of the literally tens of
millions of people with access to the Internet to exchange
information. These communications can occur almost
instantaneously, and can be directed either to specific
individuals, to a broader group of people interested in a
particular subject, or to the world as a whole.
5. The Internet had its origins in 1969 as an
experimental project of the Advanced Research Project Agency
("ARPA"), and was called ARPANET. This network linked computers
and computer networks owned by the military, defense contractors,
and university laboratories conducting defense-related research.
The network later allowed researchers across the country to
access directly and to use extremely powerful supercomputers
located at a few key universities and laboratories. As it
evolved far beyond its research origins in the United States to
encompass universities, corporations, and people around the
world, the ARPANET came to be called the "DARPA Internet," and
finally just the "Internet."
6. From its inception, the network was designed to be
a decentralized, self-maintaining series of redundant links
between computers and computer networks, capable of rapidly
transmitting communications without direct human involvement or
control, and with the automatic ability to re-route
communications if one or more individual links were damaged or
otherwise unavailable. Among other goals, this redundant system
of linked computers was designed to allow vital research and
communications to continue even if portions of the network were
damaged, say, in a war.
7. To achieve this resilient nationwide (and
ultimately global) communications medium, the ARPANET encouraged
the creation of multiple links to and from each computer (or
computer network) on the network. Thus, a computer located in
Washington, D.C., might be linked (usually using dedicated
telephone lines) to other computers in neighboring states or on
the Eastern seaboard. Each of those computers could in turn be
linked to other computers, which themselves would be linked to
other computers.
8. A communication sent over this redundant series of
linked computers could travel any of a number of routes to its
destination. Thus, a message sent from a computer in Washington,
D.C., to a computer in Palo Alto, California, might first be sent
to a computer in Philadelphia, and then be forwarded to a
computer in Pittsburgh, and then to Chicago, Denver, and Salt
Lake City, before finally reaching Palo Alto. If the message
could not travel along that path (because of military attack,
simple technical malfunction, or other reason), the message would
automatically (without human intervention or even knowledge) be
re-routed, perhaps, from Washington, D.C. to Richmond, and then
to Atlanta, New Orleans, Dallas, Albuquerque, Los Angeles, and
finally to Palo Alto. This type of transmission, and re-routing,
would likely occur in a matter of seconds.
9. Messages between computers on the Internet do not
necessarily travel entirely along the same path. The Internet
uses "packet switching" communication protocols that allow
individual messages to be subdivided into smaller "packets" that
are then sent independently to the destination, and are then
automatically reassembled by the receiving computer. While all
packets of a given message often travel along the same path to
the destination, if computers along the route become overloaded,
then packets can be re-routed to less loaded computers.
10. At the same time that ARPANET was maturing (it
subsequently ceased to exist), similar networks developed to link
universities, research facilities, businesses, and individuals
around the world. These other formal or loose networks included
BITNET, CSNET, FIDONET, and USENET. Eventually, each of these
networks (many of which overlapped) were themselves linked
together, allowing users of any computers linked to any one of
the networks to transmit communications to users of computers on
other networks. It is this series of linked networks (themselves
linking computers and computer networks) that is today commonly
known as the Internet.
11. No single entity -- academic, corporate,
governmental, or non-profit -- administers the Internet. It
exists and functions as a result of the fact that hundreds of
thousands of separate operators of computers and computer
networks independently decided to use common data transfer
protocols to exchange communications and information with other
computers (which in turn exchange communications and information
with still other computers). There is no centralized storage
location, control point, or communications channel for the
Internet, and it would not be technically feasible for a single
entity to control all of the information conveyed on the
Internet.

<snip>

Restricting Access to Unwanted On-Line Material[12]

PICS
49. With the rapid growth of the Internet, the
increasing popularity of the Web, and the existence of material
online that some parents may consider inappropriate for their
children, various entities have begun to build systems intended
to enable parents to control the material which comes into their
homes and may be accessible to their children. The World Wide
Web Consortium launched the PICS ("Platform for Internet Content
Selection") program in order to develop technical standards that
would support parents' ability to filter and screen material that
their children see on the Web.
50. The Consortium intends that PICS will provide the
ability for third parties, as well as individual content
providers, to rate content on the Internet in a variety of ways.
When fully implemented, PICS-compatible World Wide Web browsers,
Usenet News Group readers, and other Internet applications, will
provide parents the ability to choose from a variety of rating
services, or a combination of services.
51. PICS working group [PICS-WG] participants include
many of the major online services providers, commercial internet
access providers, hardware and software companies, major internet
content providers, and consumer organizations. Among active
participants in the PICS effort are:

Adobe Systems, Inc.
Apple Computer
America Online
AT&T
Center for Democracy and Technology
CompuServe
Delphi Internet Services
Digital Equipment Corporation
IBM
First floor
First Virtual Holdings Incorporated
France Telecom
FTP Software
Industrial Technology Research Institute of Taiwan
Information Technology Association of America
Institut National de Recherche en Informatique et
en Automatique (INRIA)
Interactive Services Association
MCI
Microsoft
MIT/LCS/World Wide Web Consortium
NCD
NEC
Netscape Communications Corporation
NewView
O'Reilly and Associates
Open Market
Prodigy Services Company
Progressive Networks
Providence Systems/Parental Guidance
Recreational Software Advisory Council
SafeSurf
SoftQuad, Inc.
Songline Studios
Spyglass
SurfWatch Software
Telequip Corp.
Time Warner Pathfinder
Viacom Nickelodeon[13]

52. Membership in the PICS-WG includes a broad cross-
section of companies from the computer, communications, and
content industries, as well as trade associations and public
interest groups. PICS technical specifications have been agreed
to, allowing the Internet community to begin to deploy products
and services based on the PICS-standards.
53. Until a majority of sites on the Internet have
been rated by a PICS rating service, PICS will initially function
as a "positive" ratings system in which only those sites that
have been rated will be displayed using PICS compatible software.
In other words, PICS will initially function as a site inclusion
list rather than a site exclusion list. The default
configuration for a PICS compatible Internet application will be
to block access to all sites which have not been rated by a PICS
rating service, while allowing access to sites which have a PICS
rating for appropriate content.[14]

Software
54. For over a year, various companies have marketed
stand alone software that is intended to enable parents and other
adults to limit the Internet access of children. Examples of
such software include: Cyber Patrol, CYBERsitter, The Internet
Filter, Net Nanny, Parental Guidance, SurfWatch, Netscape Proxy
Server, and WebTrack. The market for this type of software is
growing, and there is increasing competition among software
providers to provide products.

Cyber Patrol
55. As more people, particularly children, began to
use the Internet, Microsystems Software, Inc. decided to develop
and market Internet software intended to empower parents to
exercise individual choice over what material their children
could access. Microsystems' stated intent is to develop a
product which would give parents comfort that their children can
reap the benefits of the Internet while shielding them from
objectionable or otherwise inappropriate materials based on the
parents' own particular tastes and values. Microsystems'
product, Cyber Patrol, was developed to address this need.
56. Cyber Patrol was first introduced in August 1995,
and is currently available in Windows and Macintosh versions.
Cyber Patrol works with both direct Internet Access providers
(ISPs, e.g., Netcom, PSI, UUnet), and Commercial Online Service
Providers (e.g., America Online, Compuserv, Prodigy, Microsoft).
Cyber Patrol is also compatible with all major World Wide Web
browsers on the market (e.g., Netscape, Navigator, Mosaic,
Prodigy's Legacy and Skimmer browsers, America Online, Netcom's
NetCruiser, etc.). Cyber Patrol was the first parental
empowerment application to be compatible with the PICS standard.
In February of 1996, Microsystems put the first PICS ratings
server on the Internet.
57. The CyberNOT list contains approximately 7000
sites in twelve categories. The software is designed to enable
parents to selectively block access to any or all of the twelve
CyberNOT categories simply by checking boxes in the Cyber Patrol
Headquarters (the Cyber Patrol program manager). These
categories are:
Violence/Profanity: Extreme cruelty, physical or
emotional acts against any animal or person which are
primarily intended to hurt or inflict pain. Obscene
words, phrases, and profanity defined as text that uses
George Carlin's seven censored words more often than
once every fifty messages or pages.

Partial Nudity: Full or partial exposure of the human
anatomy except when exposing genitalia.

Nudity: Any exposure of the human genitalia.

Sexual Acts (graphic or text): Pictures or text
exposing anyone or anything involved in explicit sexual
acts and lewd and lascivious behavior, including
masturbation, copulation, pedophilia, intimacy and
involving nude or partially nude people in
heterosexual, bisexual, lesbian or homosexual
encounters. Also includes phone sex ads, dating
services, adult personals, CD-ROM and videos.

Gross Depictions (graphic or text): Pictures or
descriptive text of anyone or anything which are
crudely vulgar, deficient in civility or behavior, or
showing scatological impropriety. Includes such
depictions as maiming, bloody figures, indecent
depiction of bodily functions.

Racism/Ethnic Impropriety: Prejudice or discrimination
against any race or ethnic culture. Ethnic or racist
jokes and slurs. Any text that elevates one race over
another.

Satanic/Cult: Worship of the devil; affinity for evil,
wickedness. Sects or groups that potentially coerce
individuals to grow, and keep, membership.

Drugs/Drug Culture: Topics dealing with the use of
illegal drugs for entertainment. This would exclude
current illegal drugs used for medicinal purposes
(e.g., drugs used to treat victims of AIDS). Includes
substances used for other than their primary purpose to
alter the individual's state of mind such as glue
sniffing.

Militant/Extremist: Extremely aggressive and combative
behaviors, radicalism, advocacy of extreme political
measures. Topics include extreme political groups that
advocate violence as a means to achieve their goal.

Gambling: Of or relating to lotteries, casinos,
betting, numbers games, on-line sports or financial
betting including non-monetary dares.

Questionable/Illegal: Material or activities of a
dubious nature which may be illegal in any or all
jurisdictions, such as illegal business schemes, chain
letters, software piracy, and copyright infringement.

Alcohol, Beer & Wine: Material pertaining to the sale
or consumption of alcoholic beverages. Also includes
sites and information relating to tobacco products.

58. Microsystems employs people to search the Internet
for sites containing material in these categories. Since new
sites are constantly coming online, Microsystems updates the
CyberNOT list on a weekly basis. Once installed on the home PC,
the copy of Cyber Patrol receives automatic updates to the
CyberNOT list over the Internet every seven days.
59. In February of 1996, Microsystems signed a
licensing arrangement with CompuServe, one of the leading
commercial online services with over 4.3 million subscribers.
CompuServe provides Cyber Patrol free of charge to its
subscribers. Microsystems the same month signed a licensing
arrangement with Prodigy, another leading commercial online
service with over 1.4 million subscribers. Prodigy will provide
Cyber Patrol free of charge of its subscribers.
60. Cyber Patrol is also available directly from
Microsystems for $49.95, which includes a six month subscription
to the CyberNOT blocked sites list (updated automatically once
every seven days). After six months, parents can receive six
months of additional updates for $19.95, or twelve months for
$29.95. Cyber Patrol Home Edition, a limited version of Cyber
Patrol, is available free of charge on the Internet. To obtain
either version, parents download a seven day demonstration
version of the full Cyber Patrol product from the Microsystems
Internet World Wide Web Server. At the end of the seven day
trial period, users are offered the opportunity to purchase the
complete version of Cyber Patrol or provide Microsystems some
basic demographic information in exchange for unlimited use of
the Home Edition. The demographic information is used for
marketing and research purposes. Since January of 1996, over
10,000 demonstration copies of Cyber Patrol have been downloaded
from Microsystems' Web site.
61. Cyber Patrol is also available from Retail outlets
as NetBlocker Plus. NetBlocker Plus sells for $19.95, which
includes five weeks of updates to the CyberNOT list.
62. Microsystems also sells Cyber Patrol into a
growing market in schools. As more classrooms become connected
to the Internet, many teachers want to ensure that their students
can receive the benefit of the Internet without encountering
material they deem educationally inappropriate.
63. Microsystems is working with the Recreational
Software Advisory Council (RSAC), a non-profit corporation which
developed rating systems for video games, to implement the RSAC
rating system for the Internet.
64. The next release of Cyber Patrol, expected in
second quarter of this year, will give parents the ability to use
any PICS rating service, including the RSAC rating service, in
addition to the Microsystems CyberNOT list.
65. In order to speed the implementation of PICS and
encourage the development of PICS-compatible Internet
applications, Microsystems maintains a server on the Internet
which contains its CyberNOT list. The server provides software
developers with access to a PICS rating service, and allows
software developers to test their products' ability to interpret
standard PICS labels. Microsystems is also offering its PICS
client test program for Windows free of charge. The client
program can be used by developers of PICS rating services to test
their services and products.

SurfWatch
66. Another software product, SurfWatch, is also
designed to allow parents and other concerned users to filter
unwanted material on the Internet. SurfWatch is available for
both Apple Macintosh, Microsoft Windows, and Microsoft Windows 95
Operating Systems, and works with direct Internet Access
Providers (e.g., Netcom, PSI, UUnet, AT&T, and more than 1000
other Internet Service Providers).
67. The suggested retail price of SurfWatch Software
is $49.95, with a street price of between $20.00 and $25.00. The
product is also available as part of CompuServe/Spry Inc.'s
Internet in a Box for Kids, which includes access to Spry's Kids
only Internet service and a copy of SurfWatch. Internet in a Box
for Kids retails for approximately $30.00. The subscription
service, which updates the SurfWatch blocked site list
automatically with new sites each month, is available for $5.95
per month or $60.00 per year. The subscription is included as
part of the Internet in a Box for Kids program, and is also
provided as a low-cost option from Internet Service Providers.
68. SurfWatch is available at over 12,000 retail
locations, including National stores such as Comp USA, Egghead
Software, Computer City, and several national mail order outlets.
SurfWatch can also be ordered directly from its own site on the
World Wide Web, and through the Internet Shopping Network.
69. Plaintiffs America Online (AOL), Microsoft
Network, and Prodigy all offer parental control options free of
charge to their members. AOL has established an online area
designed specifically for children. The "Kids Only" parental
control feature allows parents to establish an AOL account for
their children that accesses only the Kids Only channel on
America Online.[15]
70. AOL plans to incorporate PICS-compatible
capability into its standard Web browser software, and to make
available to subscribers other PICS-compatible Web browsers, such
as the Netscape software.
71. Plaintiffs CompuServe and Prodigy give their
subscribers the option of blocking all access to the Internet, or
to particular media within their proprietary online content, such
as bulletin boards and chat rooms.
72. Although parental control software currently can
screen for certain suggestive words or for known sexually
explicit sites, it cannot now screen for sexually explicit images
unaccompanied by suggestive text unless those who configure the
software are aware of the particular site.
73. Despite its limitations, currently available user-
based software suggests that a reasonably effective method by
which parents can prevent their children from accessing sexually
explicit and other material which parents may believe is
inappropriate for their children will soon be widely available.

<snip>

III.
CONCLUSIONS OF LAW
Plaintiffs have established a reasonable probability of
eventual success in the litigation by demonstrating that 
223(a)(1)(B) and 223(a)(2) of the CDA are unconstitutional on
their face to the extent that they reach indecency. Sections
223(d)(1) and 223(d)(2) of the CDA are unconstitutional on their
face. Accordingly, plaintiffs have shown irreparable injury, no
party has any interest in the enforcement of an unconstitutional
law, and therefore the public interest will be served by granting
the preliminary injunction. Elrod v. Burns, 427 U.S. 347, 373-74
(1976); Hohe v. Casey, 868 F.2d 69, 72 (3d Cir.), cert. denied,
493 U.S. 848 (1989); Acierno v. New Castle County, 40 F.3d 645,
653 (3d Cir. 1994). The motions for preliminary injunction will
therefore be granted.
The views of the members of the Court in support of
these conclusions follow.

SLOVITER, Chief Judge, Court of Appeals for the Third Circuit:

A.
Statutory Provisions

As noted in Part I, Introduction, the plaintiffs'
motion for a preliminary injunction is confined to portions of
two provisions of the Communications Decency Act of 1996, 
223(a) and  223(d), which they contend violate their First
Amendment free speech and Fifth Amendment due process rights. To
facilitate reference, I set forth those provisions in full.
Section 223(a), the "indecency" provision, subjects to criminal
penalties of imprisonment of no more than two years or a fine or
both anyone who:
1) in interstate or foreign communications . . .
(B) by means of a telecommunications device
knowingly --

(i) makes, creates, or solicits, and

(ii) initiates the transmission of,
any comment, request, suggestion, proposal, image,
or other communication which is obscene or
indecent, knowing that the recipient of the
communication is under 18 years of age, regardless
of whether the maker of such communication placed
the call or initiated the communication; . . .

(2) knowingly permits any telecommunications facility
under his control to be used for any activity
prohibited by paragraph (1) with the intent that it be
used for such activity.

(emphasis added).
The term "telecommunications device" is specifically
defined not to include "the use of an interactive computer
service," as that is covered by section 223(d)(1).
Section 223(d), the "patently offensive" provision,
subjects to criminal penalties anyone who:
(1) in interstate or foreign communications knowingly--

(A) uses an interactive computer service to send to a
specific person or persons under 18 years of age, or

(B) uses any interactive computer service to display in
a manner available to a person under 18 years of age,
any comment, request, suggestion, proposal, image or
other communication that, in context, depicts or
describes, in terms patently offensive as measured by
contemporary community standards, sexual or excretory
activities or organs, regardless of whether the use of
such service placed the call or initiated the
communication; or

(2) knowingly permits any telecommunications facility
under such person's control to be used for an activity
prohibited by paragraph (1) with the intent that it be
used for such activity.

(emphasis added).
Two aspects of these provisions stand out. First, we
are dealing with criminal provisions, subjecting violators to
substantial penalties. Second, the provisions on indecent and
patently offensive communications are not parallel.
The government uses the term "indecent" interchangeably
with "patently offensive" and advises that it so construes the
statute in light of the legislative history and the Supreme
Court's analysis of the word "indecent" in FCC v. Pacifica
Foundation, 438 U.S. 726 (1978). However, the CDA does not
define "indecent." Notwithstanding Congress' familiarity with
Pacifica, it enacted  223(a), covering "indecent"
communications, without any language confining "indecent" to
descriptions or depictions of "sexual or excretory activities or
organs," language it included in the reference to "patently
offensive" in  223(d)(1)(B). Nor does  223(a) contain the
phrase "in context," which the government believes is relevant.
The failure to define "indecent" in  223(a) is thus
arguably a negative pregnant and subject to "the rule of
construction that an express statutory requirement here,
contrasted with statutory silence there, shows an intent to
confine the requirement to the specified instance." Field v.
Mans, 116 S.Ct. 437, 442 (1995). See also Gozlon-Peretz v.
United States, 498 U.S. 395, 404 (1991) ("'[W]here Congress
includes particular language in one section of a statute but
omits it in another section of the same Act, it is generally
presumed that Congress acts intentionally and purposely in the
disparate inclusion or exclusion'") (quoting Russello v. United
States, 464 U.S. 16, 23 (1983)).
Plaintiffs note the difference but do not press this as
a basis for distinguishing between the two sections in their
preliminary injunction arguments and therefore I will also use
the words interchangeably for this purpose, leaving open the
issue for consideration at the final judgment stage if it becomes
relevant.
B.
Preliminary Injunction Standard
To obtain a preliminary injunction, plaintiffs must
establish that they are likely to prevail on the merits and that
they will suffer irreparable harm if injunctive relief is not
granted. We also must consider whether the potential harm to the
defendant from issuance of a temporary restraining order
outweighs possible harm to the plaintiffs if such relief is
denied, and whether the granting of injunctive relief is in the
public interest. See Campbell Soup Co. v. ConAgra, Inc., 977
F.2d 86, 90-91 (3d Cir. 1992); Bradley v. Pittsburgh Bd. of
Educ., 910 F.2d 1172, 1175 (3d Cir. 1990).
In a case in which the injury alleged is a threat to
First Amendment interests, the finding of irreparable injury is
often tied to the likelihood of success on the merits. In Elrod
v. Burns, 427 U.S. 347 (1976), the Supreme Court emphasized that
"the loss of First Amendment freedoms, for even minimal periods
of time, unquestionably constitutes irreparable injury." Id. at
373 (citing New York Times Co. v. United States, 403 U.S. 713
(1971)).
Subjecting speakers to criminal penalties for speech
that is constitutionally protected in itself raises the spectre
of irreparable harm. Even if a court were unwilling to draw that
conclusion from the language of the statute itself, plaintiffs
have introduced ample evidence that the challenged provisions, if
not enjoined, will have a chilling effect on their free
expression. Thus, this is not a case in which we are dealing
with a mere incidental inhibition on speech, see Hohe v. Casey,
868 F.2d 69, 73 (3d Cir.), cert. denied, 493 U.S. 848 (1989), but
with a regulation that directly penalizes speech.
Nor could there be any dispute about the public
interest factor which must be taken into account before a court
grants a preliminary injunction. No long string of citations is
necessary to find that the public interest weighs in favor of
having access to a free flow of constitutionally protected
speech. See, e.g., Turner Broadcasting System, Inc. v. FCC, 114
S. Ct. 2445, 2458 (1994); Virginia Bd. of Pharmacy v. Virginia
Citizens Consumer Council, 425 U.S. 748, 763-65 (1976).
Thus, if plaintiffs have shown a likelihood of success
on the merits, they will have shown the irreparable injury needed
to entitle them to a preliminary injunction.

C.
Applicable Standard of Review
The CDA is patently a government-imposed content-based
restriction on speech, and the speech at issue, whether
denominated "indecent" or "patently offensive," is entitled to
constitutional protection. See Sable Communications of
California, Inc. v. FCC, 492 U.S. 115, 126 (1989). As such, the
regulation is subject to strict scrutiny, and will only be upheld
if it is justified by a compelling government interest and if it
is narrowly tailored to effectuate that interest. Sable, 492
U.S. at 126; see also Turner Broadcasting, 114 S. Ct. at 2459
(1994). "[T]he benefit gained [by a content-based restriction]
must outweigh the loss of constitutionally protected rights."
Elrod v. Burns, 427 U.S. at 363.
The government's position on the applicable standard
has been less than pellucid but, despite some references to a
somewhat lesser burden employed in broadcasting cases, it now
appears to have conceded that it has the burden of proof to show
both a compelling interest and that the statute regulates least
restrictively. Tr. of Preliminary Injunction Hearing at 121 (May
10, 1996). In any event, the evidence and our Findings of Fact
based thereon show that Internet communication, while unique, is
more akin to telephone communication, at issue in Sable, than to
broadcasting, at issue in Pacifica, because, as with the
telephone, an Internet user must act affirmatively and
deliberately to retrieve specific information online. Even if a
broad search will, on occasion, retrieve unwanted materials, the
user virtually always receives some warning of its content,
significantly reducing the element of surprise or "assault"
involved in broadcasting. Therefore, it is highly unlikely that
a very young child will be randomly "surfing" the Web and come
across "indecent" or "patently offensive" material.

The Reach of the Statute

Whatever the strength of the interest the government
has demonstrated in preventing minors from accessing "indecent"
and "patently offensive" material online, if the means it has
chosen sweeps more broadly than necessary and thereby chills the
expression of adults, it has overstepped onto rights protected by
the First Amendment. Sable, 492 U.S. at 131.
The plaintiffs argue that the CDA violates the First
Amendment because it effectively bans a substantial category of
protected speech from most parts of the Internet. The
government responds that the Act does not on its face or in
effect ban indecent material that is constitutionally protected
for adults. Thus one of the factual issues before us was the
likely effect of the CDA on the free availability of
constitutionally protected material. A wealth of persuasive
evidence, referred to in detail in the Findings of Fact, proved
that it is either technologically impossible or economically
prohibitive for many of the plaintiffs to comply with the CDA
without seriously impeding their posting of online material which
adults have a constitutional right to access.
With the possible exception of an e-mail to a known
recipient, most content providers cannot determine the identity
and age of every user accessing their material. Considering
separately content providers that fall roughly into two
categories, we have found that no technology exists which allows
those posting on the category of newsgroups, mail exploders or
chat rooms to screen for age. Speakers using those forms of
communication cannot control who receives the communication, and
in most instances are not aware of the identity of the
recipients. If it is not feasible for speakers who communicate
via these forms of communication to conduct age screening, they
would have to reduce the level of communication to that which is
appropriate for children in order to be protected under the
statute. This would effect a complete ban even for adults of
some expression, albeit "indecent," to which they are
constitutionally entitled, and thus would be unconstitutional
under the holding in Sable, 492 U.S. at 131.
Even as to content providers in the other broad
category, such as the World Wide Web, where efforts at age
verification are technically feasible through the use of Common
Gateway Interface (cgi) scripts (which enable creation of a
document that can process information provided by a Web visitor),
the Findings of Fact show that as a practical matter, non-
commercial organizations and even many commercial organizations
using the Web would find it prohibitively expensive and
burdensome to engage in the methods of age verification proposed
by the government, and that even if they could attempt to age
verify, there is little assurance that they could successfully
filter out minors.
The government attempts to circumvent this problem by
seeking to limit the scope of the statute to those content
providers who are commercial pornographers, and urges that we do
likewise in our obligation to save a congressional enactment from
facial unconstitutionality wherever possible. But in light of
its plain language and its legislative history, the CDA cannot
reasonably be read as limited to commercial pornographers. A
court may not impose a narrowing construction on a statute unless
it is "readily susceptible" to such a construction. Virginia v.
American Booksellers Ass'n, 484 U.S. 383, 397 (1988). The court
may not "rewrite a . . . law to conform it to constitutional
requirements." Id. Although we may prefer an interpretation of
a statute that will preserve the constitutionality of the
statutory scheme, United State v. Clark, 445 U.S. 23, 27 (1980),
we do not have license to rewrite a statute to "create
distinctions where none were intended." American Tobacco Co. v.
Patterson, 456 U.S. 63, 72 n.6 (1982); see also Consumer Party v.
Davis, 778 F.2d 140, 147 (3d Cir. 1985). The Court has often
stated that "absent a clearly expressed legislative intention to
the contrary, [statutory] language must ordinarily be regarded as
conclusive." Escondido Mut. Water Co. v. La Jolla Band of
Mission Indians, 466 U.S. 765, 772 (1984)(quoting North Dakota v.
United States, 460 U.S. 300, 312 (1983)).
It is clear from the face of the CDA and from its
legislative history that Congress did not intend to limit its
application to commercial purveyors of pornography. Congress
unquestionably knew how to limit the statute to such entities if
that was its intent, and in fact it did so in provisions relating
to dial-a-porn services. See 47 U.S.C.  223(b)(2)(A)
(criminalizing making any indecent telephone communication "for
commercial purposes"). It placed no similar limitation in the
CDA. Moreover, the Conference Report makes clear that Congress
did not intend to limit the application of the statute to content
providers such as those which make available the commercial
material contained in the government's exhibits, and confirms
that Congress intended "content regulation of both commercial and
non-commercial providers." Conf. Rep. at 191. See also, 141
Cong. Rec. S8089 (daily ed. June 9, 1995) (Statement of Senator
Exon).
The scope of the CDA is not confined to material that
has a prurient interest or appeal, one of the hallmarks of
obscenity, because Congress sought to reach farther. Nor did
Congress include language that would define "patently offensive"
or "indecent" to exclude material of serious value. It follows
that to narrow the statute in the manner the government urges
would be an impermissible exercise of our limited judicial
function, which is to review the statute as written for its
compliance with constitutional mandates.
I conclude inexorably from the foregoing that the CDA
reaches speech subject to the full protection of the First
Amendment, at least for adults.[1] In questions of the witnesses
and in colloquy with the government attorneys, it became evident
that even if "indecent" is read as parallel to "patently
offensive," the terms would cover a broad range of material from
contemporary films, plays and books showing or describing sexual
activities (e.g., Leaving Las Vegas) to controversial
contemporary art and photographs showing sexual organs in
positions that the government conceded would be patently
offensive in some communities (e.g., a Robert Mapplethorpe
photograph depicting a man with an erect penis).

<snip>

3. The Effect of the CDA and the Novel Characteristics
of Internet Communication
Over the course of five days of hearings and many
hundreds of pages of declarations, deposition transcripts, and
exhibits, we have learned about the special attributes of
Internet communication. Our Findings of fact -- many of them
undisputed -- express our understanding of the Internet. These
Findings lead to the conclusion that Congress may not regulate
indecency on the Internet at all.

------------------------------

Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <[email protected]>
Subject: File 3--Cu Digest Header Info (unchanged since 7 Apr, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: [email protected]

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/[email protected]
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #8.44
************************************


 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS