Skip to main content

EFFector - Volume 8, Issue 14 - "Cyberporn" Hearing and Exposure of Flaws in Rimm Study

EFFECTOR

EFFector - Volume 8, Issue 14 - "Cyberporn" Hearing and Exposure of Flaws in Rimm Study

=========================================================================
     ________________          _______________        _______________
    /_______________/\        /_______________\      /\______________\
    \\\\\\\\\\\\\\\\\/        |||||||||||||||||     / ////////////////
     \\\\\________/\          |||||________\       / /////______\
      \\\\\\\\\\\\\/____      ||||||||||||||      / /////////////
       \\\\\___________/\     |||||              / ////
        \\\\\\\\\\\\\\\\/     |||||              \////

=========================================================================
EFFector Online Volume 08 No. 14      July 26, 1995       editors@eff.org
A Publication of the Electronic Frontier Foundation        ISSN 1062-9424

IN THIS ISSUE:

"Cyberporn" Hearing and Exposure of Flaws in Rimm Study
EFF's Mike Godwin Testifies Against Grassley Censorship Bill
Calendar of Events
Quote of the Day
What YOU Can Do
Administrivia

* See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more
information on current EFF activities and online activism alerts! *

----------------------------------------------------------------------


Subject: "Cyberporn" Hearing and Exposure of Flaws in Rimm Study
----------------------------------------------------------------

A July 24 hearing chaired by Senator Charles Grassley (R-Iowa) on the 
issues surrounding children's getting access to so-called "indecent" material
on the Internet, did not go exactly as planned for the Senator.

In the absence of Sen. Grassley's planned star witness -- a self-styled 
expert on online pornography named Martin Rimm -- ranking minority member
Sen. Patrick Leahy (D-Vermont) effectively controlled the hearing.

Grassley's attempt to center his hearing on Rimm's controversial pornography 
study had backfired. Though the Iowa Senator had termed it the "only 
comprehensive study  dealing with pornography in cyberspace", now, 
thanks to recent articles discussing the motives and ethics of its 
undergraduate author, Grassley was forced to disavow it: "Now under 
criticism, that study is under review as it should be."  

EFF lawyer Mike Godwin had taken the lead weeks before in coordinating 
efforts to challenge former CMU student Martin Rimm's "study" of 
sexually oriented material online and Time magazine's decision to 
promote it as the basis of a cover story on "cyberporn." Time has been
widely criticized for promoting the study without allowing any prior
critical review of it by independent experts. 

Working with EFF interns Beth Noveck and Ben Manevitz, Godwin had arranged 
for copies of the study to get into the hands of reporters and academics 
across the country. This in turn had generated press coverage that led both 
to the discrediting of the Rimm study (which is riddled with methodological 
flaws and unsupportable conclusions) and to Time magazine's seemingly 
unprecedented disavowal of its own cover story in a followup article
only three weeks later.

"The Rimm affair shows the potential of the Net for both political action and
academic inquiry," Godwin said. "A decade ago, the study and its author
might have been accepted without question for months, continuing to distort
public-policy debates about regulation of the Net." Godwin sought 
evaluations of the Rimm study from professors Donna Hoffman of Vanderbilt 
and Jim Thomas of Northern Illinois University, as well of from pioneer 
Internet researcher Brian Reid of DEC. He also helped ensure that the 
first critique of the Rimm study, from EFF Policy Fellow David Post, a 
professor at Georgetown University Law Center, was quickly and widely 
circulated. In subsequent weeks, Godwin became a clearinghouse of 
information about the so'called "CMU study" and its controversial author.

It is widely believed that the critical response to the Rimm article is
what led to Rimm's removal last week from the witness list for the
July 24 hearing sponsored by Sen. Grassley, who is sponsoring legislation 
purportedly aimed at protecting children from so-called "indecent" 
content online.  

At the hearing, Sen. Leahy commented that, "he [Rimm] got disinvited when 
the study that everyone embraced as gospel was a little bit less than 
that. I would expect any time now to see _Time_ say that even great media 
can be conned." In point of fact, _Time_ Senior Editor Philip Elmer-Dewitt 
has essentially done so, in public forums on the WELL, the online 
service where much of the dirt on the Rimm study was unearthed and examine.

"The voice you didn't hear at that hearing," Godwin later said, "was that of 
would-be star witness Martin Rimm, who may have hoped his study would 
establish him as the national expert in online pornography."  Once Rimm 
and his questionable study were discredited, Godwin said, "the hearing 
lost a lot of drama, but it gained a lot of balance."

There was still some drama, however.  Two women, one a minor, testified 
that they had been stalked online, and anti-porn lobbyists demanded 
legislation to "fix" the online porn problem.  Sen. Leahy's questioning, 
however, revealed that the problems are already covered by local, state 
and federal law. Leahy concluded, of course, that the problem was one of 
law enforcement resources, not any imaginary gaping holes in the law itself.

Sen. Leahy was also had critical words for the majority of his 
colleagues: "The Senate went in willy-nilly and passed this legislation
[the similar Exon/Gorton Comm. Decency Act]. Most senators who voted wouldn't
have the foggiest idea of how to get on the Internet."

In his turn, journalist Barry Crimmins noted, for whatever reason, that 
he was a victim of childhood sexual abuse, and warned that America Online, 
the popular online service, is a den of iniquity: "I am here to tell the
American people that not only are their children unsafe on America
Online, their children are unsafe because of it."  This may have been 
just a bit too much for even those Senators ready to believe in Internet 
horror stories.  Grassley himself tried to cut Crimmins off to no avail.

These antics do not appear to have been enough, fortunately, to turn this 
hearing into a media circus, or a censors' feeding frenzy, unlike the 
recent hearing on "violent" materials on the Internet.

By and large, sensible testimony ruled the day. Jerry Berman, representing 
the Center for Democracy and Technology, and the Interactive Working 
Group (a coaltion of non-profit and industry organizations, including
EFF and many others), delivered solid oral testimony, showing the Grassley 
anti-porn bill to be an unconstitutional attempt to ban protected speech.  
EFF Staff Counsel Mike Godwin submitted written testimony, which appears 
below.  

Also combatting hysterical testimony from anti-porn group Enough is 
Enough were Michael Hart of the Project Gutenberg electronic library, AOL's 
general counsel, and the exec. dir. of the Recreational Software Advisory 
Council. 

Several important ideas were aired without serious challenge in the hearing, 
mostly by Sen. Leahy and Sen. Russ Feingold (D-Wisconsin):
 
  * The Exon and Grassley legislation is inconsistent with the current
    Congress' and Administration's expressed goal of "keeping government 
    off our backs"
  * The legislation is unlikely to solve the problems they purport to solve
  * The right and responsibility to decide what is and is not appropriate 
    for a child lies with that child's parents
  * Current law already suffiently covers this area
  * Software tools and special services will enable individuals to "filter" 
    online content for themselves and their children.
  * These censorship bills fail to distinguish between obscenity, which
    is illegal (though defined different in different jurisdictions), and
    indecency, which is constitutionally protected and subject to regulatory
    control only under specific and very narrowly defined circumstances.
  * The legislation would chill speech not only directly, in attacking
    indecency, but indirectly by, in effect, requiring online services
    such as Netcom, the WELL, AOL or local BBSs, to become full-time 
    censors, and forcing them to censor anything that *might* conceivably 
    be indecent. Otherwise, they would be in grave danger of prosecution.

Sen. Exon attempted to rebuff civil libertarians' concerns by claiming 
that he is being "viciously attacked", and by repeating tired arguments 
that such legislation will "protect children."  However, we think reason 
finally prevailed in this debate, and that the time is right to push 
forward.  Please see the "What You Can Do" section of this newsletter.

[Thanks to Declan McCullagh for comparing his notes from the hearing with 
ours.]

------------------------------


Subject: EFF's Mike Godwin Testifies Against Grassley Censorship Bill
---------------------------------------------------------------------

Testimony of 

Mike Godwin

Staff Counsel

of the

Electronic Frontier Foundation (EFF)

Regarding

The "Protection of Children From Computer Pornography Act of 1995" (S.892)

before

the Senate Judiciary Committee

July 24, 1995





I.	The Challenge of a New Medium

My name is Mike Godwin, and I am staff counsel for the Electronic Frontier
Foundation. I'd like to thank you, Mr. Chairman, on behalf of my
organization, the Electronic Frontier Foundation, for allowing EFF to
submit testimony concerning the important issues, and significant
problems, we believe are raised by S. 892. One of our goals at EFF is to
assist policymakers and legislators in developing a framework to
understand the legal and social significance of what is, in effect, a
wholly new medium -- computer communications. EFF is dedicated to
expanding and preserving the democratic potential of this new medium,
whose social and political significance may ultimately exceed that of the
very first mass medium, the printing press. The issues raised by computer
communications transcend partisan politics and require of us all that we
stretch our imaginations -- the worst mistake we can make on the threshold
of this revolution is to assume that this new medium is, so far as the
Constitution and laws of the United States are concerned, essentially the
same as broadcasting, or more or less similar to telephony. Computer
communications -- and especially those communications that depend on
computer networks of national or global reach, raise new problems and
questions for lawmakers. At the same time, this medium promises to be the
fulfillment of our oldest First Amendment values.

But I come here not just as a lawyer who is concerned about the First
Amendment. I'm also a father. My little girl will be the first person in
my family to have grown up with the Internet. As a parent, I'm deeply
concerned with protecting Ariel from bad material and from bad people. And
this concern is the other reason for my being here -- I want to help
ensure that whatever legislation or policy comes from Congress regarding
the Internet will help me as a parent in protecting my little girl, while
at the same time ensuring that she's able to benefit fully from access to
the Net.

While I do want to talk a bit about some of the Constitutional issues
raised by S. 892, I don't want to duplicate the thoughtful, thorough
analysis submitted to this committee by Jerry Berman of the Center for
Democracy and Technology. Instead, I want to focus on giving you a better
historical and technical understanding of why computer communications are
fundamentally new and different from previous communications media. 

Now, figuring out the proper legal framework for the Net is tricky. Even
if you didn't know anything else about computer communications, you'd know
it's tricky from one simple fact: you've got Rush Limbaugh and Newt
Gingrich and the ACLU on one side of the issue, and Senators Robert Dole
and Dianne Feinstein on the other side. What this tells us, I think, is
that one's approach to making policy about computer communications derives
less from one's political affiliations than it does from how one sees it
in relation to traditional communications media.

You see, the more you know about computer networks and the Internet, the
clearer it becomes that the these networks are different in several
respects from traditional communications media such as print,
broadcasting, and the telephone. And these differences, once grasped,
entail that top-down, government-centered approaches to protecting
children will be ineffective. They also entail that the "least restrictive
means" test of First Amendment jurisprudence will lead to different
results in this medium from those results we've seen in traditional media,
such as telephony. (See, e.g., Sable Communications v. FCC, 1989). We
begin with what I promise will be a short history of the Internet.


II.	The Humble Beginnings

In spirit, at least, the Internet--the global "network of networks" that
is increasingly the link among commercial online providers, businesses,
government, computer bulletin-board systems, and other modes of computer
communications -- was conceived 30 years ago by Paul Baran, a RAND
Corporation researcher. In a highly theoretical paper, Baran addressed a
quintessentially Cold War problem:  How could U.S. authorities
successfully communicate in the aftermath of a nuclear war?

The problem was that traditional communications network designs were
vulnerable to strategic attacks. Hubs and main arteries could be
destroyed, isolating whole sections of the country. And any central
control authority would be a particularly enticing target for a surgical
strike.

Baran developed a theory of a truly decentralized, "distributed"
communications network, with no central authority, and no main hubs or
arteries. Any given communication on the network was sliced into what
later were called "packets," and each packet was separately addressed,
then thrust by the network in the general direction of the communication's
destination. Each packet might take a separate route across the network,
and some of those routes might involve serious detours (a packet might
travel from Chicago to Seattle by way of Texas, for example). If a
particular route had been damaged by natural disaster or military attack,
a given packet would simply continue trying new routes until it found one
that worked. The recipient computer on the far end would collect each
packet as it arrived and assemble it in the correct order.
This kind of network design probably sounds highly inefficient. That's
because it is -- but it is also highly robust, and it turns out to be very
difficult to guarantee that you've stopped a given message from reaching
its destination.

Baran's theoretical design remained just that -- theory -- for several
years. Then, in 1969, a group of engineers working for ARPA (the federal
government's Advanced Research Projects Agency), actually planted the
first seeds of what later became known as the Internet. Although these
engineers had never heard of Paul Baran or his paper, they'd brought his
theory to fruition anyway. And once the RAND Corporation and other early
participants in this network recognized that ARPA had implemented a
working version of Baran's concept, they lost no time in playing up the
military value of the new network (which turned out to be a plus when
seeking appropriations under the constraints of the Mansfield Amendment).

At first it was called the ARPAnet -- only later was the term "Internet"
coined. The new network grew quickly: in late 1969, there were only four
computers on the network, but by 1972 there were 37 sites. By the 1990s,
the number of computer sites on the Internet had grown exponentially -- in
1992, Internet sites numbered in the hundreds of thousands; this year they
number in the millions.

One reason the Internet grew so rapidly is that one doesn't have to
construct special wires or conduits to connect to it -- connectivity
depend on software standards, and not on hardware.  And connecting to the
Internet cost the taxpayer little or nothing, since each node was
independent, and had to handle its own financing and its own technical
requirements. It is no wonder that communications traffic on the Internet
has increased 1000 times between January 1988 and October 1994.

Also fueling the explosive growth of the Internet was the increasing
availability and decreasing price of desktop computers. Any one of the
desktop (or even laptop) computers commonly sold today can become part of
the Internet.

III.	Democratic and Economic Opportunities

But the cheapness of computing power these days tells only part of the
story. The rest lies in the answer to the question of why so many people
want to be connected to the Internet. While there are many uses of the
Internet -- e-mail, long-distance computing, file transfers, searches of 
remote databases -- there is no doubt that one of the most compelling reasons
people are excited about the Internet is freedom of speech.

You see, unlike every other mass medium that has ever existed, the
Internet (and similar computer networks) has no central authority. There
is no person in charge of the "printing press," no "editor-in-chief," no
holder of a broadcast license. Americans have discovered that one can
reach a large audience on the Internet without having to assemble a lot of
capital or seek the approval of an editor. In this the Internet is similar
to the telephone (no one tries to edit your phone conversations while
they're happening), but the potential scope of the communications are far
greater. While it might take millions of dollars to start on urban
newspaper or TV station, it takes only a few hundred dollars to reach
large audiences. If, as A.J. Liebling once commented, freedom of the press
belongs to those who own one, the Internet suggests that we all may
someday own one. 

In short, the First Amendment's free-press clause, which many citizens
still take to be a right reserved to the highly capitalized media
establishment, has suddenly become a meaningful right for every individual
American.

This kind of empowerment of individuals is something new under the sun,
and it blurs traditional distinction between "content producers" and
"consumers" (everyone on these computer networks can produce "content").
This may blur the line between reporter and reader -- to take only the
most recent example: it was an ad-hoc group of  individual Internet users
who assembled the material that demonstrated the flaws in the Martin
Rimm/Carnegie Mellon pornography study that you may have heard about. And
while the mainstream media might have taken months to discover the study's
flaws, these individuals uncovered them in mere weeks.

To touch briefly on some other things that make this medium different:
since computer hardware and software are ubiquitous and less expensive all
the time, the medium cannot be considered a "scarce" resource in the way
the Supreme Court characterized the broadcasting spectrum in Red Lion.

And since content is primarily "pulled" by user choices rather than
"pushed" by content producers, the medium lacks the "pervasive" character
of broadcasting that was central to the Court's decision in the Pacifica
case.

Finally, the relatively low cost of acquiring access to the Internet means
that would-be entrepreneurs face relatively low barriers to entry into
this new market. Now that the government no longer plays even a nominal
role in administering the Internet, the international network of networks
is becoming a playing field for pure capitalism. To start a successful
business on the Internet, you don't need to be a millionaire, and you
don't need venture capital -- all you need is a good idea.

Ill-considered regulation, however, could thwart both the democratic and
the economic promise of computer communications. S. 892, with its clear
intent to impose new duties and broader legal risks for service providers,
would simultaneously chill freedom of speech and distort the market for
services by raising barriers to entry. What exacerbates this problem is
that a provider's liability for content hinges not on legal obscenity, but
on the far broader, far vaguer concept of "indecency," a term imported
from the realm of broadcasting regulation whose meaning has never been
defined by either Congress or the Supreme Court. And even if the term had
been defined, it would be inapplicable to a medium that is neither
"scarce" nor "pervasive" in the Constitutional senses of those terms. Our
federal government's special role in regulating the content of the
broadcast media and of the dial-a-porn services is grounded in particular
factual findings about the characteristics of those media. There have been
no such findings with regard to computer communications, and, given the
nature of the medium as discussed above, it is difficult to see how there
could be.

Compounding the "chilling effect" this legislation would have on lawful
speech is the sheer ineffectiveness of the measure when it comes to
willfully illegal communications. Because of the decentralized,
"bomb-proof" nature of the Internet, an individual provider's decision to
censor certain content may have no effect at all with regard to its
general availability. This is especially true when one remembers that an
increasing number of Internet sites are operated in foreign countries, and
their owners, while theoretically extraditable and prosecutable in the
United States, would rarely be meaningfully deterred -- they know that
only a very few foreign offenders will ever be pursued by a U.S. attorney.
In general, a foreign criminal using computer networks to commit a crime
in the United States can dodge both the providers' attempts at monitoring
and the law-enforcement agencies' attempts at policing by originating
message traffic offshore or by routing illegal information through a chain
of intermediate sites that obscures its origin. S. 892 would not even pose
a meaningful threat to those who prey on children -- no limit on
"indecency" prevents the solicitation of innocent children with
nonobscene, nonindecent speech.

IV.	A Better Approach.

As a parent who happens to be a lawyer, I know that federal and state laws
already define a framework for the prosecution of those trafficking in
obscenity, those who possess or distribute child pornography, and those
who prey on children. It is clear that the legal tools are in place, but
Senator Grassley's instincts are right when he perceives that there is
still a gap in the defense of children that needs to be filled. One thing
we know about those who engage in child sexual abuse, for example, is that
they are rarely deterred by legal risks -- even in the face of likely
prosecution they are driven by their sickness to continue preying on
children. And as a parent I can assure you that it is little comfort to me
to know that if such an offender harms my child, that person may be
caught, prosecuted, and imprisoned at some point -- the damage, which may
last a lifetime, has already been done.

This is why I believe that the right role for Congress to play is to
encourage the development of software filters that prevent my child and
others from being harmed in the first place. 

Recall that the basic technology we're talking about here is the computer
-- the most flexible, programmable, "intelligent" technology we build and
market. Filtering software enables parents to screen certain language,
certain kinds of content, certain people, or certain areas on the networks
from their children.

Such an approach does no damage to First Amendment values (it does not,
for example, put a nonlawyer hobbyist who operates a tiny computer
bulletin-board system in the position of having to determine what is
"indecent"), yet it does solve the problems (e.g., solicitation through
nonindecent communications, or offenders who conceal the origin of their
harmful communications) that S. 892 has no hope of addressing.

Furthermore, since such tools are designed to be customizable, parents are
empowered to set their own standards of what is acceptable for their
children, rather than relying on what the nonelected officials at the FCC
choose to include under the definition of "indecency." For example, even
if the FCC determines that detailed information about safe-sex techniques
is not indecent, a parent who believes that her children should receive
all their sexual information from her and not from the Internet could
customize the family computer's "filters" to block that information. 

V. Conclusions

We already have the laws in place. Federal  and state laws prohibit the
distribution of obscenity, every state I know of has laws prohibiting the
exposure of children to inappropriate or harmful material.  Federal and
state laws prohibit child porn and child abuse, regardless of the medium
used to facilitate it.

Speaking as a concerned parent and a lawyer, I believe the question isn't
"Do we need more criminal laws?" -- it's "What can we do to supplement the
legal framework with policies and tools that empower parents to protect
their children and preserve the values of their families?" And answering
that question will require the Congress to draft laws and support policies
that are grounded not in simplistic analogies to old media, but in a
thorough understanding of this new medium and of what makes it different.

Members of the committee, you are at a crossroads. Down one road lies a
future in which parental rights are supported by a Congress that has
abandoned the outdated, big-government approach to solving social
problems. Like the parents and children whose letters to you follow my
statement here, we hope for a Congress that does not set the First
Amendment and welfare of families against eachother, but that instead chooses
policies that strengthen both.

[end]

  ********

The letters referred to are available in the archived version of the 
testimony, at:

http://www.eff.org/pub/Alerts/s892_eff_godwin_072495.testimony
ftp.eff.org, /pub/Alerts/s892_eff_godwin_072495.testimony
gopher.eff.org, 1/Alerts, s892_eff_godwin_072495.testimony

------------------------------


Subject: Calendar of Events
---------------------------

This schedule lists EFF events, and those we feel might be of interest to
our members.  EFF events (those sponsored by us or featuring an EFF speaker)
are marked with a "*" instead of a "-" after the date.  Simlarly, government
events, such as deadlines for comments on reports or testimony submission, are
marked with "!" in place of the "-" after the date.

If you know of an event of some sort that should be listed here, please
send info about it to Stanton McCandlish (mech@eff.org)

The latest full version of this calendar, which includes material for
later in the year as well as the next couple of months, is available from:

ftp: ftp.eff.org, /pub/EFF/calendar.eff
gopher: gopher.eff.org, 1/EFF, calendar.eff
http://www.eff.org/pub/EFF/calendar.eff


Updated: July 26, 1995


* 1995

Aug. 1  - TOOLS '95, Technology of Object-Oriented Languages and Sustems;
          Santa Barbara, California.
          Contact: +1 805 685 1006 (voice), +1 805 685 6869 (fax)
          Email: tools@tools.com

Aug. 3-
     5  - 4th Annual Conference on Multimedia in Education and Industry;
          Asheville, North Carolina.
          Contact: +1 803 737 7440
          Email: birdd@ccmail.orst.edu

Aug. 4-
     6  * DEF CON III; the Tropicana Hotel, Las Vegas, Nevada; "a
          convention for the "underground" elements of the computer
          culture...the Hackers, Phreaks, Hammies, Virii Coders,
          Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties
          Groups, CypherPunks, Futurists, Artists, Etc."  Members of
          the enforcement & security communities are also regularly in
          attendance.  EFF co-founder John Perry Barlow and EFF Online
          Services Coordinator Selena Sol are featured speakers.
          Email: dtangent@defcon.org or len@netsys.com

        - The Digital Dialectic: A Conference on the Convergence of
          Technology, Media & Theory; Ahmanson Auditorium, Art Center
          College of Design, Pasadena, Calif.  Panelists include:
          Robert Stein, Florian Brody, George Landow, Peter Lunenfeld, Lev
          Manovich, Erkki Huhtamo, Brenda Laurel, Christian Mueller,
          William J. Mitchell, N. Katherine Hayles, Michael Heim, Carol
          Gigliotti.  This is a free event, attendance limited to 423.
          Event scheduled for just before SIGGRAPH.
          Contact: +1 818 568 4710 (voice), +1 818 795 0819 (fax)
          Email: peterl@artcenter.edu

Aug. 4-
     9  - Seminar on Academic Computing '95: Tough Choices, Radical
          Opportunities; Snowmass Village, Colorado.
          Email: bridd@ccmail.orst.edu
          WWW: http://www.princeton.edu/~sac/

Aug. 6-
     11 - SIGGRAPH '95 - International Conference on Computer Graphics and
          Interactive Techniques; Los Angeles, Calif.; sponsored by the Assoc.
          for Computing Machinery.  See also Digital Dialectic, Aug. 4-6.
          Email: siggraph95@siggraph.org

Aug. 8-
     9 *! US NII Advisory Council meeting; Seattle, Wash.  Open to the
          public; members of this civilian council include EFF board members
          Esther Dyson and David Johnson.
          Contact: +1 212 482 1835 (voice)

Aug. 8-
     11 - Rural Cellular Association; Las Vegas, Nevada.
          Contact: +1 800 722 1872 (voice)

Aug. 9-
     11 - 11th Annual Conferenceon Distance Teaching and Learning;
          Madison, Wisconsin.
          Contact: +1 800 462 0876, +1 608 262 2061
          http://epd222.engr.wisc.edu/disted/distED.html

Aug. 10-
     12 - Tenth Annual Conference on Computing and Philosophy (CAP);
          Pittsburgh, Philadelphia.
          Contact: +1 412 268 7643 (voice)
          Email: rc2z@andrew.cmu.edu

Aug. 12 - Electronic Frontiers Houston Free Cryptography Workshop: How to
          Use PGP; South Coast Computing offices, 1811 Bering St., Ste. 100,
          Houston, Texas.
          Contact: +1 713 799 1044
          Email: efh@efh.org
          URL: http://www.efh.org/

Aug. 13-
     15 - Hot Chips Symposium VII, a Symposium on High-Performace Chips;
          Stanford University, Stanford, California.  Sponsored by IEEE
          Computer Society Technical Committee on Microprocessors.
          http://dice.scu.edu/HotChips or http:/www.hot.org/hotchips
          Contact: +1 415 941 6699 (voice)
          Email: r.stewart@hot.org

Aug. 13-
     16 - Conference on Organizational Computing Systems (COOCS'95);
          Silicon Valley Sheraton, Milpitas, Calif.; sponsored by the
          Assoc. of Computing Machinery.
          Contact: +1 408 456 7667 (voice), +1 408 456 7050 (fax)
          Email: kswenson@ossi.com

Aug. 14-
     18 - Computers in Context: Joining Forces in Design; Aarhus, Denmark.
          Contact: Computers in Context, Aarhus University, Dept. of
                   Computer Science, Bldg. 540, Ny Munkegade 116, DK-8000
                   Aarhus C, Denmark.

Aug. 16-
     19 - Libraries of the Future - IFLA; Istanbul, Turkey.
          Email: mkutup-o@servis.net.tr

        - AI-ED'95: 7th World Conference on Artificial Intelligence in
          Education.  Washington, DC.  Sponsor: The Association for the
          Advancement of Computing in Education
          Contact: +1 804 973 3987 (voice)
          Email: aace@virginia.edu

Aug. 16-
     20 - ONE BBSCon '95; Tampa Conv. Ctr., Tampa, Florida
          Largest BBS sysop/user convention in the world
          Contact: +1 303 693 5253 (voice)

Aug. 18 - Registration deadline for Challenging Marketplace Solutions to
          Problems in the Economics of Information (see Sep. 18 below).

Aug. 18-
     20 - National Independent Politics Summit; Pittsburgh, Penn.

Aug. 19-
     23 - Telecommunities '95, International Community Networking
          Conference and Annual General Meeting of Telecommunities Canada;
          University of Victoria, Victoria, British Columbia, Canada.
          Contact: +1 604 721 8746 (voice), +1 604 721 8774 (fax)

Aug. 21-
     23 * Progress and Freedom Foundation Conference; Aspen, Colorado.
          Speakers include EFF boardmembers Esther Dyson, Steward Brand
          and John Perry Barlow.
          Contact: +1 202 484 2312

        - WebEdge II, the Second Macintosh World Wide Web Developers'
          Conference; Austin, TX.
          Contact: +! 512 326 8307
          Email: matt@webedge.com
          http://www.webedge.com

Aug. 21-
     24 - 4th International Conference on Image Management and
          Communication (IMAC 95); Hawaii.
          Contact: +1 202 687 7955 (voice), +1 202 784 3479
          http://www.imac.georgetown.edu  go to ISIS Homepage

Aug. 21-
     24 - 12th International Conference on Computer Communication;
          Seoul, Korea.  Advance registration deadline: July 25
          Contact: +82 2 588 9246 (voice), +82 2 521 1352 (fax)
          Email: icc-reg@krnic.net

Aug. 21-
     25 - KnowRight '95, International Congress on Intellectual Property
          Rights for Specialized INformation, Knowledge and New
          Technoligies; Vienna, Austria.
          Contact: +43 1 5120235 (voice), +43 1 5120235 9 (fax)
          Email: ocg@vm.univie.ac.at

Aug. 22 - National Association of Telecommunications Officers and
          Advisers Annual Meeting; Assistant Sec. of Commerce Larry Irving
          scheduled to speak.  Albuquerqu, NM.

Aug. 25 - 9th Congressional District Telecommunications Conference
          (sponsored by US Congressman Rick Boucher); Roanoke, Virginia.
          Assistant Sec. of Commerce Larry Irving scheduled to speak.

Aug. 28-
     29 - 1995 CAUSE/CNI Midwest Regional Conference; Northwestern
          University, Evanston, Illinois.
          Contact: +1 202 296 5098 (voice), +1 202 872 0884 (fax)
          Email: paul@cni.org
          http://www.cni.org/CNI.homepage.html

Aug. 28-
Sep. 1  - ACM SIGCOMM 1995, Conference on Applications, Technologies,
          Architectures, and Protocols for Computer Communications;
          Cambridge, Massachusetts.
          Contact: +1 908 582 3384 (voice), +1 908 582 5857 (fax)
          Email: keshav@research.att.com
          URL: http://www.acm.org/sigcomm/sigcomm95/

------------------------------


Subject: Quote of the Day
-------------------------

"Censorship is the strongest drive in human nature; sex is a weak second."
  - Phil Kerby

Find yourself wondering if your privacy and freedom of speech are safe 
when bills to censor the Internet are swimming about in a sea of of 
surveillance legislation and anti-terrorism hysteria?  Worried that in 
the rush to make us secure from ourselves that our government 
representatives may deprive us of our essential civil liberties? 
Concerned that legislative efforts nominally to "protect children" will 
actually censor all communications down to only content suitable for 
the playground?

Join EFF!

Even if you don't live in the U.S., the anti-Internet hysteria will soon 
be visiting a legislative body near you.  If it hasn't already.

------------------------------


Subject: What YOU Can Do
------------------------

* The Communications Decency Act & Other Censorship Legislation

The Communications Decency Act and similar legislation pose serious 
threats to freedom of expression online, and to the livelihoods of system 
operators.  The legislation also undermines several crucial privacy 
protections.

Business/industry persons concerned should alert their corporate govt.
affairs office and/or legal counsel.  Everyone should write to their own
Representatives and ask them to support Rep. Klink's alternative 
legislation, already folded into the House telecom reform bill, and 
ask their legislators to oppose any efforts to remove the Klink 
language from the bill and replace it with the CDA or similar 
censorship legislation.  Explain, quickly and clearly, why the CDA is 
dangerous, and urge efforts to prevent its introduction in any form.

For more information on what you can do to help stop this and other 
dangerous legislation, see:

ftp.eff.org, /pub/Alerts/
gopher.eff.org, 1/Alerts
http://www.eff.org/pub/Alerts/

If you do not have full internet access, send your request
for information to ask@eff.org.


* The Anti-Electronic Racketeering Act

This bill is unlikely to pass in any form, being very poorly drafted, and 
without much support.  However, the CDA is just as bad and passed with 
flying colors [the jolly roger?] in the Senate. It's better to be safe 
than sorry. If you have a few moments to spare, writing to, faxing, or 
calling your Congresspersons to urge opposition to this bill is a good 
idea. If you only have time to do limited activism, please concentrate 
on the CDA instead. That legislation is far more imminent that the AERA.


* Find Out Who Your Congresspersons Are

Writing letters to, faxing, and phoning your representatives in Congress
is one very important strategy of activism, and an essential way of
making sure YOUR voice is heard on vital issues.

EFF has lists of the Senate and House with contact information, as well
as lists of Congressional committees. (A House list is included in this
issue of EFFector). These lists are available at: 
ftp.eff.org, /pub/Activism/Congress_cmtes/
gopher.eff.org, 1/EFF/Issues/Activism/Congress_cmtes
http://www.eff.org/pub/Activism/Congress_cmtes/

The full Senate and House lists are senate.list and hr.list, respectively.
Those not in the U.S. should seek out similar information about their
own legislative bodies.  EFF will be happy to archive any such
information provided.

If you are having difficulty determining who your Representatives are,
try contacting your local League of Women Voters, who maintain a great 
deal of legislative information.


* Join EFF!

You *know* privacy, freedom of speech and ability to make your voice heard
in government are important. You have probably participated in our online
campaigns and forums.  Have you become a member of EFF yet?  The best way to
protect your online rights is to be fully informed and to make your
opinions heard.  EFF members are informed and are making a difference.  Join
EFF today!

For EFF membership info, send queries to membership@eff.org, or send any
message to info@eff.org for basic EFF info, and a membership form.

------------------------------


Administrivia
=============

EFFector Online is published by:

The Electronic Frontier Foundation
1667 K St. NW, Suite 801
Washington DC 20006-1605 USA
+1 202 861 7700 (voice)
+1 202 861 1258 (fax)
+1 202 861 1223 (BBS - 16.8k ZyXEL)
+1 202 861 1224 (BBS - 14.4k V.32bis)
Membership & donations: membership@eff.org
Legal services: ssteele@eff.org
Hardcopy publications: pubs@eff.org
General EFF, legal, policy or online resources queries: ask@eff.org

Editor: 
Stanton McCandlish, Online Services Mgr./Activist/Archivist (mech@eff.org)

This newsletter printed on 100% recycled electrons.

Reproduction of this publication in electronic media is encouraged.  Signed
articles do not necessarily represent the views of EFF.  To reproduce
signed articles individually, please contact the authors for their express
permission. Press releases and EFF announcements may be reproduced individ-
ually at will.

To subscribe to EFFector via email, send message body of "subscribe
effector-online" (without the "quotes") to listserv@eff.org, which will add
you to a subscription list for EFFector.

Back issues are available at:
ftp.eff.org, /pub/EFF/Newsletters/EFFector/
gopher.eff.org, 1/EFF/Newsletters/EFFector
http://www.eff.org/pub/EFF/Newsletters/EFFector/

To get the latest issue, send any message to effector-reflector@eff.org (or
er@eff.org), and it will be mailed to you automagically.  You can also get
the file "current" from the EFFector directory at the above sites at any 
time for a copy of the current issue.  HTML editions available at:
http://www.eff.org/pub/EFF/Newsletters/EFFector/HTML/ 
at EFFweb.  HTML editions of the current issue sometimes take a day or 
longer to prepare.

------------------------------





End of EFFector Online v08 #14 Digest
*************************************

$$

Back to top

JavaScript license information