Congressional Record—Senate S9017

Total Page:16

File Type:pdf, Size:1020Kb

Congressional Record—Senate S9017 June 26, 1995 CONGRESSIONAL RECORD — SENATE S9017 the problems of decolonization. It has After this history, the image of puter networks, I believe Congress outlived its purpose. Rather than President Nelson Mandela—a man im- must act and do so in a constitutional search for a new purpose for this Coun- prisoned for 27 years in his fight manner to help parents who are under cil, we should ask whether it should against apartheid—handing the World assault in this day and age. There is a exist at all. Cup trophy to the white captain of the flood of vile pornography, and we must Mr. President, the other major area rugby team is indeed a powerful sym- act to stem this growing tide, because, for reform is in our thinking about bol of the dramatic changes in South in the words of Judge Robert Bork, it what the United Nations is and what Africa. Throughout the country, whites incites perverted minds. I refer to its role should be in American foreign and blacks alike celebrated the victory Judge Bork from the Spectator article policy. We cannot expect the United of the Springboks, the mascot of the that I have permission to insert in the Nations to be clearer in purpose than is national team. RECORD. its most powerful member state. Mr. President, I join with the inter- My bill, again, is S. 892, and provides At its core, the United Nations is a national community in congratulating just this sort of constitutional, nar- collection of sovereign states and is be- the people of South Africa on winning rowly focused assistance in protecting holden to them for guidance, funding, the rugby World Cup. It has been a dra- children, while also protecting the and, ultimately, legitimacy. The polit- matic and historic time in South Afri- rights of consenting adults to transmit ical decisions that drive the Organiza- ca. This victory, bringing together all and receive protected pornographic tion and define its proper role in inter- South Africans, exemplifies the material—protected, that is, under the national politics must be made in na- progress to date and the hope for the first amendment. tional capitals, not in New York. future of a great country. Also, according to the Carnegie Mel- I have grown increasingly concerned f lon University study, cyberporn is real- about the tendency toward a fuzzy ly big business. Some computer net- multilateralism that has come to mark CYBERPORN works which specialize in computer U.N. policy toward the United Nations. Mr. GRASSLEY. Mr. President, there pornography take in excess of $1 mil- We have shown a penchant for dumping is an article from Time magazine and lion per year. difficult problems in the lap of the an article from the Spectator magazine Later this week, I am going to intro- United Nations and then complaining that I ask unanimous consent to have duce the Antielectronic Racketeering when no solution is forthcoming. The printed in the RECORD at the end of my Act of 1995 which will target organized tragedy in former Yugoslavia may be remarks. crime which has begun to use the awe- the most dramatic current example of The PRESIDING OFFICER. Without some powers of computers to engage in this phenomena. The truth is, we can- objection, it is so ordered. criminal activity. not so easily wash our hands of dif- (See exhibit 1.) As we all know from past debates in ficult decisions. Mr. GRASSLEY. Mr. President, this this body, organized crime is heavily The United Nations is not a sub- morning I want to speak on a topic involved in trafficking illegal pornog- stitute for American leadership in that has received a lot of attention raphy. The Antielectronic Racket- international affairs. Rather, it is one around here lately. My topic is eering Act will put a dent into that. avenue available to exercise that lead- cyberporn, and that is, computerized In closing, Mr. President, I urge my ership. pornography. I have introduced S. 892, colleagues to give this study by Car- I believe we must own up to the truth entitled the Protection of Children negie Mellon University serious consid- about our role in the United Nations. from Computer Pornography Act of eration, and I urge my colleagues to The United Nations has many failures, 1995. support S. 892. I yield the floor. but we fool ourselves if we merely This legislation is narrowly drawn. It EXHIBIT 1 point fingers at New York and blame is meant to help protect children from [From the Spectator, Feb. 4, 1995] the United Nations for its short- sexual predators and exposure to AN ELECTRONIC SINK OF DEPRAVITY comings. The United States is first graphic pornography. NEW YORK.—If last year it was merely among equals in the U.N. system. The Mr. President, Georgetown Univer- modish to be seen speeding down the infor- failures of the United Nations are, in sity Law School has released a remark- mation superhighway, this year it is fast be- reality, our own. able study conducted by researchers at coming essential, at least in America. Hitch We would do well to reflect honestly Carnegie Mellon University. This study your wagon to cyberspace, says the new on that unavoidable truth. On this raises important questions about the Speaker of the House, Mr. Newt Gingrich, availability and the nature of and your democracy will become absolute, golden anniversary, we must decide with all America joined together for the first whether we will continue to muddle cyberporn. It is this article I ask to time into one vast and egalitarian town along, or whether the United States have printed in the RECORD. meeting. once again will assume its unique man- Later on, on this subject, some time Mr. Gingrich made this all clear two weeks tle of leadership at the United Nations. during the middle of July, I will be ago when he unveiled a new system for I, for one, believe we must lead. conducting hearings before the full Ju- bringing Congress to the electronically con- nected populace, which in honour of Presi- f diciary Committee to fully and com- pletely explore these issues. In the dent Jefferson is called ‘‘Thomas’’. Anyone with a computer and a modem at home or in CONGRATULATING THE SOUTH meantime, I want to refer to the Car- AFRICAN RUGBY TEAM the office (or even up in the skies, courtesy negie Mellon study, and I want to em- of USAir’s new back-of-the-seat telescreens) Mrs. KASSEBAUM. Mr. President, on phasize that this is Carnegie Mellon may now, with only the click of a few but- Saturday South Africa defeated heav- University. This is not a study done by tons, find the text of any bill, any resolu- ily favored New Zealand in the world some religious organization analyzing tion, any government statement. rugby championship. I rise today to pornography that might be on com- Mr. Gingrich is hugely excited by this congratulate the South African rugby puter networks. idea—going so far as to suggest, and not at team, as well as the people of South Af- The university surveyed 900,000 com- all facetiously, that perhaps every citizen be given a thousand-dollar tax deduction to rica, on this historic victory. puter images. Of these 900,000 images, allow him to buy himself a laptop computer. For years, because of its apartheid 83.5 percent of all computerized photo- Thus will all America be conjoined, he ar- policies, South Africa has stood on the graphs available on the Internet are gues, and thus will its democracy be ever outside of international sports com- pornographic. Mr. President, I want to strengthened as in no other country on petitions. From the Olympics to the repeat that: 83.5 percent of the 900,000 earth. World Cup, South Africa—a country of images reviewed—these are all on the Fine, say I, and not just because I will be- intense sports fans—had become iso- Internet—are pornographic, according come richer by $1,000. For the last three lated and banned from many competi- to the Carnegie Mellon study. years or so I have been a dedicated and en- thusiastic user of the Internet. (The Inter- tions. And more than most other Now, of course, that does not mean net—‘‘the net’’ to those in the know—began sports, rugby had become closely asso- that all of these images are illegal innocently enough 20 years ago as a vast ciated with the former white govern- under the Constitution. But with so worldwide network of computers, linked to- ment and its apartheid policies. many graphic images available on com- gether by government-funded telephone VerDate Aug 31 2005 05:42 May 28, 2008 Jkt 041999 PO 00000 Frm 00005 Fmt 0624 Sfmt 0634 J:\ODA15\1995_F~1\S26JN5.REC S26JN5 mmaher on MIKETEMP with SOCIAL SECURITY NUMBERS S9018 CONGRESSIONAL RECORD — SENATE June 26, 1995 lines, with high-powered government-funded computer and a telephone, anywhere on (or get, I think, the drift. Others are more horri- ‘‘exchanges’’ to speed calls on their way, above) the face of the earth. fying still—those that end with the invari- which enabled universities and governments There are about 5,000 separate newsgroups able ‘snuff’ scene, but whose enticements on to swap information. Five years or so ago, on the net, each one of them presenting the way include ‘best’, ‘torture’, ‘gore’ or its controllers opted to make it more demo- chatter about some scintilla of human ‘amputees’, and which refer to sex with ani- cratic, and now anyone is able to connect to knowledge or endeavour.
Recommended publications
  • The Freedom of Speech at Risk in Cyberspace: Obscenity Doctrine and a Frightened University's Censorship of Sex on the Internet
    NOTES THE FREEDOM OF SPEECH AT RISK IN CYBERSPACE: OBSCENITY DOCTRINE AND A FRIGHTENED UNIVERSITY'S CENSORSHIP OF SEX ON THE INTERNET JEFFREY E. FAUCETrE INTRODUcTION On November 8, 1994, Carnegie Mellon University (CMU) removed' a small handful of topics from among the thousands of Usenet newsgroups2 subscribed to by the university computer sys- tem and available on the Internet' .because they contained en- coded sexually explicit images Under the new policy announced by Erwin Steinberg, university vice provost for education, none of the university's 9,000 computers would list the approximately forty newsgroups.5 The newsgroups that were censored are all known as "binaries,"6 and they contain, among other things, encoded imag- 1. Despite the University's restriction on the sexually explicit newsgioups, techno- logically adept students can circumvent the policy by accessing the groups through other file servers. However, for the purposes of this Note, the efforts of these enterprising students are not important when compared with the symbolic effect of the censorship. 2. These newsgroups are "bulletin board-style discussion groups" that can be read from, responded to, and downloaded to an individual's computer. See David Landis, Ex- ploring the Online Universe, USA TODAY, Oct. 7, 1993, at 4D. The Usenet newsgroups are available worldwide via Internet. See id. 3. The Internet is the most commonly known "wide area network" (WAN). It "evolved from networks established by the Department of Defense and the National Science Foundation. [The] Internet connects various government, university, and corporate entities, spans 137 nations, and has at least fifteen million users." Eric Schlachter, Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differ- ences in Computer Bulletin Board Functions, 16 HASTINGS COMM.
    [Show full text]
  • Table of Contents
    The secret structure that steers Defense and Foreign Policy behind the facade of 'Democracy.' SUMMER 2001 - Volume 1, Issue 3 from TrueDemocracy Website Table of Contents EDITORIAL North American Aerospace Defense Command (NORAD) THE SHADOW GOVERNMENT Air Force Office of Space Systems National Aeronautics and Space Administration (NASA) 1. The Executive Branch NASA's Ames Research Center Council on Foreign Relations Project Cold Empire Trilateral Commission Project Snowbird The Bilderberg Group Project Aquarius National Security Council Project MILSTAR Joint Chiefs of Staff Project Tacit Rainbow National Program Office Project Timberwind Federal Emergency Management Agency (FEMA) Project Code EVA Project Cobra Mist 2. Intelligence Branch Project Cold Witness National Security Agency (NSA) National Reconnaissance Office (NRO) 4. Weapons Industry National Reconnaissance Organization Stanford Research Institute, Inc. Central Intelligence Agency (CIA) AT&T Federal Bureau of Investigation , Counter Intelligence Division RAND Corporation (FBI) Edgerton, Germhausen & Greer Corporation Department of Energy Intelligence Wackenhut Corporation NSA's Central Security Service and CIA's Special Bechtel Corporation Security Office United Nuclear Corporation U.S. Army Intelligence and Security Command (INSCOM) Walsh Construction Company U.S. Navy Office of Naval Intelligence (ONI) Aerojet (Genstar Corporation) U.S. Air Force Office of Special Investigations (AFOSI) Reynolds Electronics Engineering Defense Intelligence Agency (DIA) Lear Aircraft Company NASA Intelligence Northrop Corporation Air Force Special Security Service Hughes Aircraft Defense Industry Security Command (DISCO) Lockheed-Maritn Corporation Defense Investigative Service McDonnell-Douglas Corporation Naval Investigative Service (NIS) BDM Corporation Air Force Electronic Security Command General Electric Corporation Drug Enforcement Agency (DEA) PSI-TECH Corporation Federal Police Agency Intelligence Science Applications International Corporation (SAIC) Defense Electronic Security Command Project Deep Water 5.
    [Show full text]
  • Supplemental Memo on DOJ Grantmaking
    HENRY A. WAAMAN, CAUFORNIA, TOM DAVIS, VIRGINIA, CHAIRMAN RANKING MINORITY MEMBER TOM LANTOS, CALIFORNIA ONE HUNDRED TENTH CONGRESS DAN BURTON, INDIANA EDOLPHUS TOWNS, NEW YORK CHRISTOPHER SHAYS, CONNECTICUT PAUL E. KANJORSKI, PENNSYLVANIA JOHN M. McHUGH. NEW YORK CAROLYN B. MALONEY, NEW YORK JOHN L. MICA, FLORIDA EUJAH E. CUMMINGS, MARYLAND ([ongrt~~ ~tatt~ of tbt Wnfttb MARK E. SOUDER. INDIANA DENNIS J. KUCINICH, OHIO TODD RUSSELL PLATTS, PENNSYLVANIA DANNY K. DAVIS, ILUNOIS CHRIS CANNON. UTAH JOHN F. TIERNEY, MASSACHUSETTS 1!,JOU~t l\tprt~tntatibt~ JOHN J. DUNCAN. JR., TENNESSEE WM. LACY CLAY, MISSOURI of MICHAEL R. TURNER, OHIO DIANE E. WATSON, CAUFORNIA DARRELL E. ISSA, CAUFORNIA STEPHEN F. LYNCH, MASSACHUSETTS KENNY MARCHANT. TEXAS BRIAN HIGGINS, NEW YORK COMMITIEE ON OVERSIGHT AND GOVERNMENT REFORM LYNN A. WESTMORELAND. GEORGIA JOHN A. YARMUTH, KENTUCKY PATRICK T. McHENRY, NORTH CAROLINA BRUCE L. BRALEY, IOWA RAYBURN HOUSE OFFICE BUILDING VIRGINIA FOXX, NORTH CAROUNA ELEANOR HOLMES NORTON, 2157 BRIAN P. BILBRAY. CAUFORNIA DISTRICT OF COLUMBIA BILL SALI. IDAHO BETTY McCOLLUM, MINNESOTA WASHINGTON, DC 20515-6143 JIM JORDAN, OHIO JIM COOPER, TENNESSEE CHRIS VAN HOLLEN, MARYLAND MAJORITY (202) 225-5051 PAUL W. HODES, NEW HAMPSHIRE FACSIMILE (202) 225-4784 CHRISTOPHER S. MURPHY, CONNECTICUT MINORITY (202) 225-5074 JOHN P. SARBANES, MARYLAND PETER WELCH, VERMONT www.oversight.house.gov MEMORANDUM June 19,2008 To: Members ofthe Committee on Oversight and Government Reform Fr: Committee on Oversight and Government Reform, Majority Staff Re: Supplemental Information for Full Committee Hearing on Department ofJustice Grantmaking On Thursday, June 19,2008, at 10:00 a.m. in room 2154 ofthe Rayburn House Office Building, the full Committee will hold a hearing on grantmaking practices at the Department of Justice.
    [Show full text]
  • Against Cyberanarchy"
    AGAINST "AGAINST CYBERANARCHY" By David G. Posit TABLE OF CONTENTS I. IN TRO DUCTION .....................................................................................................1365 II. UNEXCEPTIONALISM IN CYBERSPACE ................................................................... 1366 III. SETTLED PRINCIPLES ............................................................................................ 1371 IV . FUNCTIONAL IDENTITY ......................................................................................... 1373 V . SC A LE ...................................................................................................................1376 V I. E FFEC TS ................................................................................................................ 138 1 V II. CON SEN T ..............................................................................................................1384 V III. CONCLUDING THOUGHTS .....................................................................................1386 I. INTRODUCTION It makes me indignant when I hear a work Blamed not because it's crude or graceless but Only because it's new... Had the Greeks hated the new the way we do, Whatever would have been able to grow to be old?' Professor Jack Goldsmith's Against Cyberanarchy2 has become one of the most influential articles in the cyberspace law canon. The position he sets forth-what I call "Unexceptionalism"-rests on two main premises. The first is that activity in cyberspace is "functionally identical to
    [Show full text]
  • Usenet News HOWTO
    Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • TEN EIE VICTORIES Protecting and Defending Children and Families in the Digital World
    TEN EIE VICTORIES Protecting and Defending Children and Families in the Digital World #1 - The National Safe WiFi Campaign Turns Up the Heat on Starbucks EIE called on Corporate America to filter porn and child porn on its public WiFi 50,000 petitions and 75 partner organizations encouraged McDonald’s and Starbucks to lead Corporate America in this effort McDonald’s is now filtering WiFi in 14,000 stores nationwide and Subway in its company-owned stores On November 26, EIE turned up the heat on Starbucks in a national media and petition campaign for not holding its promise to filter pornography and child porn on its WiFi; Starbucks responded to EIE’s campaign within 24 hours and once again publicly pledged (via businessinsider.com) to offer safe WiFi beginning in 2019. The media campaign went viral with hundreds of media reports worldwide in the first week alone, including Forbes, CBS, NBC, Newsweek, The Washington Post and many others. Next Steps: Hold Starbucks accountable to follow through on its latest commitment made. Secure more commitments from restaurants, hotels/resorts, universities, retailers, shopping malls, libraries, travel industry,(planes, trains, buses);& churches both nationally & globally to provide safe WiFi. #2 - The Children’s Internet Safety Presidential Pledge, State Attorney Generals and Governor’s Pledges Donald Trump signed EIE’s historic and bi- partisan Children’s Internet Safety Presidential Pledge (and Hillary Clinton sent a letter of support) agreeing to enforce the existing federal obscenity, child pornography, sexual predation, and child trafficking laws and advance public policies to prevent the sexual exploitation of children online.
    [Show full text]
  • HOUSE of REPRESENTATIVES—Monday, February 8, 1999
    1976 CONGRESSIONAL RECORD—HOUSE February 8, 1999 HOUSE OF REPRESENTATIVES—Monday, February 8, 1999 The House met at 2 p.m. (Mr. BIDEN) as Vice Chairman of the Dimitri B. Papadimitriou, of New The Chaplain, Reverend James David Senate Delegation to the North Atlan- York; Ford, D.D., offered the following pray- tic Assembly during the One Hundred C. Richard D’Amato, of Maryland; er: Sixth Congress. and Let us pray using words of Psalm 46. The message also announced that Lester C. Thurow, of Massachusetts. God is our refuge and strength, a pursuant to sections 1928a–1928d of title The message also announced that very present help in trouble. 22, United States Code, as amended, the pursuant to Public Law 105–277, the Therefore we will not fear though the Chair, on behalf of the Vice President, Chair, on behalf of the Majority Lead- Earth should change, though the appoints the Senator from Delaware er, announces the appointment of mountains shake in the heart of the (Mr. ROTH) as Chairman of the Senate Manuel H. Johnson, of Virginia, to sea; though its waters roar and foam, Delegation to the North Atlantic As- serve as a member of the International though the mountains tremble with its sembly during the One Hundred Sixth Financial Institution Advisory Com- tumult. Congress. mission. Come behold the works of the Lord, The message also announced that The message also announced that how He has wrought desolations in the pursuant to sections 276h–276k, as pursuant to section 2761 of title 22, Earth. amended, the Chair, on behalf of the United States Code, the Chair, on be- He makes wars cease to the end of Vice President, appoints the Senator half of the President pro tempore, and the Earth; He breaks the bow, and from Connecticut (Mr.
    [Show full text]
  • 6/3/13 Office of Intellectual Freedom Publications Audiovisual File, 1974-2009
    6/3/13 Office of Intellectual Freedom Publications Audiovisual File, 1974-2009 Box 1: Audio recordings It Can Happen Here, 1975 (slide presentation with audiocassette) Freedom in America 1977 (2 filmstrips, 2 audio cassettes, a slide show, and a discussion guide on freedom of expression) Colloquium on School and School Library Censorship and Litigation, 1981 (12 magnetic audio tapes) Pornography on the Internet: A New Reality, AALL Annual Meeting, Minneapolis, 2001 (audiocassette) Video recordings Dave Baum Media Training for Judith Krug (2 videocassettes) Tell It Like It Is! On censorship of children’s books with Judy Blume & others (videocassette, 15 minutes) PEN Awards Ceremony, 2003 (videocassette) The Open Mind, Host: Richard D. Heffner, guest: Judith Krug, “Intellectual Freedom and America’s Libraries”, 2004 (videocassette) Box 2: “Books on Trial”, Camera at Large series, WCAU-TV Philadelphia, Charles Shaw, moderator, discussion of Tropic of Cancer censorship, c. 1961 (film cannister) The Speaker, 1977 (2 film cannisters) Box 3: “Controlling the Confrontation,” 1989 and Interviews with Barney Rossett and Allen Ginsberg, VHS “Reading Your Rights” and “Of Rights and Wrongs, ” VHS “The Speaker” and “Caught in the Crossfire,” VHS “Presentation of Karen Schneider on Internet Filtering,” 1998 and Presentations of Anne Kappler on the Internet and the Law, VHS, 1998 (two folders) “Tell It Like it Is!” ca. 2000s and “Child Pornography?” VHS, 2000 “Live Free,” DVD, 2004 Acapulco 7-8-2000 (two parts) and Ethics, 6-26-2006 (two parts), cassette Memorial-Judith Krug, 2009 (DVD has been digitized) Academic Freedom Workshop, David Staver, “Community Relations,” March 18, 1978 Academic Freedom Workshop, Bill North and Pat Ferguson, “The Legal Scene and Education,” March 18, 1978 Academic Freedom Workshop, Midge Miller and Charlotte Zietlow, “The Legislative Process,” March 18, 1978 “Are You Being Screwed Electronically?”, COPE, (two cassettes), 1987 “Citizens for Decency Through Law,” Raymond P.
    [Show full text]
  • Religious Technology Center V. Netcom On-Line Communications
    Richmond Journal of Law and Technology Volume 3 | Issue 1 Article 7 1997 Religious Technology Center v. Netcom On-Line Communications Services, Inc.: The Knowledge Standard for Contributory Copyright Infringement and the Fair Use Doctrine Eugene A. Burcher [email protected] Anna M. Hughes University of Richmond, [email protected] Follow this and additional works at: http://scholarship.richmond.edu/jolt Part of the Intellectual Property Law Commons, and the Internet Law Commons Recommended Citation Eugene A. Burcher & Anna M. Hughes, Religious Technology Center v. Netcom On-Line Communications Services, Inc.: The Knowledge Standard for Contributory Copyright Infringement and the Fair Use Doctrine, 3 Rich. J.L. & Tech 5 (1997). Available at: http://scholarship.richmond.edu/jolt/vol3/iss1/7 This Notes & Comments is brought to you for free and open access by UR Scholarship Repository. It has been accepted for inclusion in Richmond Journal of Law and Technology by an authorized administrator of UR Scholarship Repository. For more information, please contact [email protected]. Religious Technology Center v. Netcom On-Line Communications Services, Inc. Internet Service Providers: The Knowledge Standard for Contributory Copyright Infringement and The Fair Use Defense By Eugene A. Burcher and Anna M. Hughes[*] July 15, 1996 Cite as: Eugene A. Burcher & Anna M. Hughes, Casenote, Religious Tech. Ctr. v. Netcome On-Line Communications, Inc.: Internet Service Providers: The Knowledge Standard for Contributory Copyright Infringement and The Fair Use Defense, 3 RICH. J.L. TECH. 5 (1997) <http://www.richmond.edu/jolt/v3i1/burhugh.html>[**]. I. Introduction II. The Technology A. The Internet B.
    [Show full text]
  • I Think It Is a Good Departure Point
    IDENTIFYING THE RELATIONSHIP BETWEEN THE INCREASE USE OF THE INTERNET AS A COMMUNICATION TOOL AND SEXUAL ASSAULTS ON CHILDREN By Gregory Alexander Hicks A thesis submitted in fulfillment of a Master of Science Degree in Criminal Justice To: Dr. Hal Campbell 7 April 2007 Florida Metropolitan University 1 EPIGRAPH I have a dream that one day every valley shall be exalted, every hill and mountain shall be made low, the rough places will be made plain and the crooked places will be made straight, “and the glory of the Lord shall be revealed, and all flesh shall see it together.” This is our hope. This is the faith that I go back to the south with. With this faith we will be able to hew out the mountain of despair, a stone of hope. With this faith we will be able to transform the jangling discords of our nation into a beautiful symphony of brotherhood. With this faith we will be able to work together, to pray together, to struggle together, to go to jail together, to stand up for freedom together, knowing that we will be free one day. And this will be the day. This will be the day when all of God’s children will be able to sing with new meaning, “My country ‘tis of thee, sweet land of liberty, of thee I sing. Land where my fathers died, land of the pilgrim’s pride, from every mountain side, let freedom ring.” And if America is to be a great nation, this must become true. - Martin Luther King Jr.
    [Show full text]
  • Jargon File, Version 4.0.0, 24 Jul 1996
    JARGON FILE, VERSION 4.0.0, 24 JUL 1996 This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor. This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached. Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.0.0" or "The on-line hacker Jargon File, version 4.0.0, 24 JUL 1996".) The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include: Eric Raymond [email protected] Although there is no requirement that you do so, it is considered good form to check with an editor before quoting the File in a published work or commercial product. We may have additional information that would be helpful to you and can assist you in framing your quote to reflect not only the letter of the File but its spirit as well.
    [Show full text]