Congressional Record—Senate S9017
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Freedom of Speech at Risk in Cyberspace: Obscenity Doctrine and a Frightened University's Censorship of Sex on the Internet
NOTES THE FREEDOM OF SPEECH AT RISK IN CYBERSPACE: OBSCENITY DOCTRINE AND A FRIGHTENED UNIVERSITY'S CENSORSHIP OF SEX ON THE INTERNET JEFFREY E. FAUCETrE INTRODUcTION On November 8, 1994, Carnegie Mellon University (CMU) removed' a small handful of topics from among the thousands of Usenet newsgroups2 subscribed to by the university computer sys- tem and available on the Internet' .because they contained en- coded sexually explicit images Under the new policy announced by Erwin Steinberg, university vice provost for education, none of the university's 9,000 computers would list the approximately forty newsgroups.5 The newsgroups that were censored are all known as "binaries,"6 and they contain, among other things, encoded imag- 1. Despite the University's restriction on the sexually explicit newsgioups, techno- logically adept students can circumvent the policy by accessing the groups through other file servers. However, for the purposes of this Note, the efforts of these enterprising students are not important when compared with the symbolic effect of the censorship. 2. These newsgroups are "bulletin board-style discussion groups" that can be read from, responded to, and downloaded to an individual's computer. See David Landis, Ex- ploring the Online Universe, USA TODAY, Oct. 7, 1993, at 4D. The Usenet newsgroups are available worldwide via Internet. See id. 3. The Internet is the most commonly known "wide area network" (WAN). It "evolved from networks established by the Department of Defense and the National Science Foundation. [The] Internet connects various government, university, and corporate entities, spans 137 nations, and has at least fifteen million users." Eric Schlachter, Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differ- ences in Computer Bulletin Board Functions, 16 HASTINGS COMM. -
Table of Contents
The secret structure that steers Defense and Foreign Policy behind the facade of 'Democracy.' SUMMER 2001 - Volume 1, Issue 3 from TrueDemocracy Website Table of Contents EDITORIAL North American Aerospace Defense Command (NORAD) THE SHADOW GOVERNMENT Air Force Office of Space Systems National Aeronautics and Space Administration (NASA) 1. The Executive Branch NASA's Ames Research Center Council on Foreign Relations Project Cold Empire Trilateral Commission Project Snowbird The Bilderberg Group Project Aquarius National Security Council Project MILSTAR Joint Chiefs of Staff Project Tacit Rainbow National Program Office Project Timberwind Federal Emergency Management Agency (FEMA) Project Code EVA Project Cobra Mist 2. Intelligence Branch Project Cold Witness National Security Agency (NSA) National Reconnaissance Office (NRO) 4. Weapons Industry National Reconnaissance Organization Stanford Research Institute, Inc. Central Intelligence Agency (CIA) AT&T Federal Bureau of Investigation , Counter Intelligence Division RAND Corporation (FBI) Edgerton, Germhausen & Greer Corporation Department of Energy Intelligence Wackenhut Corporation NSA's Central Security Service and CIA's Special Bechtel Corporation Security Office United Nuclear Corporation U.S. Army Intelligence and Security Command (INSCOM) Walsh Construction Company U.S. Navy Office of Naval Intelligence (ONI) Aerojet (Genstar Corporation) U.S. Air Force Office of Special Investigations (AFOSI) Reynolds Electronics Engineering Defense Intelligence Agency (DIA) Lear Aircraft Company NASA Intelligence Northrop Corporation Air Force Special Security Service Hughes Aircraft Defense Industry Security Command (DISCO) Lockheed-Maritn Corporation Defense Investigative Service McDonnell-Douglas Corporation Naval Investigative Service (NIS) BDM Corporation Air Force Electronic Security Command General Electric Corporation Drug Enforcement Agency (DEA) PSI-TECH Corporation Federal Police Agency Intelligence Science Applications International Corporation (SAIC) Defense Electronic Security Command Project Deep Water 5. -
Supplemental Memo on DOJ Grantmaking
HENRY A. WAAMAN, CAUFORNIA, TOM DAVIS, VIRGINIA, CHAIRMAN RANKING MINORITY MEMBER TOM LANTOS, CALIFORNIA ONE HUNDRED TENTH CONGRESS DAN BURTON, INDIANA EDOLPHUS TOWNS, NEW YORK CHRISTOPHER SHAYS, CONNECTICUT PAUL E. KANJORSKI, PENNSYLVANIA JOHN M. McHUGH. NEW YORK CAROLYN B. MALONEY, NEW YORK JOHN L. MICA, FLORIDA EUJAH E. CUMMINGS, MARYLAND ([ongrt~~ ~tatt~ of tbt Wnfttb MARK E. SOUDER. INDIANA DENNIS J. KUCINICH, OHIO TODD RUSSELL PLATTS, PENNSYLVANIA DANNY K. DAVIS, ILUNOIS CHRIS CANNON. UTAH JOHN F. TIERNEY, MASSACHUSETTS 1!,JOU~t l\tprt~tntatibt~ JOHN J. DUNCAN. JR., TENNESSEE WM. LACY CLAY, MISSOURI of MICHAEL R. TURNER, OHIO DIANE E. WATSON, CAUFORNIA DARRELL E. ISSA, CAUFORNIA STEPHEN F. LYNCH, MASSACHUSETTS KENNY MARCHANT. TEXAS BRIAN HIGGINS, NEW YORK COMMITIEE ON OVERSIGHT AND GOVERNMENT REFORM LYNN A. WESTMORELAND. GEORGIA JOHN A. YARMUTH, KENTUCKY PATRICK T. McHENRY, NORTH CAROLINA BRUCE L. BRALEY, IOWA RAYBURN HOUSE OFFICE BUILDING VIRGINIA FOXX, NORTH CAROUNA ELEANOR HOLMES NORTON, 2157 BRIAN P. BILBRAY. CAUFORNIA DISTRICT OF COLUMBIA BILL SALI. IDAHO BETTY McCOLLUM, MINNESOTA WASHINGTON, DC 20515-6143 JIM JORDAN, OHIO JIM COOPER, TENNESSEE CHRIS VAN HOLLEN, MARYLAND MAJORITY (202) 225-5051 PAUL W. HODES, NEW HAMPSHIRE FACSIMILE (202) 225-4784 CHRISTOPHER S. MURPHY, CONNECTICUT MINORITY (202) 225-5074 JOHN P. SARBANES, MARYLAND PETER WELCH, VERMONT www.oversight.house.gov MEMORANDUM June 19,2008 To: Members ofthe Committee on Oversight and Government Reform Fr: Committee on Oversight and Government Reform, Majority Staff Re: Supplemental Information for Full Committee Hearing on Department ofJustice Grantmaking On Thursday, June 19,2008, at 10:00 a.m. in room 2154 ofthe Rayburn House Office Building, the full Committee will hold a hearing on grantmaking practices at the Department of Justice. -
Against Cyberanarchy"
AGAINST "AGAINST CYBERANARCHY" By David G. Posit TABLE OF CONTENTS I. IN TRO DUCTION .....................................................................................................1365 II. UNEXCEPTIONALISM IN CYBERSPACE ................................................................... 1366 III. SETTLED PRINCIPLES ............................................................................................ 1371 IV . FUNCTIONAL IDENTITY ......................................................................................... 1373 V . SC A LE ...................................................................................................................1376 V I. E FFEC TS ................................................................................................................ 138 1 V II. CON SEN T ..............................................................................................................1384 V III. CONCLUDING THOUGHTS .....................................................................................1386 I. INTRODUCTION It makes me indignant when I hear a work Blamed not because it's crude or graceless but Only because it's new... Had the Greeks hated the new the way we do, Whatever would have been able to grow to be old?' Professor Jack Goldsmith's Against Cyberanarchy2 has become one of the most influential articles in the cyberspace law canon. The position he sets forth-what I call "Unexceptionalism"-rests on two main premises. The first is that activity in cyberspace is "functionally identical to -
Usenet News HOWTO
Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6 -
The Internet Is a Semicommons
GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books. -
TEN EIE VICTORIES Protecting and Defending Children and Families in the Digital World
TEN EIE VICTORIES Protecting and Defending Children and Families in the Digital World #1 - The National Safe WiFi Campaign Turns Up the Heat on Starbucks EIE called on Corporate America to filter porn and child porn on its public WiFi 50,000 petitions and 75 partner organizations encouraged McDonald’s and Starbucks to lead Corporate America in this effort McDonald’s is now filtering WiFi in 14,000 stores nationwide and Subway in its company-owned stores On November 26, EIE turned up the heat on Starbucks in a national media and petition campaign for not holding its promise to filter pornography and child porn on its WiFi; Starbucks responded to EIE’s campaign within 24 hours and once again publicly pledged (via businessinsider.com) to offer safe WiFi beginning in 2019. The media campaign went viral with hundreds of media reports worldwide in the first week alone, including Forbes, CBS, NBC, Newsweek, The Washington Post and many others. Next Steps: Hold Starbucks accountable to follow through on its latest commitment made. Secure more commitments from restaurants, hotels/resorts, universities, retailers, shopping malls, libraries, travel industry,(planes, trains, buses);& churches both nationally & globally to provide safe WiFi. #2 - The Children’s Internet Safety Presidential Pledge, State Attorney Generals and Governor’s Pledges Donald Trump signed EIE’s historic and bi- partisan Children’s Internet Safety Presidential Pledge (and Hillary Clinton sent a letter of support) agreeing to enforce the existing federal obscenity, child pornography, sexual predation, and child trafficking laws and advance public policies to prevent the sexual exploitation of children online. -
HOUSE of REPRESENTATIVES—Monday, February 8, 1999
1976 CONGRESSIONAL RECORD—HOUSE February 8, 1999 HOUSE OF REPRESENTATIVES—Monday, February 8, 1999 The House met at 2 p.m. (Mr. BIDEN) as Vice Chairman of the Dimitri B. Papadimitriou, of New The Chaplain, Reverend James David Senate Delegation to the North Atlan- York; Ford, D.D., offered the following pray- tic Assembly during the One Hundred C. Richard D’Amato, of Maryland; er: Sixth Congress. and Let us pray using words of Psalm 46. The message also announced that Lester C. Thurow, of Massachusetts. God is our refuge and strength, a pursuant to sections 1928a–1928d of title The message also announced that very present help in trouble. 22, United States Code, as amended, the pursuant to Public Law 105–277, the Therefore we will not fear though the Chair, on behalf of the Vice President, Chair, on behalf of the Majority Lead- Earth should change, though the appoints the Senator from Delaware er, announces the appointment of mountains shake in the heart of the (Mr. ROTH) as Chairman of the Senate Manuel H. Johnson, of Virginia, to sea; though its waters roar and foam, Delegation to the North Atlantic As- serve as a member of the International though the mountains tremble with its sembly during the One Hundred Sixth Financial Institution Advisory Com- tumult. Congress. mission. Come behold the works of the Lord, The message also announced that The message also announced that how He has wrought desolations in the pursuant to sections 276h–276k, as pursuant to section 2761 of title 22, Earth. amended, the Chair, on behalf of the United States Code, the Chair, on be- He makes wars cease to the end of Vice President, appoints the Senator half of the President pro tempore, and the Earth; He breaks the bow, and from Connecticut (Mr. -
6/3/13 Office of Intellectual Freedom Publications Audiovisual File, 1974-2009
6/3/13 Office of Intellectual Freedom Publications Audiovisual File, 1974-2009 Box 1: Audio recordings It Can Happen Here, 1975 (slide presentation with audiocassette) Freedom in America 1977 (2 filmstrips, 2 audio cassettes, a slide show, and a discussion guide on freedom of expression) Colloquium on School and School Library Censorship and Litigation, 1981 (12 magnetic audio tapes) Pornography on the Internet: A New Reality, AALL Annual Meeting, Minneapolis, 2001 (audiocassette) Video recordings Dave Baum Media Training for Judith Krug (2 videocassettes) Tell It Like It Is! On censorship of children’s books with Judy Blume & others (videocassette, 15 minutes) PEN Awards Ceremony, 2003 (videocassette) The Open Mind, Host: Richard D. Heffner, guest: Judith Krug, “Intellectual Freedom and America’s Libraries”, 2004 (videocassette) Box 2: “Books on Trial”, Camera at Large series, WCAU-TV Philadelphia, Charles Shaw, moderator, discussion of Tropic of Cancer censorship, c. 1961 (film cannister) The Speaker, 1977 (2 film cannisters) Box 3: “Controlling the Confrontation,” 1989 and Interviews with Barney Rossett and Allen Ginsberg, VHS “Reading Your Rights” and “Of Rights and Wrongs, ” VHS “The Speaker” and “Caught in the Crossfire,” VHS “Presentation of Karen Schneider on Internet Filtering,” 1998 and Presentations of Anne Kappler on the Internet and the Law, VHS, 1998 (two folders) “Tell It Like it Is!” ca. 2000s and “Child Pornography?” VHS, 2000 “Live Free,” DVD, 2004 Acapulco 7-8-2000 (two parts) and Ethics, 6-26-2006 (two parts), cassette Memorial-Judith Krug, 2009 (DVD has been digitized) Academic Freedom Workshop, David Staver, “Community Relations,” March 18, 1978 Academic Freedom Workshop, Bill North and Pat Ferguson, “The Legal Scene and Education,” March 18, 1978 Academic Freedom Workshop, Midge Miller and Charlotte Zietlow, “The Legislative Process,” March 18, 1978 “Are You Being Screwed Electronically?”, COPE, (two cassettes), 1987 “Citizens for Decency Through Law,” Raymond P. -
Religious Technology Center V. Netcom On-Line Communications
Richmond Journal of Law and Technology Volume 3 | Issue 1 Article 7 1997 Religious Technology Center v. Netcom On-Line Communications Services, Inc.: The Knowledge Standard for Contributory Copyright Infringement and the Fair Use Doctrine Eugene A. Burcher [email protected] Anna M. Hughes University of Richmond, [email protected] Follow this and additional works at: http://scholarship.richmond.edu/jolt Part of the Intellectual Property Law Commons, and the Internet Law Commons Recommended Citation Eugene A. Burcher & Anna M. Hughes, Religious Technology Center v. Netcom On-Line Communications Services, Inc.: The Knowledge Standard for Contributory Copyright Infringement and the Fair Use Doctrine, 3 Rich. J.L. & Tech 5 (1997). Available at: http://scholarship.richmond.edu/jolt/vol3/iss1/7 This Notes & Comments is brought to you for free and open access by UR Scholarship Repository. It has been accepted for inclusion in Richmond Journal of Law and Technology by an authorized administrator of UR Scholarship Repository. For more information, please contact [email protected]. Religious Technology Center v. Netcom On-Line Communications Services, Inc. Internet Service Providers: The Knowledge Standard for Contributory Copyright Infringement and The Fair Use Defense By Eugene A. Burcher and Anna M. Hughes[*] July 15, 1996 Cite as: Eugene A. Burcher & Anna M. Hughes, Casenote, Religious Tech. Ctr. v. Netcome On-Line Communications, Inc.: Internet Service Providers: The Knowledge Standard for Contributory Copyright Infringement and The Fair Use Defense, 3 RICH. J.L. TECH. 5 (1997) <http://www.richmond.edu/jolt/v3i1/burhugh.html>[**]. I. Introduction II. The Technology A. The Internet B. -
I Think It Is a Good Departure Point
IDENTIFYING THE RELATIONSHIP BETWEEN THE INCREASE USE OF THE INTERNET AS A COMMUNICATION TOOL AND SEXUAL ASSAULTS ON CHILDREN By Gregory Alexander Hicks A thesis submitted in fulfillment of a Master of Science Degree in Criminal Justice To: Dr. Hal Campbell 7 April 2007 Florida Metropolitan University 1 EPIGRAPH I have a dream that one day every valley shall be exalted, every hill and mountain shall be made low, the rough places will be made plain and the crooked places will be made straight, “and the glory of the Lord shall be revealed, and all flesh shall see it together.” This is our hope. This is the faith that I go back to the south with. With this faith we will be able to hew out the mountain of despair, a stone of hope. With this faith we will be able to transform the jangling discords of our nation into a beautiful symphony of brotherhood. With this faith we will be able to work together, to pray together, to struggle together, to go to jail together, to stand up for freedom together, knowing that we will be free one day. And this will be the day. This will be the day when all of God’s children will be able to sing with new meaning, “My country ‘tis of thee, sweet land of liberty, of thee I sing. Land where my fathers died, land of the pilgrim’s pride, from every mountain side, let freedom ring.” And if America is to be a great nation, this must become true. - Martin Luther King Jr. -
Jargon File, Version 4.0.0, 24 Jul 1996
JARGON FILE, VERSION 4.0.0, 24 JUL 1996 This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor. This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached. Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.0.0" or "The on-line hacker Jargon File, version 4.0.0, 24 JUL 1996".) The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include: Eric Raymond [email protected] Although there is no requirement that you do so, it is considered good form to check with an editor before quoting the File in a published work or commercial product. We may have additional information that would be helpful to you and can assist you in framing your quote to reflect not only the letter of the File but its spirit as well.