Interesting People mailing list archives

Protection and The Internet Steve Cisler Apple Library


From: David Farber <farber () central cis upenn edu>
Date: Wed, 27 Oct 1993 15:51:40 -0400

Protection and The Internet
Steve Cisler
Apple Library


"The unprecedented environment has produced a temperament volatile and
mercurial, marked by uncalculating ardor, enterprise, intrepidity, and
insatiable hunger for innovation, out of which has grown a society that has
been alternately the reproach and marvel of mankind." --John Ingalls
writing about the Great Plains (1902) quoted in W.P. Webb The Great Plains
Grossett and Dunlap 1931.


Summary: Now that the Internet is becoming popular, many people and
organizations want to protect the Internet, protect people from the
Internet, protect individual systems from casual visitors, protect
children from access to certain files and online interactions, and protect
whole cultures from outside influences.


A few years ago, the head of a fee-based online service was asked when the
Internet could be used to access his system. "Why should we hook our
drinking water supply to a sewage system?" was the gist of his reply. Some
time after that a special librarian for a large corporate library stated
that she felt it was her duty to keep the engineers and other patrons in
the company from using a dangerous and dirty system like the Internet. Of
course, they were already using it; she just did not want to get involved
at that time.  Both of these people wanted to protect their enterprise and
their users from what they saw as an uncontrollable, chaotic system, full
of dirty data, unruly computer intruders, foul-fingered Usenet orators,
corrupted programs, and unreliable connections. This view was indicative of
the kind of stratification of the online world. There was not very much
knowledge about or interest in learning about the different segments.
Professional online database searchers did not frequent the world of
Usenet. Internet users looked down at the bulletin board system operators,
and commercial consumer service providers were in their own separate world
with only a few links to these other worlds. CompuServe did not talk to
Fidonet which was unaware of Usenet, and the Internet was a loosely guarded
secret.


Suddenly that has changed, and the focus is on the Internet. The people and
organizations seeking connections, the ability to search for and provide
new information, and the countries where all of this is offered, have
increased at an exciting, alarming, and perhaps even exaggerated rate.
Vinton Cerf, one of the founding fathers of the Internet, argues that it
can now be considered mass media.  It certainly has become mainstream. Not
only do we see jokes about the Internet in the New Yorker, we find
selections from the New Yorker on the Internet. It is reaching Indian
tribes in the U.S., the capitals in Azerbaijan, Mozambique, Croatia, Peru,
Beaverhead County, Montana, and schools throughout Texas. While just a
small fraction of the world's computer users are connected, and even fewer
understand all they are connected to, the Internet offers the dream of
connectivity to many millions in rural and urban areas all over the world.
Even the cable companies, who looked upon the Internet as "invisible" or as
a sideshow in early 1993, are going to offer connections to their customers
by the end of 1993.


Up to 1991 the culture of the Internet has been synonymous with openness,
lack of central control and governance, non-commercial in nature, a place
for experimentation and rapid implementation and change. Some are fond of
comparing the Internet to a frontier. This is due in part to the growth of
the Unix operating system and the intellectual climate in the academic
computing centers and government research labs where Unix and the Internet
spread in the 1980's. In the 1990's we are seeing a concentration on new
tools for users and administrators which in turn is bringing ease of use,
an enormous leap in the amount and kind of content available, and this is
attracting the rush of individuals, companies, schools, libraries,
governments, businesses, and non-profits to the network. With the arrival
of new users, many of them from the commercial sector, a series of cultural
and policy-based brushfires have been started. Stated in crude binary
terms, they center on fee versus free, open and closed systems, anarchic
versus governed, private and anonymous versus centralized secure systems
with accountability, indexed information versus raw data, unimpeded rivers
of data versus filtered, bottled, and marketed information, free speech
versus censorship, access for some versus universal access, flat-rate
pricing versus packets/mile charges, cultural preservation versus cultural
disintegration, and centralized sources of information versus every user as
publisher.


PROTECT: to cover or shield from that which would injure, destroy, or
detrimentally affect; secure or preserve usually against attack,
disintegration, encroachment, or harm.  --Webster's Third New International
Dictionary




As the network traffic explodes in size, diversity, and number of users,
many people including users, administrators, and people not on the Net are
trying to "protect" people, systems, data from use, abuse, or access. As a
librarian, I am interested in extending access to more people, helping them
find  the information, as well as, the personal contacts they need, and in
encouraging the use of the networks to publish that information.  While I
understand the motivation for the practices, it is obvious that many of the
protection methods will decrease the amount of information and narrow the
conditions by which a group of users can get the information. You will
always find some on the Net who believe that it is justified, and many more
who think it's wrong, impossible, or just foolish to try and restrain
access.


The most obvious forms of protections are restricting access to a computer
system,  protecting intellectual property, or keeping certain people from
seeing, doing, or using certain resources. I am not going to discuss the
cryptology wars now raging over the Clipper Chip, RSA algorithms, and
Pretty Good Privacy (PGP) software except to say that it's a very large
issue. In mid-September small American encryption firms are being called in
for some serious discussions with federal officials. Contact the Electronic
Frontier Foundation (ssteele () eff org) for updates on this controversy.


Anonymity


A long-running argument about the value or danger of anonymity can generate
as much heat as light. Some  argue that many people will be afraid to post
their thoughts and comments if they cannot be anonymous. Frequently cited
are people wanting an open forum on substance abuse, mental illness, rape,
and other sensitive topics. Anonymous mailing services have been set up in
Australia and Finland. However, the anonymous mailers have been used by
individuals who carry online flame wars into another realm. They have used
these services to attack their enemies, make false accusations, one of
which resulted in the loss of the victim's job. While the victims are
fairly sure of the perpetrator, they cannot prove it because he is using an
anonymous mailing service.




There are some more subtle issues we all must face. These are related to
the use of the Internet by young people, by cultural groups where the users
are not aware of the range of information on the Internet, use of anonymous
mailers for spreading slanderous information, the manipulation of software
tools  to change information access, and the editing of files to "cleanse"
them of objectionable information. Even though librarians have had a lot of
experience with book, video, and music censorship battles, these are much
less clear-cut from an intellectual freedom standpoint, and that is only
one aspect of the discussion in most cases.


Access for Elementary and Secondary Schools


Mike Roberts of EDUCOM says that approximately 10% of the American K12
schools have some sort of Internet connection. Materials used and
activities undertaken by elementary and secondary school students comes
under a good deal of scrutiny. This varies by grade level, by school, by
district, and by state. It will be no different when Internet activities
are included in many classrooms. Educators who plan to offer Internet
access immediately confront the challenge of Usenet and anonymous ftp
files. There is a fairly strong consensus that the students must be
protected from some of these discussions and some of the files. The
reasoning comes in various flavors: Some say that they personally don't
find the material objectionable but if the conservative elements in the
state found out, the project would be threatened or canceled.  The
nightmare they have is of some legislator waving around a raunchy GIF image
"paid for with tax dollars and found on the State Educational Network", or
reading some choice posting from alt.sex.furry.critters or
alt.sex.necrophelia. This fear may be unfounded, but it tends to make some
administrators restrain themselves and avoid all Usenet groups. A sensible
compromise is taken by the Boulder Valley School District. Ken
Klingenstein, reported at INET'93 in San Francisco that school committees
are combing through the Usenet groups to save the best and most relevant.
With thousands available, few sites can subscribe to all of them (the
traffic is about 70 megabytes of messages each day). Providing access to
scientific and mathematical information is relatively uncontroversial for
most districts (unless creationism is vying for a place in the curriculum),
but many people are worried about the software, text files, and images that
anyone can access, providing the students learn how to use the arcane ftp
commands and tools for unpacking, converting and displaying the pictures.
Students with time and curiosity may become far more adept at using these
tools than over- worked teachers in some schools connected to the network.
And now the tools are improving where access is much easier.


Gopher


One of the more interesting Internet software projects are the gopher
clients and servers (See "Cool Tools for the Macintosh" Apple Library Users
Group Newsletter , Summer 1993). There are over 1500 public gopher spaces,
and the information being served is about everything imaginable. It ranges
from electronic texts of out-of-copyright books, to campus phone
directories, software libraries, pictures, archives of discussions, and
many unstructured databases. A special program called Veronica has been
written to help users find information within gopher. Veronica runs at
several different sites in the U.S. and Italy. Earlier this year, one site
was informed that when you did a veronica search on the word 'camping' you
reached information about homosexuals. The site modified the program not to
deliver any hits on 'camping'. They decided to protect their users from
material that might offend. Veronica can be configured to avoid searching
on any list of words. A 'stop word' list is usually done to save computer
cycles from looking up 'a', 'the', 'of', and the like. It can also be used
to omit seemingly innocent words like 'camping' or some of George Carlin's
favorite terms. Most users are not aware this is going on, that the
database is searched with a filter.


Some companies are working with the education community to provide network
access and services. Here is Richard Perlman of Pacific Bell describing
their effort:


"Pacific Bell is setting up access to the Internet for elementary and
secondary schools in California.  This, project part of Pacific Bell's
"Knowledge Network", is currently in a technology test authorized by the
California Public Utilities Commission. Pacific Bell is using the Internet
Gopher to present information in a variety of organizational schemes to
meet the needs of students in elementary, junior high school, high school
and community college as well as teachers and librarians.  Pacific Bell is
working with the schools to devise curriculum and lesson plans that
encourage and support the use of information networks as part of the
educational process.  They are also working with school staff and
administration to address issues of content acceptability and appropriate
use."


One possibility is that a young child would have access to one set of
menus, an older student to  more information, and the teacher or librarian
would have full access to all the gophers on the Knowledge Network.
However, Pacific Bell makes it clear that the most persistent user can find
ways around gopher filters, so no school should expect complete protection.


Gophers reflect the open culture of the Internet, and this has caused some
system administrators to wish for more tools to restrict access to the
power of gopher or even to the server itself.  John Stanley manages a
gopher server at the Coastal Imaging Laboratory at Oregon State University.
It is not openly advertised, but it is not totally closed either. In late
August, a heated discussion took place on comp.infosystems.gopher on Usenet
about Stanley's request that the Veronica sites not index his gopher. Some
felt that he was not abiding by unwritten etiquette (open, free
information, free access anytime), but what angered Stanley was that he
asked the indexers not to include information from his gopher, yet they
continued to do so. It seems as though it was more of a communications
(personal) problem than anything else. Stanley believed that the indexing
placed an unwelcome load on his machine, and he wanted to conserve his
computing resources for his users, not an indexing program in Italy.
Michael Morse of the National Science Foundation has proposed that the
gopher server software be delivered with the default set to "no index" and
allow each administrator to turn it on or leave it off.


While some argue about indexes to the information, others object to the
information itself. One gopher site received a great deal of criticism
because the letter writers thought the gopher administrator was posting
unflattering information about the Koran. The discussion in
soc.culture.islam on Usenet prompted many people to write and complain
about the definition of 'Koran" that is found in Ambrose Bierce's Devil's
Dictionary at wiretap.spies.com


KORAN, n.  A book which the Mohammedans foolishly believe to have been
written by divine inspiration, but which Christians know to be a wicked
imposture, contradictory to the Holy Scriptures.


The actual electronic file was not at the index site, only a pointer to
another gopher where the document resided.   By doing a search for other
locations of the same document, I found that the gopher at
ccat.sas.upenn.edu included a version of Bierce's dictionary and left out
the definition for Koran but included this one for Christian:


CHRISTIAN, n.  One who believes that the New Testament is a divinely
inspired book admirably suited to the spiritual needs of his neighbor.  One
who follows the teachings of Christ in so far as they are not inconsistent
with a life of sin.


That edition was broken up into folders for each letter of the alphabet
with each definition being a separate entry. Oddly, in another menu there
was a pointer to the wiretap.spies.com 'unexpurgated' version. Keep in mind
I was only looking for the 'koran' definition. Indeed, there may be several
versions of this dictionary floating around in ftp sites.  While the
Devil's Dictionary is not the Satanic Verses, this does raise the issue of
who is responsible for culling, controlling, and disseminating information,
even barbed witicisms written 80 years ago.


The gopher involved in the Koran controversy now posts this to head off
criticisms:


IF YOU FEEL THAT INFORMATION YOU HAVE OBTAINED VIA <the> GOPHER OR OTHER
INFORMATION SERVERS IS INACCURATE OR OFFENSIVE, WE SUGGEST YOU CONTACT THE
ORIGINAL PRODUCER/DISTRIBUTOR OF THAT INFORMATION.


Usenet


And now let us turn from religion to sex, figuratively speaking. New
communications media have frequently been used to convey sexual content. In
Victorian times there was much discussion about the way the telephone might
be used by people normally polite and restrained. The VCR industry began by
tapping the huge market of people wanting to view pornography (what you
like) and erotica (what I like) in their own homes. The French Minitel
system message traffic in the late 1980's included a huge proportion of
casual sexual banter, online cruising, and gender swapping.Some of the most
popular CD-ROMs don't mention ERIC and MARC, but Valerie is exposed for all
to see.


Because the Internet includes more and more information about human needs
and concerns, there is a load of discussions about sex, pictures, and even
animated video clips. Many old network hands hate to see this mentioned
because it's always over-emphasized by novice reporters who are looking for
the sensational.


Joe Abernathy, who used to report for the Houston Chronicle, wrote an
introduction to the Internet and its use as a vehicle for sexual material.
The firestorm of criticism has not totally died down after several years,
partly because of the opening lines


"Westbury High School student Jeff Noxon's homework was rudely
 interrupted recently when he stumbled across the world's most sophisticated
 pornography ring."
 -posted on com-priv () psi com July 11, 1991 by Abernathy


Abernathy weathered the criticism and went on to write about other Internet
events.Some people forgave him for his initial article; others did not.
People feel strongly about the Internet...and about sex. The clashes occur
on the network and in discussions about access to pictures, jokes,
discussions, and stories. These are all found in Usenet, where some of the
most popular news groups are the controversial alt (for alternate)
hierarchy. Estimates place the readership of alt.binaries.pictures.erotica
at 150,000 in August 1993. 853 messages were posted, but because they were
large image files, this group accounted for about 43 megabytes of traffic
in a month whereas rec.arts.tv.soaps had 45,000 readers, 5125 messages
accounting for about 10.5 megabytes per month. About 56% of the Usenet
sites receive the erotica group. Why don't the others? There are many
reasons. Some administrators consider all of the alt.groups a waste of disk
space and cpu time; others omit the picture groups because of the file size
and sometimes because of the content. For instance, Apple does not carry
the picture groups because of copyright problems with some of the scanned
images, and the administrator does not have time to figure out which
present intellectual property problems and which do not. Other firms are
concerned about sexual harassment charges from employees who find the
material offensive, so the manager removes it. In some cases, women have
complained when the groups were removed, even more than male readers. Using
gopher and a little perseverance any of the Usenet groups can be accessed,
even those that have been dropped from the Usenet master list of your home
machine.


Public Archives


In addition there are public (ftp) archives that contain controversial
material. Some of these may show up in a gopher listing; other archive
lists are passed among interested parties. Usually, they are not posted
because the flood of ftp sessions would slow down the file server.In one
case several years ago, administrators ruled that public directories on the
university system should not devote space to nudes and X-rated images. The
solution was for each individual to copy favorite files into the personal
directory (some on the same machine). This took up much more room than
having a central, public file, but it permitted the university from totally
removing the files.


It is my opinion that the number of files that will offend are hidden by
the vast total number of files available, but the resource discovery tools
are being sharpened, polished, and are easier to use. This will bring more
people online, and the curious will be able to cruise the backwaters of the
Net with relative ease. Many will come back to share their adventures.


Many cultures express concern about cultural disintegration by trying to
keep out alien influences: rock music, foreign languages, other political
ideas, alternative ways for men and women to relate to each other, poetry,
This will be done by stressing the negative points of the outside influence
and the strengths of the home culture. Because more traditional and
sometimes authoritarian groups (countries, companies, Indian nations, and
religions) have a growing presence on the Internet, they will be looking
for ways of filtering what their users see and use as access is extended.


We are working with some Indian tribes to put historical photographs and
artwork online to share with others. One museum curator showed me some
photographs repatriated from the Smithsonian to the tribe. "Actually, these
will only be available to initiated males over 14 years old." The
photographs of the sacred dances (and the dances themselves) must be
protected. So there is a constant tension between the Indians wish to make
information available and to protect sacred information.


I hope the few issues that I have raised will generate discussion in the
library community because we have strong ideals of openness that are not
always well understood in a new environment like the Internet. If our role
as guides, editors, and electronic librarians is valid, we will have to
repeatedly confront these challenges.


Current thread: