"Congressional Efforts to Regulate Cyberspace: Slowing Down Big Brother"

by Charles L. Mudd, Jr.


Most everyone familiar with the Internet and its gui-based World Wide Web knows of the Communications Decency Act ("CDA") and the blue ribbon campaign launched only a few years ago.1 The CDA constitutes Congress' most emphatic and salient attempt to engage in legislating the Internet and its netizens. The CDA attempted to regulate speech and content on a communications medium that had long been self-regulated, if regulated at all. When the Internet's population explosion was still quite young, discussions raged on whether legislation should or would occur. Some writers suggested the authoring of protype legislation on certain areas certain to be encroached upon by congressional mandates.2 At the time, these suggestions often received responses characterized by incredulousness and plain repulsion to the idea of any legislative initiatives.

Unfortunately, the suggested prototypes did not come to fruition. Rather, as the Internet experienced greater growth both in population and media coverage, certain problems emerged that soon became salient and politically attractive.3 Consequently, Congress embarked on an effort to infiltrate the Internet and its domains with proposed regulations that more often than not were ill conceived, ill timed, and ineffective. Thus, the CDA marked the end of an era wherein the Internet and its netizens enjoyed widespread freedom and self-governance.4 The Internet will be regulated, and Congress will continue to enact poorly written statutes affecting net behavior.5 Thus, the CDA also marks the beginning of a second era of congressional response to cyberspace. As advocates testify before hearings, wage campaigns against legislative initiatives, and combat unconstitutional statutes in the courts, Internet advocates will continue to demand an opportunity to be heard and will fulfill their obligation to affect the way in which the Internet is regulated and defined for the twenty-first century. This "war" describes the second era of congressional response on which this article will focus.6

This article serves as both a critique of congressional efforts to regulate cyberspace and as a strategy for obtaining "peace" by cooperative efforts in constructing a fair and constitutional regulatory regime. First, the CDA and the more recent Children's Online Protection Act ("COPA") are analyzed in light of the recent court decisions affecting their validity. From these two acts, a paradigm is defined that serves as a vehicle from which most congressional efforts to regulate cyberspace may be recognized as ill conceived, ill timed, and ineffective. Second, this paradigm is applied to certain other congressional efforts effecting cyberspace and the Internet. This application reinforces the constructs of the paradigm. Finally, a discussion of the consequences of the paradigm's validity conclude with a peace process proposal for securing the Constitution in cyberspace while at the same time enabling Congress the ability to effectively address identifiable state interests arising from conduct in cyberspace.

I. CDA and COPA

The CDA and COPA represent Congress' most ambitious effort to regulate behavior within cyberspace. In addition, they represent the epitome of congressional actions motivated by politically salient topics and coupled with a sexy element relating to emerging technology. Unfortunately, this breed of congressional legislative action is marked by several flaws. First, the legislation is constitutionally unsound. The legislation is either over broad or too vague, or clearly opposite to our fundamental constitutional rights. Second, the legislation targets an issue that encompasses a broad appeal to the populace that may indeed be worthy of some legislative initiative. At the same time, the legislation attacks behavior on the Internet. In turn, the legislation is marketed by arguments that contend the interests to be protected (invoked by the populace issue) far outweigh the rights of those affected. Third, there are a few, if not several, alternatives to the proposed legislative action. Finally, the legislation tends to suggest the authors are unfamiliar with the behavioral environment of cyberspace and the complexities, both legal and physical, of the Internet and online communities. Analyzing both the CDA and COPA, in light of their attributes and subsequent deconstruction by the courts, reveals a paradigm reflected by the characteristics outlined above.

A. CDA: The Legislative Beginnings

On July 26, 1994, Senator Exon introduced an amendment ("Exon Amendment") to the Senate telecommunications reform bill then under consideration by the Senate Commerce Committee.7 The Exon Amendment sought to amend the Communications Act of 1934 ("1934 Act") by holding owners of telecommunications facilities liable for knowingly permitting their facility to be used for any purpose prohibited under the 1934 Act.8 The amendment further intended to amend the prohibited purposes to include "'mak[ing], transmit[ing], or otherwise mak[ing] available any comment, request, suggestion, proposal, image or other communication"9 "which is obscene, lewd, lascivious, filthy, or indecent."10 Senator Exon stated:

"Simply put, this Communications Decency amendment modernizes the anti-harassment, decency, and anti-obscenity provisions of the Communications Act of 1934. When these provisions were originally drafted, there were couched in the context of telephone technology. These critical public protections must be updated for the digital world of the future.

Before too long a host of new telecommunications devices will be used by citizens to communicate with each other. Telephones may one day be relegated to museums next to telegraphs. Conversation is being replaced with communication and electrical transmissions are being replaced with digital transmissions. As the Congress rewrites the Communications Act, it is necessary and appropriate to update these important public protections.

Anticipating this exciting future of communications, the Communications Decency amendment I introduce today will keep pace with the coming change.

References to telephones in the current law are replaced with references to telecommunications devices. The amendment also increases the maximum penalties connected with the decency provisions of the Communications Act to $100,000 and 2 years imprisonment . . . .

These measures will help assure that the information superhighway does not turn into a red light district. It will help protect children from being exposed to obscene, lewd, or indecent messages."11

However, the Exon Amendment, along with the telecommunications reform bill, died at the end of the 103rd Congress.
On February 1, 1995, Senator Exon introduced legislation substantively identical to the Exon Amendment entitled the "Communications Decency Act of 1995" ("Exon Bill").12 The Exon Bill again sought to hold owners of telecommunications facilities liable for knowingly permitting their facilities to be used for the making or transmitting of any communication that could be considered "obscene, lewd, lascivious, filthy, or indecent."13 Essentially, the Exon Bill intended to "simply apply the laws that are now enforced on telephones over to and on the new information superhighway."14 Senator Exon stated that "young people, especially small children, should be able to cruise that superhighway without being endangered by a whole series of smut, pornography . . . ."15 Once introduced, the Exon Bill was referred to the Senate Commerce Committee.

Immediately, the Exon Bill received widespread criticism. Perhaps, the most widespread complaint centered around the Exon Bill's unconstitutionality on free speech and privacy grounds. First, the impositions the Exon Bill would place on telecommunications carriers violated rights to free speech and privacy. Specifically, the Exon Bill would impose liability upon telecommunications carriers (i.e. telephone companies, commercial online services, Internet Service Providers ("ISPs"), and bulletin board systems ("BBSs") for any and all content carried on their networks.16 This would include liability for private conversations or messages exchanged between two consenting individuals.17 In addition, the critics argued that the Exon Bill imposed such restrictive requirements that many telecommunications carriers would be required "to choose between severely restricting the activities of their subscribers or completely shutting down their email, Internet access, and conferencing services under the threat of criminal liability."18 Otherwise, the carriers would "be forced to pre-screen all messages, files, or other content before transmitting it to the intended recipient" to avoid liability.19 Essentially, carriers would be forced to become private censors of all material available to the open public on their networks because of the expanded liability for exposing indecent material to minors via telecommunications devices.

Ironically, the U.S. Department of Justice, in a letter to Senator Leahy, stated clearly that the criminalization of indecent communications "would impose criminal sanctions on the transmission of constitutionally protected speech."20 In addition, the section imposing such sanctions "fails to take into account less restrictive alternatives utilizing existing and emerging technologies which enable parents and other adult users to control access to content."21 The Supreme Court had ruled that the "Government may . . . regulate the content of constitutionally protected speech in order to promote a compelling interest if it chooses the least restrictive means to further the articulated interest."22 Thus, by failing to consider less restrictive alternatives, the Exon Bill violated the Constitution.23

The Exon Bill also received criticism for the way in which it had been drafted. From an enforcement perspective, the Department of Justice claimed the use of the word "knowingly" would "cripple obscenity prosecutions" because under Miller v. California "the government must only prove that a person being prosecuted under an obscenity statute had knowledge of the general nature of the material being distributed." Essentially, the scienter requirement of section 402(e) of the Exon Bill would make it "nearly impossible for the government to establish the necessary requirement and would thereby severely handicap enforcement of existing statutes."24 In addition, the Exon Bill's addition of defenses to criminal prosecution would interfere with existing statutes that actually target the same offenses to which the Exon Bill directed its criminalization. Specifically, the Department of Justice stated:
"The government currently enforces federal criminal laws preventing the distribution over computer networks of obscene and other pornographic material that is harmful to minors (under 18 U.S.C. § 1465, 2252 & 2423 (a)), the illegal solicitation of a minor by way of a computer network (under 18 U.S.C. § § 2252), and illegal 'luring' of a minor into sexual activity through computer conversations (under 18 U.S.C. § 2423(b)). These statutes apply to all methods of 'distribution' including over computer networks. The new defenses proposed . . . would thwart ongoing government obscenity and child sexual exploitation prosecutions . . . ."25

In addition, the Exon Bill's use of the term "indecency" was flawed because there is no agreed upon definition. Consequently, the carriers would be forced to censure for any content that might violate the broadest interpretation of the term. Such a result, it was argued, would "severely limit the diversity of content available on online networks, and limit the editorial freedom of independent forum operators."26

The Exon Bill also suggested an unfamiliarity with the technology subject to the regulations among its drafters. First, the Exon Bill failed to account for the lack of discreet boundaries within and among electronic communications networks. Because an individual on one completely "independent" network may communicate with a distinct individual belonging to a second "independent" network, each of the networks will obtain communications originating from a source outside its network. Under the Exon Bill, each network would be liable for any content from any communications found on its networks despite the origin of the communications.27 Such a requirement would force carriers to pre-screen content which would be "impossible due to the sheer volume of messages."28 The CDT also alleged that it would violate current legal protections. Second, the critics argued that because the technology being regulated is interactive, circumstances did not require government control. Specifically, they argued tools exist within interactive technology (such as Internet browsers and software used to obtain access to online services) that allow users to select, and thereby control, the information they want to access.

During the debate, an undergraduate student, Martin Rimm, completed a study on pornography on the Internet at Carnegie-Mellon University.29 The study made claims such as "83.5% of all images posted on the Usenet are pornographic"30 Due to the alleged expansiveness of pornography on the Internet (with subjects on bestiality and pedophilia), the study identified the three "most complex legal questions" as child pornography, limiting access to minors, and obscenity standards.31 Despite substantial criticism levied against the study's methodology,32 TIME magazine covered the study and treated it as sound.33 Consequently, congressional members cited the article in favor of the CDA or similar legislation.34 In addition, Georgetown Law Journal published the student's "research" paper. All of this fueled congressional response to the allegedly wild, untamed, pornography-ridden Internet.35 And, it helped make the subject much more salient among the less tech-savvy general public.

Despite the widespread criticism, the Exon Bill survived with only minor amendments and became part of the Telecommunications Act of 1996.

B. CDA: The Judicial End
On February 8, 1996, the President signed into law the Telecommunications Act of 1996 ("Telecomm Act") of which Title V constituted the Communications Decency Act of 1996 ("CDA").36 On the same day, the American Civil Liberties Union ("ACLU") and others filed an action in the United States District Court for the Eastern District of Pennsylvania and moved for a temporary restraining order.37 The relevant portions of the CDA contested by the parties were codified as 47 U.S.C. § 223(a), (d) and (e); and, 18 U.S.C. § 1462(c). Of these, sections 223 (a) and (d) were the essence of the constitutional challenge. United States Code § 223 (a) read in relevant part:
"[Anyone will be subject to criminal penalties of imprisonment of no more than two years or a fine or both who]:

1) in interstate or foreign communications . . .

(B) by means of a telecommunications device
knowingly --

(i) makes, creates, or solicits, and
(ii) initiates the transmission of,

any comment, request, suggestion, proposal, image, or other
communication which is obscene or indecent, knowing that the recipient of
the communication is under 18 years of age, regardless of whether the
maker of such communication placed the call or initiated the
communication; . . .

(2) knowingly permits any telecommunications facility under his control to be used for any activity prohibited by paragraph (1) with the intent that it be used for such activity."

United States Code § 223 (d) read in relevant part:
"[Anyone will be subject to criminal penalties who]:

(1) in interstate or foreign communications knowingly--

(A) uses an interactive computer service to send to a specific person or persons under 18 years of age, or

(B) uses any interactive computer service to display in a manner available to a person under 18 years of age, any comment, request, suggestion, proposal, image or other communication that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs, regardless of whether the use of such service placed the call or initiated the communication; or

(2) knowingly permits any telecommunications facility under such person's control to be used for an activity prohibited by paragraph (1) with the intent that it be used for such activity."

The District Court issued the order a week later. Subsequently, a second suit was filed and consolidated with the first.38 Pursuant to § 561 of the Act, a three-judge District Court convened to hear the case.39 Thus began a challenge to the first major attack on behavior in cyberspace that ultimately found its way before the U.S. Supreme Court.

1. The Three Panel District Court
In describing the parties' arguments, the District Court stated:
"Plaintiffs focus their challenge on two provisions of section 502 of the CDA which amend 47 U.S.C. §§ 223(a) and 223(d).

Section 223(a)(1)(B) provides in part that any person in interstate or foreign communications who, 'by means of a telecommunications device,'(5) 'knowingly . . . makes, creates, or solicits' and 'initiates the transmission' of 'any comment, request, suggestion, proposal, image or other communication which is obscene or indecent, knowing that the recipient of the communication is under 18 years of age,' 'shall be criminally fined or imprisoned.' (emphasis added).

Section 223(d)(1) ('the patently offensive provision'), makes it a crime to use an 'interactive computer service'(6) to 'send' or 'display in a manner available' to a person under age 18, 'any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs, regardless of whether the user of such service placed the call or initiated the communication.'

Plaintiffs also challenge on the same grounds the provisions in § 223(a)(2) and § 223(d)(2), which make it a crime for anyone to "knowingly permit[] any telecommunications facility under [his or her] control to be used for any activity prohibited" in §§ 223(a)(1)(B) and 223(d)(1). The challenged provisions impose a punishment of a fine, up to two years imprisonment, or both for each offense.

Plaintiffs make clear that they do not quarrel with the statute to the extent that it covers obscenity or child pornography, which were already proscribed before the CDA's adoption. See 18 U.S.C. §§ 1464-65 (criminalizing obscene material); id. §§ 2251-52 (criminalizing child pornography); see also New York v. Ferber, 458 U.S. 747 (1982); Miller v. California, 413 U.S. 15 (1973).

Plaintiffs in the ACLU action also challenge the provision of the CDA that criminalizes speech over the Internet that transmits information about abortions or abortifacient drugs and devices, through its amendment of 18 U.S.C. § 1462(c). That section now prohibits the sending and receiving of information over the Internet by any means regarding "where, how, or of whom, or by what means any [drug, medicine, article, or thing designed, adapted, or intended for producing abortion] may be obtained or made". The Government has stated that it does not contest plaintiffs' challenge to the enforceability of the provision of the CDA as it relates to 18 U.S.C. § 1462(c).(7)

As part of its argument that the CDA passes constitutional muster, the Government cites the CDA's 'safe harbor' defenses in new § 223(e) of 47 U.S.C., which provides:

'(e) Defenses

In addition to any other defenses available by law:

(1) No person shall be held to have violated subsection (a) or (d) of this section solely for providing access or connection to or from a facility, system, or network not under that person's control, including transmission, downloading, intermediate storage, access software, or other related capabilities that are incidental to providing such access or connection that does not include the creation of the content of the communication.

(2) The defenses provided by paragraph (1) of this subsection shall not be applicable to a person who is a conspirator with an entity actively involved in the creation or knowing distribution of communications that violate this section, or who knowingly advertises the availability of such communications.

(3) The defenses provided in paragraph (1) of this subsection shall not be applicable to a person who provides access or connection to a facility, system, or network engaged in the violation of this section that is owned or controlled by such person.

(4) No employer shall be held liable under this section for the actions of an employee or agent unless the employee's or agent's conduct is within the scope of his or her employment or agency and the employer (A) having knowledge of such conduct, authorizes or ratifies such conduct, or (B) recklessly disregards such conduct.

(5) It is a defense to a prosecution under subsection (a)(1)(B) or (d) of this section, or under subsection (a)(2) of this section with respect to the use of a facility for an activity under subsection (a)(1)(B) that a person --

(A) has taken, in good faith, reasonable, effective, and appropriate actions under the circumstances to restrict or prevent access by minors to a communication specified in such subsections, which may involve any appropriate measures to restrict minors from such communications, including any method which is feasible under available technology; or

(B) has restricted access to such communication by requiring use of a verified credit card, debit account, adult access code, or adult personal identification number.

(6) The [Federal Communications] Commission may describe measures which are reasonable, effective, and appropriate to restrict access to prohibited communications under subsection (d) of this section. Nothing in this section authorizes the Commission to enforce, or is intended to provide the Commission with the authority to approve, sanction, or permit, the use of such measures. The Commission shall have no enforcement authority over the failure to utilize such measures. . . .'"40

The District Court held an evidentiary hearing on the motion for a preliminary junction. At the hearing, the plaintiffs essentially argued that the CDA would inhibit the exchange of information on the Internet and impose unreasonable costs on web site operators. In response, the government argued that the CDA provided three defenses to prosecution: credit card verification, adult verification by password or adult identification number, and "tagging."41 However, the District Court found that the first defense "would completely bar adults who do not have a credit card and lack the resources to obtain one from accessing any blocked material."42 In addition, the costs of obtaining verification through credit card verification services (testified by one witness to be $1) could force web site operators to "incur a monthly cost far beyond [their] modest resources."43 Indeed, the government's expert "suspect[ed]" that verifications agencies would require purchases to accompany any processing of a card. Moreover, both parties' experts testified that credit card verification would inhibit the flow of information causing delays that people would not tolerate.44 This evidence deemed the first defense all but mere surplussage.
The second "defense" consisted of employing password verification systems. The District Court found that the information presented by the government's expert on two verification systems (AdultCheck and Verify) used by commercial, pornographic sites consisted of "very limited evidence." The District Court also heard testimony from non-commercial organizations which testified that charging listeners to access the information would be contrary to their intent to distribute information free of charge. In addition, ACLU presented evidence that some adult users would be discouraged from retrieving information that required the use of a password or credit card. Based upon the evidence, the District Court found that the administrative burden imposed by the creation of an internal screening system would be cost prohibitive for even some commercial sites. In addition, the District Court stated that "the Government presented no testimony as to how such systems could ensure that the user of the password or credit card is in fact over 18."45 It then concluded: "The burdens imposed by credit card verification and adult password verification systems make them effectively unavailable to a substantial number if Internet content providers."46
The final "defense" has been labeled "tagging." This refers to the process by which web site operators place within the html or web page a tag that identifies it as containing certain forms of content. While this may seem trivial on one hand, the enormity of tagging every web page for some organizations (ie Carnegie Library) would be enormous. ACLU presented evidence that some organizations would be required to tag all or none of its content because it would be unable to determine whether information on safer sex would be considered indecent for each community. Interestingly, the government agreed with the plaintiffs that tagging alone would not "shield minors from speech or insulate a speaker from criminal liability under the CDA.47 The District Court also identified additional concerns. First, tagging would require a worldwide consensus on the format of tags. Content is often from overseas and it sometimes difficult to determine from where it came. The court also recognized the importance of anonymity to Internet users of sensitive information.
Based on the evidence before it, the trial court found that "speakers who display arguably indecent content on the Internet must choose between silence and the risk of prosecution."48 Moreover, it found that the CDA's defenses "are effectively unavailable for non-commercial, not for profit entities.49 None of the plaintiffs were commercial purveyors of "pornography" but some of their material posted to a web site could be considered indecent or patently offensive in some communities.50 The District Court held:
"Plaintiffs have established a reasonable probability of eventual success in the litigation by demonstrating that §§ 223 (a)(1)(B) and 223(a)(2) of the CDA are unconstitutional on their face to the extent that they reach indecency. Sections 223 (d)(1) and 223(d)(2) of the CDA are unconstitutional on their face. Accordingly, plaintiffs have shown irreparable injury, no party has any interest in the enforcement of an unconstitutional law, and therefore the public interest will be served by granting the preliminary injunction."51

In addition, it found the CDA violative of the First Amendment for being over broad and the Fifth Amendment for being vague. It subsequently granted the motions.52

2. The Supreme Court
The Supreme Court heard oral arguments on Wednesday, March 19, 199753 and decided the case on June 26, 1997.54

a. Oral Arguments
At the hearing, the Court presented the Government with factually based hypotheticals that focused upon specific examples of conduct that appeared to be prohibited on the face of the statute. However, they were presented in such a way that any prosecution would be considered extreme. Specifically, the Court seemed concerned about the possible over breadth of the CDA. In response to whether § 223 (d)(2) would prohibit a parent from allowing her child to observe patently offensive material using the parent's computer, the Government responded by stating that the Court could "exempt the provision of this material for parents," although such actions could constitute child abuse. The Court later asked the Government whether two high school students discussing patently offensive material would face liability under the provision of the CDA prohibiting the knowing transmission of indecent material to a person under the age of 18. Although the Government contended this provision targeted sexual predators, it conceded that such communications would be prohibited. Moreover, the Government stated that it did not believe the Internet to be a public forum and, therefore, distinct from a public park or other public location where such communications may be protected. In response to these and similar scenarios, the Government argued that the Court should construe the CDA in such a manner that saves the provisions of the statute that are found to be over broad.
Responding, the appellees identified four reasons the CDA should be struck down: it would ban speech; it would not be effective; there exist less-restrictive alternatives; and it would chill non-indecent speech. While some members of the Court responded to these four reasons (ie the less-restrictive alternatives), the Court's questions seemed to primarily focus upon whether the statute could be construed in such a way as to make it constitutional. The Appellees vehemently disagreed with any construction. First, the Appellees argued that the CDA could not be construed to prohibit only commercial speech because the legislative history clearly indicated the CDA was to apply to both commercial and noncommercial entities. Second, the definition of patently offensive could not be narrowly construed because the conference report clearly indicated that Congress had rejected the less restrictive approach of "harmful to minors."
The Court also questioned the importance of Appellees' argument that the CDA would be ineffective against foreign communications. In response, the Appellees explained that whether all domestic communications prohibited under the CDA were eradicated, a search engine will still list any remaining sites that contained the sought after material. Moreover, commercial entities could move their operations overseas. When questioned about the Government's alleged policy reasons in support of the CDA, the Appellees stated that they "did not challenge this law insofar as it prohibits obscene speech, child pornography, solicitation of minors, or harassment of minors." Rather, their arguments focused upon where the effect of the CDA bans both prohibitable speech and non-prohibitable speech. Essentially, the Court's questions focused on whether the CDA could be construed as constitutional. The Appellees vehemently argued that the CDA as written could not be construed as constitutional.

b. The Opinion
In its opinion, the Supreme Court affirmed the decision of the three-judge District Court and held that the CDA "abridges 'the freedom of speech' protected by the First Amendment."55 In summarizing the District Court's findings of fact, the Court held:
"The Internet is 'a unique and wholly new medium of worldwide human communication.'

The Internet has experienced 'extraordinary growth.' The number of 'host' computers--those that store information and relay communications--increased from about 300 in 1981 to approximately 9,400,000 by the time of the trial in 1996. Roughly 60% of these hosts are located in the United States. About 40 million people used the Internet at the time of trial, a number that is expected to mushroom to 200 million by 1999.

Individuals can obtain access to the Internet from many different sources, generally hosts themselves or entities with a host affiliation.

* * * * *

Anyone with access to the Internet may take advantage of a wide variety of communication and information retrieval methods. These methods are constantly evolving and difficult to categorize precisely. But, as presently constituted, those most relevant to this case are electronic mail ("e-mail"), automatic mailing list services ("mail exploders," sometimes referred to as "listservs"), "newsgroups," "chat rooms," and the "World Wide Web." All of these methods can be used to transmit text; most can transmit sound, pictures, and moving video images. Taken together, these tools constitute a unique medium--known to its users as 'cyberspace'--located in no particular geographical location but available to anyone, anywhere in the world, with access to the Internet.

E-mail enables an individual to send an electronic message--generally akin to a note or letter--to another individual or to a group of addressees. The message is generally stored electronically, sometimes waiting for the recipient to check her "mailbox" and sometimes making its receipt known through some type of prompt. A mail exploder is a sort of e-mail group. Subscribers can send messages to a common e-mail address, which then forwards the message to the group's other subscribers. Newsgroups also serve groups of regular participants, but these postings may be read by others as well. There are thousands of such groups, each serving to foster an exchange of information or opinion on a particular topic running the gamut from, say, the music of Wagner to Balkan politics to AIDS prevention to the Chicago Bulls. About 100,000 new messages are posted every day. In most newsgroups, postings are automatically purged at regular intervals. In addition to posting a message that can be read later, two or more individuals wishing to communicate more immediately can enter a chat room to engage in real-time dialogue--in other words, by typing messages to one another that appear almost immediately on the others' computer screens. The District Court found that at any given time "tens of thousands of users are engaging in conversations on a huge range of subjects." > () It is "no exaggeration to conclude that the content on the Internet is as diverse as human thought."

The best known category of communication over the Internet is the World Wide Web, which allows users to search for and retrieve information stored in remote computers, as well as, in some cases, to communicate back to designated sites. In concrete terms, the Web consists of a vast number of documents stored in different computers all over the world. Some of these documents are simply files containing information. However, more elaborate documents, commonly known as Web "pages," are also prevalent. Each has its own address--'rather like a telephone number.' Web pages frequently contain information and sometimes allow the viewer to communicate with the page's (or 'site's') author. They generally also contain 'links' to other documents created by that site's author or to other (generally) related sites. Typically, the links are either blue or underlined text--sometimes images.

Navigating the Web is relatively straightforward. A user may either type the address of a known page or enter one or more keywords into a commercial "search engine" in an effort to locate sites on a subject of interest. A particular Web page may contain the information sought by the "surfer," or, through its links, it may be an avenue to other documents located anywhere on the Internet. Users generally explore a given Web page, or move to another, by clicking a computer "mouse" on one of the page's icons or links. Access to most Web pages is freely available, but some allow access only to those who have purchased the right from a commercial provider. The Web is thus comparable, from the readers' viewpoint, to both a vast library including millions of readily available and indexed publications and a sprawling mall offering goods and services.

From the publishers' point of view, it constitutes a vast platform from which to address and hear from a world-wide audience of millions of readers, viewers, researchers, and buyers. Any person or organization with a computer connected to the Internet can "publish" information. Publishers include government agencies, educational institutions, commercial entities, advocacy groups, and individuals. Publishers may either make their material available to the entire pool of Internet users, or confine access to a selected group, such as those willing to pay for the privilege. 'No single organization controls any membership in the Web, nor is there any centralized point from which individual Web sites or services can be blocked from the Web.'

* * * * *

Sexually explicit material on the Internet includes text, pictures, and chat and "extends from the modestly titillating to the hardest-core." These files are created, named, and posted in the same manner as material that is not sexually explicit, and may be accessed either deliberately or unintentionally during the course of an imprecise search.

* * * * *


Some of the communications over the Internet that originate in foreign countries are also sexually explicit.

Though such material is widely available, users seldom encounter such content accidentally. "A document's title or a description of the document will usually appear before the document itself ... and in many cases the user will receive detailed information about a site's content before he or she need take the step to access the document. Almost all sexually explicit images are preceded by warnings as to the content." For that reason, the "odds are slim" that a user would enter a sexually explicit site by accident. Unlike communications received by radio or television, "the receipt of information on the Internet requires a series of affirmative steps more deliberate and directed than merely turning a dial. A child requires some sophistication and some ability to read to retrieve material and thereby to use the Internet unattended."

Systems have been developed to help parents control the material that may be available on a home computer with Internet access. A system may either limit a computer's access to an approved list of sources that have been identified as containing no adult material, it may block designated inappropriate sites, or it may attempt to block messages containing identifiable objectionable features. "Although parental control software currently can screen for certain suggestive words or for known sexually explicit sites, it cannot now screen for sexually explicit images." Nevertheless, the evidence indicates that "a reasonably effective method by which parents can prevent their children from accessing sexually explicit and other material which parents may believe is inappropriate for their children will soon be available."'

Age Verification

The problem of age verification differs for different uses of the Internet. The District Court categorically determined that there "is no effective way to determine the identity or the age of a user who is accessing material through e-mail, mail exploders, newsgroups or chat rooms.' The Government offered no evidence that there was a reliable way to screen recipients and participants in such fora for age. Moreover, even if it were technologically feasible to block minors' access to newsgroups and chat rooms containing discussions of art, politics or other subjects that potentially elicit 'indecent' or 'patently offensive' contributions, it would not be possible to block their access to that material and 'still allow them access to the remaining content, even if the overwhelming majority of that content was not indecent.'

Technology exists by which an operator of a Web site may condition access on the verification of requested information such as a credit card number or an adult password. Credit card verification is only feasible, however, either in connection with a commercial transaction in which the card is used, or by payment to a verification agency. Using credit card possession as a surrogate for proof of age would impose costs on non-commercial Web sites that would require many of them to shut down. For that reason, at the time of the trial, credit card verification was "effectively unavailable to a substantial number of Internet content providers.' Moreover, the imposition of such a requirement "would completely bar adults who do not have a credit card and lack the resources to obtain one from accessing any blocked material.'

. . . [e]ven if passwords are effective for commercial purveyors of indecent material, the District Court found that an adult password requirement would impose significant burdens on noncommercial sites, both because they would discourage users from accessing their sites and because the cost of creating and maintaining such screening systems would be 'beyond their reach.'

In sum, the District Court found:

'Even if credit card verification or adult password verification were implemented, the Government presented no testimony as to how such systems could ensure that the user of the password or credit card is in fact over 18. The burdens imposed by credit card verification and adult password verification systems make them effectively unavailable to a substantial number of Internet content providers.'"56

The Supreme Court then proceeded to analyze the facts in light of relevant constitutional jurisprudence.
The Supreme Court first agreed with the District Court that prior "cases provide no basis for qualifying the level of First Amendment scrutiny that should be applied to this medium." In so concluding, the Court reviewed its decisions in Ginsberg v. New York 57 ; Southeastern Promotions, Ltd. v. Conrad58 ; FCC v. Pacifica Foundation 59 ; Renton v. Playtime Theatres, Inc.60; and, Sable Communications of Cal., Inc. v. FCC61. The Court held that each of the foregoing cases presented facts and circumstances distinct from those presented by the Internet and the CDA.
The Court then proceeded to address the vagueness of the statute as it applied to First Amendment jurisprudence. The Court found the CDA to be problematic for several reasons. First, the two provisions being challenged each used a distinct linguistic form in describing the proscribed communications. Section 223 (a) prohibited speech that was "indecent" while § 223(d) prohibited that which "in context, depict[ed] or describe[d], in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs." Consequently, speakers would be uncertain as to the relation and meaning between the two linguistic forms.62 Moreover, "[t]his uncertainty undermines the likelihood that the CDA has been carefully tailored to the congressional goal of protecting minors from potentially harmful materials."63
The Court also distinguished the standard for prohibited speech employed in Miller v. California from that in the CDA.64 In Miller, the Court espoused the standard for obscenity still employed today:
"(a) whether the average person, applying contemporary community standards would find that the work, taken as a whole, appeals to the prurient interest; (b) whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law; and (c) whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value."65

Here, the Court concluded that the CDA contained only one of the three-prong Miller test. The remaining two prongs in Miller place a limit on the community defined second prong by allowing "appellate courts to impose some limitations and regularity on the definition by setting, as a matter of law, a national floor for socially redeemable value."66 Moreover, the CDA omitted a critical requirement "that the proscribed material be 'specifically defined by the applicable state law.'"67 Finally, the CDA extended beyond the "sexual conduct" limitation of Miller and included "excretory activities" and "organs" of both a sexual and excretory nature.
Thus, the Court found this vagueness troublesome for two reasons. First, as a content-based regulation of speech, the CDA raised "special First Amendment concerns because of its obvious chilling effect on free speech."68 Second, the CDA imposed criminal liability upon its violators in the form of both fines and imprisonment which "may well cause speakers to remain silent rather than communicate even arguably unlawful words, ideas and images."69 The Court concluded with respect to the CDAs vagueness:

" . . . the CDA thus presents a greater threat of censoring speech that, in fact, falls outside the statute's scope. Given the vague contours of the [statute's coverage], it unquestionably silences some speakers whose messages would be entitled to constitutional protection. That danger provides further reason for insisting that the statute not be overly broad. The CDA's burden on protected speech cannot be justified if it could be avoided by a more carefully drafted statute."70

The Court then held:
"We are persuaded that the CDA lacks the precision that the First Amendment requires when a statute regulates the content of speech. In order to deny minors access to potentially harmful speech, the CDA effectively suppresses a large amount of speech that adults have a constitutional right to receive and to address to one another. That burden on adult speech is unacceptable if less restrictive alternatives would be at least as effective in achieving the legitimate purpose that the statute was enacted to serve.

* * * * *

The District Court found that at the time of trial existing technology did not include any effective method for a sender to prevent minors from obtaining access to its communications on the Internet without also denying access to adults. The Court found no effective way to determine the age of a user who is accessing material through e-mail, mail exploders, newsgroups, or chat rooms. As a practical matter, the Court also found that it would be prohibitively expensive for noncommercial--as well as some commercial--speakers who have Web sites to verify that their users are adults. These limitations must inevitably curtail a significant amount of adult communication on the Internet. By contrast, the District Court found that '[d]espite its limitations, currently available user-based software suggests that a reasonably effective method by which parents can prevent their children from accessing sexually explicit and other material which parents may believe is inappropriate for their children will soon be widely available.'"71

Consequently, the Court concluded that "[t]he breadth of the CDA's coverage is wholly unprecedented" and "in the light of the absence of any detailed findings by the Congress, or even hearings addressing the special problems of the CDA, we are persuaded that the CDA is not tailored if that requirement has any meaning at all."72
The Court "agree[d] with the District Court's conclusion that the CDA places an unacceptably heavy burden on protected speech, and that the defenses do not constitute the sort of 'narrow tailoring' that will save an otherwise patently invalid unconstitutional provision."73 Specifically, the Court held that the "tagging" defense failed by its own requirement that the good faith action must be "effective." "Without the impossible knowledge that every guardian in America is screening for the 'tag,' the transmitter could not reasonably rely on its action to be effective."74 In addition, the Court concluded that the two remaining defenses fail because, although the technology exists, they would be too economically burdensome on most non-commercial speakers.75
Finally, the Court addressed the Government's argument that should the Court find the CDA unconstitutional, it should employ the statute's severability clause and construe those provisions that are not severable narrowly. To the extent that § 223 (a) applies to any communication deemed "obscene," the Court upheld the statute but severed the term "or indecent."76 The Court denied the Government's request to limit the applicability of the statute to the extent it does not reach "too far." The Court reasoned that its jurisdiction based upon expedited review under § 561 rested solely on facial challenges and not "as-applied."77 In addition, "[t]he open-ended character of the CDA provides no guidance what ever for limiting its coverage."78 Therefore, the Court affirmed the judgment of the District Court.79

C. COPA: The Legislative Beginning
Nearly a year after the Supreme Court's opinion in Reno v. ACLU, Representative Oxley introduced the Child Online Protection Act ("COPA") into the House.80 COPA was then referred to the House Commerce Committee.81 The House Subcommittee on Telecommunications, Trade and Consumer Protection held hearings on COPA and other related legislation on September 11, 1998.82
COPA retained the legislative intent originating in the CDA but narrowed its focus pursuant to Reno v. ACLU. Specifically, COPA limited its scope to commercial entities, applied only to communications on the World Wide Web, and employed a "harmful to minors" standard which the CDA lacked.
Again, advocacy groups challenged the constitutionality of COPA.83 First, they argued COPA violated the fundamental First Amendment principles by criminalizing protected speech among adults.84 To impose a burden or restriction on our right to free speech, a statute must be "necessary to serve a compelling state interest and [be] narrowly drawn to achieve that end."85 Critics complained that COPA failed to serve the compelling state interest in protecting children because it would not prevent children from accessing material available on foreign based web sites, non-commercial entities, newsgroups, chatrooms, and electronic mail.86 COPA also "fails to make any distinction between material that may be harmful to a six-year-old but valuable for a 16-year-old, such as safer-sex information."87 In addition, CDT argued that less restrictive means of achieving the government's interest were available. Specifically, the organization mentioned the use of filtering software available to parents and schools.
Second, COPA's opponents argued that the legislation failed to define the standards it employed. Specifically, COPA employed the "harmful to minors" standard that would be based on community standards. This vague standard allegedly violated the Miller standard specifically cited in Reno. Critics also contended that COPA failed to define the term "commercial distributor" and the extent of commercial behavior on the Web that would impose liability.88 Third, the CDT argued that the defenses employed by COPA violate individuals' right to privacy by requiring identifying information to gain access to the harmful material. Finally, the ACLU contended the age verification provision of COPA "flies in the face" of the Supreme Court's decision in Reno.89 Specifically, COPA fails to recognize that most sites are unable to financially support screening systems or verify that a customer using a password is in fact not a minor.90
On October 5, 1998, COPA was "[r]eported with an amendment, committed to the Committee of the Whole House on the State of the Union, and ordered to be printed."91 The amended bill contained some congressional findings. First, the legislation identified "the protection of the physical and psychological well-being of minors by shielding them from materials that are harmful to them" as a compelling state interest.92 Second, Congress found that industry efforts designed to restrict material from minors "have not provided a national solution to the problem . . . ."93
Based on its findings, Congress enacted COPA. COPA prohibited anyone from knowingly making any communication for commercial purposes available to any minor where such material is "harmful to minors" and the one making the communication available had "knowledge of the character of the material."94 The statute allowed penalties of not more than $50,000, imprisonment for not more than 6 months, or both. For intentional violations, the violator could be fined $50,000 for each day the violation occurred. In addition, the statute subjected violators (intentional or not) to potential civil liability of not more than $50,000 for each day the violation occurred. Thus, COPA imposed a significantly smaller maximum time for imprisonment than did the CDA.95
Interestingly, the statute exempted "telecommunications carriers engaged in the provision of a telecommunications service," search engine providers, Internet access providers, or those "similarly engaged in the transmission, storage, retrieval, hosting, formatting, or translation . . . of a communication made by another person, without selection or alteration of the content of the communication" (deletion of material does not constitute selection or alteration).
Similar to the CDA, COPA provided defenses to any charge, both criminal or civil, of engaging in prohibited conduct. Specifically, the defendant has an affirmative defense where she, in good faith, required some form of adult authorization code (access code, credit card, etc.), a digital certificate verifying age, or "any other reasonable measures that are feasible under available technology" to restrict minors' access to material prohibited under the Act.
As enacted, COPA reflected some of the criticism and comments from opponents of the legislation. For example, COPA contained privacy protection requirements imposed on those who collect information for the purposes of restricting access from minors.96 The Act defined a communication for commercial purposes as one made by a person "engaged in the business of making such communications."97 One who is "engaged in the business" includes any person "who makes a communication or offers to make a communication, by means of the World Wide Web, that includes any material that is harmful to minors, devotes time, attention, or labor to such activities, as a regular course of such person's trade or business, with the objective of earning a profit as a result of such activities . . . ."98 Under the definition, one need not actually make a profit.99 Finally, the legislation included sections on notice (being required to be given by a provider of an interactive computer service to a customer notifying them of the availability of filtering hardware or software) and to implement a commission for the study of online child protection.100

D: COPA: The Temporary Restraining Order
Once enacted, interested parties sought a temporary restraining order which the District Court granted. After a hearing, the District Court granted the parties' motion for a preliminary injunction.101 Recognizing that "the relevant inquiry is determining the burden imposed on the protected speech regulated by COPA" and that "[e]ach medium of expression 'must be assessed for First Amendment purposes by standards suited to it,'" the court held that COPA "has the effect of burdening speech in these fora that is not covered by the statute" and that a substantial likelihood exists that the plaintiffs "will be able to show that COPA imposes a burden on speech protected for adults."102 Specifically, the court found that "the implementation of credit card or adult verification screens in front of material that is harmful to minors may deter users from accessing such materials and that the loss of users of such material may affect the speakers' economic ability to provide such communications . . . may [cause web site operators and content providers to] self-censor the content of their sites."
The court recognized that the statute would not likely be effective. The court found that because minors could access material deemed "harmful to minors" via "foreign web sites, non-commercial sites, and online protocols other than http," the statute would have problems "efficaciously meeting its goal." The court found these problems compounded by evidence suggesting minors could evade such restrictions by obtaining a valid credit card or debit card. In addition, the court found that it would be strongly possible that the defendant could not demonstrate that COPA represented the least restrictive means available to accomplish its objective. Rather, the court found evidence to suggest that filtering or blocking techniques would be just as effective without imposing the burden on constitutionally protected speech that COPA imposes. Moreover, the court cited plaintiffs' claims that the sweeping language of COPA that "any communication . . . or other matter of any kind" did not represent the least restrictive means and that lesser penalties might represent a lesser restriction. Therefore, the court suggested that the evidence could demonstrate at trial both COPA's ineffectiveness and the existence of less restrictive alternatives.
Finally, noting that "the loss of First Amendment freedoms, for even minimal periods of time, unquestionably constitutes irreparable injury," the court concluded that the plaintiffs had demonstrated irreparable harm in that they would be required to self-censorship their web sites and content in fear of prosecution under COPA. Balancing the harms and interests of the parties, the court held that the violation of plaintiffs First Amendment rights far outweighed any interests of the defendants.
As the courts have held, the prevention of "a few of the most enterprising and disobedient young people" from obtaining access to harmful material does not justify a statute that has the "invalid effect of limiting the content of adult [communications] to that which is suitable for children." Sable,

II. THE PARADIGM
The CDA and COPA establish the paradigm which may be employed to explain congressional behavior with respect to most cyber-legislation.103 The elements of the paradigm can be isolated into two subsets. First, the requisite elements determine from the mass of legislation produced by Congress which items fit into the study and become a member of the paradigm class. Second, the characteristic elements describe the legislation within the paradigm class. In other words, should a piece of legislation meet the requisite elements, the legislation will share the characteristic elements.

A. The Requisite Elements
The most obvious requisite element belonging to the paradigm class legislation is its cyber nature. That is, the legislation must be primarily concerned with cyberspace or the activities therein. Cyberspace is defined as:
". . . a completely spatialized visualization of all information in global information processing systems, along pathways provided by present and future communication networks, enabling full copresence and interaction of multiple users, allowing input and output from and to the full human sensorium, permitting simulations of real and virtual realities, remote data collection and control through telepresence, and total integration and intercommunication with a full range of intelligent products and environments in real space."104

Thus, any legislation concerning computers, networks, online behavior, the Internet, etc. would be included. Obviously, the CDA and COPA met this requisite requirement as the prohibited conduct prohibited by the contested portions of the statutes occurred on the Internet; within cyberspace.105 Thus, for this first requirement, the legislation merely need to be concerned with cyberspace and the emerging technology affecting cyberspace.
Second, the legislation must be associated with a salient issue that would invoke an identifiable government interest where both the issue and government interest are separate and apart from cyberspace. The CDA and COPA were inherently associated with the issues of pornography and the safety of our children. These issues invoke an identifiable government interest in protecting the safety of our children. Additionally, both the issue and the government interest are severable from cyberspace.106
The class of legislation that fits within the paradigm is further narrowed by the final requisite element which concerns whether the legislation affects the substantial rights of those within cyberspace. The CDA and COPA clearly constitute cyber legislation that affects substantial rights because of the proposed restrictions on speech and privacy within cyberspace.107 The substantial rights may also concern an individual's rights to redress in the "real" world for activities occurring in cyberspace. On the other hand, legislation with such purposes as to "amend the Intermodal Surface Transportation Efficiency Act of 1991 to provide for the establishment of Internet, dial-in network, and telephone access to information on traffic conditions," "[express] the sense of the Congress that Members should understand and use the Internet to improve the democratic process, and communicate with the Internet community," would not constitute affecting substantial rights. Though a right not need rise to the level of constitutional validation, the right must have been recognized either by statute or common law prior to the legislation alleged to affect the right. In other words, the right that will be allegedly affected must have at least some grounding in legal precedent. Though, the application of that right to cyberspace and the specific legislation may be novel.

B. The Characteristic Elements
The following have been defined as characteristic elements because should an item of legislation meet the requisite elements above (cyber, salient issue and government interest, affect individual rights), the legislation undoubtedly will be characterized by the following elements. First, the legislation will push aside individual rights for the interests it seeks to uphold. Despite the potency of individual rights, the salience of the severable issue and government interest becomes so strong that it has the potential to overcome any objections to violations of individuals rights. At the least, the general public may see the issue and government interest as more a concern than the individual rights harmed in the process. With respect to the CDA and COPA, individual rights to free speech and privacy were secondary to the issue of pornography and the government interest's in protecting our children from the pornography. Here, the Rimm study and the subsequent TIME article fed the salience by portraying cyberspace and the Internet as a filth infested haven for pornographers, adult and child alike.
Second, the violation of individual rights will invoke strong legal questions.108 Both the District Court and Supreme Court determined that the CDA violated rights to free speech and privacy. In addition, the District Court recently determined that COPA violated the rights to free speech and privacy. Specifically, the Acts restricted speech based on the nature of the content to be prohibited. Under Supreme Court doctrine, such content-based statutory schemes invoke the strict scrutiny test which requires that to the statute be "necessary to serve a compelling state interest and [be] narrowly drawn to achieve that end."109 The courts held that the statutes did not meet the strict scrutiny test in that they were not narrowly drawn to achieving the compelling government interest of protecting children from pornography on the Internet. Thus, the legislation fitting the paradigm class will be adverse and contrary to existing legal standards.110
As part of the second characteristic element, the legislation will also be poorly constructed or written. The CDA and COPA both failed to define their terms which contributed to their downfall.
Third, the legislative proposals will be ineffective in reaching the goals advocated by the government interest. With respect to the CDA and COPA, both Acts were found to be ineffective in their application. Minors could still obtain access to indecent or harmful material via web sites from foreign jurisdictions. In addition, minors could obtain credit cards or passwords which would deceptively allow entry to the prohibited material. These inadequacies rendered the Acts ineffective. Fourth, alternatives will exist that are more effective than that proposed in the legislation. Advocates against the CDA and COPA strongly pushed parental control as an alternative deemed to be more successful than that proposed by the Acts.111
Fifth, the legislation, through its inadequacy, ineffectiveness, and dismissal of more compelling alternatives, evinces a lack of technological knowledge among those drafting the legislation. The CDA and COPA relied upon age verification systems despite testimony of their inadequacy and cost-prohibitiveness. Moreover, the manner in which the legislation met the third element (ineffectiveness) also demonstrated lack of technical knowledge about the Internet and Web. Specifically, minors could bypass any restriction the statutes might impose here in the United States and obtain access to indecent or harmful material from foreign sites.
Finally, though perhaps elementary, the legislation will face fierce competition from advocacy groups. Both the CDA and COPA experienced strong opposition from numerous opponents as both legislation and enacted statutes. While the strength of opposition need not be as strong as with the CDA and COPA, the opposition will be visibly apparent.
These are the characteristic elements which constitute the descriptive portion of the paradigm. In essence, they are the Y in the formula if X, then Y. If the legislation is cyber related, affects rights, and associated with a severable issue and government interest, the legislation may be characterized as violative of individual rights; invoking strong legal questions (poorly written); ineffective; more restrictive than viable alternatives; technologically ignorant; and subject to fierce competition.

III. FITTING THE PARADIGM WITH CYBER LEGISLATION
Ideally, the paradigm described above should encompass any congressional legislative efforts fitting within the identified paradigm class. However, prior to engaging in a complete study of the entire paradigm class, a select sample of legislative efforts was chosen to initially test the paradigm's validity. The results, while positive, suggested there were legislative efforts that would not share the characteristic elements. Specifically, these legislative efforts could be described as pro-cyber and were nearly the antithesis of the paradigm. However, these legislative efforts have not yet been enacted - yet. This lack of enactment is a defining characteristic that may soon represent a paradigm shift.
For congressional behavior prior to the 106th Congress, the distinction between those legislative efforts meeting the characteristic elements and those that do not could be to whom the legislation is directed. If the legislation is directed toward the behavior of government and "legitimate" businesses, the legislation may indeed belong to a distinct paradigm or sub-paradigm. Thus far, privacy and encryption are two legislative efforts that could belong to a separate paradigm or sub-paradigm. Those legislative efforts directed toward individuals or sub-legitimate businesses (ie gambling, pornography, adult entertainment) would fit within the paradigm class described above. While more research need be completed to discern the exact boundaries of the paradigm class (or sub-classes),112 the paradigm does contribute to an understanding of the select sample of legislative efforts below.

A. Inappropriate Material on the Internet
Along with the CDA and COPA, Congress introduced a number of legislative initiatives "to protect children from inappropriate materials on the Internet."113 This included the "Safe Schools Act,"114 requiring all public schools and libraries that receive public monies for Internet access to install filtering software restricting the content to which minors have access; the "E-Rate Policy and Child Protection Act,"115 requiring schools and libraries to adopt policies concerning the restriction of content "harmful to minors"; and three bills requiring online service providers to offer customers "screening" software designed to block certain material from children. 116 This continues in the 106th Congress. Recently, Senator McCain introduced the "Childrens' Internet Protection Act"117 requiring all schools and libraries receiving universal service assistance to install filtering or blocking technology on computers with Internet Access.
While legislative efforts have not yet been challenged in this area (due to the absence of enactment thus far), this past year the U.S. District Court for the Eastern District of Virginia denied a motion to dismiss a challenge to a library's voluntary act118 of placing filtering software on their computers.119 The public library had implemented a policy that required blocking or filtering software to be installed on all the library computers so as to "block child pornography and obscene material (hard core pornography)" and "block material deemed harmful to juveniles under Virginia statutes and legal precedents (soft-core pornography)."120 The plaintiffs alleged the software impermissibly blocked web sites that would not fall into either category.121
After addressing defendants' immunity122 and standing claims, the trial court addressed whether "a public library may, without violating the First Amendment, enforce content-based restrictions on access to Internet speech." Under Board of Education v. Pico, the Supreme Court held that "local school boards may not remove books from school library shelves simply because they dislike the ideas contained in those books and seek by their removal to 'prescribe what shall be orthodox in politics, nationalism, religion, or other matters of opinion.'"123 Concluding Pico applied to the facts in Loudon, the trial court held that "[Pico] stands for the proposition that the First Amendment applies to, and limits, the discretion of a public library to place content-based restrictions on access to constitutionally protected materials within its collection."124 Consequently, a public library, like other State enterprises, may not engage in policies which have the effect of dictating "what shall be orthodox in politics, nationalism, religion, or other matters of opinion."125 Thus, once the library chose to offer Internet access, it could not adopt and enforce content-based restrictions without meeting the strict scrutiny standard (ie compelling state interest narrowly drawn to achieve the interest).126 The trial court then applied Reno to the Loudon facts and concluded that the board could not limit the speech available to adults to that fit for children in the interest of protecting the children.127
Although the Loudon decision was merely a memorandum opinion, it does suggest that the filtering of web sites accessible via the Internet by public libraries violates the First Amendment. If this is indeed true, any legislation requiring public libraries to place such restrictions on may be facially unconstitutional. However, issues still to be addressed include whether Congress can withhold funds to those libraries that refuse to do so and whether public schools may permissibly implement such policies.
The Loudon court clearly recognized that the filtering of Internet web sites directly affects individual rights. Thus, any legislation imposing requirements on libraries and schools would also affect individual rights and invoke the same constitutional questions raised in the CDA and COPA cases. Moreover, advocacy groups contend the use of filtering software by libraries and schools is not the least restrictive alternative.128 Rather, there exist several alternatives which include: the use of acceptable use policies; the use of time limits on Internet access and use; training courses for students akin to driver's education classes; the publication of recommended web sites; and privacy screens between access terminals.129
Critics also argue that the legislation would not be effective. First, the filtering software tends to filter web sites that do not contain pornographic material but rather educational information. Second, the software programs do not always filter out all forms of pornography. Finally, the legislation continues to evidence a lack of technological knowledge among the congressional members who drafted the legislative initiatives. Therefore, this form of legislation shares the characteristic elements of the paradigm.130


B. Gambling
As with most every aspect of culture, gambling has invaded the Internet. In response, Congress considered legislation titled the "Internet Gambling Prohibition Act of 1997." As the title infers, the legislation sought to ban gambling and cyber-casinos on the Internet. As such, it meets the requisite requirements of the paradigm class on its face. First, it involves cyberspace. Second, the legislation involves individual rights by seeking to restrict their behavior. Finally, the legislation focuses upon the salient issue of gambling, and the government's interest in protecting the well-being of its citizens and controlling activity considered illegal in some jurisdictions.
As would be expected under the paradigm, the legislation received strong criticism. Critics identified four broad complaints against the legislation that would "have the effect of regulating transactions that took place even in password-restricted sites not accessible to minors or the general public."131 First, as occurred with consideration of the CDA, "the Senate [had] held only one hearing on [the bill], chaired by Senator Kyl and attended by no other members of the Senate," prior to the mark-up consideration by the Senate Judiciary Committee.132 In addition, "[n]ot one representative of the virtual gaming industry, the Internet community as a whole, or privacy and free speech was allowed to testify in person."133 The Internet Consumers Choice Coalition argued that consideration had not been given to the impact the bill would have on the continued growth of the Internet. It also explained that the year before the Senate had authorized the creation of a National Gambling Impact Commission to study the impact of online gambling. The Coalition argued, persuasively it might be added, that any action should be delayed until a report had been obtained from the Commission. Thus, the Coalition complained that the Gambling Act represented regulation without representation and supportive data.
Second, the bill ignores jurisdictional issues unique to cyberspace. Specifically, it "sets a precedent that the mere transmission or receipt of a message on the Internet may be sufficient to confer jurisdiction on state or local authorities at either end of the transmission."134 This essentially attempts to place a "patchwork of state and local laws" upon a global network. To the extent the bill would be limited to the national network (if there exists such an entity) of computers in the United States connected to the Internet, the legislation may be effective in imposing such a patchwork.135 However, to the extent it does not encompass the global network (which is impossible), the legislation becomes ineffective in preventing use of gambling facilities outside the national boundaries (though one may still be liable for the use of the facilities within the national boundaries). In addition, the availability of a federal injunction to shut down an ISP suggests the "solution" far outweighs the "problem" sought to be remedied.
Third, the bill would disrupt the global marketplace. The Coalition argued that:
"By allowing a patchwork of federal and state laws to be applied to the Internet and backed by the threat of local vetoes over NATIONAL AND global content, [the gambling bill] could have adverse implications for creating a global or national market on the Internet for products and services that are now already subject to close state regulation. Examples of such services include securities sales and insurance. The tendency toward patchwork regulation which [the gambling bill] would legitimize and the low thresholds required for establishing regulatory nexus will also only encourage the nation's 30,000 tax jurisdictions to press for taxes on local Internet access and commerce based on similarly low thresholds of nexus."136

As to the effectiveness of national ISPs responsible for "policing the content of offshore Internet sites," the Coalition pointed out that:
"[t]he World Wide Web and the Internet is by definition an inter-state and international creature. for the Internet, geographic distance is a non-factor. Transmissions from one web address to another may travel around the world before reaching their destinations. Nevertheless, the [gambling bill] would attempt to segment the Internet - in effect placing an electronic wall around the United States - to "protect us from ourselves" much like China and Singapore have tried to do."137

It concluded such an attempt is "clearly unworkable."138
On broader policy grounds, the Coalition opposes any efforts to regulate content on the Internet. It argued the gambling bill went even further than the CDA in its "blanket federal injunctions against any activity that might reasonably be considered 'private.'"
At least one author has suggested there exist three alternatives to the gambling act. These include: "(1) government licensing and regulation in conjunction with the taxation of winnings; (2) regulation by parents and schools; and (3) a uniform international policy against online gambling."139 While recognizing that each of the alternatives invoke their own issues, they suggest the need for exploration and investigation. Therefore, the "Internet Gambling Prohibition Act of 1997" shares the characteristic elements of the paradigm.

C. Y2K
Y2K refers to the problem inherent in some older software and hardware that allows only two digits for representation of the date year. There has been much concern that the computer or software will read the mark '00' as the year 1900 and not 2000. As a result, many believe systems will fail when the Year 2000(K) is reached on January 1, 2000. Consequently, massive efforts have been undertaken to resolve the Y2K problem. This includes remedial measures such as rewriting the software code and replacing Y2K-defective equipment and software. Also, legal remedies may be available to those customers who purchased Y2K-defective hardware or software under contract and warranty.140
Federal Y2K legislation did not appear until the 105th Congress.141 In the 105th Congress, most all items of legislation were quite benign and did not fall within the paradigm class.142 However, of those Y2K bills introduced thus far in the 106th Congress, the two bills that most clearly fall within the paradigm class are titled the "Y2K Act" and the "Year 2000 Fairness and Responsibility Act."143
Both legislative initiatives seek to limit liability in Y2K litigation. The legislation meets the requisite elements of the paradigm. The legislation is cyber related and affects the rights of both those injured by Y2K-defective products (by limiting their recovery for damages) and those producing Y2K-defective products (by limiting their liability). In addition, the Y2K issue is quite salient. Although Y2K may be seen closely related to cyberspace, it is quite severable. The public's identity of the issue has spread to electronic equipment in microwave ovens, refrigerators, medical equipment, and nearly every electronic item that contains a microprocessor. Nonetheless, an additional salient issue involves the excessive amount of damages sometimes awarded by juries.144 The government's interest involves placing some control on recoverable amounts in certain forms of litigation. Specifically related to Y2K, the government's interest also involves controlling public hysteria.
With respect to this Y2K legislation, critics have voiced concerns on several levels.145 Among the critics, the United States Department of Justice ("DOJ") recently testified before the Senate Judiciary Committee on the Fairness and Responsibility Act.146 The DOJ argued the bill "would be by far the most sweeping litigation reform measure ever enacted if it were approved in its current form . . . [by making] . . . extraordinary dramatic changes in both federal [and state] procedural and substantive law."147 In the DOJs opinion, these would represent negative changes.148 First, the bill represented an alteration to existing federal and state contract law by modifying the terms of negotiated contracts and contractual relationships. Assistant Attorney General Eleanor Acheson testified for the DOJ:
"As a general matter, a party to a contract is obligated to fulfill its promises and is liable to the other party for damages to the latter resulting from the former's breach of the contract absent force majeure or other extremely rare circumstances. It does not matter whether the party breaching the contract made reasonable efforts to avoid a breach. This widespread rule of basic contract law has been in existence for hundreds of years in the common law, is currently reflected in our contract statutory schemes (e.g., the Uniform Commercial Code), and is essential to commerce."149

Consequently, the bill's provisions that would allow defendants to introduce evidence of their reasonable efforts to comply with their contractual obligations and use reasonable efforts as a defense should be deleted.150 In addition, the bill's provisions limiting damage awards might limit plaintiffs' ability to recover damages.151 As a result, small businesses may unintentionally be destroyed. Thus, if the bill's intent centers on limiting the liability of Y2K defendants and thereby preventing their destruction, the bill would seem to be ineffective if it causes that which it seeks to prevent.
The legislation, by changing procedural and substantive law, would indeed "push aside" the rights of those damaged by Y2K-defective products. Moreover, the legislation faces opposition by advocacy groups including the Department of Justice and the White House. This opposition focused upon the strong legal questions posed by the legislation. As drafted, the critics argue that the proposals ignore existing law by making sweeping changes. As such, the legislation is poorly written. As has been evidenced by the resolution of Y2K lawsuits thus far, alternative dispute resolution arguably is a more efficient and viable solution to any Y2K legislation affecting litigation efforts. By ignoring this, the legislators suggest they are unaware of the practicalities thus far of Y2K litigation and mediation.152
From a brief examination of two Y2K legislative initiatives, it does appear that they fit within the paradigm class and validate the characteristic elements attributed to members of the paradigm class.

IV. CONCLUSIONS
Having identified a potential paradigm and applied it to selected legislation falling into the paradigm class, certain conclusions emerge. These conclusions enable, rather than hinder, the future application of the paradigm to the full set of legislative initiatives falling within the paradigm class. At the same time, the conclusions reveal aspects of the system that, while potentially threatening, may be explained in congruence with the paradigm.

A. Application of the Paradigm
The limited application of the paradigm to selected legislative initiatives falling within the paradigm class suggest certain conclusions which demonstrate the potential strength of the paradigm. The most important conclusion confirms the hypothesis on which the paradigm is founded. That is, legislative initiatives within the paradigm class (ie the requisite elements) share the characteristic elements strongly evident in the defining initiatives (CDA and COPA). Beyond the characteristic elements themselves, the combination of the characteristic elements suggests certain behavioral patterns.
The legislation considered in the study suggests that Congress has no understanding of the nature of cyberspace.153 Moreover, it appears there exists a general pattern to the flux of poorly drafted legislation. First, though legislation may have been circulating around Congress on certain cyber issues, the legislation does not obtain momentum until the severable issue becomes salient. Once salient, the application of that issue to cyberspace becomes a "sexy" commodity. That is, the Congress members believe they appear (1) technologically savvy and (2) concerned about issue x (whatever the issue happens to be.) There then is either a strong push behind one piece of legislation,154 a plethora of legislative initiatives (ie should something suddenly become salient without legislation under consideration),155 or when the one strong piece of legislation is criticized, a plethora of alternatives and amendments.
Once the legislation is introduced, it can be deconstructed according to the characteristic elements. The members begin to debate in public on the issues trumpeting the issue and government interest before their constituents. However, they avoid the issues that are not severable from cyberspace. Namely, the ignore the structure of cyberspace, its unique jurisdictional issues, and the technology upon which it is based.
From all appearances, a partisan division does not exist in this regard. Rather, though there may be a few exceptions, the legislation fits into the paradigm outside of any partisanship alliances. However, there are biases in favor of big business and against individuals. In this sense, members utilize the issue and government interest for political gain among the "people" and the legislation for political gain among the corporate interests. A definitive approach to studying partisanship should be included in the full analysis of paradigm class legislative initiatives.
As has been mentioned, the salience of the severable issue and government interest should be strong enough to overcome any outcry from the violation of individual rights. The proponents of the legislation will invoke the issue and government interest, playing off their salience to overcome any resistance. Whether the intent of the legislators is conscious and knowing or whether they truly believe the interest they advocate outweigh the interests of individual rights remains to be determined.
These conclusions emanate from the results obtained in the study. The results obtained through the application of the paradigm to selected legislative initiatives suggest the viability of the paradigm when applied to the entire paradigm class.156 At that time, further inquiry into the extra-paradigmitical conclusions would be implemented to test for their veracity.

B. A Sister Paradigm
There exist exceptions to the paradigm outlined above. Particularly, these are items of cyber legislation that protect the rights of individuals at the expense of corporate interests. Also, the issues invoke the government's interest in protecting the rights of individuals.157 Thus, the items of legislation fit into paradigm class because they meet the requisite elements. However, they become exceptions because they do protect the rights of individuals, are often constitutionally and technologically sound, and inevitably do not obtain enough support to obtain passage. These items of legislation arise on issues where many advocates have argued for legislative initiatives. Some congresspeople then in turn acknowledge the complaints and introduce legislation. However, these legislative initiatives inevitably fail.
While these "exceptional" legislative initiatives do not support the paradigm, they may create a complimentary paradigm, a sister paradigm. Particularly, those items of legislation that support individual rights against corporate interests will share nearly the opposite of the characteristic elements outlined above. Most noticeably, these items inevitably fail. Specific examples include legislative initiatives introduced to enact measures designed to protect netizens from corporate "marketing giants." In these cases, the "self-regulation" banner has been waived and, in turn, won the day. First, Congress has failed to enact legislation protecting netizens from "spam," or unsolicited email. Although anti-spam legislation has been introduced in both houses, the collective Congress has failed to reach agreement in conference.158 Both Senator Frank Murkowski and House Commerce Committee Chairman Thomas Bliley have called for anti-spam legislation in the 106th Congress.159 Second, all efforts to enact legislation containing strong privacy protections for consumers (ie similar to the EU Directive) have failed. However, the 106th Congress may break this pattern. The enactment of legislation intending to relax export controls of encryption software appears to be likely.

C. Paradigm Shift 2000
The research thus far also suggests there may be a paradigm shift in the near future. The cause for this may be two-fold. First, Congress, through the efforts of the Department of Justice, have learned from the CDA and COPA experiences. Not only have they learned about the requirements necessary should similar legislation be proposed a third time, they have also learned (providing them with the benefit of doubt) about the technological idiosyncrasies of the Internet and its related components. In both cases, however, the technology may advance at such a pace that the legislative process can not possibly catch up. Working against Congress is the fact that two important and high-profile attempts at regulating cyberspace have been recognized as flawed. While any court reviewing a distinct statute would not be consciously influences by prior political precedent, the legal precedent may indeed be more persuasive. In addition, the courts may become more wary of Congressional attempts in this area. With this in mind, the time between the introduction of legislation and its review on a motion for permanent injunction could defeat the nature of the legislation. Thus, Congress may indeed become technologically up to speed. However, the legislative and judicial process may prohibit such savvy knowledge from affecting cyberspace.
Delays such as this could be beneficial or detrimental, depending on one's position with respect to the content of the statutes being challenged. At the moment, it would appear that such a delay in process would benefit those advocates of individual rights. However, should Congress enact strong privacy initiatives, a challenge by the "marketing giants" may turn the tide.
Putting aside the problematic learning curve, the area of personal information privacy has begun to suggest evidence exists of a paradigm shift. Since more and more constituents have complained of privacy violations both within and without cyberspace, Congress finally responded by introducing a slew of privacy legislation. Examples of these include: the "Patient Privacy Act of 1998"160 and the "Medical Privacy Protection Act of 1998,"161 repealing the requirement for a national patient ID number; the "Financial Information Privacy Act of 1998,"162 and its Senate counterpart,163 preventing the acquisition of personal financial information from financial institutions under false pretenses and thereby protecting consumers and the institutions; the "Consumer Financial Privacy Protection Act of 1998,"164 requiring consumer privacy protections under the Consumer Credit Protection Act; the "Depository Institution Customers Financial Privacy Enhancement Act of 1998"165 and the "Securities Investors Privacy Enhancement Act of 1998," requiring, respectively, depository related institutions and securities related individuals to protect the confidentiality of their customers' financial information; the "Real Estate Transaction Privacy Promotion Act,"166 prohibiting a lender in a consumer residential mortgage transaction from requiring complete access to the consumer's tax information; Personal Privacy Protection Act;167 "Personal Data Privacy Act of 1998,"168 prohibiting the transfer, sale, or disclosure of personal privacy information without the express consent of the individual (with few exceptions) and to provide consumers with information held about them; and the "HIV Partner Protection Act,"169 requiring notification of AIDS to partner. This suggests that on some levels congressional members recognize the need for consumer protection on the Internet. If this change spreads to other areas of cyber legislation, the paradigm herein discussed may be descriptive of the past, but not the future. If so, so much better fore cyberspace. Finally, this success may change as the population within cyberspace continues to grow and becomes more savvy, though not necessarily tech savvy.

D. Future Studies
Should the paradigm withstand the full study of the paradigm class, it will provide a model through which the behavior of Congress in response to cyberspace may be fully examined. Additionally, the results may suggest the application of the paradigm to congressional response to certain forms of (or in general) new technology by changing the "cyber" variable. Even should the paradigm become relegated to history due to a paradigm shift (see above), the paradigm may represent a model for understanding congressional response to new technology and new environments where traditional legal and statutory understandings do not have their same meaning or relevance. By pursuing additional studies, a clearer understanding of these possibilities may be possible.
The intention of this study began as an exploration of congressional response to cyberspace. With an interest in cyberspace, law and politics, observations had been made over several years regarding the nature of legislative initiatives emanating from Congress. Thus, there existed preconceived notions of what congressional behavior would be found. While these notions and ideas were found with respect to the model legislation (CDA and COPA) and a few test samples, it became a more enormous task to do the depth of analysis originally desired. For example, research revealed that the impetus for CDA being enacted may indeed have been the Rimm study and subsequent TIME article. This suggested more research would be required into the media role at the time the legislation became an issue. For, the saliency of the issue plays a large role in the paradigm. Consequently, an accurate measure of the issue's saliency would be required.
The remaining elements (both requisite and characteristic) also required significant research to understand the legislation and legal arguments in full detail. While not overwhelming, the task seemed best delayed until the paradigm and an initial test analysis were completed. In addition, there were negative congressional actions (deciding legislative initiatives were unneeded) which needed to be further studied in their relation to cyber issues and positive actions (legislative initiatives). On this basis and from the results obtained through the study, a plan for future research developed.
First, the legislative initiatives would be considered from the 103rd, 104th, and 105th Congresses. Although the 106th Congress has only just begun, indications suggest there may indeed be paradigm shifts taking place. Consequently, the 106th would be tracked as it proceeds. In this way, the research is neither limited by the 106th Congress nor rendered dated so quickly. Second, upon successful completion of the full initial study of congressional response to cyberspace, the cyber variable will be altered to a distinct technological area. The same analysis will be made based upon the paradigm outlined in this article. Finally, technological issues will replace the "cyber-issue" requisite element.

V. TOWARD A PEACEFUL FUTURE
The essential message learned from this initial study consists of two words: SLOW DOWN. Big Brother has been moving too fast in its efforts to regulate new technologies. This pace can be seen in both positive actions (ie legislative initiatives) and in negative actions (unilaterally deciding legislation is unneeded). As with any phenomenon, be it congressional action or taking a math test, a steady pace is more sound than a rush to be the first to finish. Congress appears rushed to be involved in creating a regulatory regime in cyberspace. Whether it be for political gain in their legislative districts or states or to construct a regime prior to the EU and other countries, there speed renders their legislative initiatives ill conceived, ill timed and ineffective.170
The congressional response to cyberspace is ill conceived because the drafters do not understand the technological aspects of the phenomenon they seek to regulate. In addition, they fail to understand the unique nature of cyberspace and the inapplicability of many traditional notions of legal theories. For example, jurisdictional boundaries are not the same in cyberspace. With respect to the CDA and COPA, Congress attempted to regulate activity that would remain because anyone can access any material from anywhere in the world.
The legislative initiatives are also ill timed. It seems ironic that with technology moving so quickly legislative initiatives can be ill timed. However, Congress must make efforts to understand the technology and the positions of those interested parties who have contributions to make. Before Congress recognizes this need, any legislative efforts will be ill timed. Cyberspace and the Internet have been with us for quite some time. Pornography has been with us for quite some time. It is true the growth of the Internet is monumental. However, this should not justify creation of blind justice and ignorant statutes.
These problems render the legislation ineffective. The parties challenging the legislative initiatives recognize the interest being championed by Congress. However, they disagree on the methodology employed to reach the goal. So, a message to Congress: Slow down, take a deep breath. Ask for help. There are many of us who have been around cyberspace for some time. We have built homes and domains. We enjoy conversations on a diverse realm of subject matter. We welcome new neighbors, but we've enjoyed our freedom. Nonetheless, we are all in this wonderful new era together. And, regulation is necessary in some areas, in some it is not. We will agree and disagree. But the essence of any well crafted community is patience and understanding. Understanding comes with communication. How long the "war" will last remains to be seen.In essence, the ensuing peace process on this side of cyberspace will define the quality of life for generations of netizens to come. So, again, slow down, big brother. Your younger sibling has a thing or two to teach you before you take that exam.

1 For those who are unfamiliar, the blue ribbon campaign represented the efforts of those opposed to the CDA and reflected the sentiment that free speech should be preserved on the Internet. One may still observe some blue ribbons on particular web sites.

2 See generally Charles L. Mudd, Jr., The Emerging Realm of Electronic Law and Policy (1994) (on file with author, also available at http://www.

3 As will be demonstrated below, "politically attractive" refers to the politicians' interest in the topics for representing technological awareness and interest in the "severable" issue.

4 This period of unintrusive enjoyment constitutes the first phase of congressional response to cyberspace marked by the absence of any legislative efforts that would fall into the paradigm class identified below.

5 This will occur unless their behavior changes. The conclusion of the article suggests a path toward that direction.

6 As the research will indicate, there is evidence to suggest a third era of congressional response to cyberspace is on the horizon. However, the second era is by no means behind us.

7 Exon Amendment No. 2404, United States Senate, July 26, 1994.

8 Id. The amendment contained additional provisions that are not discussed in this article.

9 Id.

10 47 U.S.C. §§ 223 (a)(1) and (a)(2) (1992).

11 Remarks by Senator Exon when introducing Exon Amendment No. 2404, July 26, 1994. Text obtainable from: http://thomas.loc.gov/bss/d103query.html. At the close of his remarks, Senator Exon requested that an article from the Los Angeles Times be admitted without objection. The article reported on a discovery at Lawrence Livermore Laboratories that hackers had used the lab's computers to store pornographic material. "Info Superhighway Veers into Pornographic Ditch," Los Angeles Times, July 12, 1994.

12 S. 314, Bill Summary and Status for the 104th Congress. In the House, Representative Johnson introduced the counterpart to S. 314 as H.R. 1004 on February 21, 1995.

13 S. 314 at Section 2(a)(1); 47 U.S.C. 223 (1992) at (a) (1) and (2).

14 Comments of Senator Exon, February 13, 1995, CNN (Transcript # 1021-7). Available at: gopher://gopher.panix.com:70/00/vtw/exon/media/cnn.

15 Id.

16 Center for Democracy and Technology, Policy Post 1.1, (February 9, 1995). Available at: http://www.cdt.org/publications/pp10209.html.

17 Id.

18 Id.

19 Id.

20 Letter from Kent Markus (Acting Asst. Attorney General, U.S. Dept. of Justice) to Senator Leahy (May 3, 1995) (available at http://www.cdt.org/policy/freespeech/doj_050395.ltr.html).

21 Id.

22 Sable Communications of California, Inc. v. F.C.C., 109 S.Ct. 2829, 2836, 492 U.S. 115 (1989).

23 See id.

24 DOJ Letter. The DOJ specifically stated that prosecution under the dial-a-porn statute would be crippled. The DOJ stated that it had taken 10 years to obtain an effective statute to address the criminality of dial-a-porn due to constitutional challenges. The DOJ indicated it feared renewed constitutional attacks of that statute. Id. The length of time (10 years) it took to obtain a constitutional, working statute on dial-a-porn suggests one of two possibilities: (1) the ineptitude of Congress or (2) the tactic to continue enacting legislation as strong as possible until finally a court does not strike it down. If the latter is true, this posits a senseless and wasteful approach by Congress.

25 DOJ Letter. The defenses and the critiques are outlined in the DOJ letter. However, their specifics are not necessary for review here. See above for the url for the letter.

26 Policy Post 1.1.

27 Id.

28 Id.

29 Rimm, Martin. "Marketing Pornography on the Information Highway: A Survey of 917,410 Images, Descriptions, Short Stories, and Animations Downloaded 8.5 Million Times by Consumers in Over 2000 Cities in Forty Countries, Provinces, and Territories." 83 Georgetown Law Journal 1849 (1995).

30 Id. While there are certainly more claims within the study, a full analysis of the Rimm study is beyond the scope of this article. Rather, the study is mentioned due to its role as a catalyst in the CDA's enactment.

31 Id.

32 For links to a number of critical responses to the Rimm study, see http://www2000.ogsm.vanderbilt.edu/cyberporn.debate.html.

33 Elmer-Dewitt, Philip. "Cyberporn" Time (July 3, 1995).

34 Remarks of Senator Grassley and Exon, Congressional Record (June 26, 1995).

35 Email from Marc Rotenberg (Director, Electronic Privacy and Information Center) to Charles Mudd (March 15, 1999) (on file with author).

36 Telecommunications Act of 1996, Pub. L. No. 104-104, ? 502, 110 Stat. 56, 133-135.

37 Among the other parties joining in the complaint were: "Human Rights Watch; Electronic Privacy Information Center; Electronic Frontier Foundation; Journalism Education Association; Computer Professionals for Social Responsibility; National Writers Union; Clarinet Communications Corp.; Institute for Global Communications; Stop Prisoner Rape; AIDS Education Global Information System; Bibliobytes; Queer Resources Directory; Critical Path AIDS Project, Inc.; Wildcat Press, Inc.; Declan McCullagh dba Justice on Campus; Brock Meeks dba Cyberwire Dispatch; John Troyer dba The Safer Sex Page; Jonathan Wallace dba The Ethical Spectacle; and Planned Parenthood Federation of America, Inc." Reno, 117 S. Ct. at 2357, 521 U.S. at .

38 The parties to the second suit included: "American Library Association; America Online, Inc.; American Booksellers Association, Inc.; American Booksellers Foundation for Free Expression; American Society of Newspaper Editors; Apple Computer, Inc.; Association of American Publishers, Inc.; Association of Publishers, Editors and Writers; Citizens Internet Empowerment Coalition; Commercial Internet Exchange Association; CompuServe Incorporated; Families Against Internet Censorship; Freedom to Read Foundation, Inc.; Health Sciences Libraries Consortium; Hotwired Ventures LLC; Interactive Digital Software Association; Interactive Services Association; Magazine Publishers of America; Microsoft Corporation; The Microsoft Network, L.L.C.; National Press Photographers Association; Netcom On-Line Communication Services, Inc.; Newspaper Association of America; Opnet, Inc.; Prodigy Services Company; Society of Professional Journalists; Wired Ventures, Ltd." Id.

39 Id.

40 ACLU v. Reno, 929 F. Supp 824 (E.D. Pa 1996). Because the decision originated from the Internet, the actual paragraphs numbered are used [Note: in process of changing citations, where ¶ - the paragraph is cited, where number alone - page number as printed from Internet.]

41 Id. at 25.

42 Id. at 26.

43 Id.

44 Id.

45 Id.

46 Id. at 27.

47 Id. at 114.

48 Id. at ¶ 122.

49 Id.

50 Id. at ¶ 123.

51 Id. at "CONCLUSIONS OF LAW."

52 The decision of the panel included opinions from each of the three judges. While the analyses of the judges are recommended for further reading, the content of these separate opinions is not on COPA will be addressed as the Supreme Court has not heard arguments nor ruled upon COPA.

53 The transcript of the oral arguments is available from http://www.aclu.org.

54 Reno v. American Civil Liberties Union, 521 U.S. 844, 117 S.Ct. 2329 (1997).

55 Reno, 117 S.Ct. at 2334 521 U.S. at .

56 Reno, 117 S.Ct. at 2336, 521 U.S. at (citations and footnotes omitted).

57 390 U.S. 629, 88 S. Ct. 1274 (1968).

58 420 U.S. 546, 95 S. Ct. 1239 (1975).

59 438 U.S. 726, 98 S. Ct. 3026 (1978).

60 475 U.S. 41, 106 S. Ct. 925 (1986).

61 492 U.S. 115, 109 S. Ct. 2829 (1989).

62 Reno, 521 U.S. at, 117 S. Ct. at 2344.

63 Id.

64 413 U.S. 15, 93 S. Ct. 2607 (1973).

65 Id. at 24, 93 S. Ct. at 2615 (citations omitted).

66 Reno, 521 U.S. at , 117 S. Ct. at 2345.

67 Id.

68 Id. at 2344-2345.

69 Id. The Court distinguished this "increased deterrent effect" from that reviewed in Denver Area Ed. Telecommunications Consortium, Inc. v. FCC, 518 U.S. 727, 116 S. Ct. 2374 (1996).

70 Id. at 2346.

71 Id. at , 117 S. Ct. at 2346, 2347.

72 Id. at , 117 S. Ct. at 2347-2348. Recognizing that the CDA constituted Title V of the Telecommunications Act of 1996, the Court noted that unlike the other portions of the Act, the CDA was not the subject of "extensive committee hearings [nor] the subject of discussion in Reports prepared by Committees of the Senate and the House of Representatives." Id. at 2338, 521 U.S. at .

73 Id. at , 117 S. Ct. at 2350.

74 Id. at , 117 S. Ct. at 2349.

75 Id. at , 117 S. Ct. at 2349-2350. The Court also noted that there could be no assurance a minor would not be using a credit card or password to pose as an adult.

76 Id. at , 117 S. Ct. 2350.

77 Id.

78 Id.

79 Id. at , 117 S. Ct. at 2351. Justice O'Connor, joined by Chief Justice Rehnquist, concurred in part and dissented in part.

80 H.R. 3783, The Child Online Protection Act (1998); S. 1482. H.R. 3783 was introduced into the House on April 30, 1998 with sponsors including Representatives Greenwood, Manton, Gillmor, Deal of Georgia, Whitfield, Norwood, Cubin, Burr of North Carolina and Upton.

81 H.R. 3783.

82 At the hearing, some legislators and witnesses noted the irony that day because the House planned to post on its website Kenneth Starr's report on President Clinton. The report, as we all know or at least have heard, contained sexually explicit detail.

83 "Joint Statement for the Record on Legislative Proposals to Protect children from Inappropriate Materials on the Internet." ("Joint Statement") Submitted to the Subcommittee on Telecommunications, Trade and Consumer Protection, Committee on Commerce, House of Representatives, September 11, 1998. Available at: http://aclu.org/congress/t1091098a.html. Those signing the Joint Statement included: American Booksellers Foundation for Free Expression, ACLU, American Library Association, Association of American Publishers, Computer Professionals for Social Responsibility, Electronic Frontier Foundation, EPIC, Feminists for Free Expression, First Amendment Project, Freedom to Read Foundation, Gay & Lesbian Alliance Against Defamation; Institute for Global Communications; Internet Content Coalition; Journalism Education Association; National Campaign for Freedom of Expression, National Coalition Against Censorship; NetAction; Oregon Coalition for Free Expression; Peacefire; PEN American Center; People for the American Way; Periodical and Book Association of America; Publishers Marketing Association; and the Society of Professional Journalists.

84 Testimony of the ACLU before the United States Senate, Committee on Commerce, Science, and Transportation, Hearing on Indecency, February 10, 1998 (Submitted March 16, 1998). Available at: http://www.aclu.org/congress/archives.html#cl.

85 Simon & Schuster, Inc. v. Members of New York State Crime Victims Bd., 502 U.S. 105, 112 S.Ct. 501, 503 (1991).A content-neutral statute would merely be required to meet an "intermediate" level of scrutiny. Under this standard, "the Government may employ the means of its choosing so long as the ... regulation promotes a substantial governmental interest that would be achieved less effectively absent the regulation, and does not burden substantially more speech than is necessary to further that interest." Turner Broadcasting System, Inc. v. F.C.C., 520 U.S. 180, 117 S.Ct. 1174, 1198 (1997) (internal quotations and citations omitted).

86 "CDT, Constitutional Analysis of the Oxley Bill - The Child Online Protection Act" (H.R. 3783) ("CDT Analysis"), September 24, 1998; ACLU Testimony, p. 7.

87 ACLU Testimony, p. 6. Also, Advocates noted that the "coincidence [of the hearing being held the same day the Starr Report would be posted to the House's web site] underscores the fact that distinguishing between 'inappropriate' material and that which deserves wide distribution requires difficult -- and subjective -- judgments." EPIC ALERT, Volume 5.12, September 16, 1998.

88 Id. at 7. For example, this author just completed a transaction on www.ebay.com, an online auction house. The sale prompted the question: Should I sell my imaginary collection of rare, vintage Playboy, Penthouse and Hustler magazines on ebay.com, would I be subject to liability? What if I happened to be clearing my house of older junk material, conduct sales for a two month period, and then sell the collection of men's magazines? Or women's magazines?

89 ACLU Testimony, p. 6.

90 Joint Statement, p. 3.

91 Id.

92 H.R. 3783.

93 Id. Although COPA purports to offer a national solution to the problem, the "national" solution turns on local community standards of material "harmful to minors." Id.

94 H.R. 3783, Sec. 1403. As enacted, 47 U.S.C. § 231(a)(1).

95 The CDA imposed a sentence of not more than two years.

96

97 H.R. 3783, Sec. 1403. As enacted, 47 U.S.C. § 231(e)(2)(A).

98 H.R. 3783, Sec. 1403. As enacted, 47 U.S.C. § 231(e)(2)(B) (emphasis added).

99 Id.

100 H.R. 3783, Secs. 1402 and 1403.

101 The District Court noted the standard for obtaining a preliminary injunction: "the plaintiffs must prove: (1) the likelihood of success on the merits; irreparable harm; (3) that less harm will result to the defendant if the preliminary injunction issues than to the plaintiffs is the preliminary injunction does not issue; and (4) that the public interest, if any, weighs in favor of the plaintiffs." Citing Pappan Enterprises, Inc. v. Hardee's Food Systems, Inc., 143 F.3d 800, 803 (3d Cir. 1998).

102 ACLU v. Reno (II), February 1, 1999.

103 The exploration of those exceptions to the paradigm shall be included in the expansion of this particular project. However, see sec. IV.A. infra.

104 Novak, Marcos. "Liquid Architectures in Cyberspace." 225 Cyberspace: First Steps, ed. Michael Benedikt (1991).

105 An additional example concerns legislation focusing upon Y2K issues. This would be considered cyber oriented because it may affect the technology used to maintain or transport one to cyberspace.

106 Additionally, Y2K legislation becomes inextricably associated with consumer protection, contracts, warranties, etc. These invoke the government's interest in enforcing contractual obligations and protecting the market.

107 Y2K legislation would also be included in this because legislation might affect an individual's ability to enter cyberspace.

108 This does not suggest that the questions or the standards be based solely on constitutional protections. Rights granted by statute would be included, as would any question that focuses upon an understanding of justice. The ability to file suit against a manufacturer of non-Y2K compliant hardware or software would be included.

109 See supra, note 85.

110 Upon last minute reflection, I believe the first two characteristic elements should be combined and the second corollary (ie poorly written, infra) should be the second element.

111 This argument is quite similar to some heard in Denver and with the V-chip. Essentially, advocates against similar government regulation argue that the most effective control on minors' exposure to harmful material must be with parental and school control. Essentially, they advocate parents assume responsibility for the images and programs their children watch. Others respond that with more and more homes having both parents working, legislation exists to protect the children when adult supervision is absent. However, without question, responsibility appears to be a word with a dying meaning.

112 It could be related to the first characteristic element. If Congress champions the issue and government interest over individual rights, the paradigm applies. However, if the issue and government interest are identified with protecting individual rights, a distinct paradigm applies.

113 Quote obtained from EPIC ALERT, 5.12.

114 H.R. 3177 (105th Congress); H.R. .

115 H.R. 3442 (105th Congress).

116 H.R. 774, H.R. 1180 and H.R. 1964.

117 S. 97 (106th Congress). Introduced January 19, 1999.

118 For a challenge from almost a completely different perspective, a mother in Livermore, California brought suit against the City of Livermore seeking injunctive relief in the nature of an order prohibiting the city library system from allowing the access to pornographic material via computers connected to the Internet. Kathleen R. v. City of Livermore, Case No. V-015266-4 (Sup. Ct. Cal, May 28, 1998). The plaintiff filed the complaint after a request to use filtering software on the computers within the city's library system.
Apparently, the mother learned that her son had used the system's computers to obtain/download pornographic pictures. Her complaint alleged "waste of public funds," "nuisance," and "premises liability." Her amended complaint alleged the library "is misusing its traditional reputation as a safe-haven for children" and by maintaining a policy of "Library patrons use the Internet at their own risk," demonstrate "a deliberate indifference to the health and welfare of children" who are invited to the library. Amended Complaint, ¶¶ 5, 7, 9 (filed November 3, 1998).
The amended complaint alleged violations of the Fifth Amendment, substantive due process, and other federal and constitutional law under a fourth cause entitling her son to recovery under 42 U.S.C. § 1983. Id. at ¶¶ 10-12. Thus, they argue, an injunction should be issued prohibiting the City and its library "from knowingly and intentionally allowing its computers to display obscene and pornographic images where he and other children can view them." Id. at ¶ 13.
The trial court dismissed the suit granting the defendant's motions for demurrer. Http://www.techlawjournal.com/courts/kathleenr/default.htm. The trial court held that § 230 (section 230 (c)(1) states: "No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider"; and section 230 (d)(3) precludes any suit under any state law inconsistent with section 230) of the Telecommunications Act of 1996 bars the action on the first three counts. Id. The plaintiffs have since filed a notice of appeal. Id.

119 Mainstream Loudon, et al. v. Board of Trustees of the Loudon County Library, Civil Action No. 97-2049-A (April 7, 1998) (memorandum order and opinion). The Court also held that genuine issues of material fact remained as to "the defendants, justification for the policy, the Internet sites blocked by [the filtering software], and the degree of defendant's knowledge of and control over the sites [the software] blocks" and, therefore, defendant's motion for summary judgment should be denied.

120 Id. at 2.

121 Id. at 2. The plaintiffs also alleged the policy employed "no clear criteria for blocking decisions" and the policy's "unblocking policy [] unconstitutionally chills plaintiffs' receipt of constitutionally protected materials." Id. at 3.

122 Of the several immunity claims, the defendants argued that under the Communications Decency Act, 47 U.S.C. § 230. Citing Zeran v. America Online, Inc., 129 F.3d 327, 330 (4th Cir. 1997), the trial court held that "§ 230 was not enacted to insulate government regulation of Internet speech from judicial review." Id. at 11. The trial court did dismiss all defendants except the Library Board because the suit against the board alone "will provide plaintiffs with full relief against enforcement of the Policy" considering that "official capacity suits generally represent only another way of pleading an action against an entity of which an officer is an agent." Id. at 13 (quoting Monell v. Department of Soc. Servs., 436 U.S. 658, 690 n.55 (1978)).

123 Pico, 457 U.S. 853, 872, 102 S. Ct. 2799, 2810 (1982) (plurality opinion) (quoting West Virginia Board of Education v. Barnette, 319 U.S. 624, 642, 63 S.Ct. 1178, 1187 (1943)).

124 Loudon, at 26.

125 Id. at 26-27 (quoting Pico, 457 U.S. at 876 (Blackmun, J., concurring)).

126 See id.

127 Loudon, at 33.

128 Note the distinction between advocates suggesting the use of filtering software by individual families/parents and the decision by government entities or congressional decree forcing the use of filtering software on schools and libraries that provide services and facilities to a number of individuals.

129 ACLU, "Censorship In A Box," 1998. Available at http://www.aclu.org/issues/cyber/hmcl.html.

130 The author recognizes the need for additional support. In the final revision, such support will be cited. Nonetheless, the ACLU publication in note 127, supra, contains arguments supporting these conclusions - either specifically or generally.

131 Letter from the Internet Consumers Choice Coalition to Senator Orrin Hatch, Senate Judiciary Committee (October 8, 1997) (available at http://www.aclu.org/congress/lg100897a.html).

132 Id.

133 Id.

134 Id.

135 In essence, this would probably come down to the lowest common denominator (ie the most restrictive regulatory scheme). Indeed, the Coalition argues the bill would allow a single jurisdiction to wield a veto power over both the types of content and transactions which occur over the Internet. This may also pose significant problems in choice of law and jurisdictional disputes.

136 Coalition Letter.

137 Id.

138 Id.

139 Lessani, Andrea M. "How Much Do You Want to Bet That The Internet Gambling Prohibition Act of 1997 is Not The Most Effective Way To Tackle the Problems of Online Gambling?" UCLA Online Institute for Cyberspace Law and Policy (May 1998).

140 The Practicing Law Institute ("PLI") offers a free mailing list (PLI-Y2KLAW@PLI.EDU) discussing the legal aspects of Y2K. This includes vendor liability, Y2K compliance, and remediation efforts. Also, the Information Technology Association of America offers a free weekly "Y2K Outllook" newsletter. Contact: http://www.itaa.org.
There have been several Y2K lawsuits filed. See http://www.itaa.org. It is the opinion of this author that most will be resolved through alternative dispute resolution, rather than proceed to a full trial.

141 From the THOMAS database of federal legislation, a search for "Y2K" and "Year 2000" found no relevant results for the 103rd and 104th Congress. While "Year 2000" produced results, there were not specific to this issue.

142 They primarily related to ensuring compliance among the federal agencies.

143 S. 96 (106th Congress). Senator McCain introduced the bill on January 19, 1999.

144 Admittedly, placing caps on recoverable damages does not enjoy the same level of salience as does Y2K. However, the salience that does exist may be observed in other areas of litigation; medical malpractice, for example.

145 Critics include the American Trial Lawyers Association and the White House. As with the prior categories and the CDA/COPA model, there do exist proponents of the bill including the ITAA. However, the purpose here is not to deconstruct the entire legislative initiative by addressing and analyzing arguments on either side. Rather, the intent is to identify whether the legislation fits within the paradigm. However, the paradigm could perhaps be refined by addressing and studying the proponents and their arguments for particular legislative initiatives.

146 ITAA, ITAA's Year 2000 Outlook (March 5, 1999) (on file with author).

147 Id.

148 Id.

149 Id.

150 Id. Apparently, the defense would be available if a defendant can demonstrate "that the plaintiff should have known of information that could reasonably have aided the plaintiff in avoiding the injury on which the claim is based." Id.

151 ITAA.

152 This ignorance does not identically meet the characteristic element identified as a lack of technological knowledge. However, it does suggest a more general lack of knowledge on the subject matter they are legislating.

153 These conclusions are based on the behavior of the body Congress and those who initiated the legislation considered in the study.

154 Although the CDA had its competitors, Senator Exon's bill tended to be the forerunner and most widely supported - among those who did support the legislation.

155 This has occurred with Y2K and privacy legislation.

156 At present, those legislative initiatives to be considered for possible paradigm class status will be those whose text includes the following key words: "Internet", "cyberspace", "Y2K" or "Year 2000", and "privacy" in conjunction with "electronic". Initial results indicate that the "Internet" class will be as follows:

101st Congress 1989-1990 0
102nd Congress 1991-1992 10
103rd Congress 1993-1994 23
104th Congress 1995-1996 75
105th Congress 1997-1998 413
106th Congress 1999-2000 58* * as of mid-March 1999

Results obtained using the Thomas congressional database. The numbers certainly represent an increase in the relevance of the Internet to legislation. The extent to which the Internet plays a primary role in the legislation remains to be determined.

157 There may be more specific government interests that may be explored in further research.

158 In the 105th Congress, the following bill numbers represented spam related legislation: H.R. 1748, H.R. 2368, H.R. 3888, H.R. 4124, H.R. 4176, S. 771, S. 875, and Amendments to S. 1618. H.R. 3888 was passed in the House, but died in conference. The Amendments to S. 1618 passed the Senate but died in conference. Coalition Against Unsolicited Commercial Email (CAUCE), http://www.cauce.org/legislation.html.

159 Id.; "A Statement from Senator Frank Murkowski," http://www.senate.gov/~murkowski/commercialemail/EmailAmendText.html.

160 H.R. 4281 (105th Congress).

161 H.R. 4312 (105th Congress).

162 H.R. 4321 (105th Congress).

163 S. 2433 (105th Congress).

164 H.R. 4388 (105th Congress).

165 H.R. 4395 (105th Congress).

166 H.R. 4395, 105th Congress.

167 H.R. 4425, 105th Congress.

168 H.R. 4470 (105th Congress).

169 H.R. 4431 (105th Congress).

170 A recent study by The Media Institute graded the three federal branches of government on their performance in protecting the First Amendment rights of the Media. Interestingly, in 1998, the legislative branch scored a C on Internet issues and a D+ overall due primarily to the passage of CODA. The First Amendment and the Media - 1999, The Media Institute, 1999. Richard T. Kaplar, vice-president of The Media Institute, stated that over the last three years "[t]he performance of the political branches of government have been consistently dismal. The courts have been the sole bright spot - and occasionally brilliant, as in 1997's Communications Decency Act . . . ." "Courts Outperformed Congress and Administration in Protecting Media's First Amendment Rights, Annual Media Institute Survey Finds." Wired News, March 8, 1999. The report cites "CDA II, restrictions on encryption products, crackdowns on Internet advertising as contributing factors to the Legislative Branch's poor grade. Id. The executive branch scored a D+, the judicial branch a B- and state courts a D-. Wired News story Available at: http://www.wired.com/news/news/email/explode-infobeat/politics/story/18320.html.


copyright 1999 by Charles Lee Mudd, Jr.