(Carr, 1998) Carr mentioned the buzz phrase "rating system" as an example of a way to censor the Internet. This "rating system" is a way in which certain issues, pictures, information, etc. can be censored. However, not everyone is in favor of these "rating systems." The American Civil Liberties Union (ACLU) strongly opposes this idea in their article "Fahrenheit 451.2-Is Cyberspace Burning?".
http://news.yahoo.com/hackers-may-used-pa-company-hit-target-195942337.html. 7 February 2014. 11 February 2014. Hendler, James. http://www.scientificamerican.com/article/its-times-reform-computer-fraud-abuse-act/.
The bill is a nation legislation trying to control a international network, which is virtually impossible. According to the First Amendment, Americans were granted to write anything they please, whether it's indecent or not, several series of judicial decisions also helped the freedom down the road.6 Nebraskan Democrat James Exon, put together an informational binder known as the Blue Book to show the Senate about the goings on within the Internet.7 Along the pages of the Blue Book were pictures of people bound and being burned by cigarettes, people pierced with swords and people involved in sexual activities with animals.8 The Senate, acknowledging their ignorance of the Internet, passed Exon's proposal after seeing the pictures in the Blue Book.9 Along with distribution of pornography, a person carries the chance of two years in prison and a $250,000 fine which is a good reason to restrict much of the flow.10 The Internet is extremely massive, filled with usenet newsgroups, web pages, IRC channels, ftp sites, gopher sites and much more. The Internet is the last and largest frontier of uncensored speech, anything from friendly chat to child por... ... middle of paper ... ...ther person might be secretly trading child porn. With over 30 million users on the Internet, no one can guarantee that no pornography will stray down from someone. Bibliography "Background Information."
Communications of the ACM, 17. Mansur, D. (1998). Computer Security. Retrieved from https://www.llnl.gov/str/Mansur.html Marsan, C. (2008, October 30). Morris worm turns 20: Look what it's done.
Pros & Cons of Internet Filtering in Schools. (n.d.). Retrieved April 12, 2011, from http://www.ehow.com/list_6916764_pros-cons-internet-filtering-schools.html Sproles, J. (1998). Cyber-terrorism.