Translate

Friday, March 12, 2010

History Of Pornography

History Of Pornography
By: Thomas “Birdy” McKee

Background:

Internet PORNOGRAPHY is a battlefield in US law. Since the explosion of PUBLIC INTEREST in the Net in the 1990s, the public, lawmakers, and the courts have argued over how to control online porn. Congress and state legislatures have passed several laws aimed at protecting children from exposure to cyber porn, but the most sweeping of these have often failed to pass constitutional tests. The failure of these laws in court means this popular yet controversial medium faces few regulations. According to Forbes magazine, the online porn business in 2008 swelled to $1 billion a year, a significant part of a larger industry estimated to earn anywhere between $3 and $8 billion annually. In some respects, the issue continues a legal struggle many decades old. Opponents of pornography have long tried to control it on moral grounds, even as proponents sought to protect it as a valid expression of free speech. Traditionally, opponents won these battles. The Supreme Court established that Obscenity is not protected by the First Amendment, but the difficult question in each case has been defining what is and what is not obscene. Its rulings gradually shifted from a broad, forbidding position of the late 1950s to holding in the 1980s that communities could set their own standards for obscenity. Replayed in countless courtrooms, the tug-of-war between these camps has continued ever since. But the fight over cyber porn carries traditional arguments into new areas shaped by technology. A chief concern is that the Internet allows minors easy access to it through search engines—sometimes even accidentally. In 2001, US. Solicitor General Ted Olson contended that minors could stumble upon or intentionally enter 28,000 commercial porn websites. Also of worry is the Internets ability to facilitate the illegal dissemination of child pornography. And the ubiquity of Internet access has raised new social problems by introducing pornography into new settings, such as public libraries and the workplace. Milestones in the development of Internet pornography law include the following. The Supreme Court established that obscenity is not protected by the First Amendment in Roth v. United States, (1957), declaring obscenity to be "utterly without redeeming social importance."

After subsequent cases showed the difficulty of finding a conclusive definition of obscenity, the Court restated its definition in Miller v. California, (1973). It substituted a detailed three-part test ultimately to be used by each locality—the "community standards" test.

The Court ruled that child pornography is not a form of expression protected under the constitution in New York v. Ferber, (1982), It has also upheld a state law prohibiting the possession and viewing of child porn in Osborne v. Ohio, (1990). Seeking to control Internet porn, Congress first passed legislation in 1996. The Communications Decency Act (CDA) criminalized the dissemination over computer networks of obscene or indecent material to children.. Immediately blocked from enforcement by the courts, it was ruled unconstitutional under the First Amendment in 1997.

Seeking to update federal child pornography law for the Internet, Congress passed the Child Pornography Prevention Act (CPPA) of 1996. Among other features, the law criminalized any visual depiction that "appears to be" child pornography, including virtual porn created by computer. After lower courts struck down provisions of the Statute, the US. Supreme Court agreed to hear an appeal in Ashcroft v. Free Speech Coalition, with a verdict expected in late 2002.

The Child Online Protection Act (COPA) of 1998 revived the CDA by modifying its scope. COPA criminalized the use of the World Wide Web to sell material harmful to minors. Ruled unconstitutional, the case remained on appeal before the Supreme Court with a decision expected by summer 2002.

The Protection of Children from Sexual Predators Act of 1998 included Internet-specific provisions for reporting child pornography to authorities and prohibiting federal prisoners from being allowed unsupervised Internet usage.

Two federal laws regulate access to Internet pornography at libraries and schools, the Children's Internet Protection Act (CIPA) and the Neighborhood Internet Protection Act. Together, they require filtering software to be installed on computers in public schools and libraries as a condition for federal funding. Both laws were challenged in court in early 2002, with their outcome uncertain.

As these federal cases suggest, recent outcomes have favored those who regard federal control of Internet pornography as Censorship. That does not mean the issues are settled, as indeed partisans on both sides of the issue eagerly anticipate forthcoming court decisions on major cases in 2002.

Federal Restrictions on Cyber Porn

Child Pornography
Child pornography has long been treated severely under both federal and state law. Congress first addressed the issue with the Protection of Children Against Sexual Exploitation Act of 1977. Lawmakers later toughened restrictions in the Child Protection Act of 1984, the Child Protection and Obscenity Enforcement Act of 1988, and the Child Protection Restoration and Penalties Enhancement Act of 1990. In the 1990s, lawmakers twice passed legislation targeting child porn online. The first was the Child Pornography Prevention Act (CPPA) of 1996, designed both to close loopholes in existing federal child pornography law and address new technological issues by the following:

Criminalizing the act of knowingly possessing, selling, receiving, sending, or transmitting child pornography via the internet or e-mail.

Criminalizing "virtual" depictions of child pornography, those that appear to involve minors and those created by computer graphics software.

Lower federal courts split over the constitutionality of some provisions in the law, and an appeal in Ashcroft v. Free Speech Coalition will be decided by the US. Supreme Court in 2002. The Protection of Children from Sexual Predators Act of 1998 contains further anti-child porn provisions. Title II of the law contains the following provisions:

Provides for the prosecution of individuals for the production of child pornography if the visual depiction was produced with materials that have been mailed, shipped, or transported in interstate or foreign commerce, including by computer. Tightens previous federal law by making it a criminal offense to possess for even one depiction of child pornography. Outlines responsibilities for Internet Service Providers in reporting child pornography to authorities Increases federal criminal penalties for child pornography, which include fines and prison sentences ranging from 15 to 30 years.

Disseminating Cyber Porn to Minors

Although several federal laws have sought to control Internet porn, none has specifically tried to forbid it. In large part this is a recognition of the legal protections pornography enjoyed toward the end of the twentieth century. CASE LAW has established that much pornography is protected speech under the First Amendment. Obscenity is not protected. However, as the Supreme Court's "community standards" doctrine acknowledges, communities measure obscenity differently: what is likely to be considered obscene by a jury in Utah is not guaranteed to similarly move a jury in New York. The difficulty of formulating one broad standard of obscenity for all communities is made even greater by the Internet's being a global network, available everywhere at once.

Thus rather than trying to eliminate cyber porn, Congress has twice sought to protect children from exposure to it. These laws have yet to be enforced. Both wound up in court, where sections of each were ruled unconstitutional. Crucially, the fate of one law still remains as of 2002 on appeal. The Communications Decency Act (CDA) of 1996 was lawmakers' first attempt to regulate the availability of indecent and obscene material online to minors. The CDA prohibited the "knowing" dissemination of such material to minors over computer networks or telephone lines, establishing penalties for violations of up to five years Imprisonment and fines of up to $250,000. But it quickly fell to a legal challenge brought by the American Civil Liberties Union (ACLU) and a coalition of major publishers. Bringing a traditional First Amendment case against censorship, they argued successfully that the law was too broad: in trying to protect kids, its prohibitions would have limited the speech of adults to a level suitable for children. After a special three-judge panel ruled against the law in Philadelphia in 1996, the Supreme Court by 7-2 vote in American Civil Liberties Union v. Reno,(1997), held that the law unconstitutionally abridged Freedom of Speech and thus struck down key provisions.

Seeking to draft a constitutionally viable law, Congress responded by passing the Child Online Protection Act (COPA) of 1998. More narrowly written, COPA took aim at commercial online porn sites that disseminate
material to minors. And, anticipating constitutional objections, it mandated that criminal cases brought under it would be tried according to contemporary community standards. The law set stiff penalties of $150,000 for each day of violation and up to six months in prison. However, COPA suffered similar setbacks in court after the ACLU and several non-pornographic online websites successfully contested it, first in federal district court in Philadelphia and then before the US. Court of Appeals for the 3rd Circuit. As before with the CDA, the Justice Dept. has continued to appeal; this time, it has argued that online porn is even more readily accessible to children and thus in need of urgent control. The US Supreme Court heard oral arguments in late 2001 and was expected to rule on the case, Ashcroft v. ACLU, in summer 2002. If the Supreme Court reverses the two lower rulings, an enforceable COPA would represent a milestone in the evolution of Internet law. It would almost certainly open a flood of litigation by opponents of pornography and pose new, difficult questions of jurisdiction. But even if the Court finds the law unconstitutional, few legal observers believe this will be the last word. It is likely that legislators will continue to press forward to find other legal means to regulate the availability of online porn to minors.

Filtering in Federally-funded Public Schools and Libraries

In another attempt to protect children from exposure to cyber porn, Congress passed two laws in 2000 aimed at public schools and public libraries. Federally-funded institutions of this kind are required to put in effect Internet safety policies in order to continue qualifying for federal support. They must install Internet filters on their public computers: these are commercially-available software programs, with names like Cyber Patrol and Net Nanny, that intercept and block pornographic materials. Under the terms of the Children's Internet Protection Act (CIPA) and the Neighborhood Internet Protection Act (NCIPA), filters had to be in place by 2001, although libraries were ultimately given extra time to comply. Proving as controversial as the CDA and COPA, the laws have been challenged by the American Library Association and civil liberties groups. They have argued that the law will result in censorship because it relies upon inaccurate technology, citing evidence that some software filters erroneously block non-pornographic material, too. Oral testimony on the case was heard in spring 2002, with a verdict expected later in the year.

State Laws On The Subject:

State laws on Internet pornography have evolved rapidly. Prior to the rise in popularity of the Internet, most states already had laws on the books regulating age limits for purchasing pornography as well as statutes
criminalizing child pornography. Many legislatures saw a need for legislation to respond to the vicissitudes of new technology. Between 1995 and 2002, nearly two dozen states considered bills that would control in some fashion access to Internet pornography. More than a dozen states enacted them. Closely resembling federal law, state laws break down into two broad categories. In the first and broadest, the laws forbid the access by minors to what the laws usually call "harmful materials"— verbal and visual information that includes, but is not necessarily limited to, pornography. Sometimes these laws target "indecent" material; for example, Oklahoma and New York law each criminalize the transmission of indecent materials to minors. Most state laws on transmission of indecent materials target exposure in public schools and libraries. Their remedy is to require, and in at least one case merely recommend, that these facilities install Internet filtering software on their computers. At least six states have passed such laws: Arizona, Kentucky, Michigan, Minnesota, South Carolina, Tennessee and Washington. Thirty-One more states were considering such legislation in 2008-2009. Like federal law, a second category of state law targets virtual child pornography. Aggressively defining this new category of criminal offense, these laws treat virtual porn as severely as actual photography of minors.

In the mid-to late 2000s, for instance, both Kansas and Montana expanded their existing statutes to prohibit transmission and possession of such images, while other states such as Missouri and Minnesota enacted new laws. Early court challenges, much more sweeping state cyber porn laws failed to pass constitutional tests in three states. In American Library Association v. Pataki (1997), a federal judge blocked enforcement of a New York statue prohibiting online indecency that had been modeled on the federal Communications Decency Act, ruling that it violated the Constitution's Commerce Clause. In ACLU v. Johnson (1998), a federal district judge ruled on First Amendment grounds that New Mexico could not enforce a law criminalizing the online dissemination of any expression that involves nudity or sexual content. And in another victory for First
Amendment advocates, a federal judge blocked Michigan's 1999 law criminalizing online communications deemed harmful to minors in Cyberspace v. Engler (1999). Like ongoing litigation over federal laws, the battle over state cyber porn law is far from over. Many legislatures are looking expectantly to the Supreme Court's 2002 decision on Internet filters before pursuing further legislation of their own. And still other states are trying new strategies, including more aggressive legislation that would put pressure on Internet service providers (ISPs) to supervise their customers: under a new Pennsylvania law enacted in 2002, owners and operators of ISPs will be responsible for blocking access to child pornography with high fines and prison sentences for violators. Ongoing action and controversy is likely in this area of law for the foreseeable future.

Additional Resources:

Constitutional Amendments: 1789 to the Present. Kris E. Palmer, ed., Gale Group, 2000.
Cyber Liberties. American Civil Liberties Union Website. Available at:
http://www.aclu.org/issues/cyber/hmcl.html.

Ashcroft v. Free Speech Coalition. US Department of Justice, 2000. Available at: http://www.usdoj.gov/osg/briefs/2000/3mer/2mer/2000-0795.me... .

State Internet Laws Face a Different Constitutional Challenge. Kaplan, Carl S., The New York Times, July 2, 1999.

U. S. Supreme Court Considering Law on 'Virtual Child Porn.' Kleder, Martha, Culture and Family Institute. Available at http://cultureandfamily.org/report/2001-11-08/n_childporn.s...

West Encyclopedia of American Law. Theresa J. Lippert, ed., West Group, 1998.


Organizations:

American Civil Liberties Union (ACLU)
125 Broad Street, 18th Floor
New York, NY 10004 USA
Phone: (212) 549-2500
URL: http://www.aclu.org
Primary Contact: Nadine Strossen, President

American Family Association
PO. Box 2440
Tupelo, MS 38803 USA
Phone: (662) 844-5036
Fax: (662) 842-7798
URL: http://www.afa.net
Primary Contact: Donald E. Wildmon, President

Federal Bureau of Investigation
J. Edgar Hoover Building, 935 Pennsylvania
Avenue, N.W.
Washington, DC 20535-0001 USA
Phone: (202) 324-3000
URL: http://www.fbi.gov
Primary Contact: Robert S. Mueller III, Director

Additional information can be found at you State Attorney General's Office, or at your local police department. If you suspect that a person or persons are trafficking in child porn, I encourage you to report them to your local authorities.

Wednesday, March 3, 2010

What is a Robbery, and Tips to Avoid being a Victim of One

WHAT IS A ROBBERY:
Robbery is defined by the US department of Justice as: The taking or attempting to take anything of value from the care, custody or control from a person or persons by force or threat of force or violence and/or by putting the victim in fear.
This is different from mere theft, where force is not used against you personally, but objects are stolen. In short: Theft happens to your property. Robbery happens to you.

In theft your any damage will occur to the item stolen or other property (viz, your door kicked in by a burglar). With robbery the threat of harm is to you.

A pick pocket (who takes your wallet out of your purse) is not committing robbery, he is committing theft. Someone who walks up and puts a gun in your face and demands your purse is committing robbery. In a robbery, you are put in danger. This is why robbery is deemed a more serious crime. IF you are lucky, you will only be offered the threat of violence.


Why is Avoidance Best?

It might require you to take extra steps, it might even require you to hang up your cell phone and return to where you came from, but why is avoidance the best option?


Who's Going To Be Robbing You?

To understand both the dangers and why you want to avoid such situations, you might like to understand what kind of person commits robberies and muggings.

Kinds of robbery
Different states have different definitions and different statutes regarding robbery. But there are basic kinds of robbery and often what you do for a living or where you live determines what kind of robbery you are most likely to encounter.

Fringe areas
Most personal robberies occur in what we call "fringe areas." This is a common term that runs through our system. What constitutes a fringe area might surprise you.

Five Stages of Violent Crime
What are the predictable - and easily identified stages a violent crime MUST go through in order to happen? How to identify when you are being set up for a violent crime

Robbery avoidance
Avoidance sounds wimpy until you are staring down the barrel of a gun, then it begins to make all sorts of sense. Unfortunately, by then it is too late. It is far easier to avoid being robbed by taking simple and easy steps.


Car jacking

Much of what you can do to prevent your vehicle from being carjacked can be found in the robbery avoidance page, however, there are some things that are specific to carjacking.

Pyramid of personal Safety
The pyramid of Personal Safety is a multilevel system designed to both discourage and foil criminals from preying on you. It is a blanket protection against several kinds of crime ranging from burglary, robbery and stalking. The more levels you include the safer you will be.

Lethal force
For those of you who find the idea of using lethal force to protect yourself uncomfortable, it is critical to realize that it exactly the level of force, whether lethal or of grave bodily injury that the robber is offering you. And that means you ARE in serious danger.

Mental Preparation

The cost of "defending yourself"
Many people think about getting a weapon or training to protect themselves from robbery. Others are appalled by the idea. We maintain this is a personal decision for each person to make. If you do chose to acquire either weapon or training, however, you are not exempt from deploying an avoidance strategy. There is a psychological cost of using lethal force on another human being. What the following article discusses is some of the long term repercussions that one must expect--especially if you did not try to avoid the situation. The article was written to get through to you a young man who had cavalierly discussed the idea of using a knife on another human being, as such the language is somewhat rough being a "Wake up Junior." Although focused on knife use, it is applicable to any lethal force usage.

Lunch Time Lectures: Crime Prevention

For businesses in the Colorado Front Range area (Denver & Colorado Springs) we offer a one-hour "Lunch Time Lecture" on crime avoidance and personal safety. We travel to your office and lecture your staff on how not to be the victim of crime. This is not a self-defense seminar, it's how not to be selected as a victim.

WHAT TO DO DURING A ROBBERY:

Try to stay calm. Don't make any sudden movements to upset the robber.

Do exactly as you are told. DO NOT RESIST!

Activate your alarm ONLY if you can do so secretly.

Tell the robber about anything that might surprise him, such as someone who is expected to arrive soon.

If you have to move or reach, tell the robber what you are going to do and why.

Try to get a good look at the robber so you can describe him later.

Don't be a hero. It's better to lose your money than your life.

Give the robber time to leave.

Note his direction of travel when he leaves.

Try to get a description of his vehicle ONLY if you can do so without exposing yourself to harm.

WHAT TO DO AFTER A ROBBERY:

Call the police immediately, even if you have already activated the alarm.
Close the store and lock the door(s) if you have a key.

Do not discuss the details of the robbery with witnesses or fellow employees.

Ask any witnesses to stay until police arrive. If they can't, get their names, phone numbers and addresses.

Do not touch anything that the robber may have touched.  Block off areas where the robber was, if necessary.

Try to recall as much as you can about the robber's appearance, speech and mannerisms. Make notes.

Step outside the store when the police arrive so that they'll know the robber is gone and you are safe.

Let the police answer inquiries from the news media.
Do not discuss the amount of money taken with anyone other than police.

TIPS ON PREVENTING ROBBERY
AND STAYING SAFE AT HOME:


Do not allow strangers into your home, even if they are hurt or say they need help. Keep the door locked and call the police for them.

Do not advertise that you live alone.

Don't be afraid to call the police to investigate suspicious circumstances, unusual people or strange noises. It is better to be safe then sorry.

When you move into a new home, change the locks.

Keep your curtains or shades closed at night.

Don't leave notes on your door announcing when you will be home.
Keep outdoor lights on at night.

Never give information to an unknown caller. Report nuisance calls to the police and the telephone company.

Keep your doors and windows locked. If it is warm and you leave your door open for circulation, keep the screen door locked.

If you arrive home and your door is open or things appear to be out of place - don't go in your home. Leave and call the police.

Write down license numbers of suspicious vehicles to give to the police, if necessary.

TIPS ON PREVENTING ROBBERY
AND STAYING SAFE ON THE ROAD:


Keep your car in gear, doors locked, windows rolled up.

Stay alert and aware of your surroundings, especially at intersections and stop lights.

Park in areas that will be well lit when you return.

There is safety in numbers! Walk with friends or a in a group.

If you are being followed, don't drive home or get out. Drive to the nearest police station, open store or business for help. Try to note the license number and description of the car and persons following you.
Don't advertise. If you are out at night, don't wear expensive or fancy looking jewelry. This is an invitation to trouble.

If someone tries to get in your car while you are stopped - drive away quickly. 

Don't use ATM machines at night. Plan ahead and get your cash during safer times. Use ATM machines that are very visible. Avoid isolated ATM machines.

When using valet parking, provide the parking clerk with the valet key that most car manufacturers provide now. This prevents strangers from looking in your glove compartment and trunk and finding personal information.

Walk in open, well lit areas.

Avoid carrying a purse, if you can.


TIPS ON PREVENTING ROBBERY
AND STAYING SAFE AT WORK:


Keep your front doors and windows clear of signs and posters to allow good, two way visibility. Employees can see suspicious persons outside. Passers-by and police can see inside.

Keep the outside of your business well lit at night.

Make sure your cash register area is clearly visible to outside observers.
Practice good cash control. Keep a minimum amount in your cash drawer and make regular drops into a safe.

Advertise outside that you keep a minimal amount of cash in the register and that you will not accept large bills.

Don't keep large bills under the cash drawer. If you don't have a safe, find a less obvious place to hide your extra cash until you go to the bank.
Use a safe that the clerk cannot open alone or that requires two keys. Post that fact conspicuously, including on the safe itself.

Use video camera surveillance and make it well known.

Always have at least two clerks working at night.

Vary your banking routine. Carry cash in a variety of ways - a lunch sack, attaché case, flight bag, pocket, etc. Money bags are pretty obvious.

Vary the times and routes that you use to go to the bank.

Make deposits as often as possible, never less than once a day.

Be alert for "customers" who seem to be loitering or glancing around the store while appearing to shop or browse through a magazine.

Watch for suspicious persons outside the business - especially in parked cars and around telephone booths.

If you see someone who is acting suspicious inside or outside, call the police to have them checked out.

Two persons should be on hand at opening and closing times. 
At opening time, one person should enter the store and check to see if it has been disturbed.

Before closing, one person should check the office, back rooms and rest rooms to make sure no one is hiding inside.

Keep side and back doors locked. Have employees use the main entrance, if possible.

Place markers at the main entrance that employees can use to help gauge the height of a robber as he leaves.

By: Thomas "Birdy" McKee
Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)