Feeds

New York Net-porn law upheld on appeal

Prudes 2, Pervs 0

  • alert
  • submit to reddit

The essential guide to IT transformation

A New York State appellate court ruled unanimously yesterday that the state's Internet porn law passes constitutional muster because it addresses luring a child into sex or sexual performances. The appellate hearing sprang from one of the first Internet pedo stings, in which one Thomas Foley attempted to seduce someone he thought was a 15-year-old girl, but who was in reality a New York State Police officer. Foley's lawyers argued that the New York porn law is a restriction on the content of speech which violates the First Amendment to the US Constitution. The court was not sympathetic. "An invitation or enticement is distinguishable from pure speech," Judge Richard Wesley wrote. What a load of bollocks. All speech is distinguishable from 'pure speech'. All speech is rhetorical by nature. Or is the Trivium of communicative arts no longer composed of grammar, logic and rhetoric? Come to think of it, in America it might be composed solely of fluff.... And does this mean that the rhetoric of erotic speech clearly intended to entice a child to engage in sex with an adult should be seen as essentially different from the rhetoric of a rational argument clearly in favour of pederasty? We think not, though we imagine the judge would think so. He has to construct an arbitrary boundary between the two in order to avoid having to prosecute the publishers of Plato's Symposium on grounds that it might persuade children to embrace sexual relationships with adults. Which, if you read it closely, it just might do.... If we look rigorously at this portion of the court's finding, and reject any artificial distinctions between the rhetoric of eroticism and the rhetoric of argumentation, then we find the judges sliding down a very slippery slope towards censorship of all speech persuasive of deviation from Bourgeois Christian values. Which would be fine if the United States wishes to limit itself to being a bastion of Protestant right-thinking and Bourgeois high-mindedness (and Heaven knows there are enough Americans in favour of that). The problem, however, is the Bill of Rights, which declines to distinguish speech along any such lines. The Court also said the law specifically targets communicative acts rather than content by outlawing "the intentional dissemination of this type of material to a minor in conjunction with the sender's enticement or invitation to the child to engage in sexual activity." This is another arbitrary distinction, here between (presumably 'pure') communication, and communicative acts, which would mean that writing, publishing, reading or possessing the Symposium would not be illegal; but if an adult should give the book to a child in hopes that they might take from it a more liberal view of inter-generational sex, that would be a crime. This seems pretty shaky too. So the two key issues for the New York appellate court are, first, a difference between 'pure speech' on the one hand and what we can only call 'rhetorical speech', or speech intended to affect the inclinations of whoever reads or hears it, on the other - a distinction which we believe is purely imaginary since all speech has that property in varying degrees; and, second, a difference between communication and a 'communicative act', which apparently means that if you say something naughty for no reason it's all right, but if you say it for a naughty reason it's very bad. It's the sort of hair splitting that lawyers and judges live for, but in the realm of common sense it leaves a great deal to be desired. Nevertheless, the judge predicted that the New York law should be narrow enough not to share the fate of the federal Communications Decency Act, which was struck down in part by the US Supreme Court in 1997. We were unable to determine by press time whether or not the Foley team intends to bring the case before the US Supreme Court. But we can say that we're not as confident as Judge Wesley that the Rehnquist Court, which has repeatedly demonstrated a fundamentalist bias in matters touching on the First Amendment, will see things his way if the case should go forward. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
Twitter: La la la, we have not heard of any NUDE JLaw, Upton SELFIES
If there are any on our site it is not our fault as we are not a PUBLISHER
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.