o those involved.The millions of people that partici pate on the Internet everyday haveaccess to almost all of the data present. As well it becomes easy to copysomething that exists on the Internet with only a click of a button. Therelative ease of copying data means that the second information is postedto the Internet it may be archived somewhere else. There are in fact manysites on the Internet that are devoted to the archiving of informationincluding: ftp.cdrom.com (which archives an extraordinary amount ofsoftware among others), www.archive.org ( which is working towardsarchiving as much of the WWW as possible), and wuarchive.wustl.edu (whichis dedicated towards archiving software, publications, and many othertypes of data). It becomes hard to censor material that might beduplicated or triplic ated within a matter of minutes. An example could bethe recent hacking of the U.S. Department of Justice's Homepage and thehacking of the Central Intelligence Agency's Homepage. Someone illegallyobtained access to the computer on which these homepages were stored andmodified them. It was done as a prank; however, both of these agencieshave since shut down their pages. 2600 (www.2600.com), a magazine devotedto hacking, has republished the hacked DoJ and CIA homepages on theirwebsite. The magazine ei ther copied the data straight from the hackedsites or the hacked site was submitted to the magazine. I don't know whichone is true but it does show the ease that data can be copied anddistributed, as well it shows the difficulty in preventing material deemedinappropriate from appearing where it shouldn't. The Internet is much toocomplex a network for censorship to effectively occur. It is a totally newand unique environment in which communications transpire. Existing lawsare not applicable to this medium. The lack of tangible boundaries causesconfusion as to where violations of law take place. The Internet is made up ofnameless interaction and anony...