Sunday, February 28, 2010
Turns out, America does love freedom more than other countries
http://www.nytimes.com/2010/02/28/weekinreview/28liptak.html?ref=weekinreview
This raises interesting questions about how accommodating ISPs should be, and whether they are responsible for adapting to these regional differences in opinions of fundamental rights. Personally, I don't think it's so much of a policy issue as it is a business model issue - you tailor you product to your market. However, others may disagree.
Week 8: Fourth Amendment: Third Party Doctrine – Emails, Text Messages & Other Personal Data
Required readings:
Limitations of the Fourth Amendment and Statutory Solutions:
- Smith v. Maryland, 442 U.S. 735 (1975).
- Orin S. Kerr, A User’s Guide to the Stored Communications Act, and a Legislator’s Guide to Amending It, 72 Geo. Wash. L. Rev. 1208 (2004), Part I only.
- Solove & Schwartz, Privacy, Information, and Technology, pp. 140-149, 156-158.
- Warshak v. United States, 532 F.3d 521 (6th Cir. 2008), pp. 9-15.
- United States v. Forrester, 512 F.3d 500 (9th Cir. 2008).
- Declan McCullagh, Feds Push for Tracking Cell Phones, CNet (Feb. 11, 2010).
- Adam Liptak, Supreme Court Takes Texting Case, N.Y. Times (Dec. 14, 2009).
- Stephanie Perry, Can Facebook Lead to Your Arrest?, Daily Free Press (Dec. 26, 2008).
Wednesday, February 24, 2010
RFID, "Reasonable" Expectations of Privacy, and the Online Disconnect
The more intriguing and potentially problematic discussion then, is about the word “unreasonable.” Cases like Knotts and McIver define “reasonable” as an expectation of privacy that society would consider reasonable—which means very little substantively. Knotts also set the precedent that technology that enhances police’s natural senses and ability to investigate or monitor is constitutionally valid. At what point does this standard stop working though? If someone is walking around, engaging in some activity in their backyard, which is surrounded by a six-foot tall solid fence, do they have an expectation of privacy? Does an officer’s ability to use intrusive technology depend on his height, since if he is 6’6”, he would be able to see over the fence anyway, meaning the technology could be considered an enhancement of his senses? What about someone who is doing something in his home behind tinted glass? Where should the line be drawn regarding this expectation of privacy?
I think allowing society to dictate the balance between privacy and security has the potential to be a dangerous thing, especially in the age of terrorism that we live in today. National safety has become more of a pressing issue than ever before in the minds of Americans. The widespread fear of terrorism pushes the balance towards prioritizing safety over privacy, and without a normative baseline for maintaining a certain level of privacy, privacy may be increasingly sacrificed in favor of security.
In an online context, it seems to me that people assume their activity is even more private than in the analog world. I don’t think this precedent maps very well onto its digital counterpart, as most people expect a significant amount of privacy within their home, on their computer, while the government sees the online world as a space that extends into a public arena.
The Death and Resurrection of Privacy
In reply, to my own questions, I believe that it is up to the citizenry to equip themselves. People now have a compelling interest to inform themselves of threats against their personal security, so I predict that the best response is technological in nature as well. More powerful security tools and proxy shielding software will be in demand, creating a market that will only grow larger as technology improves. This is not to say that law enforcement will be left out to dry, since the Fourth Amendment would still allow for reasonable searches; rather, these measures will solidify the Fourth Amendment protection while keeping people from becoming innocent victims of unwarranted information-gathering.
Cyber Showdown: Balkin v. Volokh
I see this issue of defining which technologies can be used constitutionally and with or without a warrant as mapping directly onto internet use online. Society feels strongly against tracking the activity of individuals online, and if the tracking of GPS and RFID is decided to be within the realms of the Fourth Amendment in the offline world, then I am nervous about a similar kind of tracking becoming constitutional online as well. The push for having RFID put into passports and driver licenses in order to prevent them from being duplicated pushes the balance of the Fourth Amendment as described above to obtaining evidence to prosecute crimes at the sake of individuals' privacy. Will there soon be online technologies that allow for government officials to be able to openly track the websites that individuals visit in order to safeguard individuals from online crime? As mentioned by several blog posts, it is important that society remember the Katz test that states that individuals essentially should feel secure in their privacy when they expect to be private. Individuals value their safety and want the government to have means in which to track criminals, but one of the largest components of safety is the ability to remain private. That second component cannot be forsaken and must be remembered as the Fourth Amendment continues to be interpreted in the changing society.
Changing conceptions of technology
"For the Fourth Amendment protects people, not places. What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected. "
In the modern age, what does a person who uses a phone, laptop, and GPS "knowingly expose"? The ramifications, of course, are significant, for anything that is knowingly exposed loses a degree of protection. In the analog world, it was fairly obvious to anyone doing anything whether their act was public or private. If people could see you or hear you, it was not private. In the digital world, however, things become more complicated.
For example, an 80-year old woman who uses various technologies may have no idea of what digital traces she is leaving behind, or how public her online activity may be. A savvy 20 year old, on the other hand, might have a much more accurate understanding of what others, including the government, can easily figure out about his activity. Is it reasonable to say that since the 20 year old might have "knowingly expose[d]" more information, the government could use such information against him, while it could not bring that evidence against the 80 year old since she was unaware of it? Furthermore, how can you ever prove whether someone knew how public or private their activity was?
With technology the way it is now, this standard seems more useless than ever. The way technology is constantly changing and Google is constantly changing how it tracks almost every aspect of your life, how can someone be expected to know just how public or private his actions are? Would it make more sense for the government to establish a more concrete, objective standard for determining what is public and what is private?
As the situation currently stands, the government keeps having to play catch-up with new technologies, ruling whether each new technology which is used to collect information about people is acceptable or not, and under what circumstances. Perhaps getting rid of the issue of the privacy one expects and inserting standards of the privacy the government expects you to have could help clarify matters. The GPS example strikes me as an area where this would be especially useful, since the current laws provide little guidance about how to view a GPS device placed on someone's car by the police. It is clearly somewhere between a phone tap and a police car tracking the person physically, yet the decision to make the GPS tracker illegal left me unconvinced, since the truth is that there are no real laws on the issue, and the court simply decided that a police car could never track a car as well as a GPS could.
The question, of course, would then be what exactly these new guidelines for defining privacy for the 21st century would be. To that, honestly, I have no good answer, except to say that a person or society's expectations - which are subjective and ever-changing - should not be a factor.
Tuesday, February 23, 2010
The Katz Ruling is Key
I feel like in most cases RFID/GPS tracking of individuals on a massive scale by the government is unacceptable as it fails both parts of the Katz test. Implicit in the Katz test and the Fourth Amendment is that everyone *should have the ability to have some privacy*. With mass scale usage of RFID/GPS tracking, this ability is squashed. Beyond a few possible and highly debatable cases which I am not completely decided on, like tracking criminals in a correctional facility (there may be some credence to the point that they lose some societal acceptance of their privacy), with the regular GPS tracking and following of all individuals or RFID chips implanted into passports or even onto people, people lose all possibility of privacy to begin with, a right which we have already established is important. No longer is the individual relaxing in his home protected - with GPS/RFID tracking, an officer driving by knows that he is in there and who he is with. Even in the aforementioned possibly acceptable cases of surveilling criminals, these individuals have, to a degree, already lost a reasonable societal expectation to privacy - preemptively implanting these devices into ordinary people’s lives is wholly unacceptable under Katz’s test.
The Katz’s precedent surrounding the Fourth Amendment indicates that we value an individual’s right to privacy assuming one follows these guidelines, even at the possibility of slowing down law enforcement - unless an individual acquiesces and gives up his right to privacy, the government must obtain a warrant granted by a judge to show they have probably cause and a right to search and seize. This was not apparent with the Garcia case and especially not with the Andrus case. Though Andrus’ actions are reprehensible, the police investigated him in a way which violated his rights much like the police who investigated Katz did; Andrus 1-expected privacy as evidenced by his password protection of his files 2-neither agreed to allow a search nor received any warrant for a search of his computer. The police had a compelling case for probable cause, but failed in obtaining a warrant - no individual, even the officer of the law, has the right to make these sort of decisions at his own discretion.Though Katz’s father allowed for a search of his home, he had no access to the computer and as such had no real authority over the computer and therefore could not give up the computer (he had no ability to acquiesce as that is his son’s right). I think in mapping the present law onto computers, which are wildly complicated in regards to what ‘container’ is entitled to privacy - the whole computer or each individual file or a partition etc - the onus was on the police to, at least, ask the father if he had access to the computer before they opened it up. That the courts defended the police officers under the argument of that Andrus’ father had apparent authority and the police were acting reasonably undermines the Katz principle and the spirit of the Fourth Amendment entirely - it is a ‘ends justify the means’ idea, one which is unacceptable given our essential right to privacy. Andrus ought to be locked away, but the police did it in such a manner which endangers every individual’s vital right to privacy.
Question: The Trulock ruling confuses me; what does an officer need in order to access an individual’s files on a computer - do they get a warrant for the entire computer, or specific partitions, or specific files, etc?
*I edited the portion with asterisks because the language originally was very unclear*
When it comes to privacy, expectations matter.
One Catch-22 with innovation and the digital age is that technology inevitably outpaces the law. Tracking systems like GPS allow government officials to follow people in their cars or homes easily; new amplification technologies enable police to overhear or view previously unmonitored areas; and sophisticated electronic hacks permit authorities to override even password-protected databases. While it might be nice if we were to regulate all of these areas, legislative remedies are simply too narrow and too belated to offer any real efficacy against these changes.
The risk then, it seems, is that our public areas become near infinite. How, when search engines catalogue digital information near-ubiquitously, can we have any expectation of electronic privacy? How can we expect any privacy protection when, as we extend wires from our homes to other homes, our spaces become less and less confined? If you’re Justice Black, perhaps you believe that we can’t have any defenses; we can only protect “tangible things with size, form, and weight.”
Such a reading, however, of the Fourth Amendment, nullifies its very Constitutional purpose, affronting the intent of the Framers. From our cell phone relays to our wifi connections, we unquestionably emit far more public signals in the digital age. But that doesn’t mean we drop our Constitutional liberties at the gates of the modern era! As Justice Brandeis says in the Olmstead dissent, “in the application of a Constitution, our contemplation cannot only be of what has been, but of what may be.” Let us not forget, for instance that “in plain view” means not just that something is “viewable,” but that it is plainly visible.
Where then do we draw the line between modern public and private space? Because making this distinction will change so much based on the type of the technology, Katz gets it right: we must look toward the people involved, specifically whether or not the people have a reasonable expectation of privacy. For example, as Trulock attempts to make clear, whenever a person establishes a digital password, it is clear that they are trying to establish privacy. It seems that we can distinguish between my password-protected Gmail files and my posts on a public forum like Blogspot—I certainly have an expectation of privacy in the former case where I do not in the latter. Thus, shielding my Gmail account from unwarranted searches is more important than protecting my Blogspot posts.
In Katz, Justice Harlan tries to establish a two-prong test for privacy: (1) governmental action must contravene an individual's actual, subjective expectation of privacy; (2) that expectation of privacy must be reasonable, in the sense that society in general would recognize it as such. The Supreme Court has since (in my opinion, wisely) adopted this test.
In the modern era, when we can never truly protect ourselves from technological innovations and breaches, we need to look toward areas where we societally expect to have privacy rather than just those areas where we can physically secure. When no combination of Firewalls and passwords can ever protect our private spaces from others, we need to look towards the law as our last safeguard!
Perfection vs. Imperfection: A Logical Contradiction
In his dissenting opinion in Illinois v. Carballes, Justice Souter remarks that an “infallible dog is a creature of legal fiction.” Therefore, he posits, conducting a dog sniff during a routine traffic stop constitutes an illegal search unless it is backed by a warrant. The significant risk of false positives and the ensuing illegitimate search is an unacceptable threat to the Fourth Amendment. In Souter’s opinion, the imperfection of the tool renders it unconstitutional without a warrant.
In State v. Jackson, the Washington Supreme Court ruled that placing a GPS device on a car requires a warrant. The court acknowledges that the GPS device “provides a technological substitute for traditional tracking” which is both more reliable and more resource-efficient than the nearly impossible task of “maintaining uninterrupted 24-hour surveillance for approximately two and a half weeks.” However, it is the very ease and efficiency of using the GPS device which makes it so problematic. In the court’s opinion, the perfection of the tool renders it unconstitutional.
These two seemingly contradictory theories highlight the importance of maintaining the presumption that any act other than routine observation constitutes a search and seizure, thus requiring a warrant. Acts that are border-line at best, and hinge upon the perfection or imperfection of the tool used, most likely constitute searches and necessitate warrants. It should come as no surprise that the convoluted legal reasoning necessary to rationalize the expansion of police power often doubles back on itself and creates logical contradictions not easily resolved.
In the digital age, as technology improves, it becomes increasingly tempting to allow intrusive and sweeping searches on the grounds that no rules are technically broken. But this is where it is helpful to step outside of the complex legal framework and look objectively at the cases. A dog sniff is a search because it involves using a police instrument (a dog) to ascertain the contents of an individual’s hidden possessions. Similarly, attaching a GPS device to a car appears to be more significant than mere police “tailing” as it entails a constant and precise record of that car’s whereabouts through aid of an electronic device. A dose of common sense is often more useful than the most sophisticated and complicated legal arguments. In reviewing conflicts between technology and privacy, the spirit of the Fourth Amendment must be preserved above all else.
Friday, February 19, 2010
Week 7: Fourth Amendment: Unreasonable Search – Computer Searches & Locational Tracking
Required readings:
The Fourth Amendment technology cases:
- U.S. Const. Amend. IV.
- Solove & Schwartz, Privacy, Information, and Technology, pp. 77-90 [but skip pp. 81-83, subsections (g), (h) and (i)], 95 (start at Katz)-100, 113 (start at Place)-114 (stop at Caballes), 117-118 (stop at Greenwood), 132 (start at Kyllo)-138.
- Wikipedia on GPS (optional).
- Solove & Schwartz, Privacy, Information, and Technology, pp. 131-132.
- United States v. Garcia, 474 F.3d 994 (7th Cir. 2007).
- Reepal S. Dalal, Chipping Away at the Constitution: The Increasing Use of RFID Chips Could Lead to An Erosion of Privacy Rights, 86 B.U. L. Rev. 485 (2006), Part I only (pp. 487-491).
- Solove & Schwartz, Privacy, Information, and Technology, pp. 158-165.
- Samantha Trepel, Digital Searches, General Warrants, and the Case for the Courts, 10 Yale J.L. & Tech. 120 (2008), Parts I, II and III (optional).
Thursday, February 18, 2010
Horror Stories of Apple
http://www.cracked.com/article_18377_5-reasons-you-should-be-scared-apple.html
Wednesday, February 17, 2010
Anti-Net Neutrality
Furthermore, the entire existence of this unnecessary debate appears to be the result of paranoia. There is very little evidence that any BSPs plan to restrict access to the Internet, and even if they did, in a free market economy where competitors are virtually omnipresent, why would they? Surely, any BSP that enacted such measures to the chagrin of their consumers would experience a mass exodus and loss of revenue.
Some sort of compromise on the issue of net neutrality seems reasonable, as it is certainly in the public interest to retain access to an open Internet, but many issues need to be addressed before any sort of legislation is set forth. These include: Why BSPs are being singled out, and not search engines or browsers (a question that Goldstein put forth)? How do we address the ambiguity of a phrase like “reasonable network management practices”? Why the sudden distrust of BSPs after all the beneficial progress they have provided in delivering more access and information to the public in the past two decades?
I think a common thread that ties together the two issues—net neutrality and spam regulation—is how much the government can interfere with speech when it has a pretty good and reasonable reason for doing so. Nobody likes spam, and nobody wants their internet censored and biased in strange ways. However, from a constitutional standpoint, what does it mean if we allow government to have a say in such issues? And what dangers might this pose down the road in terms of government control of information? I want to explore each of these issues in more detail, but the common theme in my views is that despite the fact that the government has perfectly reasonable reasons for wanting to intervene, it is unwise to let it do so. Additionally, I have come up with a few alternate proposals for addressing these issues without infringing in First Amendment rights.
As for spam – I agree that spam is a big problem. However, I still object to what amounts to government censorship. Even laws which allow the dissemination of political messages but restrict commercial spam are problematic. While most people think of fraudulent spam messages that try to steal people’s money, commercial spam could just as easily be an entrepreneur who is advertising a new business he is starting, or gathering funds for a start-up. In a capitalist society in which people have free speech, why should this be banned?
Now, spam is still a problem that needs to be dealt with. Internet providers and e-mail servers, which are run by private companies, have every right to block or filter spam. The government, however, is getting involved in censorship when it does so. Can’t companies be effective enough in regulating spam without government laws? Technology permits companies to block spam, so the governmental regulations are not necessary. Even if repealing these laws would cause increased spam, and perhaps companies would not succeed in blocking it all, isn’t this inconvenience a small price to pay for preserving our First Amendment rights?
In regard to net neutrality – again, it makes sense that people should have complete access to the web, without their ISP’s interference. Again, however, what gives the government the right to influence how a private company (ISP) delivers information? In order to balance the government’s desire to ensure that ISP business biases do not influence citizen’s access to information and the concern that government should not be involved with how we receive information, I can think of two proposals, though I’m sure there are many more ways to deal with this issue. One idea would be for the government that ISPs make publicly known whether they provide net neutrality, of if they modify internet access in certain ways. That way, citizens at least know what type of service they are getting, though the government is not interfering with the spread of information. Another proposal responds to an idea brought up in the Tribe/Goldstein pieces. If the government deems that the internet is such a vital form of communication in society, and ISPs are so badly distorting access that people are not getting proper access to information, the government can think of creating its own strictly net-neutral ISP. That way it can ensure the neutrality it so highly values, but without infringing upon the rights of the ISPs and citizens. Having government-sponsored internet, of course, opens an entire new can of worms….
Accessibility of Free Speech and the Marketplace of Ideas
Free speech in the analog world and the digital world are different. Each world has its own structure and mechanisms. The biggest difference between the two worlds is that in the digital world, a person’s free speech is capable of reaching a much larger number of people than in the analog world (N.B. unless one is a well-known public figure). Does the right to free speech include the right to have that speech be accessible to all? During the time of the Framers, it was not logistically possible to have full accessibility to speech; however, today it is. If the internet were a public forum, then maybe everyone should have access to the speech of those in the forum (unless someone’s speech disrupts the integrity of the forum), but the internet is not a public forum. It seems that the Government has little justification in trying to ensure that “the voices of various speakers receive equivalent attention and that audiences receive equal access to all speakers.” (2)
Connecting last week’s readings to the net neutrality debate, it is interesting to consider how the marketplace of ideas would fit in. J.S. Mill believes that such a market allows the truth to be revealed. In the case of net neutrality one can argue both for and against mandates. Those who would be in favor could argue that if all voices are not represented equally then the truth may never be achieved. Those who are against mandates could argue that the marketplace for BSPs would become static and little innovation would occur with mandates -- possibly limiting the development of the internet itself and the information that we can find on it. In a way BSPs participate in a Darwinian process where the best ideas and sites succeed and thus become easily accessible.
Spam of a Different Flavor
One worry with spam email regulation is that it will chill the speech of non-commercial groups like the Jehovites who also wish to reach the largest possible audience. In practice, however, this rarely takes place. Those who feel strongly about spreading the good word, or overthrowing the government, or whatever, tend to prefer the personal touch or simply lack the technological know-how to spam on a commercial level. In the case of Jehovah’s Witnesses, the religion even mandates this personal relationship. While I am intrigued by Alex’s prediction that “[m]ass emailing provides a remarkably powerful and inexpensive medium for small groups to promote their ideas”, I cannot remember the last time I received spam from a non-commercial enterprise without first requesting to be on the mailing list. It is in the interest of smaller groups to address a more selective and responsive audience. The obvious argument to the contrary, of course, is that the more people they reach, the more supporters they will find. By choosing to remain selective, however, small groups add to their legitimacy. I am much more inclined to engage with a group that does not harass me via unwanted email on a regular basis. Many groups have realized this themselves, I think, and therefore do not spam. Thus the regulation of non-commercial email in some states does not bother me as much as it seems to bother some of my classmates.
My question for this week is, “Is CAN-SPAM effective?” As of 2004, it wasn’t, according to this article. But I am interested to learn if anyone’s spam actually conforms to the model set out by the FTC. Mine doesn’t.
However, I do want to discuss further this boundary between free speech and privacy because I believe it to be an underlying issue that connects door-to-door marketing and spam emailing. The boundary even in the real world it is unclear; I personally do not enjoy Jehovah's Witnesses stepping onto my private property to deliver their free speech nor the idea that I have to opt-into the system that allows me to place a "No Soliciting" sign on my private property. Regardless, if the default for spaces in society was set to "No Soliciting," where would individuals be allowed to solicit and speak their speech? My main question here is whether or not individuals consider their personal email (or potentially their work email) as their own private property. In my opinion, I do not think free speech and private property should ever intersect, though I am able to see the restrictive implications of my choice. I would therefore like to further discuss this issue for it would provide me with some insight in how to further interpret the behavior of Jehovah's Witnesses and spam senders.
I don't want any spam! and net neutrality
Though the federal government may be entitled to regulate commercial spam, law is probably not the most effective tool in combatting commercial spam - the sheer volume and number of senders makes it extraordinarily difficult, and except for cases where senders of spam are engaging in criminal activity like stealing information, legal intervention does not seem worthwhile. The Virginia case, for example, was able to prosecute one spammer, and yet there are millions abroad and out of easy reach for the government. But what if people who don’t want any spam? The architecture of the internet can provide this protection from much better than the law; like a fence around the home, spam filters have become so pervasive and increasingly effective that the impact of spam is dramatically diminished. Moreover, the BSA study seems to suggest that, though virtually everyone receives some sort of spam, few actually read it, suggesting social norms and education regarding spam has reduced the issue - educating people, then, seems to be a powerful tool.
Regarding net neutrality, the fundamental issue surrounding Tribe and Goldstein’s argument, which the Benkler reading brings up, is that TG value the privileges of BSPs over the rights of individuals and their entitlement to freedoms of speech recognized by the First Amendment. Though TG say that an open Internet would be good, they maintain that BSP’s are motivated by a desire to ‘innovate in their products’ to meet the BSP’s ultimate goal of fulfilling the consumer’s need for a robust internet. What TG omit is that these companies are not motivated by a humanitarian concern for others, but rather by profit - not necessarily an inherently bad thing, but a fact which warrants regulation to ensure that the profit motive is not resulting in a destructive manipulation of the medium. TG also claims that government regulation to protect neutrality will slow the growth of the internet and the BSP’s ability to produce a good product; this claim is ludicrous - entire highly critical, profitable industries, like banking and utilities - are heavily regulated and largely meet the needs of its customers.
I may be confusing BSP’s, ISP’s and their respective roles, but it seems to me that these companies are not providing and producing content on the internet, but rather providing access to said content created by others. Given this, I do not see how ISP’s can decide what type of content an individual can and cannot consume, so the “traffic management techniques” which TG bring up seem unjustified (if an ISP wants to ensure a fast internet/good product for its consumers, it ought to expand bandwidth rather than manage what content is important or not). Moreover, as the Public Knowledge YouTube video notes, given this “traffic management technique” ISPs could easily abuse the system to increase profits, for example bottlenecking protocols like Skype or BitTorrent in exchange for its own paid alternative.
TG also makes the point that if BSP’s had greater control of internet traffic, it could enhance the aggregate majority’s ability to get information faster -- but what about minority? They are just as entitled to access to information, this implementation of a majority ruled internet would bottleneck their ability to access information and would likely squash out information and content on the internet that is unpopular, bringing up issues akin to opt-in programs’ we discussed in previous lectures. Without net neutrality protecting equal access to all information, how can you know that that extraordinary but not mainstream thing you have yet to see and experience is extraordinary if you have no access to it?
Question: What are other ways we can protect people from spam besides educating and spam walls? Are there more effective ways afforded by law?
Why the Fuss over Net Neutrality?
So far this semester, I’ve assumed that the Internet will persist in its free and open incarnation unless the government decides to regulate it otherwise. Never did it occur to me, until reading up on net neutrality, that the government should potentially be charged with regulating the Internet so that it doesn’t deviate from its present operating structure. Because I’ve been so focused on the dangers derived from the Internet as it exists now, with a non-commodified, non-stratified design leading to its remarkable spread yet also leaving it vulnerable to exploitation, I still have a hard time coming around to the prospect of abuses on the part of mercenary providers, as opposed to irresponsible (or plain clueless) users.
The principle of net neutrality is simple enough to understand, if the YouTube clip is any indication. In essence, the telecom megaliths, such as Comcast and Time Warner, shouldn’t have a say in what their clients are able to view online. This is no different from their having stewardship over telephone cables and the like, but not over the actual conversations transmitted through them, or to whom those conversations are directed. To some degree, there will always be gatekeepers to the Internet in the form of ISPs, BSPs (as the Time Warner document kept referring to), or whatever the right acronym is. But I agree with the proponents of net neutrality that ISPs shouldn't have license to strike deals with select web-based companies and effectively discriminate against those companies' competitors by making it a privilege--or chore--for subscribers to access them.
In practice, however, I don't buy into the doomsday perspective that an end to net neutrality is on the horizon or already here. For one, it's doubtful that the tech companies will enter into a "corrupt bargain" with the wily ISPs, because they're more or less wedded to the Internet's founding ideal of open access. From the perspective of the telecom giants that would stand to gain from such a bargain, there might be fallout not just in terms of public perception--if, all of a sudden and on a variable basis, they slowed down connectivity or jacked up premiums--but also in terms of market share. Though I'm mindful of the tendency for firms to collude and conglomerate if given the opportunity to, I don't think that's an eventuality on the Internet, so long as the barriers to entry remain low and the choice among ISPs remains plentiful.
Even if the market isn't capable, on its own, of seeing to net neutrality, I am skeptical of legislation or even adjudication being able to do the trick. Clearly I'm coming at this issue with a different motivation from Time Warner, but its lawyers make a seductive point nonetheless: that governmental management of the Internet stands to be just as detrimental to speech rights as corporate management. As much as I want to side against the ISP bigwigs in this debate, I'm ultimately swayed by their appeal to the free market, as providing them with incentives to maintain net neutrality; by their concern, from a procedural standpoint, that any regulation would take effect post hoc and thereby chill speech ex ante; and by their resort to the First Amendment in equating themselves to private speakers. No matter the objective, whether it's to limit or expand access to speech, the government is prohibited from interfering with privately-held outlets' decisions as to what that speech is, how it is to be purveyed, and to whom (so long as people aren't being systematically excluded on the basis of an incontrovertible and identifiable trait like age or race).
I'm left with two questions following from that last point:
1) Has the Internet taken on the cast of a public good rather than a discretionary commodity, and if so, what responsibilities and limitations does the government have in seeing to its provision?
2) How does (or doesn't) Time Warner's criticism of net neutrality square with Turner Broadcasting System v. FCC's conclusion that the government is legitimately disposed toward regulation when it has a compelling interest, the regulation is content-neutral, and speech is restricted in the least extent possible?
Balancing Freedom and Protection... Again
Spam Regulation and Unpopular Speech
At first glance, this week’s materials seem to suggest that few conflicts arise between First Amendment values and spam regulations. After all, the CAN-SPAM Act pertains only to “commercial” emails, and the Maryland and Delaware cases both uphold laws directed at profit-driven commercial schemes. Surely this sort of fraudulent and parasitic behavior has very low priority in First Amendment’s protection of speech.
However, stepping outside the current case law, it is extremely troubling to consider the process by which the federal CAN-SPAM Act (CSA) and similar state statutes were put in place. While these statutes were partially motivated by material costs (congestion, operating fees, etc.) to the system, it seems that a significant impetus was the mere inconvenience and unpleasant experiences that arise from spam. Indeed, the CSA treats the two as equal causes for the Act, stating that mass spam threatens the “convenience and efficiency of electronic mail.” While the latter is certainly a legitimate concern, the former seems to be point to the possibility of a dangerous trend in speech regulation.
Yes, spammers are as unpopular as telemarketers and door-to-door solicitors, but this should not diminish their First Amendment rights. To be clear, these rights do not include protection for emails that are fraudulent or possibly even those that are solely profit driven. However, the extreme prejudice with which spam operations have been terminated should give free speech proponents significant pause. The unpopularity of spam seems to be the main impetus behind the state and federal regulations, and even some of the judicial decisions upholding these laws. The measures have been applauded by justices and congressmen alike, such as Maryland state senator Teitelbaum, who approved of an anti-spam law as a “piece of legislation that protects the people.” The ease with which these regulations have been passed should serve as a striking reminder about the importance of preserving true protected speech, and the insidious tendency for politicians to suppress messages which their constituents find displeasing.
After all, the First Amendment’s freedom of speech was constructed as a protection for those whom society wanted to muzzle. Watchtower speaks of the importance of protecting the voices of “little people” who are lacking in financial resources or overall manpower to use normative channels of expression and must instead use canvassing or campaigning to further their message. Mass emailing provides a remarkably powerful and inexpensive medium for small groups to promote their ideas. It is imperative that restrictions on such an empowering tool as email be the “least restrictive” means necessary to legitimately curtail illegal messages. Otherwise, there is the possibility for the creation of over-broad laws which intentionally aim to restrict unpopular but protected speech.
Spam regulations are reconcilable with First Amendment rights, provided that they only concern truly commercial or fraudulent messages. However, any statutes which aim to limit speech must be viewed with heightened vigilance, to assure that cleverly constructed restrictions on unpopular but protected speech do not slip through the cracks of judicial review.
Tuesday, February 16, 2010
The Supreme Court Baseball Case
Saturday, February 13, 2010
Wednesday, February 10, 2010
Knowing the consequences of anonymity
The main theme found in the readings this week’s is Anonymity vs Accountability. When should an individual have the freedom to conceal his identity, and when should his anonymous identity be forcibly revealed?
For Anonymity
I agree with Alex that one of the largest holes in Citron’s argument is the ambiguity of “real-world” harm. Interestingly, this seems to bring us back to the ambiguity of “material” destructiveness we struggled with last class. David’s argument for online IDs may be an interesting consideration, but with this particular issue (the issue of anonymity) we (unfortunately) must look to the plausibility or possibilities of actual implementation. We cannot simply decide that online IDs are necessary, or even that anonymity must be curbed, and then look towards methods of implementation that wont egregiously affect our civil rights. Until we are certain of the exact mode of implementation we will use, and, more importantly, of the transformation incurred by the Internet landscape, we cannot make any decisions.
If we, properly, regard anonymity as extending beyond what we say or write on the internet to what we do on the internet, how can we assume that the non-anonymous internet will hold any resemblance to the one we use now?
Anonymity in the 18th Century and Today
As we’ve seen in the readings this week, anonymous bloggers and individuals online have the ability to do significant damage to peoples’ lives, emotionally and economically. Thus, something needs to be done to address the consequences of anonymity on the internet. Whatever actions policymakers choose to take, they must keep in mind the tension between the freedom to speak and express oneself and the freedom to ensure that individuals’ reputations aren’t destroyed or their privacy isn’t invaded. (Solove) I believe that there are several options available to policymakers. First, the law can essentially remain as it is and allow anonymous bloggers to be identified only for legal purposes. The anonymous individual, however, should be given a certain amount of time to contend his being revealed. The second option is that owners of websites and blogs become legally more responsible for the content posted on their site. They would be the ones to remove damaging content (if asked) and they would decide if it is necessary to remove that content. If users were denied the removal of a post, then they could take their case to the courts and the websites would have to defend themselves. This option would not significantly reduce free speech as a whole since there would be thousands or even millions of people making these decisions; thus, there would not be a uniform censoring of speech.
The best option in my opinion is for policymakers to take the first approach where the law essentially remains the same. I also think that a campaign should be launched to encourage websites to take a more active role in patrolling their websites for truly damaging material. Congress could come up with some sort of incentive program for websites to ensure free and appropriate speech. For example, the more websites have legal suits filed against them for not taking material down, the likelier they are to be reviewed and issued a financial penalty.
Issues with enforcing traceable anonymity
In some cases, this does not seem to be so difficult. I think there is consensus that frivolous CyberSLAPP cases should not be allowed, and the judicial system should implement a system so that ISPs only hand over information about clients for legitimate reasons. The question now becomes, how can the government force all companies to keep such records? If a company already has user information on file, a court subpoena will make them hand over a user's information to the government. But nowadays, there are many websites which one can use which don't know much more about you than your IP address. Does the government have the power to tell these companies to start collecting more information about their users, so this information can be available if the government is trying to track someone down? It is unclear to me if the government has the power to do this. On the other hand, might this be necessary in order to properly regulate anonymous speech for those cases in which people should be prosecuted for their online speech? In a way, this brings us back to some of the questions we have been discussing in previous weeks about the government giving out Internet IDs so that it knows what everyone is doing online.
So my main question is this: How far should the government go in compelling websites to keep information about their users so that traceable anonymity can be effectively used when the government deems it necessary?
Section 230
Daniel Solove proposes an alternative method of reading section 230 stating that operators might be liable for prosecution after being notified of material that violates “somebody’s privacy or defames her.” While I think that this is a good idea to modify the blanket protection of section 230, it bears thinking through a bit further.
In the reading and in lecture, we have seen that many companies file anonymous and eventually frivolous lawsuits, such as the Allegheny lawsuit, in order to obtain subpoenas to uncover the identity of anonymous bloggers and whistleblowers. Given this tendency, I think that modifying section 230 (or modifying the reading of the section) could result in a similar tendency – what would happen if individuals who were disgruntled with any sort of content filed an enormous amount of frivolous requests with ISPs to take the material down? The scope of material posted online that you could construe to violate your privacy could end up being quite large, as long as you could prove that in some tangential way it related to violating your privacy or personal rights.
Taken to its logical conclusion, the easiest thing for ISPs and other content providers, such as Craigslist, Yahoo or AOL, to do in this situation would simply be for them to take down all sorts of so-called “objectionable material” flagged by individuals, because in the off-chance that they did not take down some objectionable material and it turned out that this was a true invasion of privacy, or libelous, or something similar to that, then they would potentially be slapped with both huge fines and also with the viral spreading of news on the Internet among bloggers and other commentators, which in many cases proves to be the worst punishment.
Although we could try to perhaps try to narrowly tailor the law so that one could only interpret it in that one can only object to material that is very narrowly about oneself, maybe we should look at a financial solution? I’m of the opinion that money generally speaks, and perhaps if we state that individuals who file these frivolous claims have to pay their own legal fees and the ISPs’ legal fees if it turns out that the lawsuit is frivolous, this could work? Then again, I don’t really about the legality of this, and I have the feeling that this could swing the pendulum in the opposite direction.
Confessions of a Tarring Survivor
Individuals may have a right to speak and remain anonymous online, but because the cyber and physical realms are so linked, the cyber realm cannot be ruled with its own rules that disregard the rules that have already been set in place, acknowledged, and followed in the physical realm. In creating laws to regulate the speech online, lawmakers must remain consistent with how free speech has been treated in the physical realm, and those who break those rules need to be punished. When individuals go online, we come to the cyber realm with the conceptions and beliefs that the rules that we live by in the physical realm will be respected online. We expect to not be faced with discrimination, hate mail, and slander in the real world, and I believe that those individuals who have break these rules and do not respect the opinions of others must be punished by having their identity revealed in order to have justice and protection for individuals online. The respect for others should not just fly out of the window once we log online. We have a responsibility to this society and to our social norms as J mentioned to maintain the same respect towards individuals in the physical and cyber realm.
A point of discussion that I did not address in my reading response that I would like to discuss in class is the idea of speech being "newsworthy" and a "legitimate concern to the public." The examples seemed to be relatively vague in the readings and I would like to discuss the implications of the definitions of these terms when applying them to online speech.
Against Anonymity
What is important, as Meiklejohn aptly notes, is “not that everyone shall speak, but that everything worth saying shall be said.” Anonymity gives those who would otherwise not speak an opportunity to make their thoughts known without repercussions. This is a benefit to society, so long as what these anonymous people have to say needs saying. Deep Throat reminds us that such instances do occasionally arise. More often, however, anonymity emboldens people to say things that do not have to be said.
Section 230 preserves the ability of commentators to abuse the Internet as a public forum. Yet by posting anonymously, delinquents can spread false rumors about others. By impersonating others, they can defame someone without ever being called to task for it. It is no wonder that corporations have resorted to CyberSLAPPing: bloggers are now able to post anonymously and spread rumors, so the corporations are using a dirty trick of their own in order to weed out rumor-mongers. Anonymity has led to the proliferation of online defamation, even if in some cases such defamation is merited.
I believe malicious defamation is a greater problem than the protection of internet anonymity. This is why I would like to see the institution of government-issued internet IDs. Setting aside questions of government surveillance, such a system would not only make misleading impersonation of others impossible, but more importantly would encourage people to write only what words they mean, what words they do not mind having associated with their name. At first glance, some of you may find this system terrifying. Nevertheless, I contend that those things worth saying are worth taking credit for. There are laws that protect against unjust persecution for speaking one’s mind. Without anonymity, whistleblowers could still look to these for recompense. But those who spread malice for their own satisfaction would hopefully think twice before posting their comments.
Do you think a system of internet identification is feasible? We touched on this in class and quickly wrote it off, but I am interested in hearing whether people think internet accountability truly is something to be avoided.
Expression of Cyber Mobs
Citron then attempts to transfer this theory to cyber-bullying, suggesting that cyber mobs be regulated under civil rights law. However, her argument fails in its assumption that all, or even most, cyber bullying is motivated an attempt to inflict “real-life” effects. She cites several examples of cyber mobs inflicting “real-world” harm, such as preventing a woman from obtaining ad revenue by shutting down her blog through denial of service messages, and impeding from an African American’s job hunt through the dissemination of false information. However compelling these examples may be, they leave out a large category of cyber mob’s speech, that which is not motivated by inflicting “real world” harm, but rather through mere expression of hatred or bias.
Whether or not this hate speech is protected under the First Amendment is not the subject of this post. Rather, it is important to realize that Citron, by assuming that all cyber-mob activity is designed to inflict real-world harm, overlooks a significant portion of the internet misconduct she seeks to limit. According to Citron’s interpretation of R.A.V. and Mitchell, without the motivation to inflict harm, this speech would merely be considered expression, and therefore may well be immune to civil rights law.
Question of the Week: Should cyber-bullying of less vulnerable individuals, such as white males, be more tolerated than similar activity directed at groups who have traditionally faced discrimination?
My Issue with Traceable Anonymity and the Status Quo
Solove cites some historical examples of anonymous speech which he acknowledges has been vital in the protection of society - extreme cases like Watergate. Traceable anonymity does seem like an adequate protection for most speech, even for some highly controversial speech as the process of tracking individuals is a long and difficult one.
Solove, however, approves of traceable anonymity, under which the law must decide when a speaker should or should be unmasked, whether revealing the speaker would or would not be good society. The issue I take with this solution is that, under extreme cases like Watergate, it does not afford complete protection for this speech as what is appropriate and good for society in these extreme cases can be highly difficult to judge, leaving less room in the Internet Age for future Watergates to be divulged.
Though the exposure of the Watergate scandal specifically may be a clear cut good, more generally the idea of finding and releasing the identities of individuals exposing highly sensitive information or producing highly controversial speech can conceivably create much harm, possibly dissuading future speakers from speaking anonymously even when they carry information important to the public interest. As Solove acknowledges, people, like those behind Allegheny Energy Service, could easily manipulate the system to discover the identity of an individual (though I do not defend the actions of the employee, Allegheny unfairly gamed the system to their advantage).
To propose another imperfect solution, we could handle anonymous speech not with law but with social norms. We, as a society, can realize that information we consume, particularly information announced anonymously, has been processed and skewed, sometimes intentionally and sometimes unintentionally by a people’s biases. Given a new piece of information, which could be highly controversial, we could realize that this information is imperfect and so more inquiry is warranted. [I realize this alternative is flawed as from a feasibility standpoint (everything is traceable online) and provides no level of accountability for what a person chooses to speak, among other issues.]
Tuesday, February 9, 2010
Anonymous speech is not always worth it.
But anonymity has a powerful and dangerous “dark side”: the potential to spread falsehoods, invade privacy, and cause
reputational harm without redress. The Internet and digital age, in my opinion, certainly allow the benefits of anonymous speech to continue to flourish, but, if there’s one thing that we truly ought to recognize about the Internet, it’s that the medium can also greatly inflate anonymity’s dangers. Citron presents what is, in my opinion, a persuasive case for why we ought to regulate away such dangers: because the costs of bad behavior are low or non-existent, the Internet facilitates “mob rule,” allowing rampant victimization. In short, cyber-attack groups like the group Anonymous use speech to strike against women and minorities, effectively undermining others’ ability to use free speech online, threatening their safety or finances, or causing reputational harm. And, as our global reputations become more and more dependant on our digital identities, such harms become not just noteworthy – they become extensive.
I find myself incredibly sympathetic to this argument that anonymous speech on the Internet has a perhaps never-before-seen potential to cause far-reaching societal harm. In a world where employers often use a search-engine to check our credentials, when our bank accounts can be accessed electronically, and our homes can be viewed from “Google StreetView,” societal harms caused by anonymous speech are amplified. The “right” for you to anonymously publish my street address, cell phone number, and defame me doesn’t really seem like a genuine Constitutional right after all. Thus heightened protections and specialized legislation to combat these unique Internet anonymity dangers make sense.
This is not to advocate, however, that CYBERSLAPP cases should be legally valid or anonymity on the Internet should be taboo. Rather, we should continue to allow individuals to anonymously report company ills, societal harms, and spread political messages; we just shouldn’t allow them to do so to the point that they are effectively suppressing others’ right to free speech and creating widespread dangers and social unrest.
The law may intend to protect people's right to free and anonymous speech, but above all it is meant to protect people.
Question for class: Does applying a lesser standard to anonymous speech undermine free speech or is it necessary to prevent societal harm?