Richmond Journal of Law and Technology

The first exclusively online law review.

Year: 2014 (Page 1 of 6)

Blog: To Execute, or to Exonerate the Actually Innocent – Is That Really the Question?

By: Brooke Kargman, Associate Staff

There have been vast advancements in forensic science largely due to developments in DNA technology.  Many prisoners who have maintained their innocence have accessed DNA evidence ultimately substantiating their claims, which was previously unobtainable.[1]  Inevitably, appeals courts are now confronted with “actual innocence” claims, including writs of certiorari and writs of habeas corpus, from prisoners who have maintained their innocence.[2]  Through the use of DNA technology, more than 300 wrongfully convicted people in the United States have been exonerated.[3]  Included in that sum are 18 people who have served time on death row.[4]

The discussion about the death penalty is an ongoing debate with many different angles.  Discussing the death penalty as a suitable punishment for our future capital offenders is a proactive debate; circulating advocacy for or against punishing potential future capital offenders.  Support for the death penalty has wavered, but is currently the lowest it has been since 1972, at 60%.[5]  Discussions of the death penalty have now emerged into a retroactive aggressive debate.  It has been argued that a person who is “actually innocent” does not necessarily have the constitutional right to be released from death row.[6]

The question becomes: does a convicted felon who has had a full and fair criminal trial have a constitutional right to be liberated of their death sentence when their “actual innocence” claim is supported by new evidence?

Many of our history’s esteemed policymakers have asserted that the Constitution is a “living document” so far as allowing lawmakers to create laws that adapt to society’s progressive ideals and advancements while reserving the rights written in the Constitution’s text.[7]  Former Supreme Court Justice O’Connor has said, “execution of a legally and factually innocent person would be a constitutionally intolerable event.”[8]

The Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA) implemented tighter restrictions on habeas cases and expanded the deference given to federal courts.[9]  The Supreme Court has held that innocence is not enough and that a convicted felon does not have the constitutional right to postconviction DNA testing, even at their own expense, to prove their actual innocence.[10]  In the widely talked about Troy Davis death penalty case, Justice Scalia dissents to Davis’ Petition for Writ of Habeas Corpus and writes, “[t]his court has never held that the Constitution forbids the execution of a convicted defendant who has had a full and fair trial but is later able to convince a habeas court that he is “actually” innocent.”[11]

By not finding it constitutionally obligatory to exonerate “actually innocent” people from their death sentence, our policymakers are keeping our Constitution stagnant.  The Eighth Amendment of our Constitution prohibits cruel and unusual punishment,[12] and executing an innocent person in the 2000s is seemingly anything but commonsensical or in accordance with the concept of our Constitution as a “living document.”

 

[1] Browse the Profiles, INNOCENCEPROJECT.ORG, http://www.innocenceproject.org/know/Browse-Profiles.php (last visited Nov. 23, 2014).

[2] E.g., Petition for Writ of Certiorari, In re Davis, 557 U.S. ___ (2009) (No. 08-1443).

[3] Mission Statement, INNOCENCEPROJECT.ORG, http://www.innocenceproject.org/about/Mission-Statement.php (last visited Nov. 23, 2014).

[4] Id.

[5] See Jeffrey M. Jones, Americans’ Support for Death Penalty Stable, GALLUP (Oct. 23, 2014), http://www.gallup.com/poll/178790/americans-support-death-penalty-stable.aspx.

[6] See Dahlia Lithwick, Why It’s Constitutional to Execute an Innocent Man, NEWSWEEK, (Sept. 2, 2009, 8:00 PM), http://www.newsweek.com/why-its-constitutional-execute-innocent-man-79487.

[7] See generally Adam Winkler, A Revolution Too Soon: Woman Suffragists and the “Living Constitution”, 76 N.Y.U.L. Rev. 1456, 1457 (2001) (“[C]onstitutional provisions are… interpreted to meet present social needs… Legal historians credit Progressive Era thinkers such as Oliver Wendell Holmes Jr., Christopher Tiedeman, Louis D. Brandeis, and Woodrow Wilson for making the ‘earliest efforts’ to adopt a changing, evolving Constitution.”); Trop v. Dulles, 356 U.S. 86, 100-01 (1958) (“[T]he words of the Amendment are not precise… their scope is not static… must draw its meaning from the evolving standards of decency that mark the progress of a maturing society.”).

[8] David Grann, Trial By Fire, THE NEW YORKER (Sept. 7, 2009) http://www.newyorker.com/magazine/2009/09/07/trial-by-fire.

[9] Antiterrorism and Effective Death Penalty Act of 1996, Pub. L. No. 104-132, 110 Stat. 1214.

[10] Petition for Writ of Certiorari, In re Davis, 557 U.S. ___, 36-37 (2009) (No. 08-1443); DA’s Office v. Osborne, 557 U.S. 52 (2009).

[11] Petition for Writ of Certiorari, In re Davis, 557 U.S. ___, 2 (2009) (No. 08-1443) (Scalia, J., dissenting) available at http://www.supremecourt.gov/opinions/08pdf/08-1443scalia.pdf.

[12] U.S. Const. amend. VIII.

Clapper v. Amnesty International and Data Privacy Litigation: Is a Change to the Law “Certainly Impending”?

The Reasonable Information Security Program

Riley v. California: The New Katz or Chimel?

pdf_iconDownloadPDF

Cite as: Adam Lamparello & Charles MacLean, Riley v. California: The New Katz or Chimel?, 21 Rich. J.L. & Tech. 1 (2014), http://jolt.richmond.edu/v21i1/article1.pdf.

Adam Lamparello & Charles MacLean*

“To declare that in the administration of the criminal law the end justifies the means—to declare that the Government may commit crimes in order to secure the conviction of a private criminal—would bring terrible retribution. Against that pernicious doctrine this Court should resolutely set its face.”[1]

I.  Introduction

[1]        In Olmstead v. United States,[2] Justice Louis Brandeis dissented from a 5–4 ruling that allowed law enforcement officers to obtain private wiretapped telephone conversations without a warrant and use them as evidence.[3] Justice Brandeis’ words foreshadowed the threats to civil liberties that technology would pose:

The progress of science in furnishing the Government with means of espionage is not likely to stop with wire-tapping. Ways may some day be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home. Advances in the psychic and related sciences may bring means of exploring unexpressed beliefs, thoughts and emotions. “That places the liberty of every man in the hands of every petty officer” was said by James Otis of much lesser intrusions than these. To Lord Camden, a far slighter intrusion seemed “subversive of all the comforts of society.” Can it be that the Constitution affords no protection against such invasions of individual security?[4]

[2]        Over three-quarters of a century later, privacy is being attacked in a manner that threatens the liberty of every citizen. The Government is tracking the whereabouts of its citizens at any time of the day,[5] recording Internet search history[6] and data stored on a hard drive,[7] and monitoring messages sent by text message or e-mail.[8] As a result, some individuals may unknowingly be on a terror watch list for downloading a video that depicts Al Qaeda sympathizers burning an American flag and threatening an attack larger than September 11, 2001, when hijacked planes toppled New York City’s twin towers and took the lives of over 3000 people.[9] The most frightening aspect is that the Government is doing all of this without a warrant. In some cases, the Government has no suspicion whatsoever.[10] In every case, the Fourth Amendment rights of its citizens are being violated.

[3]        For these and other reasons, Riley v. California,[11] where the Supreme Court unanimously held that warrantless searches of a cell phone incident to arrest were unreasonable and therefore violated the Fourth Amendment,[12] came at the right time. As discussed below, Riley marks a new era of privacy protection that does not yield in the face of the broad, McCarthy-esque justifications of “national security” and the “war on terror.” Instead, the Court recognized that “protection against such invasions of individual security”[13] supports the conclusion that pre-digital era case law could neither foresee nor protect against these invasions.

[4]        The Court’s decision suggests that cellular telephones, particularly smartphones, along with laptop computers and other digital devices, are the twenty-first century’s private ‘homes,’ where individuals store the “papers and affects” traditionally accorded Fourth Amendment protection. The unanswered question, however, is whether Riley is the beginning of a principled, Katz-driven jurisprudence that focuses on privacy protection[14] or a muddled jurisprudence that immerses itself in the many hyper-technicalities that characterized the post-Chimel era.[15] This essay argues that Riley is the new Katz, and marks the beginning of increased protections for privacy in the digital age.

II. The New Katz: Privacy for the Digital Age

[5]        In Riley, the Court held that the original justifications for warrantless searches incident to arrest under Chimel—officer safety and the preservation of evidence—were not implicated in cell phone searches.[16] Writing for a unanimous court,[17] Justice Roberts correctly held that cell phones could not be used as weapons[18] and that the likelihood of evidence destruction was remote.[19] Thus, absent exigent circumstances law enforcement could not search an arrestee’s cell phone without a warrant and probable cause.[20] Several aspects of the Court’s opinion suggested that the Government’s days of relying on case law from an era of rotary telephones, eight-track tapes, and crumpled cigarette packs is over.[21] Specifically, in distinguishing cell phones from physical objects such as plastic containers, wallets, and address books, the Court recognized that “[c]ell phones differ in both a quantitative and a qualitative sense from other objects that might be kept on an arrestee’s person.”[22]

A. The Quantity of Information in Cell Phones 

[6]        Justice Roberts’ opinion recognized that cellular phones, particularly smartphones, are not really “phones” in a traditional sense.[23] Justice Roberts wrote:

The term “cell phone” is itself misleading shorthand; many of these devices are in fact minicomputers that also happen to have the capacity to be used as a telephone. They could just as easily be called cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers.[24]

[7]        Furthermore, cell phones can hold “millions of pages of text, thousands of pictures, or hundreds of videos [and] . . . [e]ven the most basic phones that sell for less than $20 might hold photographs, picture messages, text messages, Internet browsing history, a calendar, [and] a thousand-entry phone book.”[25]

[8]        Additionally, a cell phone “collects in one place many distinct types of information—an address, a note, a prescription, a bank statement, a video—that reveal much more in combination than any isolated record.”[26] As Justice Roberts explained, this information implicates privacy in a manner that physical objects do not:

[A] cell phone’s capacity allows even just one type of information to convey far more than previously possible. The sum of an individual’s private life can be reconstructed through a thousand photographs labeled with dates, locations, and descriptions; the same cannot be said of a photograph or two of loved ones tucked into a wallet. Third, the data on a phone can date back to the purchase of the phone, or even earlier. A person might carry in his pocket a slip of paper reminding him to call Mr. Jones; he would not carry a record of all his communications with Mr. Jones for the past several months, as would routinely be kept on a phone.[27]

Justice Roberts also emphasized the “element of pervasiveness that characterizes cell phones but not physical records, [holding that] . . . [p]rior to the digital age, people did not typically carry a cache of sensitive personal information with them as they went about their day.”[28] Comparing cell phones to physical objects was “like saying a ride on horseback is materially indistinguishable from a flight to the moon. Both are ways of getting from point A to point B, but little else justifies lumping them together.”[29]

B. The Quality of Information in a Cell Phone

[9]        Most importantly, the Court held that cell phones store uniquely private information.[30] For example, “Internet search and browsing history . . . can be found on an Internet-enabled phone and could reveal an individual’s private interests or concerns—perhaps a search for certain symptoms of disease, coupled with frequent visits to WebMD.”[31] In addition, “application software on a cell phone, or ‘apps,ʼ offer a range of tools for managing detailed information about all aspects of a person’s life.”[32] In fact, quoting Learned Hand, Justice Roberts held that the quantity and quality of private information stored on a cell phone is even greater than that stored in a home:

In 1926, Learned Hand observed . . . that it is “a totally different thing to search a man’s pockets and use against him what they contain, from ransacking his house for everything which may incriminate him.” If his pockets contain a cell phone, however, that is no longer true. Indeed, a cell phone search would typically expose to the government far more than the most exhaustive search of a house: A phone not only contains in digital form many sensitive records previously found in the home; it also contains a broad array of private information never found in a home in any form—unless the phone is.[33]

[10]      Furthermore, through the use of cloud computing, some of “the data a user views on many modern cell phones may not in fact be stored on the device itself . . . [due to] the capacity of Internet-connected devices to display data stored on remote servers.”[34]

III. The Significance of Riley and its Application to other Cases

[11]      Riley is a landmark decision and marks the beginning of the end of the Government’s intrusion into the private digital lives of its citizens.

A. Pre-Digital Case Law is Easily Distinguishable and Therefore No Longer Controls

[12]      The Court recognized that pre-digital era case law could not be applied to digital-era problems.[35] First, Justice Roberts found unpersuasive the Government’s reliance on United States v. Robinson, where the Court upheld, under Chimel, the warrantless search of a crumpled up cigarette pack.[36] The Court’s decision in Robinson significantly expanded Chimel by holding that “custodial arrest of a suspect based on probable cause is a reasonable intrusion under the Fourth Amendment; that intrusion being lawful, a search incident to the arrest requires no additional justification.”[37] Thus, under Robinson it did not matter whether the original justifications under Chimel—officer safety or evidence preservation—were implicated.[38] The Riley Court rejected the reasoning in Robinson and, although the Court did not directly overturn Robinson’s holding that Chimel’s dual objectives “are present in all custodial arrests,” it found that there “are no comparable risks when the search is of digital data.”[39]

[13]      Additionally, although the Robinson Court “regarded any privacy interests retained by an individual after arrest as significantly diminished by the fact of the arrest itself,” the same could not be said in the cell phone context.[40] Indeed, cell phones “place vast quantities of personal information literally in the hands of individuals,” a search of which “bears little resemblance to the type of brief physical search considered in Robinson.”[41] Furthermore, “[t]he possibility that a search might extend well beyond papers and effects in the physical proximity of an arrestee is yet another reason that the privacy interests here dwarf those in Robinson.”[42] Put differently, depending on the privacy interests at stake, “[n]ot every search ‘is acceptable solely because a person is in custody.’”[43]

[14]      The Court also rejected the Government’s reliance on Arizona v. Gant,[44] which “added . . . an independent exception for a warrantless search of a vehicle’s passenger compartment ‘when it is reasonable to believe evidence relevant to the crime of arrest might be found in the vehicle.”’[45] Importantly, however, Gant relied on “circumstances unique to the vehicle context” to endorse a search solely for the purpose of gathering evidence.[46] Relying on Justice Scalia’s concurring opinion in Thornton v. United States,[47] Justice Roberts explained that the unique circumstances in Gant are “ʻa reduced expectation of privacyʼ and ‘heightened law enforcement needs’ when it comes to motor vehicles.”[48] Searches of cell phones, however, “bear neither of those characteristics.”[49]

[15]      Most importantly, Justice Roberts recognized that the standard adopted in Gant “would prove no practical limit at all when it comes to cell phone searches,”[50] stating as follows:

In the vehicle context, Gant generally protects against searches for evidence of past crimes. In the cell phone context, however, it is reasonable to expect that incriminating information will be found on a phone regardless of when the crime occurred. Similarly, in the vehicle context Gant restricts broad searches resulting from minor crimes such as traffic violations. That would not necessarily be true for cell phones. It would be a particularly inexperienced or unimaginative law enforcement officer who could not come up with several reasons to suppose evidence of just about any crime could be found on a cell phone. Even an individual pulled over for something as basic as speeding might well have locational data dispositive of guilt on his phone. An individual pulled over for reckless driving might have evidence on the phone that shows whether he was texting while driving. The sources of potential pertinent information are virtually unlimited, so applying the Gant standard to cell phones would in effect give “police officers unbridled discretion to rummage at will among a person’s private effects.”[51]

The Court also rejected the Government’s reliance on Smith v. Maryland,[52] which upheld the use of pen registers to monitor outgoing calls from a suspect’s private residence.[53] In doing so, the Court rejected the Government’s argument that searches can be limited to call logs, as they “typically contain more than just phone numbers; they include any identifying information that an individual might add.”[54] Finally, the Court refused to permit searches of cell phone data “if [law enforcement] could have obtained the same information from a pre-digital counterpart.”[55] In fact, Justice Roberts made it a point to distance the Court from applying pre-digital era case law to digital age technology:

[T]he fact that a search in the pre-digital era could have turned up a photograph or two in a wallet does not justify a search of thousands of photos in a digital gallery. The fact that someone could have tucked a paper bank statement in a pocket does not justify a search of every bank statement from the last five years. And to make matters worse, such an analogue test would allow law enforcement to search a range of items contained on a phone, even though people would be unlikely to carry such a variety of information in physical form.[56]

[16]      Indeed, “a significant diminution of privacy” would result if law enforcement could search all areas of a cell phone merely to locate information that could be stored in a pre-digital era physical object.[57] Furthermore, the Government’s argument that law enforcement could “‘develop protocols to address’ concerns raised by cloud computing,” was unpersuasive because “the Founders did not fight a revolution to gain the right to government agency protocols.”[58] They fought to ensure that the Government could not run roughshod over the privacy rights of its citizens—even if its citizens might be safer as a result.

[17]      Ultimately, Justice Roberts’ opinion suggests that the Government will now be required to provide a digital-era justification to search the “papers and effects” that are stored in cell phones.[59] At the heart of Justice Roberts’ opinion was a desire to prevent law enforcement from conducting the types of broad, non-particularized searches, which was “one of the driving forces behind the Revolution itself,” and led the Founders to adopt the Fourth Amendment.[60] Indeed, “the Fourth Amendment was the founding generation’s response to the reviled ‘general warrants’ and ‘writs of assistance’ of the colonial era, which allowed British officers to rummage through homes in an unrestrained search for evidence of criminal activity.”[61]

B. Rejecting an Ad Hoc, Case-By-Case Jurisprudence

[18]      In a noticeable departure from its Fourth Amendment jurisprudence, the Court emphasized the importance of creating bright-line rules to govern searches of private cell phone data.[62] Justice Roberts wrote that “if police are to have workable rules, the balancing of the competing interests . . . ‘must in large part be done on a categorical basis—not in an ad hoc, case-by-case fashion by individual police officers.’”[63] Otherwise, the Court would be thrust into an uncertain jurisprudence that would raise more questions than it would answer:

[A]n analogue test would launch courts on a difficult line-drawing expedition to determine which digital files are comparable to physical records. Is an e-mail equivalent to a letter? Is a voicemail equivalent to a phone message slip? It is not clear how officers could make these kinds of decisions before conducting a search, or how courts would apply the proposed rule after the fact. An analogue test would “keep defendants and judges guessing for years to come.”[64]

[19]      The Court may have recognized the difficulties that arose in the years after Chimel, where the Court’s ad hoc jurisprudence was often based on hyper-technicalities that resulted in a muddled, uncertain, and unworkable jurisprudence.[65] Indeed, after Robinson,[66] Gant,[67] and New York v. Belton,[68] law enforcement had nearly unfettered authority to conduct warrantless searches incident to arrest, even where officer safety and evidence preservation rationales were non-existent. Simply put, for many years the warrant requirement ceased to exist the moment law enforcement slapped handcuffs on a suspect.

C. Support for an Internet Neutrality Doctrine

[20]      Although it is a Fourth Amendment case, the majority’s reasoning in Riley reflects a fundamental truth: the world has changed, and to protect basic civil liberties, the law must change as well. This is particularly true with respect to the Internet, which is the digital age equivalent of traditional public and limited purpose public forums (e.g., public sidewalks and town halls), just as cellular telephones are similar to a private home for search and seizure purposes.[69] The Internet enables the free flow of information between networks, including speech on matters of political, social, and commercial importance. Importantly, however, through pricing and “traffic shaping,”[70] which involves “slowing down some forms of traffic, like file-sharing, while giving others priority,”[71] Internet service providers have the ability to discriminate against users based on the content of their message, and thus thwart public debate and stifle competition. These practices are the equivalent of allowing the Boy Scouts to march in the public square, while relegating flag burners to desolated areas, remote deserts, or dark alleys.[72] Consequently, the Court should embrace a net neutrality doctrine for the same reason it invalidated warrantless cell phone searches in Riley: technology has ushered civil liberties into the virtual world, and the law must adapt by providing legal protections to individuals who speak, assemble, and associate in that world.

D. The End of Metadata: Protecting Cell Phones as Objects and Repositories for the Fourth Amendment’s ‘Papers and Effects’

[21]      Riley establishes cell phones as the new repository for the “papers and effects” that the Fourth Amendment protects from warrantless searches.[73] Not only did the Court reject the Government’s analogies to pre-digital era physical objects, such as plastic containers, wallets, and crumpled cigarette packs, but it also held that cell phone data, both in quantity and quality, contains more private information than can be found in a private home.[74] To be sure, “[a] phone not only contains in digital form many sensitive records previously found in the home; it also contains a broad array of private information never found in a home in any form—unless the phone is.”[75]

[22]      In so holding, the Court implicitly recognized that cell phones, to an even greater degree than private homes, engender privacy protections as objects, and not merely because of the private data they contain. Thus, just like law enforcement officers cannot enter a home to search for incriminating evidence that might be in plain view inside the home, they cannot search any area of a cell phone, even though some areas, such as a call log, are less private than, for example, Internet browser history.[76] The point of Riley was that cell phones are protected not just for what they contain, but for how they are used in modern society, and for the privacy expectations that millions of individuals have in their phones. Thus, individuals have a reasonable expectation of privacy not merely in a cell phone’s contents, but in the phone itself.[77] This could signal the end to warrantless metadata collection, where the Government used cell phone towers to monitor and collect information such as outgoing calls and physical location. In fact, the Court suggested that this type of information also warrants Fourth Amendment protection, “[d]ata on a cell phone can also reveal where a person has been. Historic location information is a standard feature on many smart phones and can reconstruct someone’s specific movements down to the minute, not only around town but also within a particular building.”[78]

[23]      For purposes of metadata collection, the message is clear: the Supreme Court is likely to hold that Government will not be permitted to indiscriminately collect metadata unless it has, at the very least, reasonable suspicion.[79]

E. The Third-Party Doctrine May be Invalidated

[24]      The third-party doctrine is also a product of pre-digital era case law, and holds that individuals who knowingly transmit information through a third party can be found to have waived their expectation of privacy in such information.[80] Essentially, because individuals know that a third party may or will view information that is transmitted via a cell phone, they implicitly consent to its disclosure to additional parties. The problem with the third-party doctrine, however, is identical to the problem the Government faced when trying to equate searches of physical containers with searches of cell phone data. The third-party doctrine was developed in an era when the information in question, e.g., a bank record or paper check, did not implicate the same privacy concerns as are present in the cell phone context. As one commentator notes, “the Supreme Court decisions that established the third-party doctrine are decades old,”[81] and cell phones, just as they are not containers or address books, are unlike “information voluntarily conveyed to banks in the ordinary course of business.”[82]

Riley is Katz for the Digital Age

[25]      To the extent that questions remain about the scope and significance of Riley, they can be put to rest by reading three critical passages in the majority opinion that show beyond doubt that Riley is Katz for the digital age. Indeed, courts should not repeat the mistakes that occurred in the post-Chimel era, where courts created an ad hoc, hyper-technical, and muddled jurisprudence that eviscerated Chimel’s limitations and led to expansive searches regardless of concerns about officer safety and evidence preservation.[83] In fact, Riley was the logical result of a jurisprudence that had nearly abandoned the original Chimel justifications, and this time the Court signaled that it will not make the same mistake again.

[26]      First, by holding that there “are no comparable risks [to officer safety and the destruction of evidence] when the search is of digital data,”[84] the Court recognized that digital devices are so fundamentally different from pre-digital era objects that they justified a categorical prohibition against warrantless searches.[85] Second, the Court stated in no uncertain terms that cell phones contain a “broad array of private information never found in a home in any form—unless the phone is,”[86] and a case-by-case, Chimel-type jurisprudence would only threaten to confuse, undermine, and render uncertain the core commitment to protecting privacy.[87] Indeed, phones are not merely a compilation of YouTube videos, Amazon.com purchases, and personal photographs. They house users’ thoughts, private expressions, and most intimate and confidential communications.[88] Third, and in recognition of this fact, the Court refused to fashion an “analogue test [that] would launch courts on a difficult line-drawing expedition to determine which digital files are comparable to physical records.”[89] Instead, the Court understood that, although the Fourth Amendment remains unchanged from its original purpose, the technology era has changed everything else.[90] With those changes came a reaffirmation of that purpose and a commitment to protect core civil liberties.

[27]      Ultimately, the information on a cell phone is so private that the only line to be drawn is precisely where the Court did: “[o]ur answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple—get a warrant.”[91] Riley is the new Katz, and soon the Government’s ability to track metadata, record Internet browser history, apply the third-party doctrine to digital data, and peer into other aspects of our private lives will end—just like pre-digital era case law saw its relevance disappear in Riley.

IV. Conclusion

[28]      Justice Brandeis forecasted that “[t]he progress of science in furnishing the Government with means of espionage is not likely to stop with wiretapping.”[92] In the law enforcement and government surveillance context, technological advances have made it possible to store an individual’s DNA in a national database, and have made it nearly impossible for that same individual to send an e-mail, download a YouTube video, or transmit a text message without knowing that the government might be watching—without having the slightest degree of suspicion of criminal behavior. In any society that values basic civil liberties, such practices are intolerable—and unconstitutional. In Riley, the Court correctly held that, if privacy is to mean anything, it should protect individuals from being monitored without their consent, without a reason, and without a warrant. It is the beginning of principled change and enhanced protections for civil liberties in the digital age.

 


 

* Assistant Professors of Law, Indiana Tech Law School.

[1] Olmstead v. United States, 277 U.S. 438, 485 (1928) (Brandeis, J., dissenting), overruled by Katz v. United States, 389 U.S. 347, 353 (1967).

[2] Olmstead, 277 U.S. 438.

[3] See id. at 466.

[4] Id. at 474.

[5] See, e.g., Klayman v. Obama, 957 F. Supp. 2d 1, 7 (D.D.C. 2013) (describing the information involved in metadata collection).

[6] See Glen Greenwald, XKeyscore: NSA tool collection ‘nearly everything a user does on the internet,The Guardian (July 31, 2013, 8:56 AM), http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data, archived at http://perma.cc/Y847-C3Q7.

[7] See Jason Mick, Tax and Spy: How the NSA Can Hack Any American, Stores Data 15 Years, Daily Tech (Dec. 31, 2013, 12:36 PM), http://www.dailytech.com/Former+FBI+Agent+All+Your+Communications+are+Recorded+Government+Accessible/article31486.htm, archived at http://perma.cc/ZWZ4-STDD.

[8] See Adam Weinstein, The Government’s Phone, Text, and Email Spying, Explained, Fusion (Oct. 25, 2013, 6:00 PM), http://fusion.net/abc_univision/story/governments-phone-text-email-spying-explained-22515, archived at http://perma.cc/VCC2-CPHP.

[9] See Jeremy Scahill & Ryan Devereaux, The Secret Government Rulebook for Labeling You a Terrorist, The Intercept (July 23, 2014, 2:45 PM), https://firstlook.org/theintercept/2014/0/23/blacklisted/, archived at http://perma.cc/4FPY-A344; see also Watchlisting Guidance, U.S. Nat’l Counterterrorism Center (Mar. 2013) (detailing government qualifications for putting people on a terrorist watchlist).

[10] See Scahill & Devereaux, supra note 9.

[11] Riley v. California, 134 S. Ct. 2473 (2014).

[12] See id. at 2493.

[13] Olmstead, 277 U.S. at 473–74.

[14] See Katz v. United States, 389 U.S. 347, 350-51 (1967) (focusing on an individual’s right to be left alone rather than determining what geographic areas are constitutionally protected).

[15] See Chimel v. California, 395 U.S. 752, 762–63 (1967); see also Arizona v. Gant, 556 U.S. 332, 342 (2009 ); New York v. Belton; and United States v. Robinson, 414 U.S. 218, 235 (1973) (highlighting the hyper-technicalities that characterized this post Chimel world). In Chimel, the Court created the search-incident-to-arrest doctrine, which allows warrantless searches of an arrestee’s person to protect officer safety and preserve evidence:

When an arrest is made, it is reasonable for the arresting officer to search the person arrested in order to remove any weapons that the latter might seek to use in order to resist arrest or effect his escape. Otherwise, the officer’s safety might well be endangered, and the arrest itself frustrated. In addition, it is entirely reasonable for the arresting officer to search for and seize any evidence on the arrestee’s person in order to prevent its concealment or destruction. . . . There is ample justification, therefore, for a search of the arrestee’s person and the area “within his immediate control”—construing that phrase to mean the area from within which he might gain possession of a weapon or destructible evidence.

Chimel, at 762-63.

In the years following Chimel, the Court expanded Chimel to allow virtually all warrantless searches incident to arrest, even if safety and evidence preservation were not implicated. See, e.g., Belton, 453 U.S. at 460 (1981) (expanding Chimel to hold that law enforcement officers may search the passenger compartment of an arrestee’s vehicle).

[16] See Riley, 134 S. Ct. at 2484–85.

[17] Id. at 2480.

[18] See id. at 2485.

[19] See id. at 2486–87.

[20] See id. at 2493.

[21] See Riley 134 S. Ct. at 2485, 2488–89.

[22] Id. at 2489.

[23] See id.

[24] Id.

[25] Id.

[26] Riley, 134 S. Ct. at 2489.

[27] Id.

[28] Id. at 2490 (“It is no exaggeration to say that many of the more than 90% of American adults who own a cell phone keep on their person a digital record of nearly every aspect of their lives—from the mundane to the intimate.”).

[29] Id. at 2488.

[30] Id. at 2473.

[31] Riley, 134 S. Ct. at 2490.

[32] Id.

[33] Id. at 2490–91 (quoting United States v. Kirschenblatt, 16 F.2d 202, 203 (2d Cir. 1926)).

[34] Id. at 2491.

[35] See Riley, 134 S. Ct. at 2484, 2494.

[36] See United States v. Robinson, 414 U.S. 218, 225–26 (1973).

[37] Id. at 235.

[38] See id. at 235.

[39] Riley, 134 at 2484–85.

[40] Id.

[41] Id. at 2485.

[42] Id.at 2491.

[43] Id. at 2488 (quoting Maryland v. King 133 S. Ct. 1958, 1979 (2013)).

[44] See id. at 2492.

[45] Riley, 134 S. Ct. at 2484 (quoting Arizona v. Gant, 556 U.S. 332, 343 (2009)).

[46] Gant, 556 U.S. at 343.

[47] Thornton v. United States, 541 U.S. 615, 628–32 (2004) (Scalia, J., concurring).

[48] Riley, 134 S. Ct. at 2492 (quoting Thornton, 541 U.S. at 631).

[49] Id. at 2492.

[50] Id.

[51] Id. (quoting Gant, 556 U.S. at 345).

[52] See id., 134 S. Ct. at 2492–93.

[53] See Smith v. Maryland, 442 U.S. 735 at 745–46 (1979).

[54] Riley, 134 S. Ct. at 2492–93.

[55] Id. at 2493.

[56] Id.

[57] Id.

[58] Id. at 2491.

[59] Id. at 2493.

[60] Riley, 134 S. Ct. at 2494.

[61] Id.

[62] See id. at 2491–92.

[63] Id. at 2491–92 (quoting Michigan v. Summers, 452 U.S. 692, 705 n.19 (1981)).

[64] Riley, 134 S. Ct. at 2493 (quoting Sykes v. United States, 131 S. Ct. 2267, 2287 (2011) (Scalia, J., dissenting)).

[65] See Arizona v. Gant, 556 U.S. 332, 345–47 (2009).

[66] United States v. Robinson, 414 U.S. 218, 235 (1973) (holding a custodial arrest based on probable cause is a reasonable intrusion under the Fourth Amendment and requires no additional justification to conduct a search incident to arrest).

[67] Gant, 556 U.S. at 342 (expanding Chimel to allow warrantless searches of vehicles when the passenger is unsecured and within reaching distance of the vehicle, and when there is reason to believe evidence relevant to the crime of arrest may be found within).

[68] New York v. Belton, 453 U.S. 454, 459 (1981) (holding that upon arrest, law enforcement may search a vehicle’s passenger compartment).

[69] See, e.g., Perry Educ. Ass’n v. Perry Local Educators’ Ass’n, 460 U.S. 37, 45 (1983) (“A traditional public forum is property that by long tradition or by government that have been devoted to assembly and debate”).

[70] Christopher R. Steffe, Why We Need Net Neutrality Now Or: How I Learned to Stop Worrying and Start Trusting the FCC, 58 Drake L. Rev. 1149, 1158 (2010).

[71] Id.

[72] See Texas v. Johnson, 491 U.S. 397 (1989) (invalidating a statute prohibiting desecration of the American flag).

[73] See U.S. Const. amend. IV (“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no [w]arrants shall issue, but upon probable cause, supported by [o]ath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized”); see also Riley, 134 S. Ct. at 2491.

[74] See Riley, 134 S. Ct. at 2490–91.

[75] Id. at 2491.

[76] See id. at 2489.

[77] Id. at 2494–95 (“Our answer to the question of what police must do before searching a cell phone seized incident to arrest is accordingly simply get a warrant.”).

[78] Id. at 2490 (citing United States v. Jones, 132 S. Ct. 945, 955 (2012) (Sotomayor, J., concurring) (“GPS monitoring generates a precise, comprehensive record of a person’s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations.”)).

[79] See, e.g., Terry v. Ohio, 392 U.S. 1, 21 (1968) (establishing the reasonable suspicion standard, which requires law enforcement, “to point to specific and articulable facts which, taken together with rational inferences from those facts, reasonably warrant that intrusion”).

[80] See United States v. Miller, 425 U.S. 435, 442–43 (1976).

[81] Jeremy H. Rothstein, Note, Track Me Maybe: The Fourth Amendment and the Use of Cell Phone Tracking to Facilitate Arrest, 81 Fordham L. Rev. 489, 506 (2012).

[82] Id. at 506–07 (discussing United States v. Miller, 425 U.S. 435, 442-43 (1976)).

[83] See generally Arizona v. Gant, 556 U.S. 332, 342 (2009 ) (expanding Chimel to allow warrantless searches of vehicles when the passenger is unsecured and within reaching a distance of the vehicle, and when there is reason to believe evidence relevant to the crime of arrest may be found within); New York v. Belton, 453 U.S. 454, 459 (1981) (holding that upon arrest, law enforcement may search a vehicle’s passenger compartment); and United States v. Robinson, 414 U.S. 218, 235 (1973) (holding a custodial arrest based on probable cause is a reasonable intrusion under the Fourth Amendment and requires no additional justification to conduct a search incident to arrest).

[84]Riley, 134 S. Ct. at 2485.

[85] See id. at 2493.

[86] Id. at 2490–91 (emphasis added).

[87] See id. at 2484–85.

[88] See id. at 2490.

[89] Riley, 134 S. Ct. at 2493.

[90] See id. at 2490–91.

[91] Id. at 2495.

[92] Olmstead, 277 U.S. at 474 (Brandeis, J., dissenting).

Blog: Personal Data Security and the “BYOD” Problem: Who is Truly at Risk?

By: Jill Smaniotto, Associate Manuscripts Editor

“Bring your own device” policies are undeniably on the rise in the realm of business IT.  According a recent survey, roughly two-fifths of U.S. consumers working for large enterprises use their personally-owned devices—i.e. smartphones, tablets, or desktops—for at least some aspect of their work.[1]  Generally, concern surrounding the practice of BYOD has been in regard to the risk to misappropriation of corporate data (i.e., that of the employer’s customers).  However, a recent case has shed light on another area for concern: the risk to employee data when the employer/employee relationship sours.

“Bring your own device” or “BYOD” is a phrase that has become widely adopted to refer to the practice of employees bringing their own personal computing devices to the workplace for use on the corporate network.[2]  In recent years, a shift in IT culture has taken place: the consumerization of IT.[3]  Essentially, there has been a shift from a IT-department-driven culture to one in which consumers are getting the newest, latest technologies ahead of their corporate counterparts.[4]  In turn, these consumers are finding their own personal devices are better suited for their work than those provided by employers.[5]

This use of personal devices to handle corporate data on secure corporate networks is occurring regardless of whether employees have employer consent to do so.[6]  In fact, a survey conducted by ZDNet indicated that only one-quarter of all enterprise employees surveyed are required by employers to bring their own device, suggesting that the remaining three-quarters were doing so without their employer’s consent.[7]  This raises several concerns for data security, as corporate entities are generally not in control of the data accessed via personal devices where employees are using personal devices without the consent of the employer.

Similarly, small and midsized business are embracing the use of BYOD policies at a rapid pace, while failing to address security risks at the same pace.[8]  The cost-saving benefits of operating under BYOD policies is also to blame for the lack of security solutions in place in small, low-capital companies.[9]

Despite the risks, software companies are beginning to encourage the adoption of BYOD policies by offering services to put in place security solutions.[10]  By employing one of these “solutions,” companies can set safeguards for their customers’ data, while allowing the company and the employees to reap the benefits of BYOD.  For example, IBM emphasizes that BYOD increases employee productivity and satisfaction as employees are more comfortable with their own devices.[11]  Additionally, BYOD programs may result in minimal savings for the company, as it shifts the cost to the employee/user.[12]

While the focus is primarily on the risk to company/consumer data, there has been little addressing the risk BYOD poses for the employee/user’s data.  Last week, the U.S. District Court for the Southern District of Texas decided a case addressing that very risk.[13]  In Rajaee v. Design Tech Homes, Ltd., plaintiff Saman Rajaee asserted a claim for loss under Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030.[14]  Rajaee was formerly employed by the defendant, Design Tech Homes, in a position that required he have constant access to email in order to address customer questions and concerns.[15]  Design Tech did not provide Rajaee with a cell phone or smart device.[16]  Instead, Rajaee used his own personal iPhone to conduct his work for Design Tech via a remote access connection to Design Tech’s Microsoft Exchange Server.[17]  Roughly one year after he began working for Design Tech, Rajaee notified Design Tech that he would be resigning in two weeks, and Design Tech immediately terminated Rajaee’s employment.  Shortly thereafter, Design Tech’s network administrator remotely wiped Rajaee’s iPhone, deleting all work-related and personal data.[18]

Rajaee filed suit against Design Tech under the CFAA, alleging that company’s indiscriminate wiping of his iPhone caused him to lose “more than 600 business contacts collected during the course of his career, family contacts (many of which were overseas and some related to family business), family photos, business records, irreplaceable business and personal photos and videos and numerous passwords.”[19]

Under the CFAA, “loss” is defined as “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.”[20]

Here, the Court held that while Rajaee did assert losses as a result of the defendant’s actions, he did not assert cognizable loss under the CFAA. The Court notes that Rajaee’s assertions of monetary values corresponding to his “losses” are not supported by any evidence, and he failed to produce any evidence relating to his response to the data’s deletion or damages suffered as the result of an “interruption of service.”[21]  Accordingly, the Court granted Design Tech’s motion for summary judgment and dismissed Rajaee’s claim under the CFAA.[22]

The Court’s ruling in Rajaee is troubling in that at this stage, it appears as though there is little recourse for employees who suffer due to their employers’ choices to implement BYOD policies.  Where individuals run the risk of losing personal photographs, messages, and contact information, that risk is further exacerbated by the very nature of such personal data, making it nearly impossible to quantify loss.  It seems as though participation in BYOD programs by employers is on a track to become relatively low-risk, while all of the risk rests with the employee/user, who may be completely beholden to the whims of the employer.

 

[1] Zack Whittaker, Bring-Your-Own-Device Gains Traction in the U.S. – Even if Enterprises Aren’t Ready Yet, ZDNet (Oct. 21, 2014), http://www.zdnet.com/bring-your-own-device-gains-traction-in-the-u-s-even-if-enterprises-arent-ready-yet-7000034925/.

[2] Vangie Beal, What is Bring Your Own Device (BYOD)?, Webopedia (last visited Nov. 16, 2014), http://www.webopedia.com/TERM/B/BYOD.html.

[3] Tony Bradley, Pros and Cons of Bringing Your Own Device to Work, PCWorld (Dec. 20, 2011, 10:42 PM), http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_own_device_.html.

 [4] Id.

[5] See Whittaker, supra note 1.

[6] Id.

[7] Id

[8] Pedro Hernandez, Small Biz Mobile Security Lags Behind BYOD Adoption, SmallBusinessComputing.com (Nov. 13, 2014), http://www.smallbusinesscomputing.com/News/Security/small-biz-mobile-security-lags-behind-byod-adoption.html.

[9] Id.

[10] See BYOD: Bring Your Own Device: Why and How You Should Adopt BYOD, IBM (last visited Nov. 16, 2014), http://www.ibm.com/mobilefirst/us/en/bring-your-own-device/byod.html; BYOD – Bring Your Own Device, MobileIron (last visited Nov. 16, 2014), https://www.mobileiron.com/en/solutions/byod; BYOD Smart Solution, Cisco (last visited Nov. 16, 2014), http://www.cisco.com/web/solutions/trends/byod_smart_solution/index.html.

[11] IBM, supra note 10.

[12] Id. 

[13] BYOD-Covered Employee Cannot Prove CFAA Loss After Company Remotely Wiped Phone, 19 Electronic Com. & L. Rep. Online (BNA) (Nov. 13, 2014).

[14] Rajaee v. Design Tech Homes, Ltd., No. H-13-2517, 2014 U.S. Dist. LEXIS 159180, at *3 (S.D. Tex. Nov. 11, 2014).

[15] Id. at *1.

[16] Id. at * 1-2.

[17] Id. at *2.

[18] Id. at *3.

[19] Rajaee, 2014 U.S. Dist. LEXIS 159180, at *3.

[20] Id. at *8-9 (citing 18 U.S.C. § 1030(e)(11)).

[21] Id. at *9-10.

[22] Id. at *11-12.

Blog: Step Into Shaolin and See Where the Wu-Tang Clan Could be Taking Music

By: Josh Lepchitz, Associate Staff

Music streaming programs have drastically changed how it is consumers listen to music. In the United States music sales are 5% and a major contributing factor to the drop in revenue is services like Spotify, Pandora, and YouTube. [1]  This drop in sales has proven not only to be discouraging to major record labels that depend on the sale of cd’s and digital downloads, but it has also received some back lash from popular recording artist.  Artists such as Taylor Swift, David Byrne of the Talking Heads, Dan Auerbach of the Black Keys, Beck, and Thom Yorke of Radiohead have spoken out against the public receiving their music from services like Spotify.[2]  The primary arguments held by these musicians is that they should have a say in how their art is to be distributed to the public, and that these services provide horrible royalties.  The royalties received from Spotify range between $0.006 to $0.0084 cents per stream.[3]  For the major recording artists this is the opposite of what they are used to receiving in royalties.

To combat the increased exposure and decreased royalties artists have come up with various strategies.  Some simply do not allow their music to be accessed on these programs.[4]  Others have become very litigious. For example, Flo and Eddie Inc. represent members of the 1960’s band the Turtles, and they recently won a multimillion-dollar suit against Sirius XM Radio Inc. for the use of some of their copyrighted material and have now placed their sights on Pandora.[5] However, one artist in particular has taken an alternative approach that could be potentially revolutionary in music consumption.  I am speaking of the legendary New York City based hip-hop group the Wu-Tang Clan.  Either as a collective ensemble or as individual artists the Wu-Tang has made an undeniable and lasting impression on music and now they have the potential to change how major recording artists reach the public with their music.

The Wu-Tang have secretly recorded and produced an album that they are calling their opus titled “Once Upon a Time in Shaolin”. Here is where things become interesting, the Wu own the sole rights to the album and there is only one copy of it in existence.   The album will be auctioned off and the expected sale price is in the millions of dollars.[6]  The multiple of reasons behind the unique release include that the group wants to see a revival of music being seen as art and shift the medium closer to the realm of visual works like painting and photography.[7]  The Wu-Tang will receive the proceeds from the auction sale and the sole copy of the album, along with its rights will go to the purchaser.

What this means is after the sale the Wu-Tang is finished with the album and the purchaser can do with it whatever they chose.  Using this model the musicians will receive their payday, and the purchaser can turn around and do whatever with the piece of art.  The buyer could sell and distribute the album, post it online for free or limited purchase download, take the album on tour as the Wu-Tang has in order to give potential buyers a preview, or the buyer could destroy it.

A man from Virginia, Chris Everhart, initiated what ended up being an unsuccessful crowd funding campaign on Kickstarter.com.[8]  He failed to reach his lofty goal of six million dollars in order to purchase and destroy the album.  He sees the project as “self-righteous” and believes that art should be shared with the entire world and not be excluded from the culturally disadvantaged.[9]  His goal was not met but his point does have some potency.  There is the consideration that art is for the public good and the people should have access to it.  Now this is simply one man’s failed goal, but what happens with the music will depend entirely upon who purchases it.

“Once Upon a Time In Shaolin” could be purchased by a record label and distributed normally as any other album, it could go to an eccentric millionaire and be locked away for his own personal use, or it could go to a museum and be placed on display for the public like the Mona Lisa.  An interesting question is what happens if an entity like Spotify purchases the album and requires monthly payments to access their exclusive content.  It would be a possible way for a company like Spotify to alter its business model.  They could go from being a company who receives the majority of its profits from advertisers to a company who relies mostly on subscribers interested in original and exclusive content like Netflix or HBO.

The outcome of what happens with the Wu-Tang’s special release is yet to be seen. All theories are purely speculative, but it has accomplished another one of the Wu-Tang’s goals, to spark discussion.[10]  So far in 2014, only one artist has produced a platinum album, which was last month’s release of 1989 by Taylor Swift. Outside of Taylor Swift the only other platinum album is the soundtrack from Disney’s Frozen.[11]  Before the release of 1989, 2014 was the first year that no platinum albums had been awarded to a non-compilation record since 1976, the first year that Recording Industry Association of America (RIAA) began handing out platinum albums.   Music streaming services are here to stay, as far as anyone can tell, and a shift in the landscape of the music industry is inevitable.  What the Wu-Tang accomplished is an expansion on their legacy.  Not only are they going to be known for their accomplishments as artists, but also they could be known for their impact on the music industry as market innovators.

To get a sneak peak of “Once Upon a Time In Shaolin” and some commentary from its producer check out the following link: https://www.youtube.com/watch?v=ABL5Elr16hc.

 

 

[1] Ben Sisario, U.S. Music Sales Drop 5%, as Habits Shift Online, N.Y. Times, Sept. 26, 2014, at B3.

[2] Jillian Mapes, Musicians Drinking the Spotify Haterade: The Collected Complaints, (Aug. 12, 2014, 9:45 AM), http://flavorwire.com/471802/musicians-drinking-the-spotify-haterade-the-collected-complaints, Stuard Dredge, Rdio on Taylor Swift’s Spotify block: ‘This is art. It’s the artist’s choice’, (Nov. 10, 2014, 7:09 AM), http://www.theguardian.com/technology/2014/nov/10/rdio-spotify-taylor-swift-streaming.

[3] Jillian Mapes, Musicians Drinking the Spotify Haterade: The Collected Complaints, (Aug. 12, 2014, 9:45 AM), http://flavorwire.com/471802/musicians-drinking-the-spotify-haterade-the-collected-complaints.

[4] Stuard Dredge, Rdio on Taylor Swift’s Spotify block: ‘This is art. It’s the artist’s choice’, (Nov. 10, 2014, 7:09 AM), http://www.theguardian.com/technology/2014/nov/10/rdio-spotify-taylor-swift-streaming.

[5] Flo & Eddie Inc. v. Sirius XM Radio Inc., et al., No. CV 13-5693 PSG (RZx), 2014 WL 4725382, (C.D. Cal. Sept. 22, 2014). Eriq Gardner, After SiriusXM Success, The Turtles take on Pandora in $25 Million Lawsuit (Exclusive), (Oct. 2, 2014, 1:18 PM), http://www.hollywoodreporter.com/thr-esq/siriusxm-success-turtles-take-pandora-737673.

[6] Zack Greenburg, Why Wu-Tang Will Release Just One Copy Of Its Secret Album, Forbes (March 26, 2014, 12:00 PM), http://www.forbes.com/sites/zackomalleygreenburg/2014/03/26/why-wu-tang-will-release-just-one-copy-of-its-secret-album/.

[7] Id.

[8] https://www.kickstarter.com/projects/510343979/destroy-only-copy-of-new-wu-tang-album (last visited Nov. 10 2014).

[9] Id.

[10] Zack Greenburg, Unlocking The Wu-Tang Clan’s Secret Album in Morocco, Forbes (May 6, 2014, 11:03 AM), http://www.forbes.com/sites/zackomalleygreenburg/2014/05/06/unlocking-the-wu-tang-clans-secret-album-in-morocco/.

[11] Cliff Lee, Congratulations, Taylor Swift: You’ll be the only platinum artist of 2014, The Globe and Mail (Oct. 21 2014, 9:36 AM), http://www.theglobeandmail.com/arts/music/congratulations-taylor-swift-youll-be-the-only-platinum-artist-of-2014/article21180284/.

Blog: Smart Guns and Their Constitutional Concerns

By: Jill Smaniotto, Associate Manuscript Editor

Following the shooting death of eighteen year-old Michael Brown by a police officer in Ferguson, Missouri this past summer, the issue of accountability for police firearm use has been at the forefront of public discourse.[1]  A firearms technology startup in Capitola, California known as Yardarm Technologies recently announced that it has developed a product that may provide the real-time information necessary to maintain greater oversight of the use of police force.[2]

While so-called “smart gun” technology has existed for quite some time, technological advances, coupled with the growing concern over mass shootings and police abuse of force, have prompted further development of the technology.[3]  Yardarm’s new product is a two-inch piece of hardware equipped with an accelerometer and a magnetometer that officers snap into the grip of their firearms.[4]

The sensor records information about when, where, and how police officers use their firearms,[5] providing dispatchers with real-time data.[6]  Currently, the technology requires the officer to carry a smartphone; as the device transmits the data by sending a signal to the phone, which then sends the information to Yardarm’s servers for secure storage.[7]  The Yardarm sensor has capabilities to track the gun’s location, whether the gun is in its holster, when new magazines are inserted, and when it is fired.[8]  Yardarm also intends to develop the product further so that it may be able to tell in which direction the gun is fired.[9]  The technology does not feature a remote disabling mechanism.[10]

Initially, Yardarm intended to sell the device on the consumer firearm market.[11]  Early plans for the device focused on tracking in the event of theft or misplacement of the individual’s firearm and remote locking, but the potential political sensitivities of entering the consumer firearm market proved too great a challenge to the ten-employee startup.[12]  Yardarm then decided to switch its focus to law enforcement agencies, which were already showing interest in the burgeoning technology.[13]  The Santa Cruz Sheriff’s Department and Carollton (Texas) Police Department have begun equipping officers’ weapons with the sensors on a trial basis.[14]

            Discussion surrounding the announcement of this new technology has been divisive. Proponents of technology like Yardarm’s new sensor cite the potential benefits to officer safety in the field, as well as the hope for a pool of objective data that may be used to investigate incidents of alleged police brutality.[15]  Law enforcement agencies are hopeful that this technology will help to solve a problem that is “the worst nightmare for any officer in the field”: deputies in trouble and unable to ask for additional assistance.[16]  Additionally, those in favor of the technology expect that the sensors, like dashboard cameras, will provide objective records of incidents when officers used firearms.[17]  This information may run on a two-way street, though, as it could be used “to exonerate an officer accused of misconduct, or to prosecute a criminal in a court of law.”[18]

            Detractors, however, are not comfortable with the potential implications of widespread use of technology.  Guns rights advocates, such as the National Rifle Association (“NRA”) are wary of the impact of smart guns on Second Amendment rights.[19]  Specifically, the NRA has voiced concern that the proliferation of these sensors may open the door to government regulations requiring this technology on personal firearms.[20]  The American Civil Liberties Union (“ACLU”) expressed concern that the sensors may present an invasion of privacy, but tempered that concern by also admitting that such invasion may be a necessary evil in order to attain some much needed transparency into police behavior.[21]

            While this technology is certainly new, the supposed ease of integration[22] and the volatile state of affairs surrounding police use of firearms may combine to create the spark necessary to ignite the widespread employ of such sensors sooner rather than later.  As Yardarm has made clear its intention to solely market the product to law enforcement and military,[23] detractors of the technology may find their criticisms lacking much weight as compared to the vast public safety benefits in the inevitable debate as to what place smart guns may have in our society.

 

[1] Hunter Stuart, Company Makes Gun Tech That Could Help Prevent Police Brutality, The Huffington Post (Oct. 24, 2014, 11:02 AM), http://www.huffingtonpost.com/2014/10/24/police-gun-tracking_n_6040930.html.

[2] Id.

[3] Haven Daley, California Startup Unveils Gun Technology for Cops, Aol.com (Oct. 24, 2014, 6:57 AM), http://www.aol.com/article/2014/10/24/california-startup-unveils-gun-technology-for-cops/20983460/; David Kravets, Silicon Valley Startup Unveils Internet-Connected Smart Guns for Cops, Ars Technica (Oct. 24, 2014, 12:30 PM), http://arstechnica.com/tech-policy/2014/10/silicon-valley-startup-unveils-internet-connected-smart-guns-for-cops/.

[4] Aaron Tilley, Internet-Connected Guns Are the Next Step for Data-Hungry Police, Forbes (Oct. 24, 2014, 10:00 AM), http://www.forbes.com/sites/aarontilley/2014/10/24/yardarm-sensor-gun/; Stuart, supra note 1.

[5] Stuart, supra note 1.

[6] Kravets, supra note 3.

[7] Stuart, supra note 1.

[8] Tilley, supra note 4.

[9] Id.

[10] Daley, supra note 3.

[11] Tilley, supra note 4.

[12] Id.; Kravets, supra note 3.

[13] Tilley, supra note 4.

[14] Daley, supra note 3; Kravets, supra note 3; Stuart, supra note 1; Tilley, supra note 4.

[15] Daley, supra note 3; Stuart, supra note 1.

[16] Daley, supra note 3. See also Stuart, supra note 1 (“[T]he technology can be also used to keep police officers safer. When an officer draws his weapon, for example, the gun will send an alert to the police command center and to nearby officers, alerting them to a potentially dangerous situation.”).

[17] Stuart, supra note 1.

[18] Id.

[19] Krave
ts, supra note 3.

[20] Id. See also Daley, supra note 3 (noting that Gun Owners of California spoke to concern of future government mandated use of the technology on personal firearms).

[21] Tilley, supra note 4.

[22] See Tilley, supra note 4 (noting that Yardarm is designing its software to easily fit into existing dispatcher software); Daley, supra note 3 (indicating that the device can fit into the handle of most police guns and relies on Bluetooth technology for data transmission).

[23] Tilley, supra note 4.

Blog: E-Commerce and Taxation: Internet Tax Freedom does not Mean Tax Freedom for the Internet

By: Andrew Landrum, Associate Technical Editor

The global advent of interconnectivity has led to breakthroughs in communication, innovation, scientific collaboration, and, most importantly, how to spend money in the comfort of your pajamas.  Online shopping has become the way of the future.  No more will store hours, location, or Netflix conflict with the impulse to buy.  Indeed, this past August, the United States Department of Commerce has reported a steady growth of E-Commerce, as it now comprises an adjusted total of almost 7% of all total retail sales.[1]  For just the second quarter of 2014, the United States E-Commerce sales totaled $75.0 billion.[2]  The problem, however, is that these sales run zero-sum with brick-and-mortar companies.[3]

Brick-and-mortar companies are those businesses that maintain a physical presence in a state.  Their presence supports the local economy, provides jobs, and offers face-to-face customer experiences.  However, it also succumbs them to state and local regulations, like sales taxes.  These sales taxes support state and local governments but also constitute extra burdens on local consumers.[4]  These burdens, however beneficial, are pushing consumers online.[5]

States have attempted to react by passing Internet sales taxes.[6]  These taxes are meant to level the playing field between brick-and-mortar companies and E-Commerce industries.[7]  However, these measures have not gone without resistance.  Policymakers have also been weary of unfair taxation and thus passed the Internet Tax Freedom Act, meant to protect, “unfettered access to one of the most unique gateways to knowledge and engines of self-improvement in all of human history.”[8]  This legislation has served as a springboard for litigation. Online companies argue Internet sales taxes implicate Internet tax freedom and discriminate against out-of-state companies solely because of the nature of their business.

The Internet Tax Freedom Act was passed in 1988 and will likely be extended indefinitely by the end of this year.  The text of the act clearly prohibits two things: (1) taxes on internet access; and (2) multiple of discriminatory taxes on electronic commerce.[9]  Clearly the first prohibition on internet access has no relevance to online sales tax litigation.  The real issue falls on what is defined as a “discriminatory tax” on E-Commerce.  There has been much debate among online service providers, and state and local governments as to what constitutes a discriminating tax.  These businesses hold that taxing a service or good merely because the transaction occurs online should constitute discrimination and runs in the face of the Internet Tax Freedom Act.[10]  However, as explained by the 7th Circuit, the misleading name does not ensure “tax freedom” but only freedom from unfair taxation.[11]

According to the relevant provisions of the Act itself, discriminatory E-Commerce taxes are those taxes that: (1) are not imposed on the same or similar property, goods, services, or information accomplished through other means; (2) are imposed at a higher rate than those goods, services, or information accomplished through other means; (3) imposes an obligation to collect or pay the tax on a different entity than would otherwise be normally taxed; or (4) the taxes are imposed on an internet access service provider merely because the provider displays the resellers information or processes the orders through an out-of-state computer server.[12]

Accounting for the first three sections, courts have allowed E-Commerce tax statutes for purposes of levelling the playing field between online industries and companies physically present.[13]  E-Commerce taxes that run at a similar rate as those imposed on brick-and-mortar companies have not been found to qualify as “discriminatory” under the Internet Tax Freedom Act.[14]  This statute, despite its name, does not create “tax freedom” per se but instead merely prohibits disadvantaging one type of retailer over another.[15]

The fourth provision has created litigation between cities and states, and online auction and solicitation websites such as Ebay, Craigslist, or Stubhub!.[16]  Courts have drawn a line between these service providers and have declared that if an intermediary takes an active role in, “staging an auction and exchanging goods for money” they have so involved themselves in the transaction that state imposed taxation on the providers service is not discriminatory.[17]  Those that play an active role act as an agent of the reseller and can be taxed accordingly, whereas passive websites that merely list the offer and the offeror’s information cannot.[18]

The availability of online services has blurred the commercial lines, making comparisons between internet companies and brick-and-mortar businesses difficult.  States are, however, allowed to tax each type of company similarly, assuming their services provided are comparable and the tax imposed is equitable.  In an increasingly diverse market, all states can do it ensure all companies have a fair shot at competing for your business.

 

[1] U.S. Census Bureau, Quarterly Retail E-Commerce Sales, U.S. Department of Commerce (Aug. 15, 2014, 10:00 AM) available at, http://www.census.gov/retail/mrts/www/data/pdf/ec_current.pdf.

[2] Id.

[3] Grant Gross, U.S. residents oppose Internet sales tax, say they’ll shop online less, Computer World (May 13, 2013 5:43 PM), http://www.computerworld.com/article/2497336/e-commerce/u-s–residents-oppose-internet-sales-tax–say-they-ll-shop-online-less.html; See, U.S. Census Bureau, supra at note 1 (displaying an increase of E-Commerce makes up an increasingly large amount of overall retail transactions).

[4] U.S. Census Bureau, Quarterly Summary of State and Local Government Tax Revenue for 2014:Q2, p.2, Sept. 23, 2014, available at http://www2.census.gov/govs/qtax/2014/q2infosheet.pdf (sales tax totaled $89.5 billion in Q2 of 2014).

[5] See, U.S. Census Bureau, supra at note 1.

[6] Kate Tummarello and Bernie Becker, Senators renew Internet sales tax push, the Hill (July 16, 2014, 6:00 AM), available at http://thehill.com/policy/finance/212385-senators-renew-internet-sales-tax-push.

[7] Id.

[8] PERMANENT INTERNET TAX FREEDOM ACT, 160 Cong Rec H 6228.

[9] Interstate Tax Freedom Act, § 1101(a)(1), (2), 47 U.S.C. § 151 note.

[10] Id.

[11] Id.

[12] Interstate Tax Freedom Act, § 1105(2); 47 U.S.C. § 151 note.                     

[13] StubHub!, Inc., 624 F.3d at 366.

[14] Id.

[15] Id., at 365;Travelocity.com, LP v. Wyo. De
p’t of Revenue
, 2014 WY 43, 103 (Wyo.2014) (Noting that policies that do not single out individual consumers and generally apply to all willing to engage in taxed commercial practices are not discriminatory).

[16] Stubhub!, Inc., 624 F.3d at 366.

[17] Id. At 366-67 (“Because the ordinance applies equally to ticket resales at physical auction houses, the Chicago Board of Trade, and venues such as StubHub!, the tax is not “discriminatory”).

[18] Id.

It’s Time for Revenge Porn to Get a Taste of Its Own Medicine: An Argument for the Federal Criminalization of Revenge Porn

pdf_iconDownloadPDF

Cite as: Taylor Linkous, It’s Time for Revenge Porn to Get a Taste of Its Own Medicine: An Argument for the Federal Criminalization of Revenge Porn, 20 Rich. J.L. & Tech. 14 (2014), http://jolt.richmond.edu/v20i4/article14.pdf.

Taylor Linkous

I.  Introduction

[1]       Throughout history, pornography and technology have enjoyed a symbiotic relationship, each playing a significant role in the growth and widespread success of the other.  From the VCR and camcorders to the Polaroid camera and the Internet, the pornography industry has always accelerated the growth of new technologies, paving the way for these new services to be introduced into mainstream society.[1]  Most of these new technologies were appealing to creators and consumers of pornography because the new technologies brought an increased sense of privacy.[2]  For example, much of the success of the Polaroid camera is said to come from the fact that people felt they could take explicit photos without having to go to the store to get the film developed.[3]  Similarly, pornography and the promise of privacy helped drive the success of cable TV and the VCR.[4]  As Peter Johnson writes,

Videotape first emerged as a cheap and efficient alternative to film (later kinescope) for TV production.  Its development for home use owes its birth to Sony and Betamax but its maturity to porn.[5]

Correspondingly, with the introduction of these new technologies the porn industry has continually been able to grow and push the limits.  With the launch of the VCR, the porn industry gained a new audience of people willing to watch their films; “[i]nstead of travelling to a disreputable store, viewers could watch films at their convenience at home.”[6]  This audience has only continued to grow with the introduction of revolutionary technologies, especially the Internet, which have made pornography easy and cheap to produce by lowering the barriers to entry and transaction costs.[7]  As Coopersmith states, “[e]ssentially, cyberporn has become an economist’s ideal free good: pornography is easily accessible, incurs minimum transaction costs, and enjoys a large demand.” [8]  Thus, the relationship between technology and pornography has existed for some time now and the bond between the two seems unbreakable.

[2]       While this historical interdependence has clearly been mutually beneficial for the porn industry and new technologies, there has been collateral damage.  For example, the Internet has significantly exacerbated the distribution and viewing of child pornography, and the cell phone started a “sexting” craze among teens and adults.[9]  In recent years, this collateral damage has come in the form of harassment, humiliation, invasion of privacy, and loss of reputation with the rise of revenge porn.  With the growth and normalization of the camera/video phone and modern ease with which individuals can now create, manage, and navigate websites, has come the revenge porn phenomenon.  Just like Polaroid cameras, camera phones have given individuals a sense of privacy, making them feel comfortable taking and sending explicit pictures and videos.[10]  A survey conducted by Match.com in 2012 found that out of 5,000 adults, 57% of men and 45% of women had received an explicit photo on their phone and 38% of men and 35% of women had sent one.[11]  Unfortunately, the sense of privacy encouraging this behavior is false, because unlike Polaroid photographs, these pictures and videos can easily be uploaded to a revenge porn website by an ex-lover, “friend,” hacker, or anyone else who happens to come upon them.  Once this happens, those seemingly “private” pictures he or she probably thought only their boyfriend or girlfriend would view are then available for the world to see.

[3]       Currently, the act of posting revenge porn is a crime in only fourteen states—Arizona, California, Colorado, Delaware, Georgia, Hawaii, Idaho, Maryland, New Jersey, New York, Pennsylvania, Utah, Virginia, and Wisconsin.[12]  However, over the past year, as victims of revenge porn increasingly advocate for laws criminalizing revenge porn, many more states are considering such legislation.[13]  Legal scholars differ in their opinions on the best way to deal with revenge porn.  Some argue a criminal law is unnecessary as victims are already able to file civil suits against those who posted the pictures based on claims such as copyright infringement, intentional inflection of emotional distress, or defamation.[14]  Others argue revenge porn should be treated like other forms of online sexual harassment and many contend that there should be an amendment to § 230 of the Communications Decency Act (“CDA”) to allow victims to go after the revenge porn websites.[15]

[4]       This comment analyzes the various potential legal approaches to dealing with revenge porn and posits that a federal law criminalizing the dissemination of revenge porn is necessary to combat this growing trend.  Part II provides background information on revenge porn and further analyzes how the successful relationship between technology and pornography led to the rise of revenge porn.  Part III analyzes the different civil remedies currently available to revenge porn victims and argues these are not practicable solutions.  Part IV discusses the current state laws criminalizing revenge porn and the legal challenges faced by those affected by revenge porn and legislators seeking to tackle this problem.  Finally, Part V proposes that a federal law criminalizing revenge porn is the best solution to this unsettling new movement.

 

II.  Background Information on Revenge Porn and Its Rise to Recognition

[5]       As stated above, technology and pornography have lived symbiotically with each other for quite some time.  The introduction of the Internet made access to pornography easier and widened the audience by allowing people to view pornography in the comforts of their own home.  Moreover, the Internet and other new technologies, such as the Smartphone, have made it easy and more appealing for people to create and distribute Do-It-Yourself (“DIY”) pornography.  Below I will first provide background information on revenge porn and explain what this trend is all about.  Then, I will analyze how technological progress helped lead to the rise in revenge porn.

A.  What Is Revenge Porn?

[6]       Revenge porn is a nude picture or video that is publicly shared on the Internet, usually by an ex-lover, for the purpose of humiliation.[16]  Despite the relatively recent media attention, revenge porn has been around for years.  As far back as 2000, an Italian researcher identified a new genre of pornography where explicit pictures of ex-girlfriends were being shared in Usenet groups.[17]  Later, in 2008, the first websites and blogs completely dedicated to this type of porn started to pop up.[18]  Then in 2010, the first person went to prison for posting revenge porn in New Zealand.[19]  This person was Joshua Ashby and he was found guilty of distributing an “indecent model or object” to the public when he posted a picture of his naked ex-girlfriend on Facebook.[20]  That same year, Hunter Moore established one of the most popular revenge porn sites, IsAnyoneUp.com.[21]

[7]       Normally on revenge porn websites, the explicit images or videos are posted on the site and submitted with the victim’s name, a link to his or her Facebook, and other personal information.[22]  Citing Cyber Civil Rights Statistics on Revenge Porn from 2013, Danielle Keats Citron and Mary Anne Franks, law professors and anti-revenge porn advocates, stated, “[i]n a study of 1,244 individuals, over 50% reported that their naked photos appeared next to their full name and social network profile; over 20% reported that their e[-]mail addresses and telephone numbers appeared next to their naked photos.”[23]  On IsAnyoneUp.com, each submission to the website usually included a depiction of the man or woman’s Facebook or Twitter thumbnail, pictures of them clothed, and pictures of them “exposing their genitalia, or even in some cases, engaging in sexual acts.”[24]  Another revenge porn website, MyEx.com, also includes first and last names and links to social media information along with the images posted.  This site also charges victims upwards of $500 to remove the photographs.[25]  Posting personal information along with these images threatens the victim’s safety, enabling strangers to stalk and harass them.  Although the name “revenge porn” comes from the idea that these photos are posted by jilted ex-lovers, sometimes the pictures are reportedly acquired “through hacking, theft by repair people or false personal ads.”[26]

B.  Internet + Smartphones + DIY Porn = Revenge Porn

[8]       In 1995, when Congress took its first stab at regulating the Internet with the introduction of the CDA as part of the Telecommunications Act amendments,[27] less than 0.4% of the world’s population was using the Internet.[28]  Then, only two years after the CDA was passed, the Supreme Court held sections 223(a) and 223(d) unconstitutional in Reno v. ACLU,[29] essentially leaving the immature Internet “free to develop without government regulation of pornography.”[30]  With the ability to freely experiment and develop during this time of very little regulation, technology and pornography’s relationship thrived.

[9]       The Internet allowed the porn industry to bypass zoning laws, age restrictions, and postal regulations, while pornography aided the Internet’s quick development by constantly pushing the limits of new technologies.[31]  For example, “[i]n 2001, Blaise Cronin and Elisabeth Davenport stated, ‘It is universally acknowledged by information technology experts that the adult entertainment industry has been at the leading edge in terms of building high-performance Web sites with state-of-the-art features and functionality.’”[32]  So, with little government regulation over the past decade, the Internet and pornography have consistently matured and prospered.

[10]     New and improved technologies allowing pornographers to provide images and videos quicker, cheaper, and more efficiently have certainly turned pornography into a booming business.[33]  In 2006, there were about 4.2 million pornographic websites and the annual pornography revenue in the United States was over $13 billion.[34]  Additionally, easy access to these websites has increased the amount of viewers.[35]  The user-friendly nature of pornography on the Internet “means that many who would never have sought it out before consume it regularly.”[36]  Unfortunately, this class of people is likely largely made up of curious children, who have explicit, hard-core porn available at their fingertips, quite literally.[37]  The widespread use of Smartphones in recent years has made pornography even easier to access and has become the primary way people view pornography.  According to statistics report from PornHub, the majority of porn in the United States is now viewed using smartphones.[38]  The website reported that 52% of its content was being viewed on mobile devices, a 10% increase from 2012, when it was reported only 47% of the website’s content was being viewed on smartphones.[39]

[11]     Not only have the Internet and smartphones increased access for viewers, but both have also made it easy for amateur pornographers to distribute their work and encourage people to engage in “DIY porn.”[40]  Dr. Gail Salts, an Associate Professor of Psychiatry at New York Presbyterian Hospital, stated,

What’s new is technology at a very cheap cost, which allows you to do it and merchandize it in a greater way. . . .  You can do it yourself.  You can do it with a flip-cam.  You can do it with your phone and you can put it up with no effort.[41]

Thus, not only have advanced technologies made access to pornography very simple and increased the number of pornography consumers, they have also fostered more user-generated pornographic content.

[12]     I argue that the rise in revenge porn is a culmination of these technological advancements, easy accessibility, and the DIY porn trend, which are all a result of the lifelong partnership between technology and pornography.  The Internet and smartphones have made it extremely easy to create explicit photographs, send them to others, and upload them to websites.  Moreover, an increased sense of privacy and anonymity has encouraged more people to engage in this behavior.  All of these factors had a role in creating the perfect storm for revenge porn to catch on and begin ruining the lives of many victims.[42]

C.  The Negative Effects of Revenge Porn

[13]     While technology and pornography likely will continue to benefit from their advantageous relationship and look onwards to the next big development, the negative impact their recent revenge porn progeny has on its victims is significant and profound.  Holly Jacobs, a Florida woman who is now a strong advocate of strengthening laws against revenge porn and who founded the website End Revenge Porn, has been significantly affected by revenge porn.[43]  Jacobs found out from a friend that nude photos she had sent to her ex-boyfriend had been posted on her Facebook and then later to hundreds of revenge porn websites.[44]  Even more disturbing was that her name, e-mail address, and place of business were posted along with the pictures.[45]  As a result of victims’ personal information being posted with their pictures, 49% of the victims of revenge porn have said they have been harassed or stalked online by users who saw their material.[46]  Victims are extremely fearful of stalkers and often struggle with anxiety and panic attacks.[47]  More than 80% of revenge porn victims have experienced severe emotional distress.[48]  Unfortunately, researchers have found that this anxiety felt by victims of cyber harassment gets worse over time.[49]  In fact, some victims have committed suicide.[50]

[14]     This extreme anxiety is exacerbated by the detrimental effects revenge porn has on victims’ professional lives.  A simple search of a revenge porn victim’s name on the Internet quickly reveals these explicit pictures, costing many of them their jobs and preventing others from finding work.[51]  Moreover, once these images are on the Internet, it is next to impossible to have them removed.[52]  Another victim speaking under the pseudonym, Sarah, detailed her efforts to get her explicit photos removed from hundreds of revenge porn websites.[53]  Sarah could not afford filing a civil suit, so she filed a Digital Millennium Copyright Act (“DMCA”) takedown request, stating that her ex-boyfriend was engaging in copyright infringement.[54]  However, many of the websites hosting her pictures were located in foreign countries, and thus outside the United States’ jurisdiction.[55]  Sarah was unable to get the photos removed from the Internet, and ultimately changed her name.[56]

D.  A Brief Look at a Few Revenge Porn Websites and Their Notorious Operators

[15]     The extremely popular revenge porn website mentioned above, IsAnyoneUp.com, was run by Hunter Moore.  The site received 30 million page views a month and featured thousands of nude pictures.[57]  Moore stated he received 10,000 image submissions in three months and his site was generating $8,000 in advertising revenue per month.[58]  Not only did this site solicit for naked photos, but additionally the submission form asked for the person’s name, link to their Facebook or Twitter page, and other personal information.[59]  Moore shut down IsAnyoneUp.com in April 2012 due to legal pressures involving child pornography.[60]  Interestingly enough, Moore ultimately sold the website to James McGigney, owner of Bullyville, an anti-bullying site.[61]  However, Moore quickly launched a new site, HunterMoore.TV, which he bragged would still allow people to submit naked photos of exes but would also include “mapping stuff” allowing users to stalk those pictured.[62]  Although Moore later denied this statement and claimed HunterMoore.TV would not feature this “mapping stuff,” the idea is not too far off from his work in the past.[63]

[16]     Moore confidently argues he is shielded from liability by § 230 of the CDA, an issue that will be discussed further below.[64]  While § 230 of the CDA does state that websites are not liable for content submitted by their users, it does not protect Moore from liability for federal criminal charges, such as conspiracy.  In fact, in late January of 2014, Moore and alleged accomplice, Charles Evens, were indicted on fifteen counts.[65]  These counts included conspiracy, seven counts of unauthorized access to a protected computer to obtain information, and seven counts of aggravated identity theft.[66]  According to the indictment, Moore paid Evans several times to hack into victims’ e-mail accounts and steal naked pictures in order to post on his website, IsAnyoneUp.com.[67]  If he is convicted, Moore faces up to five years for the conspiracy charge and computer hacking counts, and up to two years for aggravated identity theft.[68]

[17]     Another fellow revenge porn proprietor, Kevin Christopher Bollaert was arrested on thirty-one counts of conspiracy, identity theft, and extortion in California for his role in creating the website, ugotposted.com.[69]  The site is no longer operating, but when it was, Bollaert took it a step further by charging victims from $250 to $350 to remove the images through another website, changemyreputation.com.[70]  Also, Bollaert went as far as to require that the victim be identified by name, age, and other information.[71]  Additionally, a federal district court judge in Ohio ordered Bollaert and his co-founder of ugotposted.com, Eric Chason, to pay a woman $385,000 for posting explicit photos of her on the website without her consent.  The woman filed suit in May 2013 after discovering explicit pictures of herself as a minor had been distributed on ugotposted.com without her knowledge or consent.[72]  The default judgment against Chason and Bollaert included $150,000 for several child pornography counts, $10,000 for a right of publicity count, and $75,000 in punitive damages.[73]

III.  Potential Civil Remedies Available to Revenge Porn Victims[74]

[18]     Some legal scholars argue there is no need for criminal statutes because victims are already able to file civil suits against the people who posted their pictures.[75]  For example, tort laws such as intentional infliction of emotional distress, public disclosure of private information, defamation, or invasion of privacy may be available for some victims of revenge porn.[76]  Aside from the fact that these lawsuits are expensive and do not deter people from posting the images, § 230 of the CDA shields revenge porn websites from tort liability.[77]

[19]     One way around § 230 of the CDA is for the victim to sue the website for copyright infringement.  However, this option is available only if the person took the photograph or video.  If the person took the photograph or video, then he or she owns the copyright and can send a takedown notice to the website under the DMCA.[78]  If the website refuses to comply with the takedown notice, then the person is able to sue the website for copyright infringement.  While these civil remedies are accessible to some revenge porn victims, they are expensive, inconsistent, inefficient, and do very little to discourage people from posting revenge porn in the first place.

A.  Tort Law Is Not the Best Answer

[20]     As stated, some victims are able to file civil suits under existing privacy law or torts such as intentional infliction of emotional distress, defamation, or public disclosure of private information.[79]  Some people argue that the tort of intentional infliction of emotional distress should be used to deal with revenge porn and other forms of online harassment because of its flexibility.[80]  Further, the common law tort of intentional infliction of emotional distress “reflects a desire to impose liability on both the first creator of the harm and the entity that enabled the harm.”[81]  Alternatively, there are several common law torts that are derived from the right to privacy and potentially available to victims of revenge porn: appropriation, false light, disclosure or wrongful publication of private facts, and intrusion.[82]  There is also defamation, which requires the plaintiff to show the defendant made a false and defamatory statement that harmed the plaintiff’s reputation.[83]

[21]     All of the above mentioned civil remedies are inadequate.  First of all, filing and litigating a civil suit takes lots of time and money that many victims of revenge porn do not have.  Revenge porn victims are most often private individuals who are not equipped with the necessary financial resources to litigate one of these suits.[84]  Additionally, it is very difficult to prove who actually posts revenge porn because people can easily submit photographs and videos anonymously.[85]  As discussed above, sometimes unknown hackers are the ones who submit these images.  While posters of revenge porn are able to remain anonymous, taking civil action means revenge porn victims likely will have to face more unwanted publicity.[86]

[22]     Moreover, for all of the money spent litigating such a suit, there is little reward.  Most of the time, people who post revenge porn will not be able to pay damages, even if revenge porn victims successfully litigate one of these cases.[87]  Even more concerning, the reality is that once these pictures are posted to a revenge porn website, even if the victim is able to legally force the user or website to take them down, the pictures are likely to spread all over the Internet and could easily pop back up again at any time.[88]  As Nancy Kim states, “[t]here is no combination injury in the offline world because there is no other method of distribution that is as inexpensive, accessible, widespread, and difficult—if not impossible—to retrieve.”[89]  Further, a civil suit may allow the victim to receive damages and could lead to the picture being taken down, but it does little to prevent this type of thing from happening in the future.  Thus, a civil suit is extremely costly, barely fixes the damage caused by revenge porn, and does not discourage people or websites from posting these images in the first place.

B.  Section 230 of the CDA

[23]     Civil remedies also are inadequate for a revenge porn victim because the actual websites posting their explicit photographs are likely protected from liability under § 230 of the CDA.  Section 230 protects website operators from liability stemming from its users’ posts, stating “[n]o provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.”[90]  Section 230 was written as a way to combat novel legal issues arising from the widespread use of the Internet.[91]  While part of the CDA was struck down as unconstitutional, the defenses provided in § 230 endured.[92]

[24]     There are two defenses available for websites under § 230.  The first is one I have briefly touched on, which protects websites from being held liable as publishers of the content posted by their users, as long as the websites did not create it.[93]  The second defense protects providers of interactive computer services from liability on account of “any action voluntarily taken in good faith to restrict access to or availability of material that the provider considers obscene, lewd, harassing, or otherwise objectionable.”[94]  Section 230 of the CDA further states that the law will not have an effect on other federal criminal statutes, but “[n]o cause of action may be brought and no liability may be imposed under any State or local law that is inconsistent with this section.”[95]  Thus, criminal liability for such actions imposed under federal law is not covered by the CDA’s protections, but websites likely are immune from the torts previously discussed above.

[25]     While most of the cases applying § 230 of the CDA have held websites immune from liability, the Ninth Circuit recently held a website liable for the illegality of hosted content because it helped create the content.[96]  In this case, the Fair Housing Councils of San Fernando Valley and San Diego brought action against Roommates.com alleging the website violated the Fair Housing Act and state laws.[97]  The part of the website alleged to offend the Fair Housing Act and state laws was information provided by subscribers in response to questions written by Roommate.com.[98]  Thus, the court held this part of the website was actually developed by Roommate.com: “Roommate becomes much more than a passive transmitter of information provided by others; it becomes the developer, at least in part, of that information.”[99]  This case may be applicable to revenge porn websites.  While many of the websites claim they are shielded from civil liability by § 230, revenge porn victims could use Fair Housing Council to argue these revenge porn websites are more than “passive transmitter[s] of information provided by others” and are actually developers of content not entitled to protection under § 230.[100]

[26]     Section 230 of the CDA likely shields revenge porn websites from civil liability, thus proving another reason civil law is an inadequate solution for victims.  However, with the recent decision by the Ninth Circuit in Fair Housing. Council, courts may be more willing to find revenge porn websites are developers of the content on their sites and not protected by § 230.

C.  Copyright Law Is Not the Best Remedy

[27]     Some victims have opted for sending takedown notices to the websites under copyright law.[101]  If the picture posted was a “selfie,” then the victim owns the copyright and he or she can send takedown notices to the revenge porn websites under the DMCA.[102]  If the website refuses to remove the image, the person can then sue the website for copyright infringement.  Revenge porn websites are not shielded from liability for these copyright infringement claims because § 230 has an exception for copyright infringement which allows victims to hold websites liable for republishing their copyrighted photographs.[103]  However, in order to receive statutory damages for this tort, a victim must register their copyright within ninety days of when it is published.[104]  Although a victim may not receive damages, sending DMCA takedown notices is relatively simple, and may be successful in getting an injunction against websites for posting the images online.[105]

[28]     While sending these takedown notices is less costly because it does not require a lawyer, copyright law suffers from similar inadequacies as tort law.  The reality is, copyright law does not discourage people from engaging in this activity, especially when most of the time the person posting the pictures does not end up having to pay the victim damages.  Once images are posted to one website, they rapidly spread across the Internet.  So, while a victim may be successful at issuing a takedown notice for one website, she may “encounter the ‘whack-a-mole’ problem” where “[a]s soon as copyrighted content is removed from one place, it pops up in another.”[106]  Further, this legal avenue is only available to people who took the sexually explicit photograph or video of themselves.

[29]     Thus, while there are currently existing laws that victims may use to sue the person who posted their picture, get an injunction, and possibly receive damages; these solutions are costly, not very effective, and none of them really get at the heart of the problem.

 

IV.  Current Criminal Laws Available and the Legal Challenges to Criminalizing Revenge Porn

[30]     While some victims have been successful in winning civil suits and some operators of these websites have been charged for federal crimes such as conspiracy and child pornography, there is still a legal grey area concerning whether the act of posting and distributing revenge porn should be a crime.  Federal and state cyberstalking laws might be an option for some revenge porn victims, but they are not ideal.  Also, some states already have laws seemingly broad enough to reach distributors of revenge porn.  However, many judges are reluctant to arbitrarily stretch laws past their plain language—regardless of how lewd or morally reprehensible an action may be.  This is illustrated by Massachusetts’ highest court’s recent holding that “upskirting” is legal as long as the person being photographed is not nude or partially nude.[107]  This understandable unwillingness of judges to broaden statutes beyond their plain language further highlights the need for specific laws targeting revenge porn.  A few states have recently introduced and passed legislation specifically aimed at criminalizing revenge porn.  I will analyze these statutes and also discuss the legal challenges legislators face in drafting these laws.

A.  Federal and State Criminal Laws

[31]     Federal and state cyberstalking laws may seem like the best approach to going after revenge porn distributors.  Typically, cyberstalking requires the defendant to have “engaged in behavior or a pattern of conduct with the intent to alarm, abuse, or frighten the victim.”[108]  The federal telecommunications statute, 47 U.S.C. § 223, that is aimed at cyberstalking, prohibits individuals from using any telecommunications to abuse, threaten, or harass any person without revealing their identity.[109]  Federal cyberstalking law is attractive because it prevents revenge porn websites from hiding behind § 230 of the CDA’s shield of protection.  Most states also have similar statutes prohibiting cyberstalking or cyber harassment.[110]  Cyber harassment generally “involves patterns of online behavior that are intended to inflict substantial emotional distress and would cause a reasonable person to suffer substantial emotional distress.”[111]  While some instances of revenge porn are included in this description, there may be substantial hurdles in proving a “pattern” of online behavior if the person only posted one picture and it may also be difficult to show the person posted it with the intent of causing emotional distress.[112]  Thus, while cyberstalking laws may apply in some situations, a criminal law specifically targeting revenge porn situations is better equipped.

[32]     As of 2013, the act of posting or distributing revenge porn was a crime in only two states: New Jersey and California.[113]  Also, Alaska and Texas currently have laws broad enough to apply to distribution of revenge porn; however, an appeals court declared the Texas law unconstitutional.[114]  Fortunately, this legal issue has quickly captured much attention over the past year. In 2014, twenty-seven states, the District of Columbia, and Puerto Rico had legislation addressing revenge porn either introduced or pending, and twelve states enacted laws criminalizing the act of posting revenge porn: Arizona, Colorado, Delaware, Georgia, Hawaii, Idaho, Maryland, New York, Pennsylvania, Utah, Virginia, and Wisconsin.[115]

[33]     New Jersey’s Title 2C: 14-9 is an invasion of privacy law which was originally directed at people who secretly photograph or videotape another person while they are naked or engaged in sexual activity without their consent.[116]  New Jersey’s law was intended to cover “video voyeurs” and was used to prosecute Rutgers University student Dharun Ravi in 2010.[117]  Ravi was found guilty under Title 2C: 14-9 after he secretly set up a webcam to spy on his roommate, Tyler Clementi and then live streamed the video.[118]  Clementi, who was only eighteen years old, committed suicide after finding out the video had been live streamed.[119]  The New Jersey statute reads:

An actor commits a crime of the third degree if, knowing that he is not licensed or privileged to do so, he discloses any photograph, film, videotape, recording or any other reproduction of the image of another person whose intimate parts are exposed or who is engaged in an act of sexual penetration or sexual contact, unless that person has consented to such disclosure.[120]

Although the law was not drafted with the criminalization of revenge porn in mind, it was written broad enough so that it does apply to most revenge porn situations.

[34]     In the fall of 2013, the California legislature passed SB 255, a revenge porn bill introduced by Senator Cannella.[121]  Governor Jerry Brown signed the bill into law on October 1, 2013 and it went into effect immediately.[122]  The law makes posting revenge porn a misdemeanor punishable by up to six months in jail and a $1,000 fine.[123]  It specifically provides that:

Except as provided in subdivision (l), every person who commits any of the following acts is guilty of disorderly conduct, a misdemeanor: . . . Any person who photographs or records by any means the image of the intimate body part of parts of another identifiable person, under circumstances where the parties agree or understand the image shall remain private, and the person subsequently distributes the image taken, with the intent to cause serious emotional distress, and the depicted person suffers serious emotional distress.[124]

As written, California’s law does not include pictures the victim took of him or herself, often called a “selfie.”[125]  California’s law contains other concerning loopholes, as well.  For instance, it does not cover anyone who might redistribute the photograph or recording after it has already been taken by someone else because it covers only the person who makes the photograph or recording.[126]  So, the law does not penalize people who steal explicit pictures from someone else’s phones or hackers who obtain these photos by hacking into the victim’s computer or phone.[127]  These situations are not out of the ordinary; when it comes to legal possibilities, California’s law likely will leave many revenge porn victims in the same helpless situation they were in before the bill was passed.  However, Senator Canella introduced a new bill, SB 1255, which broadened the law to include selfies as well.[128]

[35]     Idaho also passed House Bill 563 which amends provisions of Idaho’s existing law relating to the crime of video voyeurism to include the act of sharing pictures or videos of an intimate or private nature shared without consent for purposes other than sexual gratification, including revenge, extortion, or humiliation.[129]  Idaho’s video voyeurism law now states:

A person is guilty of video voyeurism when . . . [h]e either intentionally or with reckless disregard disseminates, publishes or sells or conspires to disseminate, publish or sell any image or images of the intimate areas of another person or persons without the consent of such other person or persons and he knows or reasonably should have known that one (1) or both parties agreed or understood that the images should remain private.[130]

House Bill 563 was reported signed by the Governor on March 19, 2014 and went into effect on July 1, 2014.[131]

[36]     Both Alaska and Texas have existing laws written broad enough to cover revenge porn situations.  Alaska’s existing cyber-harassment law is written broad enough to cover revenge porn situations and was used to charge Joshua P. Hoehne with second-degree harassment for downloading pictures from a former roommate’s computer without permission and creating fake social media accounts for a woman and her sister containing nude pictures of them and sexually explicit captions.[132]  Texas’s improper photography or visual recording law may be broad enough to include distributors of revenge porn; however, the Fourth Court of Appeals in San Antonia, Texas held the statute was unconstitutional in an opinion filed August 30, 2013.[133]

[37]     While fourteen states and arguably Alaska have laws currently criminalizing revenge porn, twenty-seven states, the District of Columbia, and Puerto Rico have considered similar legislation over the past few years.[134]  In 2013, Florida, the home state of Holly Jacobs,[135] tried and failed to pass a revenge porn law.[136]  Florida Representative Tom Goodson sponsored House Bill 787, “Computer or Electronic Device Harassment,” which would have made it illegal to post nude pictures of someone online and tag them with their personal information without their consent.[137]  The wording of this bill would only make it illegal to post the nude picture if the person posting it also tagged the victim.  Thus, the bill did not criminalize the act of posting the nude picture, generally.  However, in 2014, Florida Senator David Simmons introduced another revenge porn bill, Senate Bill 532, which does not include this tagging requirement.[138]  The bill unanimously passed the Senate, but unfortunately did not pass the House and died in committee on May 2, 2014.[139]

[38]     In Virginia, Delegate Robert P. Bell introduced House Bill 326 which, in relevant part, provides:

Any person who, with the intent to coerce, harass, or intimidate, maliciously disseminates or sells any videographic or still image created by any means whatsoever that depicts another person who is totally nude, or in a state of undress so as to expose the genitals, pubic area, buttocks, or female breast, where such person knows or has reason to know that he is not licensed or authorized to disseminate or sell such videographic or still image is guilty of a Class 1 misdemeanor.  However, if a person uses services of an Internet service provider, an electronic mail service provider, or any other information service, system, or access software provider that provides or enables computer access by multiple users to a computer server in committing acts prohibited under this section, such provider shall not be held responsible for violating this section for content provided by another person.[140]

House Bill 326 passed both the Senate and the House, was signed into law by Governor Terry McAuliffe on March 31, 2014, and became effective on July 1, 2014.[141]  Other states that have proposed similar legislation in 2014 include Alabama, Arizona, Colorado, Connecticut, Delaware, Georgia, Hawaii, Illinois, Kentucky, Maryland, Massachusetts, Missouri, New Mexico, New York, Pennsylvania, Rhode Island, South Carolina, Tennessee, Utah, Vermont, Washington, and Wisconsin.[142]

B.  Challenges for Getting Criminal Revenge Porn Laws Passed

[39]     Revenge porn advocates and legislators face many challenges in getting criminal revenge porn laws passed.  First, it is important these laws are not written too broadly, so they do not violate individuals’ right to free speech under the First Amendment.  On the other hand, it is difficult to write a law broad enough to encompass the majority of revenge porn victims that does not impose unnecessary hurdles regarding the burden of proof.

[40]     Many of the state laws and introduced legislation criminalizing revenge porn have been criticized for being written too broadly and abridging free speech in violation of the First Amendment.[143]  There was some opposition to California’s anti-revenge porn law by the Electronic Frontier Foundation (“EFF”) and the American Civil Liberties Union (“ACLU”) when the law was in its early stages.[144]  As an attorney for the EFF stated, “[f]requently, almost inevitably, statutes that try to do this type of thing overreach . . . [t]he concern is that they’re going to shrink the universe of speech that’s available online.”[145]  However, Mary Anne Franks argues that a carefully crafted revenge porn statute with certain exceptions for lawful activity does not offend the First Amendment.[146]  Further, she notes that laws criminalizing cyber-stalking have not been found to violate the First Amendment, so a well-written law criminalizing revenge porn should not cause problems either.[147]

[41]     Certain types of speech are not protected by the First Amendment and some speech can be regulated without violating the Constitution because it has the tendency to bring about serious harm which outweighs the right to freedom of speech.[148]  The constitutionality of revenge porn laws might be a moot point as some may argue that revenge porn is obscene and should not even qualify as protected speech within the scope of the First Amendment.  In Miller v. California, the guiding case on obscenity, the Court laid out the following test for determining whether material is obscene:

(a) whether “the average person, applying contemporary community standards” would find that the work, taken as a whole, appeals to the prurient interest . . . (b) whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law; and (c) whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value.[149]

The application of this test in cases involving modern Internet pornography has proven difficult and controversial because it is unclear how courts should identify contemporary community standards.[150]  “Critics debate whether the courts should apply a national standard, a statewide standard, a standard based on smaller community units, an ‘average adult’ standard, or in Internet cases, a cyber-community standard.”[151]  Regardless of the difficulty in applying the Miller test in the age of Internet pornography, revenge porn could arguably qualify as obscenity.  Distributing sexually explicit pictures or videos of a person without their consent is “patently offensive” and many would argue revenge porn “lacks serious literary, artistic, political, or scientific value.”[152]  Thus, revenge porn may be considered obscene unprotected speech.

[42]     Even if revenge porn is not categorized as obscene, it may be considered “indecent” speech that is subject to a slightly lower scrutiny when being analyzed for constitutionality.[153]  In FCC v. Pacifica, the Court held that the content of Pacifica’s radio broadcast was “‘vulgar,’ ‘offensive,’ and ‘shocking’” and noted that “content of that character is not entitled to absolute constitutional protection under all circumstances.”[154]  The Court held the FCC was able to regulate the broadcast for largely two reasons: (1) the indecent material was invading individuals in the privacy of their own home “where the individual’s right to be left alone plainly outweighs the First Amendment rights of an intruder”; and (2) the broadcasting was easily accessible to children.[155]  A similar argument may be made for revenge porn, as these websites are easily accessible to children.  Although it might be difficult to argue these websites are confronting individuals in the privacy of their own home, they are seriously invading the privacy of those whose pictures are being distributed without their consent.

[43]     On the other end of the spectrum, some scholars have criticized California’s law and the proposed law in Florida for being too narrow.  As noted above, in its current form, California’s law does not cover “selfies” and there must be proof the person distributed the picture with the intent to cause serious emotional distress.[156]  Many argue the law takes it too far by requiring the prosecution to prove the defendant intended to inflict serious emotional distress.  Moreover, as previously discussed above, the California law does not reach third parties who did not take the explicit photograph or video themselves, but were still the ones to distribute it on the Internet.[157]  Further, Florida’s proposed legislation would have continued to permit people to post nude photographs without the depicted person’s consent as long as she was not tagged with personal identifying information.[158]  It has proven difficult for many states to strike the right balance between proper protection for the victims of revenge porn and a law that does not improperly restrict free speech.

 

V.  A Federal Law Criminalizing Revenge Porn is Necessary

[44]     The best way to attack revenge porn and prevent people from posting and distributing revenge porn is with a federal law criminalizing the act.[159]  Clearly, the existing civil remedies and criminal laws are inefficient.  Although it seems many states will continue to propose legislation criminalizing this activity, the most effectual way to put a stop to revenge porn would be for Congress to pass a uniform prohibition.  A federal criminal statute would ensure that victims in states that fail to pass such legislation are protected.[160]  Moreover, many revenge porn victims have trouble convincing law enforcement to help them, and a federal criminal law would make sure authorities understand this behavior is against the law and deserves attention.[161]  Additionally, a federal statute criminalizing revenge porn would prevent revenge porn websites from hiding behind the shield of liability provided by § 230 of the CDA.

[45]     Moreover, like most Internet activities, revenge porn often crosses jurisdictional boundaries and involves interstate or international communications.[162]  As Kevin V. Ryan and Mark L. Krotoski state, “The Internet provides the means to communicate with or access computers around the world in real-time, twenty-four hours a day seven days a week.  Taking advantage of the global reach of the Internet, perpetrators may be many time zones away in another jurisdiction or country.”[163]  Thus, although state criminal laws may help in addressing revenge porn, because this activity often involves interstate and international communications and crosses jurisdictional boundaries, a federal law is necessary and would be a more effective solution.

[46]     As discussed above, states have taken different approaches to the criminalization of revenge porn; some passing laws that are too narrow and others passing laws that are too broad.  A carefully crafted, uniform federal law should remedy this issue.  First, the law would need to be broad enough to cover both explicit pictures taken by another person and explicit “selfies.”  This federal law should not make the same mistake as California in leaving out pictures a victim took of him or herself.  Many revenge porn victims did take the pictures or videos of themselves, but did not consent to having them posted on the Internet for the world to access.  Thus, this federal law should prohibit a person from knowingly posting and distributing an explicit photograph or video on the Internet without the depicted person’s consent.  The intent requirement does not need to include intent to cause serious emotional distress, as long as the language clearly states the distributor knew or had reason to know the explicit images were meant to remain private.  There is no need for the federal statute to include proof of a pattern of harassing behavior.  However, in order to circumvent constitutional issues, the law likely should include a requirement of proof the victim suffered some emotional harm.

[47]     In March 2014, California Representative Jackie Speier announced she was preparing to introduce federal legislation criminalizing the distribution of revenge porn.[164]  Franks, who is helping Speier draft the legislation, has stated that the bill would look similar to this model statute:

Whoever knowingly discloses through the mails, or using any means of facility of interstate or foreign commerce or in or affecting interstate or foreign commerce by any means, including a computer, an image of another, identifiable person whose intimate parts are exposed or who is engaged in a sexual at, when the actor knows or should have known that the depicted person has not consented to such disclosure, shall be fined under this title or imprisoned not more than two years, or both.[165]

Representative Speier’s announcement of her plan to introduce this legislation is a step in the right direction.

[48]     A federal criminal ban on the distribution of revenge porn likely would serve as a deterrent and discourage people from posting these pictures in the first place.  If a person knows he could potentially face jail time or a heavy fine, he likely would not be as quick to engage in such an activity.  Further, being indicted on federal criminal charges rather than being sued by one individual likely will carry more weight and be taken more seriously by people engaging in this vindictive behavior.  Also, a federal law criminalizing this activity means victims are represented by the government.  Thus, victims would not have to pay to litigate these lawsuits and would not have to face as much publicity as they would when bringing a civil suit. More importantly, a federal criminal ban on revenge porn would trump § 230 of the CDA, allowing victims to go after the big fish, the revenge porn websites.  Thus, such a law would also discourage people from operating revenge porn websites, period; thus, truly getting at the heart of the problem.

 

VI.  Conclusion

[49]     As technology and pornography continue to mature and push the limits, both consistently present judges, legislators, and legal advocates with difficult legal questions.  The rapid growth of technology and pornography’s recent creation, revenge porn, has brought detrimental effects for many and highlighted a great need for legal action.  Although many states have begun to recognize the seriousness of this issue, and even though there are some existing civil laws that potentially address revenge porn, the most effective way to stop websites and users from posting revenge porn is for Congress to enact a federal criminal law.  A carefully crafted federal law would protect victims, deter violators, and allow victims to go after the actual revenge porn websites themselves, without offending the First Amendment.

 


[1] See Jonathan Coopersmith, Pornography, Technology and Progress, 4 ICON 94 (1998), available at http://berlin.robinperrey.com/imgpo/pornography-technology-and-progress.pdf.

[2] See id.

[3] See Christopher Bonanos, Before Sexting, There Was Polaroid, Atlantic (Oct. 1, 2012, 12:38 PM), http://www.theatlantic.com/technology/archive/2012/10/before-sexting-there-was-polaroid/263082/

[4] Coopersmith, supra note 1, at 102 (“Film did not die—7852 new pornographic films appeared in 1996 compared with 471 Hollywood films—but consumption had moved from adult theatres and sex stores to the more private environments provided by cable TV and the VCR.”).

[5] Peter Johnson, Pornography Drives Technology: Why Not to Censor the Internet, 49 Fed. Comm. L.J. 217, 222 (1996) (emphasis added).

[6] Coopersmith, supra note 1, at 104.

[7] Id.  “The Internet offers nearly free access to pornography uninhibited by previous barriers of time and space.”  Id. at 110.

[8] Id. at 110-11.

[9] See Katie Gant, Note, Crying Over the Cache: Why Technology Has Compromised the Uniform Application of Child Pornography Laws, 81 Fordham L. Rev. 319, 326 (2012) (noting that “[w]ith the advent of [I]nternet technology, child pornography became a new monster”); Nicole A. Poltash, Note, Snapchat and Sexting: A Snapshot of Baring Your Bare Essentials, 19 Rich. J.L. & Tech. 14, ¶ 5 (2013), http://jolt.richmond.edu/v19i4/article14.pdf.

[10] See Coopersmith, supra note 1, at 106 (“In an example of the true democratisation of technology, the development of the Polaroid instant camera and the camcorder allowed people to produce their own pornography free from anyone else seeing their work.”).

[11] More on Sexting and Texting from SIA 3, UptoDate (Feb. 5, 2013), http://blog.match.com/2013/02/05/more-on-sexting-and-texting-from-sia-3/.

[12] See Michelle Dean, The Case for Making Revenge Porn a Federal Crime, Gawker (Mar. 27, 2014, 2:45 PM), http://gawker.com/the-case-for-making-revenge-porn-a-federal-crime-1552861507; State ‘Revenge Porn’ Legislation, Nat’l Conf. St. Legis., http://www.ncsl.org/research/telecommunications-and-information-technology/state-revenge-porn-legislation.aspx (last visited Oct. 15, 2014).  Alaska and Texas also have statutes already on the books that may be broad enough to cover revenge porn situations.  See Dean, supra.  This will be discussed further below.

[13] Id. (noting that bills had been introduced or are pending in at least twenty seven states, the District of Columbia, and Puerto Rico in 2014).

[14] See Doe v. Hofstetter, No. 11-CV-02209-DME-MJW, 2012 U.S. Dist. LEXIS 82320 (D. Colo. June 13, 2012) (holding that defendant was guilty of intentional infliction of emotional distress, defamation, and public disclosure of private fact after he posted ex-girlfriend’s nude photographs on twenty-three adult websites with her contact information); Lorelei Laird, Victims Are Taking on ‘Revenge Porn’ Websites for Posting Photos They Didn’t Consent to, ABA J. (Nov. 1, 2013, 4:30 AM), http://www.abajournal.com/mobile/mag_article/victims_are_taking_on_revenge_porn_websites_for_posting_photos_they_didnt_c/ (noting that victims of revenge porn own the copyright of their photos were self-portraits and can send takedown notices under the Digital Millennium Copyright Act).

[15] See, e.g., Mary Anne Franks, Sexual Harassment 2.0, 71 Md. L. Rev. 655, 687-88 (2012); Danielle Citron, Revenge Porn and the Uphill Battle to Pierce Section 230 Immunity (Part II), Concurring Opinions (Jan. 25, 2013), http://www.concurringopinions.com/archives/2013/01/revenge-porn-and-the-uphill-battle-to-pierce-section-230-immunity-part-ii.html.

[16] See, e.g., Revenge Porn, Urban Dictionary, http://www.urbandictionary.com/define.php?term=revenge%20porn (last visited June. 8, 2014).

[17] Alexa Tsoulis-Reay, A Brief History of Revenge Porn, N.Y. Mag. (July 21, 2013), http://nymag.com/news/features/sex/revenge-porn-2013-7/.

[18] Id.

[19] Id.

[20] Jonathan Barrett & Luke Strongman, The Internet, the Law, and Privacy in New Zealand: Dignity with Liberty?, 6 Int’l J. of Comm. 127, 136 (2012).

[21] See Tsoulis-Reay, supra note 17.

[22] See, e.g., Laird, supra note 14.

[23] Danielle Keats Citron & Mary Anne Franks, Criminalizing Revenge Porn, 49 Wake Forest L. Rev. 345, 350-51 (2014) (citation omitted).

[24] Is Anyone Up?, Wikipedia, http://en.wikipedia.org/wiki/Is_Anyone_Up%3F (last visited June 8, 2014).

[25] Matt Markovich, Revenge Porn Websites Taking Advantage of Weak Privacy Laws, KOMO News (Nov. 21, 2013, 11:53PM), http://www.komonews.com/news/local/Privacy-Laws-Weak-at-Protecting-Nude-Photos-on-Revenge-Porn-Websites-232935541.html.

[26] Laird, supra note 14 (noting that even revenge porn sites “have been accused of hacking victims’ computers or fishing for photos with false personal ads”).

[27] Communications Decency Act of 1996, 47 U.S.C. §§ 230, 560, 561 (1996).

[28] Cheryl B. Preston, What Ifs and Other Alternative Intellectual Property and Cyberlaw Story: The Internet and Pornography: What If Congress and the Supreme Court Had Been Comprised of Techies in 1995-1997?, 2008 Mich. St. L. Rev. 61, 62 (2008).

[29] Reno v. ACLU (Reno I), 521 U.S. 844 (1997) (holding that §§ 223(a) and 223(d) were overbroad and abridged the freedom of speech protected by the First Amendment).

[30] See Preston, supra note 28, at 64.

[31] See id. at 74.

[32] Jonathan Coopersmith, Does Your Mother Know What You Really Do?  The Changing Nature and Image of Computer-Based Pornography, 22 Hist. & Tech. 1, 2 (2006).

[33] Shannon Creasy, Note and Comment, Defending Against a Charge of Obscenity in the Internet Age: How Google Searches Can Illuminate Miller’s “Contemporary Community Standards”, 26 Ga. St. U.L. Rev. 1029, 1031 (2010).

[34] See id.

[35] See Preston, supra note 28, at 83 (reporting that in one month during 2005, over seventy-one million people—forty-two percent of the Internet audience—viewed Internet pornography).

[36] See Preston, supra note 28, at 85.

[37] See Preston, supra note 28, at 85.

[38] See Alex Saltarin, US Leads Smartphone Porn-watching Countries List, Tech Times (Dec.24, 2013, 11:21 AM), http://www.techtimes.com/articles/2229/20131224/us-leads-smartphone-porn-watching-countries-list.htm.

[39] See id.

[40] See Lauren Effron, The Appeal of Amateur Porn, ABC News (Oct. 14, 2011, 3:37 PM), http://abcnews.go.com/blogs/health/2011/10/14/the-appeal-of-amateur-porn/.

[41] Id.

[42] Obviously, there are other factors that aided in the rise of revenge porn such as the actual spitefulness of the jilted ex-lovers that decide to post the images, but this comment will not go into this aspect of the trend.

[43] See Patt Morrison, ‘Revenge Porn’ May Soon Be a Crime in California, L.A. Times (Aug. 26, 2013, 11:46 AM), http://www.latimes.com/opinion/opinion-la/la-ol-revenge-porn-should-it-be-a-crime-20130826,0,2875247.story.

[44] See id.

[45] See id.

[46] Natalie Webb, Revenge Porn by the Numbers, End Revenge Porn (Jan. 3, 2014),http://www.endrevengeporn.org/revenge-porn-infographic/.

[47] See Citron & Franks, supra note 23, at 351.

[48] See id..

[49] See id..

[50] Mary Anne Franks, Criminalizing Revenge Porn: A Quick Guide, End Revenge Porn, http://www.endrevengeporn.org/guide-to-legislation/ (last visited Apr. 26, 2014).

[51] See Citron & Franks, supra note 23, at 352.

[52] See, e.g., Jessica Roy, The Battle Over Revenge Porn: Can Hunter Moore, the Web’s Vilest Entrepreneur, Be Stopped?, BetaBeat (Dec. 4, 2012, 7:46 PM), http://betabeat.com/2012/12/the-battle-over-revenge-porn-can-hunter-moore-the-webs-vilest-entrepreneur-be-stopped/.

[53] See id.

[54] See id.

[55] See id.

[56] See id.

[57] See Memphis Barker, “Revenge Porn” Is No Longer a Niche Activity Which Victimises Only Celebrities—The Law Must Intervene, Indep. (May 19, 2013), http://www.independent.co.uk/voices/comment/revenge-porn-is-no-longer-a-niche-activity-which-victimises-only-celebrities–the-law-must-intervene-8622574.html.

[58] Kashmir Hill, Revenge Porn with a Facebook Twist, Forbes (July 6, 2011, 4:54 PM), http://www.forbes.com/sites/kashmirhill/2011/07/06/revenge-porn-with-a-facebook-twist/.

[59] See id.

[60] See Adrian Chen, Internet’s Sleaziest Pornographer Calls It Quits: ‘I’m Done with Looking at Little Kids Naked All Day’, Gawker (Apr. 19, 2012, 4:50 PM), http://gawker.com/5903486/internets-sleaziest-pornographer-calls-it-quits-im-done-with-looking-at-little-kids-naked-all-day/all.  In a phone interview, Moore talked about how the influx of child pornography submissions became too much with which for him to deal.  See also Drew Guarini, Hunter Moore, Is Anyone Up Founder, Says New Website Will Be ‘Scariest on the Internet’, Huffington Post (Aug. 24, 2012, 12:26 PM), http://www.huffingtonpost.com/2012/08/23/hated-internet-star-hunte_n_1826061.html.

[61] See Roy, supra note 52.

[62] See Abby Rogers, The Guy Behind Two “Revenge Porn” Sites Says the Government Protects His Work, Bus. Insider (Nov. 29, 2012, 4:43 PM), http://www.businessinsider.com/isanyoneupcom-naked-pictures-are-back-2012-11.

[63] See Roy, supra note 52.

[64] See Rogers, supra note 62.

[65] See Jessica Roy, Revenge-Porn King Hunter Moore Indicted on Federal Charges, Time (Jan. 23, 2014), http://time.com/1703/revenge-porn-king-hunter-moore-indicted-by-fbi/.

[66] See id.

[67] See id.

[68] See Kashmir Hill, How Revenge Porn King Hunter Moore Was Taken Down, Forbes (Jan. 24, 2014, 11:17 AM), http://www.forbes.com/sites/kashmirhill/2014/01/24/how-revenge-porn-king-hunter-moore-was-taken-down/.

[69] See The Associated Press, California: Man Is Charged in ‘Revenge Porn’ Case, N.Y. Times (Dec. 10, 2013), http://www.nytimes.com/2013/12/11/us/california-man-is-charged-in-revenge-porn-case.html?_r=0.

[70] See id.; “Revenge Porn” Website Gets Calif. Man Charged with Extortion, CBS News (Dec. 11, 2013, 4:49 PM), http://www.cbsnews.com/news/calif-man-charged-with-extortion-through-revenge-porn-website/.

[71] See Don Thompson, Court Date Set for Kevin Bollaert in Revenge Porn Website Case, Huffington Post (Dec. 12, 2013, 2:15 AM), http://www.huffingtonpost.com/2013/12/12/kevin-bollaert-revenge-porn_n_4432097.html.

[72] See id.

[73] Joe Silver, “Revenge Porn” Site Creators Hit With $385,000 Judgment, Ars Technica (Mar.19, 2014, 1:48 PM), http://arstechnica.com/tech-policy/2014/03/revenge-porn-site-creators-hit-with-385000-judgment/.

[74] Citron and Franks also give a detailed analysis of the insufficiency of civil actions in addressing revenge porn.  See Citron & Franks, supra note 23, at 357–61.

[75] See Sarah Jeong, Revenge Porn Is Bad.  Criminalizing It Is Worse, Wired (Oct. 28, 2013, 9:30 AM), http://www.wired.com/2013/10/why-criminalizing-revenge-porn-is-a-bad-idea/; Laird, supra note 14.

[76] See Jeong, supra note 75.

[77] See 47 U.S.C. § 230 (2006); Dean, supra note 12.

[78] See Digital Millennium Copyright Act, 17 U.S.C. § 512 (2012).

[79] See Doe v. Hofstetter, No. 11-CV-02209-DME-MJW, 2012 U.S. Dist. LEXIS 82320 (D. Colo. June 13, 2012).

[80] See, e.g., Daniel Zharkovsky, “If Man Will Strike, Strike Through the Mask”: Striking Through Section 230 Defenses Using the Tort of Intentional Infliction of Emotional Distress, 44 Colum. J. L. & Soc. Probs. 193, 227 (2010).

[81] See id. at 228.

[82] See Nancy S. Kim, Web Site Proprietorship and Online Harassment, 2009 Utah L. Rev. 993, 1006 (2009).

[83] See id. at 1007 (citing Restatement (Second) of Torts §§ 558–59 (1977)).

[84] See id. at 1008-09.

[85] See id. at 1010.

[86] See Citron & Franks, supra note 23, at 358.

[87] See Kim, supra note 82, at 1008.  “On the Internet, however, widespread distribution is available to those without substantial financial resources.  Consequently, even where a plaintiff prevails in a civil action against an online harasser, the odds are high that the plaintiff will not be able to recover significant damages.”  Id.

[88] See Derek E. Bambauer, Exposed 98 Minn. L. Rev. (forthcoming 2014) (manuscript at 4-5) (on file with Univ. of Ariz. James E. Rogers College of Law, Discussion Paper No. 13-39), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2315583.

[89] See Kim, supra note 82, at 1010.

[90] See 47 U.S.C. §230(c)(1) (2006).

[91] See Zharkovsky, supra note 80, at 198. “One such problem concerned whether a proprietor of an online message board could be liable for defamatory statements posted on the board, even though the statements were made by an independent third party.”  Id. at 197.

[92] See id. at 198-99.

[93] 47 U.S.C. § 230(c)(1).

[94] 47 U.S.C. § 230(c)(2)(A).

[95] 47 U.S.C. § 230(e)(1)-(3) (emphasis added).

[96] See Fair Hous. Council v. Roommates.com, LLC, 521 F.3d 1157, 1174-75 (9th Cir. 2008) (en banc).

[97] See id. at 1162.

[98] See id. at 1164.

[99] See id. at 1166.

[100] See id.

[101] See Laird, supra note 14.

[102] See 17 U.S.C. § 512; Laird, supra note 14.

[103] 47 U.S.C. § 230(e)(2).

[104] See Laird, supra note 14.

[105] See id.

[106] Amanda Levendowski, Our Best Weapon Against Revenge Porn: Copyright Law?, Atlantic (Feb. 4, 2014, 1:03PM), http://www.theatlantic.com/technology/archive/2014/02/our-best-weapon-against-revenge-porn-copyright-law/283564/.

[107] See Haimy Assefa, Massachusetts Court Says ‘Upskirt’ Photos Are Legal, CNN (Mar. 6, 2014, 7:33 AM), http://www.cnn.com/2014/03/05/us/massachusetts-upskirt-photography/.  The Massachusetts court held it was legal to secretly photographs underneath a person’s clothing when the person is not nude or partially nude.  See id.  The court ruled,

In sum, we interpret the phrase, “a person who is . . . partially nude,” in the same way that the defendant does, namely, to mean a person who is partially clothed but who has one or more of the private parts of body exposed in plain view at the time that the putative defendant secretly photographs her.

Commonwealth v. Robertson, 5 N.E.3d 522, 528 (Mass. 2014).

[108] See Kim, supra note 81, at 1008.

[109] See 47 U.S.C. § 223 (2006).

[110] State Cyberstalking and Cyberharassment Laws, Nat’l Conf. St. Legis. (Dec. 5, 2013), http://www.ncsl.org/research/telecommunications-and-information-technology/cyberstalking-and-cyberharassment-laws.aspx.

[111] David Gray et. al., Fighting Cybercrime After United States v. Jones, 103 J. Crim. L. & Criminology 745, 748 (2013).

[112] See Franks, supra note 50.

[113] State ‘Revenge Porn’ Legislation, supra note 12.

[114] See id.; Dean, supra note 12.

[115] See generally State ‘Revenge Porn’ Legislation, supra note 12.

[116] N.J. Stat. Ann. § 2C:14-9 (West 2014).

[117] See Suzanne Choney, ‘Revenge Porn’ Law in California Could Pave Way for Rest of Nation, NBC News (Sept. 3, 2013, 4:34 PM), http://www.nbcnews.com/tech/internet/revenge-porn-law-california-could-pave-way-rest-nation-f8C11022538.

[118] See id.

[119] See id.

[120] N.J. Stat. Ann. § 2C:14-9(c).

[121] S. 255, 2013-2014 Reg. Sess. (Cal. 2013) (enacted as Cal. Penal Code § 647(j)(4)(A)).

[122] See Jerry Brown Signs Anti-Revenge Porn Bill, Huffington Post (Oct. 2, 2013, 10:18 AM), http://www.huffingtonpost.com/2013/10/02/jerry-brown-revenge-porn_n_4030175.html.

[123] See id.

[124] § 647(j)(4)(A).

[125] See id.

[126] See § 647(j)(4)(A); Eric Goldman, California’s New Law Shows It’s Not Easy To Regulate Revenge Porn, Forbes (Oct. 8, 2013, 12:03 PM), http://www.forbes.com/sites/ericgoldman/2013/10/08/californias-new-law-shows-its-not-easy-to-regulate-revenge-porn/.

[127] See § 647(j)(4)(A); Goldman supra note 125.

[128] See S. 1255, 2013-2014 Reg. Sess. (Cal. 2014).

[129] H.R. 563, 2014 2d Reg. Sess. (Id. 2014), available at http://www.legislature.idaho.gov/legislation/2014/H0563.htm.

[130] Id.

[131] See id.

[132] Alaska Stat. § 11.61.120 (2013); Jerzy Shedlock, Anchorage Man Charged with Harassment After Creating Fake Facebook Accounts, Alaska Dispatch (Jan. 4, 2014), http://www.alaskadispatch.com/article/20140104/anchorage-man-charged-harassment-after-creating-fake-facebook-accounts.

[133] Tex. Penal Code Ann. § 21.15(b)(1) (West 2011); ex parte Thompson, 414 S.W.3d 872, 874 (Tex. App. 2013)  (holding section 21.15(b)(1) of the Texas Penal Code unconstitutional for restricting protected speech by regulating an individual’s right to photograph and to have certain thoughts).

[134] See supra text accompanying notes 112-114.

[135] See generally supra note 43 and accompanying text.

[136] See H.R. 787, 2013 Leg., Reg. Sess. (Fl. 2013), available at http://www.myfloridahouse.gov/Sections/Bills/billsdetail.aspx?BillId=50026.

[137] See id.

[138] See S. 532, 2014 Leg., Reg. Sess. (Fl. 2014), available at http://www.flsenate.gov/Session/Bill/2014/0532.

[139] See id.

[140] H.R. 326, 2014 Leg. Reg. Sess. (Va. 2014), available at http://lis.virginia.gov/cgi-bin/legp604.exe?141+sum+HB326.

[141] See id.

[142] See State ‘Revenge Porn’ Legislation, supra note 12.

[143] See Laird, supra note 14.

[144] See id.

[145] Steven Nelson, Federal ‘Revenge Porn’ Bill Will Seek to Shrivel Booming Internet Fad, US News (Mar. 26, 2014), http://www.usnews.com/news/articles/2014/03/26/federal-revenge-porn-bill-will-seek-to-shrivel-booming-internet-fad; Dean, supra note 12.

[146] See Franks, supra note 50, at 2.

[147] See Dean, supra note 12.

[148] See FCC v. Pacifica Found., 438 U.S. 726 (1978) (holding the Federal Communications Commission could regulate “indecent speech” on the radio during hours when children are likely listening); Cohen v. California, 403 U.S. 15, 19 (1971).  “[T]he First and Fourteenth Amendments have never been thought to give absolute protection to every individual to speak whenever or wherever he pleases or to use any form of address in any circumstances that he chooses.”  Id.

[149] Miller v. California, 413 U.S. 15, 24 (1973) (citation omitted).

[150] See Creasy, supra note 33 at 1033.

[151] See Creasy, supra note 33 at 1040.

[152] Miller, 413 U.S. at 24; Citron & Franks, supra note 23, at 35.

[153] Pacifica, 438 U.S. at 732.

[154] Id. at 747.

[155] Id. at 748; see also Rowan v. Post Office Dept., 397 U.S. 728 (1970).

[156] See Mark Melnicoe, California Crackdown on ‘Revenge Porn’ in Brown’s Hands, Bloomberg (Sep. 11, 2013, 2:55 PM), http://www.bloomberg.com/news/2013-09-11/california-crackdown-on-revenge-porn-in-brown-s-hands.html.

[157] See supra note 120-127 and accompanying text.

[158] See H.R. 787, 2013 Leg., Reg. Sess. (Fl. 2013).

[159] Citron and Franks also conclude that the criminalization of revenge porn is necessary; however, I am arguing specifically for a federal law criminalizing revenge porn.  See Citron & Franks, supra note 23, at 390.

[160] See Dean, supra note 12.

[161] See id.

[162] See Robert L. Ullmann and David L. Ferrera, Crime on the Internet, 42 B.B.J. 4, 4 (1998) (stating most Internet crime involves interstate or international communications); Anne E. Hawley, Taking Spam Out of Your Cyberspace Diet: Common Law Applied to Bulk Unsolicited Advertising Via Electronic Mail, 66 UMKC L. Rev. 381, 385 (1997) (discussing the inadequacy of state legislation in controlling spamming problems because Internet activities cross jurisdictional boundaries).

[163] Kevin V. Ryan & Mark L. Krotoski, Symposium, Big Brother in the 21st Century?: Reforming the Electronic Communications Privacy Act: Caution Advised: Avoid Undermining the Legitimate Needs of Law Enforcement to Solve Crimes Involving the Internet in Amending the Electronic Communications Act, 47 U.S. F. L. Rev. 291, 291–92 (2012).

[164] See Nelson, supra note 137.

[165] See Franks, supra note 50, at 4.

Blog: Twitter Fights for Its First Amendment Right

By: Andrea Mousouris, Associate Articles Editor

Whether we realize it or not, our online activity is being watched. And whether we like it or not, Twitter, among other tech giants, shares our personal data with the U.S. government. Should consumers be aware of what and how much the government asks for? Twitter thinks so.

Twitter is suing the U.S. government in an effort to relax federal restrictions on what the tech company can say publicly about the national security related requests.[1] Defending principles of free speech, Twitter believes the government is violating its First Amendment right by criminalizing the disclosure of the number and type of spying orders it receives.[2]

Consumer technology companies often hold data on suspects that agencies like the National Security Agency are tracking.[3] Many of these agencies routinely request user data from these companies as part of continuing investigations.[4] But for years, technology companies have been limited by the law as to how much they can publicly disclose to their users about these government requests.[5] That has put companies like Twitter, Facebook, and LinkedIn in the difficult position of not being able to let their users know when they hand over their data.

The legality of government spying itself is not at issue in this case; the suit is a dispute about disclosure. Other Internet companies have also protested these restrictions, and in January 2013 the U.S. Department of Justice gave permission to Facebook, Google, LinkedIn, Microsoft and Yahoo to publish the information in bands of 1,000, starting with 0-999.[6] But Twitter’s data requests are much smaller, and so they want the right to tell its users that their accounts do not undergo widespread government surveillance.

On the one side, Twitter’s complaint challenges the basis for adopting a “preapproved disclosure format”, one that constitutes “an unconstitutional prior restraint and content-based restriction on, and government viewpoint discrimination against, Twitter’s right to speak about information of national and global public concern.”[7] On the other side, the government argues that in the FBI and National Security Agency’s pursuit of defending the country from real security threats, the more that the world knows about their sources and methods, the greater the security risk.[8] The court will have to decide whether such a risk meets the level of legal scrutiny required to restrict a First Amendment right.

In the mean time, Twitter continues to hope for comprehensive reform from Congress of government surveillance powers.[9] The USA Freedom Act of 2014, introduced by Senate Judiciary Committee Chairman Patrick Leahy (D-VT), would allow companies like Twitter to provide more transparency to its users.[10] But until then, the suit will continue as part of a long battle between the U.S. government and the technology companies that hold information on billions of people.

 

[1] Eric Brader, Twitter Sues U.S. Government Over National Security Data, CNN.COM, http://www.cnn.com/2014/10/07/politics/twitter-sues-u-s-government/ (last updated Oct. 7, 2014).

[2] Id.

[3] Id.

[4] Id.

[5] Mike Isacc, Twitter Sues U.S. Government Over Data Disclosure Rules, NEW YORK TIMES.COM, http://bits.blogs.nytimes.com/2014/10/07/twitter-sues-u-s-government-over-data-disclosure-rules/ (last updated Oct. 7, 2014).

[6] Supra Note 1.

[7] Complaint at 47, Twitter Inc. v. The U.S. Government, (N.D. Cal. 2014)(No. 14-cv-4480).

[8] Supra Note 5.

[9] Ben Lee, Taking the Fight for #transparency to Court, Twitter Blog, https://blog.twitter.com/2014/taking-the-fight-for-transparency-to-court (Oct. 7. 2014).

[10] Id.

Page 1 of 6

Powered by WordPress & Theme by Anders Norén