I’ll be heading to Oxford University this week to participate in an Oxford Internet Institute (OII) forum on the subject of “Child Protection, Free Speech and the Internet: Mapping the Territory and Limitations of Common Ground.” It’s being led by several experts from the OII as well as my good friends John Morris and Leslie Harris of the Center for Democracy & Technology (CDT). The aims of this forum are:
- To facilitate a dialogue between NGOs campaigning to protect respectively, child protection and children’s rights online, and freedom of speech and other civil liberties online.
- To promote a better understanding of each others’ positions, to share perspectives and information with a view to identifying areas of common ground and areas of disagreement.
- To identify any shared policy goals, and possible tools to support the achievement of those goals.
- To publicize the findings of the forum in international policy debates about Internet governance and regulation.
Conference participants were asked to submit a 2-3 pg summary of their views on a couple of questions that will be discussed at this event. I have listed those questions, and my answers, down below the fold. It’s my best attempt to date to succinctly outline my views about how to balance content concerns and free speech issues going forward. Continue reading →
A terrific Radio Berkman podcast this week on “Adventures in Anonymity” featuring Sam Bayard, a fellow at the Harvard Berkman Center and the Assistant Director of the Berkman Center’s Citizen Media Law Project. Along with host Daniel Dennis Jones, Bayard discusses the intersection of anonymity, free speech, defamation law, privacy, and more. In addition to sorting through the sticky legal and ethical issues, their discussion includes some really excellent historical perspectives on anonymous speech. They also get into the recent “skank” blogger case and the AutoAdmit case. I discussed those cases and some of these issues more generally in these essays:
In a post earlier this week, I discussed Randy Cohen’s “guideline” for anonymous blogging. Specifically, Cohen argued in a recent New York Times piece that, “The effects of anonymous posting have become so baleful that it should be forsworn unless there is a reasonable fear of retribution. By posting openly, we support the conditions in which honest conversation can flourish.” While sympathetic to that guideline, I noted I agreed with it as an ethical principle, not a legal matter. In others words, what might make sense as a “best practice” for the Internet and its users would not make sense as a regulatory standard. I prefer using social norms and public pressure to drive these standards, not regulation that could have an unintended chilling effect on beneficial forms of anonymous online speech.
Dan Gillmor of the Center for Citizen Media of the Harvard Berkman Center has a new column up at the UK Guardian in which he takes a slightly different cut at a new standard or social norm for dealing with some of the more caustic anonymous speech out there:
One of the norms we’d be wise to establish is this: People who don’t stand behind their words deserve, in almost every case, no respect for what they say. In many cases, anonymity is a hiding place that harbours cowardice, not honour. The more we can encourage people to use their real names, the better. But if we try to force this, we’ll create more trouble than we fix. But we don’t want, in the end, to turn everything over to the lawyers. The rest of us — the audience, if you will — need to establish some new norms as well.
Specifically, Gillmor argues that, ” We need to readjust our internal BS meters in a media-saturated age,” because “We are far too prone to accepting what we see and hear.” I think Gillmor has too little faith in most digital denizens; most of us take anonymous comments with a grain of salt and assume that the ugliest of those comments are often untrue. And that’s generally the “principle” he recommends each of us adopt going forward: Continue reading →
Randy Cohen, who pens “The Ethicist” column for The New York Times Magazine, wrote this week about the “skank case,” or the controversy surrounding the recent legal outing for an anonymous blogger who called fashion model Liskula Cohen a “psychotic, lying, whoring … skank.” Thanks to a recent court decision, we now know that the blogger who uttered those words is Rosemary Port, a 29-year-old Fashion Institute of Technology student. And she now apparently plans to sue Google for revealing her identity to the court. [As a shameful aside, can I just say that there has never been a nerdy Internet legal battle that involved two more smokin’ hot women than this! Sorry, I couldn’t resist pointing out the obvious.]
Reflecting on this catfight in his NY Times Magazine editorial, “Is It O.K. to Blog About This Woman Anonymously?” Randy Cohen asks:
Has anonymous posting, though generally protected by law, become so toxic that it should be discouraged? It has. To promote the social good of lively conversation and the exchange of ideas, transparency should be the default mode. […]
Here is a guideline. The effects of anonymous posting have become so baleful that it should be forsworn unless there is a reasonable fear of retribution. By posting openly, we support the conditions in which honest conversation can flourish.
But Mr. Cohen never specifies whether he is talking about an ethical guideline or a legal guideline. There is a world of difference, of course. As a matter of social or personal ethics, I think many of us would agree that anonymity “should be forsworn” and we should encourage people to “post openly.” I always live by that rule myself when blogging or posting comments on other sites, whether they are blogs, discussion boards, or even shopping sites. But that is my choice. I would not want that choice forced by law upon others. Continue reading →
Jonathan Frieden (who runs the e-commerce law blog) has a nice, pithy summary of Section 230:
If the “essential published content” is willingly provided by a third-party, the interactive computer service provider publishing that content enjoys the full immunity afforded by Section 230.
Amen, brother! I noted Eric Goldman’s excellent outline about Section 230 back in June. As Adam has noted, Section 230 is about more than just protecting online intermediaries bottom line or even about freeing them to provide the content and services we all take for granted.
Section 230 is the very cornerstone of Internet Freedom, the law that makes possible Robert Nozick’s “framework for utopias”: Online communities (“utopias”) can flourish in their infinite variety only because those who build, host or enable access to such communities (social network operators, search engines, aggregators, etc.) do not have to worry about legal liability for user-generated content. The fundamental difference between Web 1.0 and Web 2.0 lies in the movement of online speech away from individual websites where the speaker was operator to online speech platforms where the potential number of speakers is essentially unlimited. This ongoing shift makes Section 230 more important than ever.
Never before has it been so easy for users to “vote with their feet,” sorting themselves into communities of their own choosing, and not since the the 1890 Census declared the American frontier “closed” has it been been so easy for the individual to start entirely new communities if they don’t like their current options.
by Adam Thierer & Berin Szoka — (Ver. 1.0 — Summer 2009)
We are attempting to articulate the core principles of cyber-libertarianism to provide the public and policymakers with a better understanding of this alternative vision for ordering the affairs of cyberspace. We invite comments and suggestions regarding how we should refine and build-out this outline. We hope this outline serves as the foundation of a book we eventually want to pen defending what we regard as “Real Internet Freedom.” [Note: Here’s a printer-friendly version, which we also have embedded down below as a Scribd document.]
I. What is Cyber-Libertarianism?
Cyber-libertarianism refers to the belief that individuals—acting in whatever capacity they choose (as citizens, consumers, companies, or collectives)—should be at liberty to pursue their own tastes and interests online.
Generally speaking, the cyber-libertarian’s motto is “Live & Let Live” and “Hands Off the Internet!” The cyber-libertarian aims to minimize the scope of state coercion in solving social and economic problems and looks instead to voluntary solutions and mutual consent-based arrangements.
Cyber-libertarians believe true “Internet freedom” is freedom from state action; not freedom for the State to reorder our affairs to supposedly make certain people or groups better off or to improve some amorphous “public interest”—an all-to convenient facade behind which unaccountable elites can impose their will on the rest of us.
Continue reading →
The new Maine law I blogged about on Sunday is much worse than I thought based on my initial reading. If allowed to stand, it would constitute a sweeping age verification mandate introduced through the back door of “child protection.”
The law, which goes into effect in September, would extend the approach of the Children’s Online Privacy Protection Act (COPPA) of 1998 by requiring “verifiable parental consent” before the collection of kids “personal information” about kids, not just those under 13, but also adolescents age 13-17. Unlike other state-level proposals in New Jersey, Illinois, Georgia and North Carolina, Maine’s “COPPA 2.0” law would also cover health information, but would only govern the collection and use of data for marketing purposes (while the FTC has interpreted COPPA to cover to essentially any capability for communicating personal information among users).
But the Maine law would go much further than these proposals or COPPA itself by banning transfer or use of such data in anything other than de-identified, aggregate form. Still I took some comfort in the fact that the Maine law, unlike COPPA or these other proposals, lacked the second of COPPA’s two prongs: (i) collection from kids and (ii) collection on sites that are directed at kids. It’s because of the second prong that COPPA applies not only when a site operator knows that it’s collecting information from kids (or merely allowing them to share information with other users), but also when the operator’s site is (like, say, Club Penguin) targeted to kids in terms of its subject matter, branding, interface, etc. Because I initially concluded that the Maine law would apply only to knowing collection, I supposed that it would be less likely to require age verification of all users, as other COPPA 2.0 proposals would—something that would be unlikely to survive a First Amendment challenge based on the harm to online anonymity.
But I was quite wrong. During the PFF Capitol Hill briefing Adam and I held on Monday, Jim Halpert, one of our panelists, noted that the bill imposed “strict liability.” Continue reading →
Well, here we go again. Harvard’s Jonathan Zittrain has penned another gloomy essay about how “freedom is at risk in the cloud” and the future of the Internet is in peril because nefarious digital schemers like Apple, Facebook, and Google are supposedly out to lock you into their services and take away your digital rights. And so, as I have done here many times before (see 1, 2, 3, 4, 5 + video!), I will offer a response arguing that Jonathan’s cyber-Chicken Little-ism is largely unwarranted.
Zittrain’s latest piece is entitled “Lost in the Cloud” and it appears in today’s New York Times. It closely tracks the arguments he has set forth in his book The Future of the Internet–And How to Stop It, which I named the most important technology policy book of 2008, but not because I agreed with its central thesis. Zittrain’s book and his new NYT essay are the ultimate exposition of Lessigite technological pessimism. I don’t know what they put in the water up at the Berkman Center to make these guys so remarkably cranky and despondent about the future of of the Internet, but starting with Lawrence Lessig’s Code in 1999 and running through to Zittrain’s Future of the Internet we have been forced to endure endless Tales of the Coming Techno-Apocalypse from these guys. Back in the late 90s, Prof. Lessig warned us that AOL and some other companies would soon take over the new digital frontier since “Left to itself, cyberspace will become a perfect tool of control.” Ah yes, how was it that we threw off the chains of our techno-oppressors and freed ourselves from that wicked walled garden hell? Oh yeah, we clicked our mouses and left! And that was pretty much the end of AOL’s “perfect control” fantasies. [See my recent debate with Prof. Lessig over at Cato Unbound for more about this “illusion of perfect control,” as I have labeled it.]
But Zittrain is the equivalent of the St. Peter upon which the Church of Lessigism has been built and, like any good disciple, he’s still vociferously preaching to the unconverted and using fire and brimstone sermons to warn of our impending digital damnation. In fact, he’s taken it to all new extremes. In Future of the Internet, Jonathan argues that we run the risk of seeing the glorious days of the generative, open Net and digital devices give way to more “sterile, tethered devices” and closed networks. The future that he hopes to “stop” is one in which Apple, TiVo, Facebook, and Google — the central villains in his drama — are supposedly ceded too much authority over our daily lives because of a combination of (a) their wicked ways and (b) our ignorant ones.
Continue reading →
The Wired article (“Great Wall of Facebook: The Social Network’s Plan to Dominate the Internet — and Keep Google Out“) I discussed yesterday touched on another issue near & dear to my heart (besides the importance of smarter advertising): the future of online anonymity. The article lays out Facebook’s “4-Step Plan for Online Domination,” which involves “colonizing” the web though Facebook’s Connect (launched Dec. 2008) and Open Stream API (launched April 2009) initiatives, which:
don’t just allow users to access their Facebook networks from anywhere online. They also help realize Facebook’s longtime vision of giving users a unique, Web-wide online profile. By linking Web activity to Facebook accounts, they begin to replace the largely anonymous “no one knows you’re a dog” version of online identity with one in which every action is tied to who users really are.
To hear Facebook executives tell it, this will make online interactions more meaningful and more personal. Imagine, for example, if online comments were written by people using their real names rather than by anonymous trolls. “Up until now all the advancements in technology have said information and data are the most important thing,” says Dave Morin, Facebook’s senior platform manager. “The most important thing to us is that there is a person sitting behind that keyboard. We think the Internet is about people.”
The bolded prediction of what I would call “Online Identity Integration” is already happening. To take one tiny example, readers can now post comments on the TLF by logging into Disqus (our Comment Management System) through their Facebook (or Twitter) account, which will also allow them to automatically share those comments on Facebook (or Twitter). This is purely opt-in: Users are free to continue to post anonymous comments. But as more websites and platforms implement such Identity Integration functionality, a growing percentage of online speech will be tied to profiles offered by major social networks.
Some free speech advocates are sure to bemoan Identity Integration as directly undermining online anonymity. Continue reading →
craigslist has filed a complaint against South Carolina Attorney General Henry McMaster, seeking to enjoin him from prosecuting the site for displaying the solicitations to prostitution that sometimes appear there. The complaint cites section 230 of the Communications Decency Act, the First Amendment, and a few other laws that craigslist believes protect it from liability.
The complaint makes a pretty good case that craigslist has taken reasonable steps, working with law enforcement, to keep prostitution off the site. With that it has done its part. If prosecutors want to go after prostitution, they can use craigslist to do so. They should not attack the messenger if consenting adults are trying to exchange money for sexual services in their local areas.