Professional Documents
Culture Documents
The right to free expression supports essential aspects of American policy and
fundamental by America’s founders, this right has morphed and expanded radically since
its adoption. In the area of privacy law, American courts have come to interpret freedom
communication technology and, primarily, the Internet. The American legal system has
never faced something so fundamentally disruptive as the Internet, which entangles vast
a sweeping expansion of the way individuals share ideas, exchange information, and form
defamation. Like any tool, the Internet seems only as good as those who use it; but
regardless of intentions, the Internet offers all users the ability to mask their identity
To hold criminals responsible for acts of otherwise anonymous cyber crime, law
individuals during investigation and legal proceedings. Most unlawful acts seem to
clearly warrant unmasking; however, the line blurs in cases of questionable acts,
particularly those that implicate First Amendment liberties to expression and association.
Penetrating a person’s anonymity online can implicate entirely lawful uses of identity
The right to anonymity has roots in the recognition of its crucial role in First
Amendment association, first recognized in 1958 with National Association for the
Advancement of Colored People v. State of Alabama. At the time, Alabama law required
all state-foreign corporations to file corporate charters and designate a place of business
before doing business. The State enjoined the NAACP from conducting further activities
after they failed to comply with the statute, and, pending litigation, moved to produce
many of the Association’s records and papers, including records containing the names
and addresses of all the Association’s Alabama members. The Association contested the
On appeal, the Supreme Court found “freedom to engage in association for the
advancement of beliefs and ideas” indivisible from the fundamental rights secured by the
that might result from compelled disclosure of associations with socially unpopular
disclosure planted the seeds for broader interpretations of anonymity’s role in association.
The decisions of Keysihian v. Board of Regents (1967) and Baird v. State Bar of Arizona
challenge even though it has only an indirect effect on the exercise of First Amendment
the concept of indirect harm as a “chilling effect,” a concept that would expand the
gathering program designed to track the associations of individuals with the “potential for
civil disorder,” basing their assertion on the program’s indirect effect on the exercise of
First Amendment association.5 They alleged that mere knowledge of their surveillance
restricted their First Amendment liberty. While the Court dismissed plaintiffs’ complaints
as too amorphous to constitute a showing of specific present harm, it did recognize the
potential for governmental regulations that “fall short of a direct prohibition” to have a
chilling effect.6 In dissent, Justices Douglas and Marshall defended the legitimacy of a
Turner 4
chilling-effect claim as actionable harm, saying that the practical effect of the
surveillance program was to “deter [the plaintiffs] from exercising their rights of political
expression, protest, and dissent…”7 The justices argued that the majority’s
acknowledgement of this effect in itself proved adequate standing, and “one need not
wait until he loses his job or until his reputation is defamed” to bring suit.8
Tate. Again, the court found complaints based on a “so-called subjective chill”
insufficient to show harm; however, the Court did acknowledge injury from the
third parties. Based on the harms articulated in NAACP, the Court concluded that
bodily, mental, and economic harms by a third party was recognized as adequate showing
over group associations, but the chilling effect also extends to First Amendment speech.
The first connection between anonymity and speech came in Talley v. State of California.
The case specifically addressed the anonymous distribution of handbills, an act prohibited
by a Los Angeles City ordinance. The Talley Court noted the role anonymous speech had
been assumed for the most constructive purposes.”11 It cited specifically the use of
anonymity in the famous Federalist Papers, written by the founding fathers to advocate
for the adoption of the U.S. Constitution. Further, the Court feared that regulated
disclosure of identities would unfairly limit “persecuted groups and sects” that depend on
anonymity to avoid retribution.12 Similar to the ruling in NAACP, the Court concluded
that Los Angeles could not compel members of a group “engaged in the dissemination of
ideas” to identify themselves.13 This explicit connection to speech bridged the gap
between the right to anonymous association and the right to anonymous dissemination of
information.
Talley afforded anonymous speech cursory approval, but the full right to
anonymous expression was not solidified until the 1995 Supreme Court decision of
McIntyre v. Ohio Elections Commission. The case addressed an Ohio statute requiring
that authors print their identities on political pamphlets and flyers for distribution.
Building on Talley, the Court ruled that choice of identity disclosure is tantamount to the
content of political expression, and that the Ohio statute, in fact, regulated this content. 14
—“an honorable tradition of advocacy and dissent”15—but further argued that individuals
might adopt anonymity believing their anonymous speech more persuasive than when
linked to their person and reputation. Without the choice to remain anonymous, voices
outweighed “any public interest in requiring disclosure as a condition of entry [to the
speech.
Turner 6
anonymity, asserting that it threatened the credibility and utility of political speech. They
instead of adversely affecting it, requiring authors to disclosure their identity improves
The justices argue that the very utility of free speech in the political process depends on
its truthfulness, and that requiring disclosure would “promot[e] a civil and dignified level
speech might be justified if they promote accountably but limit their chilling effect to
Colorado courts further extended anonymity to the reading and receiving of ideas in
Tattered Cover, Inc. v. City of Thornton. In particular, the case dealt with a Denver
bookstore that defied a court subpoena requesting customer records. The subpoena
refused to supply the records to law enforcement, citing First Amendment protection.
The Colorado Supreme Court agreed that the subpoena did, in fact, request
information protected under the “right to read and receive ideas and information,” for
“when a person buys a book at a bookstore, he engages in activity protected by the First
Amendment.”19 Further, the court noted the undesirable chilling effect of government
Turner 7
action that “interferes with the willingness of customers to purchase books, or booksellers
to sell books.”20 It ruled that seizing of records in question would interfere with First
recognized anonymity’s crucial role in the right to read and receive ideas and
information.
between enforcement, First Amendment, and Fourth Amendment interests. The court
noted this conflict was “enviable when law enforcement officials attempt to use search
Supreme Court precedent set in Zurcher v. Stanford Daily, stipulating that, when
warrants seek expressive materials, they must conform to the Fourth Amendment’s
expressive materials are not given immunity from seizure, but they are afforded greater
protection from overly vague warrants. In the case of Tattered Cover, however, the
Colorado Supreme Court thought even this protection insufficient. It relied on an even
higher standard of protection, elevating judicial review in the case to the level of strict
afforded the explicit opportunity to oppose any warrant seeking customer records.25 In
light of these expanded protections, the court found Colorado law enforcement’s interest
contends that anonymity in reading and accessing information actually improves political
chain, in which “all speech responds to prior speech of some sort.”27 Her theory proposes
that, before speaking, people survey a variety of existing opinions, and through a series of
“intellectual transactions,”28 ultimately form the opinions they express. Therefore, the
protection afforded anonymous expression should logically extend to the basis on which
people form their expression, particularly when the material may be controversial or
unpopular. America has long upheld the importance of free political expression and
historically gain acceptance to the mainstream with time. However, current stigmas
attached to unpopular ideas may deter readers from investigating them when forced to
Additionally, Cohen argues that, based on historical use, the freedom to read
anonymously may even be a more fundamental liberty than freedom of expression. While
reading has been taken for granted.30 Furthermore, records detailing a person’s reading
habits implicate crucial privacy concerns. Records contain valuable information about
personal tastes, preferences, interests and beliefs—information the reader “should have a
individual’s private life and therefore should be afforded the same protection as other
In this vein of reasoning, 48 states have enacted laws protected the privacy of
library records,32 though most allow for the disclosure of records pursuant to a court order
or subpoena. While not yet recognized at the federal level, the right to read anonymously
ideas, but the realities of Internet and electronic communications call into question the
anonymity. Internet Service Providers (ISPs) facilitate access to the Internet by assigning
individualized tracking numbers to users called Internet Protocol (IP) addresses. These
addresses link users’ activities online to all the information retained in an ISP’s records—
they link actions to actual people. Accordingly, law enforcement frequently turns to ISPs
Beyond ISP records, individual web sites can employ techniques to track visitors
as well. One technique involves the use of “cookies,” or small text files that are
downloaded to the user’s computer when they visit a web page. Cookies can be tagged
with identifying information and used to track a variety of actions online, including the
duration of stay at a site, other sites visited, and information entered into a web page.
“Web bugs” or “clear Gifs” provide another way to track user behavior. These invisible
images, usually only a single pixel in size, are placed on a site and downloaded onto a
visitor’s computer each time they visit. By recording when and who downloads the image
Turner 10
file, site owners can gather information on who accesses the site and how frequently. All
these techniques make the Web a zone of quasi-anonymity—a labyrinth of IDs, records,
online anonymity. The standard for evaluating expectation of privacy was first
established in Katz v. United States, and held far-reaching consequences for web
anonymity for two reasons: use of technology to convey information and the recognition
First, Katz clarifies the protections afforded persons under the Fourth amendment
to include “people not places.”34 This distinction shifted privacy protection to individual
actions rather than only actions done in certain settings. Thus, the Court recognized
over vast distances, play a “vital role…in private communications.” 35 This interpretation
anticipated the even greater role digital technologies now play in private and expressive
of privacy afforded individuals and whether society recognizes that expectation as valid.
individual “exhibited an actual (subjective) expectation of privacy and, second, that the
time, the Katz Court reasoned a person calling from a public telephone—a public place—
still retained an expectation of privacy. In shutting the telephone booth door, the caller
Turner 11
freedom from intrusion are recognized as reasonable.”37 Thus, Katz established the basis
The test for expectation of privacy established in Katz continues to play a pivotal
role in privacy cases, but its protection for anonymity has been severely eroded by
subsequent rulings involving information given to third parties. Cases involving law
Third party doctrine began with United States v. Miller, which analyzed a
Katz: “[w]hat a person knowingly exposes to the public…is not a subject of Fourth
privacy on the depositor’s records because, while they contained personal information,
they were not, in fact, “respondent’s ‘private papers.’”39 In giving information to a third
party, the Court reasoned the depositor took “the risk…that information will be conveyed
by that person to the Government,”40 even when revealed in confidence or for a “limited
purpose.”41 The language of Miller firmly establishes third party doctrine in privacy,
stripping the privacy expectation from information knowingly conveyed to a third party.
Accordingly, law enforcement may seize records and information revealing personal or
communication and the content of the communication itself. This distinction first
manifested itself in Smith v. Maryland, where law enforcement officers intercepted dialed
communication,”42 not the entirety of the call. Thus, the Smith Court sought to determine
According to the Court, subscribers must know that the “phone company has facilities for
making permanent records of the number they dial, for they see a list of their long-
distance (toll) calls on their monthly bills.”43 This knowledge combined with third party
dialed numbers. Further, should a subjective expectation exist on the part of the caller,
this expectation “is not ‘one that society is prepared to recognize as reasonable.’”44 Smith
ruled law enforcement could freely obtain information given to the telephone company
connecting information and content. He argued that “numbers dialed from a private
telephone…are not without ‘content’… [and] could easily reveal the identities of the
persons and places called.”45 The crux of his dissent centers on the idea that, regardless of
medium, the act of connecting with certain people implicates private information—the
Turner 13
very reason law enforcement uses it. Accordingly, connecting information can “reveal the
privacy.46 While it did not carry the case in Smith, this fear becomes an even greater
pattern recognition.
but the conceptualization of connecting information as private has gained support among
many advocates for anonymity and associational liberty. Legal commentators David Cole
particularly in modern society where associations often occur solely by electronic means
such as telephone or e-mail. Solove proposes that surveillance of phone logs or e-mail
headers can easily reveal “that an individual contacted particular organizations that the
NAACP and Laird. The ability to identify group associations deters individuals from
associating with certain groups, and thus, the ruling in Smith ignores the fact that “pen
personal information and anonymity from surveillance and inferential technology would
Key to the majority opinion in Smith was the idea that subscribers assume a risk
privacy. Relying on Miller, the Smith Court concluded that telephone subscribers
Turner 14
“’assumed the risk’ of disclosure.”49 Based on the workings of modern electronic and
hope for anonymity on the Web; the mere act of connecting to the Internet, in most cases,
requires users to give identifying information to a third party ISP. In essence, individuals
have no alternative but to accept loss of anonymity, and forced disclosure in modern
rationale behind “assumed risk” by proposing that evolving technology creates social
expectations that eliminate the reasonable exercise of choice. He argues that telephone
communication has become such a necessary that society expects individuals to use it for
vital personal and business relations—less a choice than a social obligation. Accordingly,
“unless a person is prepared to forgo use of what for many has become a personal or
professional necessity, he cannot help but accept the risk of surveillance,” and “it is idle
unavoidable consent to argue that the notion of assumed risk predisposes privacy as a all-
touted by the Smith Court ignores the more commonplace notion that privacy allows the
affords individuals a choice concerning who receives information, and expanding beyond
the intended parties violates the expectations attached to the communicated information.
when transmitted to a third party; they are influenced by the individual’s purposeful
Other commentators such as Patricia Bellia find confliction between Katz and
Smith. Bellia believes the Court in Smith “ignored the lesson of Katz: We do not lose
pen register, government agents intercepted communications intended solely for the
telephone company. Bellia argues that the possibility of interception by the government
from Katz by offering the perspective that, in Smith, the limited information that “can be
gleaned from a phone number” does not intrude on the personal information protected in
Katz.54 However, this reasoning fails to appear in the stated rationale of Smith, and
further, seems to ignore the objections raised by Justice Stewart: that information gleaned
standards of protection to address how much privacy the law should grant. This question
could readily fall to the responsibility of legislators; however, legislation thus far has
provided only tepid support for digital privacy and anonymity—particularly against law
sector intrusion on records and identifying information but easy access for law
privacy with the passage of The Electronic Communications Privacy Act (ECPA) of
digital privacy interest. The Act addresses various types and states of electronic
information. However, the most significant section of the ECPA to electronic anonymity
comes under Title II: The Stored Communications Act (SCA). The SCA prohibits access
information. The SCA allows only “the persons or entity providing a wire or electronic
communication service” or the “user of that service”56 access to stored records, limiting
However, what protection the SCA provides from private interests with one hand,
it takes away with the other when dealing with law enforcement. Section 2703(c)(1)(B)
identifying information, addresses, phone numbers, etc.—to law enforcement with either
storage. Information stored for less than 180 days requires a warrant supported by
probable cause.58 Access to older information merely requires a subpoena or court order
and prior notice given to the subscriber.59 In this case, agents must show only “specific
and articulable facts showing that there are reasonable grounds” to believe the
This raises the question: Does privacy interest diminish over time as the SCA
seems to suggest? Records kept in storage may still have privacy value notwithstanding
their age. Furthermore, should law enforcement fail to obtain information lawfully under
the proper procedure of the SCA, the Act does not provide for an exclusionary rule,
further decreases protection for telecommunications privacy. Also known as the “Digital
all telecommunications providers have the ability to “isolate and intercept electronic
services such as e-mail and Internet access; however, the Federal Communications
Turner 18
protocol (VoIP), individuals can communicate using the Internet in much the same way
thought of as “a replacement for a substantial portion of the local telephone service” and
therefore fall under CALEA’s regulation.65 This expansion illustrates that as Internet
Required to Intercept and Obstruct Terrorism Act,” or USA PATRIOT Act, further
III of the ECPA, also know as The Pen Register Act, law enforcement can use “tap and
trace devices,” such as a pen registers, after obtaining a court order that certifies that
investigation”66—a relatively low standard. The USA PATRIOT Act expands the
First Amendment values, as Daniel Solove believes, the PATRIOT Act provides the
next frontier for battles over First-Amendment anonymity and law enforcement;
however, protecting anonymous political speech from private parties has already reached
state courts. In the Delaware case of Doe v. Cahill, local councilman Patrick Cahill sued
an anonymous Web writer, posting under the alias “Proud Citizen,” for allegedly
defamatory statements. Cahill sought to unmask his defamer with the help of the poster’s
ISP. Before he could discover the poster’s identity, however, poster obtained an
Emergency Motion for a Protective Order to prevent disclosure and appeal the case.
anonymous speakers must prove, through summary judgment, they seek to rightfully
pursue restoration for truly defamatory statements.68 Noting that “speech over the Internet
identity when speech is undertaken anonymously.69 The court reasoned that defendants
could remain anonymous so long as their status does not unreasonably interfere with
plaintiff’s ability to perform discovery.70 On the other hand, it also recognized that “the
Ultimately, the decision to preserve anonymity hinged on concerns that setting too low a
standard would “chill potential protesters from exercising their First Amendment
Turner 20
rights,”72 and that plaintiffs with no intention of fulfilling the requirements for defamation
would utilize the judicial system to unmask defendants, subsequently pursuing the “extra-
appropriate burden of proof to deter “trivial defamation lawsuits” that sought merely to
harass and unmask critics.74 In addition, the court required that all plaintiffs notify
anonymous posters that they are subject to subpoena or application for order of disclosure
on the same message board where the initial remarks took place.75
Despite the anonymous condition of the defendant, the plaintiff must still fulfill
the basic burdens of defamation, proving that statements were defamatory, concerned the
defamatory, and the statements were false. In the case of public figures such as Cahill, the
court considered the burden of actual malice too difficult under conditions of defendant
anonymity, and so waived it.76 Ultimately, the court found Cahill’s allegations of
defamation insufficient and ruled that discovery of the defendant’s identity was not
warranted.77
While only decided at the state level, the Cahill ruling illustrates an expectation of
high deference in cases involving anonymous speech on the Internet. It strikes a balance
between the interests of the allegedly defamed plaintiff and defendant’s privacy by
allowing the suit to continue while preserving anonymity. However, Cahill deals
exclusively with state, civil defamation cases, a small dent in the challenges facing
Cases like Cahill indicate a baseline of high protection for anonymous speech, but
Turner 21
and Fourth Amendment values by nearly half a century of case law. To correct this
procedures” to ensure that constitutional values remain intact while continuing to uphold
national security and law enforcement.78 Particularly on the Internet, First Amendment
rights are implicated by nearly every act of law enforcement information gathering—
searching or seizing computers, reading e-mail, obtaining ISP records and IP address
information.79 Solove maintains that requiring stricter judicial scrutiny in these cases
would promote a better balance between competing interests and increase constitutional
protection by ensuring only cases of truly compelling state interest pass judicial tests. 80
Tougher procedures don’t necessarily mean law enforcement will be barred from
require demonstration of “(1) a significant interest in gathering the information and (2)
that the manner of collection is narrowly tailored to achieving that interest.”82 Cases that
implicate First Amendment rights would require procedures similar to those for obtaining
a warrant.
The Internet provides a unique platform for the convergence of privacy and law
liberties require balancing with state interests of public good and national security.
or unnecessary government interference. The result of such abuses could have far-
important ideas for fear of identification. Even the subjective threat of interference can
chill protected behavior. Federal legislation in most cases provides only limited
protection from government interference, setting low levels of judicial oversight and even
third party doctrine allow law enforcement to gain access to identifying information
procedures appears justified in cases of clear wrongdoing; yet, they provide only narrow
As challenges arise, the destabilizing nature of the Internet will inevitably yield to
more concrete levels of regulation and protection. Future protection, however, rests on
Cases of anonymity offline seem to indicate high respect for an individual’s choice
concerning identity disclosure, but current federal legislation sets low standards regarding
interests of anonymity and law enforcement will find resolution in the future actions of
End Notes:
2. Id.
3. Id.
5. Id.
6. Id.
7. Id.
8. Id.
9. Philadelphia Yearly Meeting Of The Religious Society Of Friends v. Tate, 519 F.2d
1335 (3d Cir. 1975) (Emphasis Added).
10. Id.
12. Id.
13. Id.
15. Id.
16. Id.
17. Id.
18. Id.
19. Tattered Cover, Inc. v. City of Thornton, 44 P.3d 1044 (Colo. 2002).
20. Id.
21. Id.
Turner 24
22. Id.
24. Tattered Cover, Inc. v. City of Thornton, 44 P.3d 1044 (Colo. 2002).
25. Id.
27. Id.
28. Id
29. Id.
30. Id.
31. Id.
32. Solove, Daniel J. Information privacy law. 3rd ed. New York, NY: Aspen, 2008.
Print. 573.
34. Id.
35. Id.
36. Id.
37. Id.
39. Id.
40. Id.
41. Id.
43. Id.
Turner 25
44. Id.
45. Id.
46. Id.
47. Daniel J. Solove, The First Amendment as Criminal Procedure, 82 N.Y.U. L. Rev.
112, 169 (2007).
48. Id.
50. Id.
51. Laurence Tribe, American Constitutional Law 1391 (2d ed. 1988).
52. Patricia Bellia, Surveillance Law Through Cyberlaw’s Lens, 72 Geo. Wash. L. Rev.
1375, 1405 (2004).
53. Id.
62. The Communications Assistance For Law Enforcement Act, 47 U.S.C. § 1006(a)(2)
(1994).
64. In the Matter of Communications Assistance for Law Enforcement Act and
Turner 26
Broadband Access and Services, FCC 04-187 (Aug. 4, 2004) (emphasis added).
65. The Communications Assistance For Law Enforcement Act, 47 U.S.C. § 1001(8)(B)
(ii) (1994).
67. The Uniting and Strengthening America By Providing Appropriate Tools Required to
Intercept and Obstruct Terrorism Act, 115 Stat. 272 § 216 (2001).
69. Id.
70. Id.
71. Id.
72. Id.
73. Id.
74. Id.
75. Id.
76. Id.
77. Id.
78. Daniel J. Solove, Digital Dossiers and the Dissipation of Fourth Amendment Privacy,
75 S. Cal. L. Rev. 1083 (2002).
79. Id.
80. Id.
81. Id.
82. Id.