Twitter/Cyber/Stalking Sarah Cortes Review of recent cases involving Twitter, other social media and the use of technology, including cyberstalking and hacking cases NEU, CCIS Twitter/Cyber/Stalking Table of Contents Major Twitter/Cyber/Stalking Cases ................................................................................................ 3 Summary ....................................................................................................................................... 4 Federal Cyberstalking Laws.......................................................................................................................6 US. v. Cassidy ................................................................................................................................. 7 Overview .................................................................................................................................................8 Law Enforcement: Practical considerations in investigating cyberstalking .................................................. 10 Courts ................................................................................................................................................... 11 Definitions of cyberstalking........................................................................................................................... 11 “Only Words” ................................................................................................................................................. 12 Meritor: EEOC’s four factors ....................................................................................................................... 12 Averting the Eyes- for some? Strict Scrutiny- for others? ............................................................................ 13 Twitter is a modern public bulletin board?................................................................................................... 15 Tweets “religious” in nature ......................................................................................................................... 16 Cyberstalking law “serves no compelling interest” ...................................................................................... 17 “Freewheeling Authority” - Protected and Unprotected Speech ................................................................ 17 Civil Liberties Groups ............................................................................................................................. 18 Conclusion............................................................................................................................................. 18 US v Wikileaks............................................................................................................................... 19 Overview – Strange Bedfellows............................................................................................................... 19 Law Enforcement and the Courts ............................................................................................................ 21 Civil Liberties Groups – IP Addresses are not Telephone Numbers ............................................................ 21 Conclusion............................................................................................................................................. 23 US v @GuidoFawkes-Occupy Boston .............................................................................................. 24 Overview ............................................................................................................................................... 24 Law Enforcement ................................................................................................................................... 24 Civil Liberties Groups – “Because the Rights You Save May Be Your Own” ................................................. 25 Courts ................................................................................................................................................... 25 Conclusion............................................................................................................................................. 25 Conclusion .................................................................................................................................... 26 Appendices ................................................................................................................................... 27 Brief - US v. Cassidy ................................................................................................................................ 27 Brief- US v Mr. X - In Re Grand Jury Subpoena No. 11116275 (Michelle Bachmann) .................................... 28 Brief- Remsberg v Docusearch ................................................................................................................ 29 Brief – US v Wikileaks ............................................................................................................................. 31 Brief- House v Napolitano (Wikileaks)...................................................................................................... 34 Brief- US v Occupy Boston....................................................................................................................... 35 Bibliography ................................................................................................................................. 36 Other Major Twitter-related Cases................................................................................................. 38 2 Twitter/Cyber/Stalking Major Twitter/Cyber/Stalking Cases Case Social Media/ Technology Law Where US v Cassidy Twitter and internet blogs US Federal interstate stalking statute, 18 USC 2261A-2A 4th Amendment MD US v Mr. X (Michelle Bachmann) In Re Grand Jury Subpoena No. 11116275 Twitter Remsberg v Docusearch Internet blog 18 USC 875(c), cyberstalking 18 USC115, TREASON, SEDITION, AND SUBVERSIVE ACTIVITIES, 4th Amendment US Financial Services Modernization Act of 1999, Privacy Act of 1974, Consumer Protection Act, RSA chapter 358-A, 4th Amendment US ECPA-Stored Communications Act 18 USC 2701, 4th Amendment Iceland, German y, (Boston) Expose privacy US ECPA-Stored Communications Act 18 USC 2703, MGL 271-17B, 4th Amendment 1st, 4th Amendments Boston Expose privacy Expose privacy speech unprotected Boston Restrict Freedo m TBD US v Wikileaks1 Twitter US v @GuidoFawkes Occupy Boston2 Twitter House v Napolitano (Wikileaks)3 Laptop (Twitter & Blogs) Law Enforcement Expose privacy Courts Civil Liberties Groups Twitter Expose privacy, speech protected Protect privacy DC Expose privacy Expose privacy speech unprotected EFF, ACLU – Defendant Protect privacy, old and new technology are analogous None known NH Protect privacy Protect privacy against commercial exploitation Electronic Privacy Information Center ("EPIC") – Plaintiff NA Expose privacy speech unprotected EFF, Security Experts, Privacy Experts – Defendants Protect privacy Protect privacy Protect privacy Protect privacy, old and new technology not analogous ACLU- Defendant Protect privacy Protect privacy ACLU- Defendant Protect privacy Protect privacy Cover image: Wikileaks released this video, “Collateral Murder,” 4 depicting an apparent US Army attack on unarmed Reuters journalists in Iraq in 2007. The US had reportedly refused to release the video to Reuters or admit wrongdoing. In US v Wikileaks, the US government has sought the Twitter information for those it believes released this information. Anonymous maintains the US government is wrongfully concealing its own misdeeds. Some Americans expect law enforcement to investigate Twitter accounts of some, but not all, suspects under inveestigation. Connection to Boston, Wikileaks Connection to Boston, Wikileaks 3 Connection to Boston University 4 http://collateralmurder.com, US Army helicopter video, Iraq, 2007 1 2 3 Twitter/Cyber/Stalking Anonymous with Guy Fawkes masks at Scientology in Los Angeles5 Summary Monday, October 25, 2010: "city girls use Vaseline, country girls use lard, fat (A.Z.) don't use nothing,' she gets it twice as . . . " 6 Sunday, December 5, 2010: "To call an overweight whore "mother of palyul" insults whores & palyul. " 7 Sunday, December 5, 2010: "I do not believe (A.Z.) was a prostitute. I think that story is a made-up lie Prostitutes are professionals." 8 From 2008 to 2011, William Lawrence Cassidy allegedly “cyberstalked” Alyce Zeoli with over 8,000 tweets on Twitter and blogs9. Zeoli suffered, by universal stipulation, “severe emotional distress.” In US v Cassidy, police had identified the defendant by subpoenaing his Twitter records. The courts ruled Cassidy’s speech was protected by the First Amendment as religious speech, and that old bulletin board and new Twitter technology are essentially the same. Photo: Diamante, Vincent, (Creative Commons License) From Twitter account kpcwatch, quoted in US v Cassidy, https://www.eff.org/sites/default/files/filenode/cassidy-order-121511.pdf, Case 1:11-dm-00003-TCB -LO Document 85 Filed 11/10/11 Page 1 of 60 PageID# 1023, US District Court For The District Of Maryland, 2011, No. TWT 11-091 (D. Md. Dec. 15, 2011) US v. William Lawrence Cassidy, Defendant. Criminal Case No. RWT 11-091 US District Court For The District Of Maryland 2011 U.S. Dist. LEXIS 145056; 40 Media L. Rep. 1001 7 Ibid 8 Ibid 9 US v. Cassidy, see appendix Brief 5 6 4 Twitter/Cyber/Stalking On October 15, 1999, Liam Youens murdered Amy Boyer, a former classmate, then committed suicide.10 He foretold the murder in an internet blog, using technology to advertise his thoughts and intentions. His website connected his words and deeds, although the US never had a chance to decide whether his website speech was protected. This case established the connection in the public’s mind between stalking and the use of technology. The related case, Remsberg v Docusearch, established privacy protections for perceived victims. In a third case, US v Wikileaks, the US Justice Department subpoenaed the Twitter records, including IP addresses, of Birgitta Jonsdottir, a member of the Icelandic Parliament, in its investigation.11 In this case, the US takes the role of victim, as well as investigator and prosecutor. The court has so far denied First Amenment issues in this pending litigation, contrary to its stance in Cassidy. The ACLU and the EFF had opposed the Wikileaks subpoenas in amicus curiae briefs on the grounds, essentially, of political persecution, freedom of speech, and unjustified government secrecy. They also argued that old telephone and new Twitter technology are subtly but importantly different, contrary to their stance in Cassidy. As of January 20, 2012, this case is still pending in the appeals court. In a fourth case, US v @GuidoFawkes-Occupy Boston, law enforcement is both target and investigator, similar to US v Wikileaks. On March 2, 2012, in response to a subpoena from the Suffolk County DA for the state of Masssacusetts, in the US, Twitter handed over the records for the accounts @pOisAnON- Guido Fawkes, although not @OccupyBoston, #BostonPD or #dOxcak3.12 These were suspected of hacking the Boston Police website after the Police shut down Occupy Boston. According to the Boston Globe,13 these Twitter accounts were also suspected of links to the groups Anonymous and Wikileaks. Those who hacked the Boston Police website in the name of Occupy Boston or Wikileaks, reportedly also may have stolen names and credit card information at the same time. Although it is hard to know much about this case since the record is sealed, the court so far seems to have denied First Amenment arguments in this pending litigation, again contrary to its stance in Cassidy. The ACLU has opposed the @GuidoFawkes-Occupy Boston subpoenas in amicus curiae briefs, also on the grounds, essentially, of political persecution, freedom of speech, and unjustified 10 Remsberg v Docusearch, (see appendix Brief)- Helen Remsberg, Administratrix of the Estate of Amy Lynn Boyer v. Docusearch, No. 2002-255, Supreme Court Rule of New Hampshire, 149 N.H. 148; 816 A.2d 1001; 2003 N.H. LEXIS 17 11 In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G; and BirgittaJ, US v. Wikileaks, APPELBAUM, GONGGRIJP, JONSDOTTIR, and TWITTER, Appeal: 11-5151 Document: 19, Date Filed: 01/20/2012, Page: 1 of 7. In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G; and BirgittaJ Ellement, John R., Boston Globe, Twitter gives Boston police, prosecutors data in hacking probe, March 02, 2012 http://articles.boston.com/2012-03-02/metro/31112710_1_twitter-boston-police-law-enforcement 12 13 Ibid 5 Twitter/Cyber/Stalking government secrecy. They also argued that old telephone and new Twitter technology are subtly but importantly different, contrary to the civil libetarian stance in Cassidy. Federal Cyberstalking Laws Case - Convictions Law US v Michael F. Lutz, 2011 US Federal interstate stalking statute, 18 USC 2261A-2A Level felony Method internet Scope Includes harassment US v Joseph Campbell, 2011 18 USC 875(c), cyberstalking felony 47 U.S.C. 223 misdemeanor 18 U.S.C. 2425 child trafficking felony Limitations requirement that the stalker physically travel across state lines makes it largely inapplicable to cyberstalking cases Only actual threats Direct communication only Phone or internet Requires a showing of intent to entice or solicit a child for illicit sexual purposes. These four cases above illustrate evolving issues surrounding cyberstalking, hacking, and the use of Twitter and social media and other technology in legal cases. Some questions include, is new Twitter technology analagous to old “technology” like a public bulletin board? Is new Twitter metadata containing IP addresses similar to old telephone metadata, for purposes of a subpoena? Are sexually degrading and abusive tweets protected speech as religious in nature? Is theft of personal credit card information hacked from the internet by “Robin Hood” Twitterers, ostensibly affiliated with Occupy Boston and Wikileaks, political expression? In this analysis, we review recent cases involving Twitter, other social media and the use of technology, including cyberstalking and hacking cases. We argue that the court demonstrated, in Cassidy, its lack of understanding in two critical areas: technology and sexully degrading abuse of female targets. Furthermore, we point out how law enforcement and civil liberties groups take conflicting, shifting, and seemingly contradictory views on whether new Twitter technology is analagous or non-analogous to old technology like telephones and bulletin boards. The court’s lack of understanding of technology reveals the same weakness that may have caused its acceptance of a confused, tortured and superficial First Amendment defense: lack of personal experience. This weakness had plagued the courts and humankind since time immemorial. Those in power may shape laws to reflect their personal concerns and experience, which they sometimes imagine represents those of the poputlation as a whole. The democritization of technology reveals cracks in otherwise empwered judge’s abilities to grasp their limitations, such as 6 Twitter/Cyber/Stalking failure to understand new Twitter atechnology nd failure to understand sexual degradation of women. These cracks that allow judges and the community to ignore groups whose experiences differ from their own may outrage the community more, eventually, when they apply to a more eventually empowered group such as the Twitter-savvy. However, lack of familiarity with technology (and underrepresented people’s experiences), may likely negatively affect judicial rulings more and more as the pace of technology innovations quickens. Another theme of these cases is that when the court does not identify with the victim and sees the perpetrator as harmless, as in Cassidy, it may have less trouble protecting the “harasser” with the First Amendment. However, when the court views individuals engaging in clearly political speech yet identifies with the victim, the US government, it seems to have less trouble finding the speech unprotected, as we see in Wikileaks and other Twitter cases. Wikileaks released this video, “Collateral Murder, 14” depicting an apparent US Army attack on unarmed Reuters journalists in Iraq in 2007. The US had reportedly refused to release the video to Reuters or admit wrongdoing. In US v Wikileaks, the US government has sought the Twitter information for those it believes released this information. Anonymous maintains the US government is wrongfully concealing its own misdeeds. Some Americans expect law enforcement to investigate Twitter accounts of some, but not all, suspects under inveestigation. 14 http://collateralmurder.com, US Army helicopter video, Iraq, 2007 7 Twitter/Cyber/Stalking US. v. Cassidy "Yes . . . beauty. A silver hammer on a hard head is beautiful, particularly if it is administered before one's funeral pyre catches blaze. Otherwise, one's head swells and explodes. 15" Overview The New York Times reported, “Certainly Mr. Cassidy’s previous trespasses have not helped him. He has a record of assault, arson and domestic violence. According to the federal complaint, he was also convicted of carrying an unspecified “dangerous weapon” onto a plane in 1993. “ 16 Nevertheless, Judge Roger W. Titus found that because his target, Alyce Zeoli, held a leadership position in a Bhuddist organization, and was thereby a “public figure,” and because some of the over 8,000 sexually degrading and threatening Tweets referred to those aspects of her, that therefore, the communications were religious in nature and further, as affecting a public official, protected by the first Amendment. Three Findings Judge Titus dismissed the US’s indictment alleging Cassidy violated the federal interstate stalking statute, 18 U.S.C. §§ 2261A (2)(A). 17 He ruled against the US in the case of William Cassidy, finding that: 1) the 8,000 tweets were protected free speech because they were religious in nature. Further, 2) the state has no “compelling interest in protecting victims from emotional distress sustained through an interactive computer service.” 18 3) Twitter is essentially a modern town bulletin board, which targets can avoid by “averting [their] eyes.” 19 In concluding his decision, he dismissed the constitutionality of the Federal cyberstalking statute: “In this case, the Court concludes that the statute is unconstitutional as applied, and thus it is unnecessary to address the parties' arguments as to whether the emotional distress via an interactive computer service portion of 18 U.S.C. § 2261A(2)(A) is facially invalid. ” 20 From Twitter account kpcwatch, quoted in US v Cassidy Rulingmm Somini Sengupta, New York Times, Case of 8,000 Menacing Posts Tests Limits of Twitter Speech, August 26, 2011 http://www.nytimes.com/2011/08/27/technology/man-accused-of-stalking-via-twitter15 16 claims-free-speech.html Federal interstate stalking statute, 18 U.S.C. §§ 2261A (2)(A) http://www.law.cornell.edu/uscode/text/18/2261A 17 US v Cassidy Ibid 20 Ibid 18 19 8 Twitter/Cyber/Stalking A few clear tests could distinguish cyberstalkers like William Cassidy, from a person engaged in genuine debate on religious issues, as Judge Roger W. Titus bizarrely casts him: Ulterior motive (seeking an intimiate partner relationship): Cassidy’s history and status, documented in the record, seeking an intimate relationship with his target Alyce Zeoli, which she refused Ulterior motive (employment): His status as a disgruntled former employee, dismissed; and Trend: His lack of a history, apart from this episode, of any interest or publication, serious or otherwise, in religious issues or public figures These three tests alone provide salient criteria which distinguish recognized religious debators like Martin Luther, for example, from abusers like William Lawrence Cassidy. 9 Twitter/Cyber/Stalking Law Enforcement: Practical considerations in investigating cyberstalking Sunday, May 23, 2010: "(A.Z.)'s attendants say she shits the bed regularly and pisses it when she's drunk: at the moment of death such events are quite telling.21" Sometimes lost as a footnote in this case, while central in others, can be law enforcement’s role in carrying forward Cassidy through its subpoena of Cassidy’s Twitter accounts. Detective Joseph Murphy of the Cambridge police explains the challenges for law enforcement in seeking and obtaining subpoenas for social media identities. “These investigations can be incredibly time-consuming in terms of tying an individual to an internet identity. The public also is not aware that law enforcement must compensate internet service providers and website providers for researching and providing identities, when subpeonas are granted and assented to.22” The public can sometimes have difficulty appreciating that proving identity in a court of law is far more involved than the Google searches people do every day. “We receive some complaints that do not meet the criteria for cyberstalking or are not credible. After establishing that a complaint is credible, which can be time-consuming, we have to investigate and draw up a subpoena. The officer must provide a judge a compelling reason to violate an individual’s privacy. Subpoenas are not routinely granted, especially if they are overly broad.23” Long before the First Amendment issues arose, police had to grapple with these fundamental privacy issues sometimes taken for granted. To the target, Alyce Zeoli, police were the good guys. At the same time, to the Electronic Frontier Foundation (“EFF”), the police were the bad guys, seeking to unjustly invade citizens’ privacy. From Twitter account kpcwatch, quoted in US v Cassidy Ruling Murphy, Detective Joseph, Cambridge Police Digital Crime Unit, Interview, February 24, 2012. 23 Ibid 21 22 10 Twitter/Cyber/Stalking Courts Definitions of cyberstalking Sunday, May 23, 2010: "what do you expect from the unwanted daughter of a weekend prostitute? 24" Murphy explained some of the dilemmas facing police as they look ahead to prosecutors’ options. Cassidy could have been prosecuted with the approach that his tweets placed her in “reasonable fear of the death of, or serious bodily injury,” the classic approach since the 1996 statute was enacted. David Ira Salem, Lead Attorney, Office of the United States Attorney, Greenbelt, MD, prosecuted the case for the United States. He comments, “the judge, in places in his decision, notes further directions prosecutors could consider to understand where the facts in other cases might meet constitutional criteria under the newer provisions of the law.” 25 Footnote 11 in the decision (not footnote 11 of this research paper) hints at the dilemma law enforcement may have faced when trying to decide whether to characterize the tweets as threats or harassment, and the charge: “11 In its brief, the Government seems to shift its theory of the case from one based on emotional distress to one based on threats: ‘Defendant in this case engaged in a continual course of conduct intended to threaten and intimidate A.Z. and KPC…’ Although "true threats" to another's physical safety are not protected, Watts v. United States, 394 U.S. 705, 89 S. Ct. 1399, 22 L. Ed. 2d 664 (1969), the Government, did not seek an Indictment on the basis that Defendant intentionally used the Internet to put A.Z. in reasonable fear of death or serious bodily injury. The 1996 Federal Stalking statute was amended in 2006, as illustrated in bold in the decision: Whoever— (2) with the intent— (A) to kill, injure, harass, or place under surveillance with intent to kill, injure, harass, or intimidate, or cause substantial emotional distress to a person in another State or tribal jurisdiction or within the special maritime and territorial jurisdiction of the United States; or… uses the mail, any interactive computer service, or any facility of interstate or foreign commerce to engage in a course of conduct that causes substantial emotional distress to that person or places that person in reasonable fear of the death of, or serious bodily injury to, any of the persons described in clauses (i) through (iii) of subparagraph (B) shall be punished as provided in Section 2261(b). (emphasis added)26 The 2006 amendments were the items Titus found unconstitutional. 24 From Twitter account kpcwatch, quoted in US v Cassidy Ruling Salem, David Ira, Lead Attorney, For USA, Plaintiff, Office of the United States Attorney, Greenbelt, MD. Interview with author, March 16, 2012 25 26 US v. Cassidy, ibid, Pub. L. No. 109-162, Title I, § 114(a), 119 Stat. 2690, 2987 11 Twitter/Cyber/Stalking American laws fall into three categories: cyberstalking, cyberbullying and cyberharassment. The National Conference of State Legislatures list over 100 relevant laws in the 50 states and Guam, besides the federal statute.27 Massachusetts has its own stalking laws.28 “Only Words” Sunday, May 23, 2010: "(A.Z.) is like a waterfront whore: her price goes down as the night wears on. 29" Catharine MacKinnon, the legal scholar, writes that “unwelcome sex talk is an unwelcome sex act. “30 She has noted that since 1978, courts have not been fooled by dressing up sexually abusive epithets as speech: “With a fine sense of reality, courts have not taken chanting ‘cunt’ at a working woman as conveying the idea “you have a vagina,” or as expressing eroticism, but rather as pure abuse. Of course, these concepts apply to civil, not criminal prosecutions. 31 ” Nevertheless, this “fine sense of reality” is missing from Judge Titus’s ruling. MacKinnon sums up the US Supreme Court’s seemingly inconsistent approach to sexually denigrating epithets like the ones with which Cassidy flooded Alyce Zeoli on Twitter: “When threatening, severe, or pervasive enough, it works to exclude and segregate and denigrate and subordinate and dehumanize, violating human dignity and denying equality of opportunity. The First Amendment has not even come up…First Amendment issues have not often been raised against racial harassment claims, even one in which the court found that the law requires employers to “take prompt action to prevent bigots from expressing their opinions in a way that abuses or offends their co-workers…32 “ Meritor: EEOC’s four factors Tuesday, June 22, 2010: "want it to all be over soon sweetie?33 " Meritor Savings Bank v. Vinson34, 1986, marked the change in the high court’s approach to sex talk as a sexual act rather than protected speech. With it, the EEOC outlined four factors to consider when determining if behavior was “severe or pervasive misconduct:” 1) the level of offensiveness of the unwelcome acts or words; 2) the frequency or pervasiveness of the offensive encounters; 27 State Cyberstalking, Cyberharassment and Cyberbullying Laws http://www.ncsl.org/issuesresearch/telecom/cyberstalking-cyberharassment-and-cyberbullying-l.aspx#Laws 28 http://www.malegislature.gov/Laws/GeneralLaws/PartIII/TitleI/Chapter265/Section43 29 From Twitter account kpcwatch, quoted in US v Cassidy Ruling as “religious criticism” 30 MacKinnon, 31 32 Catherine, Only Words, Cambridge, Mass. : Harvard University Press, 1993, p. 46 Ibid Ibid From Twitter account kpcwatch, quoted in US v Cassidy Ruling Meritor Savings Bank v. Vinson, 477 U.S. 57 (1986) MERITOR SAVINGS BANK v. VINSON No. 84-1979 US SUPREME COURT 477 U.S. 57; 106 S. Ct. 2399; 91 L. Ed. 2d 49; 1986 U.S. LEXIS 108; 54 U.S.L.W. 4703; 40 Fair Empl. Prac. Cas. (BNA) 1822; 40 Empl. Prac. Dec. (CCH) P36,159 33 34 12 Twitter/Cyber/Stalking 3) the total length of time over which the encounters occurred; and 4) the context in which the harassing conduct occurred. These rules could well be applied to Cassidy, a case with similarities to Meritor. Mechelle Vinson, a Black woman, experienced a situation not unlike Alyce Zeoli’s in many ways. Vinson was “sexually abused verablly and raped for two and a half years by her Black male bank supervisor.35” The US Supreme Court held ‘for the first time that employees have “the right to work in an environment free from discriminatory intimidation, ridicule, and insult.36’” The decision did not separate the verbal from the physcal environment, saying control the behaviour but protect the speech.37 ” The implication for Cassidy would be that sexually degrading tweets are a sex act, rather than free speech, if you consider their level of offensiveness and unwelcomeness, frequency, pervasiveness, length of time, and context. For while there were no physical acts of which the twitter speech was strictly a part, this approach recasts them as nevertheless acts of sexual degradation. Averting the Eyes- for some? Strict Scrutiny- for others? Monday, December 20, 2010: "RT @religionnews: Former cult member murdered in Texas: http://bit .ly/h2P6S8#religion #cults" All three of Titus’s findings rest upon the concept of “averting the eyes.” Of the first finding, the tweets could be considered a form of sexual abuse against AZ because she is female, not because she is a religious leader. The doctrine of “averting the eyes” is best understood in the context of two US Supreme Court cases, US v Playboy, 1999, and US v Stevens, 2010, an animal cruelty case. They both extend the doctine that laws that single out content, or are “content-based,” must be held to the higher standard of “strict scrutiny.” In Playboy, the Supreme Court sided with Playboy against cable operators, on the grounds that individuals offended by sexually explicit content could “avert their eyes38.” In Stevens, the Supreme Court held that laws against intentionally creating, depicting or posessing depictions of animal cruelty “did not serve a compelling state interest,” based on Playboy. 35 MacKinnon, p. 48 36 Ibid, p. 48 Ibid, p. 48 37 “In Playboy Entertainment Group, the Supreme Court held that the Telecommunications Act's "signal bleed" provision, requiring cable operators either to scramble sexually explicit channels in full or limit programming on such channels to certain hours, amounted to a content-based restriction. 529 U.S. at 811-812. The provision "single[d] out particular programming content for regulation" as well as "particular programmers," applying by its terms only to channels "primarily dedicated to sexuallyoriented programming." 47 U.S.C. § 561(a) (1994 Supp. III.). Id. at 806. Because the provision focused only on the content of the speech and the direct impact that speech had on viewers, the provision was a content-based restriction.” US v Cassidy, Ibid 38 13 Twitter/Cyber/Stalking In US v. Stevens39, the Supreme Court affirmed the Third Circuit's decision holding that “a contentbased restriction of protected speech — i.e. a federal statute that criminalized the intentional creation, sale or possession of a depiction of animal cruelty — did not serve a compelling state interest on the basis that these types of content-based restrictions of protected speech are presumptively invalid. 130 S.Ct. 1577, 1584, 176 L. Ed. 2d 435 (2010). Because the Government's interest in criminalizing speech that inflicts emotional distress is not a compelling one, the statute does not survive strict scrutiny.” Judge Titus defines Twitter in terms familiar to him, which do not really apply to Twitter. He attempts to distinguish in a black and white manner whether Twitter is either a public bulletin board, on the one hand, or a communications method, on the other. He states: “Whether couched in terms of the Internet or Colonial bulletin boards, there is one consistent aspect of both eras. One does not have to walk over and look at another person's bulletin board; nor does one Blog or Twitter user have to see what is posted on another person's Blog or Twitter account. This is in sharp contrast to a telephone call, letter or e-mail specifically addressed to and directed at another person, and that difference, as will be seen, is fundamental to the First Amendment analysis in this case.” “The Supreme Court affirmed the Third Circuit's decision holding that a content-based restriction of protected speech — i.e. a federal statute that criminalized the intentional creation, sale or possession of a depiction of animal cruelty — did not serve a compelling state interest on the basis that these types of content-based restrictions of protected speech are presumptively invalid. 130 S.Ct. 1577, 1584, 176 L. Ed. 2d 435 (2010). Because the Government's interest in criminalizing speech that inflicts emotional distress is not a compelling one, the statute does not survive strict scrutiny.” US v Cassidy 39 14 Twitter/Cyber/Stalking Twitter is a modern public bulletin board? When in 1517 Martin Luther nailed his 95 theses to the church door in Wittenburg, Germany (possibly apocryphally, or circulated them in the town square), he embodied the concept of a “public bulletin board.” Twitter’s @function, which both names and directly communicates with a user at the same time, and the ease of making thousands of postings that then surround the target’s identity differentiate Twitter from the Wittenburg church door. It is unknown whether Judge Titus himself has a Twitter account. His familiarity in general with the internet seems doubtful. Comfort and familiarity with technology, as well as the fairly new concepts of stalking in general and cyberstalking in particular, play a role in court rulings. Acknowledging Lampley40, 1978, that finds against using the telephone to harass and threaten, he dismisses it: “That case is inapposite because A.Z. had the ability to not look at the Defendant's Blog or his postings on Twitter.” It is interesting to contrast this approach when thinking about the civil (i.e. non-criminal) case, Remsberg v. Docusearch. In this 1999 case, target Amy Boyer was murdered by Liam Youens, a relative stranger who had possibly met her briefly years before. Youens documented his intensive physical stalking in a website prior to the murder. He committed suicide at the time of the murder and so 40 “But see United States v. Lampley, 573 F.2d 783, 787 (3d Cir. 1978) (stating that with respect to a statute that prohibits the intentional use of a telephone to harass and threaten, the "Congress had a compelling interest in the protection of innocent individuals from fear, abuse, or annoyance at the hand of persons who employ the telephone not to communicate, but for other unjustifiable motives.) That case is inapposite because A.Z. had the ability to not look at the Defendant's Blog or his postings on Twitter.” 15 Twitter/Cyber/Stalking was never prosecuted. He obtained her home and work addresses from an information service that was later successfully prosecuted in the actual civil case. This case first linked the use of technology with stalking in the public’s awareness. Ostensibly about private investigator liability and privacy, Remsberg has set impactful precedents in those areas. Remsberg is fundamentally one of the more notorious stalker cases. Amy Boyer, by all accounts, was unaware of Youens’ internet blog documenting his stalking, and so suffered no emotional distress from it. Yet, if she were aware, could she have simply ignored it? Would she have actually received assistance, and would Youens have been held accountable? That is unclear. It is unclear whether the communications in the website would be ruled a clear enough “threat” for police or courts to take action under the rubric of serious, imminent, physical harm, or threats, two unprotected areas of speech. What if Amy Boyer had been a religious leader, public figure, or both, like Alyce Zeoli? Would Youens have been allowed to continue his stalking until her death? Possibly, it seems, if Judge Titus were presiding, on the somewhat specious grounds that Youens’ blog was like a public bulletin board from which she could avert her eyes. At least, Remsberg makes it clear that in 1999 many people not only successfully averted their eyes from public bulletin board-type postings about themselves, they were unaware of them, probably as Titus is unaware of Twitter today. The ease of posting, facilitating more frequent postings, compared with the barriers to constant daily postings on a town bulletin board, are a fundament difference of Twitter. Titus’s analogy serves to minimize the impact of Twitter on Alyce Zeoli, compared to a Colonial bulletin board. Tweets “religious” in nature Tuesday, November 30, 2010: "@(A.Z.) sure hope you weren't referring to me as a felon, bitch, because as I'm sure your lawyer has informed you that could cost U money 41." Judge Titus apparently “averted” his eyes from the thousands of tweets that were sexual, threatening and intimidating in nature, and the absence of any serious religious content or arguments. He states: “Mr. Cassidy's Tweets and Blog posts about A.Z. challenge her character and qualifications as a religious leader… And, while Mr. Cassidy's speech may have inflicted substantial emotional distress, the Government's indictment here is directed squarely at protected speech: anonymous, uncomfortable Internet speech addressing religious matters.” The tweets seem more accurately understood as a form of sexual abuse against AZ because she is female, not because she is a religious leader. Cassidy sought an intimate relationship with his target, which she refused, and she also fired him from his position in the chruch. These facts would fall under EEOC’s rule four, context, for determining the nature of the harassment. It would be more accurate to say Cassidy is engaged in stalking, and that his target happens to be a religious leader. It is her status as a woman that he targets. Her status as a religious leader and public figure seems incidental. 41 From Twitter account kpcwatch, quoted in US v Cassidy 16 Twitter/Cyber/Stalking An element missing from Titus’s logic is an acknowledgement that a public religious leader like Alyce Zeoli could EVER be a target of illegal harassment. The decision seems to indicate that if a target, usually but not always female, is a public figure or a religious leader or both, then harassment is motivated by those factors. Illegal harassment of a target who happens to also be a religious leader and public figure, it seems to say, and cannot possibly be caused by the desire for power and control over women that has been found to motivate cyberstalking and other forms of illegal harassment.42 Cyberstalking law “serves no compelling interest” Judge Titus denies “the Government…has a compelling interest in protecting victims from emotional distress sustained through an interactive computer service.” He cites the decision in Playboy Entertainment Group, 529 U.S. at 813, which “underscores the fact that the Government's interest is not a compelling one.” Rehashing the Twitter is just-a-town-bulletin board theory, he states, “A.Z. had the ability to protect her "own sensibilities simply by averting her eyes from the Defendant's Blog and not looking at, or blocking his Tweets.” 43 “Freewheeling Authority” - Protected and Unprotected Speech It is relevant to review just what Judge Titus views as compelling interests and exceptions to protected speech. He enumerates six categories in his decision, finding Cassidy’s tweets fall outside all of them. (a) obscenity (1957), (b) defamation (1952), (c) fraud (1976), (d) incitement (1969), (e) true threats (1969), and (f ) speech integral to criminal conduct (1949). He quotes US v. Stevens, that "depictions of animal cruelty" remain protected because there is no "freewheeling authority to declare new categories of speech outside the scope of the First Amendment." 44 Having first found that the speech is protected as religious speecch, Titus now also finds the obverse, that it is not unprotected: “Applying these standards, it is clear that the Government's Indictment is directed at protected speech that is not exempted from protection by any of the recognized areas just described.” 45 “ Under the First Amendment, ‘Congress shall make no law... abridging the freedom of speech.’ U.S. Consti.amend. I. From our nation's founding, there has been a tradition of protecting anonymous Adams, David, Why Do they Kill? Men Who Murder their Intimate Partners, Nashville: Vanderbilt University Press, 2007, p. 131 42 Ibid US v. Stevens, 130 S.Ct. 1577, 1586, 176 L. Ed. 2d 435 (2010), quoted in US v. Cassidy 45 US v Cassidy 43 44 17 Twitter/Cyber/Stalking speech, particularly anonymous political or religious speech…Moreover, the First Amendment protects speech even when the subject or manner of expression is uncomfortable and challenges conventional religious beliefs… Indeed, the Supreme Court has consistently classified emotionally distressing or outrageous speech as protected, especially where that speech touches on matters of political, religious or public concern. This is because "in public debate our own citizens must tolerate insulting, and even outrageous, speech in order to provide 'adequate 'breathing space' to the freedoms protected by the First Amendment. " 46 Civil Liberties Groups In Cassidy, the ACLU and the EFF defended Cassidy. It is unclear whether they opposed the initial subpoena ordering the release of Twitter records. They frame Cassidy as a freedom of speech case, analagous to Wikileaks. Certainly EFF is techology-savvy, so its embrace of the Twitter-as-Colonialartifact-analagous argument is curious. EFF essentially argues in Cassidy that new technology, Twitter, is analogous to old technology, a Colonial bulleting board. In Wikileaks, EFF argues the opposite, that Twitter is subtly non-analogous to old technology (telephone) in that its metadata contains IP addresses. Conclusion Titus’s decision in Cassidy, while in a different context in many ways, nevertheless ignores almost 30 years of sexual harassment case law. More to the point, Titus erroneously analogizes Twitter technology to a colonial town bulletin board, mischaracterizes sexually abusive tweets as religious, and dismisses the protection from severe emotional distress as “not compelling,” along with depiction of cruelty to animals. Lack of experience and understanding of Twitter technology results in minimizing its impact, and lack of experience and understanding of sexual degradation minimizes its impact as well, we may conclude from Titus’s decision. 46 Ibid 18 Twitter/Cyber/Stalking Exmination of this Boston University video revealed US Army Private Bradley Manning attending a hackerspace opening party days before he allegedly released Collateral Murder and other material. The BU “BUILDS” logo is visible in the background. US v Wikileaks Overview – Strange Bedfellows Unlike in US v Cassidy, in US v. Wikileaks, Appelbaum, Gonggrijp, Jonsdottir, and Twitter, law enforcement, prosecutors and the courts are on the same side of the argument. Law enforcement found itself equally investigating Cassidy and the Wikileaks defendants. Likewise, civil liberties groups equally opposed Twitter subpoenas and criminal charges for both sets of defendants. The Electronic Frontier Foundation (EFF) and the ACLU both filed amicus curiae briefs on behalf of Cassidy, angering victims rights groups. And, EFF and ACLU are currently defending the Wikileaks defendants, angering law enforcement. Wikileaks supporters view the US government and US Army as the bad actors. Through this prism, shooting unarmed civilians and children from a helicopter while laughing at their victims’ attempts to crawl away falls into the category of William Cassidy’s allleged crimes. However, they reposition themselves as victims (of treason), and reframe Wikileaks in Cassidy’s defendant’s role. Surely the US government’s judicial arm’s strict scrutiny in Cassidy, and the court’s minimizing misunderstanding of technology, would be similarly reflected in Wikileaks. The court might, by that reasoning, find US treason laws unconstitutional, as a speech restriction that serves no “compelling interest.” 47 However, when another branch of the US government, the prosecutor, takes a similar stance to that in Cassidy, the US judicial branch diverges from Cassidy and views Wikileaks speech as unprotected. 47 US v. Cassidy 19 Twitter/Cyber/Stalking Applying the proposed Cassidy tests to Wikileaks, the result is that unlike Cassidy, Wikileaks defendants clearly pass those tests: Ulterior motive (seeking an intimiate partner relationship): Wikileaks defendants have none and pass this test Ulterior motive (employment): Wikileaks defendants have none and pass this test Trend (of concern about political issues): Wikileaks defendants have a trend and pass this test U.S. Army Private Bradley Manning, who provided Collateral Murder and other material to Wikileaks, did so immedaitely after visiting a hackerspace at Boston University in 2010.48 He was hosted by BU and MIT student David House, who, according to Democracy Now!, “co-founded the Bradley Manning Support Network after…Manning was arrested for allegedly releasing classified U.S. military documents to WikiLeaks. House refused to testify last month in Alexandria, Virginia, before a grand jury hearing on WikiLeaks and the disclosure of thousands of classified U.S. diplomatic cables.49” House, with the ACLU, in May 2011 filed a lawsuit against the US Homeland Security Department, who siezed his laptop at the border. Exmination of a Boston University video revealed US Army Private Bradley Manning attending a hackerspace opening party days before he allegedly released Collateral Murder and other material. The BU “BUILDS” logo is visible in the background. US v Wikileaks also involves subpoenas of Twitter account information, similar to Cassidy. Wikileaks raises the question, do governments conceal wrongdoing from their citizens? If a government illegally conceals its own wrongdoing, is its investigation of those who shed light on injustice, persecution? How does that differ from investigating William Cassidy? When Wikileaks released Collateral Murder,50 it seemed to reveal American wartime atrocities in Iraq the US government had attempted to keep secret. When the US government investigated those it believed were responsible, the hacker group Anonymous retaliated. By some accounts, members of Anonymous or those claiming links to Anonymous may have also committed their own “collateral” crimes. The Boston Globe reported on December 26, 2011 that “a hacking movement calling itself Anonymous said yesterday that it stole thousands of credit card numbers and other client information from a US security think tank…One hacker said the goal of the attack on Stratfor 48 Zetter, Kim , Boston Globe, 5/20/2011, Video Captures Bradley Manning With Hacker Pals at Time of First Leaks, http://www.wired.com/threatlevel/2011/05/bradley-manning-in-boston 49 Goodman, Amy, Democracy Now! July 11, 2011 Interview with David House: Exclusive: David House on Bradley Manning, Secret WikiLeaks Grand Jury, and U.S. Surveillance http://www.democracynow.org/2011/7/11/david_house_on_bradley_manning_secret 50 http://collateralmurder.com 20 Twitter/Cyber/Stalking Global Intelligence was to pilfer funds from individuals’ accounts to give away as Christmas donations, and some victims confirmed that unauthorized transactions were made using their credit cards. ” 51 Law Enforcement and the Courts Unlike in US v Cassidy, in US v. Wikileaks, law enforcement and the courts are on the same side of the argument. Law enforcement’s role is to investigate those who, it asserts, may have assisted the relase of classified information. When the motions were unsealed, however, they revealed that Ms. Jondottir, a member of the Icelandic Parliament, was charged with “providing assistance to Wikileaks in connection with the release of a video showing US soldiers shoointg civilians in Baghdad from a helicopter” 52 (the Collateral Murder video). Police and prosecution approach these defendants similarly to their approch in Cassidy, seeking to revel information related to the online identities and Twitter accounts. Investigators used the ECPA-Stored Communications Act, 18 USC 270353, to seek the Twitter records. Civil Liberties Groups – IP Addresses are not Telephone Numbers The Security and Privacy experts and EFF oppose law enforcement’s efforts to subpoena Twitter logs that include IP addresses, arguing that IP addresses are not analogous to telephone numbers, and reveal considerably more location-related information than telephone numbers. In this sense, EFF take an opposite stance than that in Cassidy. In Wikileaks, EFF points out subtle differences between new technology (Twitter metadata) and old technology (telephone records) that might otherwise escape the notice of a non-technology-savvy judiciary: the existence of IP address. In Cassidy, EFF seemed to deny the subtle or not-so-subtle differences between old and new technology. In their amicus curiae brief, security experts laid out the dangers of rouintinizing Twitter subpoenas: “Judge Buchanan rejected petitioners’ argument that they had a reasonable expectation of privacy regarding Twitter logs containing their IP addresses, [ruling]: “In an attempt to distinguish the reasoning of Smith v. Maryland and Bynum, petitioners contend that Twitter users do not directly, visibly, or knowingly convey their IP addresses to the website, and thus maintain a legitimate privacy interest. This is inaccurate. Before creating a Twitter account, readers are notified that IP addresses are Vinograd, Cassandra, Boston Globe, 12/26/2011, Hackers hit security firm and donate stolen funds http://articles.boston.com/2011-12-26/world/30556992_1_credit-card-anonymous-tweeted-clientlist 51 In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G; and BirgittaJ, US v. Wikileaks, APPELBAUM, GONGGRIJP, JONSDOTTIR, and TWITTER, Appeal: 11-5151 Document: 19, Date Filed: 01/20/2012, Page: 1 of 7. In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G; and BirgittaJ Exhibit B, Case 1:11-dm-00003-TCB Document 32-2 Filed 02/14/11 Page 1 of 5 52 53 18 USC § 2703 - REQUIRED DISCLOSURE OF CUSTOMER COMMUNICATIONS OR RECORDS http://www.law.cornell.edu/uscode/text/18/2703 21 Twitter/Cyber/Stalking among the kinds of "Log Data" that Twitter collects, transfers and manipulates. See Warshak, 2010 (recognizing that internet service providers’ notice of intent to monitor subscribers' emails diminishes expectation of privacy). Thus, because petitioners voluntarily conveyed their IP addresses to Twitter as a condition of use, they have no legitimate Fourth Amendment privacy interest. “ 54 A footnote below that paragraph added: “At the hearing, petitioners suggested that they did not read or understand Twitter's Privacy Policy, such that any conveyance of IP addresses to Twitter was involuntary. This is unpersuasive. Internet users are bound by the terms of click-through agreements made online. A.V. ex rel. Vanderhye v. iParadigms, LLC, 544 F.Supp.2d 473,480 (E.D. Va. 2008) (finding a valid "clickwrap" contract where users clicked "I Agree" to acknowledge their acceptance of the terms), aff'd A.V. ex rel v. iParadigms, LLC, F.3d 630, 645 n.8 (4th Cir. 2009). By clicking on "create my account", petitioners consented to Twitter's terms of use in a binding "clickwrap" agreement to turn over to Twitter their IP addresses and more. “ 55 54 In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G; and BirgittaJ, US v. Wikileaks, APPELBAUM, GONGGRIJP, JONSDOTTIR, and TWITTER, Appeal: 11-5151 Document: 19, Date Filed: 01/20/2012, Page: 1 of 7. In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G; and BirgittaJ In re § 2703(d) Order; 10GJ3793., 2011 WL 900120, at 13 (E.D. Va. Mar. 11, 2011) 55 Wikileaks, Amicus Curiae Brief, Security Experts 22 Twitter/Cyber/Stalking The order summarized that “[b]efore creating a Twitter account, readers are notified that IP addresses are among the kinds of 'Log Data' that Twitter collects, transfers and manipulates.” Conclusion Regarding freedom of speech, when investigating itself and prosecuting those critical of itself, the US government, through its judicial arm, applies a “compelling interest” standard to Wikileaks that it denies Alyce Zeoli in Cassidy. Regarding technology, civil liberty defender EFF takes an opposite view to Cassidy, where it argues that old bulletin board and new Twitter technology are analogous. In Wikileaks it argues new technology, Twitter, is non-analogous to old technology (telephone records.) Further, In Cassidy, civil liberties groups argued that Twitter is not a communications technology like that covered by CALEA. In Wikileaks, the US treats Twitter as if it is a communications technology, like the telephone. It is true that the nature of the information Twitter logs about users, like IP address, may differ substantially from that provided by other communications technology. Law enforcement, in this case, argues the opposite: that old and new technology are essentially similar for subpoena purposes. The economic wording of court decision leaves its judicial view unclear, while overruling protection of Twitter records. 23 Twitter/Cyber/Stalking US v @GuidoFawkes-Occupy Boston Overview Occupy Boston intersected Wikileaks when Anonymous hacked the Boston Police Department website in 2011.56 Anonymous stated it performed this hack in retaliation for police tactics towards Occupy protestors. Shortly thereafter, Suffolk County DA Daniel Goldberger issued a subpoena for Twitter accounts ostensibly linked to Occupy Boston and Wikileaks. It is unknown whether subpoena targets are under investigation for potential criminal activity such as hacking to obtain or use credit card information, for example. Possibly, in the course of engaging in or claiming to engage in political activity or protected First Amedment speech related to the Occupy Boston movement, protesetrs committed crimes. Police have stated the targets are linked “only tangentially” 57 to the political movement. Law Enforcement In US v @GuidoFawkes - Occupy Boston, the police were both the targets (victims) and the investigators. The cybercrime is unknown as the records are sealed, but may have included hacking their website and possible crminal activity related to credit card fraud. The cyberinvestigation centered once again on subpoenas of Twitter accounts. According to the subpoena, Sgt. Det. Joseph Dahlbeck of the Boston Police used the ECPA-Stored Communications Act, 18 USC 2703, to seek the Twitter records, the same statute that was used in Wikileaks. Finocchiaro, Peter, Huffington Post, 2/3/2012, Anonymous Hacks Boston Police Department Website Over December Occupy Eviction 56 http://www.huffingtonpost.com/2012/02/03/anonymous-boston-police-occupy-wall-street_n_1252718.html 57 Ibid 24 Twitter/Cyber/Stalking However, additionally, he used the Massachusetts law, MGL 271-17B, 58 which encompasses “Crimes against Public Policy.” 59 Harkening back to Katz60, 17B falls under “Places for registering bets or dealing in pools,” right after “Telephones – use for gaming purposes.” It is, “Use of electronic communications in ongoing criminal investigations – subpoena of records.” Civil Liberties Groups – “Because the Rights You Save May Be Your Own” The ACLU has defended @GuidoFawkes, opposing the secrecy of the charges and subpoenas and arguing the privacy issues. Courts On February 27, 2012, Superior Court Judge Frances McIntyre ruled in large part against the ACLU, Twitter and @GuidoFawkes. 61 He ordered62 that all information associated with this account be handed over to ADA Benjamin Goldberger and the Boston Police investigator, Sgt. Det. Joseph Dahlbeck, by email to benjamin.goldberger@state.ma.us and DahlbeckJ.bpd@cityofboston.gov . Conclusion This case has similarities to Cassidy in the sense that the defendant may be suspected of criminal activity committed at the same time as, or ostensibly in addition to, protected free speech. Since the file is sealed, it is difficult to know the exact nature of the charges. But it is clear that the court is generally siding with law enforcement and the prosecution on first amndment and technology issues, and against civil liberties groups on those issues. 58 Use of Electronic Communications records in ongoing criminal investigations, http://www.malegislature.gov/Laws/GeneralLaws/PartIV/TitleI/Chapter271/Section17B 59 Ibid v. Katz, 389 U.S. 347 88 S. Ct. 507; 19 L. Ed. 2d 576; 1967 U.S. LEXIS 2 60 US 61 ACLU website, Sunlight is a disinfectant--and this law stinks http://www.aclum.org/on_liberty_3.2.12 Order, 2-27-2012, no case name or number known to be assigned, case is sealed http://aclum.org/sites/all/files/legal/twitter_subpoena/suffolk_order_to_twitter_20120223.pdf 62 25 Twitter/Cyber/Stalking Conclusion These four recent cases involve the use of Twitter to commit alleged crimes. They have drawn differing responses from law enforcement and the courts in regards to Twitter subpoenas. And, civil liberties groups have chosen each of these cases to defend their perception of social justice and represent their views of technology. It seems likely, considering the rapid rate of change of technology and the glacial rate of change of judges, that uninformed, inexperienced technology decisions will unfortunately continue to plague us for many years. Civil liberties groups like EFF who seek to educate the judiciary do so, it seems selectively, and with limited success. Lack of judicial experience and understanding of sexual degradation of women may similarly plague judicial opinions until victims find a way to similarly educate them. 26 Twitter/Cyber/Stalking Appendices Brief - US v. Cassidy 1. Case ID: US v. William Lawrence Cassidy https://www.eff.org/sites/default/files/filenode/cassidy-order-121511.pdf, Case 1:11-dm-00003-TCB -LO Document 85 Filed 11/10/11 Page 1 of 60 PageID# 1023, US District Court For The District Of Maryland, 2011, No. TWT 11-091 (D. Md. Dec. 15, 2011) US v. William Lawrence Cassidy, Defendant. Criminal Case No. RWT 11-091 US District Court For The District Of Maryland 2011 U.S. Dist. LEXIS 145056; 40 Media L. Rep. 1001 2. Facts: William Cassidy was charged with committing the crime of cyberstalking by violation of federal interstate stalking statute, 18 U.S.C. §§ 2261A (2)(A) through the use of Twitter and blogs. He sent over 8,000 tweets regarding a former object of his romantic affection who had spurned him, who happened to be a Bhuddist monk leader. 3. Procedural History: US District Court For The District Of Maryland, Indictment dismissed 4. Issue: Was the content of the speech protected by the First Amendment? 5. Holding: Yes, it was protected 6. Rule: Under the First Amendment "Congress shall make no law... abridging the freedom of speech." 7. Reasoning: “…the Government's Indictment here is directed squarely at protected speech: anonymous, uncomfortable Internet speech addressing religious matters.” The judge concluded that the tweets were speech addressing religious matters 8. Conclusion/Judgment/Order of the Court: Criminal indictment dismissed 27 Twitter/Cyber/Stalking Brief- US v Mr. X - In Re Grand Jury Subpoena No. 11116275 (Michelle Bachmann) 1. Case ID: Us v Mr. X - In Re Grand Jury Subpoena No. 11116275 (Michelle Bachmann), NO. 11116275,Misc. No. 11-527 (RCL), UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA, 2011 U.S. Dist. LEXIS 153989, February 23, 2012, Filed 2. Facts: This matter arises out of Mr. X's professed desire to engage in sadomasochistic activities with Congresswoman and presidential candidate Michele Bachmann. Mr. X posts to Twitter. The government is investigating Mr. X for having made a prima facie threat of violence addressed to a major presidential candidate. The government has a compelling interest in pursuing that investigation, and Mr. X's identity must be known for the grand jury to make an informed probable cause determination. 3. Procedural History: The government is investigating Mr. X for having made a prima facie threat of violence addressed to a major presidential candidate. The government has a compelling interest in pursuing that investigation, and Mr. X's identity must be known for the grand jury to make an informed probable cause determination. 4. Issues: “Mr. X has a right under the First Amendment to post on the Internet, and to do so anonymously. See McIntyre v. Ohio Elections Commission, 514 U.S. 334, 357, 115 S. Ct. 1511, 131 L. Ed. 2d 426 (1995) ("Anonymity is a shield from the tyranny of the majority."); Reno v. ACLU, 521 U.S. 844, 870, 117 S. Ct. 2329, 138 L. Ed. 2d 874 [*6] (applying the First Amendment fully to the Internet); see also Sinclair v. TubeSockTedD, 596 F. Supp. 2d 128, 131 (D.D.C. 2009). Accordingly, the grand jury may not subpoena Twitter to gain information regarding Mr. X's identity unless the government can show "a compelling interest in the sought-after material" and "a sufficient nexus between the subject matter of the investigation and the information they seek." 5. Holdings: Mr. X’s tweets must be taken as “true threats” 6. Rule: compelling interest, true threats, 7. Reasoning: Mr. X’s tweets must be read literally. The US government has a “compelling interest” in investigating threats against a presidential candidate. 8. Conclusion/Judgment/Order of the Court: It is therefore hereby ORDERED that Mr. X's Motion to Intervene is GRANTED; and it is further ORDERED that Mr. X's Motion to Quash is DENIED. 9. Law: Investigators used the ECPA-Stored Communications Act 18 USC 2703 to seek the Twitter records, 18 U.S.C. § 875(c), cyberstalking, which criminalizes the transmission "in interstate or foreign commerce" of "any communication containing any threat to kidnap any person or any threat to injure the person of another . . . ." The subpoena at issue identified a possible violation of 18 U.S.C. § 115, 4th Amendment 28 Twitter/Cyber/Stalking Brief- Remsberg v Docusearch 1. Case ID: Helen Remsberg, Administratrix of the Estate of Amy Lynn Boyer v. Docusearch, No. 2002-255, Supreme Court Rule of New Hampshire, 149 N.H. 148; 816 A.2d 1001; 2003 N.H. LEXIS 17 2. Facts: Liam Youens murdered Amy Boyer on October 15, 1999 after stalking her for years. He then committed suicide. Boyer’s heirs sued Docusearch, a private investigative agency, for providing information leading to her murder. 3. Procedural History: Supreme Court of New Hampshire. EPIC filed an amicus curiae brief on behlf of Remsburg. 4. Issues: (1) Did the broker who sold information to a client pertaining to a person have a cognizable legal duty to that person with respect to the sale of the information? (2) If the broker obtained the person's social security number (SSN) from a credit reporting agency as a part of a credit header without the person's knowledge or permission and sold the number to a client, then did the person have a cause of action for intrusion upon her seclusion against the broker for damages caused by the sale of the information? (3) If the broker, by a pretextual telephone call, obtained the person's work address and sold the address to a client, was there a cause of action for intrusion? (4) Did the person have a commercial appropriation cause of action for damages caused by the sale of the SSN or work address? (5) If the broker obtained the person's work address by a pretextual telephone call and sold the information, then was the broker liable under N.H. Rev. Stat. Ann. § 358-A to that person for damages caused by the sale of the information. Was a duty owed to persons foreseeably endangered by conduct that created an unreasonable risk of criminal misconduct? 5. Holdings: “A duty was owed to persons foreseeably endangered by conduct that created an unreasonable risk of criminal misconduct.” 1 – General responsibility to person who info was sold- Yes 2 - Selling SSN from credit reporting agency is a cause for action- Yes 3 - Pretexting is a cause for action for intrusion – No 4 - Commercial appropriation cause of action for damages from sale of SSN – No 5- Pretexting creates liability for damages – Yes 6. Rule: 7. Reasoning: 1- “The threats posed by stalking and identity theft lead us to conclude that the risk of criminal misconduct is sufficiently foreseeable so that an investigator has a duty to exercise reasonable care in disclosing a third person's personal information to a client. And we so hold. This is especially true when, as in this case, the investigator does not know the client or the client's purpose in seeking the information.” 2- A SSN is something secret, secluded or private 29 Twitter/Cyber/Stalking 3- Is a work address is something secret, secluded or private 4- The benefit derived from the sale in no way relates to the social or commercial standing of the person whose information is sold 5 - the investigator's [***22] pretextual phone call occurred in the conduct of trade or commerce within the State 8. Conclusion/Judgment/Order of the Court: “The supreme court answered the questions and remanded the case.” 30 Twitter/Cyber/Stalking Brief – US v Wikileaks 1. Case ID: US v. Wikileaks, Appelbaum, Gonggrijp, Jonsdottir, and Twitter, Appeal: US Court Of Appeals for the Fourth Circuit US District Court, on Appeal from the US District Court For The Eastern District Of Virginia 11-5151 Document: 19, Date Filed: 01/20/2012, Page: 1 of 7. In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G; and BirgittaJ https://www.eff.org/node/58368 IN RE APPLICATION OF THE UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO 18 U.S.C. § 2703(d) Misc. No. 1:11-DM-3,No. 10-GJ-3793,No. 1:11-EC-3 UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA, ALEXANDRIA DIVISION 2012 U.S. Dist. LEXIS 1059 January 4, 2012, Decided, January 4, 2012, Filed 2. PRIOR HISTORY: In re Application of the United States, 2011 U.S. Dist. LEXIS 130171 (E.D. Va., Nov. 10, 2011) [As of publication date, the case is still in very preliminary pre-trial stages. These documents should be discoverable in the trial papers of this case.] https://www.eff.org/cases/government-demands-twitter-records 2. Facts: The facts are unknown as the court records are sealed by request of the government. Basically, the U.S. Department of Justice asserts it needs the Twitter records of numerous individuals in connection with its attempts to prosecute the Wikileaks case. One of the individuals whose Twitter recors it seeks is Birgitta Jonsdottir, a member of the Icelandic Parliament. Attempts to unseal the records have been the source of over 30 motions since 2011. The Electronic Frontier Foundation (EFF)’s website states that it “and the ACLU represent, in response to the efforts by the to seek information and records about her online activities as part of the investigation into Wikileaks.” 3. Procedural History: Before the US Court Of Appeals for the Fourth Circuit US District Court, on Appeal from the US District Court For The Eastern District Of Virginia. The EFF and the ACLU filed two motions in federal court on January 26 2011: A request to unseal the still-secret court records of the government's attempts to collect private records from Twitter Inc. as well as other companies who may have received demands for information from the government. A motion seeking to overturn the court Order issued on December 14, 2010, requiring Twitter to hand over private records about some of its users including Jonsdottir, Gonggrijp, and Appelbaum. 4. Issues: 31 Twitter/Cyber/Stalking a. Did the district court erroneously continue to seal judicial orders requiring the disclosure of information about Movants’ Internet communications where the Magistrate and the government previously conceded that unsealing an order to Twitter was in the best interest of the government’s investigation and where the government failed to establish that disclosing any other judicial orders or related motions, redacted if necessary, would cause any harm to its investigation sufficient to overcome the significant public interest in access to these judicial orders and motions b. Did the district court err in holding that there need not be a public docket sheet identifying the name and date of any judicial orders to companies other than Twitter and any related court filings? 5. Holding: Awaited 6. Rule: Awaited 7. Reasoning: Awaited 8. Conclusion/Judgment/Order of the Court: Awaited 9. Law: Investigators used the ECPA-Stored Communications Act 18 USC 2703 to seek the Twitter records 32 Twitter/Cyber/Stalking 33 Twitter/Cyber/Stalking Brief- House v Napolitano (Wikileaks) 1. Case ID: DAVID HOUSE v JANET NAPOLITANO, UNITED STATES DISTRICT COURT FOR DISTRICT OF MASSACHUSETTS Case 1:11-cv-10852-DJC Document 22 Filed 12/06/11 Page 1 of 2, https://www.aclu.org/files/assets/house_surreply.pdf 2. Facts: David House, a Computer Science undergraduate at Boston University, hosted an event at Bosto University to open the BU-ILDS “hackerspace” for computer science concentrators and colleagues. US Army Private Bradley Manning attended the event and was videotaped there. Three days later, he released “Collateral Murder” and the Wikileaks material. After Manning’s arrest. David House started the Bradley Mannig Support Fund. When David House re-entered the US after a brief trip in 2011, Homeland Security searched him and confiscated his laptop. Represnted by the ACLU, he sued for the return of his laptop, and the vilation of his first and fourth amendment rights. 3. Procedural History: House sued in May 2011, case is ongoing. 4. Issues: First Amendment, government secrecy, Fourth Amenment, protected politicacl speech. 5. Holdings: none yet 6. Rule: First and Fourth Amenments 7. Reasoning: none yet 8. Conclusion/Judgment/Order of the Court: none yet 34 Twitter/Cyber/Stalking Brief- US v Occupy Boston 2. Case ID: US v @GuidoFawkes - None known to be assigned, records are sealed. Ongoing active investigation by Boston Police Department. DA Suffolk County of theCommonwealth of Massachusetts, Administrative Subpoena, Commonwealth of MA vs. Twitter aka Trust & Safety, 12/14/2011, seeking “all available subscriber information” for Twitter accounts or hashtags @pOisAnON, Guido Fawkes, @OccupyBoston, #BostonPD or #dOxcak3 http://www.scribd.com/doc/76393350/Subpoena-on-p0isAn0n-OccupyBoston-BostonPD-d0xcak3 2. Facts: Unknown, as record is sealed. Boston Police had arrested members of Occupy Boston while they camped in Boston on public property in 2011. The ACLU defended Twitter account holders, seeking to unseal the records and oppose the subpoena. 3. Procedural History: Suffolk County DA sought disclosure of Twitter information through this administrative subpoena. 4. Issues: First Amendment, government secrecy 5. Holdings: none yet 6. Rule: n/a 7. Reasoning: n/a 8. Conclusion/Judgment/Order of the Court: Motion to unseal granted as to subpoenas which had already been disclosed to the public, and denied with respect to the rest of the case. Motion to deny subpoena granted as to Twitter accounts or hashtags @OccupyBoston, #BostonPD or #dOxcak3 and granted for @pOisAnON and Guido Fawkes 9. Law: Investigators used the ECPA-Stored Communications Act 18 USC 2703 to seek the Twitter records 35 Twitter/Cyber/Stalking Bibliography Interviews Murphy, Detective Joseph, Cambridge Police Digital Crime Unit, Interview, February 24, 2012. Salem, David Ira, Lead Attorney, For USA, Plaintiff, Office of the United States Attorney, Greenbelt, MD. Interview with author, March 16, 2012 Graphics Collateral Murder, screenshots from video, http://collateralmurder.com, US Army helicopter black box recording, Iraq, 2007 Diamante, Vincent (Creative Commons License), Photo: Anonymous with Guy Fawkes masks at Scientology in Los Angeles Books and Articles Adams, David, Why Do they Kill? Men Who Murder their Intimate Partners, Nashville: Vanderbilt University Press, 2007 Ellement, John R., Boston Globe, Twitter gives Boston police, prosecutors data in hacking probe, March 02, 2012 http://articles.boston.com/2012-03-02/metro/31112710_1_twitter-boston-police-lawenforcement Finocchiaro, Peter, Huffington Post, 2/3/2012, Anonymous Hacks Boston Police Department Website Over December Occupy Eviction http://www.huffingtonpost.com/2012/02/03/anonymous-boston-police-occupy-wallstreet_n_1252718.html Goodman, Amy, Democracy Now! July 11, 2011 Interview with David House: Exclusive: David House on Bradley Manning, Secret WikiLeaks Grand Jury, and U.S. Surveillance http://www.democracynow.org/2011/7/11/david_house_on_bradley_manning_secret MacKinnon, Catherine, Only Words, Cambridge, MA: Harvard University Press, 1993 Sengupta, Somini , New York Times, Case of 8,000 Menacing Posts Tests Limits of Twitter Speech, August 26, 2011 http://www.nytimes.com/2011/08/27/technology/man-accused-of-stalking-via-twitterclaims-free-speech.html Vinograd, Cassandra, Boston Globe, 12/26/2011, Hackers hit security firm and donate stolen funds http://articles.boston.com/2011-12-26/world/30556992_1_credit-card-anonymous-tweeted-client-list Zetter, Kim , Boston Globe, 5/20/2011, Video Captures Bradley Manning With Hacker Pals at Time of First Leaks, http://www.wired.com/threatlevel/2011/05/bradley-manning-in-boston Samarth, Avinash, ACLU Blog, 12/20/2011, ACLU in Court Today: Government Can't Use Border Checks to Avoid the Bill of Rights 36 Twitter/Cyber/Stalking http://www.aclu.org/blog/free-speech/aclu-court-today-government-cant-use-border-checks-avoidbill-rights Laws State Cyberstalking, Cyberharassment and Cyberbullying Laws http://www.ncsl.org/issuesresearch/telecom/cyberstalking-cyberharassment-and-cyberbullying-l.aspx#Laws Massachusetts General Laws http://www.malegislature.gov/Laws/GeneralLaws/PartIII/TitleI/Chapter265/Section43 Federal interstate stalking statute, 18 U.S.C. §§ 2261A (2)(A) http://www.law.cornell.edu/uscode/text/18/2261A Cases US v. William Lawrence Cassidy https://www.eff.org/sites/default/files/filenode/cassidy-order-121511.pdf, Case 1:11-dm-00003-TCB -LO Document 85 Filed 11/10/11 Page 1 of 60 PageID# 1023, US District Court For The District Of Maryland, 2011, No. TWT 11-091 (D. Md. Dec. 15, 2011) US v. William Lawrence Cassidy, Defendant. Criminal Case No. RWT 11-091 US District Court For The District Of Maryland 2011 U.S. Dist. LEXIS 145056; 40 Media L. Rep. 1001 In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G; and BirgittaJ, US v. Wikileaks, APPELBAUM, GONGGRIJP, JONSDOTTIR, and TWITTER, Appeal: 11-5151 Document: 19, Date Filed: 01/20/2012, Page: 1 of 7. In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G; and BirgittaJ Helen Remsberg, Administratrix of the Estate of Amy Lynn Boyer v. Docusearch, No. 2002-255, Supreme Court Rule of New Hampshire, 149 N.H. 148; 816 A.2d 1001; 2003 N.H. LEXIS 17 US v @GuidoFawkes – No real case name known to be assigned, records are sealed. Ongoing active investigation by Boston Police Department. DA Suffolk County of theCommonwealth of massachusetts, Administrative Subpoena, Commonwealth of MA vs. Twitter aka Trust & Safety, 12/14/2011, seeking “all available subscriber information” for Twitter accounts or hashtags @pOisAnON, Guido Fawkes, @OccupyBoston, #BostonPD or #dOxcak3 http://www.scribd.com/doc/76393350/Subpoena-on-p0isAn0n-OccupyBoston-BostonPD-d0xcak3 37 Twitter/Cyber/Stalking Other Major Twitter-related Cases Case Law US v Collins (Wikileaks) Social Media/ Technology Twitter and internet blogs Cooper v Twitter Patent infringement US Financial Services Modernization Act of 1999, Privacy Act of 1974, Consumer Protection Act, RSA chapter 358-A, 4th Amendment US ECPA-Stored Communications Act 18 USC 2701, 4th Amendment Ron Paul v John Doe Twitter 18 U.S.C 1030 4th Amendment Law Enforcement Expose privacy Courts Protect privacy Protect privacy against commercial exploitation Electronic Privacy Information Center ("EPIC") – Plaintiff Expose privacy speech unprotected EFF, Security Experts, Privacy Experts – Defendants Expose privacy Expose privacy, speech protected Civil Liberties Groups EFF, ACLU – Defendant Protect privacy Twitter Protect privacy NA Protect privacy Protect privacy Protect privacy As of March 15, 2012, Twitter appears in 132 cases in Lexis Nexis, including 97 cases at the District Court level and none at the US Supreme Court level. It is hard to find a case prior to 2010. In the majority of these cases, Twitter is mentioned only tangentially. Here are three in which Twitter plays a larger role or is the subject or a central issue: 1) UNITED STATES OF AMERICA, Plaintiff, v. DENNIS COLLINS et al - UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA, SAN JOSE DIVISION-The 14 defendants in this case were indicted on July 13, 2011 on 15 counts of conspiracy to cause damage to a protected computer and aiding and abetting causing intentional damage to a protected computer, in violation [*3] of 18 U.S.C. § 1030. The indictment alleges that in retribution for PayPal, Inc.'s termination of WikiLeaks.org's donation account, the defendants and other members of a group calling itself Anonymous coordinated and executed distributed denial of service (DDoS) attacks against PayPal's computer servers using the "Low Orbit Ion Cannon" open source computer application the group makes available for free download on the internet. According to the indictment, in late November 2010, WikiLeaks released a large amount of classified United States State Department cables on its website. Citing violations of the PayPal terms of service, and in response to WikiLeaks' release of the classified cables, PayPal suspended WikiLeaks' accounts so that WikiLeaks could no longer receive donations. On September 1, 2011, the defendants made their initial appearance in this court and were arraigned. Each defendant consented to pretrial release under a number of conditions, including conditions that each defendant (1) not participate in or accessing Internet Relay Chats ("IRCs"); (2) not use or access Twitter; (3) designate the computer or computers that would be used while on release; (4) not delete any [*4] internet history; and (5) make available any designated computer for inspection by Pretrial Services. 1 2) COOPER NOTIFICATION, INC., Plaintiff, v. TWITTER, UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE, patent infringement action, February 17, 2012, Decided 38 Twitter/Cyber/Stalking 3) RON PAUL 2012 PRESIDENTIAL CAMPAIGN COMMITTEE, INC., Plaintiff, v. JOHN DOES, 110, Defendants, UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA, January 25, 2012, Decided. (1) false designation of origin, (2) false advertising, and (3) common law libel and defamation. Dkt. No. 1. Five days later, Plaintiff filed an ex parte application seeking to take expedited discovery from YouTube and Twitter so that it could learn the identities of the Doe defendants. Dkt. No. 5. Epilogue US vs. Mr. X (Michelle Bachmann) - IN RE GRAND JURY SUBPOENA NO. 11116275, NO. 11116275,Misc. No. 11-527 (RCL), UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA, 2011 U.S. Dist. LEXIS 153989, Decided, February 23, 2012, Filed - This matter arises out of Mr. X's professed desire to engage in sadomasochistic activities with Congresswoman and presidential candidate Michele Bachmann. Mr. X posts to [Twitter], a social networking Web site that restricts users to messages of 140 or fewer characters. The grand jury issued its subpoena to Twitter on August 5, 2011, demanding that Twitter provide "any and all records pertaining to the identity of user name [redacted]." Mr. X posted the message, or "tweet," that provoked the subpoena and is the subject of this motion on August 2, 2011, at 9:32 pm; it no longer appears on the user's Twitter page. The tweet read: "I want to f[xxx] Michelle Bachman in the a[xx] with a Vietnam era machete." 39 Twitter/Cyber/Stalking Commonwealth v. Purdy footnote 4 Commonwealth v. Williams footnote 4 Criminal harassment- prosecuted in district court- misdemeanor- 2.5 year fine requires threats made to place person in imminent fear of death or bodily injury Stalking 40