Gift of Fire
Download
Report
Transcript Gift of Fire
A Gift of Fire
Sara Baase
Chapter 3: Freedom of Speech
Slides prepared by Cyndi Chie and Sarah Frye
What We Will Cover
Changing Communication Paradigms
Controlling Offensive Speech
Censorship on the Global Net
Political Campaign Regulations in
Cyberspace
Anonymity
Protecting Access and Innovation: Net
Neutrality or De-regulation?
Freedom of speech
is the freedom to speak without
censorship or limitation, that does not
include only freedom of verbal speech
but any act of seeking, receiving and
imparting information or ideas, regardless
of the medium used
Changing Communication Paradigms
Regulating Communications Media:
Three-part framework for First
Amendment protection and government
regulation
(1) Print media (newspapers, magazines,
books)
Has the strongest protection
the trend has been toward fewer government
restraints on the printed words
Changing Communication Paradigms
(2) Broadcast (television, radio)
More restrictions
Government grants broadcasting licenses
Because of scarcity of broadcast frequencies (early)
and the broadcast material comes into the home
Changing Communication Paradigms
(3) Common carries (telephones, postal system)
The law prohibits them from controlling the content of
material that passes through their system
Changing Communication Paradigms
(cont.)
Telecommunication Act of 1996:
Changed regulatory structure and removed
artificial legal divisions of service areas and
restrictions on services that telephone
companies can provide
No provider or user of interactive computer
service shall be treated as a publisher of any
information provided by another informationcontent provider
Changing Communication Paradigms
(cont.)
Free-speech Principles:
Written for offensive and/or controversial
speech and ideas
Restriction on the power of government,
not individuals or private businesses
Changing Communication Paradigms
(cont.)
Free-speech Principles (cont.):
Supreme Court principles and guidelines
Advocating illegal acts is legal
Does not protect libel and direct, specific threats
Inciting violence is illegal
Allows some restrictions on advertising
Protect anonymous speech
Controlling Offensive Speech
What is it? What is illegal?
What is offensive speech? What should
the law restrict on the Web?
Answer depends on who you are
It could be a political or religious speech
Many efforts to censor the Internet
Controlling Offensive Speech (cont.)
What was already illegal?
Obscenity
Lacks literary, artistic, social, political or scientific value
So First amendment does not protect obscene material
Controlling Offensive Speech (cont.)
Internet Censorship Laws & Alternatives:
Communication Decency Act (CDA)
Federal judge stated that the Internet is the most
participatory form of mass communication
Attempted to avoid conflict with first amendment by
focusing on children
It provided that anyone who made available to
anyone under 18 any communication that is obscene
or indecent would be subject to a fine of $ 100,000
and two years in prisons
Controlling Offensive Speech (cont.)
• Communication Decency Act (CDA) continue:
Cyberspace has changed the risks to the children (the
anonymity of the Net makes it easier for people to prey on
children)
Sometimes undesired sites arrives in e-mails and that sites
turn up in results found by search engines for innocent
topics
But also the Internet deserves the highest protection from
government intrusion
Controlling Offensive Speech (cont.)
Internet Censorship Laws & Alternatives (cont.):
Communication Decency Act (CDA) (cont.)
Found to be unconstitutional:
The worst material threatening children was already illegal
It was too vague and broad
It did not use the least restrictive means of accomplishing
the goal of protecting children
Controlling Offensive Speech (cont.)
Internet Censorship Laws & Alternatives (cont.):
Child Online Protection Act of 1998 (COPA):
Federal crime for commercial web sites to make available to
minors harmful material by FCC standards
Found to be unconstitutional:
Government did not show that COPA was necessary to protect
children because the Web accessible everywhere and the
community standards provision would restrict the entire country
the most conservative community
Child Online Protection Commission concluded that less
restrictive means, filtering, was superior to COPA
Controlling Offensive Speech (cont.)
Internet Censorship Laws & Alternatives (cont.):
Filters
Blocks sites with specific words, phrases or images
Parental control for violence
Updated frequently but may still screen out too much or
too little
Not possible to eliminate all errors
What should be blocked? (24% of health sites blocked)
Controlling Offensive Speech (cont.)
Internet Censorship Laws & Alternatives (cont.):
Children's Internet Protection Act of 2000 (CIPA):
Requires schools and libraries that participate in certain federal
programs to install filtering software
Upheld in court:
Does not violate First Amendment since it does not require the use
of filters, impose jail or fines
It sets a condition for receipt of certain federal funds
Controlling Offensive Speech (cont.)
Spam:
What’s the problem?
unsolicited commercial,electronic messages” –
includes Email,
SMS, MMS and IM; faxes
Mostly commercial advertisement
Angers people because content and the way it’s sent
Free speech issues
Spam imposes a cost on others not protected by free speech
(spam messages uses AOL systems)
Spam filters do not violate free speech (free speech does not
require intended listeners, or e-mail recipient to listen)
The Spam
Amount of email that is spam has increased
8% in 2001
40% in 2003
75% in 2007
Spam is effective
More than 100 times cheaper than “junk mail”
Profitable even if only 1 in 100,000 buys product
How do spammers find us?
Chat Rooms
Instant Messaging
Cookies and Spyware
Email Harvesting Robots
Attacks on your Mail Server
Who are the spammers?
Advertisers
Who is else???
Controlling Offensive Speech (cont.)
Spam (cont.):
Anti-spam Laws
Controlling the Assault of Non-Solicited
Pornography and Marketing Act (CAN-SPAM
Act)
Targets commercial spam
Criticized for not banning all spam, rather than
legitimized commercial spam
Decreasing the spam you get
Make sure your email address is not available to be
plucked off the Internet
Disguise e-mail address posted in a public electronic place
(example at domain dot com)
Post an image of your email address
Exercise your choice on online forms.
Use Multiple email addresses
Filter
Solutions from amrket and business
policy
(1)Business and programmers created variety of
filtering products, by blocking email from
specified addresses, by blocking messages with
particular words.
(2)ISPs block certain email from their system
and also let individual members establish their
own lists and criteria for mail to block
Solutions from amrket and business
policy
(3)Challenge –response spam filtering :
the filter automatically quarantines each
incoming message from any unkonwn
return address and sends an email back
to sender.
(4)many business subscribe to services
that provide lists of spammers to block
Decreasing spam (cont.)
How to respond to spam
DON’T
Posting and selling sensitive
materials
The web provides the potential for reducing prices of
many products by eliminating the “middleman”.
The laws Prevent sales to minors with violence
It is important for sellers and Web sites to take seriously
their roles and responsibility in deciding what material
they will make available.
Individuals should exercise responsibility when posting
to Web sites
Posting and Selling Sensitive
Materials
Guidelines for making decisions about
posting sensitive material
Consider unintended readers or users
Consider potential risks
Consider ways to limit access to intended users
Remember that it can be difficult to remove
material form the Net once you have posted it
Controlling Offensive Speech
Discussion Questions
Why is ‘least restrictive means’ important?
Do you consider the Internet an
appropriate tool for young children? Why
or why not?
Posting, Selling, and Leaking
Sensitive Material
Leaks
Type of material
Value to society
Risks to society and individuals
155-156
Posting, Selling, and Leaking
Sensitive Material
Leaks (cont.)
Examples
WikiLeaks
156-157
Posting, Selling, and Leaking
Sensitive Material
Leaks (cont.)
Potentially dangerous leaks
Releasing a huge mass of documents
157-158
Posting, Selling, and Leaking
Sensitive Material
Discussion Question
Does the value of informing the public of
controversial and sensitive information
outweigh the dangers and risks?
155-156
Posting, Selling, and Leaking
Sensitive Material
Leaks (cont.)
Responsibilities of operators of Web sites for
leaks
157-159
Challenges Posed by the Internet
Many-to-many communication
Dynamic connections
Huge numbers of Web sites
Extends beyond national borders, laws
Can’t determine age of users
Censorship on the Global Net
Global Impact of Censorship
Global nature of the Internet protects against
censorship (banned in one country, move to
another)
May impose more restrictive censorship (block
everything in an attempt to block one thing) (ex.
China blocked BBC transmission)
Yahoo and French censorship
Yahoo, eBay and others make decisions to comply with
foreign laws for business reasons
Censorship on the Global Net (cont.)
Censorship in Other Nations:
Attempts to limit the flow of information on the
Internet similar to earlier attempts to place limits
on other communications media
Some countries own the Internet backbone
within their countries, block at the border specific
sites and content
Some countries ban all or certain types of
access to the Internet
Censorship on the Global Net (cont.)
Aiding Foreign Censors:
Companies who do business in countries that
control Internet access must comply with the
local laws
Internet companies that are based in free
countries offer services in countries with strict
censorship
Google argued that some access is better than
no access
Political Campaign Regulations in
Cyberspace
Campaign Laws and the Internet:
Political Campaign Regulations . . . (cont.)
Campaign Laws and the Internet (cont.):
Federal Election Commission (FEC) administers election
laws
Covers content placed on the Internet for a fee
Unpaid individuals may put political content on their Web site,
send emails, blog, create or host a campaign-related Web site
and provide links to campaign sites
Media exemption applies to traditional news media and those
whose only presence is on the Web
Anonymity
Common Sense and the Internet:
Anonymity protected by the First Amendment
Services available to send anonymous email
(Anonymizer.com)
Anonymizing services used by individuals,
businesses, law enforcement agencies, and
government intelligence services
Anonymity (cont.)
Is Anonymity Protected?
FEC( federal election commission) exempted individuals
and organizations that are not compensated from
election laws that restrict anonymity
Supreme Court has overturned state laws that restrict
anonymity
SLAPP, a Strategic Lawsuit Against Public Participation lawsuits filed (generally libel) used to obtain the
identities (via subpoena) of those expressing critical or
dissenting opinions
Anonymity (cont.)
Against Anonymity:
Fears
It hides crime or protects criminals
Glowing reviews (such as those posted on eBay or
Amazon.com) may actually be from the author, publisher, seller,
or their friends
U.S. and European countries working on laws that
require ISPs to maintain records of the true identity of
each user and maintain records of online activity for
potential use in criminal investigations
Protecting Access and Innovation
Net Neutrality?
Should companies be permitted to exclude or
give special treatment to content transmitted
based on the content itself or on the company
that provides it?
Should companies be permitted to provide
different levels of speed at different prices?
Protecting Access and Innovation (cont.)
Net Neutrality (cont.)
Net Neutrality
Argue for equal treatment of all customers
Net Neutrality means no discrimination. Net Neutrality
prevents Internet providers from blocking, speeding up or
slowing down Web content based on its source, ownership or
destination.
Network neutrality is the principle that Internet users should
be in control of what content they view and what applications
they use on the Internet. The Internet has operated according
to this neutrality principle since its earliest days...
Fundamentally, net neutrality is about equal access to the
Internet
Opponents of net neutrality argue that neutrality regulations
will slow the advance of high speed internet connection and
improvements in infrastructure.