Professional Documents
Culture Documents
Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at
http://www.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless
you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you
may use content in the JSTOR archive only for your personal, non-commercial use.
Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at
http://www.jstor.org/action/showPublisher?publisherCode=ylj.
Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed
page of such transmission.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact support@jstor.org.
The Yale Law Journal Company, Inc. is collaborating with JSTOR to digitize, preserve and extend access to
The Yale Law Journal.
http://www.jstor.org
Anonymity, Autonomy,and Accountability:
Challenges to the First Amendment
in Cyberspaces
I. INTRODUCTION
1639
1640 The Yale Law Journal [Vol. 104: 1639
users can reach one another and a great array of sources of informationaround the world
throughthe facilities of many networks.
Conversationwith Lewis M. Branscomb,Professorof Science and Technology Policy, John F. Kennedy
School of Government,HarvardUniversity,formerChief Scientist of IBM and Director of the John F.
Kennedy School of GovernmentProjecton the NationalInformationInfrastructure(Feb. 1995).
6. According to Linda M. Harasim,"Humancommunicationhas become the majoruse of computer
networksand has transformedthem into a social space where people connect with one another.Computer
networksare not merely tools wherebywe network;they have come to be experiencedas places where we
network:a networld."Linda M. Harasim,Networlds:Networksas Social Space, in GLOBALNETWORKS:
COMPUTERSAND INTERNATIONAL COMMUNICATION 15, 15 (L.M. Harasim ed., 1993); see also NEAL
STEPHENSON,SNOW CRASH18 (1992) (referringto this new phenomenonas the "Metaverse").Other
metaphorsare equally applicable:informationsuperhighways,global infobahn,i-ways, electronic cafes,
informationmarketplaces,electronic playgrounds.
1995] Branscomb 1641
A. Anonymity
True anonymityin the Networldwould mean that no one could trace the
sourceof an electronicmessage.The FirstAmendmentpreventsthe outlawing
of true anonymity,althoughit only preventsgovernmentalinterferencewith
anonymousmessages. For this reason, the new cybercommunitiesas well as
1642 The Yale Law Journal [Vol. 104: 1639
10. Driverson the real highwaysare not permittedaccess withouta motorvehicle license so, logically,
it should be possible to require users of networksto be responsible and identifiable.Indeed, Professor
ArthurR. Miller has made this argumentquite persuasivelywith respectto the deploymentof anonymous
telephone calls:
I believe that anonymity-not privacy-is what is being sought by a telephone caller who
objects to having the telephone numberrevealedby CallerID. The questionthen is whethera
person has a rightto hide behinda veil of anonymityin makinga telephonecall over the public
telephone network .... Society, for example, requiresthat automobileshave license plates to
travel on a public road. This modest deprivation of anonymity is designed to promote
accountability.Those who insist on anonymityin placingtelephonecalls are, in essence, saying
they do not want to be accountableon the communicationsnetwork,which is quite analogous
to driving without a license plate.
See Hearing on S. 2030 Before the Subcomm.on Technologyand the Law of the Senate Comm.on the
Judiciary, 101st Cong., 2d Sess. 265 (1990). Real highways, however, do not carry the same First
Amendmentvulnerabilitiesthat electronic superhighwaysdo.
11. HarvardUniversity forbids its studentsfrom posting anonymousmessages. See HARVARD ARTS
& SCIENCES COMPUTER SERVS.,HARVARD UNIVERSITY, COMPUTER RULESANDETIQuETrE: STUDENT
COMPUTING ATHARVARD 3 (Dec. 1993). A real controversyhas arisenover whetherHarvardstudentsmay
post such messages in non-Harvardelectronic spaces that permitor even encourageanonymousposting.
The Universityof NorthCarolinapermitslurkersto remainunidentifiedbut forbidsand technicallyblocks
uploadingof messages until a user has a verifiableaccountand user identificationon the system. Interview
with Paul Jones, InternetInformationSpecialist, Office of Information,University of North Carolina,in
Chapel Hill, N.C. (Apr. 1993).
Otheruniversitiesdo not have strictenforcementpolicies. For example, MIT has no specific policy
but attempts to discourage anonymous postings while recognizing the difficulty in excluding them
altogether.E-mail from James D. Bruce, Directorof Computing,MIT, to author(Mar.9, 1995) (on file
with author).Moreover,some universitiesdo not have unitarypolicies governingthe computeruses of all
of their students. For example, some schools within the University of Pennsylvaniaprohibitanonymous
messages while others do not. Interviewwith Dan Updegrove,AssistantDirectorof ComputingServices,
Universityof Pennsylvania,in Philadelphia,Pa. (Feb. 2, 1995). In any event, the practiceof offeringpooled
computerfacilities in dormitoriesand variousschools means that studentsusing such pooled resourcesare
not identified. Id. With such a pooled system, it would be possible to use audit trails to track abusive
messages to particularcomputingstations.To trace a message to a particularindividual,however, would
requireknowing that a stationwas used only by one personor would requirethat a supervisorrecordboth
the names of studentsenteringa computingfacility and which computersthey used duringa session.
Commercial informationprovidersare also devising ways to deal with the difficult question of
appropriatelevels of anonymity.For example, AmericaOnline permitsthe use of pseudonymsand makes
no effort to prescreenmessages but reservesthe rightto curtailservice to memberswho abuse the privilege
by posting abusive anonymous messages. Letter from David W. Phillips, Assistant General Counsel,
America Online, Inc., to author(Mar. 14, 1995) (on file with author).
12. See, e.g., Steven Levy, How To Launder YourE-mail, WIRED, June 1994, at 50, 50-51; Joshua
Quittner,An Interviewwith Johan Helsingius, WIRED,June 1994, at 50, 52-53.
1644 The Yale Law Journal [Vol. 104: 1639
B. Autonomy
Autonomy means the right to exert some modicumof control over one's
electronic environment.Efforts to devise some rules to preserve autonomy
must include considerationof several challengingquestions.First, is there a
right to prevent access to, or control the timing and terms of disclosure of,
information about oneself, one's corporation,or one's institutionalentity?
Second, may certaincyberspacesbe maintainedas privatespaces in which the
usersthemselvesdeterminethe governingrules?Third,how can one ensurethe
confidentiality of messages posted to trusted colleagues? Such issues of
autonomyover communicationspresentdifficultchallengesin the cyberspaces.
These questionsare often clusteredwithin the area of law called privacy.
Privacylaw is a fairly recentarrivalon the horizon,but it, too, derives at least
some of its virtuesfrom FirstAmendmentprinciples.At a minimum,privacy
can be translatedinto some sanctuaryto which one may retreat-a personal
space and the ability to screenout unwantedor offensive messages. Although
there may be a First Amendmentright to speak, there is no comparableright
to be heard.13 Furthermore,privacy must mean some degree of autonomy
over personal informationand how it is obtained and deployed by others,
including governmental entities that may have a compelling interest in
obtainingthe information.14
Control over personal informationmay appear to be the flip side of
freedom of speech, that is, the freedom not to speak. This freedom not to
speak simply protects the right not to have informationdisclosed without
consent or in a manner that may be contraryto one's interests. This has
become a matter of considerableconcern; the opportunitiesfor unwitting
disclosurein cyberspacesrangefromuses of electronicidentificationfor access
to the system, to uses of credit cards for purchases,identificationof viewer
preferences,communicationof medicalrecords,and countless ways in which
computerizedidentificationis coupledwith personalpreferencesand behavior.
Americanshave very little comprehensionof or agreementaboutwhatprivacy
entails, but 84% are concerned about it, and 78% feel that they have lost
control over personal informationabout themselves.'5The confusion about
privacy indicatedby these statisticsis compoundedin the Networld.
C. Accountability
16. One difficulty is that many of the abusers have been young users just learning their computer
skills, who have little or no financialcapabilityto pay damagesimposed by a legal judgment.
17. See Lee Sproull & Sara Kiesler, Computers,Networks, and Work, in SOCIALISSUESIN
COMPUnING:PUTnNG COMPUTING IN ITS PLACE 335, 338-39 (ChuckHuff & ThomasFinholteds., 1994).
18. Marian Burros, Eating Well, N.Y. TIMS, Feb. 1, 1995, at C3 (discussing potential problems
created by false and misleading electronicinformationregardinghealth and nutrition).
19. Walter S. Mossberg, Accountability Key to Democracy in On-line World, PLAIN DEALER
(Cleveland), Feb. 5, 1995, at 4G.
Anonymity is a cherished traditionamong some on-line veterans,who enjoy the fantasy aspect of
these communities and argue that it enables shy or socially outcast people to finally blossom via
modem. . . . It sure makes it easier to spread wild conspiracy theories, smear people, conduct
financial scams or victimize others sexually.
Id.
1646 The Yale Law Journal [Vol. 104: 1639
The three issues I have chosen to explore, the assertionof a right to true
anonymity,claims to autonomyover the informationtransmittedonline, and
questions of accountabilityfor misuse or abuse of the informationresources,
are traditionalsourcesof controversyin FirstAmendmenthistory.Such issues
are continually implicatedin the debates and conflicts arising out of online
activity.The currentFirstAmendment-typecontroversiesarisingin both actual
encountersin cyberspaces and hypotheticaldiscussions are useful tools for
exploringwhatmayoccuras computer-mediated communicationbecomesmore
widely available throughoutthe world. The Internet, as well as publicly
availableinformationserviceproviderssuchas CompuServe,Prodigy,America
Online, GEnie, Delphi, ImagiNation,andthe WELL,presentprototypesof the
kinds of informationmarketplacesthat are possible and also demonstratethe
kinds of abuses and dilemmasthatcan occur and challengeFirstAmendment
principles.
While exploringthe capabilitiesof interactivecomputer-mediated dialogue
and the First Amendmentconflicts arising as by-productsof such communi-
cation, it must be understoodthatthe FirstAmendmentis a local ordinance.20
Many, indeed, most other countries, do not have the equivalent of a
constitutionalprohibitionagainstinterferencewith freedomof speech.Still, the
right to freedom of speech remainsa sacredtraditionin United States media
law and has correlativerightsin the laws of otherWesterncultures,the United
Nations UniversalDeclarationof HumanRights,21 as well as seeds that have
been sown in the constitutions of other countries. The inhabitants of
cyberspacesoften treatthe FirstAmendmentas a given statementof protection
in their world, which insulatesthem not just from interferencefrom the U.S.
governmentbut from all intrusionsor confrontationswith the real world.
In the pioneeringdays of what has become the Internet,users and their
usages were largely ignored. The cyberspaces were used primarily for
professional and academic purposes, subject only to the "acceptableuse
policy" (AUP) mandatingthat the networkservices be used for the research
community and its scientific goals.22Some commercialinformationservice
providerswrite contractsdescribingtheirexpectationsof appropriatebehavior
and reservingthe rightto withdrawservices from those who do not comply.23
As more and more computerusers arrivein these cyberspaces,they bring
expectationsthatthe legal normsof the real worldwill apply.Lawyers,judges,
and juries, often without any genuine understandingof or experience with
20. See ELECTRONICFRONTIERFOUND., EFF'S GUIDETO THEINTERNET? 4.6 (version 2.2 1994).
21. G.A. Res. 217A, U.N. Doc. A/810, at 74-75 (1948).
22. See infra note 65.
23. See, e.g., America Online Termsof Service (TOS) ? 4.2, available online at America Online,
Members' Online SupportArea, MemberServices.
1995] Branscomb 1647
at odds with the legalities of the local jurisdiction,and those for which no
legally enforceablestandardof care yet exists.
The firstcase I will exploreis one in which existing law was appliedquite
effectively to a controversyarisingonline. Moreover,the solutionmet with the
satisfactionof the defendantcommercialinformationprovider.Significantly,
this case involved an archetypal First Amendment conflict: a claim of
defamation.The new and challengingtwist was that the alleged defamatory
materialappearedin an online bulletinboardratherthanin a newspaperor on
a public broadcast.Despite the new form of media,the fundamentalquestions
did not change. The court could rely on existing defamation cases as it
attemptedto apply the legal standardsto the facts at issue. Indeed, the very
nature of this controversymay have made it ripe for easy importationof
existing legal norms, unlike some of the othercontroversiesthat involve fact
patternsunique to the new media.
Few cases have been definitivein determiningto what extent commercial
information providers and sysops must monitor, or are prohibited from
monitoring, electronic traffic. If the traffic constitutes public e-mail, the
Electronic CommunicationsPrivacy Act (ECPA)26would forbid monitoring.
If the provideris consideredto be the publisher,however,it would be held to
standardsof editorial control and would be accountable in law to those
defamed within its services.
In 1991, activity on the CompuServe system generated a case with
significant implications for these issues, Cubby,Inc. v. CompuServeInc.27
The plaintiff sued CompuServe for defamation because of objectionable
materialposted withinan electronicsegmentcalled RumorvilleUSA. This was
one componentof the JournalismForum,a daily newsletteroperatedby Don
Fitzpatrick Associates of San Francisco.28CompuServe claimed to have
neitherknowledge of the alleged defamatorymaterialnor the opportunityto
exert control over it. Furthermore,Don FitzpatrickAssociates had signed a
contractwith CompuServewherebythe former"accept[ed]total responsibility
for the contents" of material that it edited.29As a consequence, Don
FitzpatrickAssociatesconstituteda responsiblepartythatcould have been held
liable by the alleged defamedparty,but the litigantchose CompuServe,which
was more likely to be financiallysolvent.
words passing through them in digital form are likely to be troubling and
expensive, unless alternatives can be devised to handle these situations
satisfactorily.32
32. See, for example, the case recentlyfiled by an investmentfirm,StrattonOakmontof Lake Success,
New York,against Prodigyand subscriberDavid Lusby of Key West,Florida.The suit seeks $100 million
in actual damages and an additional$100 million in punitivedamages.PeterH. Lewis, Libel Suit Against
Prodigy TestsOn-LineSpeech Limits,N.Y. TIMES,Nov. 16, 1994, at DI. The offending message appeared
in the Money Talk discussion group, where a warningby Prodigy notifies the viewer that "Prodigydoes
not verify, endorse or otherwise vouch for the contentsof any note and cannot be held responsiblein any
way for informationcontainedin any such note."Id. at D2. Nonetheless,the message directlyaccused the
plaintiff firm of illegal activity in the context of its participationin an initial public offering, exclaiming:
"Thisis fraud,fraud,fraudand criminal!!!!!!!!"Id. The individualdefendant,a formeremployee of Prodigy,
had not used his accountfor "some time" and denies responsibilityfor the message. Id. Prodigy agreedin
courtto block messages concerningthe complainantfor threemonths,"to trackdown"the offendingparty,
and "to provide the court with a detailedexplanationof how messages to the system are posted, screened
and monitored."Id.
33. See W. John Moore, TamingCyberspace,NAT'L J., Mar. 28, 1992, at 745 ("Prodigyenvisions
itself as the Disneyland of bulletin boards,a family networkprovidinga variety of useful services, from
stock marketquotationsto sportsresults.");ProdigyDid Not Publish OffensiveMessage Cited by Media;
Affirms Standardsand Free Expressionon Bulletin Boards, PR Newswire, Oct. 23, 1991, available in
LEXIS, News Library,Prnews File [hereinafterProdigyDid Not Publish] (quotingProdigy PresidentTed
Papes remarkingon Prodigy's "role as a family service that reaches a very broad audience with diverse
viewpoints").
34. Several of these incidents are discussed extensively in ANNE W. BRANSCOMB,WHO OWNS
INFORMATION? FROM PRIVACYTO PUBLICACCESS98-103 (1994).
35. Prodigy Did Not Publish, supra note 33 (quoting Henry Heilbrunn,Senior Vice Presidentof
Prodigy).
1995] Branscomb 1651
42. See Smith v. California,361 U.S. 147 (1959) (finding that bookseller could not reasonablybe
expected to monitor content of all news vehicles it offered for sale and that to impose such requirement
would restrictfree circulationin informationmarketplace).
43. These informationservices would prefer not to use "utility"as a legal term of art because it
suggests thatthey must offer their services to anyone.Most have long and comprehensiveservice contracts
that specify what subscribersare to expect from them and what they expect of their subscribers.Thus, the
relationshipis construedas a license to use ratherthan an opportunityto purchasea commodity.
44. United States v. Thomas, CR-94-20019-G(W.D. Tenn.Dec. 13, 1994) (conviction and forfeiture
order),appeals docketed,No. 94-6648 and No. 94-6649 (6th Cir. Dec. 21, 1994).
1995] Branscomb 1653
54. Id.
55. Schwartz,supra note 49, at F25.
56. Big Sister Is Watching,supra note 50.
57. See, e.g., Pacific Gas & Elec. Co. v. Public Utils. Comm'n,475 U.S. 1 (1986); PerryEduc. Ass'n
v. Perry Local Educators' Ass'n, 460 U.S. 37 (1983); Dallas County Hosp. Dist. v. Dallas Ass'n of
Community Orgs. for Reform Now, 459 U.S. 1052 (1982) (Rehnquist,J., dissenting from denial of
certiorari);United States Postal Serv. v. Council of GreenburghCivic Ass'ns, 453 U.S. 114 (1981); Greer
v. Spock, 424 U.S. 828 (1976); Lehman v. City of ShakerHeights, 418 U.S. 298 (1974); Adderley v.
Florida,385 U.S. 39 (1966).
58. See, e.g., Marsh v. Alabama,326 U.S. 501 (1946).
59. For a fuller discussion of the applicabilityof the public forumconcept to cyberspaces,see David
J. Goldstone, The Public ForumDoctrine in the Age of the InformationSuperhighway,46 HASTINGSL.J.
335 (1995).
60. See Sega Enters. Ltd. v. Maphia,30 U.S.P.Q.2d(BNA) 1921 (N.D. Cal. 1994) (finding operator
of bulletinboardliable when users downloadedplaintiff'sgame programs);Playboy Enters.,Inc. v. Frena,
839 F. Supp. 1552 (M.D. Fla. 1993) (finding operator of subscriptionbillboard liable for copyright
1656 The Yale Law Journal [Vol. 104: 1639
electronic speech of all kinds will ensue. To comply with federal legislation
prohibitingdiscrimination,institutionsmay findit necessaryto become snoops
and censors, therebyexposing themselvesto liabilityfor actingcontraryto the
ElectronicCommunicationsPrivacy Act, which prohibitssuch monitoringof
e-mail.61There is no consensusconcerningthe way to resolve such a conflict,
but outcriesagainst"thepoliticallycorrectfiringsquad"are becoming louder:
Both the Amateur Action and Santa Rosa Junior College incidents
illustrate the difficulty in applying real-world rules to cybercommunities
without considering whether the imposition creates a greater burden than
necessary, in the process impinging upon First Amendmentrights of free
speech and autonomy over one's conversationalenvironment.A possible
solution in the Amateur Action case would be to change the standards
governingobscenity from the "local community"to the "virtualcommunity."
The SantaRosa JuniorCollege incidentpresentsa more seriousconfrontation
between two conflicting principles:freedom from gender discriminationand
freedomfor privatespacesfromthe intrusionof stateauthorities.To follow the
reasoning of Rowan v. UnitedStates Post Office Department,63 where is the
castle that one can call home within the Networld?
64. See, e.g., Ed Bailey, First Callfor Votes(Ist of 2), Oct. 12, 1993, posted to Usenet newsgroups
news.announce.newsgroups, news.groups,misc.legal,misc.legal.computing, misc.int-property, comp.patents,
alt.comp.acad-freedom.talk, and alt.privacy(calling for votes on proposal for new group to be entitled
"misc.legal.moderated").
65. Stephen Wolff, Director of Networkingfor the National Science Foundation,has explained that
even thoughthe "acceptableuse policy" may not be conduciveto profit-makingactivities on the NSFNET,
it was interpretedas prohibitingonly those servicesthatdid not enhancethe purposesof academicresearch
and productivity:"[T]he touchstoneis utility to the researchand education(R&E) community.It doesn't
matterif you chargefor your service:you're chargingnot for the NSF-fundedfacilities which are provided
to both you and your clientele, but ratherfor the value you have addedto those facilities." Quotedin Josh
Blackman,NetiquetteAdvertising,June26, 1994,posted to listserv<cyberia-l@birds.wm.edu> (on file with
author).In anotherposting, Blackmandiscusses appropriateplaces on the Internetfor advertisements,such
as "forsale" and "forrent"newsgroupsand travellists. Josh Blackman,Yes,but WhatAboutMaui?, July 2,
1994, posted to listserv <cyberia-l@birds.wm.edu>(on file with author). Blackman also warns against
sending an advertisementfor a condominiumto a brain-surgeonmailing list, since brain surgeons might
prefer to discuss attributesof brains ratherthan condos. Id. This seems to sort out the differentiationof
purposethattriggeredthe massive reactionto the Canterand Siegel advertisementsthatwere wildly posted
to every kind of newsgroupavailable.
66. Peter H. Lewis, CompaniesAre Rushing To Set Up Shop on Web,N.Y. TIMES, Nov. 2, 1994, at
DI.
67. Conversationwith Jane Metcalfe, President,WiredMagazine, at TechnicalSymposium at IBM,
in Poughkeepsie,N.Y. (Nov. 7, 1994).
68. The term "spamming"is meantto evoke the image of someone throwinga slice of Spam at a fan
and watchingthe pieces fly out in every direction.See PeterH. Lewis, Anarchy,a Threaton the Electronic
Frontier?, N.Y. TIMES, May 11, 1994, at DI, D7.
1658 The Yale Law Journal [Vol. 104: 1639
Internetservice was swift and final, as they pulled the plug on the massive
mailing very shortly after it was detected.77Such retributionas Canterand
Siegel suffered,both the official acts of the service supplierand the vigilante
acts of the angrysubscribers,demonstratesthat"spamming"of advertisements
into Internetnewsgroups has become a problem of mammothproportions.
What is most interesting,however, is the potential for self-governanceand
self-policing in cyberspacesthat these events demonstrate.
Cybercommunitieshave also conductedonline discussionsof appropriate
behavior, and imposed sanctions on violators, in the controversy over
anonymous remailers. The fiercely held and opposing views regarding
anonymityon the Internetexpressedby this lengthy online debate have little
or no counterpartin the real world. Two anonymous remailers, Johan
Helsingius of Finlandand Karl Kleinpasteof the United States, have sparred
over the issue for many months.78The argumentcentered aroundcomputer
softwarethat Kleinpastewrote and sharedwith Helsingius.Helsingius began
to use the softwarein a mannerthatKleinpasteconsideredquite objectionable.
The argumentsbetweenthe two areenlighteningand,judgingfromthe number
of postings that were entered into the electronic dialogue, aroused broad
intereston the partof other users.79
The need for pseudonymousmessages originatedin some of the more
volatile discussion groupsin which contributorsdid not wish to be identified,
such as "alt.sex.bondage."80 The apparentneed for anonymity motivated
Kleinpasteto design an anonymousremailersystem in six hours and to offer
it to the "rec.nude"group, which declined his offer to serve their entire user
membership.81Undaunted, Kleinpaste deployed what he called a "fire
extinguisher"to quiet abusive users againstwhom complaintswere filed and
used it threetimes beforehe was so "overwhelmed"by abusersthathe decided
to shut down his system.82The serverwas not reestablisheduntil April 1993,
and then with a formidablelist of forbiddenuses.83
David Clunie also devised an innovative anonymous posting system
involving cryptographyand offered it in October 1992.84Complaintsfrom a
large U.S. site resultedin a warningto Clunieto shutdown his system or lose
77. Martyn Williams, Spammer Attorneys Get Disconnected from Internet, NEWSBYTEs NEWS
NETWORK,Feb. 16, 1995, available in LEXIS, News Library,CurnwsFile. The contractthat Canterand
Siegel had with their Internetsupplier,PerformanceSystems International,prohibitedmass postings such
as this, but their message was initiatedfrom anothersource, ConsumerCredit Advocates, with a return
addressfor the Canterand Siegel e-mail box. Id.
78. See L. Detweiler,Anonymityon the InternetFAQ,May 5, 1993, ? 2.4, available online at URL
<ftp:llrtfm.mit.edu:/pub/usenetlnews.answers/net-anonymity/partl>.
79. See id.
80. Id. ? 1.6.
81. Id. ? 2.1.
82. Id.
83. Id.
84. Id. ? 2.2.
1660 The Yale Law Journal [Vol. 104: 1639
95. Id. (quoting posting of John Noring, systems operatorwho provided excerpts from e-mail of
anonymoususer).
96. Conversationwith David Johnson,Chairman,LEXIS Counsel Connect (Feb. 1995).
97. Geopolitical jurisdictions,however, are not standingaside in these matters.In February1995,
acting on a requestfrom INTERPOL,the Finnishpolice obtaineda searchwarrantand retrievedthe name
of a user of the Helsingius' serverwho allegedly had posted copyrightedmaterialpiratedfrom the Church
of Scientology. See Anon.penet.fiCompromised!,Feb. 18, 1995 (on file with author).While offering users
an opportunityto remove their names from his files, the anonymousadministratorsought supportfrom his
users to fight Finnish authorities.Id.
1662 The Yale Law Journal [Vol. 104: 1639
111. Lindsay Van Gelder, The Strange Case of the ElectronicLover, Ms., Oct. 1985, at 94.
112. Id. at 101.
113. Id. at 94.
114. Id.
115. Id. at 101, 103.
116. Id. at 103, 117.
117. Id. at 99.
118. Id. at 104-05.
1995] Branscomb 1665
THEPOSSIBILITY
III. SELF-GOVERNANCE: OF CYBERJURISDICTION
There are always the hardcases, the ones who won't play ball unless
they see a baseball bat about to whack them in the head. While the
nice people are agreeing,those inclinedto disagreewill have free run
of the net. I doubt that unforced agreementis sufficient; rather,to
create workable net regimes, someone or some group will need to
wield the power necessaryto herd malcontentsinto line.134
seems to have its own credos and rules. These laws are frequently
HEAVILY enforced.
... Finally, even mailing lists and news groups have some set of
laws (NO FLAMES,STICKTO THETOPIC,etc.). I'm not sure how one
would unify all such rules undera universalor meta set of rules."139
What all these systems, from the smallest single-line BBS to the
Internet, have in common today is their reliance on text....
[C]omputerusers have grown more adept at effectively writing to
each other. The world of the networks is a true democracy:your
influence is measurednot by wealth or position, bu[t] by how well
you write and reason.
This relianceon the printedwordis, of course, somethingthatthe
computer-basedservices share with the traditionalprint media. But
they differ from print media-and broadcastmedia-in two very
importantways. First,the meansof communicationare cheapenough
for almost everyone to gain access . . . . [Second,] [c]omputer
information services . . . are "many-to-many" systems . . . . The
"filtering"function performedby newspapereditors is left to the
readers, who are also contributors.The very distinction between
readerand "reporter"is blurred.
This may sound like anarchy,but in practice it's more like a
town-hall meeting, albeit one in which everyone has a chance to
speak, no one is shouteddown, and people have time to develop and
explain their ideas.141
139. Hardy, Constitutions,Magna Cartas, more, supra note 120 (quoting response to his initial
inquiry).
140. See NATIONALRESEARCHCOUNCILErAL., RIGHTSAND RESPONSIBILMESOF PARTICIPANTS
IN
NETWORKED COMMUNITIES 40 (DorothyE. Denning & HerbertS. Lin eds., 1994).
141. Mike Godwin, The First on a New Frontier,QUILL,Sept. 1991, at 18, 19.
1670 The Yale Law Journal [Vol. 104: 1639
142. Quoted in Tony Mauro,RidingHerd On-Line:Legal Notions Transformedby Digital Age, USA
TODAY,Nov. 15, 1994, at IA; see also MarkEckenwiler,CriminalLaw and the Internet,LEGALTIMES,
Jan. 23, 1995, at S32 ("If 1994 was the Year of the Internet,1995 promises to be the Year of Legal
Questions About the Internet.").
143. BenjaminWittes,Law in Cyberspace;Witnessingthe Birthof a Legal Systemon the Net, LEGAL
TIMES,Jan. 23, 1995, at S27.
1995] Branscomb 1671
A right of reply has been urged and rejected in the print media,145and
tried, approved,146 and then abandoned (at least partially)147 in the
broadcastingmedia. Nonetheless, there is a need to find some alternativeto
strict liability for providers of informationservices without imposing an
obligationto monitorall messagesin orderto avoid incurringproviderliability.
Thus, the returnto a right of reply, affirmedas constitutionallyacceptablein
Red Lion Broadcasting Co. v. FCC,148 seems eminently reasonable. The
generalcounsels of both ProdigyandAmericaOnlinehave explainedthatthey
see no otherviable alternativethanofferingdefamedpartiesan opportunityto
144. See, e.g., BRUCE LEHMAN, INTELLECTUAL PROPERTY AND THE NATIONAL INFORMATION
INFRASTRUCTURE: A PRELIMINARY DRAFT OF THE REPORT OF THE WORKING GROUP ON INTELLECTUAL
PROPERTY RIGHTS, INFORMATION INFRASTRUCTURE TASK FORCE 120-23 (1994) (discussing electronic
transmissions as means of infringing copyrights).
145. Miami Herald Publishing Co. v. Tornillo, 418 U.S. 241 (1974).
146. Red Lion Broadcasting Co. v. FCC, 395 U.S. 367 (1969).
147. Arkansas AFL-CIO v. FCC, 11 F.3d 1430 (8th Cir. 1993) (upholding personal attack portion of
fairness doctrine requiring television and radio broadcasters to provide right of reply); Syracuse Peace
Council v. FCC, 867 F.2d 654 (D.C. Cir. 1989) (rejecting management of "fairness doctrine").
148. 395 U.S. 367.
1672 The Yale Law Journal [Vol. 104: 1639
come online and defend themselves in the channel where the alleged
defamationhas taken place.149
To do otherwise would have a chilling effect on the medium, where the
very large amount of traffic makes it almost impossible for an information
providerto monitor.If the electronicmessagingservices arerequiredto accept
responsibility for all of their content-as are "publishers"in the print and
broadcastingworld-then a budding electronic democracy of free speech
operatingin an electronic "publicforum"may be lost. At the very least, it
should become possible for electronicinformationprovidersto declare some
cyberspacesto be "publicforums"where messages may be circulatedfreely.
Otherwisethe public forum,as modeledon the ancientagora,may be lost as
an uninhibited"marketplaceof ideas."150
149. Conversationwith George Perry, General Counsel, Prodigy, at the Workshopon Rights and
Responsibilities of Participantsin Networked Communities, in Washington,D.C. (Nov. 5-6, 1992);
Conversationwith Ellen Kirsh,GeneralCounsel,AmericaOnline, Inc., at NationalConferenceof Lawyers
and Scientists, Conferenceon Legal, Ethical, and TechnologicalAspects of ComputerUse and Abuse, in
Queenstown,Md. (Oct. 7-9, 1994).
150. For a fuller discussion of the problemsof the "publicforum"concept, see Goldstone,supra note
59.
1995] Branscomb 1673
The SOLO bulletin board incident at Santa Rosa Junior College has
precipitated a reappraisalof the responsibilities of network managers to
monitor and patrol the traffic within the computer-mediatedsetting. If the
provideris to be held accountablefor how an electronicspace is being used,
then there can be no such thing as a privateelectronic space, except within
private networks offered and funded by private entities (such as individual
bulletin boardproviders).Educationalinstitutionsdo not monitorthe speech
of their studentswithin their dormitoryrooms, dining halls, playing fields, or
locker rooms. Why should it be necessary to monitor electronic bulletin
boards?
1674 The Yale Law Journal [Vol. 104: 1639
151. This assumption is not entirely accurate since many communities charge for the pickup of
wastepaperand garbage,and some waste services chargeby the weight or numberof bags. The authorlives
in such a community. In addition, environmentalistsprotest the numberof trees cut down in a useless
deploymentof paperthat is unreadand wasted. See Jill Smolowe, Read This!!!!!!!!,TIME, Nov. 26, 1990,
at 62, 64.
152. 397 U.S. 728, 735-38 (1970).
1995] Branscomb 1675
F. ShouldAnonymousMessages Be Discouraged?
V. CONCLUSIONS
154. Network managers have devised "kill files" and "bozo filters" to screen out messages from
offending sources. Although individual users may need greater computer competence than most now
possess, systems could be designed to make these screeningdevices easy to deploy. Regulatoryagencies
or national legislation could requirethat electronic telecommunicationprovidersdesign their software to
facilitatesuch freedomof choice over unwantedmessages. See ELECTRONIC FRONTIERFOUND.,supra note
20, ? 4.2 (explaining how kill files work and how to employ them).
155. See Rowan, 397 U.S. at 735-38.
156. The United States may find itself in a dilemma if the common carrierconcept falls into disuse
and electronic transportprovidersare not requiredto accept messages (as telephone networksand postal
services are requiredto do today). If all electronictransportprovidersare also informationprovidersand
claim the censorship rights that have been grantedother mass media, then no guaranteedright of access
to the electronic media may exist. See, e.g., Nicholas Johnson,Jeffersonon the Internet,47 FED. COMM.
L.J. 281, 285 (1994).
1995] Branscomb 1677
should be equally cautious.'57It is tempting and easy to say that the First
Amendmentis an absolutethatrequiresa governmental"handsoff' policy for
all forms of communicationand that the scarcity doctrine was a terrible
mistake. As Judge David Bazelon, who presided over many appeals in
communicationcases, observed, we regulatebroadcastingnot because it is
scarce but because it is the most powerful form of communication and
methodologyfor manipulationof humanbehavioryet known to mankind.'58
There is no reasonto believe thatcomputer-mediated communicationwill
be any less powerful a medium for the manipulationof human behavior,
althoughit does seem to offer a proliferationof communicationchannelsthat
carry the hope of genuine diversity and both personaland group autonomy.
More choice and control in the hands of individualusers seem assured,and
lower transmissioncosts with faster delivery and greaterscope of coverage
seem reasonablyattainable.Nonetheless,if we comparethe "hype"with which
cable television was offered to the public in the early 1970's with the
duplicationof programmingsources and genres availableon this multiplicity
of channelstoday,thereis muchroomfor cynicism.Perhapsthe Networldwill
not be the salvationof democracyand will not bringon the millenniumfor the
First Amendment'spromiseof an uninhibited"marketplaceof ideas."
The flow of informationis not free financially,nor is it immuneto other
constraints. There are costs to building transmission systems, to buying
equipmentto access those systems, and to learning how to manipulatethe
software that makes it possible to engage in electronic discourse. There are
also costs to findingthe time to searchfor and downloadthe informationthat
is made available by sources preparedto underwritetheir own costs of
processing and uploading information.Not everyone will have the time,
money, equipment, or skills to engage in a worldwide dialogue on the
Networld of the future.
The media tend to spot and magnify the activities of miscreants,clowns,
and fools in cyberspacesbecause they make good readingand viewing. The
peccadilloes of the few, however, should not be permittedto override the
beneficialuses of these new computer-mediated communicationssystems.They
are only a small portionof what is actuallyhappening.Despite the problems
of access and abuse, a thoroughlook throughthe magnifyingglass will reveal