|
Anonymity |
|
Anonymity can be viewed as the convergence of three large policy concerns: First Amendment, Privacy, Security
First Amendment
Derived From: In re Anonymous Online Speakers, DC No 3:07-cv-00505-ECR-RAM (9th Cir. July 12, 2010)
First Amendment protection for anonymous speech was first articulated a half-century ago in the context of political speech, Talley v. California, 362 U.S. 60, 64-65 (1960), but as the Supreme Court later observed, the Talley decision harkened back to "a respected tradition of anonymity in the advocacy of political causes." McIntyre v. Ohio Elections Comm'n, 514 U.S. 334, 343 (1995). Undoubtedly the most famous pieces of anonymous American political advocacy are The Federalist Papers, penned by James Madison, Alexander Hamilton, and John Jay, but published under the pseudonym "Publius." Id. at 344 n.6. Their opponents, the Anti- Federalists, also published anonymously, cloaking their real identities with pseudonyms such as "Brutus," "Centinel," and "The Federal Farmer." Id.
First Amendment protection for anonymous speech was first articulated a half-century ago in the context of political speech, Talley v. California, 362 U.S. 60, 64-65 (1960), but as the Supreme Court later observed, the Talley decision harkened back to "a respected tradition of anonymity in the advocacy of political causes." McIntyre v. Ohio Elections Comm'n, 514 U.S. 334, 343 (1995). Undoubtedly the most famous pieces of anonymous American political advocacy are The Federalist Papers, penned by James Madison, Alexander Hamilton, and John Jay, but published under the pseudonym "Publius." Id. at 344 n.6. Their opponents, the Anti- Federalists, also published anonymously, cloaking their real identities with pseudonyms such as "Brutus," "Centinel," and "The Federal Farmer." Id.
The right to speak, whether anonymously or otherwise, is not unlimited, however, and the degree of scrutiny varies depending on the circumstances and the type of speech at issue.1 Given the importance of political speech in the history of this country, it is not surprising that courts afford political speech the highest level of protection. Meyer v. Grant, 486 U.S. 414, 422, 425 (1988) (describing the First Amendment protection of "core political speech" to be "at its zenith"). Commercial speech, on the other hand, enjoys "a limited measure of protection, commensurate with its subordinate position in the scale of First Amendment values," Bd. of Trustees of SUNY v. Fox, 492 U.S. 469, 477 (1989), as long as "the communication is neither misleading nor related to unlawful activity." Central Hudson Gas & Elec. Corp. v. Public Serv. Comm'n of N.Y., 447 U.S. 557, 564 (1980).
© Cybertelecom ::Whistle blower rights
- McIntyre v. Ohio Elections Commission (US 1995) (" Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views . . . Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society. ")
- "In Talley v. California , 362 U.S. 60 (1960) , the Court struck down a Los Angeles city ordinance that made it a crime to distribute anonymous pamphlets." Wikipedia
- EFF: Anonymity (" The tradition of anonymous speech is older than the United States . Founders Alexander Hamilton, James Madison, and John Jay wrote the Federalist Papers under the pseudonym "Publius," and "the Federal Farmer" spoke up in rebuttal. The US Supreme Court has repeatedly recognized rights to speak anonymously derived from the First Amendment. ")
- Md Court Weighs Internet Anonymity, Wash Post Dec. 9 2008 (" In a First Amendment case with implications for everything from neighborhood e-mail lists to national newspapers, an Eastern Shore businessman argued to Maryland 's highest court yesterday that the host of an online forum should be forced to reveal the identities of people who posted allegedly defamatory comments ")
- Sharon K. Sandeen, In for a Calf is not Always in for a Cow: An Analysis of the Constitutional Right of Anonymity as Applied to Anonymous E-Commerce, 29 Hastings Const. L.Q. 527 (2002) ("An issue that courts are sure to explore is the extent to which the United States Constitution protects anonymous Internet communications from state and federal regulation. The United States Supreme Court has already addressed the question of anonymity in connection with political speech, finding that there is a constitutional right to speak anonymously in the political realm. 1 Most recently, the Court addressed the same question in the religious context in a case brought by Jehovah's Witnesses who objected to a law that required them to obtain a permit before engaging in door-to-door activities. 2 However, as Justice Ginsburg artfully noted in her concurrence in McIntyre v. Ohio Elections Commission, "in for a calf is not always in for a cow." 3 Just because the Supreme Court recognized a constitutional right of anonymity related to the distribution of political leaflets and religious tracts does not mean that anonymous speech cannot be regulated in other contexts.")
Security
- Verification and authentication of individuals
- Ability of law enforcement to investigation, forensics
- See WHOIS
- Prof. Ed Felten, New Internet? No Thank You, Freedom to Tinker (2009) (responding to Yesterday's New York Times "Do We Need a New Internet?" suggesting that the Internet has too many security problems and should therefore be rebuilt.)
- Prof. Ed Felten, Internet So Crowded, Nobody Goes There Any More, Freedom to Tinker, 2007 ( Once again we're seeing stories, like this one from Anick Jesdanun at AP, saying that the Internet is broken and needs to be redesigned )
- Do We Need an New Internet, NY Times Feb. 14, 2009 (" What a new Internet might look like is still widely debated, but one alternative would, in effect, create a "gated community" where users would give up their anonymity and certain freedoms in return for safety. Today that is already the case for many corporate and government Internet users. As a new and more secure network becomes widely adopted, the current Internet might end up as the bad neighborhood of cyberspace. You would enter at your own risk and keep an eye over your shoulder while you were there ")
- Declan McCullagh, U.N. agency eyes curbs on Internet anonymity, CNET September 12, 2008
- Jonathan Mayer, There is Anonymity on the Internet, Get Over It, Freedom to Tinker (Oct 2009) (" In a recent interview prominent antivirus developer Eugene Kaspersky decried the role of anonymity in cybercrime. This is not a new claim - it is touched on in the Commission on Cybersecurity for the 44th Presidency Report and Cybersecurity Act of 2009 , among others - but it misses the mark. Any Internet design would allow anonymity. What renders our Internet vulnerable is primarily weakness of software security and authentication, not anonymity. ")
Papers
- Yakowitz Bambauer, Jane, The New Intrusion (March 9, 2012). Notre Dame Law Review, Vol. 88, 2012; Brooklyn Law School, Legal Studies Paper No. 265.
- Yakowitz Bambauer, Jane, Tragedy of the Data Commons (March 18, 2011). Harvard Journal of Law and Technology, Vol. 25, 2011.
- CACM. "Differential Privacy: The Pursuit of Protections by Default." Commun. ACM (New York, NY, USA) 64, no. 2 (January 2021). ISSN: 0001-0782. doi:10.1145/3434228.
- Francis, Paul, Sebastian Eide, and Reinhard Munz. "Diffix: High-Utility Database Anonymization." In Annual Privacy Forum, 141-158. June 2017. ISBN: 978-3-319-67279-3. doi:10.1007/978-3-319-67280-9_8.
- A. Michael Froomkin, From Anonymity to Identification 1 Journal of Self-Regulation and Regulation 121 (2015)
- OHM, P. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review (forthcoming) (2010).
- Wu, Felix T., Privacy and Utility in Data Sets (August 15, 2012). 2012 TRPC.
See also
- WHOIS (discussing ability to register domain names or IP addresses anonymously)
Notes
- Can you have authentication or identity and also be anonymous or pseudonymous
News
- Jessica Su, Are you really anonymous online, Freedom to Tinker Sept. 28, 2016 ("Each person has a highly distinctive social network, comprised of family and friends from school, work, and various stages throughout one’s life. As a consequence, the set of links in your Facebook and Twitter feeds is likewise highly distinctive, and clicking on these links leaves a tell-tale mark in your browsing history.")
- Amid unrest, a hard new look at online anonymity, CNET 2/23/2011
- Reuters Dumps Anonymous Comments: Throwing Out A Bunch Of Babies With The Bathwater?, Techdirt 10/8/2010