Justia Communications Law Opinion Summaries
Articles Posted in Internet Law
Verizon v. FCC, et al.
Verizon challenged the FCC's Open Internet Order, which imposed disclosure, anti-blocking, and anti-discrimination requirements on broadband providers. The court concluded that the Commission has established that section 706 of the Telecommunications Act of 1996, 47 U.S.C. 1302(a), (b), vests it with affirmative authority to enact measures encouraging the deployment of broadband infrastructure; the Commission reasonably interpreted section 706 to empower it to promulgate rules governing broadband providers' treatment of Internet traffic, and its justification for the specific rules at issue here - that they will preserve and facilitate the "virtuous circle" of innovation that has driven the explosive growth of the Internet - was reasonable and supported by substantial evidence; given that the Commission has chosen to classify broadband providers in a manner that exempts them from treatment as common carriers, the Communications Act, 47 U.S.C. 201 et seq., expressly prohibits the Commission from nonetheless regulating them as such; and because the Commission has failed to establish that the anti-discrimination and anti-blocking rules did not impose per se common carrier obligations, the court vacated those portions of the Open Internet Order. View "Verizon v. FCC, et al." on Justia Law
Posted in:
Communications Law, Internet Law
Thomas M. Cooley Law Sch. v. Kurzon Strauss, LLP
America’s largest law school, Thomas M. Cooley, has four Michigan campuses and one in Florida and about 3,500 students. . Anziska was “of counsel” at a New York law firm. On June 8, 2011, under the title “Investigating the Thomas Cooley School of Law,” Anziska posted on the website “JD Underground,” that the firm was investigating law schools for preying on the ignorance of “naive, clueless 22-year-olds. Perhaps one of the worst offenders is the Thomas Cooley School of Law, which grossly inflates its post-graduate employment data and salary information…. students are defaulting on loans at an astounding 41 percent… most likely … will continue to defraud unwitting students unless held civilly accountable. If you have any relevant information or know of anyone who has attended Thomas Cooley … correspondences will be kept strictly confidential.” On June 13, the firm received a cease-and-desist letter from Cooley, claiming that the post was defamatory. On June 15, under the title “Retraction re: Investigating the Thomas Cooley School of Law,” a partner posted on JD Underground that the earlier post “contained certain allegations which may have been couched as fact regarding employment and default data. These statements are hereby retracted.” Meanwhile, Anziska disseminated a draft proposed class action complaint involving 18 former or current Cooley students, containing the same allegations. The complaint became publicly available on the internet. Cooley sued, alleging defamation, tortious interference with business relations, breach of contract, and false light. The district court granted summary judgment in favor of defendants. The Sixth Circuit affirmed. Cooley was a limited-purpose public figure and the record would not allow a reasonable jury to conclude that the defendants published the challenged statements with actual malice.View "Thomas M. Cooley Law Sch. v. Kurzon Strauss, LLP" on Justia Law
United States v. Daoud
Daoud, an 18-year-old American citizen, had an email conversation with undercover FBI employees posing as terrorists who responded to messages that he had posted online. Daoud planned “violent jihad” and discussed his interest in committing attacks in the U.S, using bomb-making instructions that he had read in Inspire magazine, an English-language organ of Al Qaeda, and online. Daoud selected a Chicago bar as the target of a bomb that the agent would supply. The agent told him the bomb would destroy the building and would kill “hundreds” of people. Daoud replied: “that’s the point.” On September 14, 2012, Daoud parked a Jeep containing the fake bomb in front of the bar. In an alley, in the presence of the agent, he tried to detonate the fake bomb and was arrested. In jail, he tried to solicit someone to murder the undercover agent with whom he had dealt. The government notified Daoud, under the Foreign Intelligence Surveillance Act (FISA), 50 U.S.C. 1801, that it intended to present evidence derived from electronic surveillance conducted under the Act. His attorney sought access to the classified materials submitted in support of the government’s FISA warrant applications. The government supplied a heavily redacted, unclassified response and a classified version, accessible only to the court with a statement that disclosure “would harm the national security.” The harm was detailed in a classified affidavit signed by the FBI’s Acting Assistant Director for Counterterrorism. The district judge ordered the materials sought by defense counsel turned over. In an interlocutory appeal, the Seventh Circuit reversed, stating that in addition to having the requisite security clearance the seeker of such information must establish need to know. View "United States v. Daoud" on Justia Law
Jones v. Dirty World Entm’t
The Dirty World website enables users to anonymously upload comments, photographs, and video, which Richie selects and publishes along with his own editorial comments. Jones is a Kentucky high school teacher and a member of the cheerleading squad for the Cincinnati Bengals football team. She was the subject of several submissions posted by anonymous users and of editorial remarks posted by Richie, including photographs of Jones and a statement that she “slept with every other Bengal Football player.” Jones requested that the post be removed. Richie declined. A subsequent post alleged that her former boyfriend “tested positive for Chlamydia Infection and Gonorrhea ... sure Sarah also has both ... he brags about doing sarah in … her class room at the school she teaches at DIXIE Heights." Richie's responded to the post: “Why are all high school teachers freaks in the sack?” Jones brought claims of defamation, libel per se, false light, and intentional inflection of emotional distress. The district court rejected arguments that the claims were barred by the Communications Decency Act of 1996 (CDA), 47 U.S.C. 230. A second trial resulted in a verdict for $38,000 in compensatory damages and $300,000 in punitive damages. The Sixth Circuit reversed. Under the CDA, Richie and Dirty World were neither creators nor developers of the challenged content. Jones’s tort claims are grounded on the statements of another content provider, but sought to impose liability on Dirty World and Richie as if they were the publishers or speakers of those statements. Section 230(c)(1) bars those claims.
View "Jones v. Dirty World Entm't" on Justia Law
Klayman v. Zuckerberg, et al.
Plaintiff filed suit against Facebook and its founder, alleging that their delay in removing a page entitled "Third Palestinian Intifada," and related pages, which called for Muslims to rise up and kill the Jewish people, constituted intentional assault and negligence. The court affirmed the district court's holding that the Communications Decency Act of 1996, 47 U.S.C. 230, shielded Facebook and its founder from suit where Facebook qualified as an interactive computer service; the complaint acknowledges that the objected-to information was provided by third party users, not Facebook itself; and the complaint seeks to hold Facebook liable as the "publisher or speaker" of that information. View "Klayman v. Zuckerberg, et al." on Justia Law
United States v. Stanley
Erdely was investigating online distribution of child pornography when he discovered a computer on a peer-to-peer network sharing 77 files that he suspected contained child pornography. With information available to anyone, he found the Internet protocol address (IP address) through which it connected to the internet. Searching publicly available records, Erdely determined that the IP Address was registered to a Comcast subscriber and obtained a court order. Comcast gave Erdely the Neighbor’s name and Pittsburgh address. Erdely executed a warrant. None of the Neighbor’s computers contained child pornography or the file-sharing software; his wireless router was not password-protected. Erdely deduced that the computer sharing child pornography was connecting without the Neighbor’s knowledge. With the Neighbor’s permission, Erdely connected a computer to the router for remote access. Later, while working in Harrisburg, Erdely learned that the computer was again sharing child pornography on the Neighbor’s IP address. Erdely determined the mooching computer’s IP address and MAC address, which belonged to an Apple wireless card. Erdely had not discovered any Apple wireless devices in the Neighbor’s home, so he decided to use a “MoocherHunter” mobile tracking software tool, which can be used by anyone with a directional antenna. Not knowing which residence the signal was coming from, Erdely proceeded without a warrant. From the sidewalk the MoocherHunter’s readings were strongest when aimed at Stanley’s apartment. Erdely obtained a warrant for Stanley’s home. When officers arrived, Stanley fled, but returned and confessed that he had connected to the Neighbor’s router to download child pornography. Erdely seized Stanley’s Apple laptop and recovered 144 images and video files depicting child pornography. Stanley was charged with possession of child pornography, 18 U.S.C. 2252(a). The district court denied a motion to suppress. The Third Circuit affirmed. Use of the MoocherHunter was not a search under the Fourth Amendment. View "United States v. Stanley" on Justia Law
United States v. Auernheimer
Apple introduced the iPad in 2010. To send and receive data over cellular networks (3G), customers had to purchase a data contract from AT&T and register on an AT&T website. AT&T prepopulated the user ID field on the login screen with customers’ email addresses by programming servers to search for the user’s Integrated Circuit Card Identifier to reduce the time to log into an account. Spitler discovered this “shortcut” and wrote a program, the “account slurper,” to repeatedly access the AT&T website, each time changing the ICC-ID by one digit. If an email address appeared in the login box, the program would save that address. Spitler shared this discovery with Auernheimer, who helped him to refine the account slurper, which collected 114,000 email addresses. Auernheimer emailed the media to publicize their exploits. AT&T fixed the breach. Auernheimer shared the list of email addresses with Tate, who published a story that mentioned some names of those whose email addresses were obtained, but published only redacted email addresses and ICC-IDs. Spitler was in California. Auernheimer was in Arkansas. The servers t were physically located in Texas and Georgia. Despite the absence of any connection to New Jersey, a Newark grand jury indicted Auernheimer for conspiracy to violate the Computer Fraud and Abuse Act, 18 U.S.C. 1030(a)(2)(C) and (c)(2)(B)(ii), and identity fraud under 18 U.S.C. 1028(a)(7). The Third Circuit vacated his conviction. Venue in criminal cases is more than a technicality; it involves “matters that touch closely the fair administration of criminal justice and public confidence in it.”View "United States v. Auernheimer" on Justia Law
United States v. Elonis
Elonis’s wife left their home with their children. Elonis began experiencing trouble at work at an amusement park, reportedly leaving early and crying at his desk. An employee Elonis supervised, Morrissey, claimed sexual harassment. In October Elonis posted on Facebook a photograph taken for his employer’s Halloween Haunt. The photograph showed Elonis in costume holding a knife to Morrissey’s neck. Elonis added the caption “I wish.” Elonis’s supervisor saw the posting and fired Elonis. Days later, Elonis began posting statements on Facebook about having “keys for the fucking gates … sinister plans for all my friends,” and, concerning his wife, “would have smothered your ass … dumped your body … and made it look like a rape and murder” that their son “should dress up as matricide for Halloween … head on a stick” and “I’m not going to rest until your body is a mess, soaked in blood and dying from all the little cuts.” Following issuance of a state court protective order, Elonis posted statements concerning shooting at his wife’s house, using explosives, and “I’m checking out and making a name for myself … hell hath no fury like a crazy man in a kindergarten class.” After being visited by federal agents, he posted statements about blowing up SWAT members. Elonis was convicted of transmitting in interstate commerce communications containing a threat to injure the person of another, 18 U.S.C. 875(c). The Third Circuit affirmed, rejecting an argument that he did not subjectively intend his Facebook posts to be threatening. A 2003 Supreme Court decision, Virginia v. Black, did not overturn its prior holding that a statement is a true threat when a reasonable speaker would foresee the statement would be interpreted as a threat.
View "United States v. Elonis" on Justia Law
Joffe v. Google, Inc.
Plaintiffs filed suit against Google under the Wiretap Act, 18 U.S.C. 2511, after the antennas and software installed in Google's Street View cars collected basic identifying information transmitted by Wi-Fi networks, as well as gathered and stored "payload data" that was sent and received over unencrypted Wi-Fi connections. On appeal, Google challenged the district court's denial of its motion to dismiss based on the Wiretap Act's exemption for electronic communication that was readily accessible to the general public. The court held that the phrase "radio communication" in section 2510(16) excluded payload data transmitted over a Wi-Fi network. Consequently, the definition of "readily accessible to the general public [] with respect to a radio communication" in section 2510(16) did not apply to the exemption for an "electronic communication" that was "readily accessible to the general public" under section 18 U.S.C. 2511(2)(g)(i). The court also held that payload data transmitted over an unencrypted Wi-Fi network was not "readily accessible to the general public" under the ordinary meaning of the phrase as it was used in section 2511(2)(g)(i). Accordingly, the court affirmed the district court's judgment.View "Joffe v. Google, Inc." on Justia Law
Posted in:
Communications Law, Internet Law
Bonhomme v. St. James
Plaintiff and defendant, both women, met in 2005 through a chatroom connected with a television series. Defendant, in Illinois, used her own name and aliases to communicate with plaintiff, in Los Angeles. One alias was that of a man, and a romantic relationship developed through the Internet, telephone, and mail. Defendant disguised her female identity using a voice-altering device. Plaintiff purchased airline tickets for a meeting in Denver, but her new “boyfriend” cancelled the plans. Plaintiff was informed that he had attempted suicide. In 2006 the two planned to live together in Colorado, but defendant subsequently informed plaintiff, using another alias, that the man had died of cancer. The deception continued for seven more months until plaintiff’s real friends confronted defendant and obtained a videotaped admission as to what had occurred. Plaintiff’s third amended complaint, alleging fraudulent misrepresentation and seeking damages for the cost of a therapist, lost earnings, and emotional distress, was dismissed. The appellate court affirmed, holding that claims made in the previous complaint, but not incorporated into the third amended complaint, had been abandoned. The supreme court affirmed, holding that a claim for fraudulent misrepresentation does not apply to a personal relationship with no commercial component.View "Bonhomme v. St. James" on Justia Law