Revision as of 21:19, 18 May 2023 editPickalittletalkalittle (talk | contribs)Extended confirmed users870 editsm →Cyber Intelligence Sharing and Protection Act (CISPA): removed commaTag: Visual edit← Previous edit | Latest revision as of 09:44, 19 January 2025 edit undoAchmad Rachmani (talk | contribs)Extended confirmed users85,276 edits →Court rulings: Altered authors 1-1. | ||
(91 intermediate revisions by 52 users not shown) | |||
Line 1: | Line 1: | ||
{{short description|none}} | {{short description|none}} | ||
{{Copy edit|date=April 2023}} | |||
⚫ | |||
⚫ | '''Internet censorship in the United States of America''' is the ] published or viewed on the ]. The ] protects ] and expression against federal, state, and local government censorship. | ||
⚫ | In 2014, the United States was added to ] (RWB)'s list of "Enemies of the Internet", a group of countries with the highest level of ]. RWB stated that the ] |
||
⚫ | Free speech protections allow little government-mandated Internet content restrictions. However, the Internet is highly regulated, supported by a complex set of legally binding and privately mediated mechanisms.<ref name="ONIRO-NorthAmerica">{{Cite web |title=United States and Canada |url=https://opennet.net/research/regions/united-states-and-canada |access-date=2024-05-29 |website=opennet.net|archive-url=https://web.archive.org/web/20171107114235/https://opennet.net/research/regions/namerica |archive-date=2017-11-07 |publisher=]|date= 30 March 2010}}</ref> | ||
In U.S. government-funded ] ''Freedom On the Net 2021 Report'', the United States was rated the thirteenth most free of the 70 countries rated.<ref name="FOTN-2017">{{cite web|date=October 2017|title=Freedom on the Net 2017|url=https://freedomhouse.org/sites/default/files/2020-02/FOTN_2017_Final_compressed.pdf|access-date=25 March 2018|website=Freedom House}}</ref> | |||
⚫ | Gambling, ], and the dangers to children who frequent social media are important ongoing debates. Significant public resistance to proposed content restriction policies has prevented measures used in some other countries from taking hold in the US.<ref name="ONIRO-NorthAmerica" /> | ||
==Overview== | |||
⚫ | |||
⚫ | Many government-mandated attempts to regulate content have been barred, often after lengthy legal battles.<ref name="Cybersieves">{{cite journal|url=https://ssrn.com/abstract=1143582&rec=1&srcabs=1026597# |title=Cybersieves |first=Derek E. |last=Bambauer|journal=Duke Law Journal|volume= 59 |year=2009}} {{cbignore|bot=medic}}</ref> However, the government has exerted pressure indirectly. With the exception of ], content restrictions tend to rely on platforms to remove/suppress content, following state encouragement or the threat of legal action.<ref name="law.wustl.edu">{{cite journal|url=http://law.wustl.edu/Journal/21/p31PalfreyRogoyski.pdf |title=The Move to the Middle: The Enduring Threat of 'Harmful' Speech to the End-to-End Principle |archive-url=https://web.archive.org/web/20120314122135/http://law.wustl.edu/Journal/21/p31PalfreyRogoyski.pdf |archive-date=2012-03-14|first1=John |last1=Palfrey, Jr. |first2= Robert |last2=Rogoyski|journal=Washington University Journal of Law and Policy| volume= 21 |year=2006 |pages=31–65}}</ref><ref name="ONIRO-NorthAmerica" /> | ||
⚫ | |||
] protections yielded a system that predictably removes infringing materials.<ref name="ONIRO-NorthAmerica" /><ref name="eff.org">{{cite web|url=https://www.eff.org/wp/unintended-consequences-under-dmca |title=Unintended Consequences: Twelve Years under the DMCA|archive-url=https://web.archive.org/web/20110505093320/https://www.eff.org/wp/unintended-consequences-under-dmca|archive-date=2011-05-05|publisher=Electronic Frontier Foundation|date=March 2010}}</ref> The US also seizes domains and computers, at times without notification.<ref name="NYT71212" /><ref name="DOJ PR" /><ref name="WTKTJV" /><ref name="3NewsNZ5March2012" /> | |||
⚫ | |||
== History == | |||
The first wave of regulatory actions |
The first wave of regulatory actions came about in the 1990s in response to the profusion of sexually explicit material on the Internet within easy reach of minors. Since that time, several legislative attempts at creating a mandatory system of content controls have failed to produce a comprehensive solution. Legislative attempts to control the distribution of socially objectionable material have given way to a system that limits liability over content for Internet intermediaries such as Internet service providers (ISPs) and content hosting companies.<ref name=ONIRO-NorthAmerica/> | ||
Websites shut down by the U.S for violating intellectual property rights include ],<ref>'']'', 114 F. Supp. 2d 896 (] 2000), aff'd in part, rev'd in part, 239 F.3d 1004 (] 2001)</ref><ref>{{cite news |last=Menta |first=Richard |title=RIAA Sues Music Startup Napster for $20 Billion |date=December 9, 1999 |publisher=MP3 Newswire |url=http://www.mp3newswire.net/stories/napster.html |access-date=April 8, 2018 |archive-url=https://web.archive.org/web/20130601112815/http://www.mp3newswire.net/stories/napster.html |archive-date=June 1, 2013 |url-status=dead }}</ref><ref>2001 US Dist. LEXIS 2186 (N.D. Cal. Mar. 5, 2001), aff'd, 284 F. 3d 1091 (9th Cir. 2002)</ref> ],<ref name="Savage20101201">{{cite news |last=Savage |first=Charlie |title=U.S. Weighs Prosecution of WikiLeaks Founder, but Legal Scholars Warn of Steep Hurdles |date=1 December 2010 |url=https://www.nytimes.com/2010/12/02/world/02legal.html |newspaper=The New York Times |access-date=5 December 2010 |archive-url=https://web.archive.org/web/20101210180531/http://www.nytimes.com/2010/12/02/world/02legal.html |archive-date=10 December 2010 |url-status=live }}</ref><ref name="WPost">{{cite news |last=Yost |first=Pete |title=Holder says WikiLeaks under criminal investigation |url=https://www.foxnews.com/us/holder-says-wikileaks-under-criminal-investigation/ |access-date=5 December 2010 |publisher=Fox News |date=29 November 2010 |archive-url=https://web.archive.org/web/20131224090729/http://www.foxnews.com/us/2010/11/29/holder-says-wikileaks-criminal-investigation/ |archive-date=24 December 2013 |url-status=live}}</ref> ],<ref>{{cite press release|title=Swedish authorities sink Pirate Bay |url=http://www.mpaa.org/press_releases/2006_05_31.pdf |publisher=MPAA.org |date=31 May 2006 |archive-url=https://web.archive.org/web/20091003154146/http://www.mpaa.org/press_releases/2006_05_31.pdf |archive-date=3 October 2009 |access-date=27 September 2008 |url-status=dead }}</ref> and ].<ref>{{cite web |url=http://www.pakblog.net/2012/01/megauploadcom-blocked-shutdown.html |title=Megaupload.com blocked (shutdown) Anonymous hacked Universal Music and other sites |website=Pakblog.net |date=19 January 2012 |access-date=19 January 2012 |archive-url=https://archive.today/20120906000119/http://www.pakblog.net/2012/01/megauploadcom-blocked-shutdown.html |archive-date=6 September 2012 |url-status=dead |df=dmy}}</ref> | |||
⚫ | In 2014, the United States was added to ] (RWB)'s list of "Enemies of the Internet", a group of countries with the highest level of ]. RWB stated that the ] had "undermined confidence in the Internet and its own standards of security" and that "] are a direct threat to investigative journalists, especially those who work with sensitive sources for whom confidentiality is paramount and who are already under pressure".<ref name="RWBEnemies2014">{{cite web|url=http://12mars.rsf.org/2014-en/#slide2 |title=Internet Enemies|archive-url=https://web.archive.org/web/20140312120731/http://12mars.rsf.org/2014-en/#slide2|archive-date=2014-03-12|work=Enemies of the Internet 2014: Entities at the heart of censorship and surveillance|editor=Reporters Without Borders |date=11 March 2014|access-date=24 June 2014}}</ref> | ||
National security concerns have spurred efforts to expand ] and fueled proposals for making Internet communication more traceable.<ref name=ONIRO-NorthAmerica/> | |||
==Federal laws== | ==Federal laws== | ||
With |
With limited exceptions, the free speech provisions of the First Amendment bar federal, state, and local governments from directly censoring the Internet. The primary exception has to do with ], including ], which is not given First Amendment protection.<ref>{{cite web|url=http://courses.cs.vt.edu/cs3604/lib/Censorship/notes.html |title=The Internet Censorship Controversy|archive-url=https://web.archive.org/web/20110721064351/http://courses.cs.vt.edu/cs3604/lib/Censorship/notes.html |archive-date=2011-07-21 |first=Usman |last=Qazi |publisher=Virginia Polytechnic Institute and State University|year= 1996}}</ref> | ||
===Computer Fraud and Abuse Act (CFAA)=== | ===Computer Fraud and Abuse Act (CFAA)=== | ||
The ] (CFAA) was enacted in 1986 as an amendment to an existing computer fraud law ({{USC|18|1030}}), which was part of the ]. The CFAA prohibits accessing a computer without authorization, or in excess of authorization.<ref name=FirstEnacted>{{cite web |url=https://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf |title=Prosecution of Computer Crimes |last1=Jarrett |first1=H. Marshall |last2=Bailie |first2=Michael W. | |
The ] (CFAA) was enacted in 1986 as an amendment to an existing computer fraud law ({{USC|18|1030}}), which was part of the ]. The CFAA prohibits accessing a computer without authorization, or in excess of authorization.<ref name=FirstEnacted>{{cite web |url=https://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf |title=Prosecution of Computer Crimes |last1=Jarrett |first1=H. Marshall |last2=Bailie |first2=Michael W. |year=2010 |website=justice.gov |publisher=Office of Legal Education Executive Office for United States Attorneys |access-date=June 3, 2013 |archive-url=https://web.archive.org/web/20130407020603/http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf |archive-date=April 7, 2013 |url-status=live }}</ref> Since 1986, the Act was amended in 1989, 1994, 1996, 2001 (]), 2002, and in 2008 (Identity Theft Enforcement and Restitution Act). The CFAA is a criminal law and also creates a ], allowing individuals and companies to sue for damages. | ||
Provisions of the CFAA effectively make it a federal crime to violate the ] of Internet sites, allowing companies to forbid legitimate activities such as research, or limit or remove protections found elsewhere in law. Terms of service can be changed at any time without notifying users. ] called the CFAA "the worst law in technology".<ref>{{cite web | title=Most of what you do online is illegal. Let's end the absurdity | |
Provisions of the CFAA effectively make it a federal crime to violate the ] of Internet sites, allowing companies to forbid legitimate activities such as research, or limit or remove protections found elsewhere in law. Terms of service can be changed at any time without notifying users. ] called the CFAA "the worst law in technology".<ref>{{cite web | title=Most of what you do online is illegal. Let's end the absurdity | first1=Christian |last1=Sandvig | author-link2=Karrie Karahalios | first2=Karrie |last2=Karahalios | date=2006-07-01 | work=]| url=https://www.theguardian.com/commentisfree/2016/jun/30/cfaa-online-law-illegal-discrimination | access-date=2018-04-09 | archive-url=https://web.archive.org/web/20180410072152/https://www.theguardian.com/commentisfree/2016/jun/30/cfaa-online-law-illegal-discrimination | archive-date=2018-04-10}}</ref> | ||
Aggressive prosecution under the Computer Fraud and Abuse Act (CFAA) has fueled growing criticism of the law's scope and application.<ref>{{cite web|url=https://freedomhouse.org/report/freedom-net/2017/united-states |title=United States Country Profile: Violations of User Rights|archive-url=https://web.archive.org/web/20180327023745/https://freedomhouse.org/report/freedom-net/2017/united-states |archive-date=2018-03-27 |year= 2017|publisher=Freedom House}}</ref> | |||
Aggressive prosecution under the Computer Fraud and Abuse Act (CFAA) has fueled growing criticism of the law's scope and application.<ref> {{Webarchive|url=https://web.archive.org/web/20180327023745/https://freedomhouse.org/report/freedom-net/2017/united-states |date=2018-03-27 }}, ''Freedom On the Net 2017'', Freedom House.</ref> In 2013 a bipartisan group of lawmakers introduced legislation ({{USBill|113|hr|2454}}, {{USBill|113|s|1196}}<ref>{{USBill|113|hr|2454|site=yes}}; {{Webarchive|url=https://web.archive.org/web/20180715064344/http://www.govtrack.us/congress/bills/113/hr2454 |date=2018-07-15 }} at ]; {{webarchive|url=https://web.archive.org/web/20131112102251/http://www.opencongress.org/bill/113-h2454/ |date=November 12, 2013 }} at ]. {{USBill|113|s|1196|site=yes}}; {{Webarchive|url=https://web.archive.org/web/20180715040512/http://www.govtrack.us/congress/bills/113/s1196 |date=2018-07-15 }} at ]; {{webarchive|url=https://web.archive.org/web/20131112102253/http://www.opencongress.org/bill/113-s1196/ |date=November 12, 2013 }} at ].</ref>) that would prevent the government from using CFAA to prosecute terms of service violations and stop prosecutors from bringing multiple redundant charges for a single crime.<ref>{{cite news | url=http://o.canada.com/technology/swartz-doc-director-oracle-and-larry-ellison-killed-aarons-law | work=Postmedia | first=Jonathan | last=Dekel | title=Swartz doc director: Oracle and Larry Ellison killed Aaron's Law | date=May 1, 2014 | access-date=April 9, 2018 | archive-url=https://web.archive.org/web/20181003014431/https://o.canada.com/technology/swartz-doc-director-oracle-and-larry-ellison-killed-aarons-law | archive-date=October 3, 2018 | url-status=live }}</ref> The bill was reintroduced in 2015 ({{USBill|114|hr|2454}}, {{USBill|114|s|1030}}), but did not garner enough support to move forward.<ref>{{USBill|114|hr|1918|site=yes}}{{USBill|114|s|1030|site=yes}}</ref> | |||
===Communications Decency Act (CDA)=== | ===Communications Decency Act (CDA)=== | ||
In 1996, the United States enacted the ] (CDA), which attempted to regulate both ] (when available to children) and obscenity in ].<ref>"]", a ], Title V of the ], {{USStatute|104|104|110|133-139|1996|2|8}}</ref> In 1997, in the case of '']'', the ] found the anti-indecency provisions of the Act unconstitutional.<ref> |
In 1996, the United States enacted the ] (CDA), which attempted to regulate both ] (when available to children) and obscenity in ].<ref>"]", a ], Title V of the ], {{USStatute|104|104|110|133-139|1996|2|8}}</ref> In 1997, in the case of '']'', the ] found the anti-indecency provisions of the Act unconstitutional.<ref>{{cite web|url=http://www.cdt.org/grandchild/cda |title=CDA|date=24 March 2011 |archive-url=https://web.archive.org/web/20110818170331/http://www.cdt.org/grandchild/cda |archive-date=2011-08-18 |publisher=Center for Democracy and Technology}}</ref> Writing for the Court, Justice ] held that "the CDA places an unacceptably heavy burden on protected speech".<ref>{{cite web|url=http://www.ciec.org/SC_appeal/decision.shtml|title=No.96-511, JANET RENO, ATTORNEY GENERAL OF THE UNITED STATES, et al., APPELLANTS v. AMERICAN CIVIL LIBERTIES UNION et al.|archive-url=https://web.archive.org/web/20110414091859/http://www.ciec.org/SC_appeal/decision.shtml |archive-date=2011-04-14 |date=26 June 1997|work=Supreme Court Decision Index|author= Citizens Internet Empowerment Coalition}}</ref> | ||
]<ref> |
]<ref>{{cite web|url=https://www.law.cornell.edu/uscode/text/47/230 |title=§ 230 Protection for private blocking and screening of offensive material Title 47, Chapter 5, Subchapter II, Part I of the U.S. Code|publisher=Legal Information Institute, Cornell University Law School}}</ref> is a separate portion of the CDA that remains in effect. Section 230 says that operators of Internet services are not legally liable for the words of third parties who use their services and also protects ISPs from liability for good faith voluntary actions taken to restrict access to certain offensive materials<ref>material that is considered "... to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected", from § 230(c)(2)(A) "Protection for "Good Samaritan" blocking and screening of offensive material", Title 47, Chapter 5, Subchapter II, Part I of the U.S. Code"</ref> or giving others the technical means to restrict access to that material. | ||
===Child Online Protection Act (COPA)=== | ===Child Online Protection Act (COPA)=== | ||
In 1998, the United States enacted the ]<ref>{{cite web | title=47 U.S.C. 231 | work=law.cornell.edu | url=https://www.law.cornell.edu/uscode/text/47/231- | access-date=July 11, 2006}}</ref> (COPA) to restrict access by minors to any material defined as harmful to |
In 1998, the United States enacted the ]<ref>{{cite web | title=47 U.S.C. 231 | work=law.cornell.edu | url=https://www.law.cornell.edu/uscode/text/47/231- | access-date=July 11, 2006}}</ref> (COPA) to restrict access by minors to any material defined as harmful to minors on the Internet. The law was found to be unconstitutional because it would hinder protected speech among adults. It never took effect, as three separate rounds of litigation led to a permanent injunction against the law in 2009. Had the law passed, it would have effectively made it an illegal act to post anything commercial on the internet that is knowingly harmful to children without some sort of vetting program to confirm user ages.<ref>{{Cite web|url=https://abcnews.go.com/Technology/AheadoftheCurve/story?id=5428228&page=1|title=Child Online Protection Act Overturned|date=2008-07-23|website=ABC News|access-date=2017-02-27}}</ref><ref>{{cite web | title=Judge Strikes '98 Law Aimed At Online Porn | date=22 March 2007 | agency=Associated Press | url=http://www.mercurynews.com/breakingnews/ci_5494735 | access-date=March 22, 2007 | archive-url=https://web.archive.org/web/20070328202205/http://www.mercurynews.com/breakingnews/ci_5494735 | archive-date=March 28, 2007 | url-status=live }}</ref><ref>{{cite journal |url=http://jolt.law.harvard.edu/digest/uncategorized/aclu-v-mukasey |title=ACLU v. Mukasey; Third Circuit Holds Child Online Protection Act Unconstitutional |access-date=24 January 2009 |last=Lamut |first=Anna |date=3 August 2008 |journal=JOLT Digest |publisher=Harvard Journal of Law & Technology |url-status=dead |archive-url=https://archive.today/20120712130258/http://jolt.law.harvard.edu/digest/uncategorized/aclu-v-mukasey |archive-date=12 July 2012 }}</ref><ref>{{cite news |first=Scott |last=Nichols |title=COPA Child-Porn Law Killed |url=http://www.pcworld.com/article/158131/copa_childporn_law_killed.html |work=PC World |date=22 January 2009 |access-date=24 January 2009 |archive-url=https://web.archive.org/web/20120615175127/http://www.pcworld.com/article/158131/copa_childporn_law_killed.html |archive-date=15 June 2012 |url-status=live }}</ref> | ||
===Digital Millennium Copyright Act (DMCA)=== | ===Digital Millennium Copyright Act (DMCA)=== | ||
Enacted in 1998, the ] (DMCA, {{USC|17|1201}}) criminalized the production and dissemination of technology that could be used to ]<ref name="eff.org"/> and made it easier to act against alleged ] on the Internet.<ref>{{cite web|url=http://www.copyright.gov/legislation/dmca.pdf |title=The Digital Mellennium Copyright Act of 1998 |archive-url=https://web.archive.org/web/20070808232655/http://www.copyright.gov/legislation/dmca.pdf |archive-date=2007-08-08 |publisher=U.S. Copyright Office |date=December 1998}}</ref> The ] (OCILLA) is included as Title II of the DMCA<ref>], {{USC|17|512}}</ref> and limits the liability of the ]s for copyright infringement by their users.<ref>{{Cite web |title=DMCA |url=https://www.eff.org/issues/dmca |access-date=2024-05-31 |website=Electronic Frontier Foundation |language=en|archive-url=https://web.archive.org/web/20110505235721/https://www.eff.org/issues/dmca |archive-date=2011-05-05 }}</ref> | |||
===Children's Online Privacy Protection Act (COPPA)=== | ===Children's Online Privacy Protection Act (COPPA)=== | ||
The ] (COPPA) went into effect on 21 April 2000.<ref>"]", a ], located at {{usc|15|6501|6506}} ({{USStatute|105|277|112|2581-728|1998|10|21}})</ref> It applies to the online collection of personal information by persons or entities under |
The ] (COPPA) went into effect on 21 April 2000.<ref>"]", a ], located at {{usc|15|6501|6506}} ({{USStatute|105|277|112|2581-728|1998|10|21}})</ref> It applies to the online collection of personal information by persons or entities under US jurisdiction from children under 13 and details what a website operator must include in a privacy policy, when and how to seek verifiable consent from a parent or guardian, and what responsibilities an operator has to protect children's privacy and safety including restrictions on the marketing to those under 13.<ref>{{cite web|url=http://www.ftc.gov/privacy/coppafaqs.htm |title=Frequently Asked Questions about the Children's Online Privacy Protection Rule|date=February 2007 |archive-url=https://web.archive.org/web/20081012162617/http://www3.ftc.gov/privacy/coppafaqs.htm |archive-date=2008-10-12 }}, U.S. Federal Trade Commission, 7 October 2008</ref> While children under 13 can legally offer personal information with their parents' permission, many websites prohibit underage children from using their services altogether, due to the cost and amount of paperwork necessary for compliance. | ||
===Children's Internet Protection Act (CIPA)=== | ===Children's Internet Protection Act (CIPA)=== | ||
In 2000 the ] (CIPA)<ref>"Children's Internet Protection Act (CIPA)", {{USCSub|20|9134|f}} and {{USCSub|47|254|h|5}}-{{USCSub2|47|254|h|7}}</ref> was signed into law. | In 2000 the ] (CIPA)<ref>"Children's Internet Protection Act (CIPA)", {{USCSub|20|9134|f}} and {{USCSub|47|254|h|5}}-{{USCSub2|47|254|h|7}}</ref> was signed into law. | ||
CIPA requires K-12 schools and libraries receiving federal Universal Service Fund (]) discounts or ] grants for Internet access or internal connections to:<ref name=CIPA> |
CIPA requires K-12 schools and libraries receiving federal Universal Service Fund (]) discounts or ] grants for Internet access or internal connections to:<ref name=CIPA>{{cite web|url=http://www.fcc.gov/cgb/consumerfacts/cipa.html |title=Children's Internet Protection Act, updated|archive-url=https://web.archive.org/web/20071019050827/http://www.fcc.gov/cgb/consumerfacts/cipa.html |archive-date=2007-10-19 |publisher=Consumer Publications, Federal Communications Commission}}</ref> | ||
* adopt and implement an Internet safety policy addressing: (a) access by ] to inappropriate matter on the Internet; (b) the safety and security of minors when using ], ]s, and other forms of direct electronic communications; (c) unauthorized access, including so-called "]," and other unlawful activities by minors online; (d) unauthorized disclosure, use, and dissemination of ] regarding minors; and (e) measures restricting minors' access to materials harmful to them; | * adopt and implement an Internet safety policy addressing: (a) access by ] to inappropriate matter on the Internet; (b) the safety and security of minors when using ], ]s, and other forms of direct electronic communications; (c) unauthorized access, including so-called "]," and other unlawful activities by minors online; (d) unauthorized disclosure, use, and dissemination of ] regarding minors; and (e) measures restricting minors' access to materials harmful to them; | ||
* install ] that prevents access to pictures that are: (a) ], (b) ], or (c) harmful to minors (for computers that are accessed by minors); | * install ] that prevents access to pictures that are: (a) ], (b) ], or (c) harmful to minors (for computers that are accessed by minors); | ||
* |
* allow filtering or blocking to be disabled upon the request of an adult; and | ||
* adopt and enforce a policy to monitor the online activities of minors. | * adopt and enforce a policy to monitor the online activities of minors. | ||
CIPA does ''not'':<ref name=CIPA/> | CIPA does ''not'':<ref name=CIPA/> | ||
* require |
* require tracking Internet use by minors or adults; or | ||
* affect E-rate funding for schools and libraries receiving discounts for telecommunications services, such as telephone service, but not for Internet access or internal connections. | * affect E-rate funding for schools and libraries receiving discounts for telecommunications services, such as telephone service, but not for Internet access or internal connections. | ||
* require an internet filter that prevents access to video games, social media, etc. | * require an internet filter that prevents access to video games, social media, etc. | ||
===Trading with the Enemy Act (TWEA)=== | ===Trading with the Enemy Act (TWEA)=== | ||
In March 2008, the New York Times reported that a ] published by the ] (OFAC), an agency established under the ] and other federal legislation, included |
In March 2008, the '']'' reported that a ] published by the ] (OFAC), an agency established under the ] and other federal legislation, included websites, so that US companies are prohibited from doing business with those websites and must freeze their assets. The blocklist had the effect that US-based ]s must block those websites. According to the article, ], a private domain name registrar and Web hosting company operating in the US, disables domain names that appear on the ].<ref name=dropdomains>{{cite news|date=4 March 2008|author=Adam Liptak|title=A Wave of the Watch List, and Speech Disappears|work=The New York Times|url=https://www.nytimes.com/2008/03/04/us/04bar.html|access-date=22 February 2017|archive-url=https://web.archive.org/web/20170407043030/http://www.nytimes.com/2008/03/04/us/04bar.html|archive-date=7 April 2017|url-status=live}}</ref> It described eNom's disabling of a European travel agent's web sites advertising travel to ], which appeared on the list.<ref name="treas.gov">{{cite web |title=Alphabetical Listing of Specially Designated Nationals and Blocked Persons |url=http://www.treas.gov/offices/enforcement/ofac/sdn/sdnlist.txt |publisher=], ]|access-date=25 February 2009 |archive-url=https://web.archive.org/web/20090228180223/http://www.treas.gov/offices/enforcement/ofac/sdn/sdnlist.txt |archive-date=28 February 2009 |url-status=dead }}</ref> According to the report, the US government claimed that eNom was "legally required" to block the websites under US law, even though the websites were not hosted in the US, were not targeted at US persons, and were legal under foreign law. | ||
===Cybersecurity Information Sharing Act (CISA)=== | ===Cybersecurity Information Sharing Act (CISA)=== | ||
The ] (CISA) is |
The ] (CISA) is intended to "improve ] in the United States through enhanced sharing of information about cybersecurity threats and for other purposes".<ref>{{cite web|url=https://www.feinstein.senate.gov/public/index.cfm/files/serve/?File_id=08de1c1b-446b-478c-84a8-0c3f35963216 |title=Discussion Draft of the 'Cybersecurity Information Sharing Act of 2014' (S.2588)|archive-url=https://web.archive.org/web/20140825121127/http://www.feinstein.senate.gov/public/index.cfm/files/serve/?File_id=08de1c1b-446b-478c-84a8-0c3f35963216 |archive-date=2014-08-25 |date=June 11, 2014 |author=113th Congress, 2d Session}}</ref> The law allows the sharing of Internet traffic information between the US government and technology and manufacturing companies. The bill's text was incorporated by amendment into a ],<ref name="congress.gov">{{Cite web |url=https://www.congress.gov/bill/114th-congress/house-bill/2029 |title=H.R.2029 - Military Construction and Veterans Affairs and Related Agencies Appropriations Act, 2016 |access-date=2018-04-08 |archive-url=https://web.archive.org/web/20180421051543/https://www.congress.gov/bill/114th-congress/house-bill/2029 |archive-date=2018-04-21 |url-status=live }}</ref><ref>{{cite news|url=https://www.engadget.com/2015/12/18/house-senate-pass-budget-with-cisa/ |title=Budget bill heads to President Obama's desk with CISA intact|archive-url=https://web.archive.org/web/20180409043831/https://www.engadget.com/2015/12/18/house-senate-pass-budget-with-cisa/ |archive-date=2018-04-09 |first=Chris |last=Velazco|newspaper=Engadget|date=December 18, 2015}}</ref><ref>{{cite web|url=https://www.cisecurity.org/newsletter/cybersecurity-information-sharing-act-of-2015/ |title=Cybersecurity Information Sharing Act of 2015|archive-url=https://web.archive.org/web/20181104193255/https://www.cisecurity.org/newsletter/cybersecurity-information-sharing-act-of-2015/ |archive-date=2018-11-04 |first=Thomas F. |last=Duffy|publisher=Center for Information Security|date=May 2016 |volume =11 |issue =5}}</ref><ref>{{cite web|url=https://corpgov.law.harvard.edu/2016/03/03/federal-guidance-on-the-cybersecurity-information-sharing-act-of-2015/ |title=Federal Guidance on the Cybersecurity Information Sharing Act of 2015|archive-url=https://web.archive.org/web/20180408224954/https://corpgov.law.harvard.edu/2016/03/03/federal-guidance-on-the-cybersecurity-information-sharing-act-of-2015/ |archive-date=2018-04-08 |first1=Brad S. |last1=Karp|last2=Paul, Weiss, Rifkind, Wharton & Garrison LLP|date= March 3, 2016|publisher=Harvard Law School Forum on Corporate Governance and Financial Regulation}}</ref> | ||
Opponents |
Opponents questioned the CISA's value, believing it would move responsibility from private business to the government, thereby increasing the vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the ] and local police. Some felt that the act was more conducive to surveillance than security after many of the privacy protections from the original bill were removed.<ref name=Wired>{{cite magazine|url=https://www.wired.com/2015/03/cisa-security-bill-gets-f-security-spying/|title=CISA Security Bill: An F for Security But an A+ for Spying|magazine=Wired|author=Andy Greenberg|date=20 Mar 2015|access-date=31 Jul 2015|archive-url=https://web.archive.org/web/20150723180359/http://www.wired.com/2015/03/cisa-security-bill-gets-f-security-spying/|archive-date=23 July 2015|url-status=live}}</ref> | ||
===Stop Advertising Victims of Exploitation Act of 2015 (SAVE)=== | ===Stop Advertising Victims of Exploitation Act of 2015 (SAVE)=== | ||
The Stop Advertising Victims of Exploitation Act of 2015 (SAVE) is part of the larger ] |
The Stop Advertising Victims of Exploitation Act of 2015 (SAVE) is part of the larger ].<ref>{{cite web|url=https://www.congress.gov/bill/114th-congress/senate-bill/178 |title=The Justice for Victims of Trafficking Act of 2015 Pub. L 144-22 |archive-url=https://web.archive.org/web/20180408010725/https://www.congress.gov/bill/114th-congress/senate-bill/178 |archive-date=2018-04-08 |date=May 29, 2015}}</ref> The SAVE Act makes it illegal to knowingly advertise content related to sex trafficking, including online advertising. The law established federal criminal liability for third-party content. One concern was that this would lead companies to over-censor, or to limit the practice of monitoring content altogether to avoid "knowledge" of illegal content.<ref>{{cite web|url=https://freedomhouse.org/report/freedom-net/2017/united-states|archive-url=https://web.archive.org/web/20180327023745/https://freedomhouse.org/report/freedom-net/2017/united-states |archive-date=2018-03-27 |title=Freedom On the Net 2017 |publisher=Freedom House|access-date=April 8, 2018}}</ref> | ||
===Americans with Disabilities Act (ADA)=== | ===Americans with Disabilities Act (ADA)=== | ||
In 2016, complainants from ] brought a lawsuit against ] for not adding closed captioning to the recorded lectures it made free to the public. In |
In 2016, complainants from ] brought a lawsuit against ] for not adding ] to the recorded lectures it made free to the public. In an ] of the ], the ] ruling resulted in Berkeley deleting 20,000 freely licensed videos instead of making them more accessible, which Berkeley had described as cost prohibitive.<ref>{{cite web|url=http://reason.com/blog/2017/03/07/berkeley-deletes-200000-free-online-vide|title=Berkeley removes 20,000 free online videos to comply with insane Department of Justice ruling|first=Robby|last=Soave|work=Reason (magazine)|date=2017-03-07|access-date=2017-03-18|archive-url=https://web.archive.org/web/20170318173419/http://reason.com/blog/2017/03/07/berkeley-deletes-200000-free-online-vide|archive-date=2017-03-18|url-status=live}}</ref> | ||
===Allow States and Victims to Fight Online Sex Trafficking Act - Stop Enabling Sex Traffickers Act (FOSTA-SESTA)=== | ===Allow States and Victims to Fight Online Sex Trafficking Act - Stop Enabling Sex Traffickers Act (FOSTA-SESTA)=== | ||
] (FOSTA) |
] (FOSTA) was introduced in the US House of Representatives in 2017. ] (SESTA) was a similar US Senate bill. The combined FOSTA-SESTA package was enacted in 2018.<ref>{{Cite news |url=https://www.nytimes.com/2018/04/11/us/backpage-sex-trafficking.html?&moduleDetail=section-news-3&action=click&contentCollection=Politics®ion=Footer&module=MoreInSection&version=WhatsNext&contentID=WhatsNext&pgtype=article |title=Trump Signs Bill Amid Momentum to Crack Down on Trafficking |author=Elizabeth Dias |work=The New York Times |date=2018-04-11 |access-date=2018-04-11 |language=en |archive-url=https://web.archive.org/web/20180412003103/https://www.nytimes.com/2018/04/11/us/backpage-sex-trafficking.html?&moduleDetail=section-news-3&action=click&contentCollection=Politics®ion=Footer&module=MoreInSection&version=WhatsNext&contentID=WhatsNext&pgtype=article |archive-date=2018-04-12 |url-status=live }}</ref><ref>{{Cite news |url=https://www.forbes.com/sites/larrymagid/2018/04/06/doj-seizes-backpage-com-weeks-after-congress-passes-sex-trafficking-law/ |title=DOJ Seizes Backpage.com Weeks After Congress Passes Sex Trafficking Law |author=Larry Magid |work=Forbes |date=2018-04-06 |access-date=2018-04-08 |language=en |archive-url=https://web.archive.org/web/20180408051549/https://www.forbes.com/sites/larrymagid/2018/04/06/doj-seizes-backpage-com-weeks-after-congress-passes-sex-trafficking-law/#6e55a89750ba |archive-date=2018-04-08 |url-status=live }}</ref> | ||
The bill amended Section 230 of the Communications Decency Act to exclude the enforcement of federal and state sex trafficking laws from immunity and clarified |
The bill amended Section 230 of the Communications Decency Act to exclude the enforcement of federal and state sex trafficking laws from immunity and clarified SESTA to define participation in a venture as knowingly assisting, facilitating, or supporting sex trafficking.<ref>{{cite web |url=https://www.congress.gov/bill/115th-congress/house-bill/1865 |title=H.R.1865 - 115th Congress (2017-2018): Allow States and Victims to Fight Online Sex Trafficking Act of 2017 |first=Wagner |last=Ann |date=March 21, 2018 |website=congress.gov |access-date=April 8, 2018 |archive-url=https://web.archive.org/web/20180408082712/https://www.congress.gov/bill/115th-congress/house-bill/1865 |archive-date=April 8, 2018 |url-status=live }}</ref> | ||
The bills were criticized |
The bills were criticized as a "disguised internet censorship bill" that weakened Section 230 safe harbors, placed unnecessary burdens on internet companies and intermediaries that handle user-generated content or communications with service providers required to proactively take action against sex trafficking activities, and required a "team of lawyers" to evaluate all possible scenarios.<ref>{{Cite news|url=https://www.aclu.org/letter/aclu-letter-opposing-sesta|title=ACLU letter opposing SESTA|work=American Civil Liberties Union|access-date=2018-03-25|language=en|archive-url=https://web.archive.org/web/20180324175718/https://www.aclu.org/letter/aclu-letter-opposing-sesta|archive-date=2018-03-24|url-status=live}}</ref><ref>{{cite news|url=https://www.theverge.com/2017/11/11/16637774/wikipedia-sesta-serious-concerns-section-230-internet|title=Misplaced Pages warns that SESTA will strip away protections vital to its existence|work=The Verge|access-date=2018-03-08|archive-url=https://web.archive.org/web/20180309054413/https://www.theverge.com/2017/11/11/16637774/wikipedia-sesta-serious-concerns-section-230-internet|archive-date=2018-03-09|url-status=live}}</ref><ref name="verge-proxyfight">{{cite news|url=https://www.theverge.com/2017/9/14/16308066/sex-trafficking-bill-sesta-google-cda-230|title=Sex trafficking bill is turning into a proxy war over Google|work=The Verge|access-date=2017-09-20|archive-url=https://web.archive.org/web/20170921045757/https://www.theverge.com/2017/9/14/16308066/sex-trafficking-bill-sesta-google-cda-230|archive-date=2017-09-21|url-status=live}}</ref><ref name=":1">{{cite news|url=http://www.washingtonexaminer.com/tech-community-fighting-online-sex-trafficking-bill-over-fears-it-will-stifle-innovation/article/2634402|title=Tech community fighting online sex trafficking bill over fears it will stifle innovation|last=Quinn|first=Melissa|work=Washington Examiner|access-date=2017-09-20|language=en|archive-url=https://web.archive.org/web/20170919142831/http://www.washingtonexaminer.com/tech-community-fighting-online-sex-trafficking-bill-over-fears-it-will-stifle-innovation/article/2634402|archive-date=2017-09-19|url-status=live}}</ref> ]s argued that the bill would harm their safety, as the platforms they utilize for offering and discussing sexual services (as an alternative to ]) had reduced their services or shut down entirely due to the threat of liability.<ref>{{Cite magazine|url=https://www.rollingstone.com/politics/features/controversial-anti-sex-trafficking-bill-screw-over-sex-workers-w518323|title=How a New Senate Bill Will Screw Over Sex Workers|magazine=Rolling Stone|access-date=2018-03-25|archive-url=https://web.archive.org/web/20180324180235/https://www.rollingstone.com/politics/features/controversial-anti-sex-trafficking-bill-screw-over-sex-workers-w518323|archive-date=2018-03-24|url-status=live}}</ref><ref>{{Cite news|url=https://www.thedailybeast.com/sex-workers-fear-for-their-future-how-sesta-is-putting-many-prostitutes-in-peril|title=Sex Workers Fear for Their Future: How SESTA Is Putting Many Prostitutes in Peril|last=Zimmerman|first=Amy|date=2018-04-04|work=The Daily Beast|access-date=2018-04-07|language=en|archive-url=https://web.archive.org/web/20180407080216/https://www.thedailybeast.com/sex-workers-fear-for-their-future-how-sesta-is-putting-many-prostitutes-in-peril|archive-date=2018-04-07|url-status=live}}</ref> | ||
==Proposed federal legislation that has not become law== | ==Proposed federal legislation that has not become law== | ||
===Deleting Online Predators Act (DOPA)=== | ===Deleting Online Predators Act (DOPA)=== | ||
The ] was |
The ] would have required schools, some businesses, and libraries to block minors' access to social networking websites. The bill was controversial because, according to its critics, it would limit access to a wide range of websites, including many with harmless and educational material.<ref>{{cite web|url=http://www.govtrack.us/congress/bill.xpd?bill=h109-5319 |title=H.R. 5319: Deleting Online Predators Act of 2006 |archive-url=https://web.archive.org/web/20111230150433/http://www.govtrack.us/congress/bill.xpd?bill=h109-5319 |archive-date=2011-12-30 |website=govtrack.us|date= 9 May 2006}}</ref> Two similar bills were introduced in 2007, but neither became law.<ref>{{Cite web |title=Deleting Online Predators Act of 2007 (2007 - H.R. 1120) |url=https://www.govtrack.us/congress/bills/110/hr1120 |access-date=2024-05-31 |website=GovTrack.us |language=en|archive-url=https://web.archive.org/web/20081201102043/http://www.govtrack.us/congress/bill.xpd?bill=h110-1120 |archive-date=2008-12-01 |date=16 February 2007}}</ref><ref>{{Cite web |title=Deleting Online Predators Act of 2006 (2006 - H.R. 5319) |url=https://www.govtrack.us/congress/bills/109/hr5319 |access-date=2024-05-31 |website=GovTrack.us |language=en|archive-url=https://web.archive.org/web/20111230150433/http://www.govtrack.us/congress/bill.xpd?bill=h109-5319 |archive-date=2011-12-30 |date= 2 August 2007}}</ref> | ||
The proposed legislation would have required schools, some businesses, and libraries to block minors' access to social networking websites. The bill was controversial because, according to its critics, it would limit access to a wide range of websites, including many with harmless and educational material. | |||
===Protecting Cyberspace as a National Asset Act (PCNAA) === | ===Protecting Cyberspace as a National Asset Act (PCNAA) === | ||
⚫ | The 2010 ].<ref>{{Cite web |title=Protecting Cyberspace as a National Asset Act of 2010 (2010 - H.R. 5548) |url=https://www.govtrack.us/congress/bills/111/hr5548 |access-date=2024-05-31 |website=GovTrack.us |language=en|date=16 June 2010}}</ref> generated controversy for what critics perceived as its authorization for the US president to apply a full block of the Internet in the US<ref>{{cite web|url=https://www.wired.com/images_blogs/threatlevel/2011/01/Myth-v-Reality.pdf |title=Myth vs. Reality: The Facts About S. 3480, "Protecting Cyberspace as a National Asset Act of 2010|archive-url=https://web.archive.org/web/20170702143639/https://www.wired.com/images_blogs/threatlevel/2011/01/Myth-v-Reality.pdf |archive-date=2017-07-02 |access-date=9 February 2011}}, fact sheet issued by Senators Joseph I. Lieberman, Chairman, and Susan M. Collins, Ranking Member, ] ]</ref> | ||
The ] was introduced in 2010 but did not become law.<ref>, govtrack.us, 16 June 2010</ref> | |||
The Executive Cyberspace Coordination Act of 2011<ref>{{Cite web |title=Executive Cyberspace Coordination Act of 2011 (2011 - H.R. 1136) |url=https://www.govtrack.us/congress/bills/112/hr1136 |access-date=2024-05-31 |website=GovTrack.us |language=en|archive-url=https://web.archive.org/web/20111026033841/http://www.govtrack.us/congress/bill.xpd?bill=h112-1136 |archive-date=2011-10-26 |date=16 March 2011}}</ref> took a different approach. | |||
⚫ | The |
||
A new bill, the Executive Cyberspace Coordination Act of 2011, was under consideration by the U.S. Congress in 2011.<ref> {{Webarchive|url=https://web.archive.org/web/20111026033841/http://www.govtrack.us/congress/bill.xpd?bill=h112-1136 |date=2011-10-26 }}, govtrack.us, 16 March 2011</ref> The new bill addresses many of the same issues as, but takes quite a different approach from the Protecting Cyberspace as a National Asset Act. | |||
===Combating Online Infringement and Counterfeits Act (COICA)=== | ===Combating Online Infringement and Counterfeits Act (COICA)=== | ||
The ] |
The 2010 ]<ref name=S.3804>{{cite web|url=http://www.govtrack.us/congress/bill.xpd?bill=s111-3804|title=S.3804: Combating Online Infringement and Counterfeits Act - 20 September 2010|work=GovTrack.us|date=September 20, 2010|access-date=October 16, 2010|archive-url=https://web.archive.org/web/20101121022559/http://www.govtrack.us/congress/bill.xpd?bill=s111-3804|archive-date=21 November 2010|url-status=live}}</ref> would have allowed the US Attorney General to bring an '']'' action against an infringing domain name in the ], and seek an order requesting ]. If granted, such an order would compel the registrar of the domain name in question to suspend the operation of, and may lock, the domain name.<ref name="S.3804" /> | ||
⚫ | The US Justice Department would maintain two publicly available lists of domain names.<ref name="S.3804" /> The first list would contain domain names against which the Attorney General has obtained injunctions. The second list would contain domains alleged to be infringing, but against which no action had been taken. Any service provider who willingly took steps to block access to sites on this second list would be immune from prosecution. | ||
The proposed Act would have allowed the U.S. Attorney General to bring an '']'' action against an infringing domain name in the ], and seek an order requesting ]. If granted, such an order would compel the registrar of the domain name in question to suspend the operation of, and may lock, the domain name.<ref name=S.3804/> | |||
⚫ | The |
||
===Stop Online Piracy Act (SOPA)=== | ===Stop Online Piracy Act (SOPA)=== | ||
The ] (SOPA) |
The 2011 ] (SOPA) would have allowed the US Department of Justice, as well as copyright holders, to seek court orders against websites accused of enabling or facilitating ]. Depending on who requested the court orders, the actions could include barring online advertising networks and payment facilitators such as ] from doing business with the allegedly infringing website, barring search engines from linking to such sites, and requiring Internet service providers to block access to such sites. Many argued that requiring ISP's to block access to certain websites constituted censorship. On January 18, 2012, the English ] shut down for 24 hours to protest SOPA and PIPA. In the wake of many protests, consideration of the legislation was put on hold.<ref name="NYT-20120120">{{cite news |last=Weisman |first=Jonathan |title=After an Online Firestorm, Congress Shelves Antipiracy Bills |url=https://www.nytimes.com/2012/01/21/technology/senate-postpones-piracy-vote.html |date=January 20, 2012 |work=]|access-date=January 20, 2012 |archive-url=https://web.archive.org/web/20120120233842/http://www.nytimes.com/2012/01/21/technology/senate-postpones-piracy-vote.html |archive-date=January 20, 2012 |url-status=live }}</ref> | ||
Senator ], an Oregon Democrat and a key opponent of the bills, said lawmakers had collected more than 14 million names — more than 10 million of them voters — who contacted them to protest the once-obscure legislation.<ref name="NYT-20120120"/> | |||
===Protect Intellectual Property Act (PIPA)=== | ===Protect Intellectual Property Act (PIPA)=== | ||
The ] (Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act, or PIPA) was |
The 2011 ] (Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act, or PIPA) was attempted to give the US government and copyright holders additional tools to curb "rogue websites dedicated to infringing or counterfeit goods", especially those registered outside the US.<ref name=CNet>{{cite web|url=http://news.cnet.com/8301-31921_3-20062398-281.html|title=Senate bill amounts to death penalty for Web sites|date=May 12, 2011|publisher=CNET|access-date=Nov 7, 2011|archive-url=https://web.archive.org/web/20121025153055/http://news.cnet.com/8301-31921_3-20062398-281.html|archive-date=October 25, 2012|url-status=live}}</ref> PIPA was a re-write of the ] (COICA),<ref name=BBC-tech>{{cite news|title=Americans face piracy website blocking|url=https://www.bbc.co.uk/news/technology-13387795|access-date=May 24, 2011|publisher=BBC|date=May 13, 2011|archive-url=https://web.archive.org/web/20110517020444/http://www.bbc.co.uk/news/technology-13387795|archive-date=May 17, 2011|url-status=live}}</ref> which failed to pass in 2010. In the wake of protests the bill was put on hold.<ref name="NYT-20120120" /><ref>{{cite news|first=Stephanie |last=Condon |date= January 2012|url=https://www.cbsnews.com/news/pipa-sopa-put-on-hold-in-wake-of-protests/ |title=PIPA, SOPA put on hold in wake of protests|archive-url=https://web.archive.org/web/20120323124100/http://www.cbsnews.com/8301-503544_162-57362675-503544/pipa-sopa-put-on-hold-in-wake-of-protests/ |archive-date=2012-03-23 |url-status=live |publisher=]}}</ref> | ||
===Cyber Intelligence Sharing and Protection Act (CISPA)=== | ===Cyber Intelligence Sharing and Protection Act (CISPA)=== | ||
{{Commons category|Cyber Intelligence Sharing and Protection Act}} | {{Commons category|Cyber Intelligence Sharing and Protection Act}} | ||
The ] (CISPA) |
The 2011, 2013, and 2015 ] (CISPA) attempted to give the government additional options and resources to ensure network security.<ref>{{cite web|title=HR 3523 as reported to the House Rules Committee|url=http://www.rules.house.gov/Media/file/PDF_112_2/LegislativeText/CPRT-112-HPRT-RU00-HR3523.pdf|url-status=dead|archive-url=https://web.archive.org/web/20120522154416/http://www.rules.house.gov/Media/file/PDF_112_2/LegislativeText/CPRT-112-HPRT-RU00-HR3523.pdf|archive-date=2012-05-22}}</ref> CISA was a similar Senate bill that was enacted.<ref>{{Cite web |url=https://www.engadget.com/2015/12/18/house-senate-pass-budget-with-cisa/ |title=Budget bill heads to President Obama's desk with CISA intact |date=18 December 2015 |access-date=2018-04-08 |archive-url=https://web.archive.org/web/20180409043831/https://www.engadget.com/2015/12/18/house-senate-pass-budget-with-cisa/ |archive-date=2018-04-09 |url-status=live }}</ref> | ||
CISPA was supported by |
CISPA was supported by trade groups representing more than eight hundred private companies, including the ], ], ], ], ], ], ] and ], in addition to major telecommunications and information technology companies including ], ], ], ], ], ], and ].<ref>{{cite web |url=http://intelligence.house.gov/hr-3523-letters-support |title=H.R. 3523 - Letters of Support |publisher=House Permanent Select Committee on Intelligence |access-date=April 26, 2012 |url-status=dead |archive-url=https://web.archive.org/web/20120426182510/http://intelligence.house.gov/hr-3523-letters-support |archive-date=April 26, 2012 }}</ref><ref>{{cite web |url=http://www.digitaltrends.com/web/cispa-supporters-list-800-companies-that-could-help-uncle-sam-snag-your-data/ |title=CISPA supporters list: 800+ companies that could help Uncle Sam snag your data |publisher=Digital Trends |access-date=12 April 2012 |archive-url=https://web.archive.org/web/20190417202015/https://www.digitaltrends.com/web/cispa-supporters-list-800-companies-that-could-help-uncle-sam-snag-your-data/ |archive-date=17 April 2019 |url-status=live }}</ref> | ||
] expressed concern that in the name of |
] expressed concern that in the name of fighting cybercrime, it would allow the government and private companies to monitor, even censor, the Web.<ref>{{cite web | ||
|url=http://en.rsf.org/etats-unis-draconian-cyber-security-bill-06-04-2012,42283.html | |url=http://en.rsf.org/etats-unis-draconian-cyber-security-bill-06-04-2012,42283.html | ||
|title=Draconian cyber security bill could lead to Internet surveillance and censorship | |title=Draconian cyber security bill could lead to Internet surveillance and censorship | ||
Line 122: | Line 112: | ||
|archive-url=https://web.archive.org/web/20160312110058/http://en.rsf.org/etats-unis-draconian-cyber-security-bill-06-04-2012,42283.html | |archive-url=https://web.archive.org/web/20160312110058/http://en.rsf.org/etats-unis-draconian-cyber-security-bill-06-04-2012,42283.html | ||
|archive-date=12 March 2016 | |archive-date=12 March 2016 | ||
|url-status= |
|url-status=dead | ||
}}</ref> Other organizations that oppose the bill include the ], ], ], ], ], ], ], and TechFreedom. Google |
}}</ref> Other organizations that oppose the bill include the ], ], ], ], ], ], ], and TechFreedom. ] lobbied for it.<ref>{{cite news |url=https://thehill.com/policy/technology/112212-google-acknowledges-lobbying-on-cybersecurity-bill-cispa/ |title=Google acknowledges lobbying on cybersecurity bill CISPA |access-date=9 May 2012 |date=23 April 2012 |author=Brendan Sasso |work=The Hill |publisher=Capitol Hill Publishing Corp. |archive-url=https://web.archive.org/web/20140316025555/http://thehill.com/blogs/hillicon-valley/technology/223069-google-acknowledges-lobbying-on-cybersecurity-bill-cispa |archive-date=16 March 2014 |url-status=live }}</ref> | ||
===RESTRICT Act/DATA Act=== | ===RESTRICT Act/DATA Act=== | ||
In 2023, the United States Government tried |
In 2020 and 2023, the United States Government tried to ban social media app ]. The DATA Act would have banned the selling of non-public personal data to third party buyers.<ref name="ReferenceA">{{Cite web|url=https://www.congress.gov/bill/118th-congress/house-bill/1165/text|title=Text - H.R.1165 - 118th Congress (2023-2024): Data Privacy Act of 2023 | Congress.gov | Library of Congress}}</ref> The RESTRICT Act would allow the ] to review any attempt of a tech company to "]" the United States. In this scenario, after a review by the Secretary and other relevant departments found "security risks" then the government can restrict a company, service, or product.<ref name="ReferenceB">{{Cite web|url=https://www.congress.gov/bill/118th-congress/senate-bill/686/text?s=1&r=15|title=Text - S. 686–118th Congress (2023-2024): RESTRICT Act | Congress.gov | Library of Congress}}</ref> This would let the government investigate and possibly ban any site they deem a threat to national security. Violation by a US citizen would result in a fine of up to $1,000,000 or up to 20 years in prison. While the RESTRICT act does not mention TikTok by name, it was implied as this bill paralleled calls to ban TikTok.<ref>{{cite web | url=https://www.nbcnews.com/politics/congress/live-blog/tik-tok-ban-live-updates-rcna76003 | title=TikTok CEO doesn't seem to sway Congress as U.S. Considers a TikTok ban | publisher=]| date=23 March 2023 }}</ref> | ||
This bill is currently been introduced and has not passed as of current.<ref name="ReferenceA"/><ref name="ReferenceB"/> | |||
==State laws== | ==State laws== | ||
In November |
In November 2019 the ] listed twenty-seven states with laws that apply to Internet use at publicly funded schools or libraries:<ref name=NCSLLRFBUPSL>{{cite web|url=http://www.ncsl.org/research/telecommunications-and-information-technology/state-internet-filtering-laws.aspx |title=Children and the Internet: Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries|archive-url=https://web.archive.org/web/20131109162835/http://www.ncsl.org/research/telecommunications-and-information-technology/state-internet-filtering-laws.aspx |archive-date=2013-11-09 |publisher=]|date= 16 November 2016 |access-date= 8 April 2018}}</ref> | ||
<blockquote> | <blockquote> | ||
The majority of these states simply require school boards/districts or public libraries to adopt Internet use policies to prevent minors from gaining access to sexually explicit, obscene or harmful materials. However, some states also require publicly funded institutions to install filtering software on library terminals or school computers. | The majority of these states simply require school boards/districts or public libraries to adopt Internet use policies to prevent minors from gaining access to sexually explicit, obscene or harmful materials. However, some states also require publicly funded institutions to install filtering software on library terminals or school computers. | ||
</blockquote> | </blockquote> | ||
The states that require schools and |
The states that require schools and libraries to adopt policies to protect minors include: California, Delaware, Georgia, Indiana, Iowa, Kentucky, Louisiana, Maryland, Massachusetts, New Hampshire, New York, Rhode Island, South Carolina, and Tennessee. Florida law "encourages public libraries to adopt an Internet safety education program, including the implementation of a computer-based educational program".<ref name=NCSLLRFBUPSL/> | ||
The states that require ] and |
The states that require ] and libraries to protect minors are: Arizona, Arkansas, Colorado, Idaho, Kansas, Michigan, Minnesota, Missouri, Ohio, Pennsylvania, South Dakota, Utah, and Virginia. Five states require Internet service providers to make a product or service available to subscribers to control use of the Internet. They are: Louisiana, Maryland, Nevada, Texas, and Utah.<ref name=NCSLLRFBUPSL/> | ||
⚫ | In July 2011 ] lawmakers passed the Amy Hestir Student Protection Act which included a provision that barred K-12 teachers from using websites that allow "exclusive access" in communications with current students or former students who are 18 or younger, such as occurs with private messages.<ref>{{cite web|url=http://www.senate.mo.gov/11info/BTS_Web/Bill.aspx?BillID=4066479&SessionType=R |title=Section 162.069 of SB 54 |archive-url=https://web.archive.org/web/20110904072616/http://www.senate.mo.gov/11info/BTS_Web/Bill.aspx?SessionType=R&BillID=4066479 |archive-date=2011-09-04 }}</ref> A ] order issued before the law went into effect blocked the provision because "the breadth of the prohibition is staggering" and the law "would have a ]" on ] rights.<ref>{{cite web|url=http://www.colecountycourts.org/Missouri%20State%20Teachers%20vs%20Missouri.pdf |title=Order Entering Preliminary Injunction in Missouri State Teachers Association, ''et al''. v. State of Missouri, ''et al.'' Case No.: 11AC-CC00553, Circuit Court of Cole County, Missouri |archive-url=https://web.archive.org/web/20120425235704/http://www.colecountycourts.org/Missouri%20State%20Teachers%20vs%20Missouri.pdf |archive-date=2012-04-25 |first=Jon E. Circuit Judge|last=Beeterm|date=26 August 2011}}</ref> In September the legislature replaced the controversial provision with a requirement that local school districts develop their own policies on the use of electronic communication between employees and students.<ref>{{cite web|url=http://verdict.justia.com/2011/09/13/can-teachers-and-their-students-be-banned-from-becoming-facebook-friends |title=Can Teachers and Their Students Be Banned from Becoming Facebook Friends?|archive-url=https://web.archive.org/web/20110925044458/http://verdict.justia.com/2011/09/13/can-teachers-and-their-students-be-banned-from-becoming-facebook-friends |archive-date=2011-09-25 |first=Anita |last=Ramasastry|date=13 September 2011}}</ref><ref>{{cite web|url=https://www.boston.com/news/nation/articles/2011/09/23/mo_lawmakers_pass_revised_teacher_facebook_law/ |title=Mo. lawmakers vote to repeal teacher-Facebook law|archive-url=https://web.archive.org/web/20110925073316/http://www.boston.com/news/nation/articles/2011/09/23/mo_lawmakers_pass_revised_teacher_facebook_law/ |archive-date=2011-09-25 |first=David A. |last=Lieb|work=The Boston Globe |date=23 September 2011}}</ref> | ||
And five states require Internet service providers to make a product or service available to subscribers to control use of the Internet. They are: Louisiana, Maryland, Nevada, Texas, and Utah.<ref name=NCSLLRFBUPSL/> | |||
In May 2023, Montana enacted a ban on TikTok from operating within or offering its services to anyone within the state's borders.<ref>{{cite news|url=https://www.reuters.com/world/us/montana-governor-signs-bill-banning-tiktok-state-2023-05-17 |title= | |||
⚫ | In July 2011 ] lawmakers passed the Amy Hestir Student Protection Act which included a provision that barred K-12 teachers from using websites that allow "exclusive access" in communications with current students or former students who are 18 or younger, such as occurs with private messages |
||
Montana to become first US state to ban TikTok|first=David |last=Shepardson|date=May 17, 2023|work=]}}</ref> In December 2023, the ban was blocked by a federal judge who ruled that the statute was an unconstitutional restriction on free speech.<ref>{{cite news|url=https://www.reuters.com/legal/us-judge-blocks-montana-banning-tiktok-use-state-2023-11-30/|title=Montana to become first US state to ban TikTok|first=David |last=Shepardson|date=May 17, 2023}}</ref> | |||
In December 2016, ], member of the South Carolina House of Representatives, introduced a bill that would require all computers to be sold with "digital blocking capabilities" to restrict access to pornographic materials. Users or manufacturers would be required to pay a $20 fee in order to lift the blocks.<ref name="verge-scblocklaw">{{cite web|title=Proposed bill would block porn from computers sold in South Carolina, somehow|url=https://www.theverge.com/2016/12/19/14010830/south-carolina-porn-ban-bill-chumley-computers|website=The Verge|date=19 December 2016 |publisher=Vox Media|access-date=20 December 2016|archive-url=https://web.archive.org/web/20161220214528/http://www.theverge.com/2016/12/19/14010830/south-carolina-porn-ban-bill-chumley-computers|archive-date=20 December 2016|url-status=live}}</ref> As of April 2018 the bill had not become law, but remained pending before the House Committee on Judiciary.<ref>{{cite web |title=A Bill to Amend Chapter 15, Title 16 of the 1976 Code by adding Article 5: Human Trafficking Prevention Act (H.3003) |url=https://www.scstatehouse.gov/sess122_2017-2018/bills/3003.htm |website=www.scstatehouse.gov |publisher=South Carolina General Assembly, 122nd Session, 2017-2018 |access-date=April 8, 2018 |archive-url=https://web.archive.org/web/20180408210344/https://www.scstatehouse.gov/sess122_2017-2018/bills/3003.htm |archive-date=April 8, 2018 |url-status=live }}</ref> | |||
In March 2018, ] and ], members of the Rhode Island State Senate, introduced a bill requiring Internet Service Providers to institute a block on pornographic materials, which could be lifted with the payment of a $20 fee.<ref name="provjournal-riblocklaw">{{cite web |title=R.I. bill would impose fee for accessing online porn |url=http://www.providencejournal.com/news/20180302/ri-bill-would-impose-fee-for-accessing-online-porn |author=Jacqueline Tempera |work=Providence Journal |date=March 2, 2018 |access-date=6 March 2018 |archive-url=https://web.archive.org/web/20180305190210/http://www.providencejournal.com/news/20180302/ri-bill-would-impose-fee-for-accessing-online-porn |archive-date=5 March 2018 |url-status=live }}</ref><ref>{{cite web |title=An Act Relating to Public Utilities and Carriers - Internet Digital Blocking |url=http://webserver.rilin.state.ri.us/BillText/BillText18/SenateText18/S2584.pdf |website=webserver.rilin.state.ri.us |publisher=State of Rhode Island General Assembly, January Session, A.D. 2018 |date=March 1, 2018 |access-date=April 8, 2018 |archive-url=https://web.archive.org/web/20180328191212/http://webserver.rilin.state.ri.us/BillText/BillText18/SenateText18/S2584.pdf |archive-date=March 28, 2018 |url-status=live }}</ref><ref>{{cite web |url=https://www.eff.org/deeplinks/2018/02/state-lawmakers-want-block-pornography-expense-your-free-speech-privacy-and-hard |title=State Lawmakers Want to Block Pornography at the Expense of Your Free Speech, Privacy, and Hard-Earned Cash |publisher=Electronic Frontier Foundation |date=February 28, 2018 |first=Gennie |last=Gebhart |access-date=June 20, 2018 |archive-url=https://web.archive.org/web/20180627153639/https://www.eff.org/deeplinks/2018/02/state-lawmakers-want-block-pornography-expense-your-free-speech-privacy-and-hard |archive-date=June 27, 2018 |url-status=live }}</ref> | |||
== Court rulings == | == Court rulings == | ||
In April 2022, District Judge ] issued a site blocking order against three piracy websites, which were cited in lawsuits brought upon by a group of Israeli media companies, but whose operators failed to appear in court. The order |
In April 2022, District Judge ] issued a site ] order against three ] websites, which were cited in lawsuits brought upon by a group of Israeli media companies, but whose operators failed to appear in court. The order mandated that the three websites, as well as any "newly-discovered websites" found to be operated by the defendants, be blocked by all US ISPs. It prohibited any third-party service operator from doing business with or offering services to the defendants, and ordered that their domain names be seized and transferred to the plaintiffs. This order is similar to, but goes beyond what was proposed in SOPA.<ref>{{Cite web |last=Masnick |first=Mike |date=2022-05-04 |title=Who Needs SOPA: Judge Orders Every US ISP To Block Entire Websites Accused Of Enabling Piracy |url=https://www.techdirt.com/2022/05/04/who-needs-sopa-judge-orders-every-us-isp-to-block-entire-websites-accused-of-enabling-piracy/ |access-date=2022-05-04 |website=Techdirt |language=en-US}}</ref><ref>{{Cite web |last=Robertson |first=Adi |date=2022-05-06 |title=Sweeping legal ruling orders ISPs to block pirate sites |url=https://www.theverge.com/2022/5/6/23057391/pirate-site-injunction-isp-blocking-requirement |access-date=2022-05-06 |website=The Verge |language=en}}</ref> | ||
==Censorship by institutions== | ==Censorship by institutions== | ||
{{See also |Corporate censorship}} | {{See also |Corporate censorship}} | ||
The ] and other ] protections that prohibit or limit government censorship of the Internet do not generally apply to ]s. Corporations may |
The ] and other ] protections that prohibit or limit government censorship of the Internet do not generally apply to ]s. Corporations may choose to limit the content they make available or allow others to make available on the Internet.<ref name="law.wustl.edu"/> Corporations may be encouraged by government pressure or required by law or ] to remove or limit access to content that is judged to be ] (including ]), harmful to children, ], pose a threat to ], promote illegal activities such as ], ], theft of ], ], and ] ].<ref name="ONIRO-NorthAmerica"/><ref name="Cybersieves"/> | ||
Public and private institutions that provide Internet access for their employees, customers, students, or members will sometimes limit this access in an attempt to ensure it is used only for the purposes |
Public and private institutions that provide Internet access for their employees, customers, students, or members will sometimes limit this access in an attempt to ensure it is used only for the organization's purposes. This can include ] to limit access to entertainment content in business and educational settings and limits to high-] services. Some institutions also block outside ] services as a precaution, usually initiated out of concerns for network security or concerns that e-mail might be used intentionally or unintentionally to expose trade secrets or other confidential information. | ||
===Schools and libraries=== | ===Schools and libraries=== | ||
K-12 schools and libraries that accept funds from the federal ] program or ] grants for Internet access or internal connections are required by |
K-12 schools and libraries that accept funds from the federal ] program or ] grants for Internet access or internal connections are required by CIPA to have an "Internet safety policy and technology protection measures".<ref name=CIPA/> | ||
Many K-12 school districts |
Many K-12 school districts use Internet filters to block material deemed inappropriate for a school setting.<ref>{{cite news|url=http://blogs.computerworld.com/15781/web_filtering |title=Internet filtering as a form of soft censorship |archive-url=https://web.archive.org/web/20111106070545/http://blogs.computerworld.com/15781/web_filtering |archive-date=2011-11-06 |first=Mitch |last=Wagner |publisher=Computerworld Tool Talk blog |date=19 March 2010}}</ref><ref>{{cite news|url=http://blogs.computerworld.com/15823/how_internet_censorship_harms_schools |title=How Internet censorship harms schools|archive-url=https://web.archive.org/web/20110125210132/http://blogs.computerworld.com/15823/how_internet_censorship_harms_schools |archive-date=2011-01-25 |first=Mitch |last=Wagner|newspaper=Computerworld Tool Talk blog |date=26 March 2010}}</ref> The federal government leaves decisions about what to filter or block to local authorities. However, critics assert that such decisions should be made by a student's parents or guardian. Concerns include: the risk of supporting a predominant ideology, that filter manufacturers' views are imposed on students, overblocking of useful information, and underblocking of harmful information.<ref>{{cite web|url=http://www.media-awareness.ca/english/resources/special_initiatives/wa_resources/wa_shared/backgrounders/internet_censorship_schrader.cfm |title=Internet Censorship: Issues for Teacher-Librarians|archive-url=https://web.archive.org/web/20110220072042/http://www.media-awareness.ca/english/resources/special_initiatives/wa_resources/wa_shared/backgrounders/internet_censorship_schrader.cfm |archive-date=2011-02-20 |first=Alvin |last=Schrader|publisher=Teacher Librarian|date=May 1999}}</ref> A 2003 study reported that "blocking software overblocked state-mandated curriculum topics–for every web page correctly blocked, one or more was inappropriately blocked".<ref>{{cite web|url=http://www.onlinepolicy.org/access/schoolblocking.shtml |title=Study Released on Internet Blocking in Schools|archive-url=https://web.archive.org/web/20110725122047/http://www.onlinepolicy.org/access/schoolblocking.shtml |archive-date=2011-07-25 |publisher=Online Policy Group and Electronic Frontier Foundation|date= 23 June 2003}}</ref> | ||
Some libraries may |
Some libraries may block access to certain web pages, including pornography, advertising, chat, gaming, social networking, and online forum sites,<ref>{{cite web|url=http://www.ala.org/ala/professionalresources/libfactsheets/alalibraryfactsheet26.cfm |title=Internet Use in Libraries|archive-url=https://web.archive.org/web/20110217202507/http://www.ala.org/ala/professionalresources/libfactsheets/alalibraryfactsheet26.cfm |archive-date=2011-02-17 |publisher=American Library Association Council}}</ref> The use of filtering and blocking software in libraries remains controversial.<ref>{{cite web|url=http://www.ala.org/Template.cfm?Section=IF_Resolutions&Template=/ContentManagement/ContentDisplay.cfm&ContentID=13076 |title=Resolution on the Use of Filtering Software in Libraries|archive-url=https://web.archive.org/web/20190608132939/http://www.ala.org/Template.cfm?Section=IF_Resolutions&Template=%2FContentManagement%2FContentDisplay.cfm&ContentID=13076 |archive-date=2019-06-08 |publisher=American Library Association |date=2 July 1997}}</ref> | ||
===Search engines and social media=== | ===Search engines and social media=== | ||
{{expand section|date=October 2021}} | {{expand section|date=October 2021}} | ||
In 2007, ] attempted to block the ] rights group ] from using their text messaging services to speak to their supporters. Verizon |
In 2007, ] attempted to block the ] rights group ] from using their text messaging services to speak to their supporters. Verizon claimed it was in order to enforce a policy that does not allow their customers to use their service to communicate "controversial" or "unsavory" messages.<ref>{{cite news|url=https://www.nytimes.com/2007/09/27/us/27verizon.html |title=Verizon Blocks Messages of Abortion Rights Group|archive-url=https://web.archive.org/web/20170423001136/http://www.nytimes.com/2007/09/27/us/27verizon.html |archive-date=2017-04-23 |first=Adam |last=Liptak|newspaper=]|date=27 September 2007}}</ref> ], AT&T and other ISPs have been accused of regulating internet traffic and bandwidth. | ||
], a private domain name registrar and Web hosting company operating in the |
], a private domain name registrar and Web hosting company operating in the US, disables domain names that appear on a US Treasury blocklist.<ref name="dropdomains" /><ref name="treas.gov"/> | ||
===Military=== | ===Military=== | ||
The ] prohibits its personnel from accessing certain ]es from DoD computers.<ref name=USFK>{{cite web |url=https://www.scribd.com/doc/15315149/The-Morning-Calm-Korea-Weekly-May-11-2007|title=Restricted Access to Internet Entertainment Sites Across DoD Networks|date=18 May 2007|author=General B.B. Bell, Commander, UNC/CFC/USFK|publisher=U.S. Army Korea}}</ref> The US military's filtering policy is laid out in a report to Congress entitled "Department of Defense Personnel Access to the Internet".<ref> |
The ] prohibits its personnel from accessing certain ]es from DoD computers.<ref name=USFK>{{cite web |url=https://www.scribd.com/doc/15315149/The-Morning-Calm-Korea-Weekly-May-11-2007|title=Restricted Access to Internet Entertainment Sites Across DoD Networks|date=18 May 2007|author=General B.B. Bell, Commander, UNC/CFC/USFK|publisher=U.S. Army Korea}}</ref> The US military's filtering policy is laid out in a report to Congress entitled "Department of Defense Personnel Access to the Internet".<ref>{{cite news|url=http://www.dod.mil/pubs/foi/administration_and_Management/other/SASC_response_report110-77_0907.pdf |title=Department of Defense Personnel Access to the Internet|archive-url=https://web.archive.org/web/20130225080928/http://www.dod.mil/pubs/foi/administration_and_Management/other/SASC_response_report110-77_0907.pdf |archive-date=2013-02-25 |author=Report to Congress |date=September 2007}}</ref> | ||
In October 2009, military blogger C.J. Grisham was |
In October 2009, military blogger C.J. Grisham was pressured by his superiors at ] to close his blog, ''A Soldier's Perspective'', after complaining about local public school officials pushing a mandatory school uniform program without parental consent.<ref>{{cite web |url=http://www.militarytimes.com/article/20091208/OFFDUTY02/912080302/Facebook-face-off |title=Facebook face-off |author=Anderson, Jon R. |date=December 8, 2009 |work=]|access-date=January 29, 2014 |archive-url=https://web.archive.org/web/20130423035220/http://www.militarytimes.com/article/20091208/OFFDUTY02/912080302/Facebook-face-off |archive-date=April 23, 2013 |url-status=live }}</ref> | ||
''The ]'' reported on June 27, 2013, that the ] |
''The ]'' reported on June 27, 2013, that the ] barred its personnel from accessing parts of '']''{{'s}} website after ] ]'s revelations about the ] ] program and the NSA were published there.<ref>{{cite news|url=http://www.montereyherald.com/local/ci_23554739/restricted-web-access-guardian-is-army-wide-officials |title=Restricted Web access to the Guardian is Armywide, say officials|archive-url=https://web.archive.org/web/20141020150616/http://www.montereyherald.com/local/ci_23554739/restricted-web-access-guardian-is-army-wide-officials |archive-date=2014-10-20|first=Philipp |last=Molnar|newspaper=Monterey Herald|date=June 27, 2013|access-date= 15 October 2014}}</ref><ref>{{cite news|url=http://www.spiegel.de/netzwelt/web/us-armee-sperrt-zugang-zu-guardian-artikeln-a-908334.html |title=Zensur: US-Armee sperrt Zugang zu "Guardian"|archive-url=https://web.archive.org/web/20141020155521/http://www.spiegel.de/netzwelt/web/us-armee-sperrt-zugang-zu-guardian-artikeln-a-908334.html |archive-date=2014-10-20 |first=Jörg |last=Breithut|newspaper=]|date=June 28, 2013|access-date=15 October 2014}}</ref> The entire ''Guardian'' website was blocked for personnel stationed throughout Afghanistan, the Middle East, and South Asia, as well as personnel stationed at ] headquarters in Florida.<ref name="guardmil">{{cite news|last=Ackerman|first=Spencer|title=US military blocks entire Guardian website for troops stationed abroad|url=https://www.theguardian.com/world/2013/jul/01/us-military-blocks-guardian-troops|newspaper=The Guardian|date=July 1, 2013|access-date=December 14, 2016|archive-url=https://web.archive.org/web/20170202141818/https://www.theguardian.com/world/2013/jul/01/us-military-blocks-guardian-troops|archive-date=February 2, 2017|url-status=live}}</ref> | ||
In 2019, social media app TikTok was banned on all military devices for what the |
In 2019, social media app TikTok was banned on all military devices for what the Pentagon said was "potential security risks".<ref>{{cite news |title=U.S. Army bans TikTok on military devices, signaling growing concern about app's Chinese roots |date=2019-12-31 |newspaper=]|archive-url=https://web.archive.org/web/20220326022121/https://www.washingtonpost.com/technology/2019/12/31/us-army-bans-tiktok-military-devices-signaling-growing-concern-about-apps-chinese-roots/ |archive-date=2022-03-26 |url-status=live |url=https://www.washingtonpost.com/technology/2019/12/31/us-army-bans-tiktok-military-devices-signaling-growing-concern-about-apps-chinese-roots/}}</ref> | ||
===WikiLeaks=== | ===WikiLeaks=== | ||
{{ |
{{See also|WikiLeaks#Hosting}} | ||
⚫ | In February 2008, the '']'' lawsuit prompted the ] to issue a permanent injunction against the website ]' ]. The result was that WikiLeaks could not be accessed through its ]. This elicited accusations of censorship and resulted in the ] defending WikiLeaks. After a later hearing, the injunction was lifted.<ref>{{cite web|url= https://www.eff.org/cases/bank-julius-baer-co-v-wikileaks|title= Bank Julius Baer & Co v. Wikileaks|access-date= 2008-03-10|publisher= Electronic Frontier Foundation|archive-url= https://web.archive.org/web/20080304012432/http://www.eff.org/cases/bank-julius-baer-co-v-wikileaks|archive-date= 2008-03-04|url-status= live}}</ref> | ||
Assange said that WikiLeaks chose Amazon knowing they would probably be kicked off of "in order to separate rhetoric from reality".<ref>{{Cite web |title=WikiLeaks got kicked off Amazon on purpose, says Assange |url=https://www.cnet.com/tech/mobile/wikileaks-got-kicked-off-amazon-on-purpose-says-assange/ |access-date=2023-10-23 |publisher=CNET |language=en}}</ref><ref>{{Cite news |date=2010-12-03 |title=Julian Assange answers your questions |language=en-GB |work=The Guardian |url=https://www.theguardian.com/world/blog/2010/dec/03/julian-assange-wikileaks |access-date=2023-10-23 |issn=0261-3077}}</ref> On December 1, 2010 ] cut off WikiLeaks 24 hours after it was contacted by the staff of Senator ], Chairman of the ].<ref>{{Cite news |last=MacAskill |first=Ewen |date=2010-12-02 |title=WikiLeaks website pulled by Amazon after US political pressure |url=https://www.theguardian.com/media/2010/dec/01/wikileaks-website-cables-servers-amazon |access-date=2024-05-31 |work=The Guardian |language=en-GB |issn=0261-3077|archive-url=https://web.archive.org/web/20110626231302/http://www.guardian.co.uk/media/2010/dec/01/wikileaks-website-cables-servers-amazon |archive-date=2011-06-26 }}, Ewen MacAskill, The Guardian, 2 December 2010</ref> In a statement Lieberman said it was "the right decision and should set the standard for other companies".<ref>{{cite web|url=http://lieberman.senate.gov/index.cfm/news-events/news/2010/12/amazon-severs-ties-with-wikileaks |title=Amazon Severs Ties with Wikileaks|archive-url=https://web.archive.org/web/20101204094146/http://lieberman.senate.gov/index.cfm/news-events/news/2010/12/amazon-severs-ties-with-wikileaks|archive-date=2010-12-04|website=Joe Lieberman's U.S. Senate web site |date=1 December 2010}}</ref> Constitutional lawyers say that this is not a first amendment issue because Amazon, as a private company, is free to make its own decisions. ], a lawyer with the Electronic Frontier Foundation, agreed that this was not a violation of the first amendment.<ref>{{Cite web |title=How Lieberman Got Amazon To Drop WikiLeaks|url=http://tpmmuckraker.talkingpointsmemo.com/2010/12/how_lieberman_got_amazon_to_drop_wikileaks.php |access-date=2024-05-31 |website=TPM – Talking Points Memo |language=en-US|archive-url=https://web.archive.org/web/20110504061217/http://tpmmuckraker.talkingpointsmemo.com/2010/12/how_lieberman_got_amazon_to_drop_wikileaks.php |archive-date=2011-05-04 |date= 1 December 2010}}</ref> | |||
⚫ | In February 2008, the '']'' lawsuit prompted the ] to issue a permanent injunction against the website ]' ]. The result was that WikiLeaks could not be accessed through its ]. This elicited accusations of censorship and resulted in the ] |
||
On December 1, 2010 ] cut off WikiLeaks 24 hours after being contacted by the staff of ], Chairman of the ].<ref> {{Webarchive|url=https://web.archive.org/web/20110626231302/http://www.guardian.co.uk/media/2010/dec/01/wikileaks-website-cables-servers-amazon |date=2011-06-26 }}, Ewen MacAskill, The Guardian, 2 December 2010</ref> In a statement Lieberman said:<ref> {{webarchive|url=https://web.archive.org/web/20101204094146/http://lieberman.senate.gov/index.cfm/news-events/news/2010/12/amazon-severs-ties-with-wikileaks |date=2010-12-04 }}, Joe Lieberman's U.S. Senate web site, 1 December 2010</ref> | |||
<blockquote> decision to cut off WikiLeaks now is the right decision and should set the standard for other companies WikiLeaks is using to distribute its illegally seized material. I call on any other company or organization that is hosting WikiLeaks to immediately terminate its relationship with them.</blockquote> | |||
Constitutional lawyers say that this is not a first amendment issue because Amazon, as a private company, is free to make its own decisions. ], a lawyer with the Electronic Frontier Foundation, agreed that this is not a violation of the first amendment, but said it was nevertheless disappointing.<ref> {{Webarchive|url=https://web.archive.org/web/20110504061217/http://tpmmuckraker.talkingpointsmemo.com/2010/12/how_lieberman_got_amazon_to_drop_wikileaks.php |date=2011-05-04 }}, Talking Points Memo, 1 December 2010</ref> | |||
===Individual websites=== | ===Individual websites=== | ||
Some websites that allow user-contributed content practice ] by adopting policies on how the web site may be used and by banning or requiring pre-approval of editorial contributions from users that |
Some websites that allow user-contributed content practice ] by adopting policies on how the web site may be used and by banning or requiring pre-approval of editorial contributions from users that violate the site's policies. For example, a social media platform may restrict speech that it considers to be ] more broadly than is ],<ref>See also: ]</ref> and may restrict speech that it considers to be ] and ]. | ||
Restriction of hate speech and harassment on social media is the subject of debate |
Restriction of hate speech and harassment on social media is the subject of debate. For example, two perspectives include that ] should be removed because it causes serious intimidation and harm,<ref>{{cite news |last= McElwee |first= Sean |date= July 12, 2013 |title= The Case for Censoring Hate Speech |url= http://www.alternet.org/civil-liberties/case-censoring-hate-speech |newspaper= AlterNet |access-date= December 14, 2014 |archive-url= https://web.archive.org/web/20141213110446/http://www.alternet.org/civil-liberties/case-censoring-hate-speech |archive-date= December 13, 2014 |url-status= live }}</ref> and that it should not be removed because it is "better to know that there are ] among us" than to have an inaccurate picture of the world.<ref>{{cite news |last= Lukianoff |first= Greg |date= April 7, 2013 |title= Twitter, hate speech, and the costs of keeping quiet |url= https://www.cnet.com/news/twitter-hate-speech-and-the-costs-of-keeping-quiet/ |publisher= CNET |access-date= December 14, 2014 |archive-url= https://web.archive.org/web/20141215020024/http://www.cnet.com/news/twitter-hate-speech-and-the-costs-of-keeping-quiet/ |archive-date= December 15, 2014 |url-status= live }}</ref> | ||
=== |
===Outside the US=== | ||
{{See also|Cisco Systems#Censorship in China|Censorship by Google|Criticism of Microsoft#Censorship in China|Criticism of Myspace#MySpace China|Skype#Service in the People's Republic of China|Censorship by Yahoo}} | {{See also|Cisco Systems#Censorship in China|Censorship by Google|Criticism of Microsoft#Censorship in China|Criticism of Myspace#MySpace China|Skype#Service in the People's Republic of China|Censorship by Yahoo}} | ||
US corporations including ], ], ], and ] practice greater levels of self-censorship in some international versions of their online services to comply with local laws/regulations.<ref>{{Cite web |title=Policing Content in the Quasi-Public Sphere {{!}} OpenNet Initiative |url=https://opennet.net/policing-content-quasi-public-sphere |access-date=2024-05-31|archive-url=https://web.archive.org/web/20110521212114/http://opennet.net/policing-content-quasi-public-sphere |archive-date=2011-05-21 |first1=Jillian C. |last1=York |first2=Robert |last2=Faris |first3=Ron |last3=Deibert |website=OpenNet Initiative|date= 19 September 2010}}</ref><ref>{{Cite web |title=Geolocation filtering: blocked during run-up to election |url=https://opennet.net/bulletins/007/ |access-date=2024-05-31 |website=opennet.net|archive-url=https://web.archive.org/web/20110521211346/http://opennet.net/bulletins/007/ |archive-date=2011-05-21 |date=27 October 2004}}</ref> This is most notably the case in these corporations' dealings in ]. | |||
In October 2011 US-based ] of ] acknowledged that Syria |
In October 2011 US-based ] of ] acknowledged that Syria was using its devices to censor Web activity, a possible violation of US ]es.<ref>{{Cite news |first1=Jennifer |last1=Valentino-DeVries|first2=Paul |last2=Sonne |first3=Nour |last3=Malas|title=Blue Coat Acknowledges Syria Used Its Gear for Internet Censorship Amid Arab Spring |url=https://www.wsj.com/articles/SB10001424052970203687504577001911398596328?mod=googlenews_wsj |access-date=2024-05-31 |language=en-US|archive-url=https://web.archive.org/web/20171027093643/https://www.wsj.com/articles/SB10001424052970203687504577001911398596328?mod=googlenews_wsj |archive-date=2017-10-27 |newspaper=The Wall Street Journal|date=29 October 2011}}</ref> | ||
===Intellectual property=== | ===Intellectual property=== | ||
A January 4, 2007 ] issued by |
A January 4, 2007 ] issued by US District Court Judge ] forbade activists in the ] from posting links to ostensibly leaked documents that purportedly show that ] intentionally withheld information as to the lethal side-effects of ]. The ] appealed this as ], saying that citizen-journalists should have the same First Amendment rights as major media outlets.<ref>{{cite web|url=https://www.eff.org/legal/cases/zyprexa/ |title=Eli Lilly Zyprexa Litigation |archive-url=https://web.archive.org/web/20081011024531/http://www.eff.org/legal/cases/zyprexa |archive-date=2008-10-11 |publisher=Electronic Frontier Foundation}}</ref> It was later held that the judgment was unenforceable, though First Amendment claims were rejected.<ref>{{Cite press release |title=Eli Lilly Loses Effort to Censor Zyprexa Documents Off the Internet |url=https://www.eff.org/press/archives/2007/02/13 |access-date=2024-05-31 |website=Electronic Frontier Foundation |language=en|archive-url=https://web.archive.org/web/20160912054351/https://www.eff.org/press/archives/2007/02/13 |archive-date=2016-09-12 |date=13 February 2007}}</ref> | ||
In May 2011 and January 2012 the US seized the domains of the non-US websites of the non-US citizens ] and ], and sought to extradite them to the US, accusing them of copyright infringement.<ref name=NYT71212>{{cite news|title=U. S. Pursuing a Middleman in Web Piracy|url=https://www.nytimes.com/2012/07/13/technology/us-pursues-richard-odwyer-as-intermediary-in-online-piracy.html|access-date=13 July 2012|newspaper=The New York Times|date=12 July 2012|author=Somini Sengupta|archive-url=https://web.archive.org/web/20120713111654/http://www.nytimes.com/2012/07/13/technology/us-pursues-richard-odwyer-as-intermediary-in-online-piracy.html|archive-date=13 July 2012|url-status=live}}</ref><ref name="DOJ PR">{{cite web|title=Manhattan Federal Court Orders Seizures of Seven Websites for Criminal Copyright Infringement in Connection with Distribution of Pirated Movies Over the Internet |work=Press Release United States Attorney Southern District of New York |publisher=U.S. Justice Department |date=10 June 2010 |url=https://www.justice.gov/usao/nys/pressreleases/June10/websitedomainnameseizurepr.pdf |access-date=10 July 2011 |url-status=dead |archive-url=https://web.archive.org/web/20141006090311/http://www.justice.gov/usao/nys/pressreleases/June10/websitedomainnameseizurepr.pdf |archive-date=6 October 2014 }}</ref><ref name = "WTKTJV">{{cite news |title=US Internet piracy case brings New Zealand arrests |first1=Matthew |last1=Barakat |first2=Nick |last2=Perry |url=http://www.washingtontimes.com/news/2012/jan/20/us-internet-piracy-case-brings-new-zealand-arrests/?page=all#pagebreak |agency=] |
In May 2011 and January 2012 the US seized the domains of the non-US websites of the non-US citizens ] and ], and sought to extradite them to the US, accusing them of copyright infringement.<ref name=NYT71212>{{cite news|title=U. S. Pursuing a Middleman in Web Piracy|url=https://www.nytimes.com/2012/07/13/technology/us-pursues-richard-odwyer-as-intermediary-in-online-piracy.html|access-date=13 July 2012|newspaper=The New York Times|date=12 July 2012|author=Somini Sengupta|archive-url=https://web.archive.org/web/20120713111654/http://www.nytimes.com/2012/07/13/technology/us-pursues-richard-odwyer-as-intermediary-in-online-piracy.html|archive-date=13 July 2012|url-status=live}}</ref><ref name="DOJ PR">{{cite web|title=Manhattan Federal Court Orders Seizures of Seven Websites for Criminal Copyright Infringement in Connection with Distribution of Pirated Movies Over the Internet |work=Press Release United States Attorney Southern District of New York |publisher=U.S. Justice Department |date=10 June 2010 |url=https://www.justice.gov/usao/nys/pressreleases/June10/websitedomainnameseizurepr.pdf |access-date=10 July 2011 |url-status=dead |archive-url=https://web.archive.org/web/20141006090311/http://www.justice.gov/usao/nys/pressreleases/June10/websitedomainnameseizurepr.pdf |archive-date=6 October 2014 }}</ref><ref name = "WTKTJV">{{cite news |title=US Internet piracy case brings New Zealand arrests |first1=Matthew |last1=Barakat |first2=Nick |last2=Perry |url=http://www.washingtontimes.com/news/2012/jan/20/us-internet-piracy-case-brings-new-zealand-arrests/?page=all#pagebreak |agency=]|newspaper=]|date=20 January 2012 |access-date=27 February 2012 |archive-url=https://web.archive.org/web/20120428012913/http://www.washingtontimes.com/news/2012/jan/20/us-internet-piracy-case-brings-new-zealand-arrests/?page=all#pagebreak |archive-date=28 April 2012 |url-status=live }}</ref><ref name="3NewsNZ5March2012">{{cite news| url= http://www.3news.co.nz/US-formally-requests-Dotcoms-extradition/tabid/423/articleID/245167/Default.aspx| work= 3 News NZ| title= US formally requests Dotcom's extradition| date= 5 March 2012| access-date= 12 April 2015| archive-url= https://web.archive.org/web/20140714142736/http://www.3news.co.nz/US-formally-requests-Dotcoms-extradition/tabid/423/articleID/245167/Default.aspx| archive-date= 14 July 2014| url-status= dead}}</ref> | ||
In January 2015 details from the ] revealed the ]'s lobbying of the ] to mandate that US ISPs either at the ] or internet service provider level, implement ] of ] as well as ] websites.<ref>{{cite news|last1=Brandom|first1=Russell|title=The MPAA has a new plan to stop copyright violations at the border|url=https://www.theverge.com/2015/1/2/7481409/the-mpaa-has-a-new-plan-to-stop-copyright-violations-at-the-border|access-date=4 January 2015|date=2 January 2015|archive-url=https://web.archive.org/web/20150103171242/http://www.theverge.com/2015/1/2/7481409/the-mpaa-has-a-new-plan-to-stop-copyright-violations-at-the-border|archive-date=3 January 2015|url-status=live}}</ref> | In January 2015 details from the ] revealed the ]'s lobbying of the ] to mandate that US ISPs, either at the ] or internet service provider level, implement ] of ] as well as ] websites.<ref>{{cite news|last1=Brandom|first1=Russell|title=The MPAA has a new plan to stop copyright violations at the border|url=https://www.theverge.com/2015/1/2/7481409/the-mpaa-has-a-new-plan-to-stop-copyright-violations-at-the-border|access-date=4 January 2015|date=2 January 2015|archive-url=https://web.archive.org/web/20150103171242/http://www.theverge.com/2015/1/2/7481409/the-mpaa-has-a-new-plan-to-stop-copyright-violations-at-the-border|archive-date=3 January 2015|url-status=live}}</ref> | ||
===Bay Area Rapid Transit (BART) |
===Bay Area Rapid Transit (BART) phone service suspension=== | ||
On July 3, 2011, two officers of the ] (BART) Police ] at Civic Center Station in San Francisco.<ref>{{cite web |last=Upton |first=John |url=http://www.baycitizen.org/blogs/pulse-of-the-bay/bart-police-release-video-shooting/ |title=BART Police Release Video of Shooting - Pulse of the Bay |publisher=The Bay Citizen |date=July 25, 2011 |access-date=August 21, 2011 |archive-url=https://archive.today/20120723073636/http://www.baycitizen.org/blogs/pulse-of-the-bay/bart-police-release-video-shooting/ |archive-date=July 23, 2012 |url-status=dead }}</ref> On August 12, 2011, BART shut down ] services, including mobile Internet access, for three hours in an effort to limit possible protests against the shooting<ref>{{cite news|url=https://www.pcmag.com/article2/0,2817,2391046,00.asp|title=To Prevent Protests, San Francisco Subway Turns Off Cell Signals, August 13, 2011|access-date=August 18, 2011|work=PC |
On July 3, 2011, two officers of the ] (BART) Police ] at Civic Center Station in San Francisco.<ref>{{cite web |last=Upton |first=John |url=http://www.baycitizen.org/blogs/pulse-of-the-bay/bart-police-release-video-shooting/ |title=BART Police Release Video of Shooting - Pulse of the Bay |publisher=The Bay Citizen |date=July 25, 2011 |access-date=August 21, 2011 |archive-url=https://archive.today/20120723073636/http://www.baycitizen.org/blogs/pulse-of-the-bay/bart-police-release-video-shooting/ |archive-date=July 23, 2012 |url-status=dead }}</ref> On August 12, 2011, BART shut down ] services, including ] access, for three hours in an effort to limit possible protests against the shooting<ref>{{cite news|url=https://www.pcmag.com/article2/0,2817,2391046,00.asp|title=To Prevent Protests, San Francisco Subway Turns Off Cell Signals, August 13, 2011|access-date=August 18, 2011|work=PC Magazine|archive-url=https://web.archive.org/web/20120119085909/http://www.pcmag.com/article2/0,2817,2391046,00.asp|archive-date=January 19, 2012|url-status=live}}</ref><ref>{{cite news|url=http://news.cnet.com/8301-27080_3-20091822-245/s.f-subway-muzzles-cell-service-during-protest/?part=rss&subj=news&tag=2547-1_3-0-20 |title=S.F. subway muzzles cell service during protest|publisher= CNET}}</ref> and to limit communications from protesters at the station.<ref>{{cite news|url=http://www.ktvu.com/news/28854510/detail.html |title=Questions, Complaints Arise Over BART Cutting Cell Phone Service|archive-url=https://web.archive.org/web/20111005000120/http://www.ktvu.com/news/28854510/detail.html |archive-date=2011-10-05 |publisher= KTVU}}</ref> The shutdown drew the attention of international media, along with comparisons to former Egyptian president ].<ref>{{cite web|url=https://abc7news.com/archive/8305470/ |title=Leland Yee scolds BART over cell phone blackout|archive-url=https://web.archive.org/web/20110824224155/http://abclocal.go.com/kgo/story?section=news%2Flocal%2Fsan_francisco&id=8305470 |archive-date=2011-08-24 |url-status=live |publisher=KGO-TV}}</ref> | ||
⚫ | On August 29, 2011, a coalition of nine public interest groups led by ] filed an Emergency Petition asking the US ] (FCC) to declare these actions illegal.<ref>{{cite web|url=http://www.cdt.org/files/pdfs/Emergency%20Petition%20for%20Declaratory%20Ruling_0.pdf |title=In the Matter of the Petition of Public Knowledge et al. for Declaratory Ruling that Disconnection of Telecommunications Services Violates the Communications Act|archive-url=https://web.archive.org/web/20111010095642/http://cdt.org/files/pdfs/Emergency%20Petition%20for%20Declaratory%20Ruling_0.pdf |archive-date=2011-10-10 |first1=Harold |last1=Feld|first2=Sherwin |last2=Siy|date=29 August 2011}}</ref><ref>{{cite news|url=https://www.bloomberg.com/news/2011-09-26/phone-web-clampdowns-in-crises-are-intolerable-susan-crawford.html |title=Phone, Web Clampdowns in Crises Are Intolerable|archive-url=https://web.archive.org/web/20130825091153/http://www.bloomberg.com/news/2011-09-26/phone-web-clampdowns-in-crises-are-intolerable-susan-crawford.html |archive-date=2013-08-25 |first=Susan |last=Crawford|newspaper=Bloomberg News |date=25 September 2011}}</ref> | ||
On August 29, 2011, a coalition of nine public interest groups led by ] filed an Emergency Petition asking the U.S. ] (FCC) to declare "that the actions taken by the Bay Area Rapid Transit District ("BART") on August 11, 2011, violated the Communications Act of 1934, | |||
as amended, when it deliberately interfered with access to ] | |||
⚫ | |||
In December 2011 BART adopted a new "Cell Service Interruption Policy" that |
In December 2011 BART adopted a new "Cell Service Interruption Policy" that allows shutdowns of phone services within BART facilities only "in the most extraordinary circumstances that threaten the safety of District passengers, employees and other members of public, the destruction of District property, or the substantial disruption of public transit service".<ref>{{cite web|url=http://www.bart.gov/docs/final_CSIP.pdf |title=Cell Service Interruption Policy|archive-url=https://web.archive.org/web/20111218011705/http://www.bart.gov/docs/final_CSIP.pdf |archive-date=2011-12-18 |author=Bay Area Rapid Transit District|date= December 2011|access-date=30 March 2012}}</ref> According to a spokesperson, under the new policy the phone system would not be disable under circumstances similar to those in August 2011. Instead police officers would arrest individuals who break the law.<ref name=NYT-2March2012>{{cite news|url=https://www.nytimes.com/2012/03/03/technology/fcc-reviews-need-for-rules-to-interrupt-wireless-service.html |title=F.C.C. Asks for Guidance on Whether, and When, to Cut Off Cellphone Service|archive-url=https://web.archive.org/web/20161104044527/http://www.nytimes.com/2012/03/03/technology/fcc-reviews-need-for-rules-to-interrupt-wireless-service.html |archive-date=2016-11-04 |first=Edward |last=Wyatt |newspaper=The New York Times|date=2 March 2012}}</ref> | ||
disruption of public transit service."<ref> {{webarchive|url=https://web.archive.org/web/20111218011705/http://www.bart.gov/docs/final_CSIP.pdf |date=2011-12-18 }}, Bay Area Rapid Transit District, December 2011, accessed 30 March 2012</ref> According to a spokesperson for BART, under the new policy the wireless phone system would not be turned off under circumstances similar to those in August 2011. Instead police officers would arrest individuals who break the law.<ref name=NYT-2March2012> {{Webarchive|url=https://web.archive.org/web/20161104044527/http://www.nytimes.com/2012/03/03/technology/fcc-reviews-need-for-rules-to-interrupt-wireless-service.html |date=2016-11-04 }}, Edward Wyatt, ''New York Times'', 2 March 2012</ref> | |||
===Interruption of communication services=== | ===Interruption of communication services=== | ||
⚫ | In 2014 the FCC issued an Enforcement Advisory warning the public that "it is illegal to use a cell phone jammer or any other type of device that blocks, jams or interferes with authorized communications" and that "this prohibition extends to every entity that does not hold a federal authorization, including state and local law enforcement agencies".<ref>{{cite web|url=https://apps.fcc.gov/edocs_public/attachmatch/DA-14-1785A1_Rcd.pdf |title=WARNING: Jammer Use is Prohibited Public Notice: FCC Enforcement Advisory (No. 2014-05)|archive-url=https://web.archive.org/web/20180409173155/https://apps.fcc.gov/edocs_public/attachmatch/DA-14-1785A1_Rcd.pdf |archive-date=2018-04-09 |date=December 8, 2014 |author=Federal Communications Commission}}</ref> | ||
In March 2012 the FCC requested public comment on the question of whether or when the police and other government officials can intentionally interrupt cellphone and Internet service to protect public safety.<ref name=NYT-2March2012/><ref> {{Webarchive|url=https://web.archive.org/web/20120513113045/http://apps.fcc.gov/ecfs/document/view?id=7021897883 |date=2012-05-13 }}, Public Notice DA 12-311, GN Docket No. 12-52, Federal Communications Commission, March 1, 2012.</ref> In response, through the end of May 2012, the FCC received 137 comments and 9 reply comments.<ref> {{Webarchive|url=https://web.archive.org/web/20130624030604/http://apps.fcc.gov/ecfs/comment_search/input |date=2013-06-24 }}, Electronic Comment Filing System, Federal Communications Commission. Retrieved 19 July 2013.</ref><ref>, John Eggerton, Broadcasting & Cable, May 30, 2012.</ref><ref> {{Webarchive|url=https://web.archive.org/web/20120601131857/http://www.computerworld.com/s/article/9226757/BART_defends_mobile_service_shutdown_to_the_FCC |date=2012-06-01 }}, Grant Gross, IDG News Service in ''Computerworld'', May 1, 2012.</ref> As of July 2013 the proceeding remained open, but the FCC had taken no further action.<ref> {{Webarchive|url=https://archive.today/20130719142629/http://apps.fcc.gov/ecfs/proceeding/view?z=63a0s&name=12-52 |date=2013-07-19 }}, Electronic Comment Filing System, Federal Communications Commission. Retrieved 19 July 2013.</ref> | |||
⚫ | In |
||
In |
In 2016 the ] issued a recommendation on "Government Interruption of Communication Service".<ref name="CALawRevision-December2016">{{cite web|url=http://www.clrc.ca.gov/pub/Printed-Reports/REC-G301.pdf |title=Government Interruption of Communication Service|archive-url=https://web.archive.org/web/20171218231925/http://www.clrc.ca.gov/pub/Printed-Reports/REC-G301.pdf |archive-date=2017-12-18 |date=December 2016 |author=California Law Revision Commission}} {{PD-notice}}</ref> The Commission concluded that government action to interrupt communications can be constitutional if the government acts pursuant to procedures that are designed to protect constitutional free expression and due process rights. To be constitutional the action usually needs to be approved by a judicial officer who has found: (i) probable cause that the communication service is or will be used for an unlawful purpose, (ii) that immediate action is required to protect public health, safety, or welfare, and (iii) the affected customer must have a prompt opportunity for adjudication of the government's contentions. For a general interruption of communication service that affects a large number of people or a large geographic area, judicial approval also requires that the action (iv) is necessary to avoid a serious threat of violence that is both imminent and likely to occur or (v) that the effect on expression is incidental to some other valid government purpose, and (vi) is reasonable, (vii) is content-neutral, (viii) would impair no more speech than is necessary, and (ix) leaves open other ample means of communication. Prior judicial approval is not required in extreme emergencies involving immediate danger of death or great bodily injury where there is insufficient time to obtain a court order.<ref name="CALawRevision-December2016" /> | ||
pursuant to procedures that are properly designed to protect constitutional free expression and due process rights. To be constitutional the action will usually need to be approved by a judicial officer who has found (i) probable cause that the communication service is or will be used for an unlawful purpose, (ii) that immediate action is required to protect public health, safety, or welfare and (iii) the affected customer must have a prompt opportunity for adjudication of the government's contentions. For a general interruption of communication service that will affect a large number of people or a large geographic area, judicial approval would also require that the action (iv) is necessary to avoid a serious threat of violence that is both imminent and likely to occur or (v) that the effect on expression is incidental to some other valid government purpose, and (vi) is reasonable, (vii) is content-neutral, (viii) would impair no more speech than is necessary, and (ix) leaves open other ample means of communication. Prior judicial approval is not required in extreme emergencies involving immediate danger of death or great bodily injury where there is insufficient time to obtain a court order.<ref name=CALawRevision-December2016/> | |||
Beyond constitutional law, a state or local government's ability to effect a general interruption of wireless |
Beyond constitutional law, a state or local government's ability to effect a general interruption of wireless communications is also subject to the federal "Emergency Wireless Protocol (EWP)" or "Standard Operating Procedure 303" which established a process for interrupting and restoring wireless communication service during times of national emergency. The effect of this protocol is that state and local government officials can initiate an interruption of communication service, but cannot directly order wireless communication service providers to take action. Such orders to private providers must come from the ] within the ], as designated by the EWP. If an order authorizing an interruption does not fall within the EWP, it is served directly on the relevant communication service provider.<ref name="CALawRevision-December2016" /> | ||
==See also== | ==See also== | ||
* ] | |||
* ] | * ] | ||
* ] (CALEA) | * ] (CALEA) | ||
Line 235: | Line 212: | ||
==References== | ==References== | ||
] ''This article incorporates from the and other sections of the ] web site''.<ref>] |
] ''This article incorporates from the and other sections of the ] web site''.<ref>] {{cite web|url=https://creativecommons.org/licenses/by/3.0/deed.en |title=Creative Commons Attribution 3.0 Unported license|archive-url=https://web.archive.org/web/20171221155152/https://creativecommons.org/licenses/by/3.0/deed.en |archive-date=2017-12-21 }}, see the lower right corner of pages at the {{cite web|url=http://opennet.net/ |title=OpenNet Initiative web site|archive-url=https://web.archive.org/web/20180925044301/https://opennet.net/research/profiles |archive-date=2018-09-25 }}</ref> | ||
{{reflist |
{{reflist}} | ||
==External links== | ==External links== | ||
{{Wikiquote}} | {{Wikiquote}} | ||
* ; puts US online censorship in cross-country context. | * ; puts US online censorship in cross-country context. | ||
Latest revision as of 09:44, 19 January 2025
Internet censorship in the United States of America is the suppression of information published or viewed on the Internet in the United States. The First Amendment of the United States Constitution protects freedom of speech and expression against federal, state, and local government censorship.
Free speech protections allow little government-mandated Internet content restrictions. However, the Internet is highly regulated, supported by a complex set of legally binding and privately mediated mechanisms.
Gambling, cyber security, and the dangers to children who frequent social media are important ongoing debates. Significant public resistance to proposed content restriction policies has prevented measures used in some other countries from taking hold in the US.
Many government-mandated attempts to regulate content have been barred, often after lengthy legal battles. However, the government has exerted pressure indirectly. With the exception of child pornography, content restrictions tend to rely on platforms to remove/suppress content, following state encouragement or the threat of legal action.
Intellectual property protections yielded a system that predictably removes infringing materials. The US also seizes domains and computers, at times without notification.
History
The first wave of regulatory actions came about in the 1990s in response to the profusion of sexually explicit material on the Internet within easy reach of minors. Since that time, several legislative attempts at creating a mandatory system of content controls have failed to produce a comprehensive solution. Legislative attempts to control the distribution of socially objectionable material have given way to a system that limits liability over content for Internet intermediaries such as Internet service providers (ISPs) and content hosting companies.
Websites shut down by the U.S for violating intellectual property rights include Napster, WikiLeaks, The Pirate Bay, and MegaUpload.
In 2014, the United States was added to Reporters Without Borders (RWB)'s list of "Enemies of the Internet", a group of countries with the highest level of Internet censorship and surveillance. RWB stated that the US had "undermined confidence in the Internet and its own standards of security" and that "US surveillance practices and decryption activities are a direct threat to investigative journalists, especially those who work with sensitive sources for whom confidentiality is paramount and who are already under pressure".
Federal laws
With limited exceptions, the free speech provisions of the First Amendment bar federal, state, and local governments from directly censoring the Internet. The primary exception has to do with obscenity, including child pornography, which is not given First Amendment protection.
Computer Fraud and Abuse Act (CFAA)
The Computer Fraud and Abuse Act (CFAA) was enacted in 1986 as an amendment to an existing computer fraud law (18 U.S.C. § 1030), which was part of the Comprehensive Crime Control Act of 1984. The CFAA prohibits accessing a computer without authorization, or in excess of authorization. Since 1986, the Act was amended in 1989, 1994, 1996, 2001 (USA PATRIOT Act), 2002, and in 2008 (Identity Theft Enforcement and Restitution Act). The CFAA is a criminal law and also creates a private right of action, allowing individuals and companies to sue for damages.
Provisions of the CFAA effectively make it a federal crime to violate the terms of service of Internet sites, allowing companies to forbid legitimate activities such as research, or limit or remove protections found elsewhere in law. Terms of service can be changed at any time without notifying users. Tim Wu called the CFAA "the worst law in technology".
Aggressive prosecution under the Computer Fraud and Abuse Act (CFAA) has fueled growing criticism of the law's scope and application.
Communications Decency Act (CDA)
In 1996, the United States enacted the Communications Decency Act (CDA), which attempted to regulate both indecency (when available to children) and obscenity in cyberspace. In 1997, in the case of Reno v. ACLU, the United States Supreme Court found the anti-indecency provisions of the Act unconstitutional. Writing for the Court, Justice John Paul Stevens held that "the CDA places an unacceptably heavy burden on protected speech".
Section 230 is a separate portion of the CDA that remains in effect. Section 230 says that operators of Internet services are not legally liable for the words of third parties who use their services and also protects ISPs from liability for good faith voluntary actions taken to restrict access to certain offensive materials or giving others the technical means to restrict access to that material.
Child Online Protection Act (COPA)
In 1998, the United States enacted the Child Online Protection Act (COPA) to restrict access by minors to any material defined as harmful to minors on the Internet. The law was found to be unconstitutional because it would hinder protected speech among adults. It never took effect, as three separate rounds of litigation led to a permanent injunction against the law in 2009. Had the law passed, it would have effectively made it an illegal act to post anything commercial on the internet that is knowingly harmful to children without some sort of vetting program to confirm user ages.
Digital Millennium Copyright Act (DMCA)
Enacted in 1998, the Digital Millennium Copyright Act (DMCA, 17 U.S.C. § 1201) criminalized the production and dissemination of technology that could be used to circumvent copyright protection mechanisms and made it easier to act against alleged copyright infringement on the Internet. The Online Copyright Infringement Liability Limitation Act (OCILLA) is included as Title II of the DMCA and limits the liability of the online service providers for copyright infringement by their users.
Children's Online Privacy Protection Act (COPPA)
The Children's Online Privacy Protection Act (COPPA) went into effect on 21 April 2000. It applies to the online collection of personal information by persons or entities under US jurisdiction from children under 13 and details what a website operator must include in a privacy policy, when and how to seek verifiable consent from a parent or guardian, and what responsibilities an operator has to protect children's privacy and safety including restrictions on the marketing to those under 13. While children under 13 can legally offer personal information with their parents' permission, many websites prohibit underage children from using their services altogether, due to the cost and amount of paperwork necessary for compliance.
Children's Internet Protection Act (CIPA)
In 2000 the Children's Internet Protection Act (CIPA) was signed into law.
CIPA requires K-12 schools and libraries receiving federal Universal Service Fund (E-rate) discounts or LSTA grants for Internet access or internal connections to:
- adopt and implement an Internet safety policy addressing: (a) access by minors to inappropriate matter on the Internet; (b) the safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications; (c) unauthorized access, including so-called "hacking," and other unlawful activities by minors online; (d) unauthorized disclosure, use, and dissemination of personal information regarding minors; and (e) measures restricting minors' access to materials harmful to them;
- install internet filters or blocking software that prevents access to pictures that are: (a) obscene, (b) child pornography, or (c) harmful to minors (for computers that are accessed by minors);
- allow filtering or blocking to be disabled upon the request of an adult; and
- adopt and enforce a policy to monitor the online activities of minors.
CIPA does not:
- require tracking Internet use by minors or adults; or
- affect E-rate funding for schools and libraries receiving discounts for telecommunications services, such as telephone service, but not for Internet access or internal connections.
- require an internet filter that prevents access to video games, social media, etc.
Trading with the Enemy Act (TWEA)
In March 2008, the New York Times reported that a blocklist published by the Office of Foreign Assets Control (OFAC), an agency established under the Trading with the Enemy Act 1917 and other federal legislation, included websites, so that US companies are prohibited from doing business with those websites and must freeze their assets. The blocklist had the effect that US-based domain name registrars must block those websites. According to the article, eNom, a private domain name registrar and Web hosting company operating in the US, disables domain names that appear on the blocklist. It described eNom's disabling of a European travel agent's web sites advertising travel to Cuba, which appeared on the list. According to the report, the US government claimed that eNom was "legally required" to block the websites under US law, even though the websites were not hosted in the US, were not targeted at US persons, and were legal under foreign law.
Cybersecurity Information Sharing Act (CISA)
The Cybersecurity Information Sharing Act (CISA) is intended to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats and for other purposes". The law allows the sharing of Internet traffic information between the US government and technology and manufacturing companies. The bill's text was incorporated by amendment into a consolidated spending bill,
Opponents questioned the CISA's value, believing it would move responsibility from private business to the government, thereby increasing the vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the National Security Agency and local police. Some felt that the act was more conducive to surveillance than security after many of the privacy protections from the original bill were removed.
Stop Advertising Victims of Exploitation Act of 2015 (SAVE)
The Stop Advertising Victims of Exploitation Act of 2015 (SAVE) is part of the larger Justice for Victims of Trafficking Act of 2015. The SAVE Act makes it illegal to knowingly advertise content related to sex trafficking, including online advertising. The law established federal criminal liability for third-party content. One concern was that this would lead companies to over-censor, or to limit the practice of monitoring content altogether to avoid "knowledge" of illegal content.
Americans with Disabilities Act (ADA)
In 2016, complainants from Gallaudet University brought a lawsuit against UC Berkeley for not adding closed captioning to the recorded lectures it made free to the public. In an unintended consequence of the Americans with Disabilities Act of 1990, the Department of Justice ruling resulted in Berkeley deleting 20,000 freely licensed videos instead of making them more accessible, which Berkeley had described as cost prohibitive.
Allow States and Victims to Fight Online Sex Trafficking Act - Stop Enabling Sex Traffickers Act (FOSTA-SESTA)
Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA) was introduced in the US House of Representatives in 2017. Stop Enabling Sex Traffickers Act (SESTA) was a similar US Senate bill. The combined FOSTA-SESTA package was enacted in 2018.
The bill amended Section 230 of the Communications Decency Act to exclude the enforcement of federal and state sex trafficking laws from immunity and clarified SESTA to define participation in a venture as knowingly assisting, facilitating, or supporting sex trafficking.
The bills were criticized as a "disguised internet censorship bill" that weakened Section 230 safe harbors, placed unnecessary burdens on internet companies and intermediaries that handle user-generated content or communications with service providers required to proactively take action against sex trafficking activities, and required a "team of lawyers" to evaluate all possible scenarios. Sex workers argued that the bill would harm their safety, as the platforms they utilize for offering and discussing sexual services (as an alternative to street prostitution) had reduced their services or shut down entirely due to the threat of liability.
Proposed federal legislation that has not become law
Deleting Online Predators Act (DOPA)
The Deleting Online Predators Act of 2006 would have required schools, some businesses, and libraries to block minors' access to social networking websites. The bill was controversial because, according to its critics, it would limit access to a wide range of websites, including many with harmless and educational material. Two similar bills were introduced in 2007, but neither became law.
Protecting Cyberspace as a National Asset Act (PCNAA)
The 2010 Protecting Cyberspace as a National Asset Act. generated controversy for what critics perceived as its authorization for the US president to apply a full block of the Internet in the US
The Executive Cyberspace Coordination Act of 2011 took a different approach.
Combating Online Infringement and Counterfeits Act (COICA)
The 2010 Combating Online Infringement and Counterfeits Act would have allowed the US Attorney General to bring an in rem action against an infringing domain name in the United States District Court, and seek an order requesting injunctive relief. If granted, such an order would compel the registrar of the domain name in question to suspend the operation of, and may lock, the domain name.
The US Justice Department would maintain two publicly available lists of domain names. The first list would contain domain names against which the Attorney General has obtained injunctions. The second list would contain domains alleged to be infringing, but against which no action had been taken. Any service provider who willingly took steps to block access to sites on this second list would be immune from prosecution.
Stop Online Piracy Act (SOPA)
The 2011 Stop Online Piracy Act (SOPA) would have allowed the US Department of Justice, as well as copyright holders, to seek court orders against websites accused of enabling or facilitating copyright infringement. Depending on who requested the court orders, the actions could include barring online advertising networks and payment facilitators such as PayPal from doing business with the allegedly infringing website, barring search engines from linking to such sites, and requiring Internet service providers to block access to such sites. Many argued that requiring ISP's to block access to certain websites constituted censorship. On January 18, 2012, the English Misplaced Pages shut down for 24 hours to protest SOPA and PIPA. In the wake of many protests, consideration of the legislation was put on hold.
Protect Intellectual Property Act (PIPA)
The 2011 Protect Intellectual Property Act (Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act, or PIPA) was attempted to give the US government and copyright holders additional tools to curb "rogue websites dedicated to infringing or counterfeit goods", especially those registered outside the US. PIPA was a re-write of the Combating Online Infringement and Counterfeits Act (COICA), which failed to pass in 2010. In the wake of protests the bill was put on hold.
Cyber Intelligence Sharing and Protection Act (CISPA)
The 2011, 2013, and 2015 Cyber Intelligence Sharing and Protection Act (CISPA) attempted to give the government additional options and resources to ensure network security. CISA was a similar Senate bill that was enacted.
CISPA was supported by trade groups representing more than eight hundred private companies, including the Business Software Alliance, CTIA – The Wireless Association, Information Technology Industry Council, Internet Security Alliance, National Cable & Telecommunications Association, National Defense Industrial Association, TechAmerica and United States Chamber of Commerce, in addition to major telecommunications and information technology companies including AT&T, Facebook, IBM, Intel, Oracle Corporation, Symantec, and Verizon.
Reporters Without Borders expressed concern that in the name of fighting cybercrime, it would allow the government and private companies to monitor, even censor, the Web. Other organizations that oppose the bill include the Constitution Project, American Civil Liberties Union, Electronic Frontier Foundation, Center for Democracy and Technology, Fight for the Future, Free Press, Sunlight Foundation, and TechFreedom. Google lobbied for it.
RESTRICT Act/DATA Act
In 2020 and 2023, the United States Government tried to ban social media app TikTok. The DATA Act would have banned the selling of non-public personal data to third party buyers. The RESTRICT Act would allow the United States Secretary of State to review any attempt of a tech company to "sabotage" the United States. In this scenario, after a review by the Secretary and other relevant departments found "security risks" then the government can restrict a company, service, or product. This would let the government investigate and possibly ban any site they deem a threat to national security. Violation by a US citizen would result in a fine of up to $1,000,000 or up to 20 years in prison. While the RESTRICT act does not mention TikTok by name, it was implied as this bill paralleled calls to ban TikTok.
State laws
In November 2019 the National Conference of State Legislatures listed twenty-seven states with laws that apply to Internet use at publicly funded schools or libraries:
The majority of these states simply require school boards/districts or public libraries to adopt Internet use policies to prevent minors from gaining access to sexually explicit, obscene or harmful materials. However, some states also require publicly funded institutions to install filtering software on library terminals or school computers.
The states that require schools and libraries to adopt policies to protect minors include: California, Delaware, Georgia, Indiana, Iowa, Kentucky, Louisiana, Maryland, Massachusetts, New Hampshire, New York, Rhode Island, South Carolina, and Tennessee. Florida law "encourages public libraries to adopt an Internet safety education program, including the implementation of a computer-based educational program".
The states that require Internet filtering in schools and libraries to protect minors are: Arizona, Arkansas, Colorado, Idaho, Kansas, Michigan, Minnesota, Missouri, Ohio, Pennsylvania, South Dakota, Utah, and Virginia. Five states require Internet service providers to make a product or service available to subscribers to control use of the Internet. They are: Louisiana, Maryland, Nevada, Texas, and Utah.
In July 2011 Missouri lawmakers passed the Amy Hestir Student Protection Act which included a provision that barred K-12 teachers from using websites that allow "exclusive access" in communications with current students or former students who are 18 or younger, such as occurs with private messages. A circuit court order issued before the law went into effect blocked the provision because "the breadth of the prohibition is staggering" and the law "would have a chilling effect" on free-speech rights. In September the legislature replaced the controversial provision with a requirement that local school districts develop their own policies on the use of electronic communication between employees and students.
In May 2023, Montana enacted a ban on TikTok from operating within or offering its services to anyone within the state's borders. In December 2023, the ban was blocked by a federal judge who ruled that the statute was an unconstitutional restriction on free speech.
Court rulings
In April 2022, District Judge Katherine Polk Failla issued a site blocking order against three piracy websites, which were cited in lawsuits brought upon by a group of Israeli media companies, but whose operators failed to appear in court. The order mandated that the three websites, as well as any "newly-discovered websites" found to be operated by the defendants, be blocked by all US ISPs. It prohibited any third-party service operator from doing business with or offering services to the defendants, and ordered that their domain names be seized and transferred to the plaintiffs. This order is similar to, but goes beyond what was proposed in SOPA.
Censorship by institutions
See also: Corporate censorshipThe constitutional and other legal protections that prohibit or limit government censorship of the Internet do not generally apply to corporations. Corporations may choose to limit the content they make available or allow others to make available on the Internet. Corporations may be encouraged by government pressure or required by law or court order to remove or limit access to content that is judged to be obscene (including child pornography), harmful to children, defamatory, pose a threat to national security, promote illegal activities such as gambling, prostitution, theft of intellectual property, hate speech, and inciting violence.
Public and private institutions that provide Internet access for their employees, customers, students, or members will sometimes limit this access in an attempt to ensure it is used only for the organization's purposes. This can include content-control software to limit access to entertainment content in business and educational settings and limits to high-bandwidth services. Some institutions also block outside e-mail services as a precaution, usually initiated out of concerns for network security or concerns that e-mail might be used intentionally or unintentionally to expose trade secrets or other confidential information.
Schools and libraries
K-12 schools and libraries that accept funds from the federal E-rate program or Library Services and Technology Act grants for Internet access or internal connections are required by CIPA to have an "Internet safety policy and technology protection measures".
Many K-12 school districts use Internet filters to block material deemed inappropriate for a school setting. The federal government leaves decisions about what to filter or block to local authorities. However, critics assert that such decisions should be made by a student's parents or guardian. Concerns include: the risk of supporting a predominant ideology, that filter manufacturers' views are imposed on students, overblocking of useful information, and underblocking of harmful information. A 2003 study reported that "blocking software overblocked state-mandated curriculum topics–for every web page correctly blocked, one or more was inappropriately blocked".
Some libraries may block access to certain web pages, including pornography, advertising, chat, gaming, social networking, and online forum sites, The use of filtering and blocking software in libraries remains controversial.
Search engines and social media
This section needs expansion. You can help by adding to it. (October 2021) |
In 2007, Verizon attempted to block the abortion rights group NARAL Pro-Choice America from using their text messaging services to speak to their supporters. Verizon claimed it was in order to enforce a policy that does not allow their customers to use their service to communicate "controversial" or "unsavory" messages. Comcast, AT&T and other ISPs have been accused of regulating internet traffic and bandwidth.
eNom, a private domain name registrar and Web hosting company operating in the US, disables domain names that appear on a US Treasury blocklist.
Military
The Department of Defense prohibits its personnel from accessing certain IP addresses from DoD computers. The US military's filtering policy is laid out in a report to Congress entitled "Department of Defense Personnel Access to the Internet".
In October 2009, military blogger C.J. Grisham was pressured by his superiors at Redstone Arsenal to close his blog, A Soldier's Perspective, after complaining about local public school officials pushing a mandatory school uniform program without parental consent.
The Monterey Herald reported on June 27, 2013, that the United States Army barred its personnel from accessing parts of The Guardian's website after whistleblower Edward Snowden's revelations about the PRISM global surveillance program and the NSA were published there. The entire Guardian website was blocked for personnel stationed throughout Afghanistan, the Middle East, and South Asia, as well as personnel stationed at US Central Command headquarters in Florida.
In 2019, social media app TikTok was banned on all military devices for what the Pentagon said was "potential security risks".
WikiLeaks
See also: WikiLeaks § HostingIn February 2008, the Bank Julius Baer vs. WikiLeaks lawsuit prompted the United States District Court for the Northern District of California to issue a permanent injunction against the website WikiLeaks' domain name registrar. The result was that WikiLeaks could not be accessed through its web address. This elicited accusations of censorship and resulted in the Electronic Frontier Foundation defending WikiLeaks. After a later hearing, the injunction was lifted.
Assange said that WikiLeaks chose Amazon knowing they would probably be kicked off of "in order to separate rhetoric from reality". On December 1, 2010 Amazon.com cut off WikiLeaks 24 hours after it was contacted by the staff of Senator Joe Lieberman, Chairman of the US Senate Committee on Homeland Security. In a statement Lieberman said it was "the right decision and should set the standard for other companies". Constitutional lawyers say that this is not a first amendment issue because Amazon, as a private company, is free to make its own decisions. Kevin Bankston, a lawyer with the Electronic Frontier Foundation, agreed that this was not a violation of the first amendment.
Individual websites
Some websites that allow user-contributed content practice self-censorship by adopting policies on how the web site may be used and by banning or requiring pre-approval of editorial contributions from users that violate the site's policies. For example, a social media platform may restrict speech that it considers to be hate speech more broadly than is required by US law, and may restrict speech that it considers to be harassment and verbal abuse.
Restriction of hate speech and harassment on social media is the subject of debate. For example, two perspectives include that online hate speech should be removed because it causes serious intimidation and harm, and that it should not be removed because it is "better to know that there are bigots among us" than to have an inaccurate picture of the world.
Outside the US
See also: Cisco Systems § Censorship in China, Censorship by Google, Criticism of Microsoft § Censorship in China, Criticism of Myspace § MySpace China, Skype § Service in the People's Republic of China, and Censorship by YahooUS corporations including Google, Yahoo!, Microsoft, and MySpace practice greater levels of self-censorship in some international versions of their online services to comply with local laws/regulations. This is most notably the case in these corporations' dealings in China.
In October 2011 US-based Blue Coat Systems of Sunnyvale, California acknowledged that Syria was using its devices to censor Web activity, a possible violation of US trade embargoes.
Intellectual property
A January 4, 2007 restraining order issued by US District Court Judge Jack B. Weinstein forbade activists in the psychiatric survivors movement from posting links to ostensibly leaked documents that purportedly show that Eli Lilly and Company intentionally withheld information as to the lethal side-effects of Zyprexa. The Electronic Frontier Foundation appealed this as prior restraint, saying that citizen-journalists should have the same First Amendment rights as major media outlets. It was later held that the judgment was unenforceable, though First Amendment claims were rejected.
In May 2011 and January 2012 the US seized the domains of the non-US websites of the non-US citizens Richard O'Dwyer and Kim Dotcom, and sought to extradite them to the US, accusing them of copyright infringement.
In January 2015 details from the Sony Pictures Entertainment hack revealed the Motion Picture Association of America's lobbying of the United States International Trade Commission to mandate that US ISPs, either at the internet transit or internet service provider level, implement IP address blocking of unauthorized file sharing as well as linking websites.
Bay Area Rapid Transit (BART) phone service suspension
On July 3, 2011, two officers of the Bay Area Rapid Transit (BART) Police shot and killed Charles Hill at Civic Center Station in San Francisco. On August 12, 2011, BART shut down phone services, including mobile Internet access, for three hours in an effort to limit possible protests against the shooting and to limit communications from protesters at the station. The shutdown drew the attention of international media, along with comparisons to former Egyptian president Hosni Mubarak.
On August 29, 2011, a coalition of nine public interest groups led by Public Knowledge filed an Emergency Petition asking the US Federal Communications Commission (FCC) to declare these actions illegal.
In December 2011 BART adopted a new "Cell Service Interruption Policy" that allows shutdowns of phone services within BART facilities only "in the most extraordinary circumstances that threaten the safety of District passengers, employees and other members of public, the destruction of District property, or the substantial disruption of public transit service". According to a spokesperson, under the new policy the phone system would not be disable under circumstances similar to those in August 2011. Instead police officers would arrest individuals who break the law.
Interruption of communication services
In 2014 the FCC issued an Enforcement Advisory warning the public that "it is illegal to use a cell phone jammer or any other type of device that blocks, jams or interferes with authorized communications" and that "this prohibition extends to every entity that does not hold a federal authorization, including state and local law enforcement agencies".
In 2016 the California Law Revision Commission issued a recommendation on "Government Interruption of Communication Service". The Commission concluded that government action to interrupt communications can be constitutional if the government acts pursuant to procedures that are designed to protect constitutional free expression and due process rights. To be constitutional the action usually needs to be approved by a judicial officer who has found: (i) probable cause that the communication service is or will be used for an unlawful purpose, (ii) that immediate action is required to protect public health, safety, or welfare, and (iii) the affected customer must have a prompt opportunity for adjudication of the government's contentions. For a general interruption of communication service that affects a large number of people or a large geographic area, judicial approval also requires that the action (iv) is necessary to avoid a serious threat of violence that is both imminent and likely to occur or (v) that the effect on expression is incidental to some other valid government purpose, and (vi) is reasonable, (vii) is content-neutral, (viii) would impair no more speech than is necessary, and (ix) leaves open other ample means of communication. Prior judicial approval is not required in extreme emergencies involving immediate danger of death or great bodily injury where there is insufficient time to obtain a court order.
Beyond constitutional law, a state or local government's ability to effect a general interruption of wireless communications is also subject to the federal "Emergency Wireless Protocol (EWP)" or "Standard Operating Procedure 303" which established a process for interrupting and restoring wireless communication service during times of national emergency. The effect of this protocol is that state and local government officials can initiate an interruption of communication service, but cannot directly order wireless communication service providers to take action. Such orders to private providers must come from the National Coordinating Center for Communications (NCC) within the Department of Homeland Security (DHS), as designated by the EWP. If an order authorizing an interruption does not fall within the EWP, it is served directly on the relevant communication service provider.
See also
- Block (internet)
- Internet censorship and surveillance by country
- Communications Assistance for Law Enforcement Act (CALEA)
- Mass surveillance in the United States
References
This article incorporates licensed material from the Regional Overviews and other sections of the OpenNet Initiative web site.
- ^ "United States and Canada". opennet.net. OpenNet Initiative. 30 March 2010. Archived from the original on 2017-11-07. Retrieved 2024-05-29.
- ^ Bambauer, Derek E. (2009). "Cybersieves". Duke Law Journal. 59.
- ^ Palfrey, Jr., John; Rogoyski, Robert (2006). "The Move to the Middle: The Enduring Threat of 'Harmful' Speech to the End-to-End Principle" (PDF). Washington University Journal of Law and Policy. 21: 31–65. Archived from the original (PDF) on 2012-03-14.
- ^ "Unintended Consequences: Twelve Years under the DMCA". Electronic Frontier Foundation. March 2010. Archived from the original on 2011-05-05.
- ^ Somini Sengupta (12 July 2012). "U. S. Pursuing a Middleman in Web Piracy". The New York Times. Archived from the original on 13 July 2012. Retrieved 13 July 2012.
- ^ "Manhattan Federal Court Orders Seizures of Seven Websites for Criminal Copyright Infringement in Connection with Distribution of Pirated Movies Over the Internet" (PDF). Press Release United States Attorney Southern District of New York. U.S. Justice Department. 10 June 2010. Archived from the original (PDF) on 6 October 2014. Retrieved 10 July 2011.
- ^ Barakat, Matthew; Perry, Nick (20 January 2012). "US Internet piracy case brings New Zealand arrests". The Washington Times. Associated Press. Archived from the original on 28 April 2012. Retrieved 27 February 2012.
- ^ "US formally requests Dotcom's extradition". 3 News NZ. 5 March 2012. Archived from the original on 14 July 2014. Retrieved 12 April 2015.
- A&M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896 (N.D. Cal. 2000), aff'd in part, rev'd in part, 239 F.3d 1004 (9th Cir. 2001)
- Menta, Richard (December 9, 1999). "RIAA Sues Music Startup Napster for $20 Billion". MP3 Newswire. Archived from the original on June 1, 2013. Retrieved April 8, 2018.
- 2001 US Dist. LEXIS 2186 (N.D. Cal. Mar. 5, 2001), aff'd, 284 F. 3d 1091 (9th Cir. 2002)
- Savage, Charlie (1 December 2010). "U.S. Weighs Prosecution of WikiLeaks Founder, but Legal Scholars Warn of Steep Hurdles". The New York Times. Archived from the original on 10 December 2010. Retrieved 5 December 2010.
- Yost, Pete (29 November 2010). "Holder says WikiLeaks under criminal investigation". Fox News. Archived from the original on 24 December 2013. Retrieved 5 December 2010.
- "Swedish authorities sink Pirate Bay" (PDF) (Press release). MPAA.org. 31 May 2006. Archived from the original (PDF) on 3 October 2009. Retrieved 27 September 2008.
- "Megaupload.com blocked (shutdown) Anonymous hacked Universal Music and other sites". Pakblog.net. 19 January 2012. Archived from the original on 6 September 2012. Retrieved 19 January 2012.
- Reporters Without Borders, ed. (11 March 2014). "Internet Enemies". Enemies of the Internet 2014: Entities at the heart of censorship and surveillance. Archived from the original on 2014-03-12. Retrieved 24 June 2014.
- Qazi, Usman (1996). "The Internet Censorship Controversy". Virginia Polytechnic Institute and State University. Archived from the original on 2011-07-21.
- Jarrett, H. Marshall; Bailie, Michael W. (2010). "Prosecution of Computer Crimes" (PDF). justice.gov. Office of Legal Education Executive Office for United States Attorneys. Archived (PDF) from the original on April 7, 2013. Retrieved June 3, 2013.
- Sandvig, Christian; Karahalios, Karrie (2006-07-01). "Most of what you do online is illegal. Let's end the absurdity". The Guardian. Archived from the original on 2018-04-10. Retrieved 2018-04-09.
- "United States Country Profile: Violations of User Rights". Freedom House. 2017. Archived from the original on 2018-03-27.
- "Communications Decency Act of 1996", a United States federal law, Title V of the Telecommunications Act of 1996, Pub. L. 104–104 (text) (PDF), 110 Stat. 133-139, enacted February 8, 1996
- "CDA". Center for Democracy and Technology. 24 March 2011. Archived from the original on 2011-08-18.
- Citizens Internet Empowerment Coalition (26 June 1997). "No.96-511, JANET RENO, ATTORNEY GENERAL OF THE UNITED STATES, et al., APPELLANTS v. AMERICAN CIVIL LIBERTIES UNION et al". Supreme Court Decision Index. Archived from the original on 2011-04-14.
- "§ 230 Protection for private blocking and screening of offensive material Title 47, Chapter 5, Subchapter II, Part I of the U.S. Code". Legal Information Institute, Cornell University Law School.
- material that is considered "... to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected", from § 230(c)(2)(A) "Protection for "Good Samaritan" blocking and screening of offensive material", Title 47, Chapter 5, Subchapter II, Part I of the U.S. Code"
- "47 U.S.C. 231". law.cornell.edu. Retrieved July 11, 2006.
- "Child Online Protection Act Overturned". ABC News. 2008-07-23. Retrieved 2017-02-27.
- "Judge Strikes '98 Law Aimed At Online Porn". Associated Press. 22 March 2007. Archived from the original on March 28, 2007. Retrieved March 22, 2007.
- Lamut, Anna (3 August 2008). "ACLU v. Mukasey; Third Circuit Holds Child Online Protection Act Unconstitutional". JOLT Digest. Harvard Journal of Law & Technology. Archived from the original on 12 July 2012. Retrieved 24 January 2009.
- Nichols, Scott (22 January 2009). "COPA Child-Porn Law Killed". PC World. Archived from the original on 15 June 2012. Retrieved 24 January 2009.
- "The Digital Mellennium Copyright Act of 1998" (PDF). U.S. Copyright Office. December 1998. Archived from the original (PDF) on 2007-08-08.
- Online Copyright Infringement Liability Limitation Act, 17 U.S.C. § 512
- "DMCA". Electronic Frontier Foundation. Archived from the original on 2011-05-05. Retrieved 2024-05-31.
- "Children's Online Privacy Protection Act of 1998", a United States federal law, located at 15 U.S.C. §§ 6501–6506 (Pub. L. 105–277 (text) (PDF), 112 Stat. 2581-728, enacted October 21, 1998)
- "Frequently Asked Questions about the Children's Online Privacy Protection Rule". February 2007. Archived from the original on 2008-10-12., U.S. Federal Trade Commission, 7 October 2008
- "Children's Internet Protection Act (CIPA)", 20 U.S.C. § 9134(f) and 47 U.S.C. § 254(h)(5)-254(h)(7)
- ^ "Children's Internet Protection Act, updated". Consumer Publications, Federal Communications Commission. Archived from the original on 2007-10-19.
- ^ Adam Liptak (4 March 2008). "A Wave of the Watch List, and Speech Disappears". The New York Times. Archived from the original on 7 April 2017. Retrieved 22 February 2017.
- ^ "Alphabetical Listing of Specially Designated Nationals and Blocked Persons". Office of Foreign Assets Control, U.S. Department of the Treasury. Archived from the original on 28 February 2009. Retrieved 25 February 2009.
- 113th Congress, 2d Session (June 11, 2014). "Discussion Draft of the 'Cybersecurity Information Sharing Act of 2014' (S.2588)". Archived from the original on 2014-08-25.
{{cite web}}
: CS1 maint: numeric names: authors list (link) - "H.R.2029 - Military Construction and Veterans Affairs and Related Agencies Appropriations Act, 2016". Archived from the original on 2018-04-21. Retrieved 2018-04-08.
- Velazco, Chris (December 18, 2015). "Budget bill heads to President Obama's desk with CISA intact". Engadget. Archived from the original on 2018-04-09.
- Duffy, Thomas F. (May 2016). "Cybersecurity Information Sharing Act of 2015". Center for Information Security. Archived from the original on 2018-11-04.
- Karp, Brad S.; Paul, Weiss, Rifkind, Wharton & Garrison LLP (March 3, 2016). "Federal Guidance on the Cybersecurity Information Sharing Act of 2015". Harvard Law School Forum on Corporate Governance and Financial Regulation. Archived from the original on 2018-04-08.
{{cite web}}
: CS1 maint: multiple names: authors list (link) - Andy Greenberg (20 Mar 2015). "CISA Security Bill: An F for Security But an A+ for Spying". Wired. Archived from the original on 23 July 2015. Retrieved 31 Jul 2015.
- "The Justice for Victims of Trafficking Act of 2015 Pub. L 144-22". May 29, 2015. Archived from the original on 2018-04-08.
- "Freedom On the Net 2017". Freedom House. Archived from the original on 2018-03-27. Retrieved April 8, 2018.
- Soave, Robby (2017-03-07). "Berkeley removes 20,000 free online videos to comply with insane Department of Justice ruling". Reason (magazine). Archived from the original on 2017-03-18. Retrieved 2017-03-18.
- Elizabeth Dias (2018-04-11). "Trump Signs Bill Amid Momentum to Crack Down on Trafficking". The New York Times. Archived from the original on 2018-04-12. Retrieved 2018-04-11.
- Larry Magid (2018-04-06). "DOJ Seizes Backpage.com Weeks After Congress Passes Sex Trafficking Law". Forbes. Archived from the original on 2018-04-08. Retrieved 2018-04-08.
- Ann, Wagner (March 21, 2018). "H.R.1865 - 115th Congress (2017-2018): Allow States and Victims to Fight Online Sex Trafficking Act of 2017". congress.gov. Archived from the original on April 8, 2018. Retrieved April 8, 2018.
- "ACLU letter opposing SESTA". American Civil Liberties Union. Archived from the original on 2018-03-24. Retrieved 2018-03-25.
- "Misplaced Pages warns that SESTA will strip away protections vital to its existence". The Verge. Archived from the original on 2018-03-09. Retrieved 2018-03-08.
- "Sex trafficking bill is turning into a proxy war over Google". The Verge. Archived from the original on 2017-09-21. Retrieved 2017-09-20.
- Quinn, Melissa. "Tech community fighting online sex trafficking bill over fears it will stifle innovation". Washington Examiner. Archived from the original on 2017-09-19. Retrieved 2017-09-20.
- "How a New Senate Bill Will Screw Over Sex Workers". Rolling Stone. Archived from the original on 2018-03-24. Retrieved 2018-03-25.
- Zimmerman, Amy (2018-04-04). "Sex Workers Fear for Their Future: How SESTA Is Putting Many Prostitutes in Peril". The Daily Beast. Archived from the original on 2018-04-07. Retrieved 2018-04-07.
- "H.R. 5319: Deleting Online Predators Act of 2006". govtrack.us. 9 May 2006. Archived from the original on 2011-12-30.
- "Deleting Online Predators Act of 2007 (2007 - H.R. 1120)". GovTrack.us. 16 February 2007. Archived from the original on 2008-12-01. Retrieved 2024-05-31.
- "Deleting Online Predators Act of 2006 (2006 - H.R. 5319)". GovTrack.us. 2 August 2007. Archived from the original on 2011-12-30. Retrieved 2024-05-31.
- "Protecting Cyberspace as a National Asset Act of 2010 (2010 - H.R. 5548)". GovTrack.us. 16 June 2010. Retrieved 2024-05-31.
- "Myth vs. Reality: The Facts About S. 3480, "Protecting Cyberspace as a National Asset Act of 2010" (PDF). Archived from the original (PDF) on 2017-07-02. Retrieved 9 February 2011., fact sheet issued by Senators Joseph I. Lieberman, Chairman, and Susan M. Collins, Ranking Member, United States Senate Committee on Homeland Security and Governmental Affairs
- "Executive Cyberspace Coordination Act of 2011 (2011 - H.R. 1136)". GovTrack.us. 16 March 2011. Archived from the original on 2011-10-26. Retrieved 2024-05-31.
- ^ "S.3804: Combating Online Infringement and Counterfeits Act - 20 September 2010". GovTrack.us. September 20, 2010. Archived from the original on 21 November 2010. Retrieved October 16, 2010.
- ^ Weisman, Jonathan (January 20, 2012). "After an Online Firestorm, Congress Shelves Antipiracy Bills". The New York Times. Archived from the original on January 20, 2012. Retrieved January 20, 2012.
- "Senate bill amounts to death penalty for Web sites". CNET. May 12, 2011. Archived from the original on October 25, 2012. Retrieved Nov 7, 2011.
- "Americans face piracy website blocking". BBC. May 13, 2011. Archived from the original on May 17, 2011. Retrieved May 24, 2011.
- Condon, Stephanie (January 2012). "PIPA, SOPA put on hold in wake of protests". CBS News. Archived from the original on 2012-03-23.
- "HR 3523 as reported to the House Rules Committee" (PDF). Archived from the original (PDF) on 2012-05-22.
- "Budget bill heads to President Obama's desk with CISA intact". 18 December 2015. Archived from the original on 2018-04-09. Retrieved 2018-04-08.
- "H.R. 3523 - Letters of Support". House Permanent Select Committee on Intelligence. Archived from the original on April 26, 2012. Retrieved April 26, 2012.
- "CISPA supporters list: 800+ companies that could help Uncle Sam snag your data". Digital Trends. Archived from the original on 17 April 2019. Retrieved 12 April 2012.
- "Draconian cyber security bill could lead to Internet surveillance and censorship". RWB. Archived from the original on 12 March 2016. Retrieved 15 April 2012.
- Brendan Sasso (23 April 2012). "Google acknowledges lobbying on cybersecurity bill CISPA". The Hill. Capitol Hill Publishing Corp. Archived from the original on 16 March 2014. Retrieved 9 May 2012.
- "Text - H.R.1165 - 118th Congress (2023-2024): Data Privacy Act of 2023 | Congress.gov | Library of Congress".
- "Text - S. 686–118th Congress (2023-2024): RESTRICT Act | Congress.gov | Library of Congress".
- "TikTok CEO doesn't seem to sway Congress as U.S. Considers a TikTok ban". NBC News. 23 March 2023.
- ^ "Children and the Internet: Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries". National Conference of State Legislatures. 16 November 2016. Archived from the original on 2013-11-09. Retrieved 8 April 2018.
- "Section 162.069 of SB 54". Archived from the original on 2011-09-04.
- Beeterm, Jon E. Circuit Judge (26 August 2011). "Order Entering Preliminary Injunction in Missouri State Teachers Association, et al. v. State of Missouri, et al. Case No.: 11AC-CC00553, Circuit Court of Cole County, Missouri" (PDF). Archived from the original (PDF) on 2012-04-25.
- Ramasastry, Anita (13 September 2011). "Can Teachers and Their Students Be Banned from Becoming Facebook Friends?". Archived from the original on 2011-09-25.
- Lieb, David A. (23 September 2011). "Mo. lawmakers vote to repeal teacher-Facebook law". The Boston Globe. Archived from the original on 2011-09-25.
- Shepardson, David (May 17, 2023). "Montana to become first US state to ban TikTok". Reuters.
- Shepardson, David (May 17, 2023). "Montana to become first US state to ban TikTok".
- Masnick, Mike (2022-05-04). "Who Needs SOPA: Judge Orders Every US ISP To Block Entire Websites Accused Of Enabling Piracy". Techdirt. Retrieved 2022-05-04.
- Robertson, Adi (2022-05-06). "Sweeping legal ruling orders ISPs to block pirate sites". The Verge. Retrieved 2022-05-06.
- Wagner, Mitch (19 March 2010). "Internet filtering as a form of soft censorship". Computerworld Tool Talk blog. Archived from the original on 2011-11-06.
- Wagner, Mitch (26 March 2010). "How Internet censorship harms schools". Computerworld Tool Talk blog. Archived from the original on 2011-01-25.
- Schrader, Alvin (May 1999). "Internet Censorship: Issues for Teacher-Librarians". Teacher Librarian. Archived from the original on 2011-02-20.
- "Study Released on Internet Blocking in Schools". Online Policy Group and Electronic Frontier Foundation. 23 June 2003. Archived from the original on 2011-07-25.
- "Internet Use in Libraries". American Library Association Council. Archived from the original on 2011-02-17.
- "Resolution on the Use of Filtering Software in Libraries". American Library Association. 2 July 1997. Archived from the original on 2019-06-08.
- Liptak, Adam (27 September 2007). "Verizon Blocks Messages of Abortion Rights Group". The New York Times. Archived from the original on 2017-04-23.
- General B.B. Bell, Commander, UNC/CFC/USFK (18 May 2007). "Restricted Access to Internet Entertainment Sites Across DoD Networks". U.S. Army Korea.
{{cite web}}
: CS1 maint: multiple names: authors list (link) - Report to Congress (September 2007). "Department of Defense Personnel Access to the Internet" (PDF). Archived from the original (PDF) on 2013-02-25.
- Anderson, Jon R. (December 8, 2009). "Facebook face-off". Military Times. Archived from the original on April 23, 2013. Retrieved January 29, 2014.
- Molnar, Philipp (June 27, 2013). "Restricted Web access to the Guardian is Armywide, say officials". Monterey Herald. Archived from the original on 2014-10-20. Retrieved 15 October 2014.
- Breithut, Jörg (June 28, 2013). "Zensur: US-Armee sperrt Zugang zu "Guardian"". Der Spiegel. Archived from the original on 2014-10-20. Retrieved 15 October 2014.
- Ackerman, Spencer (July 1, 2013). "US military blocks entire Guardian website for troops stationed abroad". The Guardian. Archived from the original on February 2, 2017. Retrieved December 14, 2016.
- "U.S. Army bans TikTok on military devices, signaling growing concern about app's Chinese roots". The Washington Post. 2019-12-31. Archived from the original on 2022-03-26.
- "Bank Julius Baer & Co v. Wikileaks". Electronic Frontier Foundation. Archived from the original on 2008-03-04. Retrieved 2008-03-10.
- "WikiLeaks got kicked off Amazon on purpose, says Assange". CNET. Retrieved 2023-10-23.
- "Julian Assange answers your questions". The Guardian. 2010-12-03. ISSN 0261-3077. Retrieved 2023-10-23.
- MacAskill, Ewen (2010-12-02). "WikiLeaks website pulled by Amazon after US political pressure". The Guardian. ISSN 0261-3077. Archived from the original on 2011-06-26. Retrieved 2024-05-31., Ewen MacAskill, The Guardian, 2 December 2010
- "Amazon Severs Ties with Wikileaks". Joe Lieberman's U.S. Senate web site. 1 December 2010. Archived from the original on 2010-12-04.
- "How Lieberman Got Amazon To Drop WikiLeaks". TPM – Talking Points Memo. 1 December 2010. Archived from the original on 2011-05-04. Retrieved 2024-05-31.
- See also: Online hate speech#Facebook
- McElwee, Sean (July 12, 2013). "The Case for Censoring Hate Speech". AlterNet. Archived from the original on December 13, 2014. Retrieved December 14, 2014.
- Lukianoff, Greg (April 7, 2013). "Twitter, hate speech, and the costs of keeping quiet". CNET. Archived from the original on December 15, 2014. Retrieved December 14, 2014.
- York, Jillian C.; Faris, Robert; Deibert, Ron (19 September 2010). "Policing Content in the Quasi-Public Sphere | OpenNet Initiative". OpenNet Initiative. Archived from the original on 2011-05-21. Retrieved 2024-05-31.
- "Geolocation filtering: blocked during run-up to election". opennet.net. 27 October 2004. Archived from the original on 2011-05-21. Retrieved 2024-05-31.
- Valentino-DeVries, Jennifer; Sonne, Paul; Malas, Nour (29 October 2011). "Blue Coat Acknowledges Syria Used Its Gear for Internet Censorship Amid Arab Spring". The Wall Street Journal. Archived from the original on 2017-10-27. Retrieved 2024-05-31.
- "Eli Lilly Zyprexa Litigation". Electronic Frontier Foundation. Archived from the original on 2008-10-11.
- "Eli Lilly Loses Effort to Censor Zyprexa Documents Off the Internet". Electronic Frontier Foundation (Press release). 13 February 2007. Archived from the original on 2016-09-12. Retrieved 2024-05-31.
- Brandom, Russell (2 January 2015). "The MPAA has a new plan to stop copyright violations at the border". Archived from the original on 3 January 2015. Retrieved 4 January 2015.
- Upton, John (July 25, 2011). "BART Police Release Video of Shooting - Pulse of the Bay". The Bay Citizen. Archived from the original on July 23, 2012. Retrieved August 21, 2011.
- "To Prevent Protests, San Francisco Subway Turns Off Cell Signals, August 13, 2011". PC Magazine. Archived from the original on January 19, 2012. Retrieved August 18, 2011.
- "S.F. subway muzzles cell service during protest". CNET.
- "Questions, Complaints Arise Over BART Cutting Cell Phone Service". KTVU. Archived from the original on 2011-10-05.
- "Leland Yee scolds BART over cell phone blackout". KGO-TV. Archived from the original on 2011-08-24.
- Feld, Harold; Siy, Sherwin (29 August 2011). "In the Matter of the Petition of Public Knowledge et al. for Declaratory Ruling that Disconnection of Telecommunications Services Violates the Communications Act" (PDF). Archived from the original (PDF) on 2011-10-10.
- Crawford, Susan (25 September 2011). "Phone, Web Clampdowns in Crises Are Intolerable". Bloomberg News. Archived from the original on 2013-08-25.
- Bay Area Rapid Transit District (December 2011). "Cell Service Interruption Policy" (PDF). Archived from the original (PDF) on 2011-12-18. Retrieved 30 March 2012.
- Wyatt, Edward (2 March 2012). "F.C.C. Asks for Guidance on Whether, and When, to Cut Off Cellphone Service". The New York Times. Archived from the original on 2016-11-04.
- Federal Communications Commission (December 8, 2014). "WARNING: Jammer Use is Prohibited Public Notice: FCC Enforcement Advisory (No. 2014-05)" (PDF). Archived from the original (PDF) on 2018-04-09.
- ^ California Law Revision Commission (December 2016). "Government Interruption of Communication Service" (PDF). Archived from the original (PDF) on 2017-12-18. This article incorporates text from this source, which is in the public domain.
- "Creative Commons Attribution 3.0 Unported license". Archived from the original on 2017-12-21., see the lower right corner of pages at the "OpenNet Initiative web site". Archived from the original on 2018-09-25.
External links
- Global Integrity: Internet Censorship, A Comparative Study; puts US online censorship in cross-country context.
Censorship and websites | |
---|---|
Censorship of | |
Censorship by | |
Websites blocked in |
Social issues in the United States | |
---|---|
Economy | |
Education | |
Environment | |
Family | |
Children | |
Women | |
Racism and racial inequality | |
Crime | |
Health | |
Media | |
Discrimination | |
Other issues |