Internet freedom in the United States declined for the fourth consecutive year. Federal, state, and local authorities in many cases responded to nationwide protests for racial justice with intrusive surveillance, intimidation, and harassment, and there were some arrests for online activities. The online sphere was flooded with politicized disinformation, inflammatory content, and dangerous misinformation related to COVID-19, the November 2020 elections, and protests, among other topics. While the internet in the United States remains vibrant, diverse, and largely free from state censorship, an executive order signed by President Donald Trump in May 2020 marked a shift away from the robust intermediary-liability protections that have long been synonymous with the US internet freedom model. After the coverage period, the president also ordered US individuals and entities to halt transactions with TikTok and WeChat, potentially forcing the popular Chinese-owned social media platforms to sell or shutter US operations that have an estimated 50 million and 19 million users, respectively.
The people of the United States benefit from an open and competitive political system, a strong rule-of-law tradition, robust freedoms of expression and religious belief, and a wide array of other civil liberties. However, in recent years its democratic institutions have suffered erosion. Both longstanding and newer issues include partisan manipulation of the electoral process, racism and inequality in the criminal justice system, flawed and discriminatory policies on immigration and asylum seekers, and growing disparities in wealth, economic opportunity, and political influence.
- After surviving legal challenges, the merger between T-Mobile and Sprint concluded in April 2020. Industry watchers and open-internet advocates have voiced concern over market concentration among mobile service providers (see A4).
- In October 2019, a federal appeals court upheld a decision by the Federal Communications Commission (FCC) to repeal its 2015 Open Internet Order, which aimed to establish the principle of net neutrality. However, the court prohibited preemptive blocking of state-level action to protect net neutrality in the wake of the FCC’s repeal (see A5).
- In May 2020, President Trump signed an executive order titled “Preventing Online Censorship” to limit protections against intermediary liability within Section 230 of the Communications Act, as amended by the Telecommunications Act of 1996. The order came after Twitter fact-checked the president’s baseless claims about the risk of fraud through mail-in voting, and was just one of many government efforts to reform Section 230 (see B2 and B3).
- In an unprecedented action, the government moved to effectively ban two popular Chinese-owned social media platforms; President Trump cited national security concerns when issuing executive orders in August 2020, after the coverage period, that prohibited any transaction from the United States with WeChat and TikTok. The decision came after the Treasury Department launched an investigation into TikTok in November 2019 (see B2 and B3).
- Amid nationwide protests for racial justice that surged in May 2020 and continued in the months after the coverage period, enhanced government surveillance—as well as intimidation, harassment, and arrests linked to online activity—infringed on people’s freedom to use digital technology to associate and assemble (see B8, C3, C5, and C7).
- In April 2020, Puerto Rico amended its public security law to make it a felony to “transmit or allow the transmission” of “false” statements about government proclamations or orders related to emergencies, including those pertaining to COVID-19, with penalties of up to $5,000 in fines and six months in jail (see C2 and C3).
Reliable internet service is accessible for the majority of residents in the United States. However, challenges remain in rural areas and tribal lands. Concentration in the telecommunications industry continues, with only three major mobile service providers in the country. While the federal government has turned away from net neutrality principles, a growing number of states have implemented their own rules.
|Do infrastructural limitations restrict access to the internet or the speed and quality of internet connections?||6.006 6.006|
The United States has the third largest number of internet users in the world,1 although the overall connection speeds and access rates for broadband networks remain lower than in many peer countries. In June 2019, the Pew Research Center estimated that 90 percent of US adults use the internet.2 Similarly, the International Telecommunication Union found that 87 percent of the US population used the internet in 2017, earning the United States a ranking of 29th out of 207 countries.3 The FCC’s most recent Broadband Deployment Report determined that, as of 2017, more than 93 percent of the population lived in an area with access to both fixed-line and mobile broadband services.4
Comparatively speaking, the United States leads other member states of the Organisation for Economic Co-operation and Development (OECD) in terms of total fixed broadband and total mobile broadband subscriptions.5 On fixed broadband subscriptions per capita, the United States ranks 18th out of 37 countries, lagging well behind OECD leaders Switzerland, France, Denmark, Germany, the Netherlands, and South Korea. With respect to mobile broadband subscriptions per capita, the United States ranks fourth behind Japan, Finland, and Estonia. In a global comparison, the country ranked 15th in broadband speeds in 2019.6 Nearly all adults in the United States (96 percent) reported owning a mobile phone in 2019.7 This mobile broadband market is the largest among OECD countries.8
The speed-testing company Ookla reported the US mobile internet download speed to be 44.06 Mbps in July 2020, ranking it 33rd worldwide, and the fixed broadband download speed to be 152.6 Mbps, or ninth worldwide.9
Despite the country’s high penetration rates, infrastructural problems during the coverage period limited access; the incidents were often related to extreme weather events exacerbated by climate change. In the fall of 2019, California’s largest electricity provider imposed temporary blackouts to stymie the spread of wildfires,10 affecting telephone and internet service.11
Major broadband providers continue to expand fifth-generation (5G) mobile networks, and “in aggregate” 5G networks are available to the majority of the population, although coverage is skewed toward urban areas.12 China’s position as a global leader in 5G development has raised concerns among US policymakers about the national security,13 economic, and internet freedom implications of embracing 5G technology built by Chinese companies. During the coverage period, the US government was working toward a method for safeguarding the operation of 5G networks, with authorization under the Secure 5G and Beyond Act of 2020.14 In June 2020, after the coverage period, the FCC designated two Chinese telecommunications companies and 5G technology providers—Huawei and ZTE—as national security threats.15
- 1Internet World Stats, “Top 20 Countries with the Highest Number of Internet Users,” June 30, 2019, https://www.internetworldstats.com/top20.htm.
- 2Pew Research Center, “Internet/Broadband Fact Sheet,” June 12, 2019, http://www.pewinternet.org/fact-sheet/internet-broadband/. The World Bank similarly found that internet penetration rates in the United States in 2017 were 87%. See World Bank, “Individuals using the Internet (% of population)”
- 3International Telecommunication Union, “Individuals Using the Internet, 2005-2019,” 2019, https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx.
- 4Federal Communications Commission, “2019 Broadband Deployment Report,” May 29, 2019, https://docs.fcc.gov/public/attachments/FCC-19-44A1.pdf.
- 5OECD, “OECD Broadband Portal,” March 2020, https://www.oecd.org/sti/broadband/broadband-statistics/.
- 6Cable.co.uk, “Worldwide broadband speed league 2020,” https://www.cable.co.uk/broadband/speed/worldwide-speed-league/.
- 7Pew Research Center, “Mobile Fact Sheet,” June 12, 2019, http://www.pewinternet.org/fact-sheet/mobile/.
- 8OECD, “OECD Broadband Portal,” March 2020, https://www.oecd.org/sti/broadband/broadband-statistics/.
- 9“Speedtest Global Index,” accessed on September 9, 2020, https://www.speedtest.net/global-index.
- 10Associated Press, “California Could Require Backup Power at Cellphone Towers to Prevent Outages during Fires,” Los Angeles Times, January 8, 2020, https://www.latimes.com/california/story/2020-01-08/california-to-exami….
- 11Sarah Krouse, “In California, Power Outages Knock Out Modern Phones,” The Wall Street Journal, October 30, 2019, https://www.wsj.com/articles/in-california-fires-power-outages-knock-ou….
- 12Federal Communications Commission, “2020 Broadband Deployment Report,” April 24, 2020, https://docs.fcc.gov/public/attachments/FCC-20-50A1.pdf.
- 13Carisa Nietsche & Martin Rasser, “Washington’s Anti-Huawei Tactics Need a Reboot in Europe,” Foreign Policy, April 30, 2020, https://www.bloomberg.com/news/articles/2020-05-14/michigan-cancels-leg….
- 14S. 893, the “Secure 5G and Beyond Act of 2020, March 23, 2020, https://www.whitehouse.gov/briefings-statements/bill-announcement-90/; The White House, “National Strategy to Secure 5G of the United States of American,” March 2020, https://www.whitehouse.gov/wp-content/uploads/2020/03/National-Strategy….
- 15Federal Communications Commission, “FCC Designated Hauwei and ZTE as National Security Threats,” June 30, 2020, https://www.fcc.gov/document/fcc-designates-huawei-and-zte-national-sec….
|Is access to the internet prohibitively expensive or beyond the reach of certain segments of the population for geographical, social, or other reasons?||2.002 3.003|
Despite its relatively strong infrastructure for internet provision, the country suffers from disparities in access, with older members of the population, those with lower household incomes, and residents of rural areas or tribal lands facing the greatest obstacles to connectivity.1
Tribal communities are among the least connected populations in the United States.2 More than 27 percent of people living in tribal areas lack access to fixed terrestrial broadband.3 A study by the American Indian Policy Institute at Arizona State University found that only 69 percent of respondents living on tribal lands had stable mobile internet access at all times.4
More than 26 percent of rural residents do not have access to high-speed internet, while others in this demographic often suffer from unreliable connections and unaffordable prices.5 Created in 2018, the Department of Agriculture’s ReConnect initiative aims to build internet infrastructure in rural areas that have limited broadband access.6 In 2020, the department offered $550 million in grants, loans, or a combination of the two to private entrepreneurs seeking to participate in the program.7
Internet access rates for individuals aged 65 and older have steadily increased over the past decade, reaching 73 percent in 2019, according to the Pew Research Center.8 Mobile technologies are also helping to reduce the broadband digital divide.9 Younger adults, people of color, and those with lower household incomes are especially prone to being “smartphone dependent,” with limited alternatives for their internet access.10
The cost of broadband internet access in the United States exceeds that in many countries with similar penetration rates, creating an “affordability crisis,” according to New America’s Open Technology Institute.11 One comparative analysis from Cable.co.uk found that the United States was more expensive than 118 other countries in 2020 with respect to the average cost of a fixed-line broadband package per month.12
In 2016, the FCC announced the expansion of its Lifeline program—which allows companies to offer subsidized phone plans to low-income households—to include broadband internet access as a subsidized utility.13 However, the commission, under Ajit Pai’s leadership beginning in 2017 (see A4), has taken step to downsize the program.14 Changes passed that year would have limited the availability of certain price discounts to people living on tribal lands, with Pai claiming the change would incentivize service providers to create networks in the areas.15 In 2019, an appeals court vacated these changes, referring to them as “arbitrary and capricious.”16
As of 2018, more than 9.6 million Americans relied on Lifeline for internet access.17 The Center for Public Integrity and USA Today reported in November 2019 that enrollment in the program had fallen 21 percent since 2017.18 In 2019, the FCC announced administrative adjustments for the purpose of combating fraud in the program and increasing minimum service requirements.19 Among the changes were new financial disclosure obligations and data usage monitoring.20 A number of civil society groups objected, citing invasive practices that put Lifeline subscribers’ privacy at risk.21 Low-income users who depend on Lifeline may be significantly disadvantaged by data caps and other administrative and technical restrictions within the structure of the program.
In March 2020, during the COVID-19 pandemic, more than 200 organizations wrote to the FCC outlining public harms that might arise from internet access limitations.22 The FCC took some steps to reduce the impact of Lifeline program restrictions as the pandemic continued, such as waiving certain recertification requirements for enrollees.23
Stay-at-home policies implemented during the health crisis have highlighted and magnified long-standing inequalities in access.24 Some new efforts sought to protect households and individuals from loss of service related to financial difficulties. The FCC’s Keep Americans Connected Initiative calls on internet service providers (ISPs) to voluntarily pledge (with no penalties for abrogation) not to shut down connections for customers who are unable to pay their bills. It also encourages companies to waive late-payment fees for those facing coronavirus-related hardships, to open Wi-Fi hotspots for more Americans, and to offer temporary free internet service to students without home access, among other recommendations.25 Many service providers also temporarily waived data caps or expanded data plans for consumers during the pandemic.26 At the end of the coverage period, some companies opted to voluntarily extend their Keep Americans Connected pledges in various ways, while others resumed charging consumers for excess data usage.27
- 1Andrew Perrin, “Digital gap between rural and nonrural Americans persists,” Pew Research Center, May 31, 2019, http://www.pewresearch.org/fact-tank/2017/05/19/digital-gap-between-rur…; Federal Communications Commission, “2019 Broadband Deployment Report,” May 29, 2019, https://docs.fcc.gov/public/attachments/FCC-19-44A1.pdf.
- 2Hansi Lo Wang, “Native Americans On Tribal Land are ‘The Least Connected’ to High-Speed Internet,” NPR, December 6, 2018, https://www.npr.org/2018/12/06/673364305/native-americans-on-tribal-lan….
- 3Federal Communications Commission, “2020 Broadband Deployment Report,” April 24, 2020, https://docs.fcc.gov/public/attachments/FCC-20-50A1.pdf.
- 4Brian Howard and Traci Morris, “Tribal Technology Assessment: The State of Internet Service on Tribal Lands,” American Indian Policy Institute, Arizona State University, Fall 2020, https://aipi.asu.edu/sites/default/files/tribal_tech_assessment_compres….
- 5Harmeet Kaur, “Why Rural Americans are Having a Har Time Working from Home,” CNN, April 29, 2020, https://www.cnn.com/2020/04/29/us/rural-broadband-access-coronavirus-tr….
- 6U.S. Department of Agriculture, “ReConnect Program Overview,” 2020, https://www.usda.gov/reconnect/program-overview.
- 7USDA Press, “USDA to Make $550 Million in Funding Available in 2020 to Deploy High-Speed Broadband Internet Infrastructure in Rural America,” December 12, 2019, https://www.usda.gov/media/press-releases/2019/12/12/usda-make-550-mill….
- 8Pew Research Center, “Internet/Broadband Factsheet,” June 12, 2019, http://www.pewinternet.org/fact-sheet/internet-broadband/.
- 9Andrew Perrin and Erica Turner, “Smartphones help blacks, Hispanics bridge some – but not all – digital gaps with whites,” Pew Research Center, August 20, 2019, https://www.pewresearch.org/fact-tank/2019/08/20/smartphones-help-black….
- 10Pew Research Center, “Mobile Fact Sheet,” June 12, 2019, https://www.pewresearch.org/internet/fact-sheet/mobile/; Aaron Smith, “U.S. Smartphone Use in 2015,” Pew Research Center, April 1, 2015, https://www.pewresearch.org/internet/2015/04/01/us-smartphone-use-in-20….
- 11Becky Chao and Claire Park, “The Cost of Connectivity 2020,” New America Open Technology Institute, July 15, 2020, https://www.newamerica.org/oti/reports/cost-connectivity-2020/.
- 12Cable.co.uk, “The cost of fixed-line broadband in 2016 countries,” Cable.co.uk, 2020, https://www.cable.co.uk/broadband/pricing/worldwide-comparison/
- 13John D. McKinnon, “Phone Subsidy for Poor Could Expand to Include Broadband,” The Wall Street Journal, March 8, 2016, https://www.wsj.com/articles/phone-subsidy-for-poor-could-expand-to-inc….
- 14Ali Berland, “FCC votes to limit program funding internet access for low-income communities,” The Hill, November 16, 2017, https://thehill.com/policy/technology/360818-fcc-moves-to-limit-program….
- 15Jacob Kastrenakes, “FCC begins scaling back internet subsidies for low-income homes,” The Verge, November 17, 2017, https://www.theverge.com/2017/11/17/16669716/fcc-lifeline-scaled-back-t….
- 16Leslie Stimson, “Appeals Court Vacates FCC Decision to Limit Telecom Subsidies for Tribal Areas,” Inside Towers, February 4, 2019. https://insidetowers.com/cell-tower-news-appeals-court-vacates-fcc-deci….
- 17Universal Service Administrative Co.,”Program Data: Lifeline Participation,” November, 20, 2019, https://www.usac.org/lifeline/learn/program-data/.
- 18Jared Bennett and Ashley Wong, “Under Trump, Millions of Low-Income People Lose Access to Cellphones,” Public Integrity, November 5, 2019, https://publicintegrity.org/inequality-poverty-opportunity/under-trump-….
- 19Federal Communications Commission, “Life Program Update,” August 14, 2019, https://www.fcc.gov/lifeline-program-update.
- 20Amir Nasr & Claire Park, “The Government Is Severing A Lifeline for Low-Income Americans,” New America, March 5, 2020, https://www.newamerica.org/weekly/lifeline-low-income-americans/.
- 21Eric Null & Jennifer Brody, “Disconnected: FCC proposals to reform Lifeline will hurt low-income consumers,” Access Now, February 26, 2020, https://www.accessnow.org/disconnected-fcc-proposals-to-reform-lifeline….
- 22Media Justice, “COVID-19 Lifeline Emergency Request,” March 23, 2020, https://mediajustice.org/resource/covid-19-lifeline-emergency-request/.
- 23Issie Lapowsky & Andrea Peterson, “Pressure mounts on FCC to pay for low-income Americans to get online,” Protocol, March 23, 2020, https://www.protocol.com/coronavirus-fcc-letter-lifeline-program.
- 24Nick Russo et al., “The Cost of Connectivity 2020,” New America Open Technology Institute, October 30, 2014, https://www.newamerica.org/oti/policy-papers/the-cost-of-connectivity-2…; Clark Merrefield, “Rural Broadband in the Time of Coronavirus,” Journalist’s Resource, Harvard Kennedy School Shorenstein Center on Media, Politics, and Public Policy, March 30, 2020, https://journalistsresource.org/studies/society/internet/rural-broadban…; Emily A. Vogels, Andrew Perrin, Lee Rainie, and Monica Anderson, “53% of Americans Say the Internet Has Been Essential During the COVID-19 Outbreak, Pew Research Center, April 30, 2020, https://www.pewresearch.org/internet/2020/04/30/53-of-americans-say-the…; Sahir Doshi, Allison Jordan, Kate Kelly, and Danyelle Solomon, “The COVID-19 Response in Indian Country,” Center for American Progress, June 18, 2020, https://www.americanprogress.org/issues/green/reports/2020/06/18/486480….
- 25Federal Communications Commission, “Keep Americans Connected,” May 14, 2020, https://www.fcc.gov/document/broadband-telephone-providers-extend-keep-…; Federal Communications Commission, “Companies Have Gone Above and Beyond the Call to Keep Americans Connected During Pandemic,” September 10, 2020, https://www.fcc.gov/companies-pledging-keep-americans-connected-during-….
- 26Jon Brodkin, “AT&T Waives Data Cap During Coronavirus; Comcast Keeps Charging Overage Fees,” Ars Technica, March 12, 2020, https://arstechnica.com/tech-policy/2020/03/at-comcast-keeps-charging-o…; Nick Statt, “AT&T, Comcast, Verizon and others Agree not to Overcharge Customers during Coronavirus,” The Verge, March 13, 2020, https://www.theverge.com/2020/3/13/21178451/fcc-coronavirus-keep-americ….
- 27Rob Pegoraro, “Data Caps Still Alive as Pledges from Internet Service Providers Expire,” July 1, 2020, https://www.usatoday.com/story/tech/columnist/2020/07/01/internet-data-…; Mark Hachman, “Which Internet Providers are Lifting Data Caps During the Coronavirus, and which aren’t,” PC World, Jun 19, 2020, https://www.pcworld.com/article/3532817/which-internet-providers-are-li….
|Does the government exercise technical or legal control over internet infrastructure for the purposes of restricting connectivity?||6.006 6.006|
The government imposes minimal restrictions on the public’s ability to access the internet. Private telecommunications companies, including AT&T and Verizon, own and maintain the backbone infrastructure. A government-imposed disruption of service would be highly unlikely and difficult to achieve due to the multiplicity of connection points to the global internet.
However, federal law enforcement agencies have occasionally limited wireless internet connectivity in emergency situations. The federal government also has a secret protocol for shutting down wireless internet connectivity in response to particular events, some details of which came to light following a lawsuit brought under the Freedom of Information Act (FOIA) in 2013.1 The protocol, known as Standard Operating Procedure (SOP) 303, was established in 2006 on the heels of a 2005 London train bombing in which the device was activated by cellular signal. SOP 303 codifies the “shutdown and restoration process for use by commercial and private wireless networks during national crises.” Just what constitutes a “national crisis,” and what safeguards exist to prevent abuse, remain largely unknown. The full SOP 303 documentation has not been publicly released.2
State and local law enforcement agencies also have tools to jam wireless internet service.3 However, in 2014, the FCC issued an enforcement advisory clarifying that it is illegal to jam mobile networks without federal authorization.4
- 1The Electronic Privacy Information Center (EPIC) filed suit against the Department of Homeland Security (DHS) in 2013 for information about the protocol. After winning an appeal in the DC Circuit, the DHS retained exemption from disclosing SOP 303, and in July of 2015 released a redacted version of the protocol. Electronic Privacy Information Center, “EPIC v. DHS – SOP 303,” 2018, https://epic.org/foia/dhs/internet-kill-switch/; Electronic Privacy Information Center, “NCC Standard Operating Procedure (SOP) 303”, September 25, 2009, https://epic.org/foia/dhs/internet-kill-switch/25.1-SOP-303-Updated-Rel….
- 2Electronic Privacy Information Center, “EPIC v. DHS – SOP 303,” 2018, https://epic.org/foia/dhs/internet-kill-switch/.
- 3Melissa Bell, “BART San Francisco Cut Cell Services to Avert Protest,” The Washington Post, August 12, 2011, https://www.washingtonpost.com/blogs/blogpost/post/bart-san-francisco-c….
- 4Federal Communications Commission, “WARNING: Jammer Use Is Prohibited”, December 8, 2014, https://www.fcc.gov/document/warning-jammer-use-public-and-local-law-en….
|Are there legal, regulatory, or economic obstacles that restrict the diversity of service providers?||4.004 6.006|
While a variety of broadband service providers operate in the United States, the industry has trended toward consolidation. Many consumers have only one provider in their area, particularly for fixed-line service, and these de facto local monopolies have exacerbated concerns about high cost and accessibility.1 To some extent, the recognized deficiencies of the country’s internet infrastructure can be attributed to insufficient competition.2 Broadband Now identified 22 states with legal, regulatory, or economic barriers to the establishment of municipal broadband networks.3
From 2018 to 2019, the number of subscribers to the nation’s largest fixed-line broadband internet providers grew by about 2.5 million.4 Comcast leads the market with more than 28.5 million subscribers overall, while its primary rival, Charter Communications, reports approximately 26.6 million subscribers. Cox, the next closest competitor, has an estimated 5 million subscribers. In 2016, the FCC approved Charter Communications’ acquisition of Time Warner Cable and Bright House Networks; the transactions were subsequently greenlighted by the California Public Utilities Commission.5
Further consolidation of the telecommunications sector threatens to limit consumer access to information and communication technology (ICT) services and content. In June 2018, mobile service provider AT&T announced that it had acquired media and entertainment company Time Warner, a major content producer that is not affiliated with the broadband provider Time Warner Cable.6 In July 2018, the Justice Department announced that it would appeal the court decision that had allowed the merger to proceed, arguing that there would be harm to consumers.7 In February 2019, the US Court of Appeals for the District of Columbia Circuit upheld the lower court’s decision, and the Justice Department indicated that it was not planning another appeal.8 More than a year after the merger, there have been reports of financial problems at AT&T, with consumers facing price increases.9
The FCC has made some attempts to address concerns about reduced competition and limited consumer access in recent merger approvals. For example, the commission included provisions within the 2016 Charter–Time Warner Cable deal that required Charter Communications to expand broadband availability to close the digital divide, including by establishing new cable lines in poorly served areas of California and providing affordable access to at least 525,000 low-income families.10 Other conditions prohibit the companies from taking steps that would privilege their cable television services over online video competitors, such as the imposition of data caps on online content that would discourage subscribers from streaming video.11 In 2015, regulators had blocked a proposed merger between Time Warner Cable and Comcast, citing concerns about Comcast’s ability to interfere with over-the-top services (such as Netflix) as well as increased market concentration.12
The deployment of “long-term evolution” (LTE) networks, combined with the gradual phase-in of 5G technologies across the country (see A1),13 has accelerated the public’s reliance on mobile providers for internet access. Following a decade of consolidation, three national providers—AT&T, Verizon, and T-Mobile—now dominate the market. Verizon leads the group with approximately 119 million subscribers, followed by T-Mobile with 98.3 million and AT&T with 93 million.14
The FCC approved a merger between Sprint and T-Mobile in May 2019. Subsequently, in July 2019, the Justice Department gave its approval after reaching a settlement requiring Sprint to divest its prepaid mobile services to Dish Network.15 By September 2019, however, 17 state attorneys general had filed a lawsuit to block the merger,16 a move that was consistent with the federal government’s previous position against further consolidation of mobile networks. As far back as 2011, federal regulators had halted a proposed merger between AT&T and T-Mobile. In 2014, regulators signaled again their intent to prevent a rumored merger between the two companies.17
Despite the legal hurdles, T-Mobile and Sprint eventually concluded their $30 billion merger in April 2020.18 Ruling in favor of the acquisition, US District Court judge Victor Marrero concluded that “the merger is not reasonably likely to substantially lessen competition” in the mobile sector.19 In March 2020, 12 states and Washington, DC, ended their opposition to the merger after winning concessions related to new job opportunities, consumer protections, and broadband expansions from the companies.20
To promote affordable access,21 the FCC in 2016 began buying back spectrum that was previously set aside for television broadcasters and auctioning it for use by mobile broadband providers.22 Between December 2019 and March 2020, the FCC completed the large-scale Auction 103 for 5G millimeter-wave spectrum,23 which was instrumental for the rollout of 5G service.
In 2015, then president Barack Obama announced an initiative to encourage the development of community-based broadband services in small and remote municipalities and asked the FCC to remove barriers to local investment.24 The FCC quickly preempted state laws in Tennessee and North Carolina that restricted local broadband services.25 In 2016, a federal court ruled that the FCC did not have the authority to preempt such laws,26 which were also on the books in many other states.
- 1Emmanuel Martinez, “The COVID-19 crisis highlights the costs of a U.S. digital divide,” The Markup, March 26, 2020, https://themarkup.org/ask-the-markup/2020/03/26/how-many-americans-lack….
- 2Emily Stewart, “America’s Monopoly problem, explained by your internet bill,” Vox, February 18, 2020, https://www.vox.com/the-goods/2020/2/18/21126347/antitrust-monopolies-i….
- 3Kendra Chamberlain, “Municipal Broadband is Roadblocked or Outlawed in 22 states,” Broadband Now, May 13, 2020, https://broadbandnow.com/report/municipal-broadband-roadblocks/.
- 4Leichtman Research Group, “2.5 Million Added Broadband from Top Providers in 2019,” March 5, 2020, https://www.leichtmanresearch.com/2-5-million-added-broadband-in-2019/
- 5Meg James, “California regulators approve Charter’s takeover of Time Warner Cable,” Los Angeles Times, May 12, 2016, http://www.latimes.com/entertainment/envelope/cotown/la-et-ct-charter-p….
- 6Edmund Lee and Cecilia Kang, “AT&T Closes Acquisition of Time Warner,” The New York Times, June 14, 2018, https://www.nytimes.com/2018/06/14/business/media/att-time-warner-injun….
- 7Cecilia Kang and Edmund Lee, “AT&T-Time Warner Deal Approval Gets Justice Department Challenge,” The New York Times, July 12, 2018, https://www.nytimes.com/2018/07/12/business/justice-department-plans-ap….
- 8Edmund Lee and Cecelia Kang, “U.S. Loses Appeal Seeking to Block AT&T-Time Warner Merger,” The New York Times, February 26, 2019, https://www.nytimes.com/2019/02/26/business/media/att-time-warner-appea….
- 9Karl Bode, “AT&T tried to buy out the streaming wars—and customers are paying for it,” The Verge, January 30, 2020, https://www.theverge.com/2020/1/30/21115181/att-direct-tv-time-warner-a….
- 10Meg James, “California regulators approve Charter’s takeover of Time Warner Cable,” Los Angeles Times, May 12, 2016, http://www.latimes.com/entertainment/envelope/cotown/la-et-ct-charter-p….
- 11Jon Brodkin, “Comcast and Charter may soon control 70% of 25Mbps Internet subscriptions,” ArsTechnica, January 26, 2016, http://arstechnica.com/business/2016/01/comcast-and-charter-may-soon-co….
- 12Federal Communications Commission, “Statement from FCC Chairman Tom Wheeler on the Comcast-Time Warner Cable Merger,” April 24, 2015, https://transition.fcc.gov/Daily_Releases/Daily_Business/2015/db0424/DO…; U.S. Department of Justice, “Comcast Corporation Abandons Proposed Acquisition of Time Warner Cable After Justice Department and Federal Communications Commission Informed Parties of Concerns,” April 24, 2015, https://www.justice.gov/opa/pr/comcast-corporation-abandons-proposed-ac….
- 13Klint Finley, “The Slow Rollout of Super-Fast 5G,” Wired, December 13, 2019, https://www.wired.com/story/slow-rollout-super-fast-5g/; Chaim Gartenberg, “What is 5G?” The Verge, February 24, 2017, https://www.theverge.com/2017/2/24/14701430/5g-network-explained-mobile….
- 14Scott Mortiz, “T-Mobile Claims No. 2 Mobile Spot, With 98 Million Customers,” Bloomberg, August 6, 2020, https://www.bloomberg.com/news/articles/2020-08-06/t-mobile-claims-no-2….
- 15Brian X. Chen, “T-Mobile and Sprint are Merging. What Does That Mean for You?” The New York Times, July 26, 2019, https://www.nytimes.com/2019/07/26/technology/personaltech/t-mobile-spr….
- 16Corinne Reichert, “Another state joins the fight to block T-Mobile's Sprint merger,” September 3, 2019, https://www.cnet.com/news/another-state-joins-the-fight-to-block-t-mobi…; Merrit Kennedy, “10 State Attorneys General Sue To Block T-Mobile, Sprint Merger,” NPR, June 11, 2019, https://www.npr.org/2019/06/11/731695613/10-state-attorneys-general-sue….
- 17Michael J. De La Merced, “Sprint and Softbank End Their Pursuit of a T-Mobile Merger,” The New York Times, August 5, 2014, https://dealbook.nytimes.com/2014/08/05/sprint-and-softbank-said-to-aba….
- 18Edmund Lee, “T-Mobile Closes Merger With Spring, and a Wireless Giant is Born,” The New York Times, April 1, 2020, https://www.nytimes.com/2020/04/01/business/media/tmobile-closes-sprint….
- 19Klint Flinley, “Judge Rules that T-Mobile Can Acquire Sprint,” Wired, February 2, 2020, https://www.wired.com/story/judge-rules-t-mobile-can-acquire-sprint/.
- 20Diane Bartz, “California, other states end opposition to T-Mobile, Sprint merger,” Reuters, March 11, 2020, https://www.reuters.com/article/us-sprint-m-a-tmobile-california/califo….
- 21Federal Communications Commission, “Connecting America: The National Broadband Plan,” 2012, https://transition.fcc.gov/national-broadband-plan/national-broadband-p….
- 22Colin Lecher, “How the FCC’s massive airways auction will change America—and your phone service,” The Verge, April 21, 2016, http://www.theverge.com/2016/4/21/11481454/fcc-broadcast-incentive-auct….
- 23Alan Weissberger, “Analysis and results of FCC Auction 103 for 5G mmmWave Spectrum, Institute of Electrical and Electronics Engineers Communication Society, December 10, 2019, https://techblog.comsoc.org/2019/12/10/analysis-and-results-of-fcc-auct…; Bevin Fletcher, “FCC wraps up third millimeter wave 5G Spectrum auction, Fierce Wireless, March 6, 2020, https://www.fiercewireless.com/5g/fcc-wraps-up-third-millimeter-wave-5g….
- 24The White House, Office of the Press Secretary, “FACT SHEET: Broadband That Works: Promoting Competition & Local Choice In Next-Generation Connectivity,” January 13, 2015, https://obamawhitehouse.archives.gov/the-press-office/2015/01/13/fact-s….
- 25Federal Communications Commission, “FCC Preempts Laws Restricting Community Broadband in NC/TN,” February 26, 2015, https://www.fcc.gov/document/fcc-preempts-laws-restricting-community-br….
- 26Federal Communications Commission, “Court Opinion - State of TN, et al. v. FCC & USA (6th Cir.)”, August 10, 2016, https://www.fcc.gov/document/court-opinion-state-tn-et-al-v-fcc-usa-6th…; Brian Fung, “Cities looking to compete with large Internet providers just suffered a big defeat,” The Washington Post, August 10, 2016, https://www.washingtonpost.com/news/the-switch/wp/2016/08/10/the-govern….
|Do national regulatory bodies that oversee service providers and digital technology fail to operate in a free, fair, and independent manner?||3.003 4.004|
The FCC is tasked with regulating radio and television broadcasting, interstate communications, and international telecommunications that originate or terminate in the United States. It is formally an independent regulatory body, but critics on both sides of the political spectrum argue that it has become increasingly politicized in recent years.1
The body is led by five commissioners who are nominated by the president and confirmed by the Senate, with no more than three commissioners from one party. President Donald Trump nominated Republican commissioner Ajit Pai to serve as chair in January 2017, and he was duly confirmed in office.2 A Republican majority currently controls the FCC.
Other government agencies, such as the Commerce Department’s National Telecommunications and Information Administration (NTIA), play advisory or executive roles on telecommunications, economic and technology policies, and related regulations.
The FFC under Pai’s leadership has taken a number of steps toward deregulating the telecommunications industry. In March 2017, the commission froze broadband privacy guidelines that were adopted the previous October.3 The rules would have required broadband providers to obtain opt-in consent from consumers before using and sharing information such as a user’s browsing history and application usage data. They would also have given consumers the ability to opt out of the use and sharing of other types of personally identifiable information.4 Using a law that facilitates the dismissal of regulations recently enacted by an outgoing administration, Congress confirmed these moves by repealing the broadband privacy guidelines supported by President Obama.5 In February 2017, the FCC ended its review of zero-rating practices—which provide free internet access to consumers under certain limited conditions—as part of its movement away from the principles of net neutrality.6 Critics argue that the perpetuation of zero-rating services, while modestly expanding internet access, has the potential to harm consumers by stifling market competition and limiting the diversity of online content available to some users.7
In December 2017, the FCC repealed its 2015 Open Internet Order, often referred to as the net neutrality rule, which had reclassified broadband internet access services from “information services” to “telecommunications services.”8 This reclassification gave the FCC greater legal authority to prohibit “unreasonable discrimination,” meaning network operators would not be allowed to give preferential treatment to certain types of online traffic on fixed or mobile networks.
The 2017 decision, known as the Restoring Internet Freedom Order,9 went into effect in June 2018. It effectively allowed ISPs to speed up, slow down, or restrict the traffic of selected websites or services at will. The repeal also weakened the FCC’s previous regulatory authority over broadband ISPs.10 Pai argued for the change as a “light-touch” regulatory model that would promote innovation and serve consumer interests.11 Yet several civil society and public interest groups have argued that it would disadvantage consumers in various ways,12 abandon the FCC’s responsibility to protect freedom of expression online,13 and likely result in a less free and open internet.14 According to opinion polls, a majority of Americans support the idea of net neutrality and its goals.15
Since 2018, numerous state legislatures, attorneys general, and civil society groups have taken up the fight to restore net neutrality (see B6). Twenty-one state attorneys general filed a lawsuit with the US Court of Appeals for the District of Columbia Circuit claiming that the FCC’s decision was “arbitrary and capricious” and violated several aspects of federal law. 16 Civil society groups and nonprofits—including Mozilla,17 Public Knowledge,18 the Open Technology Institute,19 and Free Press20 —filed protective petitions urging the US Courts of Appeals for the First and District of Columbia Circuits to review the FCC’s decision. The proposed Save the Internet Act, which would reinstate the internet regulations that were rolled back under Pai, passed the House of Representatives under Democratic Party leadership in 2019, but it had yet to be taken up by the Republican-controlled Senate as of 2020.21 In October 2019, a federal appeals court upheld the FCC’s repeal of the Open Internet Order,22 though it ruled that the FCC cannot preemptively block states from instituting their own laws intended to safeguard net neutrality.
A number of states, including California,23 Oregon,24 Vermont,25 Washington,26 Colorado,27 Maine,28 and New Jersey,29 have enacted net neutrality laws. Twenty others and the District of Columbia and Puerto Rico introduced net neutrality legislation during 2020.30 A proposed bill surfaced in New York in March 2020, but it was rebuked by the Electronic Frontier Foundation for insufficiently addressing zero-rating policies and related issues.31 The governors of Montana and New York have signed executive orders barring state agencies from conducting business with ISPs that violate net neutrality.32
The importance of internet access in daily life has increased under stay-at-home policies implemented in 2020 to limit the spread of COVID-19 (see A2). Responding to the FCC’s recent call for comments on the repeal of net neutrality rules, a number of groups allied behind the position that “without internet access it is virtually impossible for adults to telework, children to keep up with their classes via e-learning, and for people to try and stay healthy with telehealth.”33 As of May 2020, the FCC had not materially altered its regulatory stance in consideration of the special public needs associated with the pandemic.
- 1Geoffrey Manne et al., “Putting Politics Over Policy at the FCC,” Truth on the Market, October 4, 2018, https://truthonthemarket.com/2018/10/04/putting-politics-over-policy-at…; Brendan Sasso, “The Increasing Politicization of the FCC,” The Atlantic, February 26, 2015, https://www.theatlantic.com/politics/archive/2015/02/the-increasing-pol….
- 2David Shepardson, “Trump taps net neutrality opponent Ajit Pai to head FCC,” Reuters, January 23, 2017, http://www.reuters.com/article/us-usa-trump-fcc-idUSKBN1572RK.
- 3Jim Puzzanghera, “FCC halts Internet privacy rule that imposes data security requirements on broadband providers,” Los Angeles Times, March 1, 2017, http://www.latimes.com/business/la-fi-fcc-privacy-delay-20170301-story….
- 4Federal Communications Commission, “FCC Adopts Privacy Rules to Give Broadband Consumers Increased Choice, Transparency and Security for Their Personal Data,” October 27, 2016, https://apps.fcc.gov/edocs_public/attachmatch/DOC-341937A1.pdf.
- 5Brian Fung, “Republicans voted to roll back landmark FCC privacy rules. Here’s what you need to know,” The Washington Post, March 28, 2017, https://www.washingtonpost.com/news/the-switch/wp/2017/03/28/republican…; Mike Snider, “House set to unplug broadband privacy rules,” USA Today, March 28, 2017, https://www.usatoday.com/story/tech/news/2017/03/28/house-set-unplug-br….
- 6Thomas Gryta, “FCC Ends ‘Zero-Rating’ Review,” The Wall Street Journal, February 3, 2017, https://www.wsj.com/articles/fcc-ends-zero-rating-review-1486157682.
- 7Klint Finley, “The FCC OKs Streaming for Free—But Net Neutrality Will Pay,” Wired, February 3, 2017, https://www.wired.com/2017/02/fcc-oks-streaming-free-net-neutrality-wil…; Elliot Harmon and Gennie Gebhart, “FCC Abandons Zero-Rating Investigation and Moves Backward on Net Neutrality,” Electronic Frontier Foundation, February 9, 2017, https://www.eff.org/deeplinks/2017/02/fcc-abandons-zero-rating-investig….
- 8Stan Adams, “Un-Title II-ed: What Reclassification Means,” Center for Democracy and Technology, May 5, 2017, https://cdt.org/insights/un-title-ii-ed-what-reclassification-means/.
- 9Federal Communications Commission, “FCC Releases Restoring Internet Freedom Order,” January 4, 2018, https://www.fcc.gov/document/fcc-releases-restoring-internet-freedom-or….
- 10Brian Fung, “The FCC just voted to repeal its net neutrality rules, in a sweeping act of deregulation,” The Washington Post, December 14, 2017, https://www.washingtonpost.com/news/the-switch/wp/2017/12/14/the-fcc-is….
- 11Federal Communications Commission, “Statement of Chairman Ajit Pai,” 2015, https://apps.fcc.gov/edocs_public/attachmatch/FCC-17-166A2.pdf.
- 12New America Open Technology Institute, “Ignoring Widespread and Bipartisan Opposition, FCC Votes to Kill Net Neutrality Rules,” December 14, 2017, https://www.newamerica.org/oti/press-releases/ignoring-widespread-and-b….
- 13Shiva Stella, “FCC Abandons Consumer Protection Responsibility With Net Neutrality Repeal,” Public Knowledge, December 14, 2017, https://www.publicknowledge.org/press-release/fcc-abandons-consumer-pro….
- 14Center for Democracy & Technology, “The FCC Moves to Destroy the Open Internet by Overturning Net Neutrality Protections,” November 21, 2017, https://cdt.org/press/the-fcc-moves-to-destroy-the-open-internet-by-ove….
- 15Amir Nasr, “The American People Broadly Support Net Neutrality,” New America Open Technology Institute, October 23, 2017, https://www.newamerica.org/oti/blog/american-people-broadly-support-net…; Brian Fung, “This poll gave Americans a detailed case for and against the FCC’s net neutrality plan. The reaction among Republicans was striking,” December 12, 2017, https://www.washingtonpost.com/news/the-switch/wp/2017/12/12/this-poll-…; Program for Public Consultation, “New Neutrality Survey Questionnaire,” December 6-8, 2017, http://www.publicconsultation.org/wp-content/uploads/2017/12/Net_Neutra…; Kevin Breuninger, “Net neutrality loses support after FCC proposal to scrap Obama-era rules: Poll,” CNBC, November 29, 2017, https://www.cnbc.com/2017/11/28/net-neutrality-loses-support-poll-from-…; Emily Birnbaum, “4 in 5 Americans say they support net neutrality: poll,” The Hill, March 20, 2019, https://thehill.com/policy/technology/435009-4-in-5-americans-say-they-….
- 16US Court of Appeals for the District of Columbia Circuit, “New York, California, Connecticut, Delaware, Hawaii, Illinois, Iowa, Kentucky, Maine, Maryland, Massachusetts, Minnesota, Mississippi, New Mexico, North Carolina, Oregon, Pennsylvania, Rhode Island, Vermont, Virginia, Washington and the District of Columbia v. FCC and United States of America,” January 16, 2018, https://ag.ny.gov/sites/default/files/petition_-_filed.pdf.
- 17US Court of Appeals for the District of Columbia Circuit, “Mozilla Corporation v. FCC and United States of America,” January 16, 2018, https://blog.mozilla.org/wp-content/uploads/2018/01/AS-FILED-Mozilla-Pr….
- 18Shiva Stella, “Public Knowledge Files Protective Petition in D.C. Circuit Regarding Net Neutrality Rollback,” Public Knowledge, January 16, 2018, https://www.publicknowledge.org/press-release/public-knowledge-files-pr….
- 19New America Open Technology Institute, “OTI Challenges FCC Chairman Pai’s Net Neutrality Repeal by Filing Protective Petition for Review in D.C. Circuit,” January 16, 2018, https://www.newamerica.org/oti/press-releases/oti-challenges-fcc-chairm….
- 20US Court of Appeals for the First Circuit, “Free Press v. FCC and United States of America,” https://www.freepress.net/sites/default/files/legacy-policy/free_press_….
- 21John Eggerton, “House Votes to Re-Regulate Internet Access,” Miultichannel News, April 10, 2019, https://web.archive.org/web/20200731203250/https://www.multichannel.com…; 116th Congress, “H.R.1644 - Save the Internet Act of 2019,” March 8, 2019, https://www.congress.gov/bill/116th-congress/house-bill/1644.
- 22US Court of Appeals for the District of Columbia Circuit, “Mozilla Corporation v. FCC and United States of America,” February 1, 2019, https://www.cadc.uscourts.gov/internet/opinions.nsf/FA43C305E2B9A354852….
- 23Heather Kelly, “California just passed its net neutrality law. The DOJ is already suing,” CNN Business, October 1, 2018, https://www.cnn.com/2018/10/01/tech/california-net-neutrality-law/index…; Hallie Detrick, “The Justice Department Had Sued California Over Its New Net Neutrality Law. Why the Lawsuit is Suddenly on Hold,” Fortune, October 29, 2018, https://fortune.com/2018/10/29/doj-california-net-neutrality-lawsuit/; Suhauna Hussain, “Upholding FCC’s repeal of net neutrality rules, court opens door for California to enforce its own,” Los Angeles Times, October 3, 2019, https://www.latimes.com/business/story/2019-10-03/fcc-net-neutrality-ru…; Tom Wheeler, “California Will Have an Open Internet,” The New York Times, October 2, 2019, https://www.nytimes.com/2019/10/02/opinion/net-neutrality-fcc-wheeler.h….
- 24Avery Anapol, “Oregon passes net neutrality law,” The Hill, April 10, 2018, https://thehill.com/policy/technology/382412-oregon-passes-net-neutrali….
- 25Xander Landen, “Vermont holds fire on net neutrality law, despite legal win for states,” VTD, October 4, 2019, https://vtdigger.org/2019/10/04/vermont-holds-fire-on-net-neutrality-la….
- 26Cecilia Kang, “Washington Governor Signs First State Net Neutrality Bill,” The New York Times, March 5, 2018, https://www.nytimes.com/2018/03/05/business/net-neutrality-washington-s….
- 27Joel Williams, “Colorado becomes the fifth state to enact net neutrality legislation,” Ballotpedia, May 21, 2019, https://news.ballotpedia.org/2019/05/21/colorado-becomes-the-fifth-stat….
- 28The State of Maine, “Governor Mills Signs Law to Support Net Neutrality and Protect Internet Users,” June 25, 2019, https://www.maine.gov/governor/mills/news/governor-mills-signs-law-supp….
- 29Harper Neidig, “New Jersey governor signs net neutrality order,” The Hill, February 5, 2018, https://thehill.com/policy/technology/372409-new-jersey-governor-signs-….
- 30Heather Morton, “Net Neutrality 2020 Legislation,” National Conference of State Legislatures, March 27, 2020, https://www.ncsl.org/research/telecommunications-and-information-techno….
- 31Ernesto Falcon, “New York State Legislator Introduces a Very Bad ‘Net Neutrality ‘ Bill,” Electronic Frontier Foundation, March 12, 2020, https://www.eff.org/deeplinks/2020/03/new-york-state-legislator-introdu….
- 32Klint Finley, “States and Cities Keep the Battle for Net Neutrality Alive,” Wired, January 23, 2018, https://www.wired.com/story/states-and-cities-keep-the-battle-for-net-n….
- 33As quoted in Wendy David, “COVID-19 Crisis Shows Need for Net Neutrality Rules, Advocates Say,” MediaPost, April 20, 2020, https://www.mediapost.com/publications/article/350285/covid-19-crisis-s….
The government places few restrictions on internet content and communication. However, some federal lawmakers and the Trump administration have proposed reforms to long-standing laws related to free expression online. Disinformation, from sources including foreign powers and US political leaders, continues to undermine the quality of the online environment, a problem that becomes especially acute during contentious political events like elections and protests.
|Does the state block or filter, or compel service providers to block or filter, internet content?||6.006 6.006|
In general, the government does not force ISPs or content hosts to block or filter online material that would be considered protected speech under international human rights law. This includes political speech.
|Do state or nonstate actors employ legal, administrative, or other means to force publishers, content hosts, or digital platforms to delete content?||3.003 4.004|
The government does not directly censor any particular political or social viewpoints online, although legal rules do restrict certain types of content. Intermediaries can face copyright liability if they do not honor notice-and-takedown provisions of the Digital Millennium Copyright Act (DMCA). They can also face federal criminal liability for failing to remove content such as child sexual abuse imagery once they become aware of it. Proposals to reform Section 230 of the Communications Act, as amended by the Telecommunications Act of 1996 (commonly known as Section 230 of the Communications Decency Act)—a long-standing rule meant to protect freedom of speech online—drew intense scrutiny during the coverage period (see B3).
In an unprecedented development, the government moved to ban the US operations of two popular Chinese-owned social media apps (see B3). In November 2019, citing national security concerns, the Treasury Department’s Committee on Foreign Investment launched an investigation into TikTok, a short-video platform owned by the Chinese company ByteDance.1 In August 2020, after the coverage period, the Trump administration issued two executive orders that prohibited people, companies, or any other actor within the United States from engaging in any transaction with ByteDance or another Chinese company, Tencent, in connection with its WeChat app, unless the platforms were no longer owned by a Chinese firm.2 The Commerce Department announced that the two apps would be removed from app stores in the United States in late September 2020,3 although federal courts issued preliminary injunctions to pause enforcement of the orders, citing serious implications for freedom of speech.4 Also in September, the government and the companies involved discussed one proposed solution that would give the US-based firms Oracle and Walmart a 20 percent stake in a new entity called TikTok Global.5
Broadly speaking, content hosts and social media platforms are the primary decision-makers when it comes to the provision, retention, or moderation of online content, so long as the content is not prohibited under existing legal guidelines. Companies have successfully argued that moderation decisions are an exercise of their own constitutionally protected right to set platform policies, allowing them to remove content and accounts that violate their rules and terms of service. During the coverage period, the deluge of disinformation and incendiary content related to COVID-19, nationwide protests, the upcoming 2020 general elections, and other high-profile political events prompted more civil society groups, political actors, and ordinary members of the public to demand that social media companies label or remove the harmful material.6
There were several instances in which social media platforms identified posts by President Trump and his administration as having violated company policies.7 In May 2020, Twitter added an informational label to a post by the president that contained baseless claims about mail-in ballots and voter fraud (see B3). The company explained that the post violated its rules on civic integrity.8 Also in May, Twitter flagged a post from President Trump’s account for “glorifying violence” in response to nationwide protests against racial injustice that were prompted by the widely publicized police killing of Minneapolis resident George Floyd; the company did not remove the post, finding that it may be in the public’s interest to keep it accessible (see C7).9 Separately, in August 2020, after the coverage period, both Facebook and Twitter removed a post shared by the president for violating their rules on spreading COVID-19 misinformation.10
In some cases, providers of internet infrastructure enforce their own discretionary speech policies. Despite having no legal obligation to do so, the chief executive of the internet infrastructure provider Cloudflare decided in August 2019 to drop services for 8chan, an online forum that was notorious for hosting manifestos written by the perpetrators of mass shootings.11 As the company noted in a formal securities filing, such choices may be driven by pressure from customers or risk of adverse commercial consequences, making provision of services to such customers an economic risk factor for the company and its investors.12
Politicians and government officials have at times appealed to social media companies to remove, restore, or flag specific content. In September 2019, a group of senators criticized Facebook for a fact-checking review in which three doctors flagged an antiabortion group’s videos claiming that abortion is never medically necessary to save a woman’s life.13 Facebook removed the review after the senators accused the platform of bias against conservative viewpoints. In October 2019, Facebook denied a request from Democratic Party presidential candidate Joseph Biden’s campaign to remove a Trump campaign ad promoting unsubstantiated claims of corruption in US policy on Ukraine when Biden was vice president.14 After the coverage period in June 2020, acting homeland security secretary Chad Wolf called on Facebook, Google, Apple, Twitter, and Snap to more aggressively remove content for promoting, or intending to organize, violence or looting in connection with recent protests.15
Although there is no evidence that direct government pressure on users to remove online content is systematic or widespread, at least one user experienced such pressure during the coverage period. In March 2020, a police officer in Wisconsin threatened to charge a teenager and her family with disorderly conduct and take them to jail unless she deleted Instagram posts about her COVID-19 infection.16
People in the United States have occasionally had their content restricted based on requests from foreign governments. In one prominent case, the New York Times reported that the video-conferencing platform Zoom, acting on a request from the Chinese government, temporarily suspended the account of a US-based Chinese activist who planned to host a meeting to memorialize the 1989 crackdown on prodemocracy protests in Beijing’s Tiananmen Square.17 Chinese social media platforms used by US residents have also come under scrutiny for content moderation decisions or their use of automated filtering.18 The Toronto-based group Citizen Lab found that moderators censored content containing over 2,000 keywords related to the COVID-19 pandemic on the communication platform WeChat and live-streaming platform YY, including criticism of the Chinese Communist Party and more generalized health information19
In the absence of comprehensive regulatory mandates, tech companies have their own strategies for identifying and removing terrorist content. The Global Internet Forum to Counter Terrorism (GIFCT) is a cross-company “hash-sharing database” initially organized by Facebook, Microsoft, Twitter, and YouTube and now used by at least 13 companies to automatically flag over 200,000 images and videos.20 Content is included in the database for violating platforms’ own policies, not laws. A civil society letter criticizing GIFCT noted examples of apparent filtering errors such as YouTube’s deletion of over 100,000 videos stored by the Syrian Archive, a civil society organization dedicated to preserving evidence of human rights abuses in Syria. The letter noted that “almost nothing is publicly known about the specific content that platforms block using the Database, or about companies’ internal processes or error rates.”21 In response to critiques that the initiative was marked by secrecy and a lack of strong public involvement, among other concerns, GIFCT formally announced that it would become an independent organization at the end of 2019.22 That process was itself criticized by civil society groups as opaque and insufficiently protective of free expression and other human rights.23
In 2019, citing free speech concerns,24 the Trump administration announced that the United States would not sign on to the Christchurch Call, an agreement between social media companies and numerous national governments to combat terrorist content online. The pledge had been organized after a gunman live-streamed his attacks on mosques in Christchurch, New Zealand,25 and signatories included Amazon, Google, Facebook, Microsoft, and Twitter.26
Section 230 of the Communications Decency Act shields providers and content hosts from legal liability for most material created by users, including lawsuits alleging defamation or injurious falsehoods.27 However, there are exceptions to this immunity, including under federal criminal law, intellectual property law, laws to combat sex trafficking, and electronic communications privacy laws. Section 230 also ensures legal immunity for social media companies and other content providers that act in good faith to remove content when it violates their terms and conditions or their community guidelines.28 This policy design was considered instrumental in advancing the goals of economic growth, innovation, and freedom of expression during the early internet era.29 Many concerns regarding excessive or insufficient moderation of content on internet platforms center on the issue of how companies enforce their own rules (see B3).
The Allow States and Victims to Fight Online Sex Trafficking Act, also referred to as SESTA/FOSTA, was signed in April 2018. The law established new liability for internet services when they are used to promote or facilitate the prostitution of another person.30 While the laudable goal of the law is to aid the victims of sex trafficking, plaintiffs including advocates for sex workers’ rights and the Internet Archive have challenged the law as a violation of the constitution’s First Amendment speech protections. In 2019, a court of appeals permitted the case to go forward.31 After the bill passed in the Senate, but before it became law, reports surfaced of companies preemptively censoring content: Craigslist announced that it was removing the “personals” section from its website altogether.32 Civil society activists criticized the law for motivating companies to engage in excessive censorship in order to avoid legal action.33 Sex workers and their advocates also argued that the law threatened their safety, since the affected platforms had made it possible for sex workers to leave exploitive situations and operate independently, communicate with one another, and build protective communities.34 In December 2019, members of Congress introduced the SAFE SEX Workers Study Act, which, if passed, would evaluate the impact of SESTA/FOSTA on the health and safety of sex workers in the country.35
Section 512 of the DMCA, enacted in 1998, created new immunity from copyright claims for online service providers. However, the law’s notice-and-takedown requirements have been criticized for impinging on speech rights,36 as they incentivize platforms to remove potentially unlawful content without meaningful judicial oversight. Early research on the DMCA found that notice-and-takedown procedures were sometimes used “to stifle criticism, commentary, and fair use.”37 In other instances, overly broad or fraudulent DMCA claims resulted in the removal of content that would otherwise be excused under provisions for free expression, fair use, or education.38 DMCA complaints have also been exploited to take down political campaign advertisements, since their immediate removal means they will be unavailable during the electoral period, and the claims are unlikely to be challenged in court after the campaign ends.39 In May 2020, one major news outlet reported hundreds of fraudulent DMCA claims by people or companies—often using pseudonyms—to force the removal of links to content containing unfavorable news coverage about them.40 Despite such reports, in 2020 a long-awaited study by the US Copyright Office largely dismissed concerns about the law’s impact on online speech.41 Upon release, the research was criticized by some members of the legal and advocacy communities.42
- 1Richard Altieri and Benjamin Della Rocca, “U.S. Launches National Security Probe Into Chinese-Owned App TikTok,” Lawfare, November 8, 2019, https://www.lawfareblog.com/us-launches-national-security-probe-chinese….
- 2The White House, “Executive Order on Addressing the Threat Posed by TikTok,” August 6, 2020, https://www.whitehouse.gov/presidential-actions/executive-order-address…; The White House, “Executive Order on Addressing the Threat Posed by WeChat,” August 6, 2020, https://www.whitehouse.gov/presidential-actions/executive-order-address….
- 3US Department of Commerce, “Commerce Department Prohibits WeChat and TikTok Transactions to Protect the National Security of the United States,” September 18, 2020, https://www.commerce.gov/news/press-releases/2020/09/commerce-departmen….
- 4Jeanne Whalen, “Federal court issues preliminary injunction halting administration’s ban of Chinese app WeChat,” The Washington Post, September 21, 2020, https://www.washingtonpost.com/technology/2020/09/20/wechat-ban-blocked…; Arjun Kharpal, “Judge Blocks Trump Administration’s Ban on New TikTok Downloads from U.S. App Stores,” CNBC, September, 27, 2020, https://www.cnbc.com/2020/09/28/tiktok-ban-judge-blocks-order-banning-d….
- 5Katy Stech Ferek, “TikTok Asks Judge to Halt Trump Administration’s Download Ban,” The Wall Street Journal, September 23, 2020, https://www.wsj.com/articles/tiktok-asks-judge-to-halt-trump-administra….
- 6Stop Hate for Profit, “Home Page,” 2020, https://www.stophateforprofit.org/; Ryan Mac, “A Kenosha Militia Facebook Event Asking Attendees To Bring Weapons Was Reported 455 Times. Moderators Said It Didn’t Violate Any Rules,” BuzzFeed News, August 28, 2020, https://www.buzzfeednews.com/article/ryanmac/kenosha-militia-facebook-r….
- 7“Twitter labels edited Biden video 'manipulated tweet,” BBC News, March 10, 2020. https://www.bbc.com/news/world-us-canada-51799366.
- 8Will Oremus, “Inside Twitter’s Decision to Fact-Check Trump’s Tweets,” Medium OneZero, May 28, 2020, https://onezero.medium.com/inside-twitters-decision-to-fact-check-a-tru….
- 9Jon Porter, “Twitter Restricts New Trump Tweet for ‘Glorifying Violence,’” The Verge, May 29, 2020, https://www.theverge.com/2020/5/29/21274323/trump-twitter-glorifying-vi….
- 10Shannon Bond, “Twitter, Facebook Remove Trump Post Over False Claim about Children and COVID-19,” NPR, August 5, 2020, https://www.npr.org/2020/08/05/899558311/facebook-removes-trump-post-ov….
- 11Lily May Newman, “Cloudflare Ditches 8chan. What Happens Now?,” Wired, August 5, 2019, https://www.wired.com/story/cloudflare-8chan-support-ddos/.
- 12Zack Whittaker, “Cloudflare says cutting off customers like 8chan is an IPO ‘risk factor,’” TechCrunch, August 15, 2019, https://techcrunch.com/2019/08/15/cloudflare-8chan-risk-factor/.
- 13Claudia Koerner, “Facebook Took Down A Fact-Check Of An Anti-Abortion Video After Republicans Complained,” BuzzFeed News, September 11, 2019, https://www.buzzfeednews.com/article/claudiakoerner/facebook-fact-check….
- 14Sarah Mucha, “Facebook Denies Biden Campaign’s Request to Remove False Ukraine Ad by Trump Campaign,” CNN, October 9, 2019, https://www.cnn.com/2019/10/08/politics/facebook-biden-ad-request-trump….
- 15David Ingram and Julia Ainsley, “Trump Administration asks Tech Companies to Limit Posts Promoting Violence,” NBC News, June 26, 2020, https://www.nbcnews.com/tech/tech-news/trump-administration-asks-tech-c….
- 16Scott Shackford, “A Teenager Posted About Her COVID-19 Infection on Instagram. A Deputy Threatened To Arrest Her If She Didn't Delete It.” Reason, April 17, 2020, https://reason.com/2020/04/17/a-teenager-posted-about-her-covid-19-infe…; Scott Bauer, “Teenager allegedly threatened with jail over COVID-19 posts,” Associated Press, April 3, 2020, https://apnews.com/41c3a3d1fe3c00175bea2c0de771da7a.
- 17Paul Mozur, “Zoom Blocks Activist in U.S. After China Objects to Tiananmen Vigil,” The New York Times, June 17, 2020, https://www.nytimes.com/2020/06/11/technology/zoom-china-tiananmen-squa….
- 18Lily Kuo, “TikTok ‘makeup tutorial’ goes viral with call to action on China’s treatment of Uighurs,” The Guardian, November 26, 2019, https://www.theguardian.com/technology/2019/nov/27/tiktok-makeup-tutori…
- 19Masashi Crete-Nishihata, Jakub Dalek, Jeffrey Knockel, Nicola Lawford, Caroline Wesley, and Mari Zhou, “Censored Contagion II: A Timeline of Information Control on Chinese Social Media During Covid-19,” Citizen Lab, August 25, 2020, https://citizenlab.ca/2020/08/censored-contagion-ii-a-timeline-of-infor…
- 20Global Internet Forum to Counter Terrorism, “Global Internet Forum to Counter Terrorism: Evolving and Institution,” 2019, https://www.gifct.org/about/.
- 21“Civil Society Letter to European Parliament on Terrorism Database,” February 8, 2019, https://cdt.org/wp-content/uploads/2019/02/Civil-Society-Letter-to-Euro….
- 22Global Internet Forum to Counter Terrorism, “Progress for the Independent GIFCT,” December 11, 2019, https://gifct.org/press/progress-independent-gifct/; Spandana Singh, “Everything in Moderation: Any Analysis of How Internet Platforms Are Using Artificial Intelligence to Moderate User-Generated Content,” New America Open Technology Institute, July 15, 2019, https://www.newamerica.org/oti/reports/everything-moderation-analysis-h…; Andrew Sullivan, “Looking the GIFCT in the Mouth,” Internet Society, October 11, 2019, https://web.archive.org/web/20200904030251/https://www.internetsociety….
- 23Courtney Radsch, “GIFCT: Possibly the Most Important Acronym You’ve Never Heard Of,” Just Security, September 30, 2020, https://www.justsecurity.org/72603/gifct-possibly-the-most-important-ac…
- 24Tony Romm and Drew Harwell, “White House declines to back Christchurch call to stamp out online extremism amid free speech concerns,” The Washington Post, March 15, 2019, https://www.washingtonpost.com/technology/2019/05/15/white-house-will-n….
- 25Democracy Now, “U.S. Won’t Join ‘Christchurch Call’ Against Online Extremism,” May 16, 2019, https://www.democracynow.org/2019/5/16/headlines/us_wont_join_christchu…; Christchurch Call, “Supporters,” September 23, 2019, https://www.christchurchcall.com/supporters.html.
- 26Facebook Newsroom, “A Statement to Mark the One-Year Anniversary of the Christchurch Call to Action,” May 14, 2020, https://twitter.com/fbnewsroom/status/1261054105654444032.
- 27Cornell Law School Legal Information Institute, “47 U.S. Code § 230.Protection for private blocking and screening of offensive material,” https://www.law.cornell.edu/uscode/text/47/230; Electronic Frontier Foundation, “Section 230 of the Communications Decency Act,” https://www.eff.org/issues/cda230.
- 28Justin Fenton, “Korryn Gaines case: Video posting by suspects poses new challenges for police,” The Baltimore Sun, August 4, 2016, http://www.baltimoresun.com/news/maryland/crime/bs-md-ci-facebook-polic….
- 29Daphne Keller, Internet Platforms: Observations on Speech, Danger, and Money, Hoover Institute, 2018, https://www.hoover.org/sites/default/files/research/docs/keller_webread….
- 30115th Congress, “H.R.1865 - Allow States and Victims to Fight Online Sex Trafficking Act of 2017,” Became Public Law No: 115-164, April 11, 2018, https://www.congress.gov/bill/115th-congress/house-bill/1865.
- 31United States Court of Appeals, District of Columbia Circuit, “United States of America and William P. Barr, in His Official Capacity as Attorney General of the United States, Appellees.,” January 24, 2020, https://scholar.google.com/scholar_case?case=4681485983160883635&hl=en&….
- 32Craigslist, “FOSTA,” https://www.craigslist.org/about/FOSTA.
- 33Elliot Harmon, “How Congress Censored the Internet,” Electronic Frontier Foundation, March 21, 2018, https://www.eff.org/deeplinks/2018/03/how-congress-censored-internet.
- 34Samantha Cole, “’Sex Trafficking’ Bill Will Take Away Online Spaces Sex Workers Need to Survive,” Vice, March 12, 2018, https://motherboard.vice.com/en_us/article/neqxaw/sex-trafficking-bill-…; Survivors Against SESTA, “The Impact of SESTA/FOSTA: For Workers,” https://survivorsagainstsesta.org/the-impact-of-sesta-fosta/; See, e.g., Eric Goldman, “The Complicated Story of FOSTA and Section 230,” First Amendment Law Review, 2019.; Danielle Blunt and Ariel Wolf, “Erased: The Impact of FOSTA-SESTA & the Removal of Backpage,” Hacking Hustling, 2020, https://hackinghustling.org/erased-the-impact-of-fosta-sesta-2020/
- 35Mike Masnick, “New Bill Introduced to Study Impact of SESTA/FOSTA on Sex Workers,” Tech Dirt, December 19, 2019, https://www.techdirt.com/articles/20191218/16250443596/new-bill-introdu….
- 36For a more detailed accounting of studies that document issues related to “Notice and Takedown” regimes see, Daphne Keller, “Empirical Evidence of ‘Over-Removal’ By Internet Companies Under Intermediary Liability Laws,” Stanford Law School, The Center for Internet and Society, May 8, 2020, http://cyberlaw.stanford.edu/blog/2015/10/empirical-evidence-over-remov….
- 37Jennifer M. Urban and Laura Quilter, “Efficient Process or Chilling Effects - Takedown Notices under Section 512 of the Digital Millennium Copyright Act,” Santa Clara High Technology Law Journal, 2006, https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=1413&con….
- 38Electronic Frontier Foundation, “Lenz v. Universal,” https://www.eff.org/cases/lenz-v-universal.
- 39Elliot Harmon, “Once Again, DMCA Abused to Target Political Ads,” Electronic Frontier Foundation, November 17, 2015, https://www.eff.org/deeplinks/2015/11/once-again-dmca-abused-target-pol….
- 40Andrea Fuller, Kirsten Grind, and Joe Palazzolo, Google Hides News, Tricked by Fake Claim, The Wall Street Journal, May 15, 2020, https://www.wsj.com/articles/google-dmca-copyright-claims-takedown-onli….
- 41United States Copyright Office, “Section 512 of Title 17: A Report of the Register of Copyrights,” May 2020, https://www.copyright.gov/policy/section512/section-512-full-report.pdf.
- 42Pamela Samuelson, “The US Copyright Office Section 512 Study: Why the Entertainment Industry is Claiming Victory,” Kluwer Copyright Blog, May 25, 2020, http://copyrightblog.kluweriplaw.com/2020/05/25/the-us-copyright-office…; Corynne McSherry and Katharine Trendacosta, “Internet Users of All Kinds Should be Concerned by a New Copyright Office Report,” Electronic Frontier Foundation, June 1, 2020, https://www.eff.org/deeplinks/2020/06/internet-users-all-kinds-should-b….
|Do restrictions on the internet and digital content lack transparency, proportionality to the stated aims, or an independent appeals process?||4.004 4.004|
The government does not place onerous restrictions on online content, and domestic laws do not allow for broad government blocking of websites or removal of content. However, companies that host user-generated content, many of which are headquartered in the United States, have faced criticism in recent years for a lack of transparency and consistency when it comes to enforcing their own rules on content moderation.
Section 230 of the Communications Decency Act, as commonly referred, generally shields online sites and services from legal liability for the activities of their users, allowing user-generated content to flourish on a variety of platforms (see B2).1 Despite robust legal and cultural support for freedom of speech within the United States, the scope of Section 230 has recently come under criticism. Concerns about child sexual abuse imagery, protection of minors from harmful or indecent content, defamation, cyberbullying and cyberstalking, illegal gambling, financial crime, and terrorist content all contribute to the desire for reform of platforms’ legal immunity for user-generated content; in some cases, concerns have been driven by a misperception that platforms have no legal obligations to remove content, even for federally criminalized content like child sexual abuse material. At the same time, worries about viewpoint discrimination by the platforms have driven demands to limit their discretion to define and enforce content moderation rules.
SESTA/FOSTA of 2018 has been the only recent legislative change affecting Section 230 (see B2). However, during the coverage period, new efforts to overhaul Section 230 were initiated by the Trump administration. In February 2020, the Department of Justice hosted a workshop to examine whether and how Section 230 should be updated.2 In May, President Trump signed an executive order titled “Preventing Online Censorship” that aimed to limit protections against intermediary liability. Among other things, it directed the NTIA to petition the FCC to clarify regulatory rules pertaining to Section 230.3 A broad coalition of civil society members, academics, and tech companies criticized the order as harmful to online speech,4 and some also argued that it had little legal standing and served mainly a performative function.5 The administration has been sued by at least one civil society group in response to the order.6
The Preventing Online Censorship order was issued after Twitter fact-checked the president’s baseless claims about mail-in voting (see B2). Moreover, the order’s text cites Twitter’s alleged “political bias,” alluding to accusations from certain conservatives that social media platforms deliberately censor politically conservative views, despite scant evidence of any such practice.7 In August 2019, Facebook released an inconclusive report on political bias after commissioning an audit into the issue conducted by a former Republican senator in collaboration with a private law firm.8 Also that summer, the White House held a “social media summit” to promote discussion of anticonservative bias claims, with attendees ranging from mainstream conservative figures to online personalities who have peddled far-right conspiracy theories.9 In May 2020, the Wall Street Journal reported that President Trump was discussing the creation of a panel to investigate complaints of bias against conservatives on social media.10
Beyond the May 2020 executive order, more than 10 different proposals related to Section 230 reform were brought forward over the past year.11 In March 2020, lawmakers introduced the draft Eliminating Abusive and Rampant Neglect of Interactive Technologies (EARN IT) Act. The bill, as of September 2020, would abrogate Section 230 immunities for platforms that host or facilitate child sexual abuse images in a “reckless” or “negligent” way, allowing states to impose criminal or civil liability.12 Civil society groups, legal experts, and technologists have raised concerns about the bill’s impact on encryption (see C4),13 free speech, and privacy, arguing that its provisions allow companies to be held liable for content even if they do not know it is present on their platforms, may ultimately lead to suppression of evidence in prosecutions of the accused, and would not effectively tackle the spread of child sexual abuse images online.14
An earlier proposal, the Ending Support for Internet Censorship Act, introduced in June 2019, would dismantle the liability shields for major online platforms “unless they submit to an external audit that proves by clear and convincing evidence that their algorithms and content-removal practices are politically neutral.”15 It would compel social media services to undergo certification by the Federal Trade Commission (FTC) to keep Section 230 immunities.16 Civil society organizations and tech companies have criticized the proposal for, among other reasons, undermining free speech protections and imposing broad, “unmeasurable,” and “artificial” standards on companies’ content moderation practices.17
Other bills on Section 230 that were proposed after the coverage period include the Platform Accountability and Consumer Transparency (PACT) Act,18 the Stopping Big Tech’s Censorship Act,19 and the Behavioral Advertising Decisions Are Downgrading Services (BAD ADS) Act.20 In September 2020, the Justice Department announced that it had submitted separate legislation to Congress to reform the law.21
The August 2020 executive orders that would effectively ban TikTok and WeChat quickly came under legal scrutiny (see B2). In September, federal courts issued preliminary injunctions against the compelled removal of the apps from app stores, citing serious questions about the First Amendment.22 A coalition of civil society groups and experts have also argued that the bans were a disproportionate response that did not effectively tackle the genuine issues of data privacy and security, and amounted to a detriment to free speech and internet freedom.23 Supporters of the executive orders argued that they would help counter surveillance and other rights abuses by the Chinese government.24
The Children’s Internet Protection Act (CIPA) of 2000 requires public libraries that receive certain federal government subsidies to install filtering software that prevents users from accessing child sexual abuse images or other visual materials deemed obscene or harmful to minors. Libraries that do not receive the specified subsidies are not obliged to comply with CIPA. The Supreme Court’s interpretation of the statute permits adult users to request that the filtering be removed without having to provide a justification. However, not all libraries allow this option, arguing that decisions about filtering should be left to the discretion of individual libraries.25
Facebook, Twitter, and YouTube have all faced criticism for a lack of transparency regarding the enforcement of their respective community standards or terms of service, and for the effects of this enforcement on marginalized populations.26 Some observers have alleged that rules against hate speech, for example, lead to the removal of comparatively mild content posted by people of color, while other speech that appears more inflammatory remains accessible.27 The final report from an independent civil rights audit of Facebook, released in July 2020 after two years of work, raised similar concerns over hate speech, algorithmic bias, and content moderation policies.28 Separately, in August 2019, a group of LGBT+ content creators filed a lawsuit against YouTube on First Amendment and civil rights grounds. The complaint alleged that the company unevenly regulates and suppresses LGBT+ content, disproportionately filtering, demonetizing, and restricting access to such videos.29 Black activists also reported that their content was temporarily removed or inaccessible amid nationwide protests in 2020 (see B8).30
A number of platforms, including Facebook,31 Twitter,32 and YouTube,33 report data about the volume of content removed for violating community standards or terms of service. In 2020, amid increased attention on content removals and aggressive content moderation during the COVID-19 pandemic,34 many social media companies have improved transparency with regularly updated policy statements, including acknowledging increased reliance on automated tools rather than human judgment in takedown decisions.35 In addition, platforms are collaborating with industry and governmental partners to elevate the visibility of trusted sources for public health information.36
Facebook recently adopted a new mechanism for platform self-governance, although its effectiveness remains to be seen. A structurally independent Oversight Board will review and make recommendations regarding the company’s content decisions and platform policies.37 The board’s charter, which was released in September 2019, details its structure and operations.38 There are provisions for management via a separate trust, selection of an internationally inclusive membership panel, and the establishment of a quasi-judicial process for hearings, collaborative deliberation, and public judgments.39 The Facebook Oversight Board has a narrow mandate to adjudicate a small body of appeals, made by users who wish to have takedowns reviewed, and to assess whether Facebook accurately applied its existing policies. However, the board will not, for now, have power to change Facebook’s policies or review cases in which Facebook declined to remove content, nor will it evaluate content removals that Facebook determines to be required by law.40
- 1Cornell Law School Legal Information Institute, “47 U.S. Code § 230.Protection for private blocking and screening of offensive material,” https://www.law.cornell.edu/uscode/text/47/230; Electronic Frontier Foundation, “Section 230 of the Communications Decency Act,” https://www.eff.org/issues/cda230.
- 2Adi Robertson, “Five Lessons from the Justice Department’s Big Debate Over Section 230,” The Verge, February 19, 2020, https://www.theverge.com/2020/2/19/21144223/justice-department-section-….
- 3The White House, “Executive Order on Preventing Online Censorship, May 28, 2020, https://trumpwhitehouse.archives.gov/presidential-actions/executive-ord….
- 4Bobby Allyn, “Stung by Twitter, Trump Signs Executive Order to Weaken Social Media Companies,” NPR, May 28, 2020, https://www.npr.org/2020/05/28/863932758/stung-by-twitter-trump-signs-e….
- 5David Greene and Corynne McSherry, “Dangers of Trump’s Executive Order Explained,” Electronic Frontier Foundation, May 31, 2020, https://www.eff.org/deeplinks/2020/05/dangers-trumps-executive-order-ex….; Daphne Keller, https://docs.google.com/document/d/1j_ZU9OUkvA5teWSC2_iQx61eB1rzbTjN55A…
- 6Tony Romm, “Tech Group Files First Lawsuit Against Trump Over Executive Order Targeting Social Media, The Washington Post, June 2, 2020, https://www.washingtonpost.com/technology/2020/06/02/lawsuit-trump-exec….
- 7Siva Vaidhyanathan, “Why Conservatives Allege Big Tech Is Muzzling Them,” The Atlantic, July 28, 2019, https://www.theatlantic.com/ideas/archive/2019/07/conservatives-pretend…; Mathew Ingram, “Republicans still convinced Facebook and Twitter are biased against them,” Columbia Journalism Review, July 18, 2018, https://www.cjr.org/the_media_today/tech-biased-against-conservatives.p…; Nitasha Tiku, “Leaked Audio Reveals Google’s Efforts to Woo Conservatives,” Wired, December 10, 2018, https://www.wired.com/story/leaked-audio-reveals-googles-efforts-woo-co…; Nicholas Thompson and Fred Vogelstein, “Inside the Two Years That Shook Facebook—and the World,” Wired, February 12, 2018, https://web.archive.org/web/20191203073105/https://www.wired.com/story/….
- 8Harper Neidig, “Facebook releases audit on conservative bias claims,” The Hill, August 20, 2019, https://thehill.com/policy/technology/458081-facebook-releases-audit-on…; Ali Breland and Pema Levy, “Facebook’s Anti-Conservative Bias Report Does Not Identify Any Anti-Conservative Bias,” Mother Jones, August 20, 2019, https://www.motherjones.com/politics/2019/08/facebook-jon-kyl-conservat….
- 9Oliver Darcy, “Trump invites right-wing extremists to White House 'social media summit',” CNN, July 11, 2019, https://www.cnn.com/2019/07/10/tech/white-house-social-media-summit/ind….
- 10John D. McKinnon & Alex Leary, “Trump Considers Forming Panel to Review Complaints of Online Bias,” The Wall Street Journal, May 23, 2020, https://www.wsj.com/articles/trump-considers-forming-panel-to-review-co….
- 11Eric Goldman, “While Our Country is Engulfed by Urgent Must-Solve Problems, Congress is Working Hard to Burn Down Section 230,” Technology & Marketing Law Blog, August 4, 2020, https://blog.ericgoldman.org/archives/2020/08/while-our-country-is-engu….; “The Telecommunications Act’s “Good Samaritan Protection: Section 230,” Disruptive Competition Project, accessed October 1, 2020, https://www.project-disco.org/section-230/
- 12Congress, “S.3398 – EARN IT Act of 2020,” July 20, 2020, https://www.congress.gov/bill/116th-congress/senate-bill/3398/text.
- 13Joe Mullin, “The New EARN IT Bill Still Threatens Encryption and Free Speech,” Electronic Frontier Foundation, July 2, 2020, https://www.eff.org/deeplinks/2020/07/new-earn-it-bill-still-threatens-….
- 14Emma Llansó, “Amendments to EARN IT Act Can’t Fix the Bill’s Fundamental Flaws,” Center for Democracy & Technology, July 1, 2020, https://cdt.org/insights/amendments-to-earn-it-act-cant-fix-the-bills-f….; Riana Pfefferkorn, “The EARN IT Act Threats Our Online Freedoms. New Amendments Don’t Fix It. Stanford Law School: The Center for Internet and Society, July 6, 2020, https://cyberlaw.stanford.edu/blog/2020/07/earn-it-act-threatens-our-on….; Human Rights Watch, “US: Senate Should Reject EARN IT Act,” June 1, 2020, https://www.hrw.org/news/2020/06/01/us-senate-should-reject-earn-it-act.
- 15Senator Josh Hawley, “Senator Hawley Introduces Legislation to Amend Section 230 Immunity for Big Tech Companies,” June 19, 2019, https://www.hawley.senate.gov/senator-hawley-introduces-legislation-ame….
- 16Ending Support for Internet Censorship Act S.1914 (2)(A), 2019.
- 17Elliot Harmon, “Sen. Hawley’s “Bias” Bill Would Let the Government Decide Who Speaks,” Electronic Frontier Foundation, June 20, 2019, https://www.eff.org/deeplinks/2019/06/sen-hawleys-bias-bill-would-let-g…; Salvador Rodriguez, “Tech industry slams GOP senator’s bill that would hold companies liable for user-posted content,” CNBC, June 19, 2019, https://www.cnbc.com/2019/06/19/reactions-to-sen-hawleys-bill-that-woul…; “Bill Purporting to End Internet Censorship Would Atually Threaten Free Expression Online,” New America, https://www.newamerica.org/oti/press-releases/bill-purporting-end-inter…
- 18Devin Coldewey, “PACT Act takes on Internet Platform Content Rules with ‘a scalpel rather than a jackhammer,” TechCrunch, June 24, 2020, https://techcrunch.com/2020/06/24/pact-act-takes-on-internet-platform-c…; “All Information (Except Text) for S.4066 - PACT Act,” Congress, June 24, 2020, https://www.congress.gov/bill/116th-congress/senate-bill/4066/all-info.
- 19Mike Masnick, “Senator Leoffler’s New Section 230 Reform Bill Would Threaten Encruption and Pressure Websites to Keep Spam & Porn,” Tech Dirt, June 26, 2020, https://www.techdirt.com/articles/20200626/11112544795/senator-loeffler…; “S.4062 - Stopping Big Tech's Censorship Act,” Congress, June 24, 2020, https://www.congress.gov/bill/116th-congress/senate-bill/4062/cosponsors.
- 20Chris Mills Rodrigo, “Hawley Introduces Bill Targeting Behavioral Advertising,” The Hill, July 27, 2020, https://thehill.com/policy/technology/509303-hawley-introduces-bill-tar….
- 21David McCabe, “Justice Dept. Urges Congress to Limit Tech’s Legal Shield,” the New York Times, September 23, 2020, https://www.nytimes.com/2020/09/23/technology/social-media-internet-spe….
- 22Jeanne Whalen, “Federal court issues preliminary injunction halting administration’s ban of Chinese app WeChat,” the Washington Post, September 21, 2020, https://www.washingtonpost.com/technology/2020/09/20/wechat-ban-blocked…; Arjun Kharpal, “Judge Blocks Trump Administration’s Ban on New TikTok Downloads from U.S. App Stores,” CNBC, September, 27, 2020, https://www.cnbc.com/2020/09/28/tiktok-ban-judge-blocks-order-banning-d….
- 23Russell Brandom, “Trump’s TikTok ban is a Gross Abuse of Power,” The Verge, August 11, 2020, https://www.theverge.com/2020/8/11/21363405/trumps-tiktok-ban-legal-cor…; Eva Galperin, David Greene, and Kurt Opsahl, “TikTok Ban: A Seed of Genuine Security Concern Wrapped in a Thick Layer of Censorship,” Electronic Frontier Foundation, August 4, 2020, https://www.eff.org/deeplinks/2020/08/tiktok-ban-seed-genuine-security-…;“Trump executive orders targeting China-linked apps fail to protect privacy, harm human rights,” Access Now, September 18, 2020, https://www.accessnow.org/trump-executive-orders-targeting-china-linked….
- 24Mary Harris, “Does Trump Kind of Have a Point about TikTok?” Slate, August 3, 2020, https://slate.com/technology/2020/08/tiktok-ban-china-donald-trump-cybe…; Tim Wu, “A TikTok Ban is Overdue,” New York Times, August 18, 2020, https://www.nytimes.com/2020/08/18/opinion/tiktok-wechat-ban-trump.html.
- 25See, e.g., Bradburn v. North Central Regional Library District (Washington state Supreme Court) No. 82200-0 (May 6, 2010), https://caselaw.findlaw.com/wa-supreme-court/1523482.html; Bradburn v. NCLR, No. CV-06-327-EFS (E.D. Wash. April 10, 2013), https://casetext.com/case/bradburn-v-north-central-regional-library-dis….
- 26Megan Farokhmanesh, “YouTube is still restricting and demonetizing LGBT videos — and adding anti-LGBT ads to some,” The Verge, June 4, 2018, https://www.theverge.com/2018/6/4/17424472/youtube-lgbt-demonetization-…; Joseph Cox and Jason Koebler, “Why Won’t Twitter Treat White Supremacy Like ISIS? Because It Would Mean Banning Some Republican Politicians Too,” Vice, April 25, 2019, https://www.vice.com/en_us/article/a3xgq5/why-wont-twitter-treat-white-….
- 27Jessica Guynn, “Facebook while black: Users call it getting 'Zucked,' say talking about racism is censored as hate speech,” USA Today, April 24, 2019, https://www.usatoday.com/story/news/2019/04/24/facebook-while-black-zuc…. Julia Angwin and Hannes Grassegger, “Facebook’s Secret Censorship Rules Protect White Men From Hate Speech But Not Black Children,” ProPublica, June 28, 2017, https://www.propublica.org/article/facebook-hate-speech-censorship-inte….
- 28“Facebook’s Civil Rights Audit – Final Report,” July 8, 2020, https://about.fb.com/wp-content/uploads/2020/07/Civil-Rights-Audit-Fina…
- 29Will Oremus, “YouTube’s LGBTQ Problem is a Business-Model Problem,” August 15, 2019, https://onezero.medium.com/youtubes-lgbtq-problem-is-a-business-model-p…; Greg Bensinger and Reed Albergotti, “YouTube discriminates against LGBT content by unfairly culling it, suit alleges,” The Washington Post, August 14, 2019, https://www.washingtonpost.com/technology/2019/08/14/youtube-discrimina….
- 30Craig Silverman, “Black Lives Matter Activists Say They're Being Silenced By Facebook,” BuzzFeed News, June 19, 2020, https://www.buzzfeednews.com/article/craigsilverman/facebook-silencing-….
- 31Facebook, “Community Standards Enforcement Report,” Facebook Transparency, 2020, https://transparency.facebook.com/community-standards-enforcement.
- 32Twitter, “Rules Enforcement,” Twitter Transparency, 2020, https://transparency.twitter.com/en/twitter-rules-enforcement.html.
- 33Google, “YouTube Community Guidelines Enforcement,” Google Transparency Report, 2020, https://transparencyreport.google.com/youtube-policy/removals?hl=en.
- 34Evelyn Douek, “COVID-19 and Social Media Content Moderation,” Lawfare, March 25, 2020, https://www.lawfareblog.com/covid-19-and-social-media-content-moderation.
- 35See e.g., Vijaya Gadde & Matt Derella, “An Update on our Continuity Strategy During Covid-19,” Twitter Blog, March 16, 2020, https://blog.twitter.com/en_us/topics/company/2020/An-update-on-our-con…; Google, “Google Transparency Reports: A History of Transparency,” 2020, https://transparencyreport.google.com/about?hl=en; Twitter, “Introducing the New Twitter Transparency Center,” Twitter Blog, August 19, 2020, https://blog.twitter.com/en_us/topics/company/2020/new-transparency-cen…; Dia Kayyali, “As Content Moderators Go Home, Content Could Go Down,” WITNESS Blog, March 19, 2020, https://blog.witness.org/2020/03/as-content-moderators-go-home-content-…
- 36Kang-Xing Jin, “Keeping People Safe and Informed about the Coronavirus,” Facebook Newsroom, May 4, 2020, https://about.fb.com/news/2020/05/coronavirus/#joint-statement.; Zack Budryk, “WHO, Google Working to Fight Spread of Virus Disinformation,” The Hill, February 3, 2020, https://thehill.com/policy/healthcare/481138-who-google-working-to-figh….
- 37Mark Zuckerberg, “A Blueprint for Content Governance and Enforcement,” Facebook, 2018, https://www.facebook.com/notes/mark-zuckerberg/a-blueprint-for-content-….
- 38Brent Harris, “Establishing Structure and Governance for an Independent Oversight Board,” Facebook Newsroom, September 17, 2019, https://about.fb.com/news/2019/09/oversight-board-structure/.
- 39Facebook, “Oversight Board Charter,” Facebook Newsroom, 2019, https://fbnewsroomus.files.wordpress.com/2019/01/draft-charter-oversigh….
- 40Facebook, Oversight Board Charter, Facebook Newsroom, September 2019, https://fbnewsroomus.files.wordpress.com/2019/09/oversight_board_charte….
|Do online journalists, commentators, and ordinary users practice self-censorship?||3.003 4.004|
Reports of self-censorship among journalists, commentator, and ordinary internet users are not widespread in the United States. Women and members of marginalized communities are frequently targets of online harassment and abuse, which can influence self-censorship (see C7). A 2017 Amnesty International survey of women across eight countries, including the United States, who had experienced online harassment found that 76 percent changed how they used social media as a result.1 Research released by the US Department of Education in 2019 also documented increases in online harassment and found that girls are three times more likely to report being cyberbullied online than boys.2 Despite such prevalence, it remains unclear precisely how often the many forms of online harassment and abuse may lead journalists, commentators, and others to engage in self-censorship.
Social media users may change their behavior in line with their perceptions of government surveillance. A 2016 study in Journalism & Mass Communication Quarterly found that priming participants with subtle reminders about mass surveillance had a chilling effect on their willingness to publicly express dissenting opinions online.3 Another study from October 2018 reaffirmed the impact of online surveillance on self-censorship.4 Human Rights Watch has voiced concern about the extent to which Chinese citizens in the United States may self-censor on WeChat given the reach of the Chinese government’s digital surveillance regime.5
Various studies in recent years have concluded that aggressive leak investigations by the Justice Department, as well as US government surveillance programs, cause journalists and other writers to self-censor and to doubt their ability to protect the confidentiality and safety of their sources.6
- 1Amnesty International, “Amnesty reveals alarming impact of online abuse against women,” November 20, 2017, https://www.amnesty.org/en/latest/news/2017/11/amnesty-reveals-alarming….
- 2Sally Ho, “Cyberbullying on the rise with Girls 3 Times More Likely to be Harassed, PBS, July 26, 2019, https://www.pbs.org/newshour/nation/cyberbullying-on-the-rise-with-girl….
- 3Elizabeth Stoycheff, “Under Surveillance: Examining Facebook’s Spiral of Silence Effects in the Wake of NSA Internet Monitoring,” Journalism & Mass Communication Quarterly, 2016, https://journals.sagepub.com/doi/abs/10.1177/1077699016630255; Karen Turner, “Mass surveillance silences minority opinions, according to study,” The Washington Post, March 28, 2016, https://www.washingtonpost.com/news/the-switch/wp/2016/03/28/mass-surve….
- 4Elizabeth Stoycheff et al., “Privacy and the Panopticon: Online mass surveillance’s deterrence and chilling effects,” New Media & Society, 2019, https://journals.sagepub.com/doi/abs/10.1177/1461444818801317.
- 5Yaqui Wang, “WeChat Is a Trap for China’s Diaspora,” Human Rights Watch, August 14, 2020, https://www.hrw.org/news/2020/08/14/wechat-trap-chinas-diaspora.
- 6Human Rights Watch and American Civil Liberties Union, “With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law and American Democracy,” 2014, https://www.hrw.org/sites/default/files/reports/usnsa0714_ForUPload_0.p…; PEN America, “Global Chilling: The Impact of Mass Surveillance on International Writers,” January 5, 2015, https://pen.org//sites/default/files/globalchilling_2015.pdf; see also, PEN America, “Chilling Effects: NSA Surveillance Drives U.S. Writers to Self-Censor,” November 2013, https://pen.org//sites/default/files/2014-08-01_Full%20Report_Chilling%…; Jesse Holcomb et al., “Investigative Journalists and Digital Security: Perceptions of Vulnerability and Changes in Behavior,” Pew Research Center, February 5, 2015, http://pewrsr.ch/1xqJh6i.
|Are online sources of information controlled or manipulated by the government or other powerful actors to advance a particular political interest?||2.002 4.004|
False, manipulated, misleading, or conspiracist information, disseminated online by both foreign regimes and domestic actors, is a major problem in the United States. The failure of US institutions to effectively respond to disinformation surrounding the 2016 elections, combined with US political leaders’ willingness to spread such content themselves, has created an unreliable information environment ahead of the November 2020 general elections.
Foreign actors continue to orchestrate disinformation campaigns.1 In September 2020, Facebook and Twitter announced that the Kremlin-backed Internet Research Agency, which spread disinformation during the 2016 presidential election, was running a network of fake accounts and a website purporting to be a left-wing news outlet, even hiring US journalists to write for the site.2 Such evidence confirmed previous warnings from intelligence agencies that foreign governments would spread disinformation ahead of the 2020 elections. Similar reports also warn that Russian groups have refined their strategies since 2016, leaning more on English-language sites and shifting away from using fake social media accounts.3 The newer methods were on display in August 2020, when Kremlin-backed outlets Russia Today and Ruptly were reported to have manipulated and spread across Twitter a story alleging that racial justice protesters had burned Bibles and the American flag; it was eventually shared by several high-profile Republican leaders.4
In February 2020, Facebook removed a small network of Iranian-based accounts spreading news on topics relating to US immigration policy, Middle East policy, and US-Iranian tensions;5 in October 2019 the platform had similarly removed accounts originating in Russia and Iran that targeted the United States.6 The State Department has revealed that the Russian, Chinese, and Iranian governments each engaged in spreading anti-American COVID-19 conspiracy theories during 2020.7
Disinformation campaigns are increasingly homegrown and at times encouraged by government officials and politicians.8 Manipulated content and conspiracy theories continue to flood online discussions around major political, cultural, and social topics, including the COVID-19 pandemic,9 racial justice protests, 10 the impeachment of President Trump,11 the November 2020 elections,12 and the death of Supreme Court justice Ruth Bader Ginsburg.13
False and misleading political content is often propagated by President Trump himself on his official social media accounts,14 through both original and shared posts, including those from known conspiracist sources.15 The content has touched on a range of issues, such as claims that the official US death toll due to COVID-19 is inaccurate and baseless assertions about the risk of fraud through mail-in voting (see B2).16 The lead author of a Cornell University analysis of 38 million English-language articles about the pandemic said in September 2020 that Trump was “the single largest driver of misinformation” around COVID-19.17
Beginning in April 2020, ProPublica and First Draft analyzed Facebook posts using voter-related keywords, finding that the platform was rife with falsehoods, misleading information, or a blend of opinion and factual errors related to the upcoming November elections.18 Claims about mail-in ballots and voter fraud frequently came from right-wing users, while concerns about “stealing the election” were prevalent from users across the ideological spectrum.
The Washington Post reported in September 2020 on a campaign in which accounts used spam-like behavior to spread false or partisan content.19 The newspaper linked the accounts to teenagers in Arizona who were being paid and managed by Turning Point Action, an affiliate of the well-known pro-Trump youth organization Turning Point USA. People involved in the campaign reported that leaders in the group coordinated what information would be shared and when. Both Facebook and Twitter have since removed a number of accounts connected to the campaign. In October 2020, Facebook announced it would permanently ban the marketing firm Rally Forge, which was working with Turning Point Action, from its platform.20
During the previous coverage period, the New York Times reported in December 2018 that in the lead-up to a 2017 special Senate election in Alabama between Democrat Doug Jones and Republican Roy Moore, a group of Democrat-aligned operatives with no connection to Jones’s campaign created a fraudulent Facebook page and used Twitter accounts to support Jones’s candidacy and harm Moore.21
A study by the Oxford Internet Institute (OII) found that ahead of the 2018 midterm elections, domestic alternative online outlets were the main purveyors of “junk news,” a term defined broadly to encompass deliberately incorrect, deceptive, or misleading information, including content that is propagandistic, ideologically extreme, hyperpartisan, or conspiracist.22 In an examination of 2.5 million Twitter posts and nearly 7,000 pages on Facebook, OII found that far-right and conservative pages spread more junk news than all other source categories combined.23
The deluge of disinformation has led to offline harms. During the COVID-19 outbreak in 2020, doctors reported that some patients failed to take their illness seriously due to false claims that the virus was a hoax or no worse than the flu, meaning they sought medical care too late.24 A number of people also reportedly ingested cleaning fluids and other toxic or unproven treatments based on statements by President Trump that were amplified online.25
Online news outlets in the United States are generally free of either formal arrangements or coercive mechanisms meant to force them to provide favorable coverage of the government. Political and economic factors can sometimes align to incentivize a close relationship between a political party and a given news organization.26
Some domestic news outlets have been found to run covert campaigns of misleading content or disinformation. In August 2019, Facebook restricted the ability of the right-wing news outlet Epoch Times to purchase advertisements on its platform. The decision came after reporting revealed that the outlet was pushing conspiracist content to a vast number of Americans under page names that were not explicitly associated with the media group, allowing it to bypass the platform’s transparency rules on political ad spending.27 In December 2019, Facebook again removed hundreds of accounts, pages, and groups linked to the Epoch Media Group that used fake profile photos created with assistance from artificial intelligence.28 The accounts shared political information on topics such as religion, President Trump’s impeachment, and conservative ideology. In another example, the New York Times reported that Ken LaCorte, a former Fox News executive, had set up a digital operation that published inflammatory, misleading, and conspiracist content across websites with names such as Liberal Edition News and Conservative Edition News.29
- 1Brandon Echter, “A Collection of Coordinated Inauthentic Behavior,” Snopes, April 27, 2020, https://www.snopes.com/collections/coordinated-inauthentic-behavior/.
- 2Sheera Frenkel and Julian E. Barnes, “Russians Again Targeting Americans With Disinformation, Facebook and Twitter Say,” The New York Times, September 1, 2020, https://www.nytimes.com/2020/09/01/technology/facebook-russia-disinform….
- 3Matthew Rosenberg, Nicole Pelroth, and David E. Sanger, “‘Chaos Is the Point’: Russian Hackers and Trolls Grow Stealthier in 2020,” The New York Times, January 16, 2020, https://www.nytimes.com/2020/01/10/us/politics/russia-hacking-disinform….
- 4Matthew Rosenberg and Julian E. Barnes, “A Bible Burning, a Russian News Agency and a Story Too Good to Check Out,” The New York Times, August 11, 2020, https://www.nytimes.com/2020/08/11/us/politics/russia-disinformation-el….
- 5Nathaniel Gleicher, “Removing Coordinated Inauthentic Behavior from Russia, Iran, Vietnam and Myanmar,” Facebook Newsroom, February 12, 2020, https://about.fb.com/news/2020/02/removing-coordinated-inauthentic-beha….
- 6Nathaniel Gleicher, “Removing More Coordinated Inauthentic Behavior From Iran and Russia,” Facebook Newsroom, October 21, 2019, https://about.fb.com/news/2019/10/removing-more-coordinated-inauthentic….
- 7Betsy Woodruff Swan, “State Report: Russian, Chinese and Iranian Disinformation Narratives Echo One Another,” Politico, April 21, 2020, https://www.politico.com/news/2020/04/21/russia-china-iran-disinformati….
- 8PEN America, “Truth on the Ballot: Fraudulent News, the Midterm Elections, and Prospects for 2020,” March 13, 2019, https://pen.org/wp-content/uploads/2019/03/Truth-on-the-Ballot-report.p….
- 9Josiah Bates, “Why Conspiracy Theories Are Running Rampant Amid the Coronavirus Outbreak,” Time, May 15, 2020, https://time.com/5836941/conspiracy-theories-coronavirus-katie-couric-r…; Sheera Frenkel, Ben Decker, and Davey Alba, “How the ‘Plandemic’ Movie and Its Falsehoods Spread Widely Online,” The New York Times, May 19, 2020, https://www.nytimes.com/2020/05/20/technology/plandemic-movie-youtube-f…; Alex Kasprak, “The Origins and Scientific Failings of the COVID-19 ‘Bioweapon’ Conspiracy Theory,” Snopes, April 1, 2020, https://www.snopes.com/news/2020/04/01/covid-19-bioweapon/.
- 10Souad Mekhennet, “Far-right groups are spreading racist, false claims about shooting victim Ahmaud Arbery, analysts say,” The Washington Post, May 17, 2020, https://www.washingtonpost.com/national-security/far-right-groups-are-s…; Ben Collins et al., “White Nationalist Group Posing as Antifa Calle or Violence on Twitter,” MSNBC, June 1, 2020, https://www.nbcnews.com/tech/security/twitter-takes-down-washington-pro…; Davey Alba, “Misinformation About George Floyd Protests Surges on Social Media,” The New York Times, June 1, 2020, https://www.nytimes.com/2020/06/01/technology/george-floyd-misinformati….; Amanda Seitz, “Facebook Groups Pivot from Targeting Stay-at-Home Orders to Misinformation on Racial Injustice Protests,” USA Today, July 5, 2020, https://www.usatoday.com/story/news/nation/2020/07/05/facebook-groups-s….
- 11Brian Fung, “Facebook is a hotbed of impeachment disinformation, researchers say,” CNN, November 6, 2019, https://www.cnn.com/2019/11/06/tech/facebook-impeachment-disinformation…; Kevin Roose, “Brace Yourself for the Internet Impeachment,” The New York Times, September 26, 2019, https://www.nytimes.com/2019/09/26/technology/trump-impeachment-disinfo….
- 12Isaac Stanley-Becker, “Disinformation Campaign Stokes Fears about Mail Voting, Using Lebron James Image and Boosted by Trump-Aligned Group,” The Washington Post, August 20, 2020, https://www.washingtonpost.com/politics/disinformation-campaign-stokes-….
- 13Alexandra S. Levine, “RBG disinformation soars on social media,” Politico, September 23, 2020, https://www.politico.com/newsletters/morning-tech/2020/09/23/rbg-disinf…; Kevin Roose, “Trump Jump-Starts Misinformation on Ginsburg’s ‘Dying Wish’,” The New York Times, September 21, 2020, https://www.nytimes.com/2020/09/21/technology/trump-jump-starts-misinfo….
- 14Henry Farrell and Bruce Schneier, “The Most Damaging Election Disinformation Campaign Came From Donald Trump, Not Russia,” Vice, November 19, 2018, https://www.vice.com/en_us/article/mbyg3x/the-most-damaging-election-di….
- 15Tony Romm and Colby Itkowitz, “Trump shares Twitter accounts linked to conspiracy theory QAnon,” The Washington Post, July 30, 2019, https://www.washingtonpost.com/politics/trump-shares-twitter-accounts-l…; Tina Nguyen, “Trump isn't secretly winking at QAnon. He's retweeting its followers.,” Politico, July 12, 2020, https://www.politico.com/news/2020/07/12/trump-tweeting-qanon-followers….
- 16Matt Perez, “Trump Hit With Another Twitter Warning After Misleading Tweet On Mail-In Voting,” Forbes, August 23, 2020, https://www.forbes.com/sites/mattperez/2020/08/23/trump-hit-with-anothe….
- 17Sheryl Gay Stolberg and Noah Weiland, “Study Finds ‘Single Largest Driver’ of Coronavirus Misinformation: Trump,” The New York Times, September 30, 2020, https://www.nytimes.com/2020/09/30/us/politics/trump-coronavirus-misinf….
- 18Ryan McCarthy, ““Outright Lies”: Voting Misinformation Flourishes on Facebook,” ProPublica, July 16, 2020, https://www.propublica.org/article/outright-lies-voting-misinformation-….
- 19Isaac Stanley-Becker, “Pro-Trump youth group enlists teens in secretive campaign likened to a ‘troll farm,’ prompting rebuke by Facebook and Twitter,” The Washington Post, September 15, 2020, https://www.washingtonpost.com/politics/turning-point-teens-disinformat….
- 20Isaac Stanley-Becker, “Facebook bans marketing firm running ‘troll farm’ for pro-Trump youth group,” The Washington Post, October 8, 2020, https://www.washingtonpost.com/technology/2020/10/08/facebook-bans-medi…
- 21Scott Shane and Alan Blinder, “Secret Experiment in Alabama Senate Race Imitated Russian Tactics,” The New York Times, December 19, 2018, https://www.nytimes.com/2018/12/19/us/alabama-senate-roy-jones-russia.h…; PEN America, “Truth on the Ballot: Fraudulent News, the Midterm Elections, and Prospects for 2020,” March 13, 2019, https://pen.org/wp-content/uploads/2019/03/Truth-on-the-Ballot-report.p….
- 22Oxford Internet Institute Press Release, “Junk News Dominating Coverage Of US Midterms On Social Media, New Research Finds,” November 1, 2018, https://www.oii.ox.ac.uk/news/releases/junk-news-dominating-coverage-of…; Craig Timberg and Tony Romm, “Forget the Russians. On this Election Day, it’s Americans peddling disinformation and hate speech,” November 6, 2018, https://www.washingtonpost.com/technology/2018/11/06/forget-russians-th….
- 23List of audience groups they studied were Mainstream News, Mainstream Conservative; Activism and Progressive Causes; Left-wing Opposition; Libertarians; Far-right; Conspiracy; Lifestyle, Consumer Goods, and Miscellaneous; and Unclustered
- 24Ben Collins, “Coronavirus conspiracy theories are frustrating ER doctors,” NBC News, May 6, 2020, https://www.nbcnews.com/tech/tech-news/what-are-we-doing-doctors-are-fe….
- 25BBC News, “Coronavirus: Outcry after Trump suggests injecting disinfectant as treatment,” April 24, 2020, https://www.bbc.com/news/world-us-canada-52407177; Robert Glatter, MD, “Calls To Poison Centers Spike After The President’s Comments About Using Disinfectants To Treat Coronavirus,” Forbes, April 25, 2020, https://www.forbes.com/sites/robertglatter/2020/04/25/calls-to-poison-c….
- 26Jane Mayer, “The Making of the Fox News White House, The New Yorker, March 4, 2020, https://www.newyorker.com/magazine/2019/03/11/the-making-of-the-fox-new…; Michael M. Grynbaum, “Fox News Once Gave Trump a Perch. Now it’s his Bullhorn.” July 1, 2018, https://www.nytimes.com/2018/07/01/business/media/fox-news-trump-bill-s….
- 27Brandy Zadrozny and Ben Collins, “Trump, QAnon and an impending judgment day: Behind the Facebook-fueled rise of The Epoch Times,” NBC News, August 20, 2019, https://www.nbcnews.com/tech/tech-news/trump-qanon-impending-judgment-d…; Brandy Zadrozny and Ben Collins, “Facebook bans ads from The Epoch Times after huge pro-Trump buy,” NBC News, August 22, 2019, https://www.nbcnews.com/tech/tech-news/epoch-times-begins-hiding-its-co….
- 28Davey Alba, “Facebook Discovers Fakes That Show Evolution of Disinformation,” The New York Times, December 20, 2019, https://www.nytimes.com/2019/12/20/business/facebook-ai-generated-profi….
- 29Nicole Perlroth, “A Former Fox News Executive Divides Americans Using Russian Tactics,” The New York Times, November 21, 2019, https://www.nytimes.com/2019/11/21/technology/LaCorte-edition-news.html….
|Are there economic or regulatory constraints that negatively affect users’ ability to publish content online?||3.003 3.003|
There are no government-imposed economic or regulatory constraints on users’ ability to publish content. Online outlets and blogs generally do not need to register with, or have favorable connections to, the government to operate. Media sites can accept advertising from both domestic and foreign sources.
Experts argue that the FCC’s repeal of the 2015 Open Internet Order will result in new constraints for those wishing to publish online (see A5).1 Democratic Party lawmakers have pushed to enshrine net neutrality principles in federal legislation. The draft Save the Internet Act passed the House of Representatives in April 2019, but it had not been taken up for a vote in the Republican-controlled Senate by the end of the coverage period.2
In February and June 2020, the State Department designated nine Chinese state media companies as “foreign missions,” requiring them to report information on staffing and real estate holdings and limiting the number of employees they can post in the United States.3 In previous years, several Chinese and Russian state media outlets had been designated as “foreign agents,” a status with other transparency requirements attached.4 In September 2020, after the coverage period, the Justice Department declared Al-Jazeera Media Network to be an “agent of the Government of Qatar,” requiring its US-based social media division to register as a foreign agent.5 Al-Jazeera, which is privately held but reportedly subsidized by the Qatari government, expressed concerns that the registration would damage its journalistic work. However, neither “foreign agent” nor “foreign mission” designations entail any direct restrictions on an outlet’s content or ability to publish online.
- 1Kristen Hare, “Report: The repeal of net neutrality will hurt local news,” Poynter, December 11, 2017, https://www.poynter.org/tech-tools/2017/report-the-repeal-of-net-neutra…; Lion Publishers, “Net Neutrality repeal could damage local news startups,” https://www.lionpublishers.com/net-neutrality-repeal-could-damage-local….
- 2Marguerite Reardon, “The net neutrality battle lives on: What you need to know after the appeals court decision,” CNET, October 3, 2019, https://www.cnet.com/news/net-neutrality-has-been-dead-for-a-year-what-….
- 3Conor Finnegan, “US forces 5 Chinese media outlets to register as foreign missions,” ABC News, February 18, 2020, https://abcnews.go.com/Politics/us-forces-chinese-media-outlets-registe…; John Ruwitch and Michele Kelemen, “Trump Administration Labels 4 More Chinese News Outlets 'Foreign Missions',” NPR, June 22, 2020, https://www.npr.org/2020/06/22/881755421/trump-administration-labels-4-….
- 4Committee to Protect Journalists, “Several foreign news outlets required to register as foreign agents in US,” July 2, 2019, https://cpj.org/2019/07/several-foreign-news-outlets-required-to-regist….
- 5Dan Friedman, “The Trump Administration Orders an Al Jazeera Affiliate to Register as a Foreign Agent,” Mother Jones, September 15, 2020, https://www.motherjones.com/politics/2020/09/trump-doj-al-jazeera-fara-….
|Does the online information landscape lack diversity?||4.004 4.004|
The online environment in the United States remains vibrant and diverse, and users can easily find and publish content on a range of issues and in multiple languages. However, the growing prevalence of disinformation and hyperpartisan content over the past several years has affected the information landscape, eroding the visibility and readership of more balanced or objective sources.1 In addition, online harassment and abuse targeting women and members of marginalized communities who speak out on social media are a persistent threat to the diversity of information and viewpoints (see B4 and C7).
Newsroom closures driven by the economic fallout from COVID-19 could also pose a threat to the diversity of information available online, though there had not yet been a significant impact by the end of the coverage period. The nonprofit Poynter Institute, which maintains an updated list of newsroom closures, layoffs, and operational changes associated with the coronavirus, documented just under 200 newspapers, weeklies, magazines, television stations, and radio stations experiencing organizational disruption as of May 2020.2 National digital media outlets like Vice News, BuzzFeed, and Vox have all laid off staff. The majority of those affected, however, are local outlets like Seattle’s alternative weekly the Stranger and the Pulitzer Prize–winning Charleston Gazette-Mail in West Virginia, many of which maintain online news presences.3
- 1Committee to Protect Journalists, “CPJ chairman says Trump is threat to press freedom,” October 13, 2016, https://cpj.org/2016/10/cpj-chairman-says-trump-is-threat-to-press-free….
- 2Kristen Hare, “Here are the newsroom layoffs, furloughs and closures caused by the coronavirus,” Poynter Institute, May 18, 2020, https://www.poynter.org/business-work/2020/here-are-the-newsroom-layoff….
- 3Clara Hendrickson, “Critical in a Public Health Crisis, COVID-19 has Hit Local Newsrooms Hard,” Brookings Institute, April 8, 2020, https://www.brookings.edu/blog/fixgov/2020/04/08/critical-in-a-public-h….
|Do conditions impede users’ ability to mobilize, form communities, and campaign, particularly on political and social issues?||5.005 6.006|
Score Change: The score declined from 6 to 5 because enhanced surveillance, intimidation, and harassment during nationwide protests for racial justice infringed on people’s freedom to use digital technology to associate and assemble.
There are no technical or legal restrictions on individuals’ use of digital tools to organize or mobilize for civic activism. However, growing surveillance of social media and communications platforms, as well as targeted harassment and threats, have infringed on people’s freedom to engage in such activism.
Nationwide protests for racial justice and in support of the Black Lives Matter movement surged in mid-2020, after the police killings of Breonna Taylor in Kentucky and George Floyd in Minnesota in March and May, respectively. People flocked to internet services, communication platforms, and other digital tools to organize, mobilize, and share information. Such engagement, however, was met with enhanced surveillance,1 intimidation and harassment, and at times arrests for online activity (see C3, C5, and C7).
Federal and local law enforcement agencies increased their surveillance of social media platforms amid the protests (see C5).2 The Intercept reported in June 2020 that agents from a Federal Bureau of Investigation (FBI) terrorism task force appeared at homes or workplaces to question four people in Cookeville, Tennessee, who were involved in planning Black Lives Matter rallies on Facebook.3 One university student was questioned about her offer to provide transportation to and from a rally, as well as her private Facebook posts. An early coordinator of Cookeville’s protests was also interrogated, even after she ceased her activity in response to online death threats. Separately in North Carolina, the FBI questioned a man and his mother two days after he jokingly posted on Twitter that he was a local leader of antifa, a left-wing antifascist movement.4
Reports also suggest that law enforcement authorities had access to protesters’ electronic devices and private communications. The Lawyers Guild in Ohio cited cases in which local police handed over protesters’ phones to federal agents.5 Separately, the Washington Post reported on an internal Department of Homeland Security (DHS) document that discussed how the department had access to Portland, Oregon, protesters’ electronic messages, including from encrypted platforms like Telegram, and then disseminated such information to federal, state, and local agencies.6 The information reportedly focused largely on discussions among demonstrators about how to avoid being arrested or facing police violence during protests. Moreover, the New York Times reported in October 2020 that lawmakers on the Intelligence Committee said that DHS officers considered extracting data from protestors’ phones in Portland.7
Surveillance coupled with targeted harassment chilled some people’s willingness to use digital tools to associate and assemble. For example, citing concerns that online information would be used by hostile nonstate actors to disrupt or exploit planned gatherings, some Minneapolis residents instituted self-imposed restrictions on live streaming and sharing of information on social media.8 A photographer and activist in Philadelphia stopped posting to social media amid the protests, citing the need to protect demonstrators from police retaliation.9
Platforms have also restricted content relating to digital organizing. In June 2020, the civil society group Color of Change said it had collected hundreds of reports within a few weeks that Facebook had restricted or removed Black Lives Matter and antiracist content. 10 For example, activist and educator Louiza Doran reported that while she was leading an antiracist teleconference workshop, Instagram temporarily removed posts that mentioned her name, linked to her work, or had pictures of her, for allegedly violating community standards. She also said Facebook had suspended her ability to stream video live. The platform explained that its automated system had incorrectly flagged her personal site as spam. Separately, in April 2020, Facebook announced that it would remove “events” advertising protests against COVID-19 lockdowns if they would violate a state government’s rules on social distancing.11
In recent years, despite such obstacles, some of the country’s most visible social movements have successfully combined on-the-ground organizing with social media efforts. Researchers who analyzed more than 40 million posts about the Black Lives Matter movement in 2016 identified Twitter as a powerful tool for connecting activist communities across the United States.12 Another study of Twitter, by Crimson Hexagon and the PEORIA Project at George Washington University in the fall of 2017, found that the #MeToo hashtag was used to comment on the problem of sexual harassment and assault more than seven million times.13
- 1Allie Funk, “How Domestic Spying Tools Undermine Racial Justice Protests,” Freedom House, June 22, 2020, https://freedomhouse.org/article/how-domestic-spying-tools-undermine-ra….
- 2Steve Vladeck and Benjamin Wittes, “DHS Authorizes Domestic Surveillance to Protect Statues and Monuments,” Lawfare Blog, July 20, 2020, https://www.lawfareblog.com/dhs-authorizes-domestic-surveillance-protec….
- 3Chris Brooks, “After Barr Ordered FBI To “Identify Criminal Organizers,” Activists Were Intimidated At Home And At Work,” The Intercept, June 12, 2020, https://theintercept.com/2020/06/12/fbi-jttf-protests-activists-cookevi….
- 4Ryan Devereaux, “He Tweeted That He Was the Leader of Antifa. Then the FBI Asked Him to Be an Informant.,” The Intercept, June 9, 2020, https://theintercept.com/2020/06/09/antifa-fbi-tweet/
- 5Maggie Prosser, “Local and Federal Law Enforcement Using Intimidation Tactics Against Protesters, State Lawyers Guild Says,” TiffinOhio.net, July 3, 2020, https://go.tiffinohio.net/2020/07/local-and-federal-law-enforcement-usi….
- 6Shane Harris, “DHS analyzed protester communications, raising questions about previous statements by senior department official,” Washington Post, July 31, 2020, https://www.washingtonpost.com/national-security/dhs-analyzed-protester…; Ken Klippenstein, “Federal Agencies Tapped Protesters’ Phones in Portland,” The Nation, September 21, 2020, https://www.thenation.com/article/politics/homeland-security-portland/.
- 7Zolan Kanno-Youngs, “Homeland Security Considered Snooping on Portland Protesters’ Cellphones,” New York Times, October 2, 2020, https://www.nytimes.com/2020/10/02/us/politics/homeland-security-portla….
- 8Megan Molteni, “In Minneapolis, Neighbors Are Mobilizing—Offline,” WIRED, June 1, 2020, https://www.wired.com/story/in-minneapolis-neighbors-are-mobilizing-off….
- 9Katie Shepherd, “An Artist Stopped Posting Protest Photos Online to Shield Activists from Police. Then, He was Arrested.” The Washington Post, August 3, 2020. https://www.washingtonpost.com/nation/2020/08/03/philadelphia-arrest-pr….
- 10Craig Silverman, “Black Lives Matter Activists Say They’re Being Silences by Facebook,” Buzzfeed News, June 19, 2020, https://www.buzzfeednews.com/article/craigsilverman/facebook-silencing-….
- 11Brian Heater, “Facebook is Pulling Some Protest Events Over Stay-at-Home Violations,” Tech Crunch, April 20, 2020, https://techcrunch.com/2020/04/20/facebook-is-pulling-some-protest-even…; Elizabeth Culliford, “Facebook Removes Anti-Quarantine Protest Events in Some U.S. States,” Reuters, April 20, 2020, https://www.reuters.com/article/us-health-coronavirus-usa-facebook/face….
- 12Deen Freelon et al., “Beyond the Hashtags: #Ferguson, #BlackLivesMatter, and the Struggle for Offline Justice,” Center for Media and Social Impact at the School of Communication at American University, February 29, 2016, http://archive.cmsimpact.org/sites/default/files/beyond_the_hashtags_20….
- 13Abby Ohlheiser, “How #MeToo really was different, according to data,” The Washington Post, January 22, 2018, https://www.washingtonpost.com/news/the-intersect/wp/2018/01/22/how-met….
The legal framework provides strong safeguards for free expression and press freedom online, but it lacks robust protections for user privacy. Federal, state, and local government agencies continued to engage in surveillance of social media with limited oversight and transparency during the coverage period, most notably in the context of nationwide protests calling for racial justice. Technical attacks linked to foreign authoritarian regimes also continued, threatening to distort the November 2020 general elections.
|Do the constitution or other laws fail to protect rights such as freedom of expression, access to information, and press freedom, including on the internet, and are they enforced by a judiciary that lacks independence?||6.006 6.006|
The First Amendment of the US constitution includes protections for free speech and freedom of the press. The Supreme Court has long maintained that online speech has the highest level of constitutional protection.1 In a 2017 decision, the court reaffirmed this position, arguing that to limit a citizen’s access to social media “is to prevent the user from engaging in the legitimate exercise of First Amendment rights.”2 Lower courts have consistently struck down government attempts to regulate online content, with some exceptions for illegal material such as copyright infringement or child sexual abuse images.
In May 2018, a federal judge ruled that President Trump’s practice of blocking critics from following his Twitter account was unconstitutional, finding that the president’s Twitter feed serves as a public forum and that preventing members of the public from interacting with it violated the First Amendment.3 In July 2019, the US Court of Appeals for the Second Circuit upheld the decision.4
- 1Reno, Attorney General of the United States, et al. vs. American Civil Liberties Union et al, 521 U.S. 844 (1997), https://www.law.cornell.edu/supct/html/96-511.ZS.html.
- 2David Post, “Supreme Court Unamimously Overturns North Carolina’s Ban on Social-Media use by Sex Offenders,” The Washington Post, July 3, 2017, https://www.washingtonpost.com/news/volokh-conspiracy/wp/2017/07/03/sup….
- 3John Herrman and Charlie Savage, “Trump’s Blocking of Twitter Users Is Unconstitutional, Judge Says,” The New York Times, May 23, 2018, https://www.nytimes.com/2018/05/23/business/media/trump-twitter-block.h….
- 4Charlie Savage, “Trump Can’t Block Critics from his Twitter Account, Appeals Court Rules,” The New York Times, July 9, 2019, https://www.nytimes.com/2019/07/09/us/politics/trump-twitter-first-amen….
|Are there laws that assign criminal penalties or civil liability for online activities?||2.002 4.004|
Despite significant constitutional safeguards, laws such as the Computer Fraud and Abuse Act (CFAA) of 1986 have sometimes been used to prosecute online activity and impose harsh punishments. Certain states have criminal defamation laws in place, with penalties ranging from fines to imprisonment.1
In April 2020, Puerto Rico amended its public security law to make it a felony to “transmit or allow the transmission” of “false” statements about government proclamations or orders related to emergencies, including those pertaining to COVID-19.2 Penalties include fines of up to $5,000 and six months of jail time. In May, the American Civil Liberties Union (ACLU) sued the Puerto Rican government, asserting that the law violated constitutionally protected rights to free speech, a free press, and due process.3 Separately, officials in Newark, New Jersey, warned in March 2020 that “any false reporting of the coronavirus in [the] city [would] result in criminal prosecution,” specifically including false information on social media.4
Instances of aggressive prosecution under the CFAA have fueled criticism of the law’s scope and application. It prohibits accessing a computer without authorization, but fails to define the terms ”access” or “without authorization,” leaving the provision open to interpretation in the courts.5 In one prominent case from 2011, programmer and internet activist Aaron Swartz secretly used Massachusetts Institute of Technology servers to download millions of files from JSTOR, a service providing academic articles. Prosecutors sought harsh penalties for Swartz under the CFAA, which could have resulted in up to 35 years’ imprisonment.6 Swartz died by suicide in 2013 before he was tried. After his death, a bipartisan group of lawmakers introduced “Aaron’s Law,” a piece of legislation that would prevent the government from using the CFAA to prosecute terms-of-service violations and stop prosecutors from bringing multiple, redundant charges for a single crime.7 The bill was reintroduced in Congress in 2015, but did not garner enough support to move forward.8 A number of states also have laws on computer hacking or unauthorized access, and several smaller legal cases have highlighted the shortcomings and lack of proportionality of these measures.9
In April 2020, the Supreme Court agreed to hear a case involving the CFAA that led to the conviction of a police officer who accessed police databases for unofficial purposes.10 An amicus brief filed by a group nongovernmental organizations (NGOs)—Electronic Frontier Foundation, Center for Democracy and Technology, and Open Technology Institute—argued for a narrow interpretation of the CFAA, asserting that a lower court’s decision in the case “broadens the CFAA’s scope and transforms it into an all-purpose mechanism for policing objectionable or simply undesirable behavior.”11 A decision was expected in 2021.
- 1American Civil Liberties Union, “Map of States with Criminal Laws Against Defamation,” 2020, https://www.aclu.org/issues/free-speech/map-states-criminal-laws-agains…; Conor Friedersdorf, “The ACLU Takes Aim at Criminal-Defamation Laws,” The Atlantic, December 18, 2018, https://www.theatlantic.com/ideas/archive/2018/12/aclu-test-case-takes-….
- 2Committee to Protect Journalists, “New Puerto Rico Law Threatens Jail Time for Spreading ‘False Information’ about COVID-19,” April 8, 2020, https://cpj.org/2020/04/new-puerto-rico-law-threatens-jail-time-for-spr….
- 3American Civil Liberties Union, “ACLU Challenges Puerto Rico COVID-19 ‘Fake News’ Laws,” ACLU, May 20, 2020, https://www.aclu.org/press-releases/aclu-challenges-puerto-rico-covid-1….
- 4Eric Kiefer, “Newark Police: False Alarms On Coronavirus Will Be Prosecuted,” Patch, March 11, 2020, https://patch.com/new-jersey/newarknj/newark-police-false-alarms-corona….
- 5Electronic Frontier Foundation, “Computer Fraud and Abuse Act Reform,” https://www.eff.org/issues/cfaa; Electronic Frontier Foundation, “Amicus Brief for Van Buren v. United States,” January 17, 2020, https://www.eff.org/document/amicus-brief-van-buren-v-united-states.
- 6The Economist, “Deadly Silence: Aaron Swartz and MIT,” August 3, 2013, https://www.economist.com/international/2013/08/03/deadly-silence.
- 7Representative Zoe Lofgren, Official Website, “Rep Zoe Lofgren Introduces Bipartisan Aaron’s Law,” June 20, 2013, https://lofgren.house.gov/media/press-releases/rep-zoe-lofgren-introduc….
- 8Kaveh Waddell, “'Aaron's Law' Reintroduced as Lawmakers Wrestle Over Hacking Penalties,” National Journal, April 21, 2015, https://www.nationaljournal.com/s/28177.
- 9Joe Johnson, “Georgia Tech student who hacked into UGA computer network gets pretrial diversion,” Athens Banner-Herald, February 26, 2015, https://www.onlineathens.com/joe-johnson/2015-02-25/georgia-tech-studen…; Josh Solomon, “Middle school student charged with cybercrime in Holiday,” Tampa Bay Times, April 9, 2015, https://www.tampabay.com/news/publicsafety/crime/middle-school-student-….
- 10Supreme Court of the United States, “Nathan Van Buren, Petitioner, V. United States,” December 18, 2019, https://www.supremecourt.gov/search.aspx?filename=/docket/docketfiles/h…; Lawrence Bluestone, “Supreme Court Agrees to Decide Scope of Computer Fraud and Abuse Act,” JD Supra, April 25, 2020, https://www.jdsupra.com/legalnews/supreme-court-agrees-to-decide-scope-…; Joseph Marks, “The Cybersecurity 202: There’s Finally a Supreme Court Battle Coming Over the Nation’s Main Hacking Law,” The Washington Post, April 24, 2020, https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-….
- 11Electronic Frontier Foundation, “Amicus Brief for Van Buren v. United States,” January 17, 2020, https://www.eff.org/document/amicus-brief-van-buren-v-united-states.
|Are individuals penalized for online activities?||4.004 6.006|
Prosecutions or detentions for online activities are relatively infrequent. However, the coverage period featured several cases in which people were arrested, charged, or threatened with criminal charges due to their online communications, notably during the COVID-19 pandemic and nationwide protests for racial justice in 2020. There have also been arrests related to the recording or live streaming of police interactions.
Members of the public and online journalists have been investigated, arrested, and charged in connection with online activities related to the ongoing racial justice protests, which ramped up in May 2020:1
- At the end of May and into the first week of June, at least four people were charged with incitement to riot based solely on their social media posts, including content that constitutes protected speech under the First Amendment. Charges against at least one of the accused were soon dropped.2
- On May 29, Bridget Bennett, on assignment for the news agency Agence France-Presse, and Ellen Schmidt, a photojournalist for the Las Vegas Review-Journal, were arrested in Las Vegas and charged with “failure to disperse.”3 While people facing that charge are supposed to be released from jail immediately, the two journalists were held in detention overnight.
- Online journalists were arrested for reporting on protests after citywide curfews, despite displaying press credentials. On May 30, Vice News reporter Alzo Slade was arrested for allegedly breaking curfew in Minneapolis despite identifying himself as a reporter to police.4 Paige Cushman, a KATV journalist in Little Rock, was arrested and detained after streaming video live on Facebook; she was accused of violating curfew even after identifying herself as a member of the press.5
- In June, after the reporting period, five people in New Jersey were charged with online harassment, a felony, for a Twitter post seeking to identify a masked police officer. One man was charged for publishing the post, while the other four had simply shared it.6
Users were also arrested for online activity related to the COVID-19 pandemic:
- Also in April, arrest warrants were issued for a journalist with the online outlet ProPublica and a freelance photographer after they traveled to Virginia’s Liberty University to report on its controversial COVID-19 policies.7 They were accused of trespassing.
- In May, a pastor in Puerto Rico was charged for allegedly violating the territory’s “fake news” law after using WhatsApp to discuss a rumor about an executive order related to COVID-19 (see C2).8 Charges were later dropped.
- Connecticut prosecutors charged a teenager in April with violating computer crime laws by intentionally disrupting a high school’s virtual classes with “obscene language and gestures.”9
Other arrests in recent years in connection with online reporting or speech include the following:
- Robert Frese of Exeter, New Hampshire, was arrested and charged in May 2018 with criminal defamation for posting in the comments section of a local newspaper’s website that the Exeter police chief had “covered up for a dirty cop.”10 The charges were dropped after the state attorney general raised First Amendment concerns.11 On behalf of Frese, the ACLU filed a federal lawsuit in December 2018 to challenge New Hampshire’s criminal defamation law.12 In June 2019, photojournalist Michael Nigro was arrested for trespassing in New York City while photographing and live-streaming a demonstration on climate change.13 He subsequently claimed that he was wearing press credentials at the time of arrest. The charges were dropped in July.
- A trial was ongoing at the end of the coverage period in the case of seven students at the University of Puerto Rico who were originally charged in 2017 with illegal assembly and intimidation of public officers, having participated in and live-streamed protests at the university.14 Facebook handed over private conversations on its platform to prosecutors in the case (see C6).
Police have periodically detained individuals who use their mobile devices to upload images or stream live video of law enforcement activity.15 Most of the arrests have been made on unrelated charges, such as obstruction or resisting arrest, since openly recording police activity is a protected right. In 2017, federal courts upheld the right of bystanders to use their smartphones to record police actions.16 In Miami in September 2019, Emmanuel David Williams was charged with disorderly conduct and resisting an officer without violence; reporting about the incident suggested that Williams’s decision to film his interaction with police contributed to their decision to arrest him.17 Williams subsequently uploaded the content to social media. In 2016, officers in Louisiana detained store owner Abdullah Muflahi for six hours and confiscated his mobile phone after he recorded a fatal shooting by police.18 Chris LeDay, a Georgia-based musician who shared another video of the same incident on Facebook, was arrested soon afterward for unpaid traffic fines.19
In April and May 2019, federal authorities charged WikiLeaks founder Julian Assange with “conspiracy to commit computer intrusion” under the CFAA,20 and with 17 violations of the Espionage Act, for his role in publishing classified documents in 2010.21 Press and internet freedom advocates have expressed concern about these types of charges, and the Assange case specifically,22 arguing that they could have ramifications for the legitimate work of journalists.23 Assange remained in detention in the United Kingdom as of May 2020. Hearings on the US government’s request for his extradition were pending at the end of the coverage period.24
In March 2019, Republican congressman Devin Nunes sued Twitter and the users operating three anonymous accounts for $250 million in damages, alleging defamation.25 In June 2020, a Virginia judge ruled that Twitter was immune from liability under Section 230 of the Communications Decency Act, though the individual users in the case were not protected by this ruling.26
- 1US Press Freedom Tracker, https://pressfreedomtracker.us/; Juliette Rihl, “’If Your Mom Can Go In and See It, So Can the Cops’: How Law Enforcement is Using Social Media to Identify Protesters in Pittsburgh,” Public Source, August 6, 2020, https://www.publicsource.org/pittsburgh-police-arrest-blm-protesters-so…; WKYC Staff, “Mansfield Man Arrested for Making Threatening Posts on Social Media,” WKYC Studios, June 5, 2020, https://www.wkyc.com/article/news/crime/man-arrested-for-making-threate…; Amy Renee Leiker, “Outcry Follows Arrest of 2 Men Over Social Media Post that Urged Violence in Wichita Area,” The Wichita Eage, June 4, 2020, https://www.kansas.com/news/local/crime/article243267626.html.
- 2Cyrus Farivar and Olivia Solon, “FBI Arrests of Protestors based on Social Media Posts Worry Legal Experts,” Yahoo News, June 19, 2020, https://news.yahoo.com/fbi-trawled-facebook-arrest-protesters-151200987….
- 3U.S. Press Freedom Tracker, “Photojournalists for Review-Journal Arrested While Covering Las Vegas Protest,” May 29, 2020, https://pressfreedomtracker.us/all-incidents/photojournalists-review-jo….
- 4Benjamin Mullin, “Reports of Violence Against Journalists Mount as U.S. Protests Intensify,” The Wall Street Journal, June 1, 2020, https://www.wsj.com/articles/reports-of-violence-against-journalists-mo….
- 5Brent Renaud, “KATV Journalist Detained While Livestreaming Little Rock Protests,” U.S. Press Freedom Tracker, June 2, 2020, https://pressfreedomtracker.us/all-incidents/katv-journalist-detained-w….
- 6Adi Robertson, “One Tweet Tried to Identify a Cop—Then Five People were Charged with Felony Harassment,” The Verge, August 6, 2020, https://www.theverge.com/2020/8/6/21355999/twitter-cyber-harassment-fel….
- 7U.S. Press Freedom Tracker, “Liberty University Obtains Trespassing Warrants Against Two Journalists,” April 6, 2020, https://pressfreedomtracker.us/all-incidents/liberty-university-obtains….
- 8Tim Selloh, “ACLU Files Lawsuit Over Puerto Rico ‘Fake News’ Laws Feared by Journalists Covering Pandemic,” NBC News, May 20, 2020, https://www.nbcnews.com/news/latino/aclu-files-lawsuit-over-puerto-rico….
- 9Zach Murdock, “Madison Teen Arrested for ‘Zoom Bombing’ High School Classes,” Hartford Courant, April 8, 2020, https://www.courant.com/breaking-news/hc-br-madison-schools-zoom-bombin…; Rachel Bercovitz, “Prosecuting Zoom-Bombing,” Lawfare Blog, April 24, 2020, https://www.lawfareblog.com/prosecuting-zoom-bombing.
- 10Alex LaCasse, “Exeter police drop charge alleging defamation of chief,” Seacoast Online, June 7, 2018, https://www.seacoastonline.com/news/20180607/exeter-police-drop-charge-…; Brian Hauss, “New Hampshire Police Arrested a Man for Being Mean to Them on the Internet,” American Civil Liberties Union, December 18, 2018, https://www.aclu.org/blog/free-speech/internet-speech/new-hampshire-pol….
- 11Ethan DeWitt, “In federal lawsuit, New Hampshire ACLU targets criminal libel laws,” Concord Monitor, December 18, 2018, https://www.concordmonitor.com/ACLU-New-Hampshire-lawsuit-targets-crimi…; Adam Liptak, “He Disparaged the Police on Facebook. So They Arrested Him.” The New York Times, January 7, 2019, https://www.nytimes.com/2019/01/07/us/politics/criminal-libel-laws-laws….
- 12American Civil Liberties Union, “Lawsuit Filed on Behalf of Man Arrested for Criticizing Cops,” December 18, 2018, https://www.aclu.org/press-releases/aclu-files-first-amendment-challeng….
- 13U. S. Press Freedom Tracker, “Photojournalist arrested while covering climate demonstration, equipment seized,” July 9, 2019, https://pressfreedomtracker.us/all-incidents/photojournalist-arrested-w…; Michael Nigro, “Facebook Livestream,” June 22, 2020, https://www.facebook.com/nigrotime/videos/10155948948686652/.
- 14Alleen Brown and Alice Speri, “Facebook Warrant Targeting Student Journalists in Puerto Rico Prompts Fears of Political Surveillance,” January 19, 2020, https://theintercept.com/2020/01/19/puerto-rico-university-protests-fac….
- 15Frank Eltman, “Citizens filming police often find themselves arrested,” Albuquerque Journal, August 30, 2015, http://www.abqjournal.com/636460/citizens-filming-police-often-find-the….
- 16Matt Ford, “A Major Victory for the Right to Record Police,” The Atlantic, July 7, 2017, https://www.theatlantic.com/politics/archive/2017/07/a-major-victory-fo….
- 17Jerry Iannelli, “Video Shows Miami Cops Attacking Black Man for Recording Them With Cell Phone,” Miami New Times, September 24, 2019, https://www.miaminewtimes.com/news/video-miami-cops-arrest-black-man-re….
- 18Democracy Now! “Meet Abdullah Muflahi: He Filmed Alton Sterling Shooting and Was Then Detained by Baton Rouge Police,” July 13, 2016, https://www.democracynow.org/2016/7/13/meet_abdullah_muflahi_he_filmed_….
- 19Rachael Revesz, “Alton Sterling shooting: Man who posted video of killing arrested,” The Independent, July 15, 2016, https://www.independent.co.uk/news/world/americas/alton-sterling-shooti….
- 20Brian Fung, “What law is Julian Assange accused of breaking?” The Washington Post, April 12, 2019, https://www.washingtonpost.com/technology/2019/04/11/what-law-is-julian…; The United States Attorney’s Office Eastern District of Virginia, “WikiLeaks Founder Charged in Computer Hacking Conspiracy,” April 11, 2019, https://www.justice.gov/usao-edva/pr/wikileaks-founder-charged-computer….
- 21Charlie Savage, “Assange Indicted Under Espionage Act, Raising First Amendment Issues,” The New York Times, May 23, 2019, https://www.nytimes.com/2019/05/23/us/politics/assange-indictment.html.
- 22Cindy Cohn, “EFF Statement on Assange Indictment and Arrest,” Electronic Frontier Foundation, April 11, 2019, https://www.eff.org/deeplinks/2019/04/eff-statement-assange-indictment-…; Avi Asher-Schapiro and CPJ North America Research Associate, “Tech journalists troubled by Assange computer intrusion charge,” Committee to Project Journalists, June 20, 2019, https://cpj.org/blog/2019/06/tech-journalists-troubled-assange-CFAA-cha…; Kenneth Roth, “The Assange prosecution threatens modern journalism,” Human Rights Watch, April 12, 2019, https://www.hrw.org/news/2019/04/12/assange-prosecution-threatens-moder…; Knight First Amendment Institute at Columbia University, “Knight Institute Comment on Indictment of Julian Assange,” April 11, 2019, https://knightcolumbia.org/content/knight-institute-comment-indictment-….
- 23Michael M. Grynbaum and Marc Tracy, “‘Frightening’: Charges Against Julian Assange Alarm Press Advocates,” The New York Times, May 23, 2019, https://www.nytimes.com/2019/05/23/business/media/assange-first-amendme…; Avi Asher-Schapiro and CPJ North America Research Associate, “Tech journalists troubled by Assange computer intrusion charge,” Committee to Project Journalists, June 20, 2019, https://cpj.org/blog/2019/06/tech-journalists-troubled-assange-CFAA-cha….
- 24Jacob Jarvis, “Julian Assange’s Extradiction Hearing Dealyed to at Least September, WikiLeaks Announces,” Newsweek, May 4, 2020, https://www.newsweek.com/julian-assange-extradition-delayed-september-w….
- 25Devin G. Nunes v. Twitter, Inc, Elizabeth A. Mair, Mair Strategies, LLC, “Devin Nunes’ Mom “[@DevinNunesMom] “Devin Nunes’ Cow” [@DevinCow], March 18, 2018, https://www.scribd.com/document/402297422/Nunes-Complaint-3-18-19?platf….
- 26Bryan Pietsch, “Devin Nunes Can’t Sue Twitter Over Cow and Mom Parodies, Judge Says,” The New York Times, June 25, 2020, https://www.nytimes.com/2020/06/25/us/politics/devin-nunes-cow-tweets.h….
|Does the government place restrictions on anonymous communication or encryption?||3.003 4.004|
There are no legal restrictions concerning user anonymity on the internet, and constitutional precedents protect the right to anonymous speech in many contexts. At least one state law that stipulates journalists’ right to withhold the identities of anonymous sources has been found to apply to bloggers.1
The terms of service and other contracts enforced by some social media platforms can require users to register under their real names.2 Online anonymity has been challenged in cases involving hate speech, defamation, and libel. In 2015, a Virginia court tried to compel the customer-review platform Yelp to reveal the identities of anonymous users, but the Supreme Court of Virginia ruled that the company did not have the authority to do so.3 In May 2019, a court ruled that Reddit did not need to reveal the identity of one of its users to a plaintiff who was suing for copyright infringement.4
There are no legal limitations on encryption technology, but both the executive and legislative branches have at times moved to undermine encryption.5 In June 2019, Politico reported that the Trump administration was considering a legal ban on any encryption technology that would not allow law enforcement access.6 The following month, Attorney General William Barr argued that “warrant-proof encryption” degrades law enforcement agencies’ ability to detect, prevent, and investigate crimes.7 Subsequently, Barr requested that Facebook delay plans to encrypt messaging across its major products, citing public safety.8
In its original form, the draft EARN IT Act would have paved the way for weakening encryption, although the bill has since been changed to address these concerns in part (see B3).9 While a Senate committee approved the EARN IT Act in July 2020 with an amendment that would “exclude encryption” from the measure’s broader changes to Section 230 liability,10 advocates and some legal scholars still argued that the bill could set the stage for restrictions on the use of encryption across online platforms.11 In May 2020, in response to the shortcomings of the EARN IT Act, a group of Democratic senators introduced the Invest in Child Safety Act of 2020, an alternative bill that would maintain existing encryption standards while addressing online child exploitation.12
The proposed Lawful Access to Encrypted Data (LAED) Act, introduced in June 2020,13 goes significantly further than EARN IT to weaken encryption. The LAED Act would require the creation of a back door to encryption systems, so that both device manufacturers and service providers could decrypt devices and information at the request of law enforcement.14 Civil society groups, technical experts, and cybersecurity advocates have expressed strong opposition to the proposal.15
The degree to which courts can force technology companies to alter their products to enable government access is unclear. Following a terrorist attack in San Bernardino in 2015, the federal government obtained a court order that would have required Apple to create new software enabling the FBI to access the locked phone of one of the perpetrators.16 Apple resisted, and the case was dropped after the FBI gained access by other means. An inspector general’s report on the matter indicated that the FBI deliberately reduced its efforts to find a technical solution in an apparent attempt to set up a favorable and public legal confrontation with Apple.17
Similarly in December 2019, the Justice Department asked Apple to unlock two phones used by a gunman who attacked a Navy facility in Florida.18 Although the company did not comply, the government announced in May 2019 that it had broken into the phone. Security experts and civil rights groups expressed concern over the department’s request, arguing that forcing companies to create back doors for law enforcement undermines security, privacy, and public trust.19
The broader legal questions around encryption remain unresolved.20 Some efforts have been made to codify rules barring the government from requiring back doors for surveillance. In June 2018, a bipartisan group of lawmakers once again attempted to pass a bill first introduced in 2016 that would prohibit state and local governments from mandating backdoor access to devices.21 As of May 2020, it had not been voted on in either the House or the Senate.
The Communications Assistance for Law Enforcement Act (CALEA) currently requires telephone companies, broadband providers, and interconnected Voice over Internet Protocol (VoIP) providers to design their systems so that communications can be easily intercepted when government agencies have the legal authority to do so, although it does not cover online communications tools such as Gmail, Skype, and Facebook.22 Calls to update CALEA to cover online applications have not been successful. In 2013, 20 technical experts published a paper explaining why such an expansion (known as CALEA II) would create significant internet security risks.23
- 1Electronic Frontier Foundation, “Apple v. Does,” http://www.eff.org/cases/apple-v-does.
- 2Erica Newland, et al., “Account Deactivation and Content Removal: Guiding Principles and Practices for Companies and Users,” The Berkman Center for Internet and Society and the Center for Democracy and Technology, September 2011, https://www.cdt.org/files/pdfs/Report_on_Account_Deactivation_and_Conte….
- 3Justin Jouvenal, “Yelp won’t have to turn over names of anonymous users after court ruling” The Washington Post, April 16, 2015, https://www.washingtonpost.com/local/crime/yelp-wont-have-to-turn-over-….
- 4Victoria Song, “Court Rules Redditor Can Stay Anonymous in Significant Copyright Case,” Gizmodo, April 23, 2019, https://gizmodo.com/court-rules-redditor-can-stay-anonymous-in-signific….
- 5The United States Department of Justice, “Attorney General William P. Barr Delivers Keynote Address at the International Conference on Cyber Security,” July 23, 2019, https://www.justice.gov/opa/speech/attorney-general-william-p-barr-deli….
- 6Eric Geller, “Trump officials weigh encryption crackdown,” Politico, June 27, 2019, https://www.politico.com/story/2019/06/27/trump-officials-weigh-encrypt…; Zak Doffman, “U.S. May Outlaw Messaging Encryption Used By WhatsApp, iMessage And Others, Report,” Forbes, June 29, 2019, https://www.forbes.com/sites/zakdoffman/2019/06/29/u-s-may-outlaw-uncra….
- 7Kate Cox, “Tech firms ‘can and must’ put backdoors in encryption, AG Barr says,” ArsTechnica, July 23, 2019, https://arstechnica.com/tech-policy/2019/07/tech-firms-can-and-must-put….
- 8Robert McMillan, et al., “Barr Presses Facebook on Encryption, Setting Up Clash Over Privacy,” The Wall Street Journal, October 4, 2019, https://www.wsj.com/articles/attorney-general-calls-on-facebook-to-limi….
- 9Eric Goldman, “The EARN IT Act Partially Repeals Section 230, But It Won’t Help Children,” Technology & Marketing Law Blog, March 10, 2020, https://blog.ericgoldman.org/archives/2020/03/the-earn-it-act-partially…; Riana Pfefferkorn, The EARN IT Act is Here. Surprise, it’s Still Bad News, The Center for Internet and Society, Stanford, Mar, 5, 2020, https://cyberlaw.stanford.edu/blog/2020/03/earn-it-act-here-surprise-it….
- 10Makena Kelly, “A Weakened version of the EARN IT Act Advances Out of Committee,” The Verge, July 2, 2020, https://www.theverge.com/2020/7/2/21311464/earn-it-act-section-230-chil….
- 11Riana Pfefferkorn, “The EARN IT Act Threatens our Online Freedoms. New Amendments Don’t Fix It.” Stanford Law School, The Center for Internet and Society, July 6, 2020, http://cyberlaw.stanford.edu/blog/2020/07/earn-it-act-threatens-our-onl…; EARN IT Act Remains Fundamentally Flawed After Senate Judiciary Committee Markup, Center for Democracy and Technology, July 2, 2020, https://cdt.org/press/earn-it-act-remains-fundamentally-flawed-after-se….
- 12Joseph Marks, ‘The Cybersecurity 202: Democrats push a bill to combat child pornography without undermining encryption,” Washington Post, May 7, 2020, https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-….
- 13Andrew Crocker, “The Senate’s New Anti-Encryption Bill is Even Worse Than EARN IT, and That’s Saying Something,” Electronic Frontier Foundation, June 24, 2020, https://www.eff.org/deeplinks/2020/06/senates-new-anti-encryption-bill-….
- 14Senate Committee on the Judiciary, “ Graham, Cotton, Blackburn Introduce Balanced Solution to Bolster National Security, End us of Warrant-Proff Encryption that Shields Criminal Activity,” June 23, 2020, https://www.judiciary.senate.gov/press/rep/releases/graham-cotton-black….
- 15Riana Pfefferkorn, “There’s Now an Even Worse Anti-Encryption Bill than EARN IT. That Doesn’t Make the EARN IT Bill Ok,” Stanford Law School, The Center for Internet and Society,” June 24, 2020, https://cyberlaw.stanford.edu/blog/2020/06/there%E2%80%99s-now-even-wor….; Richie Koch, “The Lawful Access to Encrypted Data Act wants to ban strong encryption,” ProtonMail, July 22, 2020, https://protonmail.com/blog/usa-laed-act-anti-encryption/; Andrew Crocker, The Senate’s New Anti-Encryption Bill Is Even Worse Than EARN IT, and That’s Saying Something, Electronic Frontier Foundation, June 24, 2020, https://www.eff.org/deeplinks/2020/06/senates-new-anti-encryption-bill-….
- 16Julia Angwin, “What’s Really at Stake in the Apple Encryption Debate,” ProPublica, February 24, 2016, https://www.propublica.org/article/whats-really-at-stake-in-the-apple-e….
- 17Julian Sanchez, “Remember the Apple-FBI Fight?” Cato Institute, April 2, 2018, https://www.cato.org/publications/commentary/remember-apple-fbi-fight.
- 18Eric Geller, “Apple Rebukes DOJ Over Pensacola iPhone Encryption Battle,” Politico, January 14, 2020, https://www.politico.com/news/2020/01/14/apple-rebukes-doj-over-pensaco….
- 19New American Open Technology Institute Press Release, “Open Technology Institute Opposes Government Attempt to Mandate Backdoor into Apple iPhone,” February 17, 2016, https://www.newamerica.org/oti/press-releases/open-technology-institute….
- 20Cory Bennett, “Lawmakers skeptical of FBI’s encryption warnings,” The Hill, April 29, 2015, https://thehill.com/policy/cybersecurity/240553-lawmakers-skeptical-of-…; Robert Hackett, “The Encryption Wars are Back on in Congress. Here’s What’s at Stake,” Fortune, June 29, 2020, https://fortune.com/2020/06/29/encryption-backdoors-computer-security-c….
- 21Morgan Chalfant, “Lawmakers renew push to preempt state encryption laws,” The Hill, June 7, 2018, https://thehill.com/policy/cybersecurity/391157-lawmakers-renew-push-to…; 115th Congress, “Ensuring National Constitutional Rights for Your Private Telecommunications Act of 2018 or the ENCRYPT Act of 2018 H.R.6044,” June 7, 2018, https://www.congress.gov/bill/115th-congress/house-bill/6044.
- 22Charlie Savage, “U.S. Tries to Make it Easier to Wiretap the Internet,” The New York Times, September 27, 2010, https://www.nytimes.com/2010/09/27/us/27wiretap.html?pagewanted=all&_r=0; Declan McCullagh, “FBI: We Need Wiretap-Ready Websites – Now,” CNET, May 4, 2012, https://www.cnet.com/news/fbi-we-need-wiretap-ready-web-sites-now/.
- 23Ben Adida et al., “CALEA II: Risks of Wiretap Modifications to Endpoints,” Center for Democracy & Technology, May 17, 2013, https://cdt.org/wp-content/uploads/pdfs/CALEAII-techreport.pdf.
|Does state surveillance of internet activities infringe on users’ right to privacy?||2.002 6.006|
The legal framework for government surveillance has been open to abuse. Government authorities’ monitoring of social media continued during the coverage period with minimal oversight and transparency, and the targets included US citizens and residents engaged in constitutionally protected activity like protests and journalism.
Using a range of monitoring tools, federal and local authorities surveilled protesters during nationwide demonstrations for racial justice in 2020 (see B8).1 Elements of the DHS and other agencies have reportedly accessed and analyzed demonstrators’ private communications, through processes that appeared to lack judicial oversight and other democratic safeguards.2 Drones conducting surveillance in some cities may have been equipped with “dirtboxes,” which collect mobile-phone location information and other data.3 Moreover, some agencies were granted expanded surveillance powers.4 In June 2020, the Drug Enforcement Administration (DEA) was revealed to have been granted new capacities to “conduct covert surveillance” on protesters.5
Information that might clarify the extent of the protest-related surveillance and its impact on free association and assembly has largely remained secret, in part due to a lack of legal requirements for oversight and transparency. News reports have uncovered the use of some tools. In July 2020, the Intercept reported that certain police agencies were given intelligence packages filled with content and data that the private intelligence firm Dataminr pulled from Twitter.6 For example, posts discussing the officers involved in George Floyd’s death were sent to Dataminr’s clients. More broadly, media reports have confirmed that federal agencies or local police departments across the country, including in Pittsburgh, Minneapolis, Los Angeles, and Washington, DC, were monitoring and collecting information from posts, comments, live streams, images, and videos shared on Facebook, Instagram, Twitter, and other platforms. 7 Such monitoring led to several arrests (see C3).
Outside of the Black Lives Matter protests, government agencies, including the FBI,8 DHS, 9 Navy,10 and local police departments, are increasingly monitoring or proposing to monitor social media via numerous techniques. The information collected is subsequently stored in massive databases and can be shared with local, state, and federal authorities as well as multilateral government organizations and foreign states. The Brennan Center for Justice has detailed the extent to which the Department of Homeland Security (DHS)—specifically ICE, Customs and Border Protection (CBP), US Citizenship and Immigration Services (USCIS), and the Transportation Security Administration (TSA)—monitor social media.11 In 2016, the Brennan Center also identified more than 151 cities, counties, and local and state agencies that had purchased products for monitoring social media activities.12 These programs often employ automated systems, including advanced technology obtained from private contractors such as Palantir and Giant Oak.13 Investigators have also created fake Facebook accounts to gain access to targets’ personal networks and to follow their online activity. This technique has sometimes been used against civic activists.14
Peaceful protest movements and civic groups were specifically targeted for social media surveillance in the years prior to the 2020 protests. In 2018 and 2019, there were multiple reports of the FBI, ICE, and CBP gathering information on immigration-related activist groups, environmentalist protesters, anti-Trump demonstrators, and journalists and lawyers active in the southern border region.15 In May 2020, Vice News reported that police at the University of California at Santa Cruz employed military surveillance technology borrowed from the California National Guard to monitor a graduate student worker strike, including the social media activities of the strikers.16
In May 2019, the State Department enacted a new policy that vastly expanded its collection of social media information, 17 requiring people applying for a US visa, of whom there are about 15 million each year, to provide social media details, email addresses, and phone numbers going back five years.18 In December 2019, the Brennan Center, the Knight First Amendment Institute at Columbia University, and the law firm Simpson Thacher & Bartlett LLP filed a lawsuit on behalf of two nonprofit documentary filmmaker organizations to challenge the requirements.19
Warrantless searches of electronic devices at the border have escalated in recent years. In fiscal year 2019, CBP reported 40,913 device searches, up from 33,295 in 2018;20 only 5,085 were reported in 2012.21 Federal authorities claim to have expansive search and seizure powers, which are traditionally limited by the constitution’s Fourth Amendment, within “border zones”—defined as up to 100 miles from any border, an area encompassing about 200 million residents. The 2018 Directive No. 3340-049a provides CBP with broad powers to conduct device searches and requires travelers to provide their device passwords to CBP agents. A “basic search” under this authority can be conducted “with or without suspicion” on any person’s device, at any time, for any reasons, or for no reason at all, without a warrant.22 During the search, CBP is supposed to examine only what is physically “resident” on the device—such as pictures or texts—and not content accessible through the internet.23 However, even disconnected devices can contain sensitive information associated with, for example, social media activity.24 The directive also gives CBP the power to conduct an “advanced search,” with the use of external equipment to “review, copy, and/or analyze” the device’s contents. Advanced searches require “reasonable suspicion” of illegal activity or a “national security concern,” and agents must obtain supervisory approval. CBP has purchased technology from the Israeli company Cellebrite that allows agents to extract information stored on a device or online within seconds.25 This information can then be stored in interagency databases that aggregate data from other monitoring programs.26
Federal appeals courts are currently split on the legality of warrantless electronic device searches in border zones.27 In 2017 and again in May 2019, a bipartisan group of senators introduced legislation requiring agents to obtain a warrant before searching the electronic devices of US citizens or permanent residents, and forbidding them from detaining people for more than four hours while trying to persuade them to unlock their phones.28 Civil rights groups have also challenged the searches in court,29 filing a lawsuit on behalf of 10 US citizens and one legal permanent resident. In November 2019, a federal court in Boston ruled in favor of the plaintiffs, holding that border agents must have reasonable suspicion of a crime before conducting a search.30 The government is appealing the decision.
In January 2020, amid rising tensions with Iran after the US assassination of a senior Iranian general in Iraq, CBP reportedly confiscated the phones of several detained Iranians and Iranian-Americans at the US-Canada border and ordered them to provide social media passwords.31 Separately, the Financial Times reported in September 2020 that several Chinese students were pressured to hand their electronic devices to CBP agents when leaving the United States.32 In 2018, the Committee to Protect Journalists and Reporters Without Borders found 20 cases in which border agents conducted warrantless searches of journalists’ electronic devices.33 One reporter wrote in the Intercept in June 2019 that a CBP official at the US-Mexico border spent three hours searching through his phone, reviewing and asking questions about photos, emails, personal and professional files, videos, calls, texts, and messages on encrypted communication apps, including conversations with colleagues and journalistic sources.34
The legal framework for foreign intelligence surveillance has in practice permitted the collection of data on US citizens and residents. Such surveillance is governed in part by the USA PATRIOT Act, which was passed following the terrorist attacks of September 11, 2001, and expanded official surveillance and investigative powers.35 In 2015, President Barack Obama signed the USA FREEDOM Act, which extended expiring provisions of the PATRIOT Act, including broad authority for intelligence officials to obtain warrants for roving wiretaps of unnamed “John Doe” targets and surveillance of lone individuals with no evident connection to terrorist groups or foreign powers.36 At the same time, the new legislation was meant to end the government’s bulk collection of domestic call detail records (CDRs)—the metadata associated with telephone interactions—under Section 215 of the 2001 law. The bulk collection program was detailed in documents leaked by former National Security Agency (NSA) contractor Edward Snowden in 2013,37 and it was ruled illegal by the US Second Circuit Court of Appeals in 2015.38
The USA FREEDOM Act replaced the domestic bulk collection program with a system that allows the NSA to access US call records held by phone companies after obtaining an order from the Foreign Intelligence Surveillance Court, also called the FISA Court, in reference to the 1978 Foreign Intelligence Surveillance Act.39 Requests for such access require use of a “specific selection term” (SST) representing an “individual, account, or personal device,”40 which is intended to prevent broad requests for records based on a zip code or other imprecise indicators. An SST provision also applies when intelligence agents use Section 215 to obtain information other than CDRs, or when they use FISA pen registers and trap-and-trace devices (instruments that capture a phone’s outgoing or incoming call records) or national security letters (secret administrative subpoenas used by the FBI to demand certain types of communications and financial records).41 The definition of SST, however, varies depending on the authority used, and civil liberties advocates have noted that the SST provision for non-CDR Section 215 requests, in particular, is very broad.42
Another component of the USA FREEDOM Act established a panel of amici curiae with expertise in “privacy and civil liberties, intelligence collection, communications technology, or any other area that may lend legal or technical expertise” to the FISA Court, so that the judges are not forced to rely on the arguments of the government alone in weighing requests. The court must appoint an amicus in any case that, “in the opinion of the court, presents a novel or significant interpretation of the law.” However, the court can waive this requirement by issuing “a finding that such appointment is not appropriate.”43 Five people are currently designated to serve as amici curiae.44
Although the reforms to Section 215 under the USA FREEDOM Act were an improvement, numerous problems have since come to light.45 Although the law was supposed to end bulk collection of CDRs, official statistics showed that a massive amount was still being acquired. Between 2016 and 2018, the number of “received” CDRs increased from over 151 million in 2016 to more than 434 million in 2018.46 In April 2018, the NSA revealed that technological problems caused it to collect data about phone calls it was not authorized to collect.47 As a result, the NSA purged all of the records it had obtained over the preceding three years. The NSA paused the program a few months later, and in April 2019, the agency recommended that the White House not seek reauthorization of the program because its operational complexities and legal liabilities outweighed the value of the intelligence gained.48 Nonetheless, the administration asked Congress to permanently reauthorize the CDR program. Government watchdogs maintain that the CDR program authority should not be renewed because it is “highly invasive,” it lacks evidence of efficacy in protecting the country from security threats,49 and it is technically dysfunctional.50
Section 215, the roving wiretaps provision, and the lone-wolf amendment all expired on March 15, 2020, after the Senate declined to take up a House-passed reauthorization bill.51 However a “savings clause” allowed officials to continue using the authorities for investigations that had begun before the expiration, or for new examinations of incidents that occurred before that date.52
The Senate passed the draft USA FREEDOM Reauthorization Act on May 14, 2020.53 Although an amendment to the bill prohibiting the warrantless gathering of users’ internet browsing histories was defeated,54 senators approved an amendment that would strengthen the role of amici curiae by giving them greater access to information, granting them new authority to bring matters to the FISA Court, and adding to the categories of cases in which there should be a presumption that they will participate.55 The House, however, canceled a floor vote on the Senate-passed bill when Republicans pulled their support.56 No further progress on the bill had been reported as of August 2020.
Various other components of the legal framework still allow surveillance by intelligence agencies that lacks oversight, specificity, and transparency:
- Section 702 of FISA: Section 702, adopted in 2008 as part of the FISA Amendments Act, authorizes the NSA, acting inside the United States, to collect the communications of any foreigner overseas as long as a significant purpose of the collection is to obtain “foreign intelligence,” a term broadly defined to include any information that “relates to … the conduct of the foreign affairs of the United States.”57
Section 702 surveillance involves both “downstream” (also known as PRISM) collection, in which stored communications data—including content—is obtained from US technology companies, and “upstream” collection (see below), in which the NSA collects users’ communications as they are in transit over the internet backbone.58
Although Section 702 only authorizes the collection of information pertaining to foreign citizens outside the United States, Americans’ communications are inevitably swept up in this process in large amounts, and these too are stored in a searchable database.59
In 2016, during the FISA Court’s annual review and reauthorization of surveillance conducted under Section 702, the government notified a FISA Court judge of widespread violations of protocols intended to limit NSA analysts’ access to Americans’ communications.60 Upstream collection is more likely than other programs to incidentally collect communications sent between US citizens.61 The report showed that analysts had failed to take steps to ensure that they were not improperly searching the upstream database when conducting certain types of queries.
In response, the court delayed reauthorizing the program, and in 2017 the NSA director recommended that the agency halt its collection of communications if they merely mentioned information relating to a surveillance target (referred to as “about” collection), and instead only collect communications to and from the target.62 Privacy advocates welcomed the decision, but emphasized that the incident underscored the need for legislative reform of Section 702.
Section 702 was reauthorized for six years in January 2018.63 Despite robust advocacy efforts from civil liberties and privacy watchdogs, there were few legal changes. The renewal legislation did not prohibit “about” collection, meaning the NSA could legally attempt to resume the practice as long as it first obtained the FISA Court’s approval and gave Congress advance notice. Congress also rejected calls to require the government to obtain a warrant before searching through data obtained under Section 702 to find the communications of US persons.64
The final bill did contain a provision requiring a warrant when FBI agents seek to review the content of communications belonging to an American who is already the subject of a predicated criminal investigation not relating to national security. Observers noted that these criteria were too narrow to require a warrant in most cases.65 The 2018 reauthorization also included measures to increase transparency, such as a requirement that the attorney general brief members of Congress on how the government uses information collected under Section 702 in official proceedings such as criminal prosecutions.66
In October 2019, the FISA Court released three opinions originally issued in 2018.67 In the decisions, the court found that the FBI had conducted a “large number” of searches of Section 702 data that did not comply with internal rules, the statute, or the Fourth Amendment, because they were not “reasonably likely to return foreign-intelligence information or evidence of a crime.”68 Tens of thousands of Americans had been subject to these improper searches. The court also found that the FBI violated the law by not reporting the number of times it searched for Americans’ data.69
In May 2020, the intelligence community released its annual Statistical Transparency Report, which details the frequency with which the government uses certain national security powers. It documented an increase in Section 702 surveillance targets from 89,128 in 2013 to 204,968 in 2019.70 The report also contained evidence of the government’s noncompliance with another provision of the reauthorization law. In six instances in 2018 in which the FBI reviewed the contents of Americans’ communications after conducting a search in a criminal, non–national security case, the bureau failed to obtain a warrant as required by law.71 In combination with the FISA Court opinions released in October 2019, this revelation added to ongoing concerns about insufficient oversight of such surveillance programs.72
- FISA Title I: Under Title I of FISA,73 the Justice Department may obtain a court order to conduct surveillance of Americans or foreigners inside the United States if it can show probable cause to suspect that the target is a foreign power or an agent of a foreign power. In December 2019, the department’s inspector general released a report finding that the applications to conduct surveillance of former Trump campaign aide Carter Page had been riddled with errors and omissions.74 The inspector general followed up by reviewing a sample of 29 applications filed in other cases, and in March 2020 released a memorandum finding pervasive errors in these cases, along with a failure to abide by internal procedures meant to ensure the accuracy of applications.75
- Executive Order 12333: Originally issued in 1981, Executive Order (EO) 12333 is the primary authority under which US intelligence agencies gather foreign intelligence; essentially, it governs all collection that is not governed by FISA, and it includes most collection that takes place overseas. The extent of current NSA practices authorized under EO 12333 is unclear, but documents leaked in 2013 suggest that it was the legal basis for the so-called MYSTIC program, in which all of the incoming and outgoing phone calls of one or more target countries were captured on a rolling basis. The Intercept identified the Bahamas, Mexico, Kenya, and the Philippines as targets in 2014.76 Although EO 12333 cannot be used to target a “particular, known” US person (because any such acquisition must comply with FISA), the very fact that bulk collection is permissible under the order ensures that Americans’ communications will be incidentally collected, and likely in very significant numbers. Moreover, questions linger as to whether the government relies on EO 12333 to conduct any surveillance inside the United States—a worrisome prospect given that surveillance under the order is not subject to any judicial oversight.77 These questions took on new salience in March 2020, when Senator Richard Burr, chairman of the Senate Select Committee on Intelligence, warned that if Congress failed to reauthorize Section 215 of the USA PATRIOT Act, the president would obtain the same information using EO 12333.
A law passed in 2014 included a requirement that the NSA develop “procedures for the retention of incidentally acquired communications” of Americans collected pursuant to EO 12333, and that such communications may not be retained for more than five years except when subject to certain broad exemptions.78 In 2015, the Obama administration updated a 2014 policy directive that put in place new restrictions relevant to EO 12333 on the use of information collected in bulk for foreign intelligence purposes.79 Civil society groups, however, continue to campaign for more information about how the executive order is being used and for comprehensive reform.80
Access to metadata for law enforcement, as opposed to intelligence, generally requires a subpoena issued by a prosecutor or investigator without judicial approval.81 Judicial warrants are only required in California under the California Electronic Communications Privacy Act (CalECPA), which has been in effect since 2016.82 In criminal probes, law enforcement authorities can monitor the content of internet communications in real time only if they have obtained an order issued by a judge, under a standard that is somewhat higher than the one established under the constitution for searches of physical places. The order must reflect a finding that there is probable cause to believe that a crime has been, is being, or is about to be committed.
More uncertain is the status of stored communications. One federal appeals court has ruled that constitutional protections apply to stored communications, so that a judicial warrant is required for government access.83 However, the 1986 Electronic Communications Privacy Act (ECPA) states that the government can obtain access to email or other documents stored in the cloud with a subpoena, subject to certain conditions.84 In 2016, the House of Representatives passed the Email Privacy Act, which would require the government to obtain a probable cause warrant before accessing email or other private communications stored with cloud service providers.85 The bill was reintroduced in 2017 and again passed the House, but it failed to pass the Senate during the 2017–18 Congress.86
Other legal implications of law enforcement access to devices have been debated in the courts. In 2016, a Maryland state appellate court ruled that law enforcement bodies must obtain a warrant before using “covert cell phone tracking devices” known by the product name Stingray.87 Several other court decisions subsequently affirmed that police must obtain a warrant before using this technology.88 Stingray devices mimic mobile network towers, causing nearby phones to send identifying information and thus allowing police to track targeted phones or determine the phone numbers of people in the area. In its decision, the Maryland court rejected the argument that because turning on one’s phone allows the service provider’s towers to send and receive signals from the device, individuals are effectively “volunteering” their private information for use by other third parties.89 As of November 2018, the ACLU had identified 75 agencies across the country that use Stingray devices.90 In May 2020, the organization also revealed that between 2017 and 2019, ICE used similar devices at least 466 times.91
In 2017, the Detroit News obtained court documents showing that federal agents used Stingray devices to find and arrest an undocumented immigrant.92 Privacy advocates argue that because the devices collect information from mobile phones in the area surrounding the target, and thus constitute mass surveillance, their use by law enforcement agencies should be limited to serious cases involving violent crimes, not immigration violations.93 In December 2019, the ACLU sued CBP and ICE, alleging that they had “failed to produce records” and data on their use of Stingray devices.94
- 1Caroline Haskins and Ryan Mac, “Here are the Minneapolis Police’s Tools to Identify Protesters,” Buzzfeed News, May 29, 2020, https://www.buzzfeednews.com/article/carolinehaskins1/george-floyd-prot…; Connie Fossi and Phil Prozzen, “Miami Police Used Facial Recognition Technology in Protester's Arrest,“ NBC News, August 17, 2020, https://www.nbcmiami.com/investigations/miami-police-used-facial-recogn….
- 2Shane Harris, “DHS Analyzed Protester Communications, Raising Questions about Previous Statements by Senior Department Official,” The Washington Post, July 31, 2020, https://www.washingtonpost.com/national-security/dhs-analyzed-protester…; Ken Klippenstein, “Federal Agencies Tapped Protesters’ Phones in Portland,” The Nation, September 21, 2020, https://www.thenation.com/article/politics/homeland-security-portland/.
- 3Joseph Cox, “The Military and FBI are Flying Surveillance Planes Over Protests,” Vice News, June 3, 2020, https://www.vice.com/en_us/article/y3zvwj/military-fbi-flying-surveilla…; Douglas Perry, “Law Enforcement is Using Aircraft to Collect Cell-Phoe, oter Data on Protesters, ‘Chilling 1st Amendment Rights’: Dem Lawmakers,” Oregon Live, June 12, 2020, https://www.oregonlive.com/nation/2020/06/law-enforcement-is-using-airc….
- 4Steve Vladeck and Benjamin Wittes, “DHS Authorizes Domestic Surveillance to Protect Statues and Monuments,” Lawfare Blog, July 20, 2020, https://www.lawfareblog.com/dhs-authorizes-domestic-surveillance-protec….
- 5Jason Leopold and Anthony Cormier, “The DEA Has Been Given Permission to Investigate People Protesting George Floyd’s Death,” Buzzfeed News, June 2, 2020, https://www.buzzfeednews.com/article/jasonleopold/george-floyd-police-b….
- 6Sam Biddle, “Police Surveilled George Floyd Protests with Help from Twitter-Affiliated Startup Dataminr,” The Intercept, July 9, 2020, https://theintercept.com/2020/07/09/twitter-dataminr-police-spy-surveil…; Lee Fang, “FBI Expands Ability to Collect Cellphone Location Data, Monitor Social Media, Recent Contracts Show,” The Intercept, June 24, 2020, https://theintercept.com/2020/06/24/fbi-surveillance-social-media-cellp….
- 7Juliette Rihl, “’If Your Mom Can Go In and See It, So Can the Cops’: How Law Enforcement is Using Social Media to Identify Protesters in Pittsburgh,” Public Source, August 6, 2020, https://www.publicsource.org/pittsburgh-police-arrest-blm-protesters-so…; Albert Samaha, Jason Leopold, and Rosalind Adams, “We Received Documents Showing How the Feds Monitored BLM Protests. There was Only One Mention of White Supremacists.” Buzzfeed News, August 13, 2020, https://www.buzzfeednews.com/article/albertsamaha/newly-released-docume….; “JCPD Monitoring Social Media Posts for Any Potential Threats During Future Protests,” News Channel 11 WJHL, June 3, 2020, https://www.wjhl.com/news/local/jcpd-monitoring-social-media-posts-for-….
- 8Federal Bureau of Investigations,” Social Media Altering Subscription,” Gov Tribe, September 6, 2019, https://govtribe.com/opportunity/federal-contract-opportunity/social-me….
- 9Homeland Security Department, “Agency Information Collection Activities: General Clearance for the Collection of Social Media Information on Immigration and Foreign Travel Forms,” Federal Register, September 4, 2019, https://www.federalregister.gov/documents/2019/09/04/2019-19021/agency-….
- 10Sergiu Gatlan, “U.S. Navy Creating a 350 Billion Record Social Media Archive,” Bleeping Computer, May 27, 2019, https://www.bleepingcomputer.com/news/security/us-navy-creating-a-350-b….
- 11Faiza Patel, et al., “Social Media Monitoring: How the Department of Homeland Security Uses Digital Data in the Name of National Security,” Brennan Center for Justice, May 22, 2019, https://www.brennancenter.org/sites/default/files/publications/2019_DHS…; Brennan Center for Justice, “Timeline of Social Media Monitoring for Vetting by the Department of Homeland Security and the State Department,” https://www.brennancenter.org/our-work/research-reports/timeline-social….
- 12Rachel Cohn, “Mapping Reveals Rising Use of Social Media Monitoring Tools by Cities Nationwide, Brennen Center for Justice, November 16, 2016, https://www.brennancenter.org/our-work/analysis-opinion/mapping-reveals….
- 13Thomas Brewster, “Trump’s Immigration Cops Just Spent $3 Million On These Ex-DARPA Social Media Data Miners,” Forbes, September 27, 2017, https://www.forbes.com/sites/thomasbrewster/2017/09/27/trump-immigratio….
- 14Antonia Noori Farzan, “Memphis police used fake Facebook account to monitor Black Lives Matter, trial reveals,” The Washington Post, August 23, 2018, https://www.washingtonpost.com/news/morning-mix/wp/2018/08/23/memphis-p…; Dave Maass, “Facebook Warns Memphis Police: No More Fake “Bob Smith” Accounts,” Electronic Frontier Foundation, September 24, 2018, https://www.eff.org/deeplinks/2018/09/facebook-warns-memphis-police-no-…; Policing Project NYU School of Law, “Undercover Policing in the Age of Social Media,” December 17, 2018, https://www.policingproject.org/news-main/undercover-policing-social-me…; Brennan Center for Justice, “Map: Social Media Monitoring by Police Departments, Cities, and Counties,” July 10, 2019, https://www.brennancenter.org/our-work/research-reports/map-social-medi….
- 15Jana Winter and Hunter Walker, “Exclusive: Document reveals the FBI is tracking border protest groups as extremist organizations,” Yahoo! News, September 4, 2019, https://news.yahoo.com/exclusive-document-reveals-the-fbi-is-tracking-b…; Jason Wilson & Will Parrish, “Revealed: FBI and Police Monitoring Oregon Anti-pipeline Activist,” The Guardian, https://www.theguardian.com/us-news/2019/aug/08/fbi-oregon-anti-pipelin…; Jimmy Tobias, “Exclusive: ICE Has Kept Tabs on ‘Anti-Trump’ Protesters in New York City,” The Nation, March 6, 2019, https://www.thenation.com/article/ice-immigration-protest-spreadsheet-t…; Center for Democracy and Technology, “Coalition Letter to DHS Opposing Surveillance of Activists, Journalists, and Lawyers,” May 1, 2019, https://cdt.org/insight/coalition-letter-to-dhs-opposing-surveillance-o…; Ryan Devereaux, “Homeland Security Used a Private Intelligence Firm to Monitor Family Separation Protests,” The Intercept, April 29, 2019, https://theintercept.com/2019/04/29/family-separation-protests-surveill…; Monsy Alvarado, “Private firm working for DHS compiled info about family separation protests in NY and NJ,” North Jersey, April 29, 2019, https://www.northjersey.com/story/news/new-jersey/2019/04/29/dhs-compil…; Julia Ainsley, “U.S. officials made list of reporters, lawyers, activists to question at border,” NBC News, March 6, 2019, https://www.nbcnews.com/politics/immigration/u-s-officials-made-list-re….
- 16Lauren Kaori Gurley, “California Police Used Military Surveillance Tech at Grad Student Strike,” Vice, May 15, 2020, https://www.vice.com/en_us/article/7kppna/california-police-used-milita….
- 17Sandra E. Garcia, “U.S. Requiring Social Media Information From Visa Applicants,” The New York Times, June 2, 2019, https://www.nytimes.com/2019/06/02/us/us-visa-application-social-media….
- 18“US now seeking social media details from all visa applicants,” Associated Press News, June 1, 2019, https://www.apnews.com/c96a215355b242e58107c2125c18fc4a.
- 19Brennen Center for Justice, “Doc Society v. Pompeo,” December 5, 2019, https://www.brennancenter.org/our-work/court-cases/doc-society-v-pompeo.
- 20“CBP Statement on Border Search of Electronic Devices,” U.S. Customs and Border Protection, October 30, 2019, https://www.cbp.gov/newsroom/speeches-and-statements/cbp-statement-bord….
- 21Jason Silverstein, “Border Agents Searching Travelers’ Phones and Laptops Without a Warrant, Suit Says,” CBS News, April 30, 2019, https://www.cbsnews.com/news/border-agents-searching-travelers-phones-a….
- 22U.S. Customs and Border Protection, “Border Search of Electronic Devices,” January 4, 2018, https://www.dhs.gov/sites/default/files/publications/CBP%20Directive%20…; Seth Harp, “I’m a Journalist But I Didn’t Fully Realize the Terrible Power of U.S. Border Officials Until they Violated My Rights and Privacy,” The Intercept, June 22, 2019, https://theintercept.com/2019/06/22/cbp-border-searches-journalists/.
- 23Matthew Feeney, “Examining Warrantless Smartphone Searches at the Border,” Cato Institute, July 11, 2018, https://www.cato.org/publications/testimony/examining-warrantless-smart….
- 24Faisa Patel, Rachel Levinson-Waldman, Raya Koreh, and Sophia DenUyl, “Social Media Monitoring,” The Brennan Center, May 22, 2019, https://www.brennancenter.org/our-work/research-reports/social-media-mo….
- 25Blake Montgomery, “ICE Has a New $30M Contract With Israeli Phone Cracking Company Cellebrite,” Daily Beast, September 11, 2019, https://www.thedailybeast.com/ice-has-a-new-dollar30m-contract-with-isr…; Brennan Center for Justice, “Map: Social Media Monitoring by Police Departments, Cities, and Counties,” July 10, 2019, https://www.brennancenter.org/our-work/research-reports/map-social-medi….
- 26Alfred Ng, “Homeland Security details new tools for extracting device data at US borders,” CNet, August 12, 2020, https://www.cnet.com/news/homeland-security-details-new-tools-for-extra….
- 27Gina R. Bohannon, “Cell Phones and the Border Search Exception: Circuits Split over the Line Between Sovereignty and Privacy,” Maryland Law Review, Volume 78, Issue 3, 2019, https://digitalcommons.law.umaryland.edu/cgi/viewcontent.cgi?article=38….
- 28Ron Wyden United States Senator for Oregon, Official Website, “Wyden, Paul Bill Requires Warrants to Search Americans’ Digital Devices at the Border,” May 22, 2019, https://www.wyden.senate.gov/news/press-releases/wyden-paul-bill-requir….
- 29Tom Hals, “Rights groups challenge warrantless cellphone searches at U.S. border,” Reuters, April 30, 2019, https://www.reuters.com/article/us-usa-immigration-privacy/rights-group…; Matthew S. Schwartz, “ACLU: Border Agents Violate Constitution When They Search Electronic Devices,” NPR, May 2, 2019, https://www.npr.org/2019/05/02/719337356/aclu-border-agents-violate-con….
- 30“Government Must Have Reasonable Suspicion of Digital Contraband Before Searching Electronic Devices at the U.S. Border,” ACLU, November 12, 2019, https://www.aclu.org/press-releases/federal-court-rules-suspicionless-s….
- 31Allie Funk, “Iran Tensions Increase Social Media Surveillance at the US Border,” WIRED, January 9, 2020, https://www.wired.com/story/opinion-iran-tensions-increase-social-media….
- 32Yuan Yang and Qianer Liu, “US border agents turn up the heat on Chinese students,” Financial Times, September 8, 2020, https://www.ft.com/content/bd8444ac-a590-476b-a894-ad109835e069.
- 33Committee to Protect Journalists, “Nothing to declare: Why U.S. border agency's vast stop and search powers undermine press freedom,” October 22, 2018, https://cpj.org/x/7493.
- 34Seth Harp, “I’m a Journalist But I Didn’t Fully Realize the Terrible Power of U.S. Border Officials Until they Violated My Rights and Privacy,” The Intercept, June 22, 2019, https://theintercept.com/2019/06/22/cbp-border-searches-journalists/.
- 35The New York Times Editorial, “Patriot Act Excesses,” October 7, 2009, http://www.nytimes.com/2009/10/08/opinion/08thu1.html.
- 36The Washington Post, “USA Freedom Act: What’s in, what’s out,” June 2, 2015, https://www.washingtonpost.com/graphics/politics/usa-freedom-act/.
- 37Glenn Greenwald, “NSA Collecting Phone Records of Millions of Verizon Customers Daily,” The Guardian, June 6, 2013, http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-c….
- 38Marty Lederman, “[UPDATED with details and analysis] BREAKING: Second Circuit rules that Section 215 does not authorize telephony bulk collection program,” Just Security, May 7, 2015, https://www.justsecurity.org/22799/breaking-circuit-rules-section-215-a….
- 39Aarti Shahani, “Phone Carriers Are Tight-Lipped On How They Will Comply With New Surveillance Law,” NPR, June 4, 2015, http://www.npr.org/sections/alltechconsidered/2015/06/04/411870819/phon….
- 40Rainey Reitman, “The New USA Freedom Act: A Step in the Right Direction, but More Must Be Done,” Electronic Frontier Foundation, April 30, 2015, https://www.eff.org/deeplinks/2015/04/new-usa-freedom-act-step-right-di….
- 41Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2015 (USA FREEDOM Act), Pub. L. 114-23, June 1, 2015, https://www.congress.gov/bill/114th-congress/house-bill/2048/text.
- 42Elizabeth Goitein, “Statement of Elizabeth Goitein before the United States Senate Committee on the Judiciary: Hearin on Reauthorizing the USA FREEDOM Act of 2015,” November 6, 2019, https://www.judiciary.senate.gov/imo/media/doc/Goitein%20Testimony.pdf.
- 43114th Congress, H.R. 2048 USA FREEDOM Act of 2015, Sec. 401, Public Law No: 114-23, June 2, 2015, https://www.congress.gov/bill/114th-congress/house-bill/2048/text.
- 44United States Foreign Intelligence Surveillance Court, “Amici Curiae,” http://www.fisc.uscourts.gov/amici-curiae.
- 45Mana Azarmi, “The NSA Shuttered the Call Detail Records Program. So Too Must Congress,” Center for Democracy and Technology, August 16, 2019, https://cdt.org/insights/the-nsa-shuttered-the-call-detail-records-prog….
- 46Office of the Director of National Intelligence, “Statistical Transparency Report,” April, 2020, https://www.dni.gov/files/CLPT/documents/2020_ASTR_for_CY2019_FINAL.pdf.
- 47Charlie Savage, “N.S.A. Purges Hundred of Millions of Call and Text Records,” The New York Times, June 29, 2018, https://www.nytimes.com/2018/06/29/us/politics/nsa-call-records-purged….
- 48Dustin Volz & Warren P. Strobel, “NSA Recommends Dropping Phone-Surveillance Program,” The Wall Street Journal, April 24, 2019, https://www.wsj.com/articles/nsa-recommends-dropping-phone-surveillance….
- 49Privacy and Civil Liberties Oversight Board, “Report on the Government’s Use of the Call Detail Records Program Under the USA Freedom Act,” February 2020, https://documents.pclob.gov/prod/Documents/OversightReport/87c7e900-616….
- 50Jake Laperruque, “What to Expect for the PATRIOT Act Reauthorization,” February 11, 2020, https://www.pogo.org/analysis/2020/02/what-to-expect-for-the-patriot-ac….
- 51Section 215 is set to expire in December 2019; Robert Chesney, “Three FISA Authorities Sunset in December: Here’s What You Need to Know,” Lawfare, January 16, 2019, https://www.lawfareblog.com/three-fisa-authorities-sunset-december-here…; India McKinney & Andrew Crocker, “Yes, Section 215 Expired. Now What?” Electronic Frontier Foundation, April 16, 2020, https://www.eff.org/deeplinks/2020/04/yes-section-215-expired-now-what.
- 52Charlie Savage, “House Departs Without Vote to Extend Expired F.B.I. Spy Tools,” The New York Times, March 27, 2020, https://www.nytimes.com/2020/03/27/us/politics/house-fisa-bill.html.
- 53Adi Robertson, “Senate Passes Surveillance Bill Without Ban on Web History Snooping,” The Verge, May 14, 2020, https://www.theverge.com/2020/5/14/21257782/surveillance-bill-congress-….
- 54Senator Ron Wyden, “Wyden Votes No on Bill to Hand Government Warrantless Spying Power,” Office of Senator Ron Wyden, May 14, 2020, https://www.wyden.senate.gov/news/press-releases/wyden-votes-no-on-bill…---.
- 55Jordain Carney, “In Win for Privacy Hawks, Senate Adds More Legal Protections to FISA Bill,” The Hill, May 13, 2020, https://thehill.com/homenews/senate/497669-in-win-for-privacy-hawks-sen…; Congress,” Text of Amendments; Congressional Record Vol. 166, No. 90,” United States Congress, May 13, 2020, https://www.congress.gov/congressional-record/2020/05/13/senate-section….
- 56Ellen Nakashima and Mike DeBonis, “House effort to pass surveillance overhaul collapses after Trump tweets and pushback from DOJ,” May 28, 2020, https://www.washingtonpost.com/national-security/house-effort-to-pass-s….
- 5750 U.S.C. 1801(e)(2).
- 58Brett Max Kaufman, “A Guide to What We Know About the NSA’s Dragnet Searches of Your Communications,” ACLU, August 9, 2013, https://www.aclu.org/blog/guide-what-we-now-know-about-nsas-dragnet-sea….
- 59Dia Kayyali, “The Way the NSA Uses Section 702 is Deeply Troubling. Here’s Why.” Electronic Frontier Foundation, May 7, 2014, https://www.eff.org/deeplinks/2014/05/way-nsa-uses-section-702-deeply-t….
- 60Charlie Savage, “How Trump’s NSA Came to End a Disputed Type of Surveillance,” The New York Times, May 11, 2017, https://www.nytimes.com/2017/05/11/us/politics/nsa-surveillance-trump.h….
- 61Charlie Savage, “How Trump’s NSA Came to End a Disputed Type of Surveillance,” The New York Times, May 11, 2017, https://www.nytimes.com/2017/05/11/us/politics/nsa-surveillance-trump.h….
- 62Charlie Savage, “N.S.A. Halts Collection of Americans’ Emails About Foreign Targets,” The New York Times, April 28, 2017, https://www.nytimes.com/2017/04/28/us/politics/nsa-surveillance-terrori….
- 63Congress, S.139 - FISA Amendments Reauthorization Act of 2017, https://www.congress.gov/bill/115th-congress/senate-bill/139/text.
- 64The American Civil Liberties Union, “ACLU, Coalition Urge Congress on Surveillance Reform,” ACLU, October 3, 2017, https://www.aclu.org/press-releases/aclu-coalition-urge-congress-survei…; Andrew Crocker, “How Congress’s Extension of Section 702 May Expand the NSA’s Warrantless Surveillance Authority,” February 1, 2018, https://www.eff.org/deeplinks/2018/02/how-congresss-extension-section-7….
- 65Charlie Savage, “Congress Approves Six-Year Extension of Surveillance Law,” The New York Times, January 18, 2018, https://www.nytimes.com/2018/01/18/us/politics/surveillance-congress-sn….
- 66Michelle Richardson, “FISA 702: What Happened and What’s Next,” Center for Democracy and Technology, February 5, 2018, https://cdt.org/blog/fisa-702-what-happened-and-whats-next/.
- 67United States Foreign Intelligence Surveillance Court, “Document Regarding the Section 702 2018 Certification,” October 18, 2018, https://www.intel.gov/assets/documents/702%20Documents/declassified/201…; United States Foreign Intelligence Surveillance Court, “Document Regarding the Section 702 2018 Certification,” July 12, 2019, https://www.intel.gov/assets/documents/702%20Documents/declassified/201…; United States Foreign Intelligence Surveillance Court, “Document Regarding the Section 702 Certification, September 4, 2019, https://www.intel.gov/assets/documents/702%20Documents/declassified/201….
- 68Elizabeth Goitein, “The FISA Court’s Section 702 Opinions, Part II: Improper Queries and Echoes of ‘Bulk Collection,’” Just Security, 2019, https://www.justsecurity.org/66605/the-fisa-courts-section-702-opinions….
- 69Elizabeth Goitein, “The FISA Court’s Section 702 Opinions , Part I: A History of Non-Compliance Repeats Itself,” Just Security, 2019, https://www.justsecurity.org/66595/the-fisa-courts-702-opinions-part-i-….
- 70Office of the Director of National Intelligence, “Statistical Transparency Report,” April, 2020, https://www.dni.gov/files/CLPT/documents/2020_ASTR_for_CY2019_FINAL.pdf.
- 71Just Security, “ODNI’s 2019 Statistical Transparency Report: The FBI Violates FISA… Again,” Just Security, May 1, 2020, https://www.justsecurity.org/69972/odnis-2019-statistical-transparency-….
- 72Julian Sanchez, “Report Discloses Unlawful ‘Backdoor Searches’ of FISA Database, Cato Institute, May 15, 2020, https://www.cato.org/blog/report-discloses-unlawful-backdoor-searches-f….
- 7350 U.S.C. 1805.
- 74Office of the Inspector General, “Review of Four FISA Applications and Other Aspects of the FBI’s Crossfire Hurricane Investigation,” U.S. Department of Justice, December 2019, https://www.justice.gov/storage/120919-examination.pdf.
- 75Office of the Inspector General,” Management Advisory Memorandum for the Director of the Federal Bureau of Investigation Regarding the Execution of Woods Procedures for Applications Filed with the Foreign Intelligence Surveillance Court Relating to U.S. Persons,” U.S. Department of Justice, March 2020, https://oig.justice.gov/sites/default/files/reports/a20047.pdf.
- 76Barton Gellman and Ashkan Soltani, “NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls,” The Washington Post, March 18, 2014, https://www.washingtonpost.com/world/national-security/nsa-surveillance…; Ryan Devereaux, Glenn Greenwald, Laura Poitras, “The NSA is Recording Every Cell Phone Call in the Bahamas,” The Intercept, May 19, 2014, https://theintercept.com/2014/05/19/data-pirates-caribbean-nsa-recordin….
- 77Human Rights Watch, “U.S.: New Evidence Suggests Monitoring of Americans,” October 25, 2017, https://www.hrw.org/news/2017/10/25/us-new-evidence-suggests-monitoring….
- 78Congress, H.R. 4681, Intelligence Authorization Act for Fiscal Year 2015, Sec. 309, 113th Congress (2014), https://www.congress.gov/bill/113th-congress/house-bill/4681/text.
- 79The White House Office of the Press Secretary (President Barack Obama), “Presidential Policy Directive – Signals Intelligence Activities PPD-28,” January 17, 2014, https://obamawhitehouse.archives.gov/the-press-office/2014/01/17/presid….
- 80Human Rights Watch, “Strengthen the USA Freedom Act,” May 19, 2015, https://www.hrw.org/news/2015/05/19/strengthen-usa-freedom-act.
- 81Electronic Frontier Foundation, “Mandatory Data Retention: United States,” https://www.eff.org/issues/mandatory-data-retention/us; Shayana Kadidal (Center for Constitutional Rights), “Surveillance After the USA Freedom Act: How Much Has Changed?,” Huffington Post, December 17, 2016, http://www.huffingtonpost.com/the-center-for-constitutional-rights/surv….
- 82American Civil Liberties Union Northern California, “California Electronic Communications Privacy Act (CalECPA) - SB 178,” April 2018, https://www.aclunc.org/our-work/legislation/calecpa.
- 83United States v. Warshak, 09-3176, United States Court of Appeals for the Sixth Circuit, https://www.opn.ca6.uscourts.gov/opinions.pdf/10a0377p-06.pdf.
- 84United States v. Warshak, 09-3176, United States Court of Appeals for the Sixth Circuit, https://www.opn.ca6.uscourts.gov/opinions.pdf/10a0377p-06.pdf.
- 85Sophia Cope, “House Advances Email Privacy Act, Setting the Stage for Vital Privacy Reform,” Electronic Frontier Foundation, April 27, 2016, https://www.eff.org/deeplinks/2016/04/house-advances-email-privacy-act-….
- 86115th Congress, H.R. 387 Email Privacy Act, February 7, 2017, https://www.congress.gov/bill/115th-congress/house-bill/387/text.
- 87Spencer S. Hsu, “A Maryland court is the first to require a warrant for covert cellphone tracking,” The Washington Post, March 31, 2016, https://www.washingtonpost.com/world/national-security/a-maryland-court….
- 88Tom Jackman, “Police use of ‘StingRay’ cellphone tracker requires search warrant, appeals court rules,” The Washington Post, September 21, 2017, https://www.washingtonpost.com/news/true-crime/wp/2017/09/21/police-use….
- 89Janus Rose, “Maryland Attorney General: If You Don't Want To Be Tracked, Turn Off Your Phone,” Motherboard, February 4, 2016, https://www.vice.com/en/article/bmvzk8/maryland-attorney-general-if-you….
- 90American Civil Liberties Union, “Stingray Tracking Devices: Who’s Got Them?” https://www.aclu.org/issues/privacy-technology/surveillance-technologie….
- 91Alexia Ramirez, “ICE Records Confirm that Immigration Enforcement Agencies are Using Invasive Cell Phone Surveillance Devices,” American Civil Liberties Union, May 27, 2020, https://www.aclu.org/news/immigrants-rights/ice-records-confirm-that-im….
- 92Robert Snell, “Feds use anti-terror tool to hunt undocumented immigrants amid Trump’s crackdown,” The Detroit News, May 18, 2017, https://www.detroitnews.com/story/news/local/detroit-city/2017/05/18/ce….
- 93Adam Schwartz, “No Hunting Undocumented Immigrants with Stingrays,” Electronic Frontier Foundation, May 19, 2017, https://www.eff.org/deeplinks/2017/05/no-hunting-undocumented-immigrant….
- 94Zack Whittaker, “ACLU Sues Homeland Security over ‘Stingray’ Cell Phone Surveillance,” December 11, 2019, https://techcrunch.com/2019/12/11/aclu-cbp-ice-stingray-surveillance/.
|Are service providers and other technology companies required to aid the government in monitoring the communications of their users?||4.004 6.006|
There are few legal constraints on the collection, storage, and transfer of data by private or public actors in the United States. ISPs and content hosts collect vast amounts of information about users’ online activities, communications, and preferences. This information can be subject to government requests for access, typically through a subpoena, court order, or search warrant.
In general, the country lacks a robust federal data-protection law, though a number of bills have been proposed.1 In 2017, President Trump signed SJ Resolution 34,2 which rolled back FCC privacy regulations introduced in 2016 that would have given consumers more control over how their personal information is collected and used by broadband ISPs (see A5). At the end of 2019, three different privacy bills had been submitted to Congress.3 Two of them, the Consumer Online Privacy Rights Act (COPRA) and the US Consumer Data Privacy Act (CDPA), contain provisions requiring affirmative (opt-in) consent prior to the processing of sensitive consumer data, mandate that entities covered by the laws carry out privacy assessments, and afford users “rights to access, correction, deletion and data portability.”4
To date, most legislative activity on data privacy has occurred below the federal level, with many states considering or passing laws.5 The California legislature enacted AB 375,6 also known as the California Consumer Privacy Act (CPPA) of 2018, which allows Californians to demand information from businesses in the state about how their personal data are collected, used, and shared.7 By 2019, at least 25 states and Puerto Rico were considering such proposals.8 A Vermont law implemented in February 2019 requires companies that buy or sell the personal data of state residents to register with the state government and disclose whether affected users can opt out of data collection.9 In Maine, a law passed in June 2019 requires ISPs to obtain consent from customers before using, selling, or distributing their data.10 Nevada also passed CCPA-inspired amendments to its existing privacy law that went into effect in October 2019.11
The USA FREEDOM Act in 2015 changed the way private companies publicly report on certain types of government requests for user information. Prior to the law, the Justice Department restricted the disclosure of information about national security letters, including within the transparency reports voluntarily published by some internet companies and service providers.12 In 2014, the department had reached a settlement with Facebook, Google, LinkedIn, Microsoft, and Yahoo that permitted the companies to disclose the approximate number of government requests they receive, using aggregated bands of 250 or 1,000 rather than precise figures.13 Twitter, not a party to the settlement, sued on the grounds that the rules amounted to a prior restraint violating the company’s First Amendment rights.14 A judge partially dismissed Twitter’s case in 2016.15 Meanwhile, the USA FREEDOM Act granted companies the option of more granular reporting, though reports containing more detail are still subject to time delays, and their frequency is limited.16
Despite the USA FREEDOM Act’s aim of improving transparency, government requests continue to be made in secret. In September 2019, documents released in response to a FOIA request by the Electronic Frontier Foundation revealed that the FBI had been accessing personal data through national security letters from a much broader group of entities than previously understood.17 Western Union, Bank of America, Equifax, TransUnion, the University of Alabama at Birmingham, Kansas State University, major ISPs, and tech and social media companies had all received such letters. In February 2020, it also came to light that the New York Police Department had relied on a little-used provision in the USA PATRIOT Act to subpoena Twitter data from the editor of the New York Post.18
The government may request that companies store targeted data for up to 180 days under the 1986 Stored Communications Act (SCA). Practices for general collection and storage of communications content and records vary by company.19
In June 2018, the Supreme Court ruled narrowly in Carpenter v. United States that the government is required to obtain a warrant in order to access seven days or more of subscriber location records from mobile providers.20 Privacy advocates lauded the decision, noting that location information could have a greater impact on privacy than other types of user data collected by private companies.21 The ruling also diminished, although in a limited way, the third-party doctrine—the idea that Fourth Amendment privacy protections do not extend to most types of information that are handed over voluntarily to third parties, such as telecommunications companies.22
The scope of law enforcement access to user data held by companies was expanded under the Clarifying Lawful Overseas Use of Data (CLOUD) Act,23 signed into law in March 2018 as part of a government spending bill.24 Introduced as an update to the SCA with regard to the policies governing cross-border data transfers,25 the CLOUD Act determined that law enforcement requests sent to US companies for user data under the 1986 law would apply to records in the company’s possession regardless of storage location, including overseas. Previous requests had been limited to user data stored within the jurisdiction of the United States. The CLOUD Act also allows certain foreign governments to enter into an executive agreement with the United States and then petition US companies to hand over user data.26 Proponents of the law, including several large US tech firms,27 argued that the previous legal framework was outdated and cumbersome. It required law enforcement personnel to go through a potentially lengthy “mutual legal assistance treaty” (MLAT) process between countries to obtain information pertaining to local crimes because the data were stored overseas.28 Civil liberties advocates complained that the law further undermined user privacy.29 In 2019, the United States and the United Kingdom signed the first bilateral data access agreement under the CLOUD Act.30 A coalition of civil society groups expressed concern about the deal.31 As of May 2020, the United States was in talks with Australia regarding a similar pact.32
Private companies may comply with both legal demands and voluntary requests for user data from the government. In response to a request from Puerto Rican authorities, Facebook turned over the data and communications of three news outlets’ pages that live-streamed 2017 protests against austerity measures (see C3).33 The information sought included private communications, location data, and credit card information. In March 2019, the Justice Department confirmed that a DEA program had collected billions of phone records from AT&T without a court order.34 Information and communication platforms may also monitor the communications of their users for the purpose of identifying unlawful content to share with law enforcement (see B2).
User information is otherwise protected under Section 5 of the Federal Trade Commission Act (FTCA), which has been interpreted to prohibit internet entities from deceiving users about what personal information is being collected and how it is being used. The law also prevents the use of personal information in ways that harm users without offering countervailing benefits. In addition, the FTCA has been interpreted to require entities that collect users’ personal information to adopt reasonable security measures to safeguard it from unauthorized access. State-level laws in 47 states and the District of Columbia also require entities that collect personal information to notify consumers—and, usually, consumer protection agencies—when they suffer a security breach that exposes such information.
Section 222 of the Communications Act, as amended by the 1996 Telecommunications Act, prohibits telecommunications firms from sharing or using information about customers, beyond the bounds set by existing rules, without acquiring consent. This provision had historically only applied to phone companies’ records about phone customers, but under the FCC’s 2015 Open Internet Order, it also applied to ISPs’ records about broadband customers.35 Following the FCC’s 2017 decision to repeal the order, some have suggested that providers may continue operating under Section 222 but without FCC guidance or enforcement.36
In February 2019, Vice News revealed that mobile service providers had sold their customers’ real-time location data, in a seeming violation of FCC regulations.37 Following an investigation, FCC chairman Ajit Pai announced in January 2020 that such companies were in violation of federal law and would be penalized.38 Government bodies have also reportedly purchased phone location data to aid in investigations and law enforcement. In 2020, the Internal Revenue Service (IRS),39 ICE,40 and the Secret Service all reportedly engaged in the practice.41
In May 2020, during the COVID-19 pandemic, Apple and Google launched an Exposure Notification System (ENS), for phones using their respective operating systems, to assist with contact tracing.42 ENS uses Bluetooth signals to determine proximity to other smartphones and track potential exposure to the coronavirus. Despite efforts to design the system with a decentralized architecture for collecting data, there were concerns over privacy and doubts about whether the tool could be entirely secure from vulnerabilities or exploitation.43 Separately, the mobile advertising industry handed over aggregated and anonymized location data to federal, state, and local governments. Authorities aimed to centralize the location data on people in over 500 cities in order to analyze how the disease might be spreading.44
- 1The Editorial Board, “Why Is America So Far Behind Europe on Digital Privacy?” The New York Times, June 8, 2019, https://www.nytimes.com/2019/06/08/opinion/sunday/privacy-congress-face….
- 2115th Congress, S.J.Res.34 - A joint resolution providing for congressional disapproval under chapter 8 of title 5, United States Code, of the rule submitted by the Federal Communications Commission relating to "Protecting the Privacy of Customers of Broadband and Other Telecommunications Services,” Public Law no. 115-22, April 3, 2017, https://www.congress.gov/bill/115th-congress/senate-joint-resolution/34.
- 3David Saunders & Allison Glover, “INSIGHT: A Federal Privacy Bill May Be Closer Than Once Thought,” Bloomberg Law, February 14, 2020, https://news.bloomberglaw.com/privacy-and-data-security/insight-a-feder….
- 4Wendy Zhang, “Comprehensive Federal Privacy Law Still Pending,” The National Law Review, January 22, 2020, https://www.natlawreview.com/article/comprehensive-federal-privacy-law-….
- 5Jon Brodkin, “ISP privacy rules could be resurrected by states, starting in Minnesota,” Ars Technica, March 31, 2017, https://arstechnica.com/tech-policy/2017/03/isp-privacy-rules-could-be-…; Conor Dougherty, “Push for Internet Privacy Rules Moves to Statehouses,” The New York Times, March 26, 2017, https://www.nytimes.com/2017/03/26/technology/internet-privacy-state-le….
- 6California Legislative Information, “Assembly Bill No. 375,” June 28, 2018, https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=2….
- 7Heather Kelly, “California passes strictest online privacy law in the country,” CNN, https://money.cnn.com/2018/06/28/technology/california-consumer-privacy….
- 8National Conference of State Legislatures, “2019 Consumer Data Privacy Legislation,” January 3, 2020, https://www.ncsl.org/research/telecommunications-and-information-techno….
- 9Steven Melendez, “A landmark Vermont law nudges over 120 data brokers out of the shadows,” Fast Company, March 2, 2019, https://www.fastcompany.com/90302036/over-120-data-brokers-inch-out-of-…; Steven Melendez and Alex Pasternack, “Here are the data brokers quietly buying and selling your personal information,” Fast Company, March 2, 2019, https://www.fastcompany.com/90310803/here-are-the-data-brokers-quietly-….
- 10Maggie Miller, “Maine shakes up debate with tough internet privacy law,” The Hill, June 11, 2019, https://thehill.com/policy/technology/447824-maine-shakes-up-debate-wit….
- 11Grant Gross, “Nevada Latest State to Pass Data Privacy Law,” Washington Examiner, October 10, 2019, https://www.washingtonexaminer.com/policy/nevada-latest-state-to-pass-d….
- 12Craig Timberg and Adam Goldman, “U.S. to Allow Companies to Disclose More Details on Government Requests for Data,” The Washington Post, January 27, 2014, https://www.washingtonpost.com/business/technology/us-to-allow-companie….
- 13Office of the Deputy Attorney General, email correspondence to Facebook, Google, LinkedIn, Microsoft, and Yahoo general counsels, January 27, 2014, https://www.justice.gov/iso/opa/resources/366201412716018407143.pdf.
- 14Ben Lee, @BenL, “Taking the fight for #transparency to court,” Twitter Blog, October 7, 2014, https://blog.twitter.com/official/en_us/a/2014/taking-the-fight-for-tra…; Alexei Oreskovic, “Twitter Sues U.S. Justice Department for Right to Reveal Surveillance Requests,” Reuters, October 7, 2014, https://www.reuters.com/article/us-twitter-nsa-idUSKCN0HW1V520141007.
- 15Dan Levine, “Twitter lawsuit partly dismissed over U.S. information requests,” Reuters, May 2, 2016, http://www.reuters.com/article/us-twitter-government-ruling-idUSKCN0XT1….
- 16For additional information on reporting standards, please reference: USA Freedom Act, H.R. 2048 (2015), https://www.congress.gov/bill/114th-congress/house-bill/2048/text.
- 17Jennifer Valentino-DeVries, “Secret F.B.I. Subpoenas Scoop Up Personal Data From Scores of Companies,” September 20, 2019, https://www.nytimes.com/2019/09/20/us/data-privacy-fbi.html?mc_cid=a27e…; Andrew Crocker and Aaron Mackey, “Victory! EFF Wins National Security Letter Transparency Lawsuit,” May 14, 2019, https://www.eff.org/deeplinks/2019/05/victory-eff-wins-national-securit….
- 18Gabe Rottman, “Special analysis: Why did the NYPD cite an ‘anti-terrorism’ law when it subpoenaed a reporter’s Twitter account?” Reporters Committee For Freedom of the Press, February 21, 2020, https://www.rcfp.org/nypd-patriot-act-subpoena/?utm_campaign=02_23_2020….
- 19Electronic Frontier Foundation, “Mandatory Data Retention: United States,” https://www.eff.org/issues/mandatory-data-retention/us.
- 20Adam Liptak, “In Ruling on Cellphone Location Data, Supreme Court Makes Statement on Digital Privacy,” The New York Times, June 22, 2018, https://www.nytimes.com/2018/06/22/us/politics/supreme-court-warrants-c….
- 21Nathan Freed Wessler, “The Supreme Court’s Groundbreaking Privacy Victory for the Digital Age,” American Civil Liberties Union, June 22, 2018, https://www.aclu.org/blog/privacy-technology/location-tracking/supreme-….
- 22Paul Ohm, “The Broad Reach of Carpenter v. United States,” Just Security, June 27, 2018, https://www.justsecurity.org/58520/broad-reach-carpenter-v-united-state….
- 23115th Congress, S.2383 - CLOUD Act, February 6, 2018, https://www.congress.gov/bill/115th-congress/senate-bill/2383/text.
- 24David Ruiz, “Responsibility Deflected, the CLOUD Act Passes,” Electronic Frontier Foundation, March 22, 2018, https://www.eff.org/deeplinks/2018/03/responsibility-deflected-cloud-ac….
- 25Ali Breland, “Hatch introduces bipartisan bill to clarify cross-border data policies,” The Hill, February 6, 2018, http://thehill.com/policy/technology/372637-hatch-introduces-bipartisan….
- 26Andrew Keane Woods and Peter Swire, “The CLOUD Act: A Welcome Legislative Fix for Cross-Border Data Problems,” Lawfare, February 6, 2018, https://lawfareblog.com/cloud-act-welcome-legislative-fix-cross-border-….
- 27John D. McKinnon, “U.S., Tech Firms Warn Against Internet Monitor’s Privacy Tightening,” The Wall Street Journal, March 15, 2018, https://www.wsj.com/articles/u-s-tech-firms-warn-against-internet-monit….
- 28Lisa O. Monaco and John P. Carlin, “A ‘global game of whack-a-mole’: Overseas data rules are stuck in the 19th century,” The Washington Post, March 5, 2018, https://www.washingtonpost.com/opinions/a-global-game-of-whack-a-mole-o….
- 29Center for Democracy & Technology, “Omnibus Spending Bill Fails to Protect Privacy of Americans,” March 22, 2018, https://cdt.org/press/omnibus-spending-bill-fails-to-protect-privacy-of….
- 30Nathan Swire, “Applying the CLOUD Act to the U.S.-U.K. Bilateral Data Access Agreement,” Lawfare, https://www.lawfareblog.com/applying-cloud-act-us-uk-bilateral-data-acc…; Helen Warrell and Madhumita Murgia, “UK and US Sign Agreement on Access to Terrorist Data,” Financial Times, October 3, 2019, https://www.ft.com/content/fdba38aa-e5fc-11e9-b112-9624ec9edc59.
- 31Human Rights Watch, “Groups Urge Congress to Oppose US-UK Cloud Act Agreement,” October 29, 2019, https://www.hrw.org/news/2019/10/29/groups-urge-congress-oppose-us-uk-c….
- 32Asha Barbaschow, “Home Affairs says Australia Likely to Sign CLOUD Act Arrangement with the US,” ZDNet, April 30, 2020, https://www.zdnet.com/article/home-affairs-says-australia-likely-next-t….
- 33“Justicia interviene redes sociales de Diálogo y Pulso Estudiantil [Justice intervenes in social networks of Dialogue and Student Pulse],” Noticel, October 9, 2019, https://www.noticel.com/upr/educacion/ahora/top-stories/20191011/justic…; Alleen Brown & Alice Speri, “Facebook Warrant Targeting Student Journalists in Puerto Rico Prompts Fears of Political Surveillance, January 19, 2020, https://theintercept.com/2020/01/19/puerto-rico-university-protests-fac…; Committee to Protect Journalists, “Puerto Rico Authorities Subpoena Facebook for Information from Student Media Outlets,” May 21, 2020, https://cpj.org/2020/05/puerto-rico-authorities-subpoena-facebook-for-i….
- 34Zack Whittaker, “DEA Says AT&T Still Provides Access to Billions of Phone Records,” Tech Crunch, March 28, 2019, https://techcrunch.com/2019/03/28/hemisphere-phone-records/.
- 35Alex Bradshaw and Stan Adams, “FCC Should Act to Protect Broadband Customers’ Data,” Center for Democracy & Technology, January 20, 2016, https://cdt.org/blog/fcc-should-act-to-protect-broadband-customers-data/.
- 36Perkins Coie, “Congress Overturns FCC’s Broadband Privacy Order [Updated],” April 4, 2017, https://www.perkinscoie.com/en/news-insights/congress-overturns-fcc-s-b…; John D. Seiver, “FCC Reverses Course, Shifts ISP Customer Privacy Back to FTC,” Davis Wright Tremaine LLP, November 30, 2017, https://www.dwt.com/blogs/privacy--security-law-blog/2017/11/fcc-revers….
- 37Joseph Cox, “Hundreds of Bounty Hunters Had Access to AT&T, T-Mobile, and Sprint Customer Location Data for Years,” Vice News, February 6, 2019, https://www.vice.com/en_us/article/43z3dn/hundreds-bounty-hunters-att-t….
- 38Jon Brodkin, “Ajit Pai: Carrier sales of phone-location data is illegal, FCC plans punishment,” Ars Technica, January 31, 2020, https://arstechnica.com/tech-policy/2020/01/ajit-pai-carrier-sales-of-p….
- 39Byron Tau, “IRS Used Cellphone Location Data to Try to Find Suspects,” The Wall Street Journal, June 19, 2020, https://www.wsj.com/articles/irs-used-cellphone-location-data-to-try-to….
- 40Byron Tau and Michelle Hackman, “Federal Agencies Use Cellphone Location Data for Immigration Enforcement,” The Wall Street Journal, February 7, 2020, https://www.wsj.com/articles/federal-agencies-use-cellphone-location-da….
- 41Charles Levinson, “Through apps, not warrants, ‘Locate X’ allows federal law enforcement to track phones,” Protocol, March 5, 2020, https://www.protocol.com/government-buying-location-data.
- 42Google, “Exposure Notification API launches to support public health agencies,” Google Blog, May 20, 2020, https://blog.google/inside-google/company-announcements/apple-google-ex….
- 43Jennifer Daskal and Matt Perault, “The Apple-Google Contact Tracing System Won’t Work. It Still Deserves Praise,” Slate, May 22, 2020, https://slate.com/technology/2020/05/apple-google-contact-tracing-app-p….
- 44Kirsten Grind, Robert McMillan, and Anna Wilde Mathews, “To Track Virus, Governments Weigh Surveillance Tools That Push Privacy Limits,” Wall Street Journal, March 17, 2020, https://www.wsj.com/articles/to-track-virus-governments-weigh-surveilla….
|Are individuals subject to extralegal intimidation or physical violence by state authorities or any other actor in retribution for their online activities?||3.003 5.005|
Internet users generally are not subject to extralegal intimidation or violence by state actors. However, online journalists are at times exposed to physical violence or intimidation by police, particularly while covering protests. Women and members of marginalized racial, ethnic, and religious groups are often singled out for threats and harassment by other users online.
A number of online journalists covering or live-streaming protests for racial justice that ramped up in May 2020 were physically assaulted by police, despite making it clear that they were members of the press.1 A photojournalist for Syracuse.com in New York State was shoved to the ground by a police officer on May 30.2 Also that day, Vice News reporter Michael Adams was pushed to the ground, held down, and hit with pepper spray while reporting via social media from Minneapolis,3 and Al Tompkins, a journalist for Poynter, was tear-gassed alongside other journalists while covering demonstrations in the city.4
Ordinary users who showed support for or shared information about protests also faced harassment and intimidation. The young woman who recorded and posted a widely disseminated video of the police killing of George Floyd later reported harassment from users on social media.5 In another example, a New York police union used Twitter to dox, or reveal sensitive personal information, about the daughter of New York City mayor Bill De Blasio, who had been arrested while protesting on May 30.6 Twitter later removed the post and suspended the union’s account.
The online harassment, threats, and at times physical attacks associated with the 2020 protests were not isolated incidents. Researcher Dragana Kaurin interviewed people who had recorded and shared high-profile videos of violent arrests and police killings of Black Americans—including Freddie Gray, Eric Garner, Walter Scott, Philando Castile, and Alton Sterling—over several years. Kaurin documented numerous reports of police retaliation, harassment, physical violence, doxing, and other forms of intimidation aimed at deterring community members from sharing evidence of police brutality.7
President Trump has directly contributed to online harassment and intimidation,8 and those who speak out against the administration are often targeted for harassment by his supporters.9 An analysis of the president’s Twitter account from the US Press Freedom Tracker found nearly 1,900 posts from 2015 to the end of 2019 that used inflammatory language toward news outlets and individual journalists. In May 2020, after Twitter fact-checked his posts on mail-in voting (see B2), Trump singled out a company employee in a post. The employee then received a barrage of harassing messages, including posts from members of the president’s reelection campaign.10 Separately the same month, in response to clashes between protesters and police during racial justice demonstrations, Trump issued a series of threatening posts, with one including a warning that “when the looting starts, the shooting starts.”11 Twitter flagged the post for “glorifying violence” (see B2).
Some journalists working for online outlets have been subjected to harassment at the border, including through warrantless searches of their electronic devices (see C5). A CBP officer in October 2019 repeatedly asked Ben Watson, news editor for the online outlet Defense One, whether he wrote propaganda.12 Watson reported that he was not handed back his passport until he agreed to answer in the affirmative. In February 2019, David Mack, a reporter for the online news outlet BuzzFeed, said that a CBP officer aggressively questioned him about his organization’s coverage of special counsel Robert Mueller and President Trump as he passed through a New York City airport.13 CBP’s assistant commissioner for public affairs later apologized to Mack.
In general, online harassment and threats, including doxing, disproportionately affect women and other members of marginalized groups.14 In a 2019 Committee to Protect Journalists survey of 115 female and gender-nonconforming journalists in the United States and Canada, 90 percent of the US respondents cited online harassment as the “biggest threat” to safety associated with their jobs.15 A December 2018 Amnesty International study of abuse targeting female journalists and politicians on Twitter found that Black women were 84 percent more likely to be mentioned in abusive posts than White women.16 The Pew Research Center found in 2017 that one in four Black Americans has faced online harassment because of their race or ethnicity.17
- 1U.S. Press Freedom Tracker, “HuffPost reporter arrested while covering protest in Brooklyn,” May 30, 2020, https://pressfreedomtracker.us/all-incidents/huffpost-reporter-arrested…; U.S. Press Freedom Tracker, “Photojournalists for Review-Journal arrested while covering Las Vegas protest,” https://pressfreedomtracker.us/all-incidents/photojournalists-review-jo…; Madison Smalstig, “Freelance journalists and live streamers face crowd control munitions, arrests to cover Portland Black Lives Matter demonstrations,” The Oregonian, August 8, 2020, https://www.oregonlive.com/portland/2020/08/freelance-journalists-and-l….
- 2Tim Knauss, “Syracuse police officer shoves news photographer to the ground during protest (video),” Syracuse.com, June 1, 2020, https://www.syracuse.com/news/2020/06/syracuse-police-officer-shoves-ne….
- 3Michael Adams, @MichaelAdams317, Tweet, Twitter, May 30, 2020, https://twitter.com/MichaelAdams317/status/1266945268567678976?s=20.
- 4Al Tompkins, @atompkins, Tweet, Twitter, May 30, 2020, https://twitter.com/atompkins/status/1266590877595688965.
- 5Mike Stunson, “Teen Who Recorded George Floyd Video Says She’s Being Harassed Online,” The Kansas City Star, May 28, 2020, https://www.kansascity.com/news/nation-world/national/article243063836….
- 6Dana Rubinstein and Jeffery C. May, “Police Union Discloses Arrest of de Blasio’s Daughter in Privacy Breach,” New York Times, June 1, 2020, https://www.nytimes.com/2020/06/01/nyregion/chiara-de-blasio-arrest.html.
- 7Dragana Kaurin, “The Price of Filming Police Violence,” Motherboard, April 27, 2018, https://motherboard.vice.com/en_us/article/evqw9z/filming-police-brutal….
- 8Committee to Protect Journalists, “The Trump Administration and the Media,” April 16, 2020, https://cpj.org/reports/2020/04/trump-media-attacks-credibility-leaks/#2.
- 9Isaac Stanley-Becker, “Trump’s removal would require Republican dissidents. But those who speak out become targets of viral disinformation.” The Washington Post, October 3, 2019, https://www.washingtonpost.com/politics/trumps-removal-would-require-re…; Ryan Broderick, “Trump Supporters Have Built A Document With The Addresses And Phone Numbers Of Thousands Of Anti-Trump Activists,” Buzzfeed News, May 21, 2020, https://www.buzzfeednews.com/article/ryanhatesthis/trump-supporters-hav….
- 10Kevin Breuninger, “Trump attacks Twitter employee while defending fact-checked tweets on mail-in ballots,” CNBC, May 28, 2020, https://www.cnbc.com/2020/05/28/trump-attacks-twitter-employee-while-de…; Emily Birnbaum, “Trump supporters are on the attack against Yoel Roth. Twitter is standing by him.,” Protocol, May 27, 2020, https://www.protocol.com/yoel-roth-twitter-president-tweets; Ryan Broderick, “Trump’s Campaign And Fox News Are Attacking A Twitter Employee Because They Think He Fact-Checked The President. They Have The Wrong Guy.,” BuzzFeed News, May 27, 2020, https://www.buzzfeednews.com/article/ryanhatesthis/trump-fox-news-twitt….
- 11Barbara Sprunt, “The History Behind 'When The Looting Starts, The Shooting Starts',” NPR, May 29, 2020, https://www.npr.org/2020/05/29/864818368/the-history-behind-when-the-lo….
- 12Ben Watson, “US Customs Officer Harasses Defense One Journalist at Dulles Airport,” October 4, 2019, https://www.defenseone.com/threats/2019/10/us-customs-officer-harasses-….
- 13Ellie Hall, “Customs And Border Protection Apologized After An Agent Questioned A BuzzFeed News Reporter About Trump Coverage,” BuzzFeed News, February 5, 2019, https://www.buzzfeednews.com/article/ellievhall/customs-border-patrol-a….
- 14Sarah Sobieraj, “Disinformation, Democracy, and the Social Costs of Identity-Based Attacks Online,” Social Science Research Council, MediaWell, October 22, 2019, https://mediawell.ssrc.org/expert-reflections/disinformation-democracy-… .
- 15Lucy Westcott, “’The Threats Follow us Home’: Survey Details Risks for Female Journalists in U.S., Canada,” Committee to Protect Journalists, September 4, 2019, https://cpj.org/blog/2019/09/canada-usa-female-journalist-safety-online….
- 16Amnesty International, “Troll Patrol Findings: Using Crowdsourcing Data Science & Machine Learning to Measure Violence and Abuse against Women on Twitter,” https://decoders.amnesty.org/projects/troll-patrol/findings.
- 17Maeve Duggan, “1 in 4 black Americans have faced online harassment because of their race or ethnicity,” Pew Research Center, July 25, 2017, http://www.pewresearch.org/fact-tank/2017/07/25/1-in-4-black-americans-…; Jason Wilson, “Doxxing, assault, death threats: the new dangers facing US journalists covering extremism,” The Guardian, June 14, 2018, https://www.theguardian.com/world/2018/jun/14/doxxing-assault-death-thr….
|Are websites, governmental and private entities, service providers, or individual users subject to widespread hacking and other forms of cyberattack?||1.001 3.003|
Cyberattacks are an ongoing threat to the security of networks and databases in the United States. Civil society groups, journalists, and politicians have also been subjected to targeted technical attacks.
In June 2020, research from the Toronto-based group Citizen Lab revealed that Dark Basin, a hack-for-hire group, had used phishing and other attacks against US NGOs working on issues related to net neutrality and a climate-change campaign called #ExxonKnew.1 Several journalists from major news outlets similarly faced technical attacks emanating from the group.
From the police killing of George Floyd in late May 2020 through the beginning of June, cyberattacks against advocacy groups increased by 1,120 times, including DDoS attacks against projects to raise bail funds for jailed protesters.2 Separately, a DDoS attack at the end of May on the Minneapolis Police Department’s website was attributed to the hacker collective Anonymous.3
Ahead of the general elections in November 2020, Microsoft announced in September that a hacking unit associated with Russian military intelligence had targeted at least 200 organizations, including national and state political parties and political consultants. Iranian and Chinese actors have also targeted people associated with Trump’s and Biden’s presidential campaigns.4 In October 2019, Microsoft discovered “significant cyber activity” coming from Phosphorus, a group believed to have links with the Iranian government.5 Within 30 days, Microsoft found more than 2,700 attempts to identify email accounts and hack 241 accounts of current and former US government officials, journalists, prominent Iranian expatriates, and President Trump’s reelection campaign. Previously in January 2019, the Democratic National Committee reported that some of its email addresses were targeted in a spear-phishing campaign strikingly similar to those conducted in 2016 by the Russian intelligence-linked hacking group known as Cozy Bear.6
In May 2020, the US government revealed that foreign actors, including foreign governments, had carried out cyberattacks against the Department of Health and Human Services, hospitals, research laboratories, health care providers, and other institutions in the medical industry.7 Groups linked to the Russian and Chinese governments have been identified as likely culprits behind attacks meant to steal COVID-19 medical information and research.8
Cyberattacks against state and local governments are increasingly common. In June 2019, Lake City, Florida, was hit by a ransomware attack that cost it nearly $460,000. 9 In August 2019, hackers mounted 22 simultaneous cyberattacks on state and local governments in Texas. That state was hit twice more in May 2020—first with an attack on its judicial agencies and then with an attack on the Department of Transportation.10 Municipal governments in New Bedford, Massachusetts;11 Pascagoula, Mississippi;12 and New Orleans, Louisiana;13 as well as the Louisiana state government,14 all experienced cyberattacks during the coverage period.
The United States has launched a series of legal and policy initiatives to address the growing threat of cyberattacks. In May 2020, the Senate Commerce Committee approved the Cybersecurity Competitions to Yield Better Efforts to Research the Latest Exceptionally Advanced Problems (CYBER LEAP) Act of 2020. It would establish incentives for the development of new practices and technology related to the economics of cyberattacks, cyber training, and federal agency resilience to cyberattacks.15 In September 2018, the White House released a National Cyber Strategy for the next 15 years, with goals that included securing critical infrastructure and partnering with the private sector.16 Critics of the strategy argued that it was “reckless,” as it called for an increase in preemptive, effectively offensive cybersecurity operations rather than focusing on defensive measures, which could “escalate conflicts” and prove counterproductive.17
In 2015, President Obama signed the Cybersecurity Information Sharing Act as part of an omnibus bill. The law requires DHS to share information about threats with private companies, and allows companies to voluntarily disclose information to federal agencies without fear of being sued for violating user privacy (see C6).18 Critics said that the measure’s privacy protections were not strong enough, and that the voluntary disclosure of data to any federal agency—which could include the Department of Defense—threatened to undermine civilian control of cybersecurity programs and blur the line between cybersecurity and law enforcement applications for the information.19
- 1John Scott-Railton et al., “Dark Basin: Uncovering a Massive Hack-for-Hire Operation,” The Citizen Lab,” June 9, 2020, https://citizenlab.ca/2020/06/dark-basin-uncovering-a-massive-hack-for-….
- 2Thomas Bewster, “Huge Cyberattacks Attempt to Silence Black Rights Movement with DDoS Attacks,” Forbes, June 3, 2020, https://www.forbes.com/sites/thomasbrewster/2020/06/03/huge-cyber-attac…; April Glaser, “Bail organizations, thrust into the national spotlight, are targeted by online trolls,” NBC News, June 5, 2020, https://www.nbcnews.com/tech/tech-news/bail-organizations-thrust-nation….
- 3David Molloy and Joe Tidy, “George Floyd: Anonymous Hackers Re-emerge Amid US Unrest,” BBC News, June 1, 2020, https://www.bbc.com/news/technology-52879000.
- 4Tom Burt, “New cyberattacks targeting U.S. elections ,” Microsoft Blog, September 10, 2020, https://blogs.microsoft.com/on-the-issues/2020/09/10/cyberattacks-us-el…; Dustin Volz, “Russian Hackers Have Targeted 200 Groups Tied to U.S. Election, Microsoft Says,” Wall Street Journal, September 10, 2020, https://www.wsj.com/articles/russian-hackers-have-targeted-200-groups-t….
- 5Tom Burt, “Recent cyberattacks require us all to be vigilant,” Microsoft Blogs, October 4, 2019, https://blogs.microsoft.com/on-the-issues/2019/10/04/recent-cyberattack…; Nicole Perlroth and David E. Sanger, “Iranian Hackers Target Trump Campaign as Threats to 2020 Mount,” The New York Times, October 4, 2019, https://www.nytimes.com/2019/10/04/technology/iranian-campaign-hackers-….
- 6Rebecca Morin and Eric Geller, “DNC says it was target of Russia cyberattack after 2018 midterms,” Politico, January 18, 2019, https://www.politico.com/story/2019/01/18/dnc-russia-cyberattack-midter….
- 7Zachary Cohen, “State-backed hackers behind wave of cyberattacks targeting coronavirus response, US and UK warn,” CNN, May 5, 2020, https://www.cnn.com/2020/05/05/politics/us-uk-cyberattack-warning-coron…; David E. Sanger, Nicole Perlroth, and Matthew Rosenberg, “Hackers Attack Health and Human Services Computer System,” New York Times, March 16, 2020, https://www.nytimes.com/2020/03/16/us/politics/coronavirus-cyber.html.
- 8Alex Marquardt et al., “US officially warns China is launching cyberattacks to steal coronavirus research,” CNN, May 13, 2020, https://www.cnn.com/2020/05/13/politics/us-china-hacking-coronavirus-wa…; Zachary Cohen, Luke McGee, Alex Marquardt, “UK, US and Canada allege Russian cyberattacks on Covid-19 research centers, CNN, Jul 17, 2020, https://www.cnn.com/2020/07/16/politics/russia-cyberattack-covid-vaccin….
- 9Nate Chute, “Pensacola is among dozens of cities hit by ransomware in 2019. Here's what 5 of them did,” Pensacola News Journal, December 11, 2019, https://www.pnj.com/story/news/2019/12/11/ransomware-attack-hacker-info….
- 10Sarah Coble, “Texas Takes Second Ransomware Hit,” Infosecurity Magazine, May 18, 2020, https://www.infosecurity-magazine.com/news/texas-takes-second-ransomwar….
- 11Jennette Barnes, “Ransomware Attacker Demanded $5.3 Million from City of New Bedford,” South Coast Today, September 4, 2019, https://www.southcoasttoday.com/news/20190904/update-ransomware-attacke….
- 12Associated Press, Mississippi City Works to Resolve Thanksgiving Cyber Attack,” U.S. News & World Report, December 10, 2019, https://www.usnews.com/news/best-states/mississippi/articles/2019-12-10…; Associated Press, “Mississippi School District Falls Victim to Cyber Attack,” U.S. News & World Report, November 7, 2019, https://www.usnews.com/news/best-states/mississippi/articles/2019-11-07….
- 13Marc Nathanson, “New Orleans City Government Hit With Cyberattack,” ABC News, December 14, 2019, https://abcnews.go.com/US/orleans-city-government-hit-cyberattack/story….
- 14Lauren Frias, “Louisiana’s Governor Declared a state of emergency after a cybersecurity attack on government servers,” Business Insider, November 22, 2019, https://www.businessinsider.com/louisiana-declares-state-of-emergency-a….
- 15Mariam Baksh, “Senate Commerce Advances Cyber Grand Challenge Bill with Some Tweaks,” NextGov, May 20, 2020, https://www.nextgov.com/cybersecurity/2020/05/senate-commerce-advances-….
- 16The White House, “National Cyber Strategy of the United States of America,” September 2018, https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-St….
- 17Josephine Wolff, “Trump’s Reckless Cybersecurity Strategy,” The New York Times, October 2, 2018, https://www.nytimes.com/2018/10/02/opinion/trumps-reckless-cybersecurit….
- 18114th Congress, H.R. 2029 - Consolidated Appropriations Act, 2016, Pub. L. 114-113, December 18, 2015, https://www.congress.gov/bill/114th-congress/house-bill/2029/text.
- 19Jadzia Butler, Greg Nojeim, “Cybersecurity Information Sharing in the ‘Ominous’ Budget Bill: A Setback for Privacy,” Center for Democracy and Technology, December 17, 2015, https://cdt.org/blog/cybersecurity-information-sharing-in-the-ominous-b….
On United States
See all data, scores & information on this country or territory.See More
Global Freedom Score83 100 free
Internet Freedom Score76 100 free
Freedom in the World StatusFree