Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 31

Full-Text Articles in Law

Hate Crimes In Cyberspace, Danielle Citron Jul 2014

Hate Crimes In Cyberspace, Danielle Citron

Danielle Keats Citron

Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit angry responses in a site’s comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible …


The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale Jan 2014

The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale

Danielle Keats Citron

Big Data is increasingly mined to rank and rate individuals. Predictive algorithms assess whether we are good credit risks, desirable employees, reliable tenants, valuable customers—or deadbeats, shirkers, menaces, and “wastes of time.” Crucial opportunities are on the line, including the ability to obtain loans, work, housing, and insurance. Though automated scoring is pervasive and consequential, it is also opaque and lacking oversight. In one area where regulation does prevail—credit—the law focuses on credit history, not the derivation of scores from data.

Procedural regularity is essential for those stigmatized by “artificially intelligent” scoring systems. The American due process tradition should inform …


Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks Dec 2013

Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks

Danielle Keats Citron

Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal punishment. They deny subjects' ability to decide if and when they are sexually exposed to the public and undermine trust needed for intimate relationships. Then too they produce grave emotional and dignitary harms, exact steep financial costs, and increase the risks of physical assault. A narrowly and carefully crafted criminal statute can comport with the First Amendment. The criminalization of revenge porn is necessary to protect against devastating privacy invasions that chill self-expression and ruin lives.


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Aug 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Danielle Keats Citron

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray Jun 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray

Danielle Keats Citron

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron Dec 2012

The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron

Danielle Keats Citron

We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Dec 2012

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Danielle Keats Citron

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …


Hate Crimes, Cyberbullying & The Rutgers Spy Cam Case, Danielle Citron Mar 2012

Hate Crimes, Cyberbullying & The Rutgers Spy Cam Case, Danielle Citron

Danielle Keats Citron

Interview on Radio Times with Marty Moss-Coane, WYYY Radio.


Misogynistic Cyber Hate Speech, Danielle Keats Citron Nov 2011

Misogynistic Cyber Hate Speech, Danielle Keats Citron

Danielle Keats Citron

In her testimony, Professor Citron provided a picture of misogynistic cyber hate, from the very worst abuses involving the harassment of individuals to less virulent forms of misogyny.


Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton Feb 2011

Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton

Danielle Keats Citron

No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group Kill a Jew Day, for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like How to Kill Beaners, Execute the Gays, and Murder Muslim Scum. The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse. Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate’s history. We believe that a thoughtful and nuanced intermediary-based approach to …


Civil Rights In The Information Age, Danielle Citron Feb 2011

Civil Rights In The Information Age, Danielle Citron

Danielle Keats Citron

[This book focuses] "on abuses made possible by anonymity, freedom from liability, and lack of oversight. The distinguished scholars assembled in this volume, drawn from law and philosophy, connect the absence of legal oversight with harassment and discrimination. Questioning the simplistic notion that abusive speech and mobocracy are the inevitable outcomes of new technology, they argue that current misuse is the outgrowth of social, technological, and legal choices. Seeing this clearly will help us to be better informed about our options." (copied from the book's description on the publisher's website)


Digital Discrimination, Danielle Citron Nov 2010

Digital Discrimination, Danielle Citron

Danielle Keats Citron

Social network sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women and minorities. The attacks include rape threats, privacy invasions, defamation, and technological attacks that silence victims. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Although social and legal norms have dampened offline discrimination, the internet’s Wild West culture and architecture invites bigots to move their hatred to cyberspace. The Internet facilitates anonymity, loosening social norms that constrain noxious behavior. It brings people together …


Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale Sep 2010

Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale

Danielle Keats Citron

A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security. While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron Jun 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron

Danielle Keats Citron

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Cyber Civil Rights: Looking Forward, Danielle Keats Citron Apr 2010

Cyber Civil Rights: Looking Forward, Danielle Keats Citron

Danielle Keats Citron

The Cyber Civil Rights conference raised many important questions about the practical and normative value of seeing online harassment as a discrimination problem. In these remarks, I highlight and address two important issues that must be tackled before moving forward with a cyber civil rights agenda. The first concerns the practical—whether we, in fact, have useful antidiscrimination tools at the state and federal level and, if not, how we might conceive of new ones. The second involves the normative—whether we should invoke technological solutions, such as traceability anonymity, as part of a cyber civil rights agenda given their potential risks.


Mainstreaming Privacy Torts, Danielle Keats Citron Apr 2010

Mainstreaming Privacy Torts, Danielle Keats Citron

Danielle Keats Citron

In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …


Government Speech 2.0, Helen L. Norton, Danielle Keats Citron Mar 2010

Government Speech 2.0, Helen L. Norton, Danielle Keats Citron

Danielle Keats Citron

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry Jan 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry

Danielle Keats Citron

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment. In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value of …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry Jan 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry

Danielle Keats Citron

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment. In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value of …


Civil Rights In The Cyber World, Danielle Citron Oct 2009

Civil Rights In The Cyber World, Danielle Citron

Danielle Keats Citron

No abstract provided.


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Citron Oct 2009

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Citron

Danielle Keats Citron

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Citron May 2009

Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Citron

Danielle Keats Citron

The online harassment of women exemplifies twenty-first century behavior that profoundly harms women yet too often remains overlooked and even trivialized. This harassment includes rape threats, doctored photographs portraying women being strangled, postings of women’s home addresses alongside suggestions that they should be sexually assaulted and technological attacks that shut down blogs and websites. It impedes women’s full participation in online life, often driving them offline, and undermines their autonomy, identity, dignity, and well-being. But the public and law enforcement routinely marginalize women’s experience, deeming it harmless teasing that women should expect, and tolerate, given the Internet’s Wild West norms …


Technological Due Process, Danielle Citron Apr 2009

Technological Due Process, Danielle Citron

Danielle Keats Citron

Today, computer systems terminate Medicaid benefits, remove voters from the rolls, exclude travelers from flying on commercial airlines, label (and often mislabel) individuals as dead-beat parents, and flag people as possible terrorists from their email and telephone records. But when an automated system rules against an individual, that person often has no way of knowing if a defective algorithm, erroneous facts, or some combination of the two produced the decision. Research showing strong psychological tendencies to defer to automated systems suggests that a hearing officer’s check on computer decisions will have limited value. At the same time, automation impairs participatory …


Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron Mar 2009

Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron

Danielle Keats Citron

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …


Cyber Civil Rights, Danielle Keats Citron Dec 2008

Cyber Civil Rights, Danielle Keats Citron

Danielle Keats Citron

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …


Open Code Governance, Danielle Keats Citron Oct 2008

Open Code Governance, Danielle Keats Citron

Danielle Keats Citron

Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person’s eligibility for public benefits. Computer systems store sensitive personal information. These systems’ closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program’s source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …


Cyber Civil Rights (Mp3), Danielle Citron Oct 2008

Cyber Civil Rights (Mp3), Danielle Citron

Danielle Keats Citron

No abstract provided.


Cyber Civil Rights, Danielle Keats Citron Oct 2008

Cyber Civil Rights, Danielle Keats Citron

Danielle Keats Citron

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …


Technological Due Process, Danielle Keats Citron Aug 2008

Technological Due Process, Danielle Keats Citron

Danielle Keats Citron

Distinct and complementary procedures for adjudications and rulemaking lie at the heart of twentieth-century administrative law. Due process required agencies to provide individuals notice and an opportunity to be heard. Agencies could foreclose policy issues that individuals might otherwise raise in adjudications through public rulemaking. One system allowed focused advocacy; the other featured broad participation. Each procedural regime compensated for the normative limits of the other. Both depended on clear statements of reason. The dichotomy between these procedural regimes has become outmoded. This century’s automated decision-making systems collapse individual adjudications into rulemaking while adhering to the procedural safeguards of neither. …


Open Code Governance, Danielle Keats Citron May 2008

Open Code Governance, Danielle Keats Citron

Danielle Keats Citron

Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person’s eligibility for public benefits. Computer systems store sensitive personal information. These systems’ closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program’s source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …