Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-wg55d Total loading time: 0 Render date: 2024-06-06T15:02:54.883Z Has data issue: false hasContentIssue false

Part II - Defamation and Privacy

Published online by Cambridge University Press:  16 May 2024

Kyle Langvardt
Affiliation:
University of Nebraska, Lincoln
Justin (Gus) Hurwitz
Affiliation:
University of Pennsylvania Law School

Summary

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2024
Creative Commons
Creative Common License - CCCreative Common License - BYCreative Common License - NCCreative Common License - ND
This content is Open Access and distributed under the terms of the Creative Commons Attribution licence CC-BY-NC-ND 4.0 https://creativecommons.org/cclicenses/

6 Defamation and Privacy What You Can’t Say about Me

Gus Hurwitz

The laws of defamation and privacy are at once similar and dissimilar. Falsity is the hallmark of defamation – the sharing of untrue information that tends to harm the subject’s standing in their community. Truth is the hallmark of privacy – the disclosure of facts about an individual who would prefer those facts to be private. Publication of true information cannot be defamatory; spreading of false information cannot violate an individual’s privacy. Scholars of either field could surely add epicycles to that characterization – but it does useful work as a starting point of comparison.

Yet both defamation and privacy law look similar in relief. Purported information about an individual – be it true or not – is shared with others, and through that sharing the individual experiences (subjective or objective) harm. In both, the subject of speech by one party appeals to the courts for relief from perceived harm resulting from that speech.

Speech has greater potential to be perceived as harmful today than it did at any point during the twentieth century – the century during which the contours of both defamation and privacy law were principally defined. Today we live in an era of “cheap speech and big speech.” The cost of producing and publishing speech has never been lower and the scale of the audience for that speech has never been larger. At the individual level, idle speech about other people (e.g., gossip, rumors) has migrated from locker rooms and water coolers to X – words whose impact was historically limited in terms of private reach and duration have become public and persistent. At the public level, competition between media outlets – once limited to a few established media outlets but now including potentially anyone with an X account and an appeal to the political or prurient – creates a race to publish anything deemed newsworthy. And by virtue of coverage, the once minor, trivial, or private can be thrust into the public spotlight, at least for limited public purposes.

Contingent facts, those most likely to be made subject to public scrutiny through either process, are not likely to be clearly true or false. Rather, the process of their publication is more likely relevant to how we, as a society, ought to evaluate the propriety and harmfulness of their publication. The chapters that follow explore both defamation and privacy law in this new era of cheap speech and big speech.

Lyrissa Lidsky leads things off with Chapter 7, “Cheap Speech and the Gordian Knot of Defamation Reform.” In her contribution, Professor Lidsky traces the development of defamation law alongside technology from the Restatement (Second) of Torts in 1977. As she says, “A lot has changed since 1977.” Lidsky tells us that “Today’s conversation is animated by concerns about the effects of cheap speech on the information ecosystem, with the critics asking if the constitutional strands of current defamation law tilt the scales too sharply in favor of free expression.” In particular, Lidsky assesses criticisms that Justices Thomas and Gorsuch have leveled at the First Amendment law of defamation – and she expresses skepticism about the reforms these Justices seemingly propose. But she also expresses sympathy for the idea that reform is needed, calling for “new remedies to better vindicate reputation and set the record straight, construct new incentives for journalists of all stripes to adhere to professionally developed standards for getting the facts right, and establish new deterrents to libel bullying.” In focusing on the reputational aspect of the defamation harm, Lidsky implicitly calls attention to the relationship between defamation and privacy harms.

In Chapter 8, “Defamation, Disinformation, and the Press Function,” RonNell Anderson Jones takes a deeper look at Justice Gorsuch’s suggestion that the Supreme Court reconsider New York Times v. Sullivan, “the foundational First Amendment precedent in defamation law.” In so doing she sounds a cautionary note. In the era of cheap speech it is easy to find criticism of institutional media publishing what amounts to disinformation. But the reality, Jones tells us, is more complicated: The institutional media are not our primary disinformation generators and distributors. To the contrary, they work hard to get things right and compete in terms of their ability to do so. Jones argues that overruling Sullivan would threaten media institutions’ ability to perform this costly and important function.

The next two chapters turn from defamation to privacy. Privacy harms differ from defamation harms because they typically stem from accurate but intrusive communications rather than false ones. But the emergence of cheap, platform-driven online speech has amplified privacy and defamation harms in a parallel way.

In her contribution, Professor Amy Gajda looks at the publication and changing uses of police mug shots. Mug shots, she explains, were based on a policy that “the public should know who’d been arrested and on what grounds and how they looked at the time of arrest in order to ensure that police had not battered them.” Historically, the local press might publish those mug shots they considered newsworthy. Today, a global audience can pick up digitized mug shots from public records websites. Gajda tracks recent developments in both state law and journalistic practice that attempt to narrow these photographs’ public circulation. She suggests that the trend toward privacy is likely to continue, and that “one’s entire criminal past, including one’s older mugshot, could one day come to be even more strongly protected on privacy grounds.” Contextualizing this alongside the discussion of privacy, it is remarkable to observe heightened restrictions on the publication of speech that is both factual and based in government activity.

Where Gajda’s chapter focuses on facts and speech created by the state, Professor Thomas Kadri’s chapter considers privately compiled information, focusing on harms facilitated by data brokers. In the era of cheap speech, it is far easier to collect, process, and bundle information about people – and there is a surprisingly vibrant market for this information. Indeed, the data brokers who make up this market further lower the cost of obtaining information about individuals by scouring various sources – public and sometimes private – for published information. Kadri documents specific instances of harm that such availability of information can facilitate (including the murder of a stalking victim). His greater point, however, is the privacy harm that this inflicts generally by robbing us of the obscurity that we all implicitly and explicitly rely on in our day-to-day lives. The data broker business model is built on taking the possibility of obscurity – the general presumption that our day-to-day activities will be unobserved by others – away from us, at least without each of us undertaking concerted efforts to maintain it. As with the other chapters in this part, Kadri’s contribution raises difficult questions about what rights individuals have to control the ways that information about them is used by others.

7 Cheap Speech and the Gordian Knot of Defamation Reform

Lyrissa Lidsky
Footnote *
7.1 Introduction

Dean John Wade, who replaced the great torts scholar William Prosser on the Restatement (Second) of Torts, put the finishing touches on the defamation sections in 1977.Footnote 1 Apple Computer had been founded a year before, and Microsoft two, but relatively few people owned computers yet. The twenty-four-hour news cycle was not yet a thing, and most Americans still trusted the press.Footnote 2

A lot has changed since 1977. Billions of people now publish their most profound, trivial, or scurrilous thoughts – unexpurgated – to mass audiences. Trying to compete with “cheap speech” has economically devastated large swaths of the news industry, stripping talent and expertise from newsrooms. Meanwhile, and perhaps unsurprisingly, public trust in news media has eroded dramatically.Footnote 3 These developments pose the biggest challenge for defamation law since the invention of the printing press. Yet they have not inspired dramatic reform to the common law of defamation.Footnote 4 Or at least not yet. As the American Law Institute begins a new Restatement of Defamation Law, it is important to consider what a successful program of reform might look like.

In this chapter, I examine some of the most important “reforms” to defamation law since 1977 and speculate about why those reforms have been predominantly constitutional and statutory, with common-law developments playing a less important role. I then evaluate recent critiques of defamation law’s constitutional dimensions by two U.S. Supreme Court Justices, paying special attention to Justice Neil Gorsuch’s argument that changed circumstances related to cheap speech justify reconsidering and perhaps eliminating some First Amendment constraints on the common law of defamation. I tally defamation law’s scorecard in vindicating reputation and deterring disinformation, which leads me to concur with some of Justice Gorsuch’s critiques. I nonetheless question his prescription. Merely rolling back constitutional protections will not deliver the proper balance between protecting individual reputation and safeguarding the types of speech that contribute to informed democratic decision-making, because powerful people will increasingly use defamation law to punish their critics. To achieve a proper balance, a more comprehensive approach to reform is needed. I offer the outlines of such an approach for untangling (rather than cutting) the inseverable interweaving of tort, constitutional, and statutory law.

7.2 Defamation Law Reform: 1977–Present

In its long history, defamation has been a sin, a crime, and a tort. In the United States, it now exists as a complex body of doctrine comprised of common law, constitutional law, and statutory law. The most important changes to defamation law since 1977 were constitutional and statutory rather than common-law changes. In 1977, the U.S. Supreme Court was still in the process of “constitutionalizing” defamation law. That process began with the Court’s seminal decision in New York Times v. Sullivan in 1964.Footnote 5 There, for the first time, the Court interpreted the First and Fourteenth Amendments to set limits on state common law in defamation cases involving public officials; the Court held that these limits were necessary to prevent state tort law from chilling uninhibited, robust, and wide-open commentary about government officials acting in their official capacity. Famously, Sullivan held that these officials could not recover for defamation absent proof that the person who allegedly defamed them knowingly or recklessly disregarded the falsity of the defamatory statement. But Sullivan was just the beginning. The Court later interpreted the First and Fourteenth Amendments to limit the common law in ways that reshaped practically every element of the defamation tort, particularly in cases involving litigants who were public officials, public figures, or ordinary people involved in matters of public concern – that is to say, almost all cases! The effect of the Court’s defamation jurisprudence was to impose a labyrinthine set of constitutional doctrines on the tort of defamation. It also imposed on lower courts the burden of interpreting these doctrines in novel situations and deciding whether to do so narrowly or, as they did in the case of deciding which plaintiffs qualified as public figures, expansively. Nonetheless, the Supreme Court’s constitutional doctrines fundamentally recalibrated the balance between reputation and free expression in defamation law: The common law could provide more protection for free expression than these doctrines required, but it could not provide less.

The Supreme Court’s constitutional doctrines did not foreclose common-law creativity in adapting to changing circumstances, but in the decades following the Court’s last major defamation decision in the early 1990s, legislators – not courts – played the leading role in enacting pro-defendant reforms. In the 1980s and early 1990s, scholars called for defamation reform in order to respond to a “dramatic proliferation of highly publicized libel actions brought by well-known figures who seek, and often receive, staggering sums of money.”Footnote 6 These calls for comprehensive reform had little traction in state courts, but starting in the 1990s and continuing to the present, states passed legislation to respond to the perceived problem of powerful actors weaponizing libel actions against ordinary citizens. The original impetus for such laws was the work of Professors George Pring and Penelope Canan. Pring and Canan documented the rise of a type of suit they branded Strategic Lawsuits Against Public Participation, or SLAPPs; they used this term to describe frivolous defamation suits brought by powerful local actors such as real-estate developers to stifle the criticisms and civic participation of ordinary citizens in forums such as zoning board meetings.Footnote 7 Their influential work, which culminated in a 1996 book, detailed how such suits invade not just First Amendment rights to free expression but also the right of citizens to petition their governments for redress of grievances. Pring and Canan brought public attention to the weaponization of defamation law by the powerful against the relatively powerless, and their work inspired more than half of all state legislatures to pass laws establishing procedures to allow defendants to obtain early dismissals of meritless libel suits; the laws sometimes enabled defendants to collect attorneys’ fees as well.Footnote 8 Where such anti-SLAPP laws exist, and especially in jurisdictions adopting them in their stronger forms, they have dramatic effects on libel litigation – and not just on cases that fit Pring and Canan’s original paradigm.

As important as anti-SLAPP legislation is, the most dramatic defamation reform of the last forty or so years took place in 1996, with the passage of Section 230 of the Communications Decency Act. It is not a stretch to say that this statutory defamation reform helped propel the Cheap Speech Revolution. Section 230(c) immunized internet service providers and website operators from liability for defamatory communications posted by their users. Congress granted this immunity to the actors we would later come to call platforms and, more recently, Big Tech.Footnote 9 Congress’s legislative efforts stemmed from dissatisfaction with common law’s attempt to apply traditional defamation law principles to internet service providers. Prior to the passage of Section 230, two influential district-court decisions held that internet service providers who exercised editorial control by editing or taking down user-generated content would be liable for defamatory content posted by their users, just as newspapers are liable for defamatory content they publish in letters to the editor; internet service providers who eschewed editorial control, however, would be liable only upon receiving notice of users’ defamatory content and subsequently failing to remove it, just as – ostensiblyFootnote 10 – bookstores and other content “distributors” are.Footnote 11 These decisions disincentivized internet service providers from taking down problematic content to avoid being treated like traditional media “publishers.”

Yet, instead of merely insulating internet service providers from liability akin to that of traditional publishers, the broad language of Section 230’s immunity insulated ISPs from distributor – or notice-and-takedown – liability as well, ostensibly to fuel the growth of the internet as an economic engine. Whether this was necessary is arguable, since most of the world imposes notice-and-takedown liability on Google, Facebook, and other Big Tech actors. Nonetheless, the effect of Section 230 has been to foreclose U.S. victims defamed online or in social media from accessing the deep pockets of Big Tech. Only the person posting the defamatory statement may be sued, regardless of whether that person can even be found or has resources to litigate or satisfy a defamation judgment. Section 230’s effect on the development of defamation law over the last quarter of a century cannot be overstated. Absent Section 230, suits against online intermediaries would be much more common than they are today, and common-law courts would certainly bear more responsibility for adapting defamation principles to Big Tech practices – shaping those practices in the process. If the Supreme Court narrows the scope of immunity under Section 230, we can once again expect a dramatic reshaping of Big Tech practices.

To say that constitutional and statutory developments were the biggest news of defamation law over the last forty-five years is not to say that the common law has not responded at all to some of the novel issues cheap speech poses. For example, courts have had to decide whether an internet post is slander or libel, whether a person who provides a hyperlink to an article has “published” it for defamation purposes, and what to do about defamation cases based on reviews or rankings determined by algorithms.Footnote 12 New issues continue to arise, and as they do, courts tend to adapt common-law doctrines by analogizing new communications formats to old ones, though they sometimes resort to creatively using equitable doctrines, such as libel injunctions, to deter those who might not be deterred by orders to pay money damages.Footnote 13

Even so, common law’s creativity in responding to cheap speech has been stymied by its inherent incrementalism and respect for precedent: Even now, only a minority of states have eradicated the outmoded distinctions between libel and slander, which arose from a jurisdictional battle between ecclesiastical and seigneurial courts in England and which commentators have decried for hundreds of years.Footnote 14 But an even bigger obstacle to comprehensive common-law reform is the Supreme Court’s pervasive constitutionalization of the underlying tort. Having tilted the scales toward the First Amendment in most defamation cases, the Supreme Court left little leeway for states to add reputational protections for their citizens and, for much of this time, the substantive and procedural constitutional protections seemed more than sufficient to protect free expression, especially when coupled with statutes allowing for early dismissals of frivolous actions. The effect has been a sort of practical pre-emption of common law rebalancing reputation versus expression. Now, however, there is growing discontent with our information ecosystem: Is defamation-law reform the answer?

7.3 Defamation Law’s New Critics

Today’s public conversation about defamation-law reform is being galvanized by a spate of high-profile lawsuits and critiques of the law offered by a president and two Supreme Court Justices. Today’s conversation is animated by concerns about the effects of cheap speech on the information ecosystem, with the critics asking if the constitutional strands of current defamation law tilt the scales too sharply in favor of free expression.

The Media Law Resource Center’s data confirm the popular impression that more defamation lawsuits have been brought in the last few years than previously. Moreover, the ones that have been brought seem to be more visible. High-profile plaintiffs appear to have multiplied,Footnote 15 with household names such as Sarah Palin, Devin Nunes, Roy Moore, and Donald Trump all suing for defamation.Footnote 16 Other recent lawsuits are noteworthy because they involve high-profile defendants and important societal issues. Notable in this regard are:

  • the many lawsuits by women who were called liars after alleging sexual harassment by Donald Trump;

  • the lawsuits brought by parents accused of being “crisis actors” after their children were murdered at Sandy Hook, which have now resulted in judgments of more than a billion dollars against internet personality Alex Jones;

  • the lawsuits, now settled or dismissed, by a Kentucky teen whose perplexity was misreported by many media sources as racism based on a viral video that contained its own refutation;

  • the lawsuit, currently on appeal, brought and won by actor Johnny Depp against his former wife Amber Heard for accusing him of sexual violence, and her countersuit, also won in part and also on appeal, for his accusations that she fabricated evidence to further her defamatory accusations;

  • the lawsuits, now settled, by Georgia poll workers accused of tampering with the results of the 2020 presidential election; and

  • the lawsuits, ongoing, by the providers of electronic voting machines alleged by prominent Trump partisans and conservative news networks to have fraudulently delivered the 2020 election to President Biden.

Like high-profile defamation lawsuits of past eras, these involve high-profile political figures, celebrities, and reputable media. Unlike their high-profile predecessors, they also involve fringe media outlets, a president – as both defendant and plaintiff – and even individuals posting to social media through pseudonymous parody accounts, such as @DevinNunesCow.

More interesting than the number of recent libel lawsuits is the prominence of libel law’s recent critics. While running for president, Donald Trump promised to “open up” libel laws. Critics derided Trump’s promise, noting – correctly – that presidents control neither state common law nor the interpretation of the First Amendment.Footnote 17 Yet, though Trump’s promise to change libel law may not have amounted to much in the short term, Justices Clarence Thomas and Neil Gorsuch may have begun playing a long game to galvanize constitutional reform. Justice Thomas began calling for reconsideration of New York Times v. Sullivan in his concurrence in the Court’s denial of certiorari in McKee v. Cosby in 2019, which was a defamation case brought by a woman against the former actor Bill Cosby. Cosby had accused her of lying about him sexually assaulting her. Although Justice Thomas’s opinion in that case seemed quixotic at the time, he subsequently has asked the Supreme Court to consider rolling back or eliminating the constitutional protections grafted onto libel law in two more libel cases in which the Court denied certiorari. Justice Gorsuch has written separately in one of these cases, Berisha v. Lawson, to echo Thomas’s call for reconsideration – though on different grounds.Footnote 18 The latest of these cases was relisted repeatedly before the Court denied certiorari, and in light of the recent activism of the Supreme Court in overturning settled constitutional precedents, court prognosticators suspect the Court may take a case revisiting its defamation jurisprudence soon.

So far, Justice Clarence Thomas has grounded his critique of the Court’s defamation jurisprudence largely in originalism concerns, calling New York Times v. Sullivan and the subsequent Supreme Court cases extending it “policy-driven decisions masquerading as constitutional law” that lack any relation to the “text, history, or structure of the Constitution.”Footnote 19 Justice Thomas asserts that the Court should inquire “whether either the First or Fourteenth Amendment, as originally understood, encompasses an actual-malice standard for public figures or otherwise displaces vast swaths of state defamation law.”Footnote 20 He indicates this inquiry would reveal that the Court’s defamation jurisprudence is supported by “little historical evidence” and should be overruled.Footnote 21 Scholar Matthew Schafer has already cast doubt on Thomas’s historical evidence concerning the original meaning of the First Amendment,Footnote 22 and the Justice’s reliance on scandalum magnatum, a disavowed action by which British monarchs and “great men of the realm” (i.e., members of the peerage) criminally punished their critics, is singularly unpersuasive and even embarrassing.Footnote 23 Be that as it may, however, the originalist portion of Thomas’s argument, even if he were correct in his historical analysis, is likely to convince only those who believe that the First Amendment should protect no more speech today than it did in 1791 (or perhaps in 1868, when the Fourteenth Amendment was ratified).

Justice Thomas’s policy arguments are more persuasive. These focus on the “real-world” negative effects of the Court’s constitutionalization of defamation law.Footnote 24 He asserts that the Court’s defamation jurisprudence has “allowed media organizations and interest groups ‘to cast false aspersions on public figures with near impunity.’”Footnote 25 His boldest claim, however, is that the actual-malice standard fosters lies in public discourse by “insulat[ing] those who perpetrate [them] from traditional remedies like libel suits.”Footnote 26 He cites examples of conspiracy theories, hoaxes, and campaigns of online character assassination as evidence for the proposition that “lies impose real harm.” Although he does not fully connect the premises of his argument to his conclusion, he seems to assert that the common law of libel, left to its own devices, could deter viral lies and other pernicious disinformation.Footnote 27 Beyond that, he does not elaborate on how unshackling the common law from First Amendment constraints would deter the proliferation of lies, and he does not ground the need for this deterrent fully in “cheap speech” concerns.

Justice Gorsuch, on the other hand, spotlights changes in the communication environment since 1964 as a basis for the reconsideration of Sullivan, and he claims that these changes undermine the rationales of the Court’s actual-malice standard and public-figure doctrine. If Justice Gorsuch is correct in his criticisms, his call for reform should resonate even with those who have no truck with originalism. It is therefore useful to evaluate Gorsuch’s concerns and determine what types of reforms might ameliorate them.

In an opinion dissenting from the denial of certiorari in Berisha v. Lawson, Justice Gorsuch postulates that the Framers understood the importance of press freedom to the healthy functioning of democracy.Footnote 28 Nonetheless, he writes, “like most rights, [freedom of the press] comes with corresponding duties.”Footnote 29 One of those duties is the duty “to try to get the facts right – or, like anyone else, answer in tort for the injuries they cause.”Footnote 30 The implicit message of his dissent is that the press once tried to get the facts right, but this may no longer be the case.

Although Justice Gorsuch criticizes Sullivan as “overturning 200 years of libel law,” his chief lament is not an originalist one.Footnote 31 Instead, his chief argument is that changes in “our Nation’s media landscape” since 1964 have undermined Sullivan’s logic.Footnote 32 According to Justice Gorsuch, “revolutions in technology” have allowed “virtually anyone in this country” to “publish virtually anything for immediate consumption virtually anywhere in the world.”Footnote 33 Justice Gorsuch concedes that “this new media world has many virtues,” such as enhancing individuals’ access to information and opportunities to debate, but he appears to believe social media’s virtues are outweighed by negative effects on information quality.Footnote 34 According to Gorsuch, the social-media revolution has undermined the economic model that once gave newspapers and broadcasters professional and economic incentives to strive for accuracy and the ability to invest in the reporters, editors, and fact-checkers necessary to deliver it. He also blames the “new media environment”Footnote 35 for the spread of disinformation, which financially rewards its creators, “costs almost nothing to generate,”Footnote 36 and spreads more effectively than real news.

Gorsuch suggests that these changes undermine the justifications for Sullivan’s actual-malice standard. For example, he questions the need for actual malice to play a role in protecting “critical voices” from defamation liability, implying that the sheer quantity of people who possess an electronic “soapbox” is sufficient to guarantee a diversity of views.Footnote 37 He further indicates that while the actual-malice rule may have made sense in a media environment that had “other safeguards” against “defamatory falsehoods and misinformation,” it no longer makes sense once those safeguards – such as the media’s professional and economic incentives to deliver accurate information – have (or so he claims) evaporated.Footnote 38

In the meantime, Gorsuch criticizes the evolution of the actual-malice standard “from a high bar to recovery into an effective immunity from liability.”Footnote 39 Perplexingly, he contends that actual malice now creates a legal incentive for “publishing without investigation, fact-checking, or editing,” a contention with which many media lawyers would surely disagree.Footnote 40 Defendants win cases, after all, by negating fault. But for Justice Gorsuch, the actual-malice standard “has evolved into an ironclad subsidy for the publication of falsehoods by means and on a scale previously unimaginable.”Footnote 41 Thus, he concludes, the actual-malice standard now thwarts, rather than bolsters, the “informed democratic debate” that First Amendment theory envisions.Footnote 42

He also decries the fact that “today’s world,” with its “highly segmented media,” casts more and more citizens as “public figures” for defamation purposes, leaving “far more people without redress than anyone [in 1964] could have predicted.”Footnote 43 The effect, he speculates, may be to deter “people of goodwill” from entering “public life” or engaging “in democratic self-governance.”Footnote 44 Again he suggests that Sullivan’s original justifications may be thwarted rather than advanced by the expansion of the public-figure doctrine in the social-media era, and he asks the Supreme Court as a whole to “return[] its attention” to the limits that its jurisprudence has placed on the common law of defamation.Footnote 45

7.4 Defamation’s Scorecard

Between them, Justices Thomas and Gorsuch lay the fault for the unfortunate state of public discourse at the feet of today’s defamation law, with Justice Gorsuch specifically faulting the law’s inability to address the dangers of “cheap speech” because of the actual-malice and public-figure doctrines. He further suggests that revisiting the constitutional limits on defamation law might help bolster the declining quality of journalism, combat the rise of disinformation and lies, deter campaigns of character assassination, and foster “informed democratic debate.”Footnote 46 Is he correct?

First, it is important to note that the common law of defamation was famously complex even prior to the intervention of constitutional law in 1964, and nothing has happened since then to significantly reduce that complexity. Defamation law comes by its complications honestly: Laws protecting reputation appeared in Anglo-Saxon law before the Norman Conquest, and at least as early as the thirteenth century, defamation was a spiritual offense, punishable by excommunication in ecclesiastical courts. Later, ecclesiastical and seigneurial courts divided jurisdiction between them for different kinds of defamation, and in the later Middle Ages and into the sixteenth and seventeenth centuries, the Crown punished “disgraceful words and speeches against eminent persons,” known as scandalum magnatum.Footnote 47 Each of these historical developments contributed to the anomalies and absurdities of the common law of defamation,Footnote 48 and that was before the Supreme Court effectively froze these complexities into place and began adding many more in the thirty years following 1964.

Taking these complexities into account, it is fair to judge defamation law by how well it protects the values it purports to protect. The tort side of defamation is meant to protect individual reputation, a value no “civilized society” can “refuse to protect.”Footnote 49 The tort reflects society’s “basic concept of the essential dignity and worth of every human being.”Footnote 50 The tort exists not only to safeguard and vindicate reputational injury but also to compensate injured individuals for dignitary, relational, and economic harms that flow from reputational injury. Moreover, the tort exists to exert a civilizing influence on public discourse: It not only gives society a means for announcing that certain speech violates our norms of propriety but also helps set a necessary anchor in truth. Yet the interests protected by defamation law are not the only interests implicated by the tort’s operations, and the purpose of the “constitutional” parts of defamation law are to make sure the public continues to receive information necessary for democratic self-governance and informed individual decision-making. Further, the Constitution protects citizens’ rights to participate in forming public opinion and, in turn, shaping public policy. Statutory modifications, such as anti-SLAPP laws and the immunity provided to internet service providers by the Communications Decency Act, also attempt to prevent the tort from unduly chilling valuable social activity. Given the complex balancing performed by the constitutionalized and statutorily modified tort of defamation, how does the law score in achieving its various purposes?

Let us start with the good news. One value that today’s defamation law attempts to serve is to encourage media to perform their watchdog role by providing robust coverage of public officials and public figures. By that standard, media in the United States, including our newspapers and broadcasters, have more scope and license to cover and criticize public figures and public officials than any other media in the world. We can see the effects of these robust First Amendment protections in the intense coverage of presidents, congressional leaders, judges, and other influential public officials. It occasionally seems as though no personal predilection of our public officials is too inconsequential to escape notice. It is especially remarkable that the media continue to intensively cover now-former president Trump, despite his long-standing propensity to bring defamation lawsuits against those who criticize him. We also see the effects of First Amendment doctrines that protect newsworthy information about public figures in the spotlight the media shine on celebrities, businesspeople, and other so-called “influencers.” Concededly, coverage is less robust at local levels, but that appears to be a product of economics, not law. Even so, whether Sullivan’s actual-malice rule is essential to enabling the press to play their watchdog role is hard to know, but it stands to reason that being absolved of liability for inevitable human error and simple negligence might aid the vigor with which the press pursues the powerful.

That said, Sullivan’s protective mantle for journalistic errors is not the only variable to consider in evaluating the incentive structure of today’s defamation laws. For publishers subject to it, the potential chilling effect that defamation law exerts on free expression flows not just from the likelihood that a jury or judge will hold a publisher liable; the chilling effect also flows from the high cost of defending against even meritless suits and the unpredictable extent of damages, both of which are exacerbated by common law’s famous complexities and anomalous doctrines such as presumed damages, as well as those of constitutional law. Legal complexity contributes to the high costs of libel defense, and the unpredictability of damages that may be “presumed” when plaintiffs do prevail exert a degree of chill on coverage. This chill would be fine, even desirable, if only meritorious plaintiffs recovered and recoveries were predictably related to actual reputational harms suffered. Yet a survey of the libel landscape reveals lottery-like windfalls for a select few that are only marginally connected to their injuries.

Contrary to Justice Gorsuch’s assertion, some of these recoveries are by plaintiffs who are public figures. Although verdicts for plaintiffs are rare, plaintiffs who do win sometimes obtain verdicts in the millions (or a billion now, as in the Alex Jones cases). Other recent wins include the recent libel verdict against actor Amber Heard procured by her ex-husband Johnny Depp based on allegations of spousal abuse, and the verdict against Oberlin College by a bakery falsely accused of racist acts.Footnote 51 Settlements, too, may reach into the millions, as attested recently by those obtained by Kentucky teen Nicholas Sandmann against The Washington Post and other media organizations that falsely accused him of bigoted misconduct. (Other Sandmann cases were recently dismissed.) Moreover, in the cases that Smartmatic and Dominion Voting Systems have brought against Fox News and others, the plaintiffs seek damages in the billions with a straight face.Footnote 52 Although these verdicts, settlements, and claims may not deter the judgment-proof, nor those ignorant of the law, any media organization must take into account the unpredictable risk of being sued and found liable, even if the Supreme Court’s First Amendment jurisprudence has stacked the constitutional deck in favor of free expression.

Even if defamation law may incentivize robust coverage of society’s influencers for some, it does a relatively poor job of vindicating wrongfully tarnished reputations.Footnote 53 Gorsuch’s diagnosis of the constitutional difficulties that make defamation cases seem impossible for public figures and public officials are real, primarily because lower courts have expanded the public-figure category to include almost anyone who is involved in public life in any way. And even those clearly categorized as public figures may choose to prove actual malice in order to seek punitive damages.

A recent case illustrates why some might believe the actual-malice standard prevents the media from being held responsible for getting the facts wrong. Former vice-presidential candidate Sarah Palin sued The New York Times for libel based on an erroneous editorial blaming a Palin political website for inciting a mass shooting. Palin’s website had featured crosshairs over an Arizona congressional district, and the site “targeted” congressperson Gabrielle Giffords for electoral defeat. After Giffords and others were shot by a deranged gunman in 2011, a controversy arose over what had inspired the gunman, but a contemporaneous police report made clear that the gunman was not motivated by politics. Nonetheless, in 2017, the Times brought up the previously discredited theory about Palin’s website, claiming that “the link to the political incitement was clear.”Footnote 54 The Times quickly discovered the error and issued a correction hours after it was published. When the case went to trial, the focus was on whether the error was an “honest mistake” or instead deliberate or reckless.Footnote 55 The evidence focused on the rush to finish the piece before its deadline, the editors’ erroneous correction to the work of the writer, the subsequent request for the writer to double-check the piece, and the error made by the fact-checker.Footnote 56 Although Palin testified about the alleged harms she’d suffered, the trial focused more on the Times’ journalistic process than the wrong to Palin. And Palin lost based on the latter issue: The jury found no liability, and the trial judge openly stated that he would have found Palin’s evidence insufficient to prove the Times’ error was deliberate or reckless had the jury found differently. Thus, Palin received vindication – if that is what she was seeking – only to the extent of bringing publicity to the Times’ error, which the trial judge called a product of “unfortunate editorializing.”Footnote 57

Based on Palin’s verdict, Justice Gorsuch could be forgiven for thinking that the actual-malice standard is an insurmountable barrier to plaintiffs’ recoveries. This is a common and long-standing misimpression. In fact, thirty years ago, distinguished defamation scholar David Anderson complained that high-profile mistakes by the press created an “exaggerated impression in the minds of some potential plaintiffs and lawyers that the press is impervious to public-plaintiff libel suits” when in fact, that is not the truth, as the verdicts, settlements, and costly litigation already discussed above reveal.Footnote 58 But Palin’s suit also highlights a more significant flaw in today’s defamation law: Many plaintiffs would like the libel trial to act as an authoritative public declaration that they were wronged by a defendant’s accusation, but this is not a result the libel trial is designed to give.

What of Truth? Justice Gorsuch laid the blame at the feet of defamation law for failing to combat disinformation and misinformation in the social-media era, and he even theorized that more defamation actions would enhance press credibility. Certainly, Gorsuch is not alone in decrying the rise of misinformation and disinformation, though critics cast blame for the situation in different quarters: The Trump White House famously fought a rhetorical war against “fake news” in the press, and the Biden White House proposed, briefly, a Disinformation Governance Board to counter misinformation affecting national security, though the proposal was withdrawn after public outcry. Many critics blame Big Tech platforms for not doing more to eradicate false information, while others fault them for doing too much censorship along partisan lines. Meanwhile, the purveyors of false information include state actors exploiting the power of social networks to undermine social stability or pursue other political ends; rogue actors creating fake news for profit; people using social media to voice their delusional conspiracy theories; partisans primed to believe only the information they want to believe and pass it along to others; lawyers determined to represent clients using whatever “facts” are expedient, ethics rules be damned; and, finally, journalists who fail to adequately investigate, edit, or verify the information they publish – perhaps because of preexisting biases.

Even aside from the fact that defamation law can only address lies that affect individual reputation, only some of the purveyors of misinformation or disinformation are even capable of being deterred by the prospect of a U.S. defamation lawsuit. Moreover, those who can be deterred are probably the smallest contributors to the disinformation crisis. Sloppy journalism might be deterred at the margins by changes in defamation law, though it is unlikely that the inevitable human errors that occur in the rush to meet deadlines will cease, and changes to make it easier to sue for negligent or even innocent mistakes run the risk of deterring coverage of those with the resources (and propensity) to sue.

More to the point, the actual-malice standard already allows plaintiffs to target lies and recklessly spread falsehoods, and a couple of recent lawsuits are setting out to prove it. Smartmatic and Dominion Voting Systems supplied electronic voting machinery for the 2020 presidential election. They became targets of President Trump’s partisans, who alleged that the companies’ machines had assisted in stealing the election from Trump through fraud. Smartmatic and Dominion Voting Systems separately filed defamation cases against various purveyors of this so-called Big Lie, and these lawsuits have become test cases for whether defamation lawsuits can be used to combat hyper-partisan disinformation. But they are also test cases for whether certain news networks have gone too far in embracing such disinformation and lending their credibility to lies and reckless falsehoods.

The defendants in these suits include lawyers who formerly represented President Trump; supporters of President Trump; news networks Newsmax, One America News, and Fox News; and several journalist-news hosts, including Lou Dobbs and Maria Bartiromo.Footnote 59 In its 285-page complaint against Fox, Smartmatic seeks $2.7 billion in damages. Dominion’s suit against Fox seeks $1.6 billion. In both cases, defamation law’s failure to insist on only compensating for actual harms means that plaintiffs can claim damages completely untethered to any objective reality.

Nonetheless, the lawsuits make damning allegations, suggesting that the news networks named in the case promoted the Big Lie to stoke ratings – despite having evidence that the allegations of fraud made by network hosts and their guests were false. Judges have so far refused to dismiss the voting-machine companies’ claims.Footnote 60 Should these cases go to trial, they will put a powerful spotlight on the editorial choices of the news networks, and there is some indication they have already led Fox to fire some of the news hosts who were most instrumental in trumpeting the voting-fraud allegations. Whether lawsuits such as this will result in more media responsibility and credibility overall seems dubious, however, especially since the facts are distinctly atypical. Nonetheless, plaintiff victories could potentially bankrupt some of these news networks, sending a klaxon signal warning that the actual-malice standard is not, after all, a free pass for falsehoods.

7.5 First Do No Harm

As detailed above, Justice Gorsuch is simply wrong to assume that actual malice is an insurmountable barrier to recovery for defamation. Nonetheless, some of Gorsuch’s skepticism regarding the current state of defamation law seems justified: Defamation law inadequately vindicates reputation, and it only combats disinformation at the margins – though, contrary to his assertions, it does do that! But whether defamation law would perform these tasks better if Sullivan and its progeny were to be repealed is by no means clear, especially since most of the purveyors of disinformation seem to be beyond the reach of defamation law. While allowing a wider swath of plaintiffs to bring suit by proving negligence rather than actual malice might lead to more plaintiffs achieving vindication, it seems unlikely that it would significantly bolster the quality of journalism in a way that leads to more “informed democratic debate.”Footnote 61

Gorsuch’s prescription ignores the problem that Sullivan’s holding was trying to solve, namely, the use of defamation lawsuits as a tool that the powerful use to delegitimize and defang their critics. In Sullivan, Southern officials sued civil-rights leaders and a Northern newspaper, The New York Times, for publishing an advertisement decrying the repeated arrests and harassment of Dr. Martin Luther King. The advertisement contained minor inaccuracies, the kind that newspapers inevitably make even when trying to get the facts right. These minor errors were enough to justify the Alabama jury in awarding the police commissioner $3 million from the Times and the other defendants. At this time, this was the biggest libel verdict in U.S. history,Footnote 62 and the jury made the award despite the fact that the commissioner had “made no effort to prove that he suffered actual pecuniary loss.”Footnote 63 Had the verdict been allowed to stand, the South would have continued to use libel law to hamstring the Civil Rights Movement and to punish newspapers for making minor factual errors while performing their watchdog role. Had it been allowed to stand, papers like the Times would have faced the choice between their economic survival and ceasing to cover the most important news stories of the era.

To prevent this result, the Supreme Court famously held that public officials could not use the law of torts to punish their critics: They did so by beginning the conversion of the defamation law from a no-fault regime to a largely fault-based regime, as well as one that requires plaintiffs suing for stories involving matters of public concern to prove falsity. The constitutional standards protect merely negligent defamatory falsehoods, giving journalists and citizens “breathing space” to report and opine about the doings of public officials.

Justice Gorsuch fails to appreciate that this breathing space is still needed. Rich people still sue their critics for defamation because they can: It’s a relatively easy way to inflict pain on one’s critics and to make would-be critics think twice, even if the defendant ultimately “wins.” Politicians still sue the relatively powerless to punish them for their temerity in speaking out. The media, while not the only targets of weaponized defamation suits, still deserve protection not only because they are repeat players but also because, as Justice Gorsuch recognized, they have played a special role in producing an informed citizenry since the country’s founding. Overturning Sullivan would subject an economically weakened and unpopular press to even more variable defamation laws, making them easier targets for those who despise them and their roles. If the goal is to ensure that informed democratic debate does not suffer, it is hard to see how jettisoning the actual-malice standard accomplishes it, unless it is replaced by a series of complex doctrinal reforms.

7.6 A Prescription for Reform

Even so, Justice Gorsuch is clearly right about one thing: Defamation law needs reform. Ideally, that reform would look comprehensively at the various common-law, constitutional, and statutory components, and study how they work together. It would bring simplicity and clarity to the “doctrinal intricacy” of current law. It would consider whether doctrines such as libel, slander, and presumed damages have outlived their usefulness. It would also develop new remedies to better vindicate reputation and set the record straight, construct new incentives for journalists of all stripes to adhere to professionally developed standards for getting the facts right, and establish new deterrents to libel bullying, including a reduction of the availability of lottery-like windfalls obtainable only by the fortunate few. While reform is needed, however, simply cutting the constitutional strands of the Gordian Knot of defamation law risks unraveling protections for expression without enhancing the other goals the law is supposed to advance.

8 Defamation, Disinformation, and the Press Function

RonNell Andersen Jones
8.1 Introduction

Coordinated campaigns of falsehoods are poisoning public discourse.Footnote 1 Amidst a torrent of social-media conspiracy theories and lies – on topics as central to the nation’s wellbeing as elections and public health – scholars and jurists are turning their attention to the causes of this disinformation crisis and the potential solutions to it.

Justice Neil Gorsuch recently suggested that, in response to this challenge, the U.S. Supreme Court should take a case to reconsider New York Times v. Sullivan, the foundational First Amendment precedent in defamation law.Footnote 2 A major premise of Justice Gorsuch’s critique of Sullivan is that the changing social-media dynamics – and the disinformation crisis that has accompanied them – threaten the nation’s democracy. He argues this changed terrain may call for less stringent constitutional protections in defamation actions. This chapter explores and challenges that critique. Justice Gorsuch is correct that rampant social-media disinformation poses a grave risk to our political and social stability, but there is a troubling disconnect between the anti-disinformation and pro-democracy concerns he articulates and the doctrinal revisions he considers. When the interrelationships between disinformation, defamation, and democracy are interrogated – and especially, when they are situated within the constitutional value of the press function that served as the backdrop for Sullivanit becomes clear that unwinding the Sullivan doctrine would not be a productive tool for remedying the problem of rampant social-media lies. Indeed, doing so carries the very real risk of exacerbating the problem. Abandoning the Sullivan line of protections would impair those valuable press speakers who are actively prioritizing trustworthy newsgathering and corrective reporting, and it would do so with no meaningful payoff in solving the online-disinformation problem that seems to be driving this proposed reconsideration.

This inquiry matters. Sullivan is not exclusively a press-freedom case, but at this critical juncture, it is a centerpiece of protection for some core press functions (performed by both legacy media and others) that are crucial to healthy public discourse. A Sullivan scaleback harms those entities that are incentivized to get information right, to invest in careful newsgathering, and to engage in important journalistic investigations exposing those who peddle disinformation. At a moment of declining newsroom and press-litigation resources and of increased willingness of public people to weaponize defamation as a tool for silencing and deterring critics, the risks of self-censorship voiced by the unanimous Sullivan Court are especially grave.

Representative democracy needs the press function to survive and flourish. There is every reason to believe that a rollback of Sullivan would compound rather than alleviate the disinformation problem and would further imperil the fragile democracy.

8.2 The Sullivan Doctrine

New York Times v. Sullivan came to the Supreme Court at another moment of intense focus on the need for vibrant dialogue in American democracy. As the Civil Rights Movement pressed across the Deep South, its story was carried through the nation by way of prominent Northern newspapers, especially The New York Times.Footnote 3 The case arose out of a full-page editorial advertisement that the Times published, which criticized the way that police had used violence and illegal tactics to try to quell the peaceful protests in Montgomery, Alabama.Footnote 4 The basic thrust of the charges contained in the advertisement was true, but the advertisement contained minor factual errors.Footnote 5 Sullivan, the Montgomery police commissioner, sued for defamation, and Alabama common law did not require that he prove either falsity or fault. The trial judge instructed that the statements were libelous per se and that general damages could be presumed. A jury awarded a half-million-dollar verdict against the newspaper, which was upheld by the Alabama Supreme Court.Footnote 6 The suit – one of eleven filed by Alabama officials alleging libelous reporting of local events and seeking a total of more than five and a half million dollars in damages – was a clear effort to wield defamation law as a silencing mechanism, and it worked. The newspaper pulled correspondents out of the state for a year in response.Footnote 7

In a unanimous opinion that centered on the intersection of democratic self-governance and free speech, the Supreme Court held that the Constitution imposes limitations on defamation liability.Footnote 8 The First Amendment, the Court said, prevents “a public official from recovering damages for a defamatory falsehood relating to his official conduct unless he proves that the statement was made with ‘actual malice’ – that is, with knowledge that it was false or with reckless disregard of whether it was false or not.”Footnote 9 The deliberately demanding standard operates “against the background of a profound national commitment to the principle that debate on public issues should be uninhibited, robust, and wide-open, and that it may well include vehement, caustic, and sometimes unpleasantly sharp attacks on government and public officials.”Footnote 10 Criticism of the powerful – and the conversations that emerge out of this criticism – are at the core of the First Amendment’s purpose and value to us as a citizenry.Footnote 11 The doctrinal incentives should spur and support those conversations. The Sullivan fact pattern demonstrated the chilling effect posed by the threat of staggeringly expensive litigation and damages. The standard that the Court developed in Sullivan offered protection to some false statements, which the Court deemed “inevitable in free debate,” as a way of ensuring that true statements would have “the breathing space” that they need to survive.Footnote 12 After Sullivan, a set of cases extended this actual-malice standard to so-called public figuresFootnote 13 – those who have achieved either broad fame or have become central to some specific conversation on a matter of public concern.Footnote 14 Sullivan is not a press-specific case – its standard applies anytime a public plaintiff brings a defamation action – but in the last six decades, it has been relied upon heavily by those performing the press function.

8.3 Justice Gorsuch’s Critique

In his dissent from denial of certiorari in Berisha v. Lawson,Footnote 15 Justice Gorsuch argued that, in light of the new media landscape and the disinformation crisis that it has enabled, the Court should reconsider the Sullivan framework.Footnote 16

The libel plaintiff in Berisha, the son of a former president and prime minister of Albania, contended that a book defamed him by implicating him in an arms-dealing scandal.Footnote 17 Justice Gorsuch maintained that his colleagues on the Court should have taken the case. He argued that a “new media environment” that “facilitates the spread of disinformation” requires reevaluation of the constitutional standard.Footnote 18 Pointing to the rapid spread of social-media conspiracy theories and other online lies, he suggested that “the deck seems stacked … in favor of those who can disseminate the most sensational information as efficiently as possible without any particular concern for truth.”Footnote 19 Indeed, he noted, “the distribution of disinformation” – which “costs almost nothing to generate” – has become a “profitable” business while “the economic model that supported reporters, fact-checking, and editorial oversight” has “deeply erod[ed].”Footnote 20 Justice Gorsuch suggested that the justification undergirding the Sullivan standard may have less force “in a world in which everyone carries a soapbox in their hands”Footnote 21 and where there are fewer “safeguards … to deter the dissemination of defamatory falsehoods and misinformation.”Footnote 22 Social-media lies are so fast and so appealing, Gorsuch wrote, that “falsehood and rumor dominate[] truth.”Footnote 23 Importantly, then, the factual foundation for Justice Gorsuch’s concern appears to be rooted in dissemination and spread – concerns about the way that modern social-media technology amplifies untruths and the way that propaganda outpaces truthful information from the trustworthy professional newsgatherers that may have predominated the communication landscape as understood by the Justices who decided Sullivan.

Today, the thinking goes, the best way to curb these viral, coordinated falsehoods is to make it easier to bring defamation actions. In Justice Gorsuch’s view, lowering the barrier to doing so would serve anti-disinformation and pro-democracy aims.

8.4 A Poor Tool for the Crisis

Upon closer consideration, however, it seems the doctrinal revision Justice Gorsuch has in mind would have the exact opposite effect. As a practical, legal, and structural matter, it would advance neither the goal of curbing disinformation nor the interest in fostering a healthy democratic public sphere.

As an important starting matter, much of the most-problematic disinformation at the core of the crisis is not itself defamation. Huge swaths of the rampant lies that have caused the gravest concern in recent years – falsehoods about medical treatments,Footnote 24 vaccination,Footnote 25 elections,Footnote 26 climate change,Footnote 27 and a wide variety of other social and political issues – are not attacks on the reputation of any individual or entity. They lie, to be sure. But they do not defame. When a widely shared social-media post claims broadly that an election was stolen or a vaccine is a deep-state plot, there is no obvious reputational attack at issue and thus no basis for a libel suit.

Justice Gorsuch’s stated concerns are about falsehoods more generally, and he is not wrong that these fast-spreading lies are polluting public discourse and inflicting harm. However, the harm inflicted is a harm against public sensibility that stems from an assault on facts, not a harm against a potential defamation plaintiff that stems from an assault on reputation.Footnote 28 While defamation law aims to ensure that our public discourse has an anchor in truth, it only concerns itself with one quite-specific anchor, and it is not the one with which Justice Gorsuch seems most concerned. Adjustment of the Sullivan standard simply does not do the major anti-disinformation and pro-democracy work that needs to be done.

Occasionally, of course, the two overlap – for example, when disinformation is not merely a generic lie about a stolen election but a lie about a particular postmaster backdating mail-in ballots,Footnote 29 or particular election workers tampering with votes,Footnote 30 or a particular voting-machine company rigging an outcomeFootnote 31 – and defamation litigation might then be a useful, pro-democratic tool in the ways Gorsuch apparently envisions. Some conspiracy theories spread falsehood that is reputation-harming.Footnote 32 But there is no reason to believe that disinformation as a wider phenomenon is going to serve itself up in a way that merits a defamation claim.

Indeed, significant research in this area suggests that it often does not. Much social-media disinformation is generated by a very small number of initial producers for money or political gain and then disseminated broadly on platforms by armies of others who make broad claims that are false but not harmful to any individual reputation. A powerful recent illustration is the so-called Disinformation Dozen, a group of individuals found to be responsible for almost two-thirds of the anti-vaccine content circulating on social-media platforms.Footnote 33 While some of the content produced by the Disinformation Dozen has been leveled at individuals,Footnote 34 much of the false and deceptive anti-vaccination content is packaged in the form of misleading data designed to sway opinion rather than target reputation.Footnote 35 This is not a Sullivan problem, and reconsideration of Sullivan is not a solution to it. There is no reason to believe that adjusting constitutional free speech standards in defamation law would be an efficient or effective tool for tackling the core of the issue.

To the extent that the concern here is actively defamatory disinformation campaigns – wholly invented, consciously distributed conspiracy theories that knowingly target an individual’s reputation with falsehoods for clicksFootnote 36 – this material already falls outside the scope of Sullivan protection. A number of important debates are emerging about the purveyors of these falsehoods – including whether even a successful defamation suit can dislodge an audience’s belief in these conspiratorial lies or meaningfully impact the incentives of those producing them.Footnote 37 But this defamatory material is, by definition, distributed with knowing falsity or reckless disregard for the truth. The Sullivan doctrine, as it now stands, envisions liability for these actors, and a reconsideration of the doctrine would, again, be a poor instrument for tackling the concerns that continue to exist.

Moreover, as a practical matter, the online social-media mobs disseminating lies are not natural targets for defamation suits, because there are so many communicators in the amplification process and because so many of them may be anonymous.Footnote 38 Take, for example, one common disinformation pattern: A lie initiates on an anonymous web platform like 4chan, makes its way through private or semiprivate groups on social media, then gains traction on Reddit or YouTube before finally emerging into mainstream social-media platforms like X, Facebook, and Instagram.Footnote 39 Breaking down the networks that power the spread of that disinformation might require thousands of actions against individual users. The ability to target any one user might pose real challenges. It would, as a starting matter, require knowledge of identity. But both inauthentic bots that mimic human behavior through programming and deceptive accounts that strategically adopt personas of individuals from marginalized groups are regularly deployed to amplify messages and shape political discourse.Footnote 40 Moreover, real human social-media users may shield their identities through pseudonyms or more sophisticated tactics that obscure a user’s IP address or geographic location.Footnote 41 Bringing a suit against an unknown defendant is possible but not always practical, and plaintiffs may not be able to justify the expense of such extensive discovery.Footnote 42 Additionally, pursuing action against an unknown defendant runs the risk that revealing the defendant’s identity may defeat jurisdiction or lead to the conclusion that the individual lacks the personal resources to pay out damages in the event of a successful claim.Footnote 43 Individual social-media users are likely not attractive targets for defamation suits because they lack the assets to pay damages,Footnote 44 and the platforms themselves are statutorily immune from most defamation suits under Section 230 of the Communications Decency Act.Footnote 45 Thus, the adjustment to Sullivan that Justice Gorsuch floats as an anti-disinformation, pro-democracy tool is unlikely to be effective against many of the key targets. In a wide array of disinformation cases, defamation suits are simply the wrong tool for the job.

8.5 Preserving the Press Function

The actual likely targets of such suits? News organizations, which carry libel insurance and have more assets, and so are much more susceptible to the kind of situation Sullivan squarely addresses – defamation suits used by the powerful to intimidate and silence their critics.Footnote 46

Thus, it is not merely the case that an unwinding of Sullivan is a poor instrument for addressing the concerns that are at stake in the social-media disinformation crisis. After all, to say that it is not a full solution does not mean that it might not be a partial one worthy of consideration. But weighed against these weak benefits are some staggering costs to the operation of the press function, which has to be a part of the equation if the goal is to reduce disinformation and preserve the discourse central to democracy.

Defamation law is a tool that is not particularly viable against the online mobs of coordinated lies, but that will, without the carefully crafted constitutional buffers from Sullivan, increase the burden on those that are financially and professionally invested in providing accurate information to the polity. Removing those protections, then, would not only fail to meaningfully advance Justice Gorsuch’s anti-disinformation and pro-democracy goals, but actively harm them.

Performers of the press function are among the rare remaining information producers with information-production models that center on building trust, maintaining professional standards, and serving as a watchdog with an accountability mission. The press function, performed in both its traditional and its evolving structures, is invaluable to democratic self-governance.Footnote 47 This is because press communicators are among the most likely to have norms of investigating, verifying, and contextualizing material for audiencesFootnote 48 and to have reader and viewer relationships that require them to hold themselves accountable and “show their work.”Footnote 49

Beyond this, the press has been responsible for some of the most vital fact-checkingFootnote 50 and falsehood-countering tools of our time, actively correcting disinformation about public health,Footnote 51 politics,Footnote 52 and other topics important to public discourse and democracy.Footnote 53 Certainly, our growing understanding of disinformation (and of the audiences that are groomed to believe it) makes clear that simple counter-information and exposure alone are inadequate weapons for this battle. But it remains the case that the press performs those functions Justice Gorsuch highlights as crucial to democracy.Footnote 54 In response to the tsunami of lies, news organizations are combatting the spread of disinformation with good journalism. This press function includes investigative work that reveals the organized disinformation efforts that are of such concern to Justice GorsuchFootnote 55 and that exposes the origins of conspiracy theories.Footnote 56 Americans are aware of the scope and gravity of the risk of disinformation in part because of the operation of this function.Footnote 57 A paring back of Sullivan protections, making it easier to shut down critical reporting, will make it more difficult for press organizations to do the work necessary to reveal these massive disinformation operations. The press exposes the existence of disinformation and then works to remedy its harm. At its best, the press function includes research and reporting that grapples with widely circulated false information,Footnote 58 provides accurate and well-sourced truth, and exposes the harmful consequences of the lies.Footnote 59

This may be the worst possible moment to strip the core protections for those performing this press function. Organizations that are working against disinformation with real newsgathering efforts are already seriously struggling. “[S]uccessive technological and economic assaults have destroyed the for-profit business model that sustained local journalism in this country for two centuries.”Footnote 60 Critically important democracy-enhancing local news is especially financially imperiled, in ways that have been accelerated by the COVID-19 crisis.Footnote 61 Organizations that engage in reporting have lost most of their advertising dollars to corporations like Google and Facebook that engage primarily in repeating – including repeating of disinformation. Citizens in a democracy rely on performers of the press function to help them “stay connected to and informed about what is happening in their backyards – especially in their schools, their governments, and other critical institutions and infrastructures,”Footnote 62 and in the absence of this information, streams of disinformation fill the void. Performers of the press function today not only have fewer resources to engage in important coverage of local and national government and other powerful people and organizations,Footnote 63 but also face steep rises in libel defense costs that they are no longer well-resourced enough to shoulder. The cost of defending a libel suit can easily wipe out a local news organization.Footnote 64

All of this adds up to exactly the worry the unanimous Sullivan Court expressed: that freedom of speech and press would not be exercised, purely because the press speaker was unable to risk the financial consequences. Justice Gorsuch himself noted in Berisha that the economic model that supported reporters and newsrooms has eroded. He suggests this should lead to less protection in defamation actions, but he may well have it backwards. This is not the moment to be reconsidering the valuable Sullivan protection, if anti-disinformation and pro-democracy goals are taken seriously.

To be sure, press speakers are not uniformly the heroes of the disinformation story. As public confidence in the media hits record lows and the media is increasingly distrusted as overly partisan, its capacity to counter disinformation may be diminished.Footnote 65 Indeed, a general decline of public faith in authority, expertise, and the traditional institutions of knowledge and democracy means the role of the press function is itself in a state of flux.Footnote 66 Moreover, new scholarship is helping to paint a fuller picture of the interrelationship between some mainstream media outlets and the spread of disinformation. At least some research points to asymmetric political polarization within the media ecosystem that produces a “propaganda feedback loop” far less governed by the reality-check dynamic of professional journalistic norms.Footnote 67 Additionally, some have suggested that even more traditional journalistic organizations aiming for neutral, transpartisan newsgathering have become tools for the spread of distorted narratives. Sometimes this happens as traditional journalists, in the name of objectivity, engage in performative neutrality that amplifies disinformation.Footnote 68 Sometimes mainstream media outlets spread disinformation into the wider public consciousness merely by telling the potentially newsworthy story of the existence of conspiracy groups and their lies, only to have the coverage itself become a tool for the spread of those lies. Because social-media algorithms rate mainstream journalistic sources as more credible, news stories that in any way reinforce conspiracy theories may be filtered less and have a unique power as a vector for virality.Footnote 69 Likewise, because users often read only headlines when scrolling through social-media timelines, researchers are finding that users are sharing journalism from the mainstream media to spread and legitimate disinformation even when the news story itself does not support the lie.Footnote 70

Plainly, there is much work to be done if we are to address all of these issues and advance pro-democracy and anti-disinformation goals. But again, rolling back the Sullivan doctrine is no way to do so. Constitutional protection in defamation actions is not some lever that one can pull to address these information-distribution issues. It does not speak to most outrage-media issues, does not solve most matters of propaganda masquerading as news, and is not a useful tool for addressing most confusion and magnification issues. The scope and contours of these harms, as others have noted, “are problems of amplification – amplification by social media platforms and amplification by journalists,” and the complex set of norms, regulatory incentives, and laws to address them are going to have to focus on “the architecture of our public square,”Footnote 71 not a doctrine that balances reputation and public dialogue.

Justice Gorsuch is right that democracy cannot afford to ignore the imminent crisis of disinformation. But democracy also cannot afford to fruitlessly hamstring the few remaining entities making press-function contributions to its public discourse. The pattern of powerful people attempting to use defamation as a tool to punish and deter critics has not diminished.Footnote 72 If anything, recent examples provide forceful evidence that the threat continues to loom large. At this crucial moment, when the preservation of the press function is a matter of immediate concern, the facts on the ground signal that reconsideration of Sullivan will not be democracy-enhancing. It will be democracy-threatening.

9 Privacy Rights, Internet Mug Shots, and a Right to Be Forgotten

Amy Gajda
9.1 Introduction

In the spring of 2022, visitors to the Smoking Gun website would find a challenging “game, where [one’s] wasted time [was] well spent.”Footnote 1

“For today’s ‘Friday Photo Fun,’” the website explained, “readers must examine five mug shots and match up the respective defendants with the crime for which they were arrested.” There appeared five photos of sorry-looking individuals arrested for crimes both serious and not so much. A tattooed white man nabbed by police for narcotics possession; a black woman arrested for speeding; three other individuals arrested for driving while intoxicated, assault and battery, and grand theft, respectively. The match-the-mug-shot-to-the-crime game appeared every Friday.

The Smoking Gun gathered those police booking photos through freedom-of-information laws, statutes designed to give the public access to important governmental information. For a long time in the United States, mug shots have been a part of such governmental openness: The thought was that the public should know who’d been arrested and on what grounds, and how they’d looked at the time of arrest in order to ensure that police had not battered them. Mug shots also helped to avoid mistaken identity, access proponents said. In the past, it was mainly journalists who were those proponents, who would receive the images from police and later assess them for newsworthiness, publishing only those they thought relevant for public view.

Today, it’s not only journalists who are interested in mug shots. As the Smoking Gun matching game shows, other types of websites publish the images for reasons beyond news value; some have no focus on news value at all.

This chapter considers mug shots and other once-public information about those arrested by police. It finds that, in direct response to worries about internet-based abuse and online longevity, legislatures and courts have taken action to shield such information from public view. It notes that journalism has shifted to include mug shots in reporting less often and, in some cases, to remove from public databases those mug shots published as a part of older news stories. Given such shifts, this chapter predicts that, soon, most mug shots will no longer be made available through public-records requests and those whose mug shots are published could one day bring a valid publication invasion-of-privacy claim. Finally, given such shifts and potential shifts, it predicts one’s entire criminal past, including one’s older mug shot, could one day be even more strongly protected on privacy grounds.

9.2 Two Shifts in Law Regarding Mug-Shot Privacy

As ubiquitous as mug shots may seem today online and otherwise, at the turn of the twentieth century, courts routinely protected mug shots on privacy grounds. In short, there is support in early case law for a right to privacy in booking photos.

Consider Joyce v. York,Footnote 2 an 1899 case from New York in which the court suggested even a habitual criminal could have an action against police for including his photograph in a so-called rogue’s gallery published for others to view. The court wrote that the “wrong [was] in the nature of a libel,”Footnote 3 which back then meant at times that anything either true or false that harmed reputation could lead to liability if published. How one looked at the time of arrest, that court suggested, impacted the way others perceived the person, even if the photograph and the information regarding the arrest were accurate.

In Itzkovitch v. Whitaker, too, a decision from 1905, the Louisiana Supreme Court forbade police from circulating an arrestee’s booking photograph even though the man was notorious for running a pawn shop and had been arrested several times. “Everyone who does not violate the law can insist upon being let alone (the right of privacy),” the court wrote, and indicated that an individual not yet convicted would be protected from having his booking photograph published to others too.Footnote 4 By 1906, the Louisiana court ordered police to return to the not-yet-convicted arrestee all photographic negatives of his mug shot and “to erase and cancel all record entries of the photographs and of the measurement made of the plaintiff” too.Footnote 5

Judges in other states agreed; most courts that had decided lawsuits involving booking photos back then found privacy rights in them,Footnote 6 especially – but not exclusively – before the arrestee’s conviction. Those states included Indiana,Footnote 7 Maryland,Footnote 8 Missouri,Footnote 9 and New Jersey.Footnote 10 Courts were especially concerned about the lasting harm that such images would have on a person’s reputation no matter the outcomes of the underlying criminal case. “Upon [an arrestee’s] vindication,” the New Jersey court wrote in explanation, “the circulation of such information [] could not be undone.”Footnote 11

Then, there came a shift in that sort of privacy-protective awareness regarding mug shots. In the 1960s and 1970s, as federal and state governments opened more of their files to the public view as a measure of support for the public’s right to know about government matters, mug shots and other arrest information became more accessible, and privacy protections in such information seemed less of a concern. Newspapers back then wanted such information so that they might publish news about certain arrests and include, as part of that reporting, the visual images of those charged with particularly noteworthy crimes. They argued it would be best for the public: Community members’ minds would be eased if they saw the person who had been placed in custody for a heinous crime, for one. Moreover, as the use of illustrations and thereafter photographs grew more commonplace in newspapers, readers began expecting to see such things. Legislatures and courts came to trust that such ethics-abiding publishers would not make criminal information public unless nearly everyone would agree that it was something the public should know; the personal privacy concerns of those arrested for murder, for example, seemed far less important than the press’s freedom to report on such a crime. In short, back then, at a time when the word “publisher” was nearly synonymous with ethics-abiding journalism, the public’s right of access trumped any individual’s right to privacy.

A good example of that sensibility is the 1996 Sixth Circuit’s decision in Detroit Free Press v. Department of Justice.Footnote 12 There, the Detroit Free Press had asked for the mug shots of individuals arrested on federal charges – they were accused of having ties to organized crime – and the appellate court agreed that such access would be appropriate. The judges of the Sixth Circuit, however, first explicitly rejected the argument that the release of such images would be harmful to those arrested even though they had not yet been convicted.Footnote 13 Instead, such release could at times be helpful to the individuals, the court reasoned, suggesting that published booking images could help reveal mistaken identity or police use of excessive force.Footnote 14

Second, the court decided, the privacy concerns of the arrestees were of absolutely no concern. They had “already [been] indicted,” the court wrote, and “had already made court appearances after their arrests” and, during that process, their names had been made public. Therefore, the court reasoned, the additional release of their mug shots implicated no privacy interests whatsoever because some in the public knew them or knew of them from such coverage already, and at least family and friends knew what they looked like; any release “could not reasonably be expected to constitute an unwarranted invasion of personal privacy” on such facts.Footnote 15

By that point, the Supreme Court had suggested in Paul v. DavisFootnote 16 that an individual whose mug shot had been included as part of a list of shoplifters had no valid constitutional claim against the police for its release even though he had not been convicted of that or of any crime. It wasn’t the perfect parallel because the justices had also suggested that a defamation claim at the state level might be possible, but the rejection of the constitutional claim was noteworthy nonetheless.

The World Wide Web was already hitting the mainstream when the Sixth Circuit’s opinion came down. Suddenly, the word “publisher” meant not only an ethics-abiding newspaper, like the Detroit Free Press, but anyone with a computer who could publish anything to the world with the click of a mouse.

Those newfangled sorts of publishers eventually recognized that the public had a real interest not only in the more-newsworthy mug shots but in all mug shots. Websites appeared that published photos of all arrested; some of those websites suggested that those who wanted the images taken down could pay to make that happen.

Soon, in response to such publications and the clicks that they generated, ethics-abiding newspapers, no doubt feeling they had to keep up, similarly began to publish pages of the images of those arrested with little regard to the news value. Mug shots had become a “game changer,” some newspapers reported, “the most popular thing on the website” and therefore a driver of internet traffic to what might otherwise be a news site in economic trouble.Footnote 17 Eventually, 40 percent of newspapers that moved online would publish mug-shot galleries.Footnote 18

And so, in 1999, just three years after the Sixth Circuit in Detroit Free Press found no privacy interests in mug shots because many already knew what arrestees looked like, a federal court in Louisiana switched gears and suggested that even a public figure – a man who had owned a National Football League team and was known widely for his work in the NFL, a man arrested in conjunction with an investigation into government corruption – would have privacy protections for his mug shot. In its decision in Times Picayune Publishing Group v. United States Department of Justice,Footnote 19 the court wrote that mug shots were more than just photographs, and for a few reasons: They were linked with the “notorious”; they recorded “unflattering facial expressions”; and “arguably most humiliating of all, a sign under the accused face” with a criminal identification number.Footnote 20 “A mug shot preserves in its unique and visually powerful way, the subject individual’s brush with the law for posterity,” the judge wrote, and its “stigmatizing effect can last well beyond the actual criminal proceedings.”Footnote 21 Current dissemination could trigger future misuse by rivals, the court reasoned, specifically worrying what might become of the mug shot in future years, “including the reappearance of [a] mug shot in the media,” leading to renewed personal embarrassment and discomfort for the depicted individual.Footnote 22

In line with that, in 2016, twenty years after its rejection of privacy in mug shots, the Sixth Circuit sitting en banc changed its mind and overruled its earlier suggestion that there were no privacy rights in booking photos.Footnote 23 The court’s opinion reflected those same concerns about internet publishers that had been hinted at in the Times Picayune decision. These mug shots, these “[e]mbarrassing and humiliating facts,” the court wrote, that “connect[ed] individual[s] to criminality,” decidedly implicated those individuals’ privacy interests.Footnote 24 Now, in an internet age, “[a] booking photo cast a long, damaging shadow over the depicted individual.”Footnote 25 Now, the forever internet meant that arrested individuals might never escape their criminal pasts – meaning that the modern world was far different, the judges wrote, from what existed two decades before:

In 1996 … booking photos appeared on television or in the newspaper and then, for all practical purposes, disappeared. Today, an idle internet search reveals the same booking photo that once would have required a trip to the local library’s microfiche collection. In fact, mug-shot websites collect and display booking photos from decades-old arrests [and] [p]otential employers and other acquaintances may easily access booking photos on these websites, hampering the depicted individual’s professional and personal prospects.Footnote 26

“In 1996,” the Sixth Circuit judges continued, “this court could not have known or expected that a booking photo could haunt the depicted individual for decades.”Footnote 27 And so, even though the images at issue in 2016 involved police officers who had been arrested for drug crimes and police brutality – a decidedly newsworthy story – the court overruled its earlier decision. “The internet and social media,” the court wrote, had by then “worked unpredictable changes in the way photographs [were] stored and shared.” Mug shots suddenly “no longer ha[d] a shelf life” and the “humiliating, embarrassing [and] painful”Footnote 28 images would remain forever accessible even though the individual had changed their ways. The judges decided that those depicted had privacy interests in them after all.

By that point, following the lead of the Times Picayune court, two federal appellate courts had similarly ruled in favor of some level of privacy in mug shots.Footnote 29 There was also strong language in three key cases from the Supreme Court that reflected those same privacy concerns, language made ever more relevant in an internet age, and some courts deciding mug-shot cases shifted to rely in part on these three cases and not on the breezy mention of mug shots in Paul v. Davis.

First, Doe v. McMillan,Footnote 30 not a mug-shot case but one involving concerns about the long-lasting effects of minors’ criminal histories. There, the Supreme Court suggested in 1973 that seventh-grade students named in a congressional report investigating a “troubled school” had privacy interests in their specific instances of “deviant conduct” and their “criminal violations.”Footnote 31 The justices worried in McMillan specifically about potential future harm for those students who would in a few years become adults: With the publication of such material, the justices wrote, the students’ “future careers” would be implicated. Therefore, while the Speech and Debate Clause would protect Congress’s own publication of the material, the justices reasoned, it would not protect “a private republication of documents” containing such information even though the information had been “introduced and made public at a committee hearing” and even though “the hearing was unquestionably part of the legislative process.”Footnote 32 Such material, though made public, “would … invite gratuitous injury to citizens for little if any public purpose.”Footnote 33

Concurring Justices Douglas, Brennan, and Marshall even more explicitly worried what the public revelation of such information would do to the children in later years. “We all should be painfully aware of the potentially devastating effects” of such government-collected data, they wrote. “Arrests … [and a]cts of juvenile delinquency are permanently recorded and they and other alleged misdeeds or indiscretions may be devastating to a person in later years when he has outgrown youthful indiscretions and is trying to launch a professional career or move into a position where steadfastness is required.”Footnote 34

Second, Department of the Air Force v. Rose.Footnote 35 There, in 1975, the Court similarly worried that information that had once been released at the Air Force Academy – the names of those convicted of violating Honor Code provisions not to steal, among other thingsFootnote 36 – would lead to harm to the individuals and therefore held that that information should be redacted from any reports turned over to the public. Those who once knew that information “may have wholly forgotten” it, the Court wrote in explanation, and the “risk to the privacy interests” of such an individual, especially one who remained in the military “cannot be rejected as trivial.”Footnote 37 Such “privacy values” included not only “practical disabilities, such as the loss of employment or friends,” but “lifelong embarrassment, perhaps disgrace” as well.Footnote 38

And, finally, United States Department of Justice v. Reporters Committee for Freedom of the Press.Footnote 39 So-called “rap sheets” containing an individual’s “history of arrests, charges, convictions and incarcerations”Footnote 40 could be protected on privacy grounds, the Justices decided in 1989, even though the information had once been made public by police and was therefore in effect part of the public record. “The privacy interest in a rap sheet is substantial,” the Court wrote, and especially so given the powerful memories in computers that could include information “that would otherwise have surely been forgotten” by people.Footnote 41 “Plainly there is a vast difference between the public records that might be found after a diligent search of courthouse files, county archives, and local police stations,” the Justices wrote, the more easily accessed “computerized summary located in a single clearinghouse of information.”Footnote 42 “If a cadet has a privacy interest in past discipline that was once public but may have been ‘wholly forgotten,’” the Court wrote, referring to Rose, “the ordinary citizen surely has a similar interest in the aspects of his or her criminal history that may have been wholly forgotten.”

It’s true that all five of those cases – Detroit Free Press, Times Picayune, McMillan, Rose, and Reporters Committee – mainly focused on access and on the information about past and present crimes that would be released to the public. But, given such powerfully protective language, a potential right to privacy in mug shots and other arrest information is arguably broader than access. Today, there’s also a suggestion that stretches beyond McMillan: that the right to privacy in such information could extend to the publication of such information as well.

That privacy interest is reflected in the privacy sections of the Second Restatement of Torts, published in 1977. In “Publicity Given to Private Life,”Footnote 43 the Restatement authors specifically suggest that one’s criminal past may well be protected on privacy grounds, that “a lapse of time” is “a factor to be considered” in such a privacy claim.Footnote 44 “Jean Valjean,” an example reads, “an ex-convict who was convicted and served a sentence for robbery, has changed his name, concealed his identity, and for twenty years has led an obscure, respectable and useful life in another city far removed.”Footnote 45 Any newspaper that would ferret out his criminal history and publish it, the Restatement says, could well be liable for invading Valjean’s privacy.Footnote 46

Moreover, the Restatement authors suggested that there would also be privacy in some of “a man’s … past history that he would rather forget.”Footnote 47

Such interests – a right to privacy in truth that includes past information about an arrest; what some might consider in a colloquial sense a right to be forgotten – did not come out of the blue. As early as 1884, a court wrote that it would be a “barbarous doctrine” should newspapers be allowed to report anything truthful that they wanted, including “crimes long since forgotten and perhaps expiated by years of remorse and sincere reform.”Footnote 48 Well more than a century later, the Eleventh Circuit wrote in a related sense that “timeliness … boundaries … circumscribe the breadth of public scrutiny to [an] incident of public interest” and that, therefore, the nude photographs of a murder victim taken more than twenty years before the crime had no relation to news coverage of it; those photos were not related in time, the court held,Footnote 49 and any other holding would “debase[] the very concept of a right to privacy.”

This concept made headlines when the European Court of Justice ordered an accurate but ten-year-old newspaper article about a man’s debt proceedings de-indexed so that it would be much more difficult to find during an internet search.Footnote 50 The court was especially worried about protecting the man’s attempt to turn his life around more fully. Besides, it reasoned, the news article was “inadequate,” “no longer relevant,” and “excessive” in relation to “the light of the time that has elapsed.”

Somewhat in line with that, a number of recent court decisions in the United States contain similar concerns about older criminal information. In 2021, a federal judge in Pennsylvania ordered the website Mugshots.com to pay $150,000 to a former arrestee whose criminal record had been expunged.Footnote 51 The website’s worldwide use of the man’s mug shot from two decades before had significantly harmed his reputation among family and friends, the judge wrote, and instructed that the mug shot be removed.Footnote 52 “[I]n an age when it is a widespread practice for employers to conduct an online search on the background of prospective employees,” the court reasoned, “any job application by [the man] would most likely entail revelation of the information posted about him online.”Footnote 53

In another case from six years before, a state court similarly ordered older criminal information be taken down.Footnote 54 Details about the man’s criminal past, the court wrote, “are likely not newsworthy twenty-five years after the fact.”Footnote 55

Other modern courts have suggested that the release of private individuals’ criminal records would be especially forbidden because “there might be little to offset the risk of adverse collateral consequences arising some such disclosure”;Footnote 56 that police photo arrays should not be made public because “a significant privacy interest warrants protecting the identities of third parties included in the photo lineups” because the images convey the individuals’ guilt;Footnote 57 that people featured on a website that charged money to have the mug shots removed had valid claims for misappropriation;Footnote 58 and that a person arrested on a misdemeanor charge whose booking photo appeared on the internet had a potential privacy claim against the sheriff for making the image public.Footnote 59

And then, in 2018, the Eleventh Circuit found police liable for allowing cameras from the reality show The First 48 to record images of an arrestee without his consent. The filming and broadcast constituted a seizure of the man’s image, the court held, and violated his right to privacy; showing him walking down a police hallway and later being interrogated by police served no legitimate purpose. Thus, the authorities had violated the arrestee’s constitutional rights and the court upheld his Section 1983 claim.Footnote 60

In the case involving the sheriff’s release of a mug shot, one decided in 2020, the plaintiff had relied in part on what the court said were “several recent federal cases analyzing the issue and determining that arrestees generally have rights to privacy with respect to their booking photos.”Footnote 61 Those cases helped support the plaintiff’s argument that Texas state law prevented the release of mug shots as government information “considered to be confidential by law.”Footnote 62

A small number of states today limit access to booking photographs even more clearly. In Illinois, for example, one of the statutory exemptions to the freedom-of-information law says this:

[A] law enforcement agency may not publish booking photographs, commonly known as “mugshots,” on its social networking website in connection with civil offenses, petty offenses, business offenses, Class C misdemeanors, and Class B misdemeanors unless the booking photograph is posted to the social networking website to assist in the search for a missing person or to assist in the search for a fugitive, person of interest, or individual wanted in relation to a crime other than a petty offense, business offense, Class C misdemeanor, or Class B misdemeanor.Footnote 63

If certain mug shots are no longer published online or otherwise, those legislators have reasoned, mocking websites will no longer be able to access them. Other states have passed laws that criminalize the practice of forcing individuals to pay for the removal of their mug shots from websites.Footnote 64

9.3 A Shift in Journalism Too

In the 2010s, the Chicago Tribune would routinely run a feature on its website. It was called “Mugs in the News” and it highlighted 100 people arrested by police throughout the Chicagoland area the day before. The crimes included the sensational, like rape and murder, but also the more mundane, like theft and burglary.Footnote 65

Then, in 2021, the Tribune announced a major change, a shift to what it called “compassionate coverage.” Not only had it decided not to publish its “Mugs in the News” feature anymore, it had decided to cut back significantly on the use of mug shots in its reporting, period. “Part of this is just plain fairness,” editors wrote. “A lot of people” featured in such mug shots “will end up not being convicted,” will be found not guilty, or will plead to lesser charges. Moreover, the use of such images “might reinforce racial stereotypes and amount to punitive coverage of people who enter the criminal justice system.”Footnote 66

Even more relevant to what might be considered a right for one’s criminal past to be forgotten, Tribune editors suggested they were working to remove most of the mug shots from old news stories that are now accessible through archival databases. “[W]e have been removing some mug shots from older stories for months now,” they wrote, and would continue to “remove many of them as we come upon them.” Decisions to publish versus not to publish, to take down or leave up, would be based on “high news value,” the editors explained, including high-profile crimes, those involving a public figure, and those with some public-safety purpose.Footnote 67

“The default,” editors explained in 2021, was “not to use a mug shot.”Footnote 68

The Chicago Tribune is not the only newspaper to decide to do such a thing. The Marshall Project, a nonprofit news organization with the criminal justice system as its beat, suggested in 2020 that “faced with questions about the lasting impact of putting these photos on the internet, where they live forever, media outlets are increasingly doing away with the galleries of people on the worse days of their lives.”Footnote 69

“Legally, it’s public record,” one reporter explained, “but legal is not always right.”Footnote 70

9.4 The Future of Mug Shots and Other Online Criminal Arrest Information

That reporter who suggested in 2020 that mug shots were public records and that, therefore, publishers could publish them without concern for legal liability was mostly correct. Today, despite a growing number of court decisions and legislative enactments that hold otherwise in certain cases, in many places and in many situations, a mug shot is indeed a public record, and a news publisher need not worry about the legality of publishing it, especially in a decidedly newsworthy case.

But, given the shift toward some level of privacy in mug shots in law and in journalism, there is a strong likelihood that privacy protections for arrest information including mug shots will continue to increase.

This is for a couple of reasons. The first is that some legislatures and some courts have already put mug-shot-related privacy protections in place. The second reason is that the law’s definition of privacy responds to society’s definition of privacy. Consider the language from the Second Restatement of Torts for its “Publicity Given to Private Life,” which identifies those times in which certain information is considered too private to be revealed. There, the Restatement provision reads, the “protection afforded to the plaintiff’s interest in his privacy must be relative to the customs of the time and place” and to “the habits of his neighbors and fellow citizens.”Footnote 71 “It is only when the publicity given to him is such that a reasonable person would feel justified in feeling seriously aggrieved by it” that such an invasion of privacy claim is valid.

Today, it seems that a growing number of judges and journalists agree that such information about one’s criminal past or present should be protected. Public sentiment is growing too. In 2020, 85 percent of Americans supported some aspect of a “right to be forgotten” and “more than half (56%) [said] all Americans should have the right to have negative media coverage about themselves removed from public search results.” In the meantime, and relatedly, a “smaller share of Americans – though still about four-in-ten (39%) – think the same right should be applied to data collected by law enforcement, such as criminal records or mugshots.”Footnote 72

This suggests a growing sensibility that seemingly would protect certain criminal histories, and it means that one day, a reporter who suggests that publishers need not worry about publishing such materials because they are public documents could very well be wrong.

It’s true that the Supreme Court’s older jurisprudence, including Florida Star v. B.J.F.,Footnote 73 suggests that it would be unconstitutional to punish the publication of truthful information of public record – but the Justices explained back then that even that jurisprudence has its limits. “We do not hold that truthful publication is automatically constitutionally protected, or that there is no zone of personal privacy within which the State may protect the individual from intrusion by the press, or even that a State may never punish publication of the name of a victim of a sexual offense,” the Court wrote in Florida Star, because there is “sensitivity and significance” in privacy interests that are as profound as the interest in a free press.

9.5 Conclusion

If journalism continues its trend of avoiding the use of mug shots and pushing for the removal of mug shots from its news databases, the only publications making use of mug shots could well be those that use them mostly to mock. If so, additional courts and additional legislatures – and additional members of the public – will surely continue to demand greater protection for mug shots on privacy grounds. And that means that at some point in the future, probably sooner rather than later, there will be no more public release of booking photographs of anyone, except perhaps in those cases in which an arrestee becomes an escapee or is wanted in some other way.

There is additional support in the Second Restatement. The Restatement authors suggest that “if the record is one not open to public inspection … it is not public, and there is an invasion of privacy when it is made so.” And that means that the society shift toward privacy in mug shots could well expand into liability for publication of mug shots too.

All this suggests that those early courts that decided mug-shot cases and protected the privacy of those featured more than the publication had surprisingly modern sensibilities. Today, all the more, as even those early courts suggested, the circulation of mug shots cannot be undone.

10 Brokered Abuse

Thomas E. Kadri
Footnote *
10.1 Introduction

It’s accually obsene what you can find out about a person on the internet.Footnote 1

To some, this typo-ridden remark might sound banal. We know that our data drifts around online, with digital flotsam and jetsam washing up sporadically on different websites across the internet. Surveillance has been so normalized that, these days, many people aren’t distressed when their information appears in a Google search, even if they sometimes fret about their privacy in other settings.

But this remark is not a throwaway line by a disgruntled netizen. No. It’s a boast by a stalker, Liam Youens, who went online to find his victim, Amy Boyer. Youens traced Boyer after buying her work address from a data broker – a company that traffics information about people for profit. Youens documented his search for Boyer’s whereabouts on his personal website: “I found an internet site to do that, and to my surprize everything else under the Sun. Most importantly: her current employment.”Footnote 2 After he asked the broker for more information, he just had to bide his time. “I’m waiting for the results,” he wrote ominously, not long before shooting Boyer dead at work.Footnote 3

Data brokers fuel abuse by sharing people’s information and thwarting their obscurity. The value of obscurity, though sometimes overlooked in privacy discourse, rests on the idea that “information is safe – at least to some degree – when it is hard to obtain or understand.”Footnote 4 Brokers hinder obscurity by making it easier and likelier to find or fathom information about people. This act of foiling obscurity, in turn, facilitates interpersonal abuse. The physical violence suffered by Amy Boyer is but one kind of abuse; people also face stalking, harassment, doxing, defamation, fraud, sextortion, and nonconsensual sharing of their intimate images.Footnote 5

This chapter explores the phenomenon of brokered abuse: the ways that data brokerage enables and exacerbates interpersonal abuse. The harms of brokered abuse go beyond the fact that brokers make it easier to surveil people and expose them to physical, psychological, financial, and reputational harms. In addition, people must beg every single broker to conceal their information from thousands of separate databases, over and over again, with little or no legal recourse if brokers reject their efforts to regain some obscurity. Due partly to existing laws, this whack-a-mole burden of repeatedly pleading to obscure data can trigger trauma and distress. Only by grasping this fuller scope of brokered abuse can we begin to regulate it.Footnote 6

This chapter splits into three sections. Section 10.2 introduces the broker industry before Section 10.3 reveals how the law largely fails to address, and is even complicit in, key features of brokered abuse. Section 10.4 then explores the harms stemming from brokered abuse in order to lay some foundations for regulating them.

10.2 Data Brokers as Information Traffickers

Data brokerage is a multibillion-dollar industry.Footnote 7 Thousands of companies form a sprawling network of brokers that buy, sell, trade, and license gigabytes of human information. Though brokers’ business models vary, their power and profit fundamentally stem from trafficking information about people.Footnote 8

For the most part, brokers buy information from other companies and gather it from government records and public websites.Footnote 9 From there, brokers build profiles including data like a person’s name, aliases, photos, gender, birthdate, citizenship, religion, addresses, phone numbers, social-media accounts, email addresses, Social Security number, employers, schools, families, cohabitants, purchases, health conditions, and hobbies. These data dossiers are then sold for a fee or even shared for “free” thanks to the ads adorning broker websites.Footnote 10

There are, to be fair, some benefits tied to the broker industry.Footnote 11 Transparency and accessibility come from publicizing information online, including data drawn from public records. Journalists, activists, academics, and the general public can garner insights from this information.Footnote 12 Indeed, a person might even evade interpersonal abuse or other ills after discovering an acquaintance’s restraining order or criminal record through a broker. Though this kind of data is often accessible in other ways, a Google search is easier, faster, and cheaper than a trip to the county courthouse.Footnote 13

Some people also use brokers to locate heirs or reconnect with long-lost friends and family. Others might rely on brokered data to inform their hiring decisions. Some companies rely on brokers in order to collect debts or discover fraud, corroborating information given to them by a customer or client. And brokers can even assist the legal system, such as when class-action awards are being distributed. These perks cannot be ignored, but we should be wary of their value being exaggerated.

Another set of purported benefits relate to consumers, largely stemming from how businesses use brokered data. In particular, human information fuels the datasets and algorithms that help companies target ads and develop products. The resulting corporate revenue could, at least theoretically, yield cheaper or better services for consumers. I’m skeptical that this species of informational capitalism is in the public’s interest,Footnote 14 but debunking this defense of data brokerage is not essential. Even if the commercial benefits are substantial, we should not scoff at the serious harms tied to the broker industry.

Though there are many harmful facets of data brokerage, I’ll focus here on only one: how brokers enable and exacerbate interpersonal abuse. Most directly, brokers’ dossiers can be treasure troves for abusers, who can plunder them for information with just a few clicks and bucks. In Amy Boyer’s case, Youens paid a broker $45 for her Social Security number, $30 for her home address, and $109 for her work address.Footnote 15 These sums might already seem trifling given the vile result, but many brokers offer much more for far less. In 2013, for instance, a stalker bought Judge Timothy Corrigan’s home address for less than $2 and later shot bullets at his house, missing the judge’s head by a mere 1.6 inches.Footnote 16

These jarring anecdotes tell part of the story of how brokers enable and exacerbate abuse, but the phenomenon needs more interrogation to show its full scope. To do so, we must unpack how the law can be ineffective and even injurious when responding to brokered abuse.

10.3 The Law’s Role in Brokered Abuse

There are at least four common regulatory responses to brokered abuse: prohibiting abusive acts, mandating broker transparency, limiting data collection, and restricting data disclosure. Though each measure has some merit, none will suffice. Worse still, recent privacy laws can even inadvertently inflict psychological harms on people seeking to recover from abuse. Let us explore how.

10.3.1 Prohibiting Abusive Acts

Regulating abusive acts offers a path to reducing brokered abuse. If we target the underlying abuse, the thought goes, we needn’t regulate data brokerage. While this approach is attractive in theory and even viable in certain cases, it’s deficient for several reasons.

A host of laws directly regulate abuse, including criminal and tort liability for stalking, harassment, physical violence, doxing, privacy invasions, and voyeurism.Footnote 17 But even if these anti-abuse laws retroactively punish harmful acts or vindicate victims’ interests in some cases, the continued prevalence of abuse suggests that any prospective deterrence caused by the threat of liability is inadequate. Even when abuse is deterred, these laws do little to lessen people’s anxiety when their information is circulating online because they might lack confidence that any deterrence will hold.

To make matters worse, some anti-abuse laws can inadvertently increase people’s risks of abuse. For example, when liability depends on an entity intending or knowing that their actions will cause harm, brokers have an incentive to remain ignorant about how brokered data is being used. Consider California’s approach to protecting stalking victims who register with the state. A special anti-doxing law prohibits anyone, including brokers, from posting a registered victim’s home address, phone number, or image on the internet with the “intent” to “[t]hreaten” the victim or “[i]ncite” a third person to cause “imminent” bodily harm “where the third person is likely to commit this harm.”Footnote 18 With all these caveats, brokers can comfortably dodge liability by sharing data without asking questions.Footnote 19 Indeed, the standard data-brokerage business model – which relies on mass and indiscriminate data disclosures to anyone willing to pay – is incompatible with these kinds of scienter requirements because they implausibly suggest that brokers engage in case-specific deliberation or investigation before sharing data. And yet removing these caveats might pose a different problem because a law that broadly penalizes disclosing information might be vulnerable to constitutional challenges under the First Amendment.Footnote 20

Beyond substance, think practicalities. Anti-abuse laws often require a victim’s prolonged and active participation in pressing charges or filing lawsuits. There’s good reason to empower and involve victims in these legal processes, but the processes themselves can impose burdens that many victims are unable or unwilling to bear. Interacting with police, prosecutors, lawyers, and judges might dissuade some people, while some might also struggle practically or financially to bring civil claims – realities that disproportionately affect those who are already marginalized. Even setting aside these burdens, many people will fret about initiating matters of public record that could further jeopardize their obscurity and safety.Footnote 21

Finally, anti-abuse laws usually will not offer the obscurity remedies that some people will seek. Even if they do (or if such a remedy is eventually negotiated through settlement), legal proceedings move too slowly to address the exigent and immediate dangers that people face. To cap it all off, different brokers are constantly adding to their data stockpiles, so people would need to file new claims against new parties every time new information pops up online.

In short, laws prohibiting abusive acts fail to disturb essential features of brokered abuse. Some regulations might even aggravate matters by encouraging brokers to maintain ignorance when dishing out data, while other legal processes can be too burdensome, risky, or ineffective to be worth a victim’s while.

10.3.2 Mandating Broker Transparency

Another regulatory tool involves shedding light on data brokerage. While transparency laws can be helpful, they are ultimately insufficient. These laws come in different shapes and sizes, but we can distinguish two types based on their principal goals: administrative transparency that informs regulators and popular transparency that informs individuals. Each has value, but neither meaningfully abates brokered abuse.

Administrative transparency follows a two-step system to educate regulators about the broker industry. Brokers first register with a state agency to create a list of brokers doing business in the jurisdiction, then brokers disclose details about their practices (such as where they obtain data and how they handle complaints). Vermont and California have such laws, and similar themes animate the Data Broker List Act introduced in Congress in 2021.Footnote 22

Popular transparency, by contrast, mainly informs individuals. California, for instance, has passed “right to know” laws that force brokers to reveal details they’d rather conceal: what data they have and whether they have shared it.Footnote 23 Similar laws might even oblige brokers to grant people no-cost access to data about themselves, rather than forcing them to pay a fee.

Administrative transparency can help regulators grasp the broker industry and inform future legislation, while popular transparency can help motivated people learn something new about their exposure with particular brokers. But neither approach helps a person facing urgent threats from their information appearing online. There’s also no guarantee that transparency will motivate further regulation; if anything, these milquetoast measures might sap political will from stronger proposals.Footnote 24 At best, then, transparency laws fiddle with some incentives underlying data brokerage. (Maybe brokers will disclose less data if they have to disclose how they are disclosing data?) At worst, these laws let brokers hide their harmful practices in plain sight while boasting about their regulatory compliance.

10.3.3 Limiting Data Collection

A third response to brokered abuse involves curtailing data collection. Again, there are promises and pitfalls to this approach. Laws of this ilk form a privacy mosaic for our information, but there are too many missing pieces to make a pleasing mural.

Longstanding regulations forbid obtaining data through deception, other laws bar intrusive surveillance like hacking, and various legal regimes give companies “gatekeeper rights” to deter data scraping from their websites.Footnote 25 These restrictions reach only a subset of brokers’ activities because gobs of data can be gathered without running afoul of any law.Footnote 26 Most importantly, many of these laws do not apply when brokers get data from public records or other publicly accessible sources.Footnote 27

More recently, a new vintage of data-privacy laws has unsettled the broker industry by prohibiting the nonconsensual collection of people’s information. But even these stricter rules often contain caveats that let brokers thrive. The California Consumer Privacy Act, for example, provides that the types of “personal information” protected by the law do not include “publicly available information or lawfully obtained, truthful information that is a matter of public concern” – an exception that covers vast troves of brokered data and endorses many broker practices that leave abuse victims vulnerable.Footnote 28

In light of these carveouts for publicly accessible information, one approach to limiting data collection focuses on the state’s role in furnishing brokered data.Footnote 29 Brokers sustain their services with information from public records like property deeds, voter rolls, and marriage licenses. To partially stem this flow, most states have confidentiality programs to allow abuse victims to conceal certain information from state documents.Footnote 30 On the plus side, these measures are unlikely to raise First Amendment red flags because nothing forces the government to collect (or publish) the kind of identifying information that most likely endangers people’s obscurity.Footnote 31 But while limiting government data collection (and publication) brings significant benefits, even the broadest restrictions are insufficient. Public records, after all, are but one source of human information. Most importantly, brokers can still buy data from other companies and gather it from other public websites. Tinkering with public records turns off the cold tap but leaves the hot water flowing.

10.3.4 Restricting Data Disclosure

A final way to tackle brokered abuse involves controlling data disclosure. This approach conceivably offers great potential for people seeking to stop brokers publicizing their information online. But the devil is in the details. Many disclosure regulations either do little to thwart abuse or even harm people trying to protect themselves.

Some disclosure rules aren’t aimed specifically at either data or brokers, such as tort liability for publicly disclosing certain sensitive information,Footnote 32 while other recent proposals would make brokers pay for selling people’s data or ban them from sharing location and health information. Such constraints meddle with brokerage around the margins, but none brings fundamental reform and some plausibly exempt publicly accessible data.Footnote 33

Given these limitations, let us focus instead on modern laws providing rights to conceal or remove information from broker databases or websites. California offers a rare example in the United States of providing these legally mandated obscurity rights, so we’ll use it as a short case study to examine the virtues and vices of such a regulatory regime. Under the state’s general “right to opt-out,” all Californian consumers may direct businesses not to sell their personal information to third parties, meaning that the company must not disclose their data for profit once a person exercises their obscurity right.Footnote 34 But California law also goes one step further. Abuse victims who register with the state’s Safe at Home program have more expansive obscurity rights. Of particular note, brokers cannot knowingly display a victim’s phone number or home address on the internet. If a victim asserts their reasonable fear related to that information, a broker must conceal the data for four years and could face injunctions, court costs, and attorney’s fees for noncompliance. And if anyone, including a broker, displays or sells the information with intent to cause certain harms, victims may seek treble damages and receive a $4,000 fine per violation. To help implement the law’s protections, California provides an online opt-out form that victims can use to invoke their obscurity rights.Footnote 35

Though California’s goals are laudable, this innovative approach fails to grapple with the realities of abuse. Under these laws, Californians must engage in extensive “privacy self-management” because the state forces them to exercise obscurity rights on a company-by-company basis.Footnote 36 Even the Safe at Home opt-out process – which was presumably designed with abuse victims in mind – operates from this fragmented premise by requiring victims to approach brokers individually and submit forms to each one regularly. Brokers, after all, continuously replenish their stocks, and concealing some data does not stop other data from soon taking its place. Given these features of the broker industry, laws like California’s could actually entrench a disaggregated and detrimental obscurity process because brokers can seize on their legal compliance to justify not offering better services.

10.4 The Harms of Brokered Abuse

With this legal survey in mind, let us return to the matter of harms: How do brokers enable and exacerbate abuse? How is the law inadequate and complicit? And how might legal procedures even contribute toward a person’s suffering?

To answer these questions, I return to obscurity – a notion of privacy concerned with “the difficulty and probability of discovering or understanding information.”Footnote 37 As Woodrow Hartzog and Evan Selinger have observed, obscurity can be a “protective state” that serves valuable privacy-dependent goals like “autonomy, self-fulfillment, socialization, and relative freedom from the abuse of power.”Footnote 38 Understanding the full scope of brokered abuse requires parsing how data brokerage, including its surrounding legal constructs, undermines obscurity. As we’ll see, brokered abuse encompasses an array of intrinsic and extrinsic harms, all of which implicate a person’s obscurity.

10.4.1 Intrinsic Harms

Abuse. As an initial matter, brokers routinely create privacy losses by sharing people’s information. Though this core of brokerage is not intrinsically harmful, such privacy losses can engender privacy harms.Footnote 39 Some of these privacy harms, to use Ignacio Cofone’s terminology, are “consequential” because they are “external to privacy interests but occur as a consequence of privacy violations.”Footnote 40 Brokers facilitate the surveillance of victims and their kin by systematically sharing personal information. An abuser armed with brokered data can perpetrate a slew of “consequential” physical, emotional, economic, and reputational harms. This might not be a broker’s goal, but it’s certainly their role.

Risk. Beyond the direct harm of actually enabling abuse, brokers commit the kindred harm of increasing the risk of abuse by making it easier to surveil a person and their family, friends, or associates. This risk, in turn, can cause anxiety even if no abusive act ever occurs.Footnote 41 Without regulatory intervention, these threats will only grow as data proliferates and new technologies, like facial-recognition surveillance, further wreck obscurity.Footnote 42

Isolation. Brokers also rob people of agency to “control their visibility within public space.”Footnote 43 As Scott Skinner-Thompson has argued, digital and physical surveillance can cause forced publicity, which might then deter people from participating in public life.Footnote 44 This cycle, unsurprisingly, has unequal repercussions for those who are socially marginalized already – a special concern here because victims often hail from marginalized groups and because abuse can have ostracizing effects regardless of one’s preexisting social status and personal characteristics.Footnote 45 Data brokerage can intensify a victim’s isolation by foisting visibility on them, creating yet more reasons for them to retreat entirely from public spaces.

10.4.2 Extrinsic Harms

Some people respond to this trio of intrinsic harms – abuse, anxiety, and isolation – by trying to cull information from broker databases. Easier said than done. As we have seen, people must beg brokers to conceal their data with little guarantee of success, especially in jurisdictions where legal remedies are absent or incomplete. At best, people in places like California can contact every single broker separately to exercise their legal rights. The result? People facing physical and psychological peril must approach each broker individually over and over again. At a time of high vulnerability, this obscurity process creates a pair of extrinsic harms that are partly constructed by legal rules and procedures.

Annoyance. The first harm can be styled as annoyance, though it covers a range of unwanted emotions. Some people might reasonably feel indignant about having to demand their obscurity. (Imagine someone complaining: “It’s my data, not theirs, so they should have to ask me before using it! Why should I have to contact them?”) Others might resent spending time filling out forms or navigating brokers’ laborious and complex bureaucracies. Some people might feel exasperated at how futile it all seems, especially given that “grey holes” in privacy law might give brokers enough room to resist obscurity requests or refill their databases.Footnote 46 Absent some compelling justification, the law should not be complicit in cultivating negative reactions to exercising legal rights. Feeling indignant, resentful, or exasperated is both unpleasant and likely to dissuade people from enforcing their rights.

Trauma. Taking annoyance seriously is important to understanding the law’s failure to address brokered abuse. But to culminate this chapter, I want to stress something different and underappreciated. For abuse victims, an arduous and dispersed obscurity process can inflict a harm that goes beyond mere hassle or frustration. It’s more than a matter of transaction costs. It’s more even than a question of abuse and anxiety. Instead, it’s about trauma – and how the law’s failure to consider the role of trauma represents a failure of empathy toward victims of abuse.

The basic point is this: The process of preventing brokers from sharing information can trigger psychological harm by forcing victims to repeatedly revisit their abuse and recognize their vulnerability. A disaggregated and inefficient obscurity process might irritate some people, but the burden it can impose on victims is likely distinct and severe. In short, the obscurity process itself can be traumatic.

“Trauma is the experience and resulting aftermath of an extremely distressing event or series of events, such as disaster, violence, abuse, or other emotionally harmful experiences.”Footnote 47 Though further research is required to explore how trauma manifests in the context of brokered abuse, existing studies point to likely connections between abuse, trauma, and technology. For example, a recent interdisciplinary study by researchers working directly with victims in the Clinic to End Tech Abuse at Cornell University examines how people’s interactions with digital technologies can cause trauma in the context of interpersonal abuse. As the authors observe based on a series of actual case studies, people’s experiences with technology can “trigger existing trauma and even retraumatize a person,” such as “when something in one’s environment causes them to recall a traumatic experience, often with a recurrence of the emotional state during the original event.”Footnote 48 Based on my own experiences – personally as an abuse victim and professionally when speaking with other victims – this accurately describes how prevailing obscurity processes involving data brokers can trigger trauma.

Even the most expansive obscurity rights fail to grapple with this extrinsic harm. Indeed, these laws risk aggravating matters by enshrining a decentralized process into law. While current procedures might be annoying for someone who’s never faced abuse, for victims seeking obscurity it creates an extra injury that might further discourage them from enforcing their legal rights. Legislators have failed to account for the dynamics of interpersonal abuse from a victim’s perspective. The law, it might be said, lacks empathy.

To compound matters, current processes to regain obscurity are often ineffective. Brokers can simply shun removal requests in the forty-odd states that lack data-privacy laws, and even a responsive broker can do no more than purge information from its own database. An abuser needs only one willing broker to facilitate surveillance, and the scattering of digital breadcrumbs among brokers can distress people even if an abuser never actually gets any data. A flawed obscurity process, then, solidifies all three intrinsic harms by enabling abuse, creating anxiety, and causing isolation, while also maintaining extrinsic harms like annoyance and trauma.Footnote 49

I leave the matter of addressing brokered abuse for another day, but one thing seems clear: There’s a dire need for an effective and empathetic obscurity process.Footnote 50 Though it’s impossible to say how many people are harmed through brokered data, we know that many forms of technology-enabled abuse are rampant, rising, and ruinous. Recent empirical research has shown how abusers are exploiting technologies to intimidate, threaten, monitor, impersonate, and harass.Footnote 51 This essential work substantiates earlier scholarship revealing how technology can facilitate interpersonal harms and deepen social inequities.Footnote 52 We know, too, that abuse victims suffer significantly higher rates of depression, anxiety, insomnia, and social dysfunction than the general population.Footnote 53 Given these realities, we should not turn a blind eye to brokered abuse.

10.5 Conclusion

Data brokers are abuse enablers. By sharing people’s information, brokers thwart obscurity, stimulate surveillance, and ultimately enable interpersonal abuse. This chapter has canvassed four regulatory responses to brokered abuse. Though these existing measures have some merit, none is adequate, and some laws can even make matters worse. Put simply, the current legal landscape is neither effective nor empathetic.

Of particular and yet underappreciated concern, the prevailing broker-by-broker approach to regaining obscurity likely causes victims’ trauma by forcing them to engage repeatedly with their abuse and vulnerability. The flaws of this obscurity process also leave people vulnerable to serious physical, psychological, financial, and reputational harms. Regulating brokered abuse should be a priority for both law-makers and technologists.

Footnotes

6 Defamation and Privacy What You Can’t Say about Me

7 Cheap Speech and the Gordian Knot of Defamation Reform

* I would like to thank Kyle Langvardt, Lili Levi, Jake Linford, and Robert Post for their comments on an earlier draft of this work.

1 Restatement (Second) of Torts §§ 558–623 (1977).

2 Darren K. Carlson, Trust in Media, Gallup (Sept. 17, 2002), https://perma.cc/X4T6-JNJA.

3 Jeffrey Gottfried, Republicans Less Likely to Trust Their Main News Source If They See It as “Mainstream”; Democrats More Likely, Pew Rsch. Ctr. (July 1, 2021), https://perma.cc/G3LR-CRRA (“About two-in-ten adults (18%) express a great deal of trust in the accuracy of the political news they get from national news organizations (though a majority – 64% – have at least some trust).”).

4 RonNell Andersen Jones & Lyrissa Lidsky, Of Reasonable Readers and Unreasonable Speakers: Libel Law in a Networked World, 23 Va. J. Soc. Pol’y & L. 155 (2016).

5 376 U.S. 254 (1964).

6 Rodney A. Smolla, Let the Author Beware: The Rejuvenation of the American Law of Libel, 132 U. Pa. L. Rev. 1, 1 (1983). See generally David A. Anderson, Is Libel Law Worth Reforming?, 140 U. Pa. L. Rev. 487 (1991); Randall P. Bezanson, The Libel Tort Today, 45 Wash. & Lee L. Rev. 535 (1988); C. Thomas Dienes, Libel Reform: An Appraisal, 23 U. Mich. J.L. Reform 1 (1989); Paul A. LeBel, Special Issue: Defamation and the First Amendment: New Perspectives, 25 Wm. & Mary L. Rev. 779 (1984).

7 Their 1996 book documents their work on this topic going back to the 1980s. See George W. Pring & Penelope Canan, SLAPPs: Getting Sued for Speaking Out 3 (1996). For an excellent critique of their book by one of my former students, see Joseph W. Beatty, The Legal Literature on SLAPPs: A Look behind the Smoke Nine Years after Professors Pring and Canan First Yelled “Fire!”, 9 U. Fla. J.L. & Pub. Pol’y 85 (1997).

8 The Public Participation Project maintains a website with a list of states that have adopted anti-SLAPP laws. See State Anti-SLAPP Laws, Pub. Participation Project, https://perma.cc/8RR7–8EJW.

9 47 U.S.C. § 230 (Supp. III 1999). The CDA is Title V (§§ 501–09) of the Telecommunications Act of 1996. See Act of Feb. 8, 1996, Pub. L. No. 104-104, 110 Stat. 133 (codified as amended in scattered sections of 18 U.S.C. and 47 U.S.C.).

10 Professor Benjamin Zipursky has questioned whether the Restatement (Second) provisions concerning distributor liability accurately stated the law, given that the cases it cited were “overwhelmingly prior to the Restatement (First).” Benjamin Zipursky, The Monsanto Lecture: Online Defamation, Legal Concepts, and the Good Samaritan, 51 Valparaiso U.L. Rev. 1, 21 (2016).

11 See Stratton Oakmont, Inc. v. Prodigy Servs. Co., 1995 WL 323710 (N.Y. Sup. Ct. May 24, 1995). The key issue in Stratton Oakmont, which was decided on a motion for partial summary judgment, was whether the internet service provider Prodigy was a “publisher” or a “distributor” for purposes of defamation liability. See Stratton Oakmont, 1995 WL 323710 at *1. A second issue was whether its bulletin-board moderator, who was also a defendant in the suit, was its agent for purposes of defamation liability. See Footnote id. “Publisher” and “distributor” are terms of art in defamation law. At common law, a publisher would be strictly liable not only for originating a defamatory statement but also for repeating or otherwise republishing a third party’s defamatory statements. See Restatement (Second) of Torts § 578 (1977). A distributor, on the other hand, would be liable only for “distributing” the defamatory communications of third parties if the distributor knew or had reason to know of the defamatory content. See Footnote id. at § 581 (“[O]ne who only delivers or transmits defamatory matter published by a third person is subject to liability if, but only if, he knows or has reason to know of its defamatory character.”). The reason for the distinction was simple. Publishers, like newspapers and broadcasters, have complete editorial control over the material they publish, and therefore it is fair to hold them liable for it. Distributors, such as bookstores, libraries, and newsstands, have no practical ability to monitor every publication they distribute, and it is therefore unfair to impose liability absent notice of defamatory content and some type of fault. See generally Footnote id. § 581 cmts. d–g. Because the facts of Stratton Oakmont suggested at most negligence on the part of Prodigy, the plaintiff needed the court to treat Prodigy as a publisher in order to have any hope of recovery. Internet service providers do not fit neatly into defamation’s traditional categories. The Stratton Oakmont court nonetheless examined the degree of editorial control exercised by Prodigy and held that Prodigy should be treated as a publisher rather than as a distributor. See Stratton Oakmont, 1995 WL 323710 at *5. The court therefore suggested that, although internet service providers should normally be categorized as distributors, Prodigy’s “own policies, technology and staffing decisions … have altered the scenario and mandated the finding that it is a publisher.” Footnote Id. A contemporaneous internet defamation opinion also looked at the degree of editorial control exercised by an internet service provider in concluding that it should be treated as a distributor instead. Cubby, Inc. v. CompuServe, Inc., 776 F. Supp. 135, 140–41 (S.D.N.Y. 1991). This created the seemingly paradoxical result that internet service providers who allowed more problematic content on their sites received more favorable liability treatment than those who tried to moderate problematic content. Section 230 of the Communications Decency Act was enacted to overturn this common law experiment to give at least as favorable treatment to service providers who exercised editorial control as those who eschewed all control. See H.R. Conf. Rep. No. 104-458, at 194 (1996), reprinted in 1996 U.S.S.C.A.N. 124, 207–08 (suggesting that Communications Decency Act was meant to overturn the Stratton Oakmont decision).

12 See Jones & Lidsky, supra Footnote note 4 (discussing these and other adaptations).

13 Eugene Volokh, Anti-Libel Injunctions, 168 U. Pa. L. Rev. 73 (2019).

14 Paul Mitchell, The Making of the Modern Law of Defamation 4 (2005). Eight states have explicitly abandoned the distinction, and Louisiana never adopted it. See Mehau v. Gannett Pac. Corp., 658 P.2d 312, 320 (Haw. 1983); Bryson v. News Am. Publ’ns, Inc., 672 N.E.2d 1207, 1215 (Ill. 1996); Toler v. Süd-Chemie, Inc., 458 S.W.3d 276, 281 n.7 (Ky. 2014), as corrected (2015); Newberry v. Allied Stores, Inc., 773 P.2d 1231, 1236 (N.M. 1989); West v. Thomson Newspapers, 872 P.2d 999, 1008 n.12 (Utah 1994); Schaecher v. Bouffault, 772 S.E.2d 589, 594 (Va. 2015); Grein v. LaPoma, 340 P.2d 766, 769 (Wash. 1959); Butts v. Royal Vendors, Inc., 504 S.E.2d 911, 916 (W. Va. 1998); see also Wattigny v. Lambert, 408 So. 2d 1126, 1134 (La. 1981) (holding that there is no distinction between slander and libel actions in Louisiana, citing a treatise that references the lack of the split in the French civil-law tradition upon which Louisiana law is based).

15 There is data, however, suggesting that suits against mainstream media have declined from their high in the 1980s. Justice Neil Gorsuch cited statistics in his dissent in Berisha v. Lawson, 141 S. Ct. 2424, 2428 (2021) suggesting that “the number of trials involving defamation, privacy, and related claims based on media publications has declined dramatically over the past few decades.”

16 See, e.g., Palin v. N.Y. Times Co., 933 F.3d 160 (2d Cir. 2019); Nunes v. Cable News Network, 2023 WL 2468646 (M.D. Fla. 2023) (granting CNN’s motion to dismiss); Nunes v. NBCUniversal Media, LLC, 2022 WL 17251981 (S.D.N.Y. 2022) (holding Nunes alleged prima facie case of defamation regarding one of several factual allegations about him made by NBC); Carroll v. Trump, 2023 WL 2669790 (S.D.N.Y. 2023) (denying Trump’s motion for partial summary judgment in defamation action); Moore v. Cecil, 488 F.Supp.3d 1144 (N.D. Ala. 2021) (holding Roy Moore stated a claim for defamation and defamation by implication against the sponsor of a television advertisement about him). Susan E. Seagar, Trump Is a Libel Bully but Also a Libel Loser, 32 Commc’ns Law. 1 (2016), https://perma.cc/44ZK-RRPC.

17 Hadas Gold, Donald Trump: We’re Going to ‘Open Up’ Libel Laws, Politico (Feb. 26, 2016), https://perma.cc/T29X-S3ZS.

18 U.S. Supreme Court Associate Justice Clarence Thomas called for reconsideration of New York Times v. Sullivan in 2019 in three recent opinions: McKee v. Cosby, 139 S. Ct. 675 (2019) (Thomas, J., concurring in denial of certiorari); Berisha v. Lawson, 141 S. Ct. 2424 (2021) (Thomas, J., dissenting from denial of certiorari); Coral Ridge Ministries Media v. S. Poverty L. Ctr., 142 S. Ct. 2453 (2022) (Thomas, J., dissenting from denial of certiorari). Federal appeals court judge Lawrence Silberman subsequently echoed Justice Thomas’s criticisms in Tah v. Glob. Witness Publ’g, Inc., 991 F.3d 231, 251 (D.C. Cir. 2021) (Silberman, J., dissenting). Justice Neil Gorsuch also called for reconsideration of Sullivan in his own dissent from the grant of cert in Berisha, 141 S. Ct. 2424. Thomas’s originalist arguments are addressed and refuted in a Media Law Resource Center White Paper titled New York Times v. Sullivan: The Case for Preserving an Essential Precedent, https://perma.cc/A4WN-25BS.

19 Coral Ridge Ministries, 142 S. Ct. at 2455.

20 McKee, 139 S. Ct. at 680.

21 Footnote Id. at 682.

22 Matthew L. Schafer, In Defense: New York Times v. Sullivan, 82 La. L. Rev. 81 (2021).

23 Footnote Id. at 145–46.

24 Berisha v. Lawson, 141 S. Ct. 2424, 2425 (2021) (Thomas, J., dissenting).

25 Coral Ridge Ministries Media v. S. Poverty L. Ctr., 142 S. Ct. 2453, 2455 (2022) (Thomas, J., dissenting).

27 Berisha, 141 S. Ct. at 2424.

28 Footnote Id. at 2425.

29 Footnote Id. at 2426.

31 Footnote Id. (citing Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 U.S. 749, 766 (1985)).

33 Footnote Id. at 2427.

36 Footnote Id. (citing David A. Logan, Rescuing Our Democracy by Rethinking New York Times Co. v. Sullivan, 81 Ohio St. L.J. 759, 800 (2020)).

38 Footnote Id. at 2427 (citing Logan, supra Footnote note 36, at 794–95).

39 Footnote Id. at 2428.

43 Footnote Id. at 2429.

45 Footnote Id. at 2430.

46 Footnote Id. at 2428.

47 John C. Lassiter, Defamation of Peers: The Rise and Decline of the Action for Scandalum Magnatum, 1497–1773, 22 Am. J. Legal Hist. (1978).

48 W. Page Keeton & William Lloyd Prosser, Prosser and Keeton on the Law of Torts § 111, 771 (5th ed. 1984) (“There is a great deal of the law of defamation which makes no sense.”).

49 Anderson, supra Footnote note 6, at 490.

50 Rosenblatt v. Baer, 383 U.S. 75 (1966).

51 Complaint, Gibson Bros. v. Oberlin College, 2017 WL 11249640 (Ohio Com. Pl. Nov. 7, 2017).

52 Complaint, Dominion Voting Sys., Inc. v. Herring Networks (OAN), No. 2021–2130 (D.D.C. Nov. 7, 2022); Complaint, Dominion Voting Sys., Inc. v. Newsmax Media, Inc., No. N21C-08-063 EMD (Del. Super. Ct. Aug. 10, 2021).

53 See Gertz v. Robert Welch, Inc., 418 U.S. 323 (1974) (discussing plaintiff’s interest in vindication). In traditional libel suits, plaintiffs’ primary goals in bringing suit include restoring reputation, correcting what plaintiffs view as falsity, and exacting vengeance. See Randall P. Bezanson, Libel Law and the Realities of Libel Litigation: Setting the Record Straight, 71 Iowa L. Rev. 226, 227 (1985). Defamation suits are often driven by “emotion, rather than money,” since defamation actions may be the only avenue available to vindicate a plaintiff’s damaged reputation. Bruce W. Sanford, Libel and Privacy 609 (2d ed. 1991); Marc A. Franklin, Winners and Losers and Why: A Study of Defamation Litigation, 1980 Am. B. Found. Res. J. 455, 462 (“The defendant’s solvency is probably not central to the decision to sue because the plaintiff’s reputation is at issue and thus an apology or a small recovery may vindicate the plaintiff.”).

54 Ben Feuerherd, NYT Fact-Checker Missed Assertion about Palin in 2017 Editorial, N.Y. Post (Feb. 7, 2022), https://perma.cc/HN64-ZG95.

55 Ben Feuerherd, Sarah Palin Error in Editorial Was ‘Honest Mistake,’ New York Times Lawyer Claims, N.Y. Post (Feb. 11, 2022), https://perma.cc/B5SS-3J9R.

57 Dominick Mastrangelo, Judge to Throw Out Sarah Palin’s Lawsuit Against New York Times, Hill (Feb. 14, 2022), https://perma.cc/5SWV-DN2K; see also Allie Griffin, Sarah Palin’s Attempt to Disqualify Judge Jed Rakoff from NY Times Defamation Trial Fails, N.Y. Post (June 1, 2022), https://perma.cc/P7F7-M4ZJ.

58 Anderson, supra Footnote note 6, at 523.

59 See, e.g., Complaint, U.S. Dominion, Inc. v. Herring Networks, Inc., 2021 WL 3522347 (D.D.C. 2021) (trial pleading); Complaint, Smartmatic USA Corp. v. Lindell, 2022 WL 168592 (D. Minn. 2022) (trial pleading); U.S. Dominion, Inc. v. Byrne, 600 F. Supp. 3d 24, 2022 WL 1165935 (D.D.C. 2022) (denying motion of Patrick Byrne, CEO of Overstock.com, to dismiss Dominion’s defamation suit); U.S. Dominion, Inc. v. Powell, 554 F. Supp. 3d 42, 56 (D.D.C. 2021) (denying motion to dismiss Dominion’s defamation claims against Trump lawyers Sidney Powell, Rudy Guiliani, and MyPillow CEO Mike Lindell); U.S. Dominion, Inc. v. MyPillow, Inc., No. 21-7103, 2022 WL 774080 (D.C. Cir. Jan. 20, 2022); U.S. Dominion, Inc. v. MyPillow, Inc., 2022 WL 1597420 (D.D.C. 2022) (granting motions to dismiss counterclaims made by MyPillow’s CEO against Smartmatic and Dominion Voting Systems and granting, in part, Smartmatic’s motion for sanctions against Lindell for filing frivolous claims); Smartmatic USA Corp. v. Herring Networks, Inc., 2022 WL 2208913 (D.D.C. 2022) (denying motion to dismiss claim against Herring Networks (One American News Network) for lack of personal jurisdiction). For the actions against Fox, see Smartmatic USA Corp. v. Fox Corp., No. 151136/2021 (Sup. Ct. N.Y. Cnty.); U.S. Dominion, Inc. v. Fox News Network, LLC, No. N21C-03-257-EMD, 2022 WL 100820, at *3–4 (Del. Super. Ct. Jan. 10, 2022) (noting that Dominion “stated a defamation claim under any pleading standard, including New York’s anti-SLAPP clear and convincing evidence standard”).

60 U.S. Dominion, Inc. v. Fox News Network, LLC, No. N21C-11-082-EMD-CCLD, 2022 WL 100820 (Del. Super. Ct. June 21, 2022).

61 Berisha v. Lawson, 141 S. Ct. 2424, 2428 (2021) (Gorsuch, J., dissenting).

62 See Anthony Lewis, Make No Law: The Sullivan Case and the First Amendment 14 (1991). By the time the Supreme Court decided the case, libel actions threatened to silence media reporting on the Civil Rights Movement. See Sullivan, 376 U.S. at 277–78 (noting that state libel actions could bring newspapers such large judgments that “those who would give voice to public criticism” would be effectively silenced). Sullivan also involved several nonmedia defendants in addition to The New York Times, and the logic of the decision applied equally to them all. See Footnote id. at 279–80.

63 Footnote Id. at 260.

8 Defamation, Disinformation, and the Press Function

1 See Janna Anderson & Lee Rainie, The Future of Truth and Misinformation Online, Pew Rsch. Ctr. (Oct. 19, 2017), https://perma.cc/4DNE-2XUY; During This Coronavirus Pandemic, “Fake News” Is Putting Lives at Risk: UNESCO, U.N. News (Apr. 13, 2020), https://perma.cc/4PZJ-72XH (discussing the “contamination” of information exchange caused by orchestrated campaigns that repeat and amplify disinformation).

2 Berisha v. Lawson, 141 S. Ct. 2424, 2424 (2021).

3 New York Times Co. v. Sullivan, 376 U.S. 254, 256–57 (1964).

4 Footnote Id. at 257–58.

5 Footnote Id. at 257–59. For example, the advertisement said that protestors sang “My Country ‘Tis of Thee,” when they in fact sang “The Star-Spangled Banner.” Under Alabama law, a publication was libelous per se if the words tended to injure a person’s reputation, and Sullivan successfully argued that the words were “of and concerning” him by reflecting poorly on the performance of the government agency he oversaw. “Once ‘libel per se’ ha[d] been established, the defendant ha[d] no defense as to stated facts unless he [could] persuade the jury that they were true in all their particulars.” Footnote Id. at 267.

6 Footnote Id. at 256.

7 Walter Dellinger, The Right to Be Wrong, N.Y. Times (Sept. 1, 1991), https://perma.cc/54EG-LRF5.

8 Sullivan, 376 U.S. at 286.

9 Footnote Id. at 279–80.

10 Footnote Id. at 270.

11 Footnote Id. at 272.

12 Footnote Id. at 271–72.

13 Curtis Publ’g Co. v. Butts, 388 U.S. 130, 155 (1967); Gertz v. Robert Welch, Inc., 418 U.S. 323, 323 (1974).

14 Separately, Justice Gorsuch’s dissent from denial of certiorari in Berisha raised the question of whether the new social media landscape also changes the scope and contours of public figuredom.

15 Berisha v. Lawson, 141 S. Ct. 2424, 2425 (2021) (Gorsuch, J., dissenting from denial of certiorari).

16 With his Berisha opinion, Gorsuch became the second Justice to suggest a rethinking of Sullivan. Justice Thomas, who also dissented from denial of certiorari in Berisha, had already taken this position two years earlier, rooting his argument primarily in a view of First Amendment originalism. McKee v. Cosby, 139 S. Ct. 675, 676 (2019) (Thomas, J., concurring); see also Coral Ridge Ministries Media, Inc. v. S. Poverty L. Ctr., 142 S. Ct. 2453 (2022) (Thomas, J., dissenting from denial of certiorari) (arguing for reconsideration of Sullivan).

17 Berisha, 141 S. Ct. at 2424 (The 2016 Jonah Hill movie War Dogs is loosely based on this true story of young Floridians who convinced the Pentagon to award them a $300 million contract to arm America’s allies in Afghanistan.).

18 Footnote Id. at 2427.

19 Footnote Id. at 2428.

20 Footnote Id. at 2427.

23 Footnote Id. (“A study of one social network reportedly found that ‘falsehood and rumor dominated truth by every metric, reaching more people, penetrating deeper … and doing so more quickly than accurate statements’.”).

24 See Davey Alba, Facebook Groups Promoting Ivermectin as a Covid-19 Treatment Continue to Flourish, N.Y. Times (Sept. 28, 2021), https://perma.cc/8748-A5UF (highlighting the role of Facebook groups in spreading disinformation about ivermectin as a treatment for COVID-19); Jennifer Nilsen, Cord Blood and Medical Misinformation: The Big Business of Unproven Stem Cell Treatments, Media Manipulation Casebook (Nov. 1, 2021), https://perma.cc/S59X-E4NH (tracking the origin and spread of disinformation related to unproven stem cell treatments as a “near cure-all” for any ailment).

25 See Linda Qiu, No, Covid-19 Vaccines Are Not Killing More People than the Virus Itself, N.Y. Times (May 7, 2021), https://perma.cc/7928-YT25 (reporting on popular social media claims asserting that COVID-19 vaccinations have caused more deaths than the virus itself); Reuters Fact Check, Fact Check-VAERS Data Does Not Prove Thousands Died from Receiving Covid-19 Vaccines, Reuters (Apr. 2, 2021, 8:35 AM), https://perma.cc/E9FA-TBDT (fact-checking a widely viewed Facebook video claiming the COVID-19 vaccine killed thousands of people); Katherine J. Wu, No, There Are No Microchips in Coronavirus Vaccines, N.Y. Times (Dec. 17, 2020), https://perma.cc/7928-YT25 (debunking popular online claims that Pfizer’s coronavirus vaccine contains a tracking microchip planted by the government); Sarah Evanega et al., Coronavirus Misinformation: Quantifying Sources and Themes in the COVID-19 ‘Infodemic’, Cornell (July 23, 2020), https://perma.cc/BF54-4R6J (tracking common COVID conspiracies, including miracle cures, “deep state” conspiracies, and assertions about population control).

26 See Davey Alba, These Two Rumors Are Going Viral Ahead of California’s Recall Election, N.Y. Times (Sept. 15, 2021), https://perma.cc/M4TX-M2MH (explaining the rumor preceding California’s gubernatorial recall election that holes in ballot envelopes were being used to screen votes); Linda Qiu, The Election Is Over, but Ron Johnson Keeps Promoting False Claims of Fraud, N.Y. Times (Mar. 21, 2021), https://perma.cc/B9U5-QU8X (tracking the continued spread of disinformation regarding a fraudulent presidential election, despite claims having been addressed and debunked by government cybersecurity leaders).

27 See Jeffrey Pierre & Scott Neuman, How Decades of Disinformation about Fossil Fuels Halted U.S. Climate Policy, NPR (Oct. 27, 2021), https://perma.cc/YEN5-YW6L (tracking the oil industry’s coordinated efforts to undermine data showing the effects of climate change).

28 Bente Birkeland, Election Defamation Lawsuits Open New Front in Fight against Defamation, NPR (Mar. 27, 2021, 7:00 AM), https://perma.cc/AS9L-4D99 (“Many conspiracy theories do not target a specific person or company, so there’s no one to file a lawsuit against.”); John Cook, Ullrich Ecker & Stephan Lewandowsky, Misinformation and How to Correct It, in Emerging Trends in the Social and Behavioral Sciences 1, 3 (Robert A. Scott, Stephen M. Kosslyn & Marlis Buchmann eds., 2015) (noting the ways that anti-science campaigns “misinform the public on issues that have achieved consensus among the scientific community, such as biological evolution, and the human influence on climate change”).

29 Complaint at 10, Weisenbach v. Project Veritas, No. 10819-21 (Pa. Ct. Com. Pl. Aug. 13, 2021); Project Democracy Joins Defamation Suit Against Project Veritas: Group Maliciously Lied About a PA Postmaster in the Aftermath of 2020 Election, Protect Democracy (Aug. 16, 2021), https://perma.cc/4TB5-UUQR.

30 Complaint, Freeman v. Hoft, No. 4:21-cv-0 1424 (E.D. Mo. Dec. 5, 2021); Betsy Woodruff Swan, Kyle Cheney & Josh Gerstein, Pa. Voting Official Sues Trump, Giuliani, Others over 2020 Allegations, Politico (Nov. 2, 2021, 11:05 PM), https://perma.cc/JJ4R-4VWQ.

31 US Dominion, Inc. v. Fox News Network, LLC, No. N21C-03-257 EMD (Del. Super. Ct. Mar. 26, 2021); Smartmatic USA Corp. v. Fox Corporation, No. 151136/2021 (N.Y. Sup. Ct. Feb. 8, 2021); Smartmatic USA Corp. v. Michael J. Lindell, No. 22-cv-00098-WMW-JFD (D. Minn. Jan. 18, 2022).

32 See, e.g., Dave Collins, Alex Jones Ordered to Pay $965 Million for Sandy Hook Lies, AP News (Oct. 12, 2022), https://perma.cc/7BU4-Q4DS.

33 The Disinformation Dozen, Ctr. for Countering Digital Hate (Mar. 24, 2021), https://perma.cc/FFQ3-N2VJ; Audrey McNamara, A Dozen Anti-vaccine Accounts Are Responsible for 65% of Disinformation Shared Online, New Report Finds, CBS News (Mar. 25, 2021, 10:09 PM), https://perma.cc/FC2K-J3QX (noting that nearly two-thirds of anti-vaccine content that had been shared or posted on Facebook and X more than 812,000 times between February 1 and March 16, 2021, came from twelve accounts).

34 The Disinformation Dozen, supra Footnote note 33 (describing allegation that Bill Gates had a role in planning the COVID-19 pandemic).

35 Footnote Id. at 12–21; Sheera Frenkel, The Most Influential Spreader of Coronavirus Misinformation Online, N.Y. Times (Nov. 25, 2022), https://perma.cc/BBG6-X7VK; Davey Alba & Sheera Frenkel, From Voter Fraud to Vaccine Lies: Misinformation Peddlers Shift Gears, N.Y. Times (Jan. 7, 2021), https://perma.cc/R4U4-VCNL (discussing campaigns spreading lies about vaccines being delivered with a microchip or being harmful to health).

36 See, e.g., Terrence McCoy, Inside a Long Beach Web Operation That Makes Up Stories about Trump and Clinton: What They Do for Clicks and Cash, L.A. Times (Nov. 22, 2016), https://perma.cc/RD6R-LZB2 (describing the process by which writer Paris Wade found a “totally misleading” photograph to “trick people into treading the news”); Laura Sydell, We Tracked Down a Fake-News Creator in the Suburbs. Here’s What We Learned, NPR (Nov. 23, 2016, 3;31 PM), https://perma.cc/K986-S564 (describing the rapid spread of a fabricated story about an FBI agent murdered for leaking Hillary Clinton’s email).

37 See, e.g., David Bauder, Is Alex Jones Verdict the Death of Disinformation? Unlikely, AP News (Oct. 17, 2022), https://perma.cc/BA3W-FSRV; Zeynep Tufekci, Opinion, We Should Try to Prevent Another Alex Jones, N.Y. Times (Oct. 16, 2022), https://perma.cc/2FGD-NKA6.

38 See Darrell M. West, How to Combat Fake News and Disinformation, Brookings (Dec. 18, 2017), https://perma.cc/XNH6-ZDGY (noting the link between disinformation and “the likelihood that people will engage in worse behavior if they believe their actions are anonymous and not likely to be made public”).

39 Claire Wardle, 5 Lessons for Reporting in an Age of Disinformation, First Draft (Dec. 27, 2018), https://perma.cc/9XDG-5VSR; Alice Marwick & Rebecca Lewis, Media Manipulation and Disinformation Online 27, Data & Soc’y Rsch. Inst. (May 15, 2017), https://perma.cc/HCY7-SRYE (noting the disinformation goals of advancing ideology and earning money through advertising revenue).

40 Brian Friedberg & Joan Donovan, On the Internet, Nobody Knows You’re a Bot: Pseudonymous Influence Operations and Networked Social Movements, 6 J. Design & Sci. (Aug. 7, 2019), https://perma.cc/98RE-UCCU; Matthew Hindman & Vlad Barash, Disinformation, ‘Fake News’ and Influence Campaigns on Twitter 16, Knight Found. (Oct. 2018), https://perma.cc/AB8A-635 V (noting the proliferation of academic research documenting the role of bots in promoting fake news).

41 See Friedberg & Donovan, supra Footnote note 40.

42 Erik P. Lewis, Unmasking “Anon12345”: Applying an Appropriate Standard When Private Citizens Seek the Identity of Anonymous Internet Defamation Defendants, 2009 U. Ill. L. Rev. 947, 953–54.

44 Steven Seidenberg, Lies and Libel: Fake News Lacks Straightforward Cure, ABA J. (July 1, 2017, 12:15 AM), https://perma.cc/UCQ5-2BDQ (noting that many potential defendants “lack sufficient funds to justify bringing lawsuits against them.”).

45 47 U.S.C. § 230.

46 Richard Tofel & Jeremy Kutner, A Response to Justice Gorsuch, in New York Times v. Sullivan: The Case for Preserving an Essential Precedent (2022), https://perma.cc/VY3G-LLZ6 (“In the realm of litigation, the ‘optimal legal strategy’ for publishers who cannot afford to be sued is, and has been, to be less aggressive in coverage. For those who still can afford it, i.e., can afford rapidly rising libel insurance rates and deductibles, the optimal strategy is to practice journalism in a way that minimizes the combined cost of insurance and litigation itself.”).

47 See Erin Carroll, Promoting Journalism as Method, 12 Drexel L. Rev. 691 (2020).

48 RonNell Andersen Jones & Lisa Grow Sun, Freedom of the Press in Post-Truthism America, 98 Wash. U. L. Rev 419 (2020) (describing key components of the constitutional press function); RonNell Andersen Jones, Press Speakers and the First Amendment Rights of Listeners, 90 U. Colo. L. Rev. 499 (2019) (arguing press speakers engage in special institutional First Amendment activities on behalf of audiences).

49 See, e.g., Christoph Koettl, Satellite Images and Shadow Analysis: How the Times Verifies Eyewitness Videos, N.Y. Times (Sept. 4, 2018); Policies and Standards, Wash. Post, https://perma.cc/HZ5W-M5AZ; Sarah Matthews et al., A Reporter’s Guide to Pre-Publication Review, Reps. Comm. for Freedom Press, https://perma.cc/4FK2-WBPM.

50 The Pulitzer Prize-winning site PolitiFact originated as an effort by the staff of the Tampa Bay Times to fact-check claims made in the lead-up to the 2008 election. Angie Drobnic Holan, The Principles of the Truth-O-Meter: PolitiFact’s Methodology for Independent Fact-Checking, PolitiFact (Apr. 18, 2022), https://perma.cc/P6JY-SKL4. The site now runs as a nonprofit fact-checking engine under the Time’ parent company, the Poynter Institute, and partners with media outlets across the U.S. to spearhead state-level fact-checking sites. For example, Texas’s site is supported by the work of journalists from the Austin American-Statesman, Houston Chronicle, and San Antonio News-Express; the Daily Iowan provides support for its state site; Capital Public Radio for California’s; Buffalo News for New York; the Detroit Free Press for Michigan; and the Vermont Digger for Vermont. Texas, PolitiFact, https://perma.cc/37FX-RRSX; Iowa, PolitiFact, https://perma.cc/VS8L-KJ22; California, PolitiFact, https://perma.cc/WY7L-64SV; New York, PolitiFact, https://perma.cc/6YNL-ZES3.

51 See, e.g., Valerie Pavilonis, Fact Check: Claim About Growing Number of Diseases Exaggerates, Omits Context, USA Today (Feb. 22, 2022, 1:07 PM), https://perma.cc/FXH3-RQFN; Reuters Fact Check, Fact Check–No Evidence Some Covid-19 Vaccines Increase Risk of HIV Infection, Reuters (Feb. 18, 2022, 1:09 PM), https://perma.cc/K6SR-BTGN; Glenn Kessler, How the Falsehood of Athletes Dying of Coronavirus Vaccines Spread, Wash. Post (Feb. 1, 2022, 3:00 AM), https://perma.cc/4222-DDSN; Maggie Astor, No, Other People’s Covid Vaccines Cannot Disrupt Your Menstrual Cycle, N.Y. Times (Sept. 13, 2021), https://perma.cc/VS4T-SCZT.

52 See, e.g., PolitiFact, https://perma.cc/Y29A-HAQU; Glenn Kessler, Fact Checker: The Truth behind the Rhetoric, Wash. Post, https://perma.cc/5WET-3WBP.

53 See, e.g., Tiffany Hsu, Tracking Viral Misinformation, N.Y. Times (Feb. 24, 2022); Fact Check, USA Today, https://perma.cc/L2K2-GJTG.

54 See Chip Scanlan, Writers at Work: The Process Approach to Newswriting, Poynter. (Aug. 25, 2002), https://perma.cc/4GZ5-4Q3S (describing the general process for newsgathering and writing); SPJ Code of Ethics, Soc’y Pro. Journalists (Sept. 6, 2014), https://perma.cc/7VN6-8M4V (describing the ethical standards guiding newswriting).

55 For example, in 2016, journalists broke the story of a group of Macedonian bloggers responsible for at least 140 U.S.-politics websites propagating false and misleading content, revealed American connections to the network, and exposed a sophisticated strategy to sway public opinion in the lead-up to the 2016 U.S. presidential election. Craig Silverman & Lawrence Alexander, How Teens in the Balkans Are Duping Trump Supporters with Fake News, Buzzfeed News (Nov. 3, 2016, 5:02 PM), https://perma.cc/4FQ2-E6UU; Craig Silverman et al., Macedonia’s Pro-Trump Fake News Industry Had American Links, and Is under Investigation for Possible Russia Ties, Buzzfeed News (July 18, 2018, 10:24 AM), https://perma.cc/Z3X9-LH5A.

56 Morning Edition, The Origins of the Seth Rich Conspiracy Theory, NPR (July 11, 2019, 5:22 AM), https://perma.cc/43KK-NASN.

57 See, e.g., Frontline, The Plot to Overturn the Election, PBS (Mar. 29, 2022), https://perma.cc/K8Z4-DX88 (outlining a ProPublica/Frontline project to “trace the sources of misinformation about the 2020 election, demonstrating how a handful of people have had an outsized impact on the current U.S. crisis of democratic legitimacy”).

58 David Klepper, Conspiracy Theories Paint Fraudulent Reality of Jan. 6 Riot, AP News (Dec. 31, 2021), https://perma.cc/9MGQ-48UH.

59 See, e.g., Vanessa Romo, Poison Control Centers Are Fielding a Surge of Ivermectin Overdose Calls, NPR (Sept. 4, 2021, 7:01 AM), https://perma.cc/AB6K-588E.

60 See Penelope Muse Abernathy, Ctr. for Innovation & Sustainability in Local Media, News Deserts and Ghost Newspapers: Will Local News Survive? (2020), https://perma.cc/2DWX-ETXX (“In only two decades, successive technological and economic assaults have destroyed the for-profit business model that sustained local journalism in this country for two centuries. Hundreds of news organizations – century-old newspapers as well as nascent digital sites – have vanished.”).

62 Victor Pickard, Democracy without Journalism: Confronting the Misinformation Society (2020).

63 See Michael Ewens, Arpit Gupta & Sabrina T. Howell, Local Journalism under Private Equity (Oct. 10, 2021) (unpublished manuscript), https://perma.cc/3EW3-HXW3 (tracking the change of news composition away from information about local governance and the resulting decline in participation in local elections).

64 Meagan Flynn, A Small-Town Iowa Newspaper Brought Down a Cop. His Failed Lawsuit Has Now Put the Paper in Financial Peril, Wash. Post (Oct. 10, 2019, 6:41 AM), https://perma.cc/CB8C-LY5H (discussing a local newspaper forced to reduce its publication schedule and engage in fundraising after being sued for defamation for accurately reporting about a police officer).

65 See Megan Brenan, Media Confidence Ratings at Record Lows, Gallup (July 18, 2022), https://perma.cc/CC3S-GYM4.

66 See Aspen Inst., Comm’n on Information Disorder, Decline of Trust Institutions (2021), https://perma.cc/4BPS-Z6NL.

67 Yochai Benkler, Robert Faris & Hal Roberts, Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics (2018) (addressing the ways that the right-wing media is more susceptible to disinformation and the spread of identity-confirming falsehoods).

69 See, e.g., Orestis Papakyriakopoulos, Juan Carlos Medina Serrano & Simon Hegelich, The Spread of COVID-19 Conspiracy Theories on Social Media and the Effect of Content Moderation, Harv. Kennedy Sch. Misinformation Rev. (Aug. 18, 2020), https://perma.cc/CB53-NJKD (finding that mainstream URLs used as evidence for the truthfulness of conspiracy theories are shared up to four times as often as fake-news sites).

70 See, e.g., Yariv Tsfati et al., Causes and Consequences of Mainstream Media Dissemination of Fake News: Literature Review and Synthesis44 Annals Int’l Comm. Ass’n 157–73 (2020).

71 See Nabiha Syed, Sullivan Is Not the Problem, Knight First Amend. Inst. (Nov. 15, 2021), https://perma.cc/HGV4-AK46.

72 See Justin Wise, Trump Escalates Fight against Press with Libel Lawsuits, The Hill (Mar. 8, 2020), https://perma.cc/V7T9-U57X; Trevor Timm, Trump’s Many, Many Threats to Sue the Press since Launching His Campaign, Colum. Journalism Rev. (Oct. 3, 2016), https://perma.cc/D3QB-G6WA. See also J. Clara Chan, Devin Nunes Sues CNN for $435 Million-Plus in Defamation Suit, The Wrap (Dec. 3, 2019, 3:38 PM), https://perma.cc/R7FM-GZ5W.

9 Privacy Rights, Internet Mug Shots, and a Right to Be Forgotten

2 People ex rel. Joyce v. York, 27 Misc. 658 (N.Y. Sup. Ct. 1899).

3 Footnote Id. at 659.

4 Itzkovitch v. Whitaker, 115 La. 479, 481 (La. 1905).

5 Itzkovitch v. Whitaker, 117 La. 708, 709–10 (La. 1905).

6 State ex rel. Mavity v. Tyndall, 66 N.E.2d 755, 762 (Ind. 1956) (“Is the placing of appellant’s picture in the ‘rogues’ gallery’ described in the complaint so serious a violation of appellant’s right to privacy as to justify judicial protection? Most of the cases so hold and we are constrained to follow them.”).

7 State ex rel. Mavity v. Tyndall, 66 N.E.2d 755 (Ind. 1956).

8 Downs v. Swann, 73 A. 653 (Md. 1909).

9 State ex rel. Reed v. Harris, 153 S.W.2d 834 (Mo. 1941).

10 McGovern v. Van Riper, 43 A.2d 514 (N.J. Ch. Ct. 1945).

11 Footnote Id. at 525.

12 73 F.3d 93 (6th Cir. 1996).

13 Footnote Id. at 97.

14 Footnote Id. at 98.

16 424 U.S. 693 (1976).

17 Corey Hutchins, Mugshot Galleries Might Be a Web-Traffic Magnet. Does that Justify Publishing Them?, Colum. Journalism Rev. (Oct. 24, 2018).

18 Keri Blakinger, Newsrooms Rethink a Crime Reporting Staple: The Mugshot, Marshall Project (Feb. 11, 2020), https://perma.cc/47J6-NTU6.

19 37 F. Supp. 2d 472 (E.D. La. 1999).

20 Footnote Id. at 476.

22 Footnote Id. at 479.

23 Detroit Free Press v. U.S. DOJ, 829 F.3d 478 (6th Cir. 2016).

24 Footnote Id. at 481.

25 Footnote Id. at 482.

26 Footnote Id. at 482–83.

27 Footnote Id. at 485.

28 Footnote Id. (Cole, J., concurring).

29 See Karantsalis v. U.S. Dep’t of Justice, 635 F.3d 497 (11th Cir. 2011); World Publ’g Co. v. U.S. Dep’t of Justice, 672 F.3d 825 (10th Cir. 2012).

30 412 U.S. 306 (1973).

31 Footnote Id. at 308–09 n.1.

32 Footnote Id. at 313–14.

33 Footnote Id. at 317.

34 Footnote Id. at 329–30.

35 425 U.S. 352 (1975).

36 Footnote Id. at 358–59.

37 Footnote Id. at 381.

38 Footnote Id. at 376–77 (citing in part the Second Circuit decision in the case, 495 F.2d at 267).

39 489 U.S. 749 (1989).

40 Footnote Id. at 752.

41 Footnote Id. at 771.

42 Footnote Id. at 764.

43 Restatement (Second) of Torts § 652D (1977).

44 Footnote Id. at cmt. k.

45 Footnote Id. at cmt. k, illus. 26.

48 State v. Bienvenu, 36 La. Ann. 378, 382 (La. 1884).

49 Toffoloni v. LFB Publ’g Grp., 572 F.3d 1201 (11th Cir. 2009).

50 Case C-131/12, Google Spain SL. v. Agencia Española de Protección de Datos, ECLI:EU:C:2014:317 (May 13, 2014).

51 Taha v. Bucks Cnty., 2021 U.S. Dist. Lexis 26961 (E.D. Pa. 2021).

52 Footnote Id. at *10.

54 Hartzell v. Cummings, No. 150103764, 2015 WL 7301962 (Pa. Ct. Com. Pl., Nov. 4, 2015).

55 Footnote Id. at *11.

56 Boston Globe Media Partners v. Dep’t of Crim. Just. Info. Servs., 140 N.E.3d 923, 934 (Mass. 2019).

57 White v. City of Cleveland, 2020 U.S. Dist. Lexis 93919 (N.D. Ohio May 29, 2020).

58 Rogers v. JustMugshots.com, No. BC530194, 2015 WL 5838403 (Cal. Ct. App., Oct. 7, 2015).

59 City of Austin v. Doe, 2020 Tex. App. Lexis 10257 (Dec. 29, 2020).

60 Smart v. City of Miami, 740 Fed. App’x 952 (11th Cir. 2018).

61 Footnote Id. at *22.

62 Footnote Id. at *14.

63 5 Ill. Comp. Stat. Ann. 140/2.15.

64 Cal. Civ. Code § 1798.91.1(b).

65 This information is from Amy Gajda, Mugshots and the Press-Privacy Dilemma, 93 Tul. L. Rev. 1199 (2019).

66 The information in this paragraph is from Colin McMahon, How the Chicago Tribune Handles Police Booking Photos, Chi. Trib. (Feb. 10, 2021).

68 Chicago Tribune Mug Shot Publication Guidelines, Chi. Trib. (Feb. 9, 2021), https://perma.cc/PM5K-X65M.

69 Blakinger, supra Footnote note 18.

71 Restatement (Second) of Torts § 652D (1977).

72 The polling data is from Brooke Auxier, Most Americans Support Right to Have Some Personal Info Removed from Online Searches, Pew Rsch. Ctr. (Jan. 27, 2020), https://perma.cc/Q35Q-7BYB.

73 Florida Star v. B.J.F., 491 U.S. 524 (1989).

10 Brokered Abuse

* Huge thanks to RonNell Andersen Jones, Elettra Bietti, Hannah Bloch-Wehba, Sarah Burns, Ryan Calo, Ignacio Cofone, Julie Cohen, Amy Gajda, Yael Grauer, Nikolas Guggenberger, Woodrow Hartzog, Mike Hintze, Leigh Honeywell, Ido Kilovaty, Anne Klinefelter, Kyle Langvardt, Mark Lemley, Lyrissa Lidsky, Christopher Morten, Paul Ohm, Natália Pires de Vasconcelos, Ani Satz, Evan Selinger, Scott Skinner-Thompson, Eugene Volokh, Rachel Vrabec, Ari Waldman, Rebecca Wexler, Felix Wu, and participants at the Privacy Law Scholars Conference and the UGA-Emory Faculty Workshop. I dedicate this chapter to the clients and volunteers at the Clinic to End Tech Abuse.

1 Greetings Infidels, I Am Liam Youens, https://perma.cc/TPY7-JCGA.

3 Footnote Id.; Kaveh Waddell, How FamilyTreeNow Makes Stalking Easy, Atlantic (Jan. 17, 2017), https://perma.cc/H6AG-CHSE.

4 Evan Selinger & Woodrow Hartzog, Obscurity and Privacy, in Spaces for the Future: A Companion to Philosophy of Technology 119, 119 (Joseph Pitt & Ashley Shew eds., 2018).

5 See Danielle Keats Citron, Sexual Privacy, 128 Yale L.J. 1870 (2019) (discussing how networked technologies have facilitated various forms of interpersonal abuse).

6 See Thomas E. Kadri, Networks of Empathy, 2020 Utah L. Rev. 1075, 1075 (urging that “[w]e can neither understand nor address digital abuse unless we view technology in a deeper social context and grapple with how and why digital abuse is harmful”).

7 Salome Viljoen, A Relational Theory of Data Governance, 131 Yale L.J. 573, 588 n.19 (2021) (observing that “[s]ome evidence pegs the global data-brokerage industry at about $200 billion annually”).

8 See Neil Richards, Why Privacy Matters 1–11 (2022) (connecting privacy, power, and “human information” and defining privacy as “the degree to which human information is neither known nor used”). For important early scholarship on brokers, see Chris J. Hoofnagle, Big Brother’s Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement, 29 N.C. J. Int’l L. 595 (2003); Daniel J. Solove & Chris Jay Hoofnagle, A Model Regime of Privacy Protection, 2006 U. Ill. L. Rev. 357. For more contemporary reporting, see Adi Robertson, The Long, Weird History of Companies That Put Your Life Online, Verge (Mar. 21, 2017), https://perma.cc/Z9J8-HU9G; Yael Grauer, What Are ‘Data Brokers,’ and Why Are They Scooping Up Information About You?, Vice (Mar. 27, 2018), https://perma.cc/34YR-A5LN.

9 See Margaret B. Kwoka, FOIA, Inc., 65 Duke L.J. 1361, 1376–401 (2016) (detailing how a vast industry of “information resellers” requests federal public records under the Freedom of Information Act (FOIA) and resells them for profit); David E. Pozen, Transparency’s Ideological Drift, 128 Yale L.J. 100, 125 (2018) (observing that “commercial requesters – including a cottage industry of data brokers and information resellers – submit over two-thirds” of FOIA requests to various federal agencies).

10 See Amy Gajda, Seek and Hide: The Tangled History of the Right to Privacy 231–41 (2022) (discussing the extensive data dossiers compiled by brokers and other companies).

11 See generally Jennifer Barrett Glasgow, Data Brokers: Should They Be Reviled or Revered?, in Cambridge Handbook of Consumer Privacy 25 (Evan Selinger, Jules Polonetsky & Omer Tene eds., 2018) (canvassing the apparent benefits that brokers bring to the economy, innovation, and consumers).

12 Thomas E. Kadri, Platforms as Blackacres, 68 UCLA L. Rev. 1184, 1184–87 (2022) (discussing how researchers use data to “understand the effects of digital technologies, to oversee the influence that platforms wield, and to hold accountable the private actors that curate our experiences on the internet”); Thomas E. Kadri, Digital Gatekeepers, 99 Tex. L. Rev. 951, 977–82 (2021) (detailing how researchers rely on data to provide critical insights to the public).

13 See generally Eugene Volokh, Cheap Speech and What It Will Do, 104 Yale L.J. 1805 (1995) (predicting that new technologies enabled by the internet will alter information flows by making speech “cheap”).

14 See generally Julie E. Cohen, Between Truth and Power: The Legal Constructions of Informational Capitalism (2019) (exploring how informational-capitalist discourses have entrenched corporate power); Ari Ezra Waldman, Industry Unbound: The Inside Story of Privacy, Data, and Corporate Power (2021) (critiquing the corporate-friendly privacy discourses that shape the legal and technical work sustaining informational capitalism).

15 Remsburg v. Docusearch, Inc., 816 A.2d 1001, 1005–06 (N.H. 2003). Police also unearthed Youens’s plan to find and murder Boyer’s family, though he committed suicide before carrying it out. The Amy Boyer Case, Elec. Privacy Info. Ctr. (June 15, 2006), https://perma.cc/G6J7-Z8TF.

16 Hannah Elias Sbaity, Private Lives at Home and Public Lives in Court: Protecting the Privacy of Federal Judges’ Home Addresses, 28 J. Intell. Prop. L. 475, 485–86 (2021).

17 See, e.g., Ga. Stat. Ann. § 16–5-90 (criminalizing the offense of “stalking” when a person “follows, places under surveillance, or contacts another person at or about a place or places without the consent of the other person for the purpose of harassing and intimidating the other person”); Cal. Pen. Code § 653.2 (criminalizing the nonconsensual “electronic distribut[ion]” of “personal identifying information” with “intent to place another person in reasonable fear for his or her safety” and “for the purpose of imminently causing that other person unwanted physical contact, injury, or harassment, by a third party”); see also Eugene Volokh, One-to-One Speech vs. One-to-Many Speech, Criminal Harassment Laws, and “Cyberstalking”, 107 Nw. U. L. Rev. 731 (2013) (exploring the scope and constitutionality of stalking and harassment laws).

18 Cal. Gov. Code § 6208.1.

19 Similar challenges arise in holding brokers vicariously liable for helping abusers. Liability for conspiracy or aiding and abetting requires substantial assistance, encouragement, or even a common plan to commit an illegal act. Inadvertently or not, these doctrines reward brokers’ willful blindness when a person has dangerous designs with brokered data.

20 See Kadri, Platforms as Blackacres, supra Footnote note 12, at 1234–40. There’s no doubt that First Amendment arguments advanced by brokers could chill or weaken regulatory efforts in this space, in part because companies can plausibly argue that doctrine developed in different media environments protects their use of information from public records. See Footnote id. (delving into precedent that limits the government’s ability to restrict data flows once information enters the public sphere); cf. Cohen, supra Footnote note 14 (exploring how technology companies have been shielded from legal accountability). This chapter dodges many of these First Amendment questions, leaving them for fuller treatment in the future.

21 See Thomas E. Kadri, Tort Law: Cases & Critique 77–78 (2d ed. 2022) (discussing how this so-called “Streisand Effect” can also be “a legal phenomenon” because “suing can garner greater attention, thereby worsening the privacy invasion sought to be remedied by the lawsuit”).

22 See Cal. Civ. Code §§ 1798.99.80 et seq.; 9 Vt. Stat. Ann. § 2430; S. 2290, 117th Cong., 1st Sess. (2021), https://perma.cc/C4Z4-QSQF. This approach has also been endorsed by the Federal Trade Commission and forty state attorneys general. See Fed. Trade Comm’n, Data Brokers: A Call for Transparency and Accountability (May 2014); Nat’l Ass’n of Attorneys General, Federal Trade Commission Hearings on Competition and Consumer: Protection in the 21st Century: Public Comments of 43 State Attorneys General (June 11, 2019), https://perma.cc/U7LD-TF6A. See generally Danielle Keats Citron, The Privacy Policymaking of State Attorneys General, 92 Notre Dame L. Rev. 747, 747 (2017) (exploring how state attorneys general have been “laboratories of privacy enforcement” and “expanded the frontiers of privacy law”).

23 Cal. Civ. Code § 1798.115.

24 See Pozen, supra Footnote note 9, at 135–41 (exploring how soft-touch and targeted transparency mandates in consumer-protection law have “evolved into a stock substitute for more robust and direct regulation”); cf. Footnote id. at 134 (arguing that reliance on transparency mandates in campaign-finance reform helped to thwart restrictions on election spending).

25 See, e.g., Kadri, Digital Gatekeepers, supra Footnote note 12, at 957–69 (discussing how cyber-trespass laws empower companies to act as “gatekeepers” on their websites); Remsburg v. Docusearch, Inc., 816 A.2d 1001 (N.H. 2003) (endorsing privacy and negligence tort claims if a broker obtains information through deceptive means); 18 U.S.C. § 1039 (making it a federal crime to fraudulently obtain “confidential phone records information”); 18 U.S.C. § 2511 (making it a federal crime under the Wiretap Act to “intentionally intercept[] … any wire, oral, or electronic communication”); 18 U.S.C. § 1030(a)(2)(C) (making it a federal crime under the Computer Fraud and Abuse Act to “intentionally access[] a computer without authorization or exceed[] authorized access, and thereby obtain[] … information from any protected computer”). Whether brokers are liable for scraping and other types of cyber-trespass is a complex matter (and mixture) of criminal, tort, and contract law, but suffice to say that brokers can still collect ample data and steer well clear of these restrictions. See, e.g., Kadri, Digital Gatekeepers, supra Footnote note 12 (discussing liability for scraping under the Computer Fraud and Abuse Act and other cyber-trespass laws); Kadri, Platforms as Blackacres, supra Footnote note 12 (discussing the First Amendment implications of laws regulating scraping).

26 See generally Julie E. Cohen, The Biopolitical Public Domain: The Legal Construction of the Surveillance Economy, 31 Phil. & Tech. 213 (2018) (exploring how law shapes and enables extractive practices of appropriating personal information).

27 See, e.g., 18 U.S.C. § 2511(2)(g)(i) (providing that “[i]t shall not be unlawful” under the Stored Communications Act, 18 U.S.C. § 2701, to “access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public”); hiQ Labs, Inc. v. LinkedIn Corp., 31 F.4th 1180, 1201 (9th Cir. 2022) (holding that the Computer Fraud and Abuse Act, § 1030(a)(2)(C), likely does not apply “when a computer network generally permits public access to its data”); Cox Broad. Corp. v. Cohn, 420 U.S. 469, 471, 473–74, 495–96 (1975) (outlining First Amendment limits on privacy tort claims based on accessing information already in the public domain); Kadri, Platforms as Blackacres, supra Footnote note 12, at 1234–40 (analyzing constitutional doctrine in this area).

28 See Cal. Civ. Code § 1798.140; see also Meg Leta Jones & Margot E. Kaminski, An American’s Guide to the GDPR, 98 Denv. L. Rev. 93, 106, 116–17 (2020) (discussing how brokers are regulated by the European Union’s General Data Protection Regulation).

29 Though this chapter cannot flesh out this point, it’s high time to reconsider the state’s complicity in supplying brokered data. See generally Daniel J. Solove, Access and Aggregation: Privacy, Public Records, and the Constitution, 86 Minn. L. Rev. 1137 (2002) (urging a rethinking of the regulation of public records in light of new technologies in the Information Age); Danielle Keats Citron, A New Compact for Sexual Privacy, 62 Wm. & Mary L. Rev. 1763, 1818–24 (2021) (advocating for limits on collecting intimate information to protect sexual privacy); Woodrow Hartzog, The Public Information Fallacy, 99 B.U. L. Rev. 459, 459 (2019) (critiquing how “labeling information as public often functions as a permission slip for surveillance and personal data practices”); Kirsten Martin & Helen Nissenbaum, Privacy Interests in Public Records: An Empirical Investigation, 31 Harv. J.L. & Tech. 111 (2017) (investigating people’s privacy interests in public records through an empirical study). The flip side of this symbiotic relationship is also true: we should also reconsider brokers’ roles in furnishing the state with data. See, e.g., Cmty. Just. Exch., From Data Criminalization to Prison Abolition (2022), https://perma.cc/DQV2-9SS3 (critiquing “data criminalization”: “the creation, archiving, theft, resale and analysis of datasets that mark certain people as threats and risks, based on data culled about them from state and commercial sources”).

30 Address Confidentiality Program, N.Y. State, https://perma.cc/V6AK-3MWM (outlining how victims may shield their addresses in some state records by creating a substitute address); About Safe at Home, Cal. Sec’y State, https://perma.cc/4AVJ-TDK3 (detailing how victims may seek confidential name changes and voter registration); see also Davis Wright, Address Confidentiality Programs: Resource Guide (2022) (surveying all fifty states and noting that only Alaska, South Carolina, South Dakota, Utah, and Wyoming lack any form of address-confidentiality program for abuse victims).

31 See Neil M. Richards, Why Data Privacy Law Is (Mostly) Constitutional, 56 Wm. & Mary L. Rev. 1501 (2015) (arguing that most laws regulating the collection, use, and disclosure of personal data should survive First Amendment challenges). Though I cover collection and disclosure here, I omit discussion of use restrictions because, at least in the United States, they have offered less promise to restrain brokered abuse. One law frequently touted as relevant to brokers is the Fair Credit Reporting Act (FCRA), 15 U.S.C. § 1681 k, which prohibits employers from using certain data in hiring decisions. Brokers enter the picture because FCRA arguably restricts them from knowingly providing employee-screening data. Even if this contentious interpretation were accepted, such a narrow and consumer-focused law does little to address interpersonal abuse.

32 See Robert C. Post, The Social Foundations of Privacy: Community and Self in the Common Law Tort, 77 Calif. L. Rev. 957, 978–1008 (1989) (dissecting the privacy tort of public disclosure of private facts).

33 See Own Your Own Data Act, S. 806, 116th Cong., 1st Sess. (2019) (providing that “[e]ach individual owns and has an exclusive property right in the data that an individual generates on the internet”); Ignacio Cofone, Beyond Data Ownership, 43 Cardozo L. Rev. 501 (2021) (exposing flaws in the property approach to personal information); Health and Location Data Protection Act, S. 4408, 117th Cong., 2d Sess. (2022) (prohibiting brokers from sharing location and health data unless such data constitutes “newsworthy information of legitimate public concern”).

34 Cal. Civ. Code § 1798.120.

35 Cal. Gov. Code § 6208.1; Program Services, Cal. Sec’y State, https://perma.cc/DER2-3Q86.

36 For background on privacy-self management, see Daniel J. Solove, Introduction: Privacy Self-Management and the Consent Dilemma, 126 Harv. L. Rev. 1880, 1882–83 (2013), and Neil Richards & Woodrow Hartzog, Taking Trust Seriously in Privacy Law, 19 Stan. Tech. L. Rev. 431, 444 (2016). Technological tools like the Global Privacy Control are seeking to streamline this process by enabling people to automatically assert their obscurity rights through settings on their browsers. Though this initiative still creates self-management burdens that will likely dampen its efficacy, it could be a step in the right direction. See Glob. Priv. Control, https://perma.cc/QE8C-4972.

37 Woodrow Hartzog & Evan Selinger, Surveillance as Loss of Obscurity, 72 Wash. & Lee L. Rev. 1343, 1355 (2015).

38 Woodrow Hartzog & Evan Selinger, Obscurity: A Better Way to Think About Your Data than “Privacy”, Atlantic (Jan. 17, 2013), https://perma.cc/38TV-8KTL.

39 See Ignacio N. Cofone & Adriana Z. Robertson, Privacy Harms, 69 Hastings L.J. 1039, 1042, 1049–55 (2018) (connecting but distinguishing the ideas of “privacy loss” and “privacy harm”); Ignacio Cofone, Privacy Standing, 2022 U. Ill. L. Rev. 1367 (further developing these concepts in the context of standing to bring privacy claims); see also Ryan Calo, The Boundaries of Privacy Harm, 86 Ind. L.J. 1131, 1131, 1143 (2011) (arguing that subjective and objective privacy harms represent “the anticipation and consequence of a loss of control over personal information”); Danielle Keats Citron & Daniel J. Solove, Privacy Harms, 102 B.U. L. Rev. 793, 830–61 (2022) (offering a typology of privacy harms to show privacy’s instrumental value in seven different contexts).

40 See Cofone, supra Footnote note 39, at 1398, 1403–05.

41 Cf. Daniel J. Solove & Danielle Keats Citron, Risk and Anxiety: A Theory of Data Breach Harms, 96 Tex. L. Rev. 737 (2018) (arguing that risk and anxiety can be legally cognizable harms caused by data breaches).

42 See Amanda Levendowski, Resisting Face Surveillance with Copyright Law, 100 N.C. L. Rev. 1015, 1018, 1022–35 (2022) (identifying injustices of “face surveillance” – a term that “embraces multiple biometric systems that use algorithms to analyze faces, such as face detection, face classification, and … face recognition”); Neil Richards & Woodrow Hartzog, The Pathologies of Digital Consent, 96 Wash. U. L. Rev. 1461, 1485 (2019) (discussing the threats posed by facial-recognition technology); Woodrow Hartzog & Evan Selinger, Why You Can No Longer Get Lost in the Crowd, N.Y. Times (Apr. 17, 2019), https://perma.cc/C2ST-9UUJ (exploring the importance of obscurity and observing that “[t]hreats to our obscurity are growing” due to advances in technology).

43 Scott Skinner-Thompson, Agonistic Privacy & Equitable Democracy, 131 Yale L.J. F. 454, 456 (2021).

44 Footnote Id. at 454–56, 459–61.

45 See Mary Anne Franks & Ari Ezra Waldman, Sex, Lies, and Videotape: Deep Fakes and Free Speech Delusions, 78 Md. L. Rev. 892, 896 (2019); Ari Ezra Waldman, Law, Privacy, and Online Dating: “Revenge Porn” in Gay Online Communities, 44 Law & Soc. Inquiry 987, 1009 (2019); Thomas E. Kadri, Drawing Trump Naked: Curbing the Right of Publicity to Protect Public Discourse, 78 Md. L. Rev. 899, 950–51 (2019).

46 Cf. Alicia G. Solow-Niederman, Algorithmic Grey Holes, 5 J.L. & Innov. 116 (2023) (exploring the idea of how “grey holes” in law can include procedures that create the appearance but not the reality of constraints on government action).

47 See Janet X. Chen, Allison McDonald, Yixin Zou, Emily Tseng, Kevin A Roundy, Acar Tamersoy, Florian Schaub, Thomas Ristenpart & Nicola Dell, Trauma-Informed Computing: Towards Safer Technology Experiences for All, CHI’22: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems 1 (2022).

48 Footnote Id. at 4–6.

49 See Kadri, supra Footnote note 6, at 1095–96 (discussing how the mere existence of technologies that enable stalking can instill paranoia in abuse victims); Mara Hvistendahl, I Tried to Get My Name Off People-Search Sites. It Was Nearly Impossible, Consumer Reps. (Aug. 20, 2020), https://perma.cc/T52R-LG34.

50 See Kadri, supra Footnote note 6, at 1078–80, 1118–19 (arguing that empathy should be a guiding regulatory principle in this area).

51 Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart & Nicola Dell, “A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology, Ass’n Computing Mach. (2018).

52 See, e.g., Danielle Citron, Hate Crimes in Cyberspace (2014); Ari Ezra Waldman, Safe Social Spaces, 96 Wash. U. L. Rev. 1535 (2019); Mary Anne Franks, Unwilling Avatars: Idealism and Discrimination in Cyberspace, 20 Colum. J. Gender & L. 224 (2011).

53 Eric Blaauw, Frans W. Winkel, Ella Arensman, Lorraine Sheridan & Adriënne Freeve, The Toll of Stalking: The Relationship between Features of Stalking and Psychopathology of Victims, 17 J. Interpersonal Violence 50, 57–58 (2002); see also Ari Ezra Waldman, Amplifying Abuse: The Fusion of Cyberharassment and Discrimination, 95 B.U. L. Rev. Annex 83, 83 (2015) (discussing how cyberharassment victims commonly experience anxiety, panic attacks, fear, post-traumatic stress disorder, anorexia, bulimia, and clinical depression).

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Defamation and Privacy
  • Edited by Kyle Langvardt, University of Nebraska, Lincoln, Justin (Gus) Hurwitz, University of Pennsylvania Law School
  • Book: Media and Society After Technological Disruption
  • Online publication: 16 May 2024
  • Chapter DOI: https://doi.org/10.1017/9781009174411.008
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Defamation and Privacy
  • Edited by Kyle Langvardt, University of Nebraska, Lincoln, Justin (Gus) Hurwitz, University of Pennsylvania Law School
  • Book: Media and Society After Technological Disruption
  • Online publication: 16 May 2024
  • Chapter DOI: https://doi.org/10.1017/9781009174411.008
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Defamation and Privacy
  • Edited by Kyle Langvardt, University of Nebraska, Lincoln, Justin (Gus) Hurwitz, University of Pennsylvania Law School
  • Book: Media and Society After Technological Disruption
  • Online publication: 16 May 2024
  • Chapter DOI: https://doi.org/10.1017/9781009174411.008
Available formats
×