The digital revolution of this generation has sparked significant opportunity for

Similar documents
The Offensive Internet: Speech, Privacy, and Reputation. The Offensive Internet: Speech, Privacy, and Reputation 1 is a compilation of essays

COMMUNITY PROTOCOL FOR DOMESTIC VIOLENCE CASES

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

HATE CRIMES AND THE VICTIM

Domestic Violence. La violencia doméstica KNOW YOUR RIGHTS

5. The Model Strategies and Practical Measures are aimed at providing de jure and de

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS

In an age where so many businesses and systems are reliant on computer systems,

Understanding Nebraska's Protection Orders

Exposure Draft of Criminal Code Amendment (Private Sexual Material) Bill 2015

LLB (Hons) Law with Criminology Module Information

INTIMATE PARTNER VIOLENCE

What I would like to speak about is the co-ordinated approach to violence identification

How To Get Help In Alaska

Running head: SEXUAL HARASSMENT AT OAKLAND UNIVERSITY 1

UNIVERSITY OF CALIFORNIA, MERCED POLICY REGARDING WORKPLACE VIOLENCE, BIAS INCIDENTS, HATE CRIMES AND DISRUPTIVE BEHAVIORS POLICY NUMBER: 757

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.

CRIMINAL LAW & YOUR RIGHTS MARCH 2008

Hearing on Domestic Minor Sex Trafficking

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Vortrag Dubrovnik SS 2013

Criminal Justice Courses

The Legal Side of Blogging: How Not to get Sued, Fired, Arrested or Killed

Georgia Performance Standards. Health Education

Alaska Natives Combating Substance Abuse and Related Violence Through Self-Healing: A Report for the People

What Rights Do I Have As An LGBT Victim of Domestic Violence?

BOBCAT COMPUTING POLICY

REPORTING AN OFFENCE TO THE POLICE: A GUIDE TO CRIMINAL INVESTIGATIONS

Workplace Violence Prevention Policy

ID: International Dialogue, A Multidisciplinary Journal of World Affairs

Ending Sex and Race Discrimination in the Workplace:

EUROPEAN UNION COMMON POSITION ON UNGASS 2016

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

Supervised Visitation

P. O. Box 1520 Columbia, South Carolina Effective date of implementation: January 1, Domestic Violence

Bill C-20 An act to amend the Criminal Code (Protection of children and other vulnerable persons) and the Canada Evidence Act

Copyfights: The Future of Intellectual Property in the Information Age

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

Increasing the Magistrates Court fine limit Equality Impact Assessment

How To Report Abuse In Martha Maryland

Gender Based Violence

Best Practices in Training and Compliance Around Title IX, VAWA and the Clery Act

I N F O R M A T I O N B U L L E T I N. Considerations for Sexual Assault Coordination

Evidence Checklist FOR IMMIGRANT VICTIMS APPLYING FOR THE CRIME VICTIM VISA (U VISA) 1

Preservation of longstanding, roles and missions of civilian and intelligence agencies

Animals in Protection Orders 9/2007

Stalking 101: Understanding the lethality of stalking in today s world

UNDERSTANDING DOMESTIC VIOLENCE IN CAMBODIA

Violence against women in Egypt 1

TRANSPARENT PRIVACY IN CORPORATE FILINGS

Concluding observations of the Human Rights Committee. Consideration of reports submitted by States Parties under article 40 of the Covenant

FROM CHARGE TO TRIAL: A GUIDE TO CRIMINAL PROCEEDINGS

ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013

Town of Cobleskill Workplace Violence Policy & Procedures

Convention on the Elimination of All Forms of Discrimination against Women

Virginia Commonwealth University Police Department

FAST FACTS. 100 TO 140 MILLION girls and women in the world have experienced female genital mutilation/ cutting.

THE STOP.THINK.CONNECT. CAMPAIGN: GEORGE MASON UNIVERSITY CYBERSECURITY AWARENESS EVENT

Acceptance Speech for Wellstone Award Freedom Network 2010 Conference. this award, and thank you Freedom Network for bestowing this

STALKING REALITIES AND RESPONSES

PART THREE: TEMPLATE POLICY ON GENDER-BASED VIOLENCE AND THE WORKPLACE

I would like to thank the Honourable Chief Justice Ma for. his insightful remarks on the important role of lawyers in

An Advocates Guide to Sexual Assault on College Campuses

Good practices and tools for use in case management, including by front-line law enforcement authorities responding to trafficking in persons

Breaking the silence united against domestic violence

BULLYING/ANTI-HARASSMENT

WEBSITE & SOCIAL MEDIA PRIVACY POLICY

Are you living in fear? Is someone stalking you? STALKING is a crime in Minnesota! From the Office of Lori Swanson MINNESOTA ATTORNEY GENERAL

What is DOMESTIC VIOLENCE?

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

FEDE DOMESTIC VIOLENCE STATUTES AND ELEMENTS FOR FEDERAL PROSECUTION

PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS

CITIZENS AND BUSINESSES OF ST. CHARLES COUNTY:

Optional Protocol on the sale of children, child prostitution and child pornography

PREAMBLE TO GUIDELINES FOR MEDIATION IN CASES INVOLVING ISSUES OF DOMESTIC VIOLENCE

Declaration on the Elimination of Violence against Women

Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES

County Court Restraining Orders

CHAPTER 13: International Law, Norms, and Human Rights

CRIMINAL JUSTICE.

How To Prevent Sexual Harassment

DOMESTIC VIOLENCE COURTS/DOCKETS AND FUNDING. February 6, 2015

THE ENVIRONMENTAL CRIMINAL JUSTICE IN CHINA

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Chapter 1: Ensuring Community Safety and Criminal Investigations

Cyberbullying, Sexting & Predators Oh My!

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

DISRUPTIVE OWNERS AND THE HOA; DEALING WITH GOVERNMENT; AND DEALING WITH THE MEDIA

How To Deal With Social Media At Larks Hill J & I School

Guide For Advocates Working With Immigrant Victims of Domestic Violence

OPPORTUNITIES AND OBSTACLES IN U VISAS

Domestic Violence: Can the Legal System Help Protect Me?

Juvenile Justice. CJ 3650 Professor James J. Drylie Chapter 2

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Professor s Contact Information. General Course Information. Domestic Violence Law Seminar LAW 837E LS1 Tamara B. Abrams Term Spring 2014 Meetings

Ending Violence Against Women By Ted Bunch

ONLINE PREDATORS & PREDATORS

Federal Bureau of Investigation s Integrity and Compliance Program

This Constitution establishes the principles and values of the NHS in England.

Transcription:

Real Space and Real People: Hate Crimes in Cyberspace Review of: Hate Crimes in Cyberspace Danielle Keats Citron Harvard University Press: Cambridge, MA and London, England, 2014 ISBN 978-0-674-36829-3 (alk. paper) Price: $29.95, pp. 343 Reviewed By: Jessica Gray Journal of High Technology Law Suffolk University Law School Cyber harassment advocates must disprove the notion that cyberspace is exempt from real-space norms, much as activists in the past had to convince the public that workplaces and homes had the same rules as the rest of society. (p. 102) The digital revolution of this generation has sparked significant opportunity for individuals and groups, but has also generated concern regarding some of the content that exists on the Internet today. During the summer of 2014, the ALS Ice Bucket Challenge, a socialmedia powered video challenge meant to bring awareness to ALS, dominated news feeds and essentially formed a community that people were eager to join. 1 On August 29, 2014, the ALS Association announced that donations related to the ALS Ice Bucket Challenge had reached over $100 million, a mammoth increase from the $2.8 million that was raised in the same period in 2013. 2 This success highlighting the beneficial aspects of the Internet is contrasted by the recent unauthorized release of numerous female celebrities nude photos that subsequently triggered an intense debate about privacy. 3 The Internet s positive and negative influence is exceedingly relevant in today s society, but the law has yet to catch up with the constantly evolving digital age. The world of cyberspace has mystified the legal regime when it comes to dealing with 1 Dan Diamond, The ALS Ice Bucket Challenge Has Raised $100 Million And Counting, FORBES (August 29, 2014), available at http://www.forbes.com/sites/dandiamond/2014/08/29/the-als-ice-bucket-challenge-has-raised- 100m-but-its-finally-cooling-off/. 2 See id. 3 Alan Duke, 5 Things to know about the celebrity nude photo hacking scandal, CNN (September 4, 2014), available at http://www.cnn.com/2014/09/02/showbiz/hacked-nude-photos-five-things/. 1

cyber harassment and cyber stalking, but Danielle Keats Citron s Hate Crimes in Cyberspace takes the issue head on and provides reasonable reforms that would help to prosecute these types of crimes. 4 Citron acknowledges the benefits of the Internet, but her main focus is centered on a discussion regarding the effects of cyber harassment on victims and how the law can govern behavior on the Internet and provide remedies for those who are targeted by harmful online conduct. 5 Danielle Keats Citron is the Louis K. Macht Research Professor of Law at the University of Maryland Francis King Carey School of Law. 6 Citron has written for several law reviews, including California Law Review, Michigan Law Review, and Boston University Law Review. 7 Her opinion pieces have been featured in the New York Times and CNN. 8 Along with her accomplishments as a professor and writer, Citron has also established herself as an adviser and board director for various projects, including the American Law Institute s Restatement Third, Information Privacy Principles Project and the Cyber Civil Rights Initiative. 9 The book is divided into two parts with a total of nine chapters. Part one includes three chapters, which provide the context surrounding Citron s later arguments about reforming laws to encompass cyber harassment and cyber stalking. In the first chapter, Citron brings the issues to life by introducing the experiences of real-life people whose lives were drastically affected by cyber harassment, cyber stalking, and revenge porn. 10 Posts containing public information, sexual threats, and blatant lies destroyed reputations of innocent victims and blemished their 4 Danielle Keats Citron, HATE CRIMES IN CYBERSPACE (Harvard University Press 2014). 5 See id. 6 DANIELLE CITRON, http://www.law.umaryland.edu/faculty/profiles/faculty.html?facultynum=028. 7 See id. 8 See id. 9 See id. 10 See Citron, supra note 4, at 35. 2

futures in the job market. 11 Citron discusses how these individuals received no help from law enforcement, even though the hateful, threatening, and frightening comments continued, whether the victims stayed silent or sought to fight back. 12 Chapter two explores the concept of anonymity on the Internet and how it may actually allow people to act more destructively based on the assumption that their behavior is not traceable. 13 Chapter three ties in the negative social attitudes felt towards victims of cyber harassment. 14 There is a tendency to blame the victims for their predicaments and thus cyber harassment is not seen as a high priority in the eyes of law enforcement. 15 Citron makes a sharp analogy that society s willingness to blame the victim for cyber harassment is the same attitudes that were expressed towards sexually harassed employees and battered wives. 16 Part two delves into what can be done to remedy the current outlook on cyber harassment through the law, as well as the public. In chapter four, Citron provides the historical background of domestic violence and sexual harassment and compares both issues to the way cyber harassment is viewed within the judicial system and society. 17 She explains that the first step in bringing more awareness to cyber harassment is to change how the public views online abuse. 18 However, Citron concedes that sometimes even with public support of the victims, harassers still overpower and continue the abuse. 19 This concern fluidly leads into chapter five, which explores 11 See Citron, supra note 4, at 35. 12 See Citron, supra note 4, at 46-47. 13 See Citron, supra note 4, at 58-59. 14 See Citron, supra note 4, at 74-75. 15 See Citron, supra note 4, at 77-78. 16 See Citron, supra note 4, at 80-83. 17 See Citron, supra note 4, at 100. 18 See Citron, supra note 4, at 100. 19 See Citron, supra note 4, at 113-18. 3

the law s position on cyber harassment and the victims opportunities for justice. 20 Although victims can sue their abusers under tort and copyright law, there is less opportunity and less success dealing with the use of civil rights law to take on harassers. 21 Citron also expresses that the possibility of criminal sanctions could prove to be a deterrent to potential offenders considering whether or not to participate in cyber harassment. 22 Chapter six furthers Citron s analysis concerning how the law can be updated so that cyber harassment victims have legal remedies available to them and so that perpetrators are more accountable for their behavior. 23 She suggests that criminally, cyber harassment and stalking laws should be reformed to reach the totality of the abuse and revenge porn should be illegal. 24 In terms of civil rights, states should punish online harassers who interfere with one s right to employment, education, and self-expression due to group bias based on the victim s gender or sexual orientation. 25 Citron discusses the challenges that accompany reforms for cyber harassment, but still provides proposals that Congress can use when it decides to embrace the need to update the law surrounding this subject. 26 Chapter seven deals with legal reform that will make site operators and employees more accountable for their actions on the Internet. 27 Citron provides a history of law that deals with protection or liability of site operators with regards to defamatory content on their websites. 28 She then provides proposals meant to find the balance between the needs of the victims and the 20 See Citron, supra note 4, at 120-23. 21 See Citron, supra note 4, at 121-23. 22 See Citron, supra note 4, at 129. 23 See Citron, supra note 4, at 142. 24 See Citron, supra note 4, at 142. 25 See Citron, supra note 4, at 155. 26 See Citron, supra note 4, at 157. 27 See Citron, supra note 4, at 167. 28 See Citron, supra note 4, at 168-75. 4

freedom of the Internet. 29 In chapter eight, Citron recognizes First Amendment challenges to regulating online speech. 30 She distinguishes threating, hateful speech from that which enhances self-government and cultural interaction. 31 Finally, in chapter nine, Citron discusses how those in society, including schools and parents, can help improve the cyber world. 32 She urges the reader of the importance of becoming a responsible digital citizen. 33 In Hate Crimes in Cyberspace, Danielle Keats Citron attempts to bring cyber harassment and cyber stalking to the forefront of the legal agenda by providing reforms that will allow the judicial system to help victims seek relief for their experiences and potentially deter perpetrators from engaging in cyber harassment. Citron immediately grabs the reader s attention by providing the true accounts of women who were victims of cyber harassment, cyber stalking, and revenge porn. Rather than diving into legalese that would surely confuse the average reader, Citron makes the problem of cyber harassment relatable, thus creating a book that could be read by anyone. The format of the book creates logical transitions for each chapter building off the previous. By the time the reader gets to the chapters that deal with Citron s proposals for reforms, he or she has already read a thorough a systematic discussion of cyber harassment s societal impact and history. When Citron expresses her own ideas of how to strengthen this area of law, she not only proposes well-developed reforms, but also intelligently notes the weaknesses in her arguments. Conceding about certain aspects of her amendments demonstrates that Citron does not believe her proposals would be the only successful reforms. She simply provides 29 See Citron, supra note 4, at 175-85. 30 See Citron, supra note 4, at 190-91. 31 See Citron, supra note 4, at 194-95. 32 See Citron, supra note 4, at 226-27. 33 See Citron, supra note 4, at 249-50. 5

realistic changes that are available for the legal field to embrace and use to improve the judicial system and behavior on the Internet. Overall, Hate Crimes in Cyberspace is an eye-opening book that alerts the reader of the troublesome problems of cyber harassment, cyber stalking, and revenge porn. Citron s proposals allow the reader to understand that cyber issues can be addressed and improved with the help of law enforcement, the judicial system, and the public. Citron s work is not only enjoyable to read, but is also very informative and persuasive. Hate Crimes in Cyberspace is a fundamental read for anyone who has a computer and uses the Internet. Cyber harassment, cyber stalking, and revenge porn may have been on the backburner, but Citron opens the door for attorneys, judges, and legislature to understand the harsh realities of the cyber world and create reforms that will permit victims the opportunity to receive the justice they deserve. 6