In the United States, internet censorship is the suppression of information published or viewed on the Internet in the United States. The First Amendment of the United States Constitution protects freedom of speech and expression against federal, state, and local government censorship.

In 2014, the United States was added to Reporters Without Borders (RWB)'s list of "Enemies of the Internet", a group of countries with the highest level of Internet censorship and surveillance. RWB stated that the U.S. has "undermined confidence in the Internet and its own standards of security" and that "U.S. surveillance practices and decryption activities are a direct threat to investigative journalists, especially those who work with sensitive sources for whom confidentiality is paramount and who are already under pressure."[1]

Overview

The strong protections for freedom of speech and expression against federal, state, and local government censorship are rooted in the First Amendment of the United States Constitution. These protections extend to the Internet, and as a result, very little government-mandated technical filtering occurs in the US. Nevertheless, the Internet in the United States is highly regulated, supported by a complex set of legally binding and privately mediated mechanisms.[2]

After more than two decades of ongoing contentious debate over content regulation, the country is still very far from reaching political consensus on the acceptable limits of free speech and the best means of protecting minors and policing illegal activity on the Internet. Gambling, cyber security, and the dangers to children who frequent social networking sites are important ongoing debates. Significant public resistance to proposed content restriction policies has prevented the more extreme measures used in some other countries from taking hold in the U.S.[2]

Public dialogue, legislative debate, and judicial review have produced filtering strategies in the United States that are different from those found in most of the rest of the world. Many government-mandated attempts to regulate content have been barred on First Amendment grounds, often after lengthy legal battles.[3] However, the government has been able to exert pressure indirectly where it cannot directly censor. With the exception of child pornography, content restrictions tend to rely more on the removal of content than blocking; most often, these controls rely on the involvement of private parties, backed by state encouragement or the threat of legal action.[4] In contrast to much of the rest of the world, where ISPs are subject to state mandates, most content regulation in the United States occurs at the private or voluntary level.[2]

The first wave of regulatory actions in the 1990s in the United States came about in response to the profusion of sexually explicit material on the Internet within easy reach of minors. Since that time, several legislative attempts at creating a mandatory system of content controls in the United States have failed to produce a comprehensive solution for those pushing for tighter controls. At the same time, the legislative attempts to control the distribution of socially objectionable material on the Internet in the United States have given rise to a robust system that limits liability over content for Internet intermediaries such as Internet service providers (ISPs) and content hosting companies.[2]

Proponents of protecting intellectual property online in the United States have been much more successful, producing a system to remove infringing materials that many feel errs on the side of inhibiting legally protected speech.[2][5] The U.S. practices forceful seizures of domains and computers, at times without notification, causing affected websites to be unable to continue operating.[6][7][8][9] Some high-profile cases are Napster,[10][11][12] WikiLeaks,[13][14] The Pirate Bay,[15] and MegaUpload.[16]

National security concerns have spurred efforts to expand surveillance of digital communications and fueled proposals for making Internet communication more traceable.[2]

Federal laws

With a few exceptions, the free speech provisions of the First Amendment bar federal, state, and local governments from directly censoring the Internet. The primary exception has to do with obscenity, including child pornography, which does not enjoy First Amendment protection.[17]

Computer Fraud and Abuse Act (CFAA)

The Computer Fraud and Abuse Act (CFAA) was enacted in 1986 as an amendment to an existing computer fraud law (18 U.S.C. § 1030), which was part of the Comprehensive Crime Control Act of 1984. The CFAA prohibits accessing a computer without authorization, or in excess of authorization.[18] Since 1986, the Act has been amended a number of times—in 1989, 1994, 1996, in 2001 by the USA PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act. The CFAA is both a criminal law and a statute that creates a private right of action, allowing private individuals and companies to sue to recover damages caused by violations of this law.

Provisions of the CFAA effectively make it a federal crime to violate the terms of service of Internet sites, allowing companies to forbid legitimate activities such as research, or limit or remove protections found elsewhere in law. Terms of service can be changed at any time without notifying users. Tim Wu called the CFAA "the worst law in technology".[19]

Aggressive prosecution under the Computer Fraud and Abuse Act (CFAA) has fueled growing criticism of the law's scope and application.[20] In 2013 a bipartisan group of lawmakers introduced legislation (H.R. 2454, S. 1196[21]) that would prevent the government from using CFAA to prosecute terms of service violations and stop prosecutors from bringing multiple redundant charges for a single crime.[22] The bill was reintroduced in 2015 (H.R. 2454, S. 1030), but did not garner enough support to move forward.[23]

Communications Decency Act (CDA)

In 1996, the United States enacted the Communications Decency Act (CDA), which attempted to regulate both indecency (when available to children) and obscenity in cyberspace.[24] In 1997, in the case of Reno v. ACLU, the United States Supreme Court found the anti-indecency provisions of the Act unconstitutional.[25] Writing for the Court, Justice John Paul Stevens held that "the CDA places an unacceptably heavy burden on protected speech".[26]

Section 230[27] is a separate portion of the CDA that remains in effect. Section 230 says that operators of Internet services are not legally liable for the words of third parties who use their services and also protects ISPs from liability for good faith voluntary actions taken to restrict access to certain offensive materials[28] or giving others the technical means to restrict access to that material.

Child Online Protection Act (COPA)

In 1998, the United States enacted the Child Online Protection Act[29] (COPA) to restrict access by minors to any material defined as harmful to such minors on the Internet. The law was found to be unconstitutional because it would hinder protected speech among adults. It never took effect, as three separate rounds of litigation led to a permanent injunction against the law in 2009. Had the law passed, it would have effectively made it an illegal act to post anything commercial based to the internet that is knowingly harmful to children without some sort of vetting program to confirm the users age.[30][31][32][33]

Signed into law in 1998, the Digital Millennium Copyright Act (DMCA, 17 U.S.C. § 1201) criminalizes the production and dissemination of technology that could be used to circumvent copyright protection mechanisms[5] and makes it easier to act against alleged copyright infringement on the Internet.[34] The Online Copyright Infringement Liability Limitation Act (OCILLA) is included as Title II of the DMCA[35] and limits the liability of the on-line service providers for copyright infringement by their users.[36]

Children's Online Privacy Protection Act (COPPA)

The Children's Online Privacy Protection Act (COPPA) went into effect on 21 April 2000.[37] It applies to the online collection of personal information by persons or entities under U.S. jurisdiction from children under 13 years of age and details what a website operator must include in a privacy policy, when and how to seek verifiable consent from a parent or guardian, and what responsibilities an operator has to protect children's privacy and safety online including restrictions on the marketing to those under 13.[38] While children under 13 can legally give out personal information with their parents' permission, many websites disallow underage children from using their services altogether, due to the cost and amount of paperwork necessary for compliance.

Children's Internet Protection Act (CIPA)

In 2000 the Children's Internet Protection Act (CIPA)[39] was signed into law.

CIPA requires K-12 schools and libraries receiving federal Universal Service Fund (E-rate) discounts or LSTA grants for Internet access or internal connections to:[40]

  • adopt and implement an Internet safety policy addressing: (a) access by minors to inappropriate matter on the Internet; (b) the safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications; (c) unauthorized access, including so-called "hacking," and other unlawful activities by minors online; (d) unauthorized disclosure, use, and dissemination of personal information regarding minors; and (e) measures restricting minors' access to materials harmful to them;
  • install internet filters or blocking software that prevents access to pictures that are: (a) obscene, (b) child pornography, or (c) harmful to minors (for computers that are accessed by minors);
  • to allow the filtering or blocking to be disabled upon the request of an adult; and
  • adopt and enforce a policy to monitor the online activities of minors.

CIPA does not:[40]

  • require the tracking of Internet use by minors or adults; or
  • affect E-rate funding for schools and libraries receiving discounts for telecommunications services, such as telephone service, but not for Internet access or internal connections.
  • require an internet filter that prevents access to video games, social media, etc.

Trading with the Enemy Act (TWEA)

In March 2008, the New York Times reported that a blocklist published by the Office of Foreign Assets Control (OFAC), an agency established under the Trading with the Enemy Act 1917 and other federal legislation, included a number of websites, so that US companies are prohibited from doing business with those websites and must freeze their assets. The blocklist has the effect that domain name registrars based in the US must block those websites. According to the New York Times, eNom, a private domain name registrar and Web hosting company operating in the US, disables domain names that appear on the blocklist.[41] It describes eNom's disabling of a European travel agent's web sites advertising travel to Cuba, which appeared on the list[42] published by OFAC. According to the report, the US government claimed that eNom was "legally required" to block the websites under US law, even though the websites were not hosted in the US, were not targeted at US persons, and were legal under foreign law.

Cybersecurity Information Sharing Act (CISA)

The Cybersecurity Information Sharing Act (CISA) is designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats and for other purposes".[43] The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The text of the bill was incorporated by amendment into a consolidated spending bill in the U.S. House on December 15, 2015,[44] which was signed into law by President Barack Obama on December 18, 2015.[45][46][47]

Opponents question the CISA's value, believing it will move responsibility from private business to the government, thereby increasing the vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the NSA and local police. Some felt that the act was more amenable to surveillance than actual security after many of the privacy protections from the original bill were removed.[48]

Stop Advertising Victims of Exploitation Act of 2015 (SAVE)

The Stop Advertising Victims of Exploitation Act of 2015 (SAVE) is part of the larger Justice for Victims of Trafficking Act of 2015 which became law in May 2015.[49] The SAVE Act makes it illegal to knowingly advertise content related to sex trafficking, including online advertising. The law establishes federal criminal liability for third-party content. There is a concern that this will lead companies to over-censor content rather than face criminal penalties, or to limit the practice of monitoring content altogether to avoid "knowledge" of illegal content.[50]

Americans with Disabilities Act (ADA)

In 2016, complainants from Gallaudet University brought a lawsuit against UC Berkeley for not adding closed captioning to the recorded lectures it made free to the public. In what many commentators called an unintended consequence of the Americans with Disabilities Act of 1990, the Department of Justice ruling resulted in Berkeley deleting 20,000 of the freely licensed videos instead of making them more accessible, which Berkeley had described as being cost prohibitive.[51]

Allow States and Victims to Fight Online Sex Trafficking Act - Stop Enabling Sex Traffickers Act (FOSTA-SESTA)

Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA) is a bill introduced in the U.S. House of Representatives by Ann Wagner in April 2017. Stop Enabling Sex Traffickers Act (SESTA) is a similar U.S. Senate bill introduced by Rob Portman in August 2017. The combined FOSTA-SESTA package passed the House on February 27, 2018, with a vote of 388-25[52] and the Senate on March 21, 2018, with a vote of 97–2.[53] The bill was signed into law by Donald Trump on April 11, 2018.[54][55]

The bill amended Section 230 of the Communications Decency Act to exclude the enforcement of federal and state sex trafficking laws from immunity and clarified the Stop Advertising Victims of Exploitation Act to define participation in a venture as knowingly assisting, facilitating, or supporting sex trafficking.[56]

The bills were criticized by pro-free speech and pro-Internet groups as a "disguised internet censorship bill" that weakens the section 230 safe harbors, places unnecessary burdens on internet companies and intermediaries that handle user-generated content or communications with service providers required to proactively take action against sex trafficking activities, and requiring a "team of lawyers" to evaluate all possible scenarios under state and federal law (which may be financially unfeasible for smaller companies).[57][58][59][60][61] Online sex workers argued that the bill would harm their safety, as the platforms they utilize for offering and discussing sexual services (as an alternative to street prostitution) had begun to reduce their services or shut down entirely due to the threat of liability under the bill.[62][63]

Proposed federal legislation that has not become law

Deleting Online Predators Act (DOPA)

The Deleting Online Predators Act of 2006 was introduced but did not become law.[64] Two similar bills were introduced in 2007, but neither became law.[65][66]

The proposed legislation would have required schools, some businesses, and libraries to block minors' access to social networking websites. The bill was controversial because, according to its critics, it would limit access to a wide range of websites, including many with harmless and educational material.

Protecting Cyberspace as a National Asset Act (PCNAA)

The Protecting Cyberspace as a National Asset Act was introduced in 2010 but did not become law.[67]

The proposed Act caused controversy for what critics perceived as its authorization for the U.S. president to apply a full block of the Internet in the U.S.[68]

A new bill, the Executive Cyberspace Coordination Act of 2011, was under consideration by the U.S. Congress in 2011.[69] The new bill addresses many of the same issues as, but takes quite a different approach from the Protecting Cyberspace as a National Asset Act.

Combating Online Infringement and Counterfeits Act (COICA)

The Combating Online Infringement and Counterfeits Act was introduced in September 2010 but did not become law.[70]

The proposed Act would have allowed the U.S. Attorney General to bring an in rem action against an infringing domain name in the United States District Court, and seek an order requesting injunctive relief. If granted, such an order would compel the registrar of the domain name in question to suspend the operation of, and may lock, the domain name.[70]

The U.S. Justice Department would maintain two publicly available lists of domain names.[70] The first list would contain domain names against which the Attorney General has obtained injunctions. The second list would contain domains alleged by the Justice Department to be infringing, but against which no action had been taken. Any service provider who willingly took steps to block access to sites on this second list would be immune from prosecution under the bill.

Stop Online Piracy Act (SOPA)

The Stop Online Piracy Act (SOPA), also known as H.R. 3261, is a bill that was introduced in the United States House of Representatives on October 26, 2011, by Representative Lamar Smith (R-TX) and a bipartisan group of 12 initial co-sponsors. The originally proposed bill would allow the U.S. Department of Justice, as well as copyright holders, to seek court orders against websites accused of enabling or facilitating copyright infringement. Depending on who requests the court orders, the actions could include barring online advertising networks and payment facilitators such as PayPal from doing business with the allegedly infringing website, barring search engines from linking to such sites, and requiring Internet service providers to block access to such sites. Many have argued that since ISP's would be required to block access to certain websites, this is censorship. On January 18, 2012, the English Wikipedia shut down for 24 hours beginning at 5:00 UTC (12:00 EST) to protest SOPA and PIPA. In the wake of this and many other online protests, Rep. Smith stated, "The House Judiciary Committee will postpone consideration of the legislation until there is wider agreement on a solution".[71]

Senator Ron Wyden, an Oregon Democrat and a key opponent of the bills, said lawmakers had collected more than 14 million names — more than 10 million of them voters — who contacted them to protest the once-obscure legislation.[71]

Protect Intellectual Property Act (PIPA)

The Protect Intellectual Property Act (Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act, or PIPA) was a proposed law with the stated goal of giving the US government and copyright holders additional tools to curb access to "rogue websites dedicated to infringing or counterfeit goods", especially those registered outside the U.S.[72] The bill was introduced on May 12, 2011, by Senator Patrick Leahy (D-VT)[73] and 11 bipartisan co-sponsors. PIPA is a re-write of the Combating Online Infringement and Counterfeits Act (COICA),[74] which failed to pass in 2010. In the wake of online protests held on January 18, 2012, Senate Majority Leader Harry Reid announced on Friday, January 20 that a vote on the bill would be postponed until issues raised about the bill were resolved. Reid urged Leahy, the chief sponsor of PIPA, to "continue engaging with all stakeholders to forge a balance between protecting Americans' intellectual property, and maintaining openness and innovation on the internet."[71][75]

Cyber Intelligence Sharing and Protection Act (CISPA)

The Cyber Intelligence Sharing and Protection Act (CISPA) was a proposed law introduced in November 2011, with the stated goal of giving the U.S. government additional options and resources to ensure the security of networks against attacks.[76] It was passed by the U.S. House of Representatives in April 2012 but was not passed by the U.S. Senate. The bill was reintroduced in the House in February 2013[77] and again in January 2015. While this bill never became law, a similar bill from the U.S. Senate, the Cybersecurity Information Sharing Act (CISA), was incorporated by amendment into a consolidated spending bill in the U.S. House on December 15, 2015,[44] and was signed into law by President Barack Obama on December 18, 2015.[78]

CISPA was supported by several trade groups containing more than eight hundred private companies, including the Business Software Alliance, CTIA – The Wireless Association, Information Technology Industry Council, Internet Security Alliance, National Cable & Telecommunications Association, National Defense Industrial Association, TechAmerica and United States Chamber of Commerce, in addition to individual major telecommunications and information technology companies like AT&T, Facebook, IBM, Intel, Oracle Corporation, Symantec, and Verizon.[79][80]

Reporters Without Borders expressed concern that in the name of the war on cybercrime, it would allow the government and private companies to deploy draconian measures to monitor, even censor, the Web.[81] Other organizations that oppose the bill include the Constitution Project, American Civil Liberties Union, Electronic Frontier Foundation, Center for Democracy and Technology, Fight for the Future, Free Press, Sunlight Foundation, and TechFreedom. Google did not take a public position on the bill but lobbied for it.[82]

RESTRICT Act/DATA Act

In 2023, the United States Government tried (currently in progress) to ban social media app TikTok. The DATA Act was introduced by Michael McCaul. If passed, the DATA Act would ban the selling of non-public personal data to third party buyers.[83] Senator Mark Warner introduced the RESTRICT Act. If passed this bill would allow the United States Secretary of State to review any attempt of a tech company to "sabotage" the United States. In this scenario, the Secretary and other relevant departments would review said tech company. If the review shows there are "security risks" then the government can restrict a company, service, or product.[84] This would let the government investigate and possibly ban any site they deem a threat to national security. Violation of this ban by a US citizen would result in a fine of up to $1,000,000 and/or up to 20 years in prison. While the RESTRICT act doesn't call TikTok by name, it has been heavily implied as this bill is being written at the same time elected officials are calling for the ban of TikTok and are making TikTok CEO Shou Zi Chew testify in front of congress.[85]

This bill has recently been introduced and has not passed as of current.[83][84]

State laws

In November 2016 the National Conference of State Legislatures listed twenty-seven states with laws that apply to Internet use at publicly funded schools or libraries:[86]

The majority of these states simply require school boards/districts or public libraries to adopt Internet use policies to prevent minors from gaining access to sexually explicit, obscene or harmful materials. However, some states also require publicly funded institutions to install filtering software on library terminals or school computers.

The states that require schools and/or libraries to adopt policies to protect minors include: California, Delaware, Georgia, Indiana, Iowa, Kentucky, Louisiana, Maryland, Massachusetts, New Hampshire, New York, Rhode Island, South Carolina, and Tennessee. Florida law "encourages public libraries to adopt an Internet safety education program, including the implementation of a computer-based educational program."[86]

The states that require Internet filtering in schools and/or libraries to protect minors are: Arizona, Arkansas, Colorado, Idaho, Kansas, Michigan, Minnesota, Missouri, Ohio, Pennsylvania, South Dakota, Utah, and Virginia.[86]

And five states require Internet service providers to make a product or service available to subscribers to control use of the Internet. They are: Louisiana, Maryland, Nevada, Texas, and Utah.[86]

In July 2011 Missouri lawmakers passed the Amy Hestir Student Protection Act which included a provision that barred K-12 teachers from using websites that allow "exclusive access" in communications with current students or former students who are 18 or younger, such as occurs with private messages on sites such as Facebook.[87] A circuit court order issued before the law went into effect blocked the provision because "the breadth of the prohibition is staggering" and the law "would have a chilling effect" on free-speech rights guaranteed under the US Constitution.[88] In September the legislature replaced the controversial provision with a requirement that local school districts develop their own policies on the use of electronic communication between employees and students.[89][90]

In December 2016, Bill Chumley, member of the South Carolina House of Representatives, introduced a bill that would require all computers to be sold with "digital blocking capabilities" to restrict access to pornographic materials. Users or manufacturers would be required to pay a $20 fee in order to lift the blocks.[91] As of April 2018 the bill had not become law, but remained pending before the House Committee on Judiciary.[92]

In March 2018, Frank Ciccone and Hanna Gallo, members of the Rhode Island State Senate, introduced a bill requiring Internet Service Providers to institute a block on pornographic materials, which could be lifted with the payment of a $20 fee.[93][94][95]

In May 2023, the state of Montana implemented a full ban on the social media app TikTok from operating within or offering its services to anyone within the state's borders.[96] In December 2023, the ban was blocked by a federal judge who ruled that the statute was an unconstitutional restriction on free speech. [97]

Court rulings

In April 2022, District Judge Katherine Polk Failla issued a site blocking order against three piracy websites, which were cited in lawsuits brought upon by a group of Israeli media companies, but whose operators failed to appear in court. The order mandates that the three websites, as well as any "newly-discovered websites" that are found to be operated by the defendants, be blocked by all U.S. ISPs. It also prohibits any third-party service operator from doing business with or offering services to the defendants, and orders that their domain names be seized and transferred to the plaintiffs. This order is similar to, but goes beyond what was proposed in SOPA.[98][99]

Censorship by institutions

The constitutional and other legal protections that prohibit or limit government censorship of the Internet do not generally apply to private corporations. Corporations may voluntarily choose to limit the content they make available or allow others to make available on the Internet.[4] Corporations may be encouraged by government pressure or required by law or court order to remove or limit Internet access to content that is judged to be obscene (including child pornography), harmful to children, defamatory, pose a threat to national security, promote illegal activities such as gambling, prostitution, theft of intellectual property, hate speech, and inciting violence.[2][3]

Public and private institutions that provide Internet access for their employees, customers, students, or members will sometimes limit this access in an attempt to ensure it is used only for the purposes of the organization. This can include content-control software to limit access to entertainment content in business and educational settings and limiting high-bandwidth services in settings where bandwidth is at a premium. Some institutions also block outside e-mail services as a precaution, usually initiated out of concerns for local network security or concerns that e-mail might be used intentionally or unintentionally to allow trade secrets or other confidential information to escape.

Schools and libraries

K-12 schools and libraries that accept funds from the federal E-rate program or Library Services and Technology Act grants for Internet access or internal connections are required by Children's Internet Protection Act to have an "Internet safety policy and technology protection measures in place".[40]

Many K-12 school districts in the United States use Internet filters to block material deemed inappropriate for the school setting.[100][101] The federal government leaves decisions about what to filter or block to local authorities. However, many question this approach, feeling that such decisions should be made by a student's parents or guardian. Some of the fears associated with Internet filtering in schools include: the risk of supporting a predominant ideology, that views held by filter manufacturers are being imposed on students, over blocking of useful information, and under blocking of harmful information.[102] A 2003 study "found that blocking software overblocked state-mandated curriculum topics extensively–for every web page correctly blocked as advertised, one or more was blocked incorrectly."[103]

Some libraries may also block access to certain web pages, including pornography, advertising, chat, gaming, social networking, and online forum sites,[104] but there is a long and important tradition among librarians against censorship[105] and the use of filtering and blocking software in libraries remains very controversial.[106]

Search engines and social media

In 2007, Verizon attempted to block the abortion rights group NARAL Pro-Choice America from using their text messaging services to speak to their supporters. Verizon claims it was in order to enforce a policy that doesn't allow their customers to use their service to communicate "controversial" or "unsavory" messages.[107] Comcast, AT&T and many other ISPs have also been accused of regulating internet traffic and bandwidth.

eNom, a private domain name registrar and Web hosting company operating in the U.S., disables domain names which appear on a U.S. Treasury Department blocklist.[41][42]

Military

The Department of Defense prohibits its personnel from accessing certain IP addresses from DoD computers.[108] The US military's filtering policy is laid out in a report to Congress entitled "Department of Defense Personnel Access to the Internet".[109]

In October 2009, military blogger C.J. Grisham was temporarily pressured by his superiors at Redstone Arsenal to close his blog, A Soldier's Perspective, after complaining about local public school officials pushing a mandatory school uniform program without parental consent.[110]

The Monterey Herald reported on June 27, 2013, that the United States Army bars its personnel from accessing parts of The Guardian's website after whistleblower Edward Snowden's revelations about the PRISM global surveillance program and the National Security Agency (NSA) were published there.[111][112] The entire Guardian website is blocked for personnel stationed throughout Afghanistan, the Middle East, and South Asia, as well as personnel stationed at U.S. Central Command headquarters in Florida.[113]

In 2019, social media app TikTok was banned on all military devices for what the pentagon said was "potential security risks".[114]

WikiLeaks

In February 2008, the Bank Julius Baer vs. WikiLeaks lawsuit prompted the United States District Court for the Northern District of California to issue a permanent injunction against the website WikiLeaks' domain name registrar. The result was that WikiLeaks could not be accessed through its web address. This elicited accusations of censorship and resulted in the Electronic Frontier Foundation stepping up to defend WikiLeaks. After a later hearing, the injunction was lifted.[115]

Assange said that WikiLeaks chose Amazon knowing they would probably be kicked off of "in order to separate rhetoric from reality".[116][117] On December 1, 2010 Amazon.com cut off WikiLeaks 24 hours after being contacted by the staff of Joe Lieberman, Chairman of the U.S. Senate Committee on Homeland Security.[118] In a statement Lieberman said it was "the right decision and should set the standard for other companies".[119] Constitutional lawyers say that this is not a first amendment issue because Amazon, as a private company, is free to make its own decisions. Kevin Bankston, a lawyer with the Electronic Frontier Foundation, agreed that this is not a violation of the first amendment, but said it was nevertheless disappointing.[120]

Individual websites

Some websites that allow user-contributed content practice self-censorship by adopting policies on how the web site may be used and by banning or requiring pre-approval of editorial contributions from users that do not follow the policies for the site. For example, social media websites may restrict hate speech to a larger degree than is required by US law,[121] and may restrict harassment and verbal abuse.

Restriction of hate speech and harassment on social media is the subject of debate in the US. For example, two perspectives include that online hate speech should be removed because it causes serious intimidation and harm,[122] and that it shouldn't be removed because it's "better to know that there are bigots among us" than to have an inaccurate picture of the world.[123]

By corporations abroad

Several U.S. corporations including Google, Yahoo!, Microsoft, and MySpace practice greater levels of self-censorship in some international versions of their online services.[124][125] This is most notably the case in these corporations' dealings in China.

In October 2011 US-based Blue Coat Systems of Sunnyvale, California acknowledged that Syria is using its devices to censor Web activity, a possible violation of US trade embargoes.[126]

Intellectual property

A January 4, 2007 restraining order issued by U.S. District Court Judge Jack B. Weinstein forbade a large number of activists in the psychiatric survivors movement from posting links on their websites to ostensibly leaked documents which purportedly show that Eli Lilly and Company intentionally withheld information as to the lethal side-effects of Zyprexa. The Electronic Frontier Foundation appealed this as prior restraint on the right to link to and post documents, saying that citizen-journalists should have the same First Amendment rights as major media outlets.[127] It was later held that the judgment was unenforceable, though First Amendment claims were rejected.[128]

In May 2011 and January 2012 the US seized the domains of the non-US websites of the non-US citizens Richard O'Dwyer and Kim Dotcom, and sought to extradite them to the US, accusing them of copyright infringement.[6][7][8][9]

In January 2015 details from the Sony Pictures Entertainment hack revealed the Motion Picture Association of America's lobbying of the United States International Trade Commission to mandate that US ISPs either at the internet transit or internet service provider level, implement IP address blocking of unauthorized file sharing as well as linking websites.[129]

Bay Area Rapid Transit (BART) cell phone service suspension

On July 3, 2011, two officers of the Bay Area Rapid Transit (BART) Police shot and killed Charles Hill at Civic Center Station in San Francisco.[130] On August 12, 2011, BART shut down cell phone services, including mobile Internet access, for three hours in an effort to limit possible protests against the shooting[131][132] and to keep communications away from protesters at the Civic Center station in San Francisco.[133] The shutdown caught the attention of international media, as well as drawing comparisons to the former Egyptian president Hosni Mubarak in several articles and comments.[134]

On August 29, 2011, a coalition of nine public interest groups led by Public Knowledge filed an Emergency Petition asking the U.S. Federal Communications Commission (FCC) to declare "that the actions taken by the Bay Area Rapid Transit District ("BART") on August 11, 2011, violated the Communications Act of 1934, as amended, when it deliberately interfered with access to Commercial Mobile Radio Service ("CMRS") by the public" and "that local law enforcement has no authority to suspend or deny CMRS, or to order CMRS providers to suspend or deny service, absent a properly obtained order from the Commission, a state commission of appropriate jurisdiction, or a court of law with appropriate jurisdiction".[135][136]

In December 2011 BART adopted a new "Cell Service Interruption Policy" that only allows shutdowns of cell phone services within BART facilities "in the most extraordinary circumstances that threaten the safety of District passengers, employees and other members of public, the destruction of District property, or the substantial disruption of public transit service."[137] According to a spokesperson for BART, under the new policy the wireless phone system would not be turned off under circumstances similar to those in August 2011. Instead police officers would arrest individuals who break the law.[138]

Interruption of communication services

In March 2012 the FCC requested public comment on the question of whether or when the police and other government officials can intentionally interrupt cellphone and Internet service to protect public safety.[138][139] In response, through the end of May 2012, the FCC received 137 comments and 9 reply comments.[140][141][142] As of July 2013 the proceeding remained open, but the FCC had taken no further action.[143]

In December 2014 the FCC issued an Enforcement Advisory that warns the public "that it is illegal to use a cell phone jammer or any other type of device that blocks, jams or interferes with authorized communications" and that "this prohibition extends to every entity that does not hold a federal authorization, including state and local law enforcement agencies". While jamming was not used by BART to disable cell phones, the legal and regulatory considerations are similar.[144]

In December 2016 the California Law Revision Commission issued a recommendation on "Government Interruption of Communication Service".[145] The Commission concluded that government action to interrupt communications can be constitutional in some circumstances, if the government acts pursuant to procedures that are properly designed to protect constitutional free expression and due process rights. To be constitutional the action will usually need to be approved by a judicial officer who has found (i) probable cause that the communication service is or will be used for an unlawful purpose, (ii) that immediate action is required to protect public health, safety, or welfare and (iii) the affected customer must have a prompt opportunity for adjudication of the government's contentions. For a general interruption of communication service that will affect a large number of people or a large geographic area, judicial approval would also require that the action (iv) is necessary to avoid a serious threat of violence that is both imminent and likely to occur or (v) that the effect on expression is incidental to some other valid government purpose, and (vi) is reasonable, (vii) is content-neutral, (viii) would impair no more speech than is necessary, and (ix) leaves open other ample means of communication. Prior judicial approval is not required in extreme emergencies involving immediate danger of death or great bodily injury where there is insufficient time to obtain a court order.[145]

Beyond constitutional law, a state or local government's ability to effect a general interruption of wireless communication service is also subject to the federal "Emergency Wireless Protocol (EWP)" or "Standard Operating Procedure 303" which established a process for interrupting and restoring wireless communication service during times of national emergency.The effect of this protocol is that state and local government officials can initiate an interruption of communication service, but they cannot directly order wireless communication service providers to take action. Such orders to private wireless communication providers must come from the National Coordinating Center for Communications (NCC) within the Department of Homeland Security (DHS), the federal officials designated by the EWP. If an order authorizing an interruption does not fall within the EWP, it is served directly on the relevant communication service provider.[145]

See also

References

This article incorporates licensed material from the Regional Overviews and other sections of the OpenNet Initiative web site.[146]

  1. "Internet Enemies" Archived 2014-03-12 at the Wayback Machine, Enemies of the Internet 2014: Entities at the heart of censorship and surveillance, Reporters Without Borders (Paris), 11 March 2014. Retrieved 24 June 2014.
  2. 1 2 3 4 5 6 7 "ONI Regional Overview: North America" Archived 2017-11-07 at the Wayback Machine, OpenNet Initiative, 30 March 2010
  3. 1 2 "Cybersieves" , Derek E. Bambauer, Duke Law Journal, vol. 59 (2009)
  4. 1 2 "The Move to the Middle: The Enduring Threat of 'Harmful' Speech to the End-to-End Principle" Archived 2012-03-14 at the Wayback Machine, John Palfrey, Jr. and Robert Rogoyski, Washington University Journal of Law and Policy, vol. 21 (2006), pp.31–65
  5. 1 2 "Unintended Consequences: Twelve Years under the DMCA" Archived 2011-05-05 at the Wayback Machine, Electronic Frontier Foundation, March 2010
  6. 1 2 Somini Sengupta (12 July 2012). "U. S. Pursuing a Middleman in Web Piracy". The New York Times. Archived from the original on 13 July 2012. Retrieved 13 July 2012.
  7. 1 2 "Manhattan Federal Court Orders Seizures of Seven Websites for Criminal Copyright Infringement in Connection with Distribution of Pirated Movies Over the Internet" (PDF). Press Release United States Attorney Southern District of New York. U.S. Justice Department. 10 June 2010. Archived from the original (PDF) on 6 October 2014. Retrieved 10 July 2011.
  8. 1 2 Barakat, Matthew; Perry, Nick (20 January 2012). "US Internet piracy case brings New Zealand arrests". The Washington Times. Associated Press. Archived from the original on 28 April 2012. Retrieved 27 February 2012.
  9. 1 2 "US formally requests Dotcom's extradition". 3 News NZ. 5 March 2012. Archived from the original on 14 July 2014. Retrieved 12 April 2015.
  10. A&M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896 (N.D. Cal. 2000), aff'd in part, rev'd in part, 239 F.3d 1004 (9th Cir. 2001)
  11. Menta, Richard (December 9, 1999). "RIAA Sues Music Startup Napster for $20 Billion". MP3 Newswire. Archived from the original on June 1, 2013. Retrieved April 8, 2018.
  12. 2001 US Dist. LEXIS 2186 (N.D. Cal. Mar. 5, 2001), aff'd, 284 F. 3d 1091 (9th Cir. 2002).
  13. Savage, Charlie (1 December 2010). "U.S. Weighs Prosecution of WikiLeaks Founder, but Legal Scholars Warn of Steep Hurdles". The New York Times. Archived from the original on 10 December 2010. Retrieved 5 December 2010.
  14. Yost, Pete (29 November 2010). "Holder says WikiLeaks under criminal investigation". Fox News Channel. Archived from the original on 24 December 2013. Retrieved 5 December 2010.
  15. "Swedish authorities sink Pirate Bay" (PDF) (Press release). MPAA.org. 31 May 2006. Archived from the original (PDF) on 3 October 2009. Retrieved 27 September 2008.
  16. "Megaupload.com blocked (shutdown) Anonymous hacked Universal Music and other sites". Pakblog.net. 19 January 2012. Archived from the original on 6 September 2012. Retrieved 19 January 2012.
  17. "The Internet Censorship Controversy" Archived 2011-07-21 at the Wayback Machine, Usman Qazi, Professionalism in Computing (Computer Science 3604), Virginia Polytechnic Institute and State University, spring 1996
  18. Jarrett, H. Marshall; Bailie, Michael W. (2010). "Prosecution of Computer Crimes" (PDF). justice.gov. Office of Legal Education Executive Office for United States Attorneys. Archived (PDF) from the original on April 7, 2013. Retrieved June 3, 2013.
  19. Christian Sandvig; Karrie Karahalios (2006-07-01). "Most of what you do online is illegal. Let's end the absurdity". The Guardian. Archived from the original on 2018-04-10. Retrieved 2018-04-09.
  20. "United States Country Profile: Violations of User Rights" Archived 2018-03-27 at the Wayback Machine, Freedom On the Net 2017, Freedom House.
  21. H.R. 2454 at Congress.gov; H.R. 2454 Archived 2018-07-15 at the Wayback Machine at GovTrack; H.R. 2454 Archived November 12, 2013, at the Wayback Machine at OpenCongress. S. 1196 at Congress.gov; S. 1196 Archived 2018-07-15 at the Wayback Machine at GovTrack; S. 1196 Archived November 12, 2013, at the Wayback Machine at OpenCongress.
  22. Dekel, Jonathan (May 1, 2014). "Swartz doc director: Oracle and Larry Ellison killed Aaron's Law". Postmedia. Archived from the original on October 3, 2018. Retrieved April 9, 2018.
  23. H.R. 1918 at Congress.govS. 1030 at Congress.gov
  24. "Communications Decency Act of 1996", a United States federal law, Title V of the Telecommunications Act of 1996, Pub. L.Tooltip Public Law (United States) 104–104 (text) (PDF), 110 Stat. 133-139, enacted February 8, 1996
  25. "CDA" Archived 2011-08-18 at the Wayback Machine, Center for Democracy and Technology
  26. "No.96-511, JANET RENO, ATTORNEY GENERAL OF THE UNITED STATES, et al., APPELLANTS v. AMERICAN CIVIL LIBERTIES UNION et al." Archived 2011-04-14 at the Wayback Machine, 26 June 1997, Supreme Court Decision Index, Citizens Internet Empowerment Coalition
  27. § 230. Protection for private blocking and screening of offensive material, Title 47, Chapter 5, Subchapter II, Part I of the U.S. Code, Legal Information Institute, Cornell University Law School
  28. material that is considered "... to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected", from § 230(c)(2)(A) "Protection for "Good Samaritan" blocking and screening of offensive material", Title 47, Chapter 5, Subchapter II, Part I of the U.S. Code"
  29. "47 U.S.C. 231". law.cornell.edu. Retrieved July 11, 2006.
  30. "Child Online Protection Act Overturned". ABC News. 2008-07-23. Retrieved 2017-02-27.
  31. "Judge Strikes '98 Law Aimed At Online Porn". Associated Press. 22 March 2007. Archived from the original on March 28, 2007. Retrieved March 22, 2007.
  32. Lamut, Anna (3 August 2008). "ACLU v. Mukasey; Third Circuit Holds Child Online Protection Act Unconstitutional". JOLT Digest. Harvard Journal of Law & Technology. Archived from the original on 12 July 2012. Retrieved 24 January 2009.
  33. Nichols, Scott (22 January 2009). "COPA Child-Porn Law Killed". PC World. Archived from the original on 15 June 2012. Retrieved 24 January 2009.
  34. The Digital Mellennium Copyright Act of 1998 Archived 2007-08-08 at the Wayback Machine, U.S. Copyright Office Summary, December 1998
  35. Online Copyright Infringement Liability Limitation Act, 17 U.S.C. § 512
  36. "DMCA" Archived 2011-05-05 at the Wayback Machine, Electronic Frontier Foundation
  37. "Children's Online Privacy Protection Act of 1998", a United States federal law, located at 15 U.S.C. §§ 65016506 (Pub. L.Tooltip Public Law (United States) 105–277 (text) (PDF), 112 Stat. 2581-728, enacted October 21, 1998)
  38. "Frequently Asked Questions about the Children's Online Privacy Protection Rule" Archived 2008-10-12 at the Wayback Machine, U.S. Federal Trade Commission, 7 October 2008
  39. "Children's Internet Protection Act (CIPA)", 20 U.S.C. § 9134(f) and 47 U.S.C. § 254(h)(5)-254(h)(7)
  40. 1 2 3 "Children's Internet Protection Act" Archived 2007-10-19 at the Wayback Machine, Consumer Publications, Federal Communications Commission, updated/reviewed 22 April 2011
  41. 1 2 Adam Liptak (4 March 2008). "A Wave of the Watch List, and Speech Disappears". The New York Times. Archived from the original on 7 April 2017. Retrieved 22 February 2017.
  42. 1 2 "Alphabetical Listing of Specially Designated Nationals and Blocked Persons". Office of Foreign Assets Control, U.S. Department of the Treasury. Archived from the original on 28 February 2009. Retrieved 25 February 2009.
  43. "Discussion Draft of the 'Cybersecurity Information Sharing Act of 2014' (S.2588)" Archived 2014-08-25 at the Wayback Machine, 113th Congress, 2d Session, June 11, 2014.
  44. 1 2 "H.R.2029 - Military Construction and Veterans Affairs and Related Agencies Appropriations Act, 2016". Archived from the original on 2018-04-21. Retrieved 2018-04-08.
  45. "Budget bill heads to President Obama's desk with CISA intact" Archived 2018-04-09 at the Wayback Machine, Chris Velazco, Engadget, December 18, 2015.
  46. "Cybersecurity Information Sharing Act of 2015" Archived 2018-11-04 at the Wayback Machine, Thomas F. Duffy, Chair, Center for Information Security, Newsletter, May 2016, Volume 11, Issue 5.
  47. "Federal Guidance on the Cybersecurity Information Sharing Act of 2015" Archived 2018-04-08 at the Wayback Machine, Brad S. Karp, Paul, Weiss, Rifkind, Wharton & Garrison LLP, March 3, 2016, Harvard Law School Forum on Corporate Governance and Financial Regulation.
  48. Andy Greenberg (20 Mar 2015). "CISA Security Bill: An F for Security But an A+ for Spying". Wired. Archived from the original on 23 July 2015. Retrieved 31 Jul 2015.
  49. The Justice for Victims of Trafficking Act of 2015 Archived 2018-04-08 at the Wayback Machine, Pub. L 144-22, May 29, 2015.
  50. "United States Country Profile" Archived 2018-03-27 at the Wayback Machine, Freedom On the Net 2017, Freedom House. Retrieved April 8, 2018.
  51. Soave, Robby (2017-03-07). "Berkeley removes 20,000 free online videos to comply with insane Department of Justice ruling". Reason. Archived from the original on 2017-03-18. Retrieved 2017-03-18.
  52. Jackman, Tom (February 27, 2018). "House passes anti-online sex trafficking bill, allows targeting of websites like Backpage.com". Archived from the original on April 7, 2018. Retrieved April 8, 2018 via www.washingtonpost.com.
  53. "U.S. Senate: U.S. Senate Roll Call Votes 115th Congress - 2nd Session". www.senate.gov. Archived from the original on 2018-04-13. Retrieved 2018-04-08.
  54. Elizabeth Dias (2018-04-11). "Trump Signs Bill Amid Momentum to Crack Down on Trafficking". New York Times. Archived from the original on 2018-04-12. Retrieved 2018-04-11.
  55. Larry Magid (2018-04-06). "DOJ Seizes Backpage.com Weeks After Congress Passes Sex Trafficking Law". Forbes. Archived from the original on 2018-04-08. Retrieved 2018-04-08.
  56. Ann, Wagner (March 21, 2018). "H.R.1865 - 115th Congress (2017-2018): Allow States and Victims to Fight Online Sex Trafficking Act of 2017". www.congress.gov. Archived from the original on April 8, 2018. Retrieved April 8, 2018.
  57. "ACLU letter opposing SESTA". American Civil Liberties Union. Archived from the original on 2018-03-24. Retrieved 2018-03-25.
  58. "SWOP-USA stands in opposition of disguised internet censorship bill SESTA, S. 1963". Sex Workers Outreach Project. Archived from the original on 2017-10-24. Retrieved 2017-10-23.
  59. "Wikipedia warns that SESTA will strip away protections vital to its existence". The Verge. Archived from the original on 2018-03-09. Retrieved 2018-03-08.
  60. "Sex trafficking bill is turning into a proxy war over Google". The Verge. Archived from the original on 2017-09-21. Retrieved 2017-09-20.
  61. Quinn, Melissa. "Tech community fighting online sex trafficking bill over fears it will stifle innovation". Washington Examiner. Archived from the original on 2017-09-19. Retrieved 2017-09-20.
  62. "How a New Senate Bill Will Screw Over Sex Workers". Rolling Stone. Archived from the original on 2018-03-24. Retrieved 2018-03-25.
  63. Zimmerman, Amy (2018-04-04). "Sex Workers Fear for Their Future: How SESTA Is Putting Many Prostitutes in Peril". The Daily Beast. Archived from the original on 2018-04-07. Retrieved 2018-04-07.
  64. H.R. 5319: Deleting Online Predators Act of 2006 Archived 2011-12-30 at the Wayback Machine, govtrack.us, 9 May 2006
  65. H.R.1120: Deleting Online Predators Act of 2007 Archived 2008-12-01 at the Wayback Machine, govtrack.us, 16 February 2007
  66. S.1965: Protecting Children in the 21st Century Act Archived 2011-12-30 at the Wayback Machine, govtrack.us, 2 August 2007
  67. H.R.5548: Protecting Cyberspace as a National Asset Act of 2010, govtrack.us, 16 June 2010
  68. "Myth vs. Reality: The Facts About S. 3480, “Protecting Cyberspace as a National Asset Act of 2010” Archived 2017-07-02 at the Wayback Machine, a fact sheet issued by Senators Joseph I. Lieberman, Chairman, and Susan M. Collins, Ranking Member, United States Senate Committee on Homeland Security and Governmental Affairs, 23 June 2010, PDF, Retrieved 9 February 2011.
  69. H.R.1136: Executive Cyberspace Coordination Act of 2011 Archived 2011-10-26 at the Wayback Machine, govtrack.us, 16 March 2011
  70. 1 2 3 "S.3804: Combating Online Infringement and Counterfeits Act - 20 September 2010". GovTrack.us. September 20, 2010. Archived from the original on 21 November 2010. Retrieved October 16, 2010.
  71. 1 2 3 Weisman, Jonathan (January 20, 2012). "After an Online Firestorm, Congress Shelves Antipiracy Bills". NY Times. Archived from the original on January 20, 2012. Retrieved January 20, 2012.
  72. "Senate bill amounts to death penalty for Web sites". CNet. May 12, 2011. Archived from the original on October 25, 2012. Retrieved Nov 7, 2011.
  73. "S. 968: Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act of 2011". GovTrack. Archived from the original on September 11, 2012. Retrieved May 22, 2011.
  74. "Americans face piracy website blocking". BBC. May 13, 2011. Archived from the original on May 17, 2011. Retrieved May 24, 2011.
  75. Stephanie Condon (20 January 2012), "PIPA, SOPA put on hold in wake of protests" Archived 2012-03-23 at the Wayback Machine CBS News
  76. "HR 3523 as reported to the House Rules Committee" (PDF). Archived from the original (PDF) on 2012-05-22.
  77. "CISPA Cybersecurity Bill, Reborn: 6 Key Facts" Archived 2013-02-18 at the Wayback Machine, Mathew J. Schwartz, Information Week, 14 February 2013
  78. "Budget bill heads to President Obama's desk with CISA intact". Archived from the original on 2018-04-09. Retrieved 2018-04-08.
  79. "H.R. 3523 - Letters of Support". House Permanent Select Committee on Intelligence. Archived from the original on April 26, 2012. Retrieved April 26, 2012.
  80. "CISPA supporters list: 800+ companies that could help Uncle Sam snag your data". Digital Trends. Archived from the original on 17 April 2019. Retrieved 12 April 2012.
  81. "Draconian cyber security bill could lead to Internet surveillance and censorship". RWB. Archived from the original on 12 March 2016. Retrieved 15 April 2012.
  82. Brendan Sasso (23 April 2012). "Google acknowledges lobbying on cybersecurity bill CISPA". The Hill. Capitol Hill Publishing Corp. Archived from the original on 16 March 2014. Retrieved 9 May 2012.
  83. 1 2 H.R.1165 - Data Privacy Act of 2023
  84. 1 2 S.686 - RESTRICT Act
  85. "TikTok CEO doesn't seem to sway Congress as U.S. Considers a TikTok ban". NBC News.
  86. 1 2 3 4 "Children and the Internet: Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries" Archived 2013-11-09 at the Wayback Machine, National Conference of State Legislatures, 16 November 2016. Retrieved 8 April 2018.
  87. Section 162.069 of SB 54 Archived 2011-09-04 at the Wayback Machine, signed by the governor 14 July 2011, effective date 28 August 2011
  88. "Order Entering Preliminary Injunction in Missouri State Teachers Association, et al. v. State of Missouri, et al." Archived 2012-04-25 at the Wayback Machine, Jon E. Beeterm, Circuit Judge, Case No.: 11AC-CC00553, Circuit Court of Cole County, Missouri, 26 August 2011
  89. "Can Teachers and Their Students Be Banned from Becoming Facebook Friends?" Archived 2011-09-25 at the Wayback Machine, Anita Ramasastry, Professor of Law, University of Washington School of Law in Seattle, in Justia, 13 September 2011
  90. "Mo. lawmakers vote to repeal teacher-Facebook law" Archived 2011-09-25 at the Wayback Machine, David A. Lieb, Associated Press in Boston.com, 23 September 2011
  91. "Proposed bill would block porn from computers sold in South Carolina, somehow". The Verge. Vox Media. 19 December 2016. Archived from the original on 20 December 2016. Retrieved 20 December 2016.
  92. "A Bill to Amend Chapter 15, Title 16 of the 1976 Code by adding Article 5: Human Trafficking Prevention Act (H.3003)". www.scstatehouse.gov. South Carolina General Assembly, 122nd Session, 2017-2018. Archived from the original on April 8, 2018. Retrieved April 8, 2018.
  93. Jacqueline Tempera (March 2, 2018). "R.I. bill would impose fee for accessing online porn". Providence Journal. Archived from the original on 5 March 2018. Retrieved 6 March 2018.
  94. "An Act Relating to Public Utilities and Carriers - Internet Digital Blocking" (PDF). webserver.rilin.state.ri.us. State of Rhode Island General Assembly, January Session, A.D. 2018. March 1, 2018. Archived (PDF) from the original on March 28, 2018. Retrieved April 8, 2018.
  95. Gebhart, Gennie (February 28, 2018). "State Lawmakers Want to Block Pornography at the Expense of Your Free Speech, Privacy, and Hard-Earned Cash". Electronic Frontier Foundation. Archived from the original on June 27, 2018. Retrieved June 20, 2018.
  96. https://www.reuters.com/legal/us-judge-blocks-montana-banning-tiktok-use-state-2023-11-30/
  97. Wed, May 4th 2022 10:46am-Mike Masnick (2022-05-04). "Who Needs SOPA: Judge Orders Every US ISP To Block Entire Websites Accused Of Enabling Piracy". Techdirt. Retrieved 2022-05-04.{{cite web}}: CS1 maint: numeric names: authors list (link)
  98. Robertson, Adi (2022-05-06). "Sweeping legal ruling orders ISPs to block pirate sites". The Verge. Retrieved 2022-05-06.
  99. "Internet filtering as a form of soft censorship " Archived 2011-11-06 at the Wayback Machine, Mitch Wagner, Computerworld Tool Talk blog, 19 March 2010
  100. "How Internet censorship harms schools" Archived 2011-01-25 at the Wayback Machine, Mitch Wagner, Computerworld Tool Talk blog, 26 March 2010
  101. "Internet Censorship: Issues for Teacher-Librarians" Archived 2011-02-20 at the Wayback Machine, Alvin Schrader, Teacher Librarian: The journal for school library professionals, May/June 1999
  102. "Study Released on Internet Blocking in Schools" Archived 2011-07-25 at the Wayback Machine, press release, Online Policy Group and Electronic Frontier Foundation, 23 June 2003
  103. "Internet Use in Libraries" Archived 2011-02-17 at the Wayback Machine, Fact Sheet Number 26, American Library Association, July 2010
  104. "Library Bill of Rights" Archived 2011-05-03 at the Wayback Machine, American Library Association Council, adopted 19 June 1993, as amended and last reaffirmed 23 January 1996
  105. "Resolution on the Use of Filtering Software in Libraries" Archived 2019-06-08 at the Wayback Machine, American Library Association, 2 July 1997
  106. Verizon Blocks Messages of Abortion Rights Group Archived 2017-04-23 at the Wayback Machine, Adam Liptak, New York Times, 27 September 2007
  107. General B.B. Bell, Commander, UNC/CFC/USFK (18 May 2007). "Restricted Access to Internet Entertainment Sites Across DoD Networks". U.S. Army Korea.{{cite web}}: CS1 maint: multiple names: authors list (link)
  108. "Department of Defense Personnel Access to the Internet" Archived 2013-02-25 at the Wayback Machine, Report to Congress, September 2007
  109. Anderson, Jon R. (December 8, 2009). "Facebook face-off". Military Times. Archived from the original on April 23, 2013. Retrieved January 29, 2014.
  110. "Restricted Web access to the Guardian is Armywide, say officials" Archived 2014-10-20 at the Wayback Machine, Philipp Molnar, Monterey Herald, June 27, 2013. Retrieved 15 October 2014.
  111. "Zensur: US-Armee sperrt Zugang zu "Guardian"-Artikeln" Archived 2014-10-20 at the Wayback Machine, Jörg Breithut, Spiegel Online, June 28, 2013. Retrieved 15 October, 2014.
  112. Ackerman, Spencer (July 1, 2013). "US military blocks entire Guardian website for troops stationed abroad". The Guardian. Archived from the original on February 2, 2017. Retrieved December 14, 2016.
  113. "U.S. Army bans TikTok on military devices, signaling growing concern about app's Chinese roots". The Washington Post. 2019-12-31. Archived from the original on 2022-03-26.
  114. "Bank Julius Baer & Co v. Wikileaks". Electronic Frontier Foundation. Archived from the original on 2008-03-04. Retrieved 2008-03-10.
  115. "WikiLeaks got kicked off Amazon on purpose, says Assange". CNET. Retrieved 2023-10-23.
  116. "Julian Assange answers your questions". The Guardian. 2010-12-03. ISSN 0261-3077. Retrieved 2023-10-23.
  117. "WikiLeaks website pulled by Amazon after US political pressure" Archived 2011-06-26 at the Wayback Machine, Ewen MacAskill, The Guardian, 2 December 2010
  118. "Amazon Severs Ties with Wikileaks" Archived 2010-12-04 at the Wayback Machine, Joe Lieberman's U.S. Senate web site, 1 December 2010
  119. "How Lieberman Got Amazon To Drop WikiLeaks" Archived 2011-05-04 at the Wayback Machine, Talking Points Memo, 1 December 2010
  120. See also: Online_hate_speech#Facebook
  121. McElwee, Sean (July 12, 2013). "The Case for Censoring Hate Speech". AlterNet. Archived from the original on December 13, 2014. Retrieved December 14, 2014.
  122. Lukianoff, Greg (April 7, 2013). "Twitter, hate speech, and the costs of keeping quiet". CNet. Archived from the original on December 15, 2014. Retrieved December 14, 2014.
  123. "Policing Content in the Quasi-Public Sphere" Archived 2011-05-21 at the Wayback Machine, Jillian C. York, Robert Faris, and Ron Deibert, OpenNet Initiative, 19 September 2010
  124. "Geolocation filtering" Archived 2011-05-21 at the Wayback Machine, OpenNet Initiative Bulletin 007, 27 October 2004
  125. "U.S. Firm Acknowledges Syria Uses Its Gear to Block Web" Archived 2017-10-27 at the Wayback Machine, Jennifer Valentino-Devries, Paul Sonne, and Nour Malas, Wall Street Journal, 29 October 2011
  126. Eli Lilly Zyprexa Litigation Archived 2008-10-11 at the Wayback Machine, Electronic Frontier Foundation
  127. "Eli Lilly Loses Effort to Censor Zyprexa Documents Off the Internet" Archived 2016-09-12 at the Wayback Machine, press release, Electronic Frontier Foundation, 13 February 2007
  128. Brandom, Russell (2 January 2015). "The MPAA has a new plan to stop copyright violations at the border". Archived from the original on 3 January 2015. Retrieved 4 January 2015.
  129. Upton, John (July 25, 2011). "BART Police Release Video of Shooting - Pulse of the Bay". The Bay Citizen. Archived from the original on July 23, 2012. Retrieved August 21, 2011.
  130. "To Prevent Protests, San Francisco Subway Turns Off Cell Signals, August 13, 2011". PC Mag. Archived from the original on January 19, 2012. Retrieved August 18, 2011.
  131. S.F. subway muzzles cell service during protest cnet.com.
  132. Questions, Complaints Arise Over BART Cutting Cell Phone Service Archived 2011-10-05 at the Wayback Machine KTVU.
  133. Leland Yee scolds BART over cell phone blackout Archived 2011-08-24 at the Wayback Machine KGO-TV.
  134. "In the Matter of the Petition of Public Knowledge et al. for Declaratory Ruling that Disconnection of Telecommunications Services Violates the Communications Act" Archived 2011-10-10 at the Wayback Machine, Harold Feld, Legal Director, and Sherwin Siy, Deputy Legal Director, of Public Knowledge before the Federal Communications Commission, 29 August 2011
  135. "Phone, Web Clampdowns in Crises Are Intolerable" Archived 2013-08-25 at the Wayback Machine, Susan Crawford, Bloomberg News, 25 September 2011
  136. "Cell Service Interruption Policy" Archived 2011-12-18 at the Wayback Machine, Bay Area Rapid Transit District, December 2011, accessed 30 March 2012
  137. 1 2 "F.C.C. Asks for Guidance on Whether, and When, to Cut Off Cellphone Service" Archived 2016-11-04 at the Wayback Machine, Edward Wyatt, New York Times, 2 March 2012
  138. "Commission Seeks Comment on Certain Wireless Service Interruptions" Archived 2012-05-13 at the Wayback Machine, Public Notice DA 12-311, GN Docket No. 12-52, Federal Communications Commission, March 1, 2012.
  139. "Search for Filings in Proceeding Number 12-52" Archived 2013-06-24 at the Wayback Machine, Electronic Comment Filing System, Federal Communications Commission. Retrieved 19 July 2013.
  140. "FCC Warned About Cellphone Interruption Guidance", John Eggerton, Broadcasting & Cable, May 30, 2012.
  141. "BART defends mobile service shutdown to the FCC" Archived 2012-06-01 at the Wayback Machine, Grant Gross, IDG News Service in Computerworld, May 1, 2012.
  142. "Proceeding 12-52 Details" Archived 2013-07-19 at archive.today, Electronic Comment Filing System, Federal Communications Commission. Retrieved 19 July 2013.
  143. "WARNING: Jammer Use is Prohibited" Archived 2018-04-09 at the Wayback Machine, Public Notice: FCC Enforcement Advisory (No. 2014-05), December 8, 2014, Federal Communications Commission.
  144. 1 2 3 "Government Interruption of Communication Service" Archived 2017-12-18 at the Wayback Machine, December 2016, California Law Revision Commission. Public Domain This article incorporates text from this source, which is in the public domain.
  145. Creative Commons Attribution 3.0 Unported license Archived 2017-12-21 at the Wayback Machine, see the lower right corner of pages at the OpenNet Initiative web site Archived 2018-09-25 at the Wayback Machine
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.