-
1
-
-
84876662814
-
-
note
-
When I refer to nationality here, I mean to allude to the possibility of detection of accents.
-
-
-
-
2
-
-
84876653022
-
-
note
-
If speakers desire otherwise, however, with the possibility of sending visual images and audio messages, they can choose to reveal more about themselves.
-
-
-
-
3
-
-
10444238420
-
Postcard from cyberspace: The cutting edge, the helsinki incident and the right to anonymity
-
Feb. 22
-
See e.g., Daniel Akst, Postcard from Cyberspace: The Cutting Edge, The Helsinki Incident and the Right to Anonymity, L.A. TIMES, Feb. 22, 1995, at D1.
-
(1995)
L.A. Times
-
-
Akst, D.1
-
4
-
-
84876626764
-
Computer jokes and threats ignite debate on anonymity
-
Dec. 31, 1994, at 1.4362 U.S. 60
-
Peter H. Lewis, Computer Jokes and Threats Ignite Debate on Anonymity, N.Y. TIMES, Dec. 31, 1994, at 1.4362 U.S. 60 (1960).
-
(1960)
N.Y. Times
-
-
Lewis, P.H.1
-
5
-
-
0009297186
-
Comment, the constitutional right to anonymity: Free speech, disclosure and the devil
-
See e.g., Comment, The Constitutional Right to Anonymity: Free Speech, Disclosure and the Devil, 70 YALE L.J. 1084 (1961); Note, Disclosure as a Legislative Device, 76 HARV. L. REV. 1273 (1963).
-
(1961)
Yale L.J.
, vol.70
, pp. 1084
-
-
-
6
-
-
4043176468
-
-
See e.g., Comment, The Constitutional Right to Anonymity: Free Speech, Disclosure and the Devil, 70 YALE L.J. 1084 (1961); Note, Disclosure as a Legislative Device, 76 HARV. L. REV. 1273 (1963).
-
(1963)
Harv. L. Rev.
, vol.76
, pp. 1273
-
-
-
7
-
-
84876630226
-
-
1995 WL 227810 (U.S. 1995) (holding unconstitutional a state law that made it a crime to distribute anonymously any "political communication")
-
1995 WL 227810 (U.S. 1995) (holding unconstitutional a state law that made it a crime to distribute anonymously any "political communication").
-
-
-
-
8
-
-
84937298954
-
Anonymity, autonomy and accountability: Challenges to the first amendment in cyberspace
-
Two recent works that do give some attention to this topic include Anne Branscomb, Anonymity, Autonomy and Accountability: Challenges to the First Amendment in Cyberspace, 104 YALE L.J. 1639 (1995), and George P. Long, III, Note, Who Are You? Identity and Anonymity in Cyberspace, 55 U. PITT. L. REV. 1177 (1994). Both works focus primarily on how anonymity ought to be preserved online, without satisfactorily examining the justifications for its preservation.
-
(1995)
Yale L.J.
, vol.104
, pp. 1639
-
-
Branscomb, A.1
-
9
-
-
0000494796
-
Note, who are you? Identity and anonymity in cyberspace
-
Two recent works that do give some attention to this topic include Anne Branscomb, Anonymity, Autonomy and Accountability: Challenges to the First Amendment in Cyberspace, 104 YALE L.J. 1639 (1995), and George P. Long, III, Note, Who Are You? Identity and Anonymity in Cyberspace, 55 U. PITT. L. REV. 1177 (1994). Both works focus primarily on how anonymity ought to be preserved online, without satisfactorily examining the justifications for its preservation.
-
(1994)
U. Pitt. L. Rev.
, vol.55
, pp. 1177
-
-
Long III, G.P.1
-
10
-
-
4043176468
-
Disclosure as a legislative device
-
classifying the effects of disclosure into these three categories
-
See Note, Disclosure as a Legislative Device, 76 HARV. L. REV. 1273 (1963) (classifying the effects of disclosure into these three categories).
-
(1963)
Harv. L. Rev.
, vol.76
, pp. 1273
-
-
-
11
-
-
84876635393
-
Outside counsel: Computer libel questions in stratton v.Prodigy
-
Dec 13
-
See Robert B. Charles, Outside Counsel: Computer Libel Questions in Stratton v.Prodigy, N.Y. L. J., Dec 13, 1994, at 1. In this case, the readers did not know that the person was actually anonymous; he had used someone else's user name.
-
(1994)
N.Y. L. J.
-
-
Charles, R.B.1
-
12
-
-
4043173643
-
Evidence for the role of the justice motive in status generalization processes
-
June
-
John H. Ellard & Douglas D. Bates, Evidence for the Role of the Justice Motive in Status Generalization Processes, SOC. JUST. RES., June 1990, at 115, 117.
-
(1990)
Soc. Just. Res.
, pp. 115
-
-
Ellard, J.H.1
Bates, D.D.2
-
15
-
-
84876620687
-
-
note
-
Of course, the message itself, for example, its command of the English language, may reveal some status characteristics.
-
-
-
-
17
-
-
84876651324
-
Cyber-security bugs UW
-
(Madison, Wisconsin)(describing an incident where someone impersonated a professor and sent out a racist message under his name to 20,000 users nationwide)
-
See Stacey Anderson, Cyber-Security Bugs UW, CAPITAL TIMES (Madison, Wisconsin)(describing an incident where someone impersonated a professor and sent out a racist message under his name to 20,000 users nationwide).
-
Capital Times
-
-
Anderson, S.1
-
19
-
-
4043084383
-
Hate groups use tools of the electronic trade
-
Mar. 13
-
Keith Schneider, Hate Groups Use Tools of the Electronic Trade, N.Y. TIMES, Mar. 13, 1995, at A12.
-
(1995)
N.Y. Times
-
-
Schneider, K.1
-
20
-
-
84876632831
-
Crossing the line on the info highway: He put his ugly fantasy on the internet
-
Mar. 11, (describing the story of a college student who described his fantasy of raping a fellow dorm mate on the Internet)
-
Cf. Megan Garvey, Crossing the Line on the Info Highway: He Put His Ugly Fantasy on the Internet, WASH. POST, Mar. 11, 1995 (describing the story of a college student who described his fantasy of raping a fellow dorm mate on the Internet).
-
(1995)
Wash. Post
-
-
Garvey, M.1
-
21
-
-
84876624180
-
-
Consider, for example, the current trend of "political correctness." Many university students on American campuses today are unwilling to express their ideas for fear that they will be ridiculed or labeled as "politically incorrect."
-
Consider, for example, the current trend of "political correctness." Many university students on American campuses today are unwilling to express their ideas for fear that they will be ridiculed or labeled as "politically incorrect."
-
-
-
-
22
-
-
84876662526
-
-
discussing, for example, self-identified former members of the Church of Scientology who criticize and post official church documents anonymously because they fear retribution from the Church
-
See Lewis, supra note 3, at 1 (discussing, for example, self-identified former members of the Church of Scientology who criticize and post official church documents anonymously because they fear retribution from the Church).
-
Supra Note
, vol.3
, pp. 1
-
-
Lewis1
-
24
-
-
84876637448
-
-
recounting that Hamilton and Madison wrote the Federalist papers; Madison, the Letters of Pacifus defending Washington's proclamation of neutrality; and Chief Justice Marshall, as a "friend of the Republic," a defense of certain Supreme Court decisions
-
See Comment, supra note 5, at 1085 (recounting that Hamilton and Madison wrote the Federalist papers; Madison, the Letters of Pacifus defending Washington's proclamation of neutrality; and Chief Justice Marshall, as a "friend of the Republic," a defense of certain Supreme Court decisions).
-
Supra Note
, vol.5
, pp. 1085
-
-
-
25
-
-
84876625679
-
All things Considered
-
All Things Considered, supra note 16.
-
Supra Note
, vol.16
-
-
-
26
-
-
84876662526
-
-
"Hundreds of people each day, for instance, use the cloak of electronic anonymity to share their deepest secrets about drug addition, childhood sexual abuse or other sensitive topics with sympathetic strangers on electronic bulletin boards or computer-network chat rooms."
-
See Lewis, supra note 3, at 1 ("Hundreds of people each day, for instance, use the cloak of electronic anonymity to share their deepest secrets about drug addition, childhood sexual abuse or other sensitive topics with sympathetic strangers on electronic bulletin boards or computer-network chat rooms.")
-
Supra Note
, vol.3
, pp. 1
-
-
Lewis1
-
27
-
-
84876616009
-
-
alleged libel
-
e.g., Charles, supra note 9, at 1 (alleged libel).
-
Supra Note
, vol.9
, pp. 1
-
-
Charles1
-
28
-
-
84876650436
-
-
and accompanying text
-
The most popular anonymous remailer already does clearly label all of its resent messages as anonymous. See infra notes 31-33 and accompanying text.
-
Infra Notes
, vol.31-33
-
-
-
29
-
-
84876652536
-
-
See Long, supra note 7, at 1202.
-
Supra Note
, vol.7
, pp. 1202
-
-
Long1
-
30
-
-
84876653409
-
-
note
-
In his note on anonymity in Cyberspace, George Long incorrectly asserts that "One could 'kill'all messages that are anonymously originated." Id. In fact, one can only kill anonymously sent messages if one knows elements of the anonymous headers in advance.
-
-
-
-
31
-
-
84876630087
-
-
note
-
I do not mean to suggest here that being "shielded from responsibility" is necessarily a negative quality. As discussed above, this shield or protection serves important purposes.
-
-
-
-
33
-
-
84876617636
-
-
See id
-
See id.
-
-
-
-
34
-
-
84876595970
-
-
For example, an address could be "an115@anon.penet.fi"
-
For example, an address could be "an115@anon.penet.fi".
-
-
-
-
35
-
-
84876603933
-
-
Other anonymous sites include, for example, "alumni.caltech. edu", "soda.berkeley.edu", or "mead.u.washington.edu." See Long, supra note 7, at 1213.
-
Supra Note
, vol.7
, pp. 1213
-
-
Long1
-
36
-
-
84876603352
-
-
note
-
It is possible, however, that a hacker would change every header that indicated anonymity to a random header. Cybercops would then have to search for the hacker.
-
-
-
|