The United States of Anonymous: How the First Amendment Shaped Online Speech
By Jeff Kosseff
4.5/5
()
About this ebook
In The United States of Anonymous, Jeff Kosseff explores how the right to anonymity has shaped American values, politics, business, security, and discourse, particularly as technology has enabled people to separate their identities from their communications.
Legal and political debates surrounding online privacy often focus on the Fourth Amendment's protection against unreasonable searches and seizures, overlooking the history and future of an equally powerful privacy right: the First Amendment's protection of anonymity. The United States of Anonymous features extensive and engaging interviews with people involved in the highest profile anonymity cases, as well as with those who have benefited from, and been harmed by, anonymous communications. Through these interviews, Kosseff explores how courts have protected anonymity for decades and, likewise, how law and technology have allowed individuals to control how much, if any, identifying information is associated with their communications. From blocking laws that prevent Ku Klux Klan members from wearing masks to restraining Alabama officials from forcing the NAACP to disclose its membership lists, and to refusing companies' requests to unmask online critics, courts have recognized that anonymity is a vital part of our free speech protections.
The United States of Anonymous weighs the tradeoffs between the right to hide identity and the harms of anonymity, concluding that we must maintain a strong, if not absolute, right to anonymous speech.
Related to The United States of Anonymous
Related ebooks
The Twenty-Six Words That Created the Internet Rating: 4 out of 5 stars4/5Privacy in the Modern Age: The Search for Solutions Rating: 4 out of 5 stars4/5None of Your Damn Business: Privacy in the United States from the Gilded Age to the Digital Age Rating: 4 out of 5 stars4/5I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy Rating: 4 out of 5 stars4/5Hacking the Future: Privacy, Identity, and Anonymity on the Web Rating: 3 out of 5 stars3/5Web of Deception: Misinformation on the Internet Rating: 4 out of 5 stars4/5Internet Book Piracy: The Fight to Protect Authors, Publishers, and Our Culture Rating: 1 out of 5 stars1/5Legal Guide to Social Media, Second Edition: Rights and Risks for Businesses, Entrepreneurs, and Influencers Rating: 5 out of 5 stars5/5Privacy’s Blueprint: The Battle to Control the Design of New Technologies Rating: 5 out of 5 stars5/5Delete: The Virtue of Forgetting in the Digital Age Rating: 4 out of 5 stars4/5Storming the Court: How a Band of Yale Law Students Sued the President--and Won Rating: 5 out of 5 stars5/5The Known Citizen: A History of Privacy in Modern America Rating: 5 out of 5 stars5/5Who Owns the News?: A History of Copyright Rating: 0 out of 5 stars0 ratingsA Democratic Conception of Privacy Rating: 0 out of 5 stars0 ratingsThe Curse of Bigness: Antitrust in the New Gilded Age Rating: 4 out of 5 stars4/5Dark Data: Why What You Don’t Know Matters Rating: 3 out of 5 stars3/5SECURITY AND PRIVACY IN AN IT WORLD: Managing and Meeting Online Regulatory Compliance in the 21st Century Rating: 5 out of 5 stars5/5EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition Rating: 0 out of 5 stars0 ratingsNo Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5Internet Governance: The NETmundial Roadmap Rating: 0 out of 5 stars0 ratingsRegulating Cross-Border Data Flows: Issues, Challenges and Impact Rating: 0 out of 5 stars0 ratingsPrivacy in Context: Technology, Policy, and the Integrity of Social Life Rating: 4 out of 5 stars4/5The Right to Privacy Rating: 5 out of 5 stars5/5The Law and Society Reader II Rating: 0 out of 5 stars0 ratingsA Vulnerable System: The History of Information Security in the Computer Age Rating: 0 out of 5 stars0 ratingsNetwork neutrality: From policy to law to regulation Rating: 0 out of 5 stars0 ratingsHow to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks Rating: 4 out of 5 stars4/5Of Privacy and Power: The Transatlantic Struggle over Freedom and Security Rating: 4 out of 5 stars4/5Space Rogue How The Hackers Known As L0pht Changed the World Rating: 0 out of 5 stars0 ratings
Computer & Internet Law For You
Mastering ChatGPT: Business Uses: Podcasts in Print Rating: 2 out of 5 stars2/5Freedom of expression and the internet: Updated and revised 2nd edition Rating: 0 out of 5 stars0 ratingsCybersecurity Essentials: The Beginner's Guide Rating: 5 out of 5 stars5/5Website Law: The Legal Guide for Website Owners and Bloggers Rating: 5 out of 5 stars5/5A Practical Guide to IT Law Rating: 0 out of 5 stars0 ratingsLegal Guide to Social Media, Second Edition: Rights and Risks for Businesses, Entrepreneurs, and Influencers Rating: 5 out of 5 stars5/5Token Economy: How the Web3 reinvents the Internet Rating: 4 out of 5 stars4/5The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsEU GDPR – An international guide to compliance Rating: 0 out of 5 stars0 ratingsSECURITY AND PRIVACY IN AN IT WORLD: Managing and Meeting Online Regulatory Compliance in the 21st Century Rating: 5 out of 5 stars5/5The Dark Web: The Unseen Side of the Internet Rating: 0 out of 5 stars0 ratingsLegal Guide to Social Media: Rights and Risks for Businesses and Entrepreneurs Rating: 0 out of 5 stars0 ratingsIndustry of Anonymity: Inside the Business of Cybercrime Rating: 2 out of 5 stars2/5The ChatGPT Millionaire Hack: Making Money Online has never been this EASY Rating: 0 out of 5 stars0 ratingsSummary of Ready Player One: By Ernest Cline Rating: 0 out of 5 stars0 ratingsPrivacy’s Blueprint: The Battle to Control the Design of New Technologies Rating: 5 out of 5 stars5/5The Ultimate Legal Guide for Bloggers & Website Owners Rating: 0 out of 5 stars0 ratingsEU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide Rating: 5 out of 5 stars5/5The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsThe Ultimate GDPR Practitioner Guide: Demystifying Privacy & Data Protection Rating: 0 out of 5 stars0 ratingsEU General Data Protection Regulation (GDPR), third edition: An Implementation and Compliance Guide Rating: 0 out of 5 stars0 ratingsA Last Minute Hands-on Guide to GDPR Readiness Rating: 0 out of 5 stars0 ratingsISO/IEC 27701:2019: An introduction to privacy information management Rating: 4 out of 5 stars4/5Digital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsIT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition Rating: 5 out of 5 stars5/5Regulating Cross-Border Data Flows: Issues, Challenges and Impact Rating: 0 out of 5 stars0 ratingsLife as a Convicted Sex Offender Rating: 0 out of 5 stars0 ratingsExposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Rating: 0 out of 5 stars0 ratingsDelete: The Virtue of Forgetting in the Digital Age Rating: 4 out of 5 stars4/5
Reviews for The United States of Anonymous
4 ratings1 review
- Rating: 4 out of 5 stars4/5For me, at least, this sophomore effort does not rise to quite the high level of his most excellent The Twenty-Six Words The Created the Internet. Still, it is full of good information and perspective.I don't agree with many of his policy recommendations (truth be told, he's too much of a libertarian for my taste, and thus he tends to be willing to tolerate a great deal of life warping trolling on the Internet to allow for the possibility that there might be a Thomas Paine out there somewhere, who needs someday to publish a blog anonymously). Regardless, he makes sincere efforts to defend his positions, which make them interesting foils to alternative viewpoints.
Book preview
The United States of Anonymous - Jeff Kosseff
THE UNITED STATES OF ANONYMOUS
How the First Amendment Shaped Online Speech
JEFF KOSSEFF
CORNELL UNIVERSITY PRESS
ITHACA AND LONDON
This book is dedicated to the memory of Kurt Wimmer. An extraordinarily generous mentor. A true friend. And an unrelenting believer in free speech and privacy.
CONTENTS
Acknowledgments and Disclaimers
Introduction
Part I. Developing the Right to Anonymity
1. America, the Anonymous
2. Empowering Anonymous Association
3. Empowering Anonymous Speech
4. The Scope of Anonymity Empowerment
5. Antimask
Part II. The Right to Online Anonymity
6. Cybersmear
7. Setting the Rules for Online Anonymity
8. Online Anonymity and Copyright
9. When the Government Wants to Unmask You
10. Anonymity Worldwide
11. Technological Protections for Anonymity
Part III. Living in an Anonymous World
12. Anonymity as a Shield
13. Anonymity as a Sword
Part IV. The Future of Anonymity
14. Real-Name Policies
15. Out in the Open
16. Empowering Anonymity through Privacy Law
Conclusion
Notes
Index
Cover
Title
Dedication
Contents
Acknowledgments and Disclaimers
Introduction
Part I. Developing the Right to Anonymity
1. America, the Anonymous
2. Empowering Anonymous Association
3. Empowering Anonymous Speech
4. The Scope of Anonymity Empowerment
5. Antimask
Part II. The Right to Online Anonymity
6. Cybersmear
7. Setting the Rules for Online Anonymity
8. Online Anonymity and Copyright
9. When the Government Wants to Unmask You
10. Anonymity Worldwide
11. Technological Protections for Anonymity
Part III. Living in an Anonymous World
12. Anonymity as a Shield
13. Anonymity as a Sword
Part IV. The Future of Anonymity
14. Real-Name Policies
15. Out in the Open
16. Empowering Anonymity through Privacy Law
Conclusion
Notes
Index
Copyright
iii
v
vi
vii
viii
ix
x
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
iv
Guide
Cover
Title
Dedication
Contents
Acknowledgments and Disclaimers
Start of Content
Conclusion
Notes
Index
Copyright
ACKNOWLEDGMENTS AND DISCLAIMERS
Thanks to the many people who helped me track down information, served as sounding boards, or reviewed drafts of this book, including Annemarie Bridy, Anupam Chander, Danielle Citron, Gabriella Coleman, Sophia Cope, Joan Donovan, Matthew Dziennik, Timothy Edgar, Tori Smith Ekstrand, Ellis Fenske, Bill Frimel, A. Michael Froomkin, Brian Frye, Mara Gassmann, Cathy Gellis, Carrie Goldberg, Eric Goldman, Jennifer Granick, Megan Gray, Jeff Jarvis, Kate Klonick, Brad Kutner, Lyrissa Lidsky, Mike Masnick, Travis Mayberry, Riana Pfefferkorn, David Post, Alan Rozenshtein, Pamela Samuelson, Paul Schwartz, Paul Syverson, and Michael Vogel. Special thanks to Paul Alan Levy of Public Citizen, whose archive of the early filings from the online subpoena cases were particularly valuable to my research. Thanks also to the incredibly talented and patient librarians in the Library of Congress Manuscript Division and Law Library. As always, I’m thankful for the support of my family, including Crystal Zeh, Julia Kosseff, Chris and Betty Kosseff, and Eileen Peck.
I am deeply grateful to Laura Moraff and Liz Seif for exceptional research assistance and cite checking, and to Karen Laun and Jack Rummel for excellent editing. Thanks to Emily Andrew and her wonderful colleagues at Cornell University Press for helping to shape this book.
Thanks to the many midshipmen and faculty at the United States Naval Academy (Hooyah!) with whom I often discuss and debate the complex and stimulating issues related to online speech.
This book was made possible in part by a grant from Carnegie Corporation of New York during my time as an Andrew Carnegie Fellow. The statements made and views expressed are solely the responsibility of the author and do not represent the Carnegie Corporation of New York, Defense Department, Department of Navy, or Naval Academy.
Although this book focuses on legal issues, this book is not intended to be a substitute for legal advice from a licensed lawyer.
Some of the cases and incidents described in this book involve explicit language. To illustrate the full extent of the harms that people have experienced, this book includes that explicit language.
INTRODUCTION
The review, titled A Scandal!
fit right in on Glassdoor.com. Since 2008, the site has hosted more than fifty million reviews from current, former, and prospective employees of companies worldwide.¹ Many reviews are not flattering, highlighting incompetent management, low salaries, and intolerable working conditions.
Among the claims in the June 21, 2015, review of video game developer Machine Zone was that the Silicon Valley company’s management spreads unreal information to both outside [venture capitalists] and employees
and the company has a terrible work-life balance, except for the platform team, which do not know what to work on.
The reviewer claimed that Machine Zone has invested heavily in the platform team (there are 70–80 engineers),
but after one year, nothing has been done by that team.
The reviewer alleged that Machine Zone’s chief executive said at a meeting that he did not expect products and revenue from the platform team
and that the platform is intended only for attracting investments from [venture capitalists.]
The review concluded with some advice
for the company: Stop telling the investors and employees the unreal information. A company cannot survive forever by cheating!
²
The next day, Machine Zone complained to Glassdoor that the review revealed confidential information regarding Machine Zone’s valuation and fundraising, as well as internal, confidential statements made by Machine Zone’s CEO and management regarding Machine Zone’s confidential and strategic business plans.
The entire review was removed from Glassdoor a day later.³
Still, Machine Zone believed that the poster had violated a nondisclosure agreement required of its employees. About a week after the post, Machine Zone sued the anonymous poster for breach of contract. The complaint alleged that the poster provided details concerning undisclosed technology Machine Zone has and is developing, the stage of development of that technology and the scope of Machine Zone’s investment therein
and that the post quoted Machine Zone’s chief executive’s confidential internal statements concerning that technology,
but the complaint did not specify precisely what confidential information the poster had disclosed.⁴ Machine Zone named the poster John Doe,
and issued a subpoena to Glassdoor for information that would allow Machine Zone to identify the author.⁵
Glassdoor opposed the subpoena, but a California state trial court judge ordered the company to provide the identifying information.⁶ Glassdoor appealed. What made Glassdoor believe that it could defeat a rather standard discovery request?
The First Amendment.
For more than a half century, the Supreme Court has held that the First Amendment provides a right to speak anonymously. Courts have applied this right to the Internet and found a robust—though not absolute—ability for people to control the identifying information they reveal online. Lawsuits such as the one filed by Machine Zone and Machine Zone’s subpoena to Glassdoor are examples of how this constitutional right can be undermined by resourced companies that want to strip individuals of their anonymity as a means of improperly silencing them,
Glassdoor’s lawyers wrote in a brief to the California Court of Appeal.⁷
The appellate judges unanimously agreed that Glassdoor did not have to help Machine Zone unmask the poster, reasoning that Machine Zone failed to demonstrate that the review contained confidential information that violated the nondisclosure agreement.⁸ The rigorous scrutiny that the court applied to the subpoena rested on a line of US Supreme Court cases beginning in the 1950s, which themselves are grounded in the American tradition of anonymous speech dating to the Federalist Papers and colonial pamphleteers. These First Amendment protections have allowed countless John and Jane Does to communicate controversial, intimate, embarrassing, harmful, or even revolutionary ideas online without facing the personal repercussions of being linked to that speech.
Anonymity is deeply rooted in the constitutional values and social norms of the United States. Anonymity has allowed minorities to communicate unpopular political viewpoints, whistleblowers to expose their employers’ illegal schemes, and citizen journalists to document corruption and fraud. Anonymity is also employed for nefarious uses, such as defamation, persistent harassment, and online crimes. The longstanding US tradition of anonymous speech has enabled Americans to often separate their identities from the words and thoughts that they communicate. In this book, I examine how the First Amendment protections, combined with technology that prevents identities from being associated with online activities, have created a culture of anonymity empowerment.
Anonymity is the condition of avoiding identification.
⁹ What does it mean to empower anonymity? Does anonymity empowerment simply mean allowing people to hide their names when they post thoughts online? What about allowing them to wear masks in public? Are they anonymous if they are required to display license plates, which, with some work, might be used to identify them?
My conception of anonymity empowerment is broad. Anonymity empowerment allows people to control what, if any, details about their identity to reveal. It includes, but goes beyond, merely separating a person’s name from that person’s speech or action; anonymity empowerment includes the protection of details that could increase the likelihood of the speaker being identified. Even when we try to separate our identities from our expression, we may leave clues that could lead to our identification. Consider the author of an unsigned political pamphlet who distributes the literature to mailboxes at night. If that author is caught on a surveillance camera while distributing the pamphlets, she may be identified based on her facial features. Still, legal protections can help prevent the local government from forcing her to sign her real name to the pamphlet, because that compelled signature would further increase the chances of her being identified immediately.
The culture of anonymity empowerment includes both true anonymity, when no identifiers are linked to expression or activity, and pseudonymity, when speech or activity is associated with a pen name that does not directly identify the author, but stays with that person over time. (Chapter 6 explores the taxonomy for the different types of online pseudonymity and anonymity.) The culture of anonymity empowerment has been an essential component of American democracy, protecting the ability of citizens to communicate and receive information without fear of persecution or harm.
Part I of this book explores the origins of the legal right to anonymity. The First Amendment right to anonymous speech dates to eighteenth-century England and the American colonies. The nation’s Founders made their case for independence and our indirect democracy in part by circulating anonymous pamphlets and writing inflammatory newspaper columns under pseudonyms. With that history in mind, the US Supreme Court has recognized a qualified right to anonymous speech, striking down laws that require the NAACP to disclose its membership lists and prohibitions on the circulation of anonymous political materials. Lower courts have applied this right by striking down prohibitions on Ku Klux Klan members wearing masks and by protecting whistleblowers’ anonymity in litigation.
Part II examines how courts have applied these First Amendment anonymity values to the Internet. Courts have tried to remain faithful to this First Amendment tradition as they protected anonymity on the Internet. Beginning in the 1990s, companies tried to use the court system to unmask people who criticized their business practices on online bulletin boards (and, if the posters turned out to be employees, they often would be fired). Judges gradually developed a process, rooted in the First Amendment, by which they only would order online service providers to reveal identifying information if the plaintiffs had a particularly strong case and satisfied other requirements. The right to anonymity exists in some other countries, but is especially strong in the United States. These legal rights, however, are not the only protections for anonymity. For instance, Tor, based on a technology developed by the Naval Research Laboratory in the 1990s, allows people to protect their online anonymity. Technology such as Tor, coupled with the First Amendment anonymity safeguards, have fostered substantial protections for those who wish to separate their online words from their identities.
Part III considers how these robust online anonymity protections shape everyday life in the United States. The culture of anonymity empowerment in the United States has enabled citizen journalists, like a privacy blogger with the pseudonym of Dissent Doe, to challenge the powerful in ways they never would have been able to do under their real names. Anonymity has also been a tool in some substantial harms, such as people who ruin the lives of innocent people, hiding enough of their identifying information to at least temporarily avoid prosecution. Anonymity is a blunt instrument that protects not only those who express minority views, but also those who harm and attack others.
Part IV contemplates how to continue to empower anonymity. The First Amendment addresses only government intrusions on free speech; its anonymity protections, like the other First Amendment safeguards, generally do not restrict the actions of private companies. Some platforms require their users to operate under their real names. And technological advancements have not only led to anonymity protections, but also to increased surveillance by the government and the private sector, often making it harder for people to remain truly anonymous. Technologies like facial recognition and geolocation allow companies to have unprecedented access to information that often can easily identify someone. Thus, I argue that to continue the US tradition of anonymity, lawmakers should supplement the First Amendment rights and anonymity technology with robust privacy laws that restrict the ability of private parties and the government to collect, use, and share identifying information.
This book examines many sides of the anonymity debate, including the substantial benefits and costs of a culture that guards anonymity. I ultimately conclude that we must preserve and improve upon the culture of anonymity empowerment, even though the equities are more complex than ever. It is difficult to imagine the American conception of free speech surviving without some anonymity protections. Anonymity allows people to express their views and influence the future. I do not argue for absolute protections for anonymity; even if such a goal were achievable, in extraordinary cases we should pierce the veil of anonymity. Such circumstances are rare, but remedies should be available to combat particularly egregious anonymous online behavior.
Given the wide range of online harms, it might be tempting to call for an end to online anonymity in the United States, such as by imposing real-name requirements that other countries have adopted.¹⁰ Some in the United States have proposed requirements that people register their real names when speaking online.¹¹ I agree with free speech expert Jillian York, who has called such proposals the White Man’s Gambit.
LGBT teenagers, domestic abuse survivors, and other vulnerable groups often are the ones that rely most on anonymity and pseudonymity, York wrote. And anyone with unpopular or dissenting political opinions may choose not to risk their livelihood by identifying with a pseudonym,
she correctly concluded.¹²
As with other free speech and privacy rights, courts and lawmakers should provide balanced protections that capture the benefits of anonymity, while reducing the likelihood of the most dangerous anonymous behavior. This is possible, but it requires a critical examination of the way that courts currently apply First Amendment anonymity protections, as well as new laws to protect the privacy of particularly sensitive information. First, we must understand the historical roots of the longstanding American tradition of anonymity.
Part I
DEVELOPING THE RIGHT TO ANONYMITY
The US Constitution does not expressly guarantee a right to anonymity. Yet many Framers who wrote and negotiated the document had long relied on pseudonyms to persuade the masses and criticize the powerful. Anonymity and pseudonymity undergird American democracy. From colonial pamphleteers to the authors of the Federalist Papers to the Jim Crow–era NAACP, Americans have had good reason to separate their identities from their words and actions.
Even with no mention of anonymity in the Constitution, US courts have recognized a right to anonymous speech, grounded in the First Amendment. This right to anonymous speech is strong, but it has limits. The First Amendment anonymity right—like all of its free speech guarantees—only restricts state action.
This means that the First Amendment restricts the ability of a court, legislature, or government agency from unmasking anonymous speakers. But it does not limit a private company from piercing someone’s anonymity, providing that it does not rely on government resources such as a court subpoena.¹
The First Amendment right to anonymity also is far from absolute. Although courts have recognized that anonymous speech is fundamental to American democracy, they have concluded that in some cases the need to know a speaker’s identity outweighs the chilling effect that compelled disclosure would have on speech.
This part of the book traces the development of the First Amendment right to anonymous speech. It begins by highlighting the anonymous speech that was fundamental to the establishment of America’s constitutional democracy. It then examines the battles over civil rights and political speech, beginning in the 1950s, that led the US Supreme Court to conclude that the First Amendment provides a strong, but limited, right to anonymity. And it assesses how lower courts have applied that right to anonymity in assessing antimask laws intended to curb the activities of the Ku Klux Klan.
1
AMERICA, THE ANONYMOUS
Sir,
the letter began. The submission of a free people to the executive authority of government is no more than a compliance with laws which they themselves have enacted. While the national honour is firmly maintained abroad, and while justice is impartially administered at home, the obedience of the subject will be voluntary, cheerful, and, I might almost say, unlimited.
¹
By contemporary standards, such a letter would be unobjectionable, and likely unnoticed. A paean to self-governance. But this letter was published on January 21, 1769, in London’s Public Advertiser newspaper. At the time, King George III was facing resistance in the colonies, and such a letter reminded the British people of their civil liberties and right to self-determination. The author signed the letter only as Junius.
Junius’s letters are among the most prominent examples of pseudonymous and anonymous speech that proliferated in England and the American colonies throughout the eighteenth century. This history is essential to understanding why US courts recognize a robust First Amendment right to anonymous speech.
Despite his controversial tone, Junius may have escaped the limelight had nobody noticed. But Sir William Draper drew attention to Junius in a response in the Public Advertiser, calling him one of the felonious robbers of private character [who] stab in the dark, without having the courage to sign their real names to their malevolent and wicked productions.
²
Between 1769 and 1772, Public Advertiser publisher Henry Sampson Woodfall would print more than sixty letters from and to Junius (or Philo Junius
), in either the newspaper or a book. Woodfall published these letters with care to not reveal the identity of Junius. In a private letter to Woodfall dated July 15, 1769, Junius wrote that he suspected that Woodfall may need to communicate with him. If that be the case, I beg that you will be particular; and also that you will tell me candidly whether you know or suspect who I am. Direct a letter to Mr. William Middleton to be left at the bar of the New Exchange Coffee-house on Monday, as early as you think proper.
³
John Mason Good, the editor of an 1812 compilation of Junius’s letters, wrote of the various locations where Junius asked Woodfall and other correspondents to leave letters to him, and the likelihood that Junius used his own intermediaries to safeguard his identity. That a variety of schemes were invented and actually in motion to detect him there can be no doubt,
Good wrote, but the extreme vigilance he at all times evinced, and the honourable forbearance of Mr Woodfall, enabled him to baffle every effort, and to persevere in his concealment to the last.
⁴
In a September 18, 1771, letter to radical politician John Wilkes, Junius wrote of the value of anonymity to his ability to deliver his message. Besides every personal consideration, if I were known, I could no longer be an useful servant to the public,
he wrote. At present there is something oracular in the delivery of my opinions. I speak from a recess which no human curiosity can penetrate, and darkness, we are told, is one source of the sublime. The mystery of Junius increases his importance.
⁵
But Junius clearly was also concerned that he might face retaliation for his strident views. In a private letter to Woodfall, Junius asked Woodfall to deliver a message to another man, but to send it in Woodfall’s own handwriting to avoid Junius’s handwriting being too commonly seen.
I must be more cautious than ever,
Junius wrote. I am sure I should not survive a discovery three days; or, if I did, they would attaint me by bill.
⁶ Junius asked Woodfall to change the drop-off point for their communications.⁷
Indeed, Junius anonymously attacked some of the most powerful men in England. Among the most frequent targets was the prime minister, the Third Duke of Grafton. The injuries you have done this country are such as demand not only redress, but vengeance,
Junius wrote in a public letter to the prime minister, published by the newspaper on July 8, 1769.⁸ Junius also attacked the prime minister’s personal life. Did not the duke of Grafton frequently lead his mistress into public, and even place her at the head of his table, as if he had pulled down an ancient temple of Venus, and could bury all decency and shame under the ruins?
Junius wrote in a June 12, 1769, letter.⁹ The Duke of Grafton resigned as prime minister about six months later, and scholars attributed his downfall at least partly to Junius’s relentless criticism. Junius’s criticism of the Duke of Grafton exposed his incompetency and profligacy,
Fred H. Peterson wrote.¹⁰
Junius also took up defense of the inhabitants of the American colonies, including their opposition to the duties imposed on tea. It is not pretended that the continuation of the tea duty is to produce any direct benefit whatsoever to the mother country,
Junius wrote. What is it then, but an odious, unprofitable exertion of a speculative right, and fixing a badge of slavery upon the Americans, without service to their masters? But it has pleased God to give us a ministry and a parliament, who are neither to be persuaded by argument, nor instructed by experience.
¹¹
Junius’s letters, seeking to improve the political system in England, had immediate impact. All England marvelled and talked about these letters with mingled fear and surprise; those in the public service were in abject terror of being flayed or of seeing their actions dissected and held up to ridicule and scorn,
Peterson wrote.¹²
Junius’s most controversial letter, however, was not directed to the Duke of Grafton. Addressed to the king and published in the Public Advertiser on December 19, 1769, it began:
Sir,
It is the misfortune of your life, and originally the cause of every reproach and distress which has attended your government, that you should never have been acquainted with the language of truth, until you heard it in the complaints of your people. It is not, however, too late to correct the error of your education. We are still inclined to make an indulgent allowance for the pernicious lessons you received in your youth, and to form the most sanguine hopes from the natural benevolence of your disposition.¹³
Woodfall printed 1,750 additional copies of the newspaper containing the letter to the king, and Horace Walpole deemed the letter the most daring insult ever offered to a prince but in times of open rebellion.
¹⁴ Within days of the publication, a prosecutor began investigating whether the publication was criminally libel. Junius wrote to reassure Woodfall, advising him to stand firm (I mean with all the humble appearances of contrition). If you trim or falter, you will lose friends without gaining others.
¹⁵
Six months later, Woodfall stood trial for seditious libel. According to an account of the trial in the Universal Magazine, the prosecutor told the jury that the letter in question was totally and universally abhorred.
¹⁶ Woodfall’s lawyer argued that Woodfall published it with the truly laudable motive of informing his fellow-subjects
and that the public acts of Government often demanded public scrutiny,
the magazine reported.¹⁷
The judge, Lord Mansfield, instructed the jury that they needed to consider two points: first, the printing and publishing the paper in question,
and second, the sense and meaning of it.
¹⁸ Lord Mansfield limited their inquiry to those two facts, and instructed the jury that it was unnecessary to make legal judgments about libel. In criminal libel prosecutions, Lord Mansfield instructed the jury, it was immaterial whether the publication be false or true; that it is no defence to say it is true, because it is a breach of the peace, and therefore criminal.
¹⁹ After more than nine hours of deliberation, the jury delivered its verdict, guilty of printing and publishing Only.
²⁰
The limited verdict caused Lord Mansfield to order a new trial. But there was a problem: the jury foreman from the first trial had apparently destroyed the original copy of the newspaper, making it difficult for the prosecutor to prove publication. When the prosecutor raised this concern with Lord Mansfield, the judge replied, That is not my fault, Mr. Attorney
and ended the trial.²¹
Although Woodfall escaped punishment for Junius’s letter, he endured great fear and legal expense just because he published an anonymous letter that criticized the king. The actual author (or authors)—who operated under the pseudonymous construct of Junius—managed to survive the trial without being prosecuted or unmasked, thanks to his careful efforts to conceal his identity. Still, after Woodfall’s trial, Junius could not help but publish a long letter in which he eviscerated Lord Mansfield’s character. Our language has no term of reproach, the mind has no idea of detestation, which has not already been happily applied to you, and exhausted,
Junius wrote.²²
His steps to safeguard his identity worked. More than two centuries after Junius shook the power structure in England, there still is no entirely uncontested consensus as to who he was. Historians have persisted in seeking any clues, with many certain that they identified Junius. Edward J. White counted twenty-three different men being named at one time or another as the authors of Junius’s letters, including Thomas Paine, Treasury department clerk Charles Lloyd, George Sackville, John Wilkes, Edmund Burke, and Pitt of Chatham.²³
The person most frequently speculated to be Junius is Sir Philip Francis. In 1871, a handwriting expert asserted that Junius’s letters were written by Francis, a Parliament member. Yet later that year, Herman Merivale, editor of Francis’s memoirs, wrote that any handwriting similarities do not necessarily mean that Francis was Junius. It is still open to contend, for those who love a difficult cause, that the author may have been some great personage, who employed the penmanship of Francis,
Merivale wrote.²⁴
Merivale’s hypothetical would require Junius to have taken great operational precautions to secure his anonymity. That is not impossible, particularly given Junius’s repeated statements to Woodfall and Wilkes to safeguard his anonymity. Even if Francis were Junius, the more confident attempts at attribution did not come until about a hundred years after Woodfall published Junius’s letters. Either way, Junius’s anonymity safeguards worked.
And these protections were essential to Junius’s ability to question England’s most powerful men, at a time when free speech protections were far less robust in the country than they are today. As Lord David Edmond Neuberger, president of the Supreme Court of the United Kingdom, observed in a 2014 speech, Junius was able to make criticisms of the powerful for which others of his time faced prosecution,
and offered a voice of firm if sometimes scurrilous criticism, prompting both political and legal change.
²⁵
Based on Junius’s own letters and the impact that they had, we can deduce many potential motivations for his seeking anonymity. These motivations apply not only in eighteenth-century England, but also in the modern disputes over online anonymity in the United States.
First is the Legal Motivation for anonymity. Exposure of his identity could lead to substantial criminal or civil liability for Junius. He had good reason to avoid the same criminal prosecution that Woodfall faced merely for publishing his letters.
Second is the Safety Motivation. Junius may have faced personal retaliation, such as being physically attacked, for criticizing some of the most powerful people in England. His opponents may have destroyed his property, or harmed his family. Junius’s private letters suggested that he doubted whether he could survive unmasking. As Victoria Smith Ekstrand wrote in a thorough analysis of the various reasons for anonymity, there are cases in which the message is often deemed critical to circulate, but so controversial that having the author’s name attached would put the author in some kind of danger, either a physical threat or a serious threat to one’s reputation.
²⁶
Third is the Economic Motivation. Depending on his occupation, Junius may have lost his job if his name had been publicly associated with his writing. If Junius operated his own business, he may have faced a decline in revenues due to the controversy.
Fourth is the Privacy Motivation. Junius may have wanted to avoid public attention. Robert Natelson wrote that an eighteenth-century author might wish to participate in public life in some minimal way (e.g., by writing a letter or helping to publish a pamphlet) without exposing himself and his family to full ‘public figure’ status.
²⁷ Anonymity and privacy are separate concepts,²⁸ but protecting privacy can help to protect anonymity, and vice versa. The privacy scholar Helen Nissenbaum wrote in 1999 that the value of anonymity lies not in the capacity to be unnamed, but in the possibility of acting or participating while remaining out of reach, remaining unreachable. Being unreachable means that no-one will come knocking on your door demanding explanations, apologies, answerability, punishment or payment.
²⁹ Junius may have wanted to separate his private life from his very public statements and the surrounding controversy. Junius appeared to consider his identity to be deeply private information, and safeguarding that information may have been essential to his protection of his right to be let alone.
Fifth is the Speech Motivation. His identity may have distracted readers from the content of his message, which was strong enough to upset the powerful and cause political change. For instance, his opponents may have accused Junius of making his arguments due to personal economic interests or grudges. By maintaining his pseudonymity, Junius forced his readers to focus on the substance of his arguments. Likewise, as Junius himself suggested, the mystery of Junius’s identity may have drawn more attention to his writing. Had the writings been linked to the name of a politician or writer, they might not have had the same allure. As Ekstrand observed, the rhetorical power of anonymous speech is significant.
³⁰
Sixth is the Power Motivation.³¹ By remaining anonymous, Junius had tremendous influence that he likely could not have had if he were forced to associate his identity with his words. Without anonymity, Junius may not have felt free to speak out against the king and others, so he simply would not have spoken at all. Because he was able to speak, Junius used his words to shape public opinion among the most powerful—and dangerous—men in England. For Junius and so many other dissidents, anonymity affords power that they otherwise never would have.
Junius may be one of the most notorious pseudonymous writers of eighteenth-century England—or, for that matter, of all time—but pseudonymous and anonymous writing was common then, and it was a thorn in the side of the monarchy. Joseph Addison, an English playwright and member of Parliament, wrote in 1712 of a proposal to oblige every Person that writes a Book, or a Paper, to swear himself the Author of it, and enter down in a publick Register his Name and Place of Abode.
³²
Writing in his daily publication, The Spectator, Addison predicted that such an identification requirement would, indeed, eliminate printed Scandal,
but it would have far more negative consequences. But it is to be feared, that such an Expedient would not only destroy Scandal, but Learning,
Addison wrote. It would operate promiscuously, and root up the Corn and Tares together.
Few Works of Genius,
Addison observed, are initially associated with their authors’ real names. "The Writer generally makes a Tryal of them in the World before he owns them; and, I