Social Media

Fi-ARRR-e & Fury: Why Even Reading the Pirated Copy of Michael Wolff’s New Book Is Probably Copyright Infringement

By Tim Joyce, MJLST EIC-Emeritus

 

THE SITUATION

Lately I’ve seen several Facebook links to a pirated copy of Fire & Fury: Inside the Trump White House, the juicy Michael Wolff expose documenting the first nine months of the President’s tenure. The book reportedly gives deep, behind-the-scenes perspectives on many of Mr. Trump’s most controversial actions, including firing James Comey and accusing President Obama of wiretapping Trump Tower.

 

It was therefore not surprising when Trump lawyers slapped a cease & desist letter on Wolff and his publisher. While there are probably volumes yet to be written about the merits of those claims (in my humble opinion: “sorry, bros, that’s not how defamation of a public figure works”), this blog post deals with the copyright implications of sharing and reading the pirated copy of the book, and the ethical quandaries it creates. I’ll start with the straightforward part.

 

THE APPLICABLE LAW

First, it should almost go without saying that the person who initially created the PDF copy of the 300+ page book broke the law. (Full disclosure: I did click on the Google link, but only to verify that it was indeed the book and not just a cover page. It was. Even including the page with copyright information!) I’ll briefly connect the dots for any copyright-novices reading along:

 

    • Wolff is the “author” of the book, a “literary work” that constitutes an “original works of authorship fixed in any tangible medium of expression” [see 17 USC 102’].
    • As the author, one of his copyrights is to control … well … copying. The US Code calls that “reproduction” [see 17 USC 106].
    • He also gets exclusive right to “display” the literary work “by means of a film, slide, television image, or any other device or process” [see 17 USC 101]. Basically, he controls display in any medium like, say, via a Google Drive folder.
    • Unauthorized reproduction, display, and/or distribution is called “infringement” [see 17 USC 501]. There are several specific exceptions carved into the copyright code for different types of creative works, uses, audiences, and other situations. But this doesn’t fall into one of those exceptions.

 

  • So, the anonymous infringer has broken the law.

 

  • [It’s not clear, yet, whether this person is also a criminal under 17 USC 506, because I haven’t seen any evidence of fraudulent intent or acting “for purposes of commercial advantage or private financial gain.”]

 

Next, anyone who downloads a copy of the book onto their smartphone or laptop is also an infringer. The same analysis applies as above, only with a different starting point. The underlying material’s copyright is still held by Wolff as the author. Downloading creates a “reproduction,” which is still unauthorized by the copyright owner. Unauthorized exercise of rights held exclusively by the author + no applicable exceptions = infringement.

 

Third, I found myself stuck as to whether I, as a person who had intentionally clicked through into the Google Drive hosting the PDF file, had also technically violated copyright law. Here, I hadn’t downloaded, but merely clicked the link which launched the PDF in a new Chrome tab. The issue I got hung up on was whether that had created a “copy,” that is a “material objects … in which a work is fixed by any method now known or later developed, and from which the work can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.” [17 USC 101]

 

Computer reproductions are tricky, in part because US courts lately haven’t exactly given clear guidance on the matter. (Because I was curious — In Europe and the UK, it seems like there’s an exception for temporary virtual copies, but only when incidental to lawful uses.) There’s some debate as to whether it’s infringement if only the computer is reading the file, and for a purpose different than perceiving the artistic expression. (You may remember the Google Books cases…) However, when it’s humans doing the reading, that “purpose of the copying” argument seems to fall by the wayside.

 

Cases like  Cartoon Network v. CSC Holdings have attempted to solve the problem of temporary copies (as when a new browser window opens), but the outcome there (i.e., temporary copies = ok) was based in part on the fact that the streaming service being sued had the right to air the media in question. Their copy-making was merely for the purposes of increasing speed and reducing buffering for their paid subscribers. Here, where the right to distribute the work is decidedly absent, the outcome seems like it should be the opposite. There may be a case out there that deals squarely with this situation, but it’s been awhile since copyright class (yay, graduation!) and I don’t have free access to Westlaw anymore. It’s the best I could do in an afternoon.

 

Of course, an efficient solution here would be to first crack down on the entities and individuals that first make the infringement possible – ISPs and content distributors. The Digital Millennium Copyright Act already gives copyright owners a process to make Facebook take bootleg copies of their stuff down. But that only solves half the problem, in my opinion. We have to reconcile our individual ethics of infringement too.

 

ETHICAL ISSUES, FOR ARTISTS IN PARTICULAR

One of the more troubling aspects of this pirateering that I saw was that the link-shares came from people who make their living in the arts. These are the folks who–rightly, in my opinion–rail against potential “employers” offering “exposure” instead of cold hard cash when they agree to perform. To expect to be paid for your art, while at the same time sharing an illegal copy of someone else’s, is logically inconsistent to me.

 

As a former theater actor and director (read: professional almost-broke person) myself, I can understand the desire to save a few dollars by reading the pirated copy. The economics of making a living performing are tough – often you agree to take certain very-low-paying artistic jobs as loss-leaders toward future jobs. But I have only met a very few of us willing to perform for free, and even fewer who would tolerate rehearsing with the promise of pay only to be stiffed after the performance is done. That’s essentially what’s happening when folks share this bootleg copy of Michael Wolff’s book.

 

I’ve heard some relativistic views on the matter, saying that THIS book containing THIS information is so important NOW, that a little infringement shouldn’t matter. But you could argue that Hamilton, the hit musical about the founding of our nation and government, has equally urgent messages regarding democracy, totalitarianism, individual rights, etc. Should anyone, therefore, be allowed to just walk into the theater and see the show without paying? Should the cast be forced to continue performing even when there is no longer ticket revenue flowing to pay for their efforts? I say that in order to protect justice at all times, we have to protect justice this time.

 

tl;dr

Creating, downloading, and possibly even just viewing the bootleg copy of Michael Wolff’s book linking around Facebook is copyright infringement. We cannot violate this author’s rights now if we expect to have our artistic rights protected tomorrow.

 

Contact Me!

These were just some quick thoughts, and I’m sure there’s more to say on the matter. If you’d like to discuss any copyright issues further, I’m all ears.


Fi-ARRR-e & Fury: Why Even Reading the Pirated Copy of Michael Wolff’s New Book Is Probably Copyright Infringement

By Tim Joyce, MJLST EIC-Emeritus

 

THE SITUATION

Lately I’ve seen several Facebook links to a pirated copy of Fire & Fury: Inside the Trump White House, the juicy Michael Wolff expose documenting the first nine months of the President’s tenure. The book reportedly gives deep, behind-the-scenes perspectives on many of Mr. Trump’s most controversial actions, including firing James Comey and accusing President Obama of wiretapping Trump Tower.

 

It was therefore not surprising when Trump lawyers slapped a cease & desist letter on Wolff and his publisher. While there are probably volumes yet to be written about the merits of those claims (in my humble opinion: “sorry, bros, that’s not how defamation of a public figure works”), this blog post deals with the copyright implications of sharing and reading the pirated copy of the book, and the ethical quandaries it creates. I’ll start with the straightforward part.

 

THE APPLICABLE LAW

First, it should almost go without saying that the person who initially created the PDF copy of the 300+ page book broke the law. (Full disclosure: I did click on the Google link, but only to verify that it was indeed the book and not just a cover page. It was. Even including the page with copyright information!) I’ll briefly connect the dots for any copyright-novices reading along:

 

    • Wolff is the “author” of the book, a “literary work” that constitutes an “original works of authorship fixed in any tangible medium of expression” [see 17 USC 102’].
    • As the author, one of his copyrights is to control … well … copying. The US Code calls that “reproduction” [see 17 USC 106].
    • He also gets exclusive right to “display” the literary work “by means of a film, slide, television image, or any other device or process” [see 17 USC 101]. Basically, he controls display in any medium like, say, via a Google Drive folder.
    • Unauthorized reproduction, display, and/or distribution is called “infringement” [see 17 USC 501]. There are several specific exceptions carved into the copyright code for different types of creative works, uses, audiences, and other situations. But this doesn’t fall into one of those exceptions.

 

  • So, the anonymous infringer has broken the law.

 

  • [It’s not clear, yet, whether this person is also a criminal under 17 USC 506, because I haven’t seen any evidence of fraudulent intent or acting “for purposes of commercial advantage or private financial gain.”]

 

Next, anyone who downloads a copy of the book onto their smartphone or laptop is also an infringer. The same analysis applies as above, only with a different starting point. The underlying material’s copyright is still held by Wolff as the author. Downloading creates a “reproduction,” which is still unauthorized by the copyright owner. Unauthorized exercise of rights held exclusively by the author + no applicable exceptions = infringement.

 

Third, I found myself stuck as to whether I, as a person who had intentionally clicked through into the Google Drive hosting the PDF file, had also technically violated copyright law. Here, I hadn’t downloaded, but merely clicked the link which launched the PDF in a new Chrome tab. The issue I got hung up on was whether that had created a “copy,” that is a “material objects … in which a work is fixed by any method now known or later developed, and from which the work can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.” [17 USC 101]

 

Computer reproductions are tricky, in part because US courts lately haven’t exactly given clear guidance on the matter. (Because I was curious — In Europe and the UK, it seems like there’s an exception for temporary virtual copies, but only when incidental to lawful uses.) There’s some debate as to whether it’s infringement if only the computer is reading the file, and for a purpose different than perceiving the artistic expression. (You may remember the Google Books cases…) However, when it’s humans doing the reading, that “purpose of the copying” argument seems to fall by the wayside.

 

Cases like  Cartoon Network v. CSC Holdings have attempted to solve the problem of temporary copies (as when a new browser window opens), but the outcome there (i.e., temporary copies = ok) was based in part on the fact that the streaming service being sued had the right to air the media in question. Their copy-making was merely for the purposes of increasing speed and reducing buffering for their paid subscribers. Here, where the right to distribute the work is decidedly absent, the outcome seems like it should be the opposite. There may be a case out there that deals squarely with this situation, but it’s been awhile since copyright class (yay, graduation!) and I don’t have free access to Westlaw anymore. It’s the best I could do in an afternoon.

 

Of course, an efficient solution here would be to first crack down on the entities and individuals that first make the infringement possible – ISPs and content distributors. The Digital Millennium Copyright Act already gives copyright owners a process to make Facebook take bootleg copies of their stuff down. But that only solves half the problem, in my opinion. We have to reconcile our individual ethics of infringement too.

 

ETHICAL ISSUES, FOR ARTISTS IN PARTICULAR

One of the more troubling aspects of this pirateering that I saw was that the link-shares came from people who make their living in the arts. These are the folks who–rightly, in my opinion–rail against potential “employers” offering “exposure” instead of cold hard cash when they agree to perform. To expect to be paid for your art, while at the same time sharing an illegal copy of someone else’s, is logically inconsistent to me.

 

As a former theater actor and director (read: professional almost-broke person) myself, I can understand the desire to save a few dollars by reading the pirated copy. The economics of making a living performing are tough – often you agree to take certain very-low-paying artistic jobs as loss-leaders toward future jobs. But I have only met a very few of us willing to perform for free, and even fewer who would tolerate rehearsing with the promise of pay only to be stiffed after the performance is done. That’s essentially what’s happening when folks share this bootleg copy of Michael Wolff’s book.

 

I’ve heard some relativistic views on the matter, saying that THIS book containing THIS information is so important NOW, that a little infringement shouldn’t matter. But you could argue that Hamilton, the hit musical about the founding of our nation and government, has equally urgent messages regarding democracy, totalitarianism, individual rights, etc. Should anyone, therefore, be allowed to just walk into the theater and see the show without paying? Should the cast be forced to continue performing even when there is no longer ticket revenue flowing to pay for their efforts? I say that in order to protect justice at all times, we have to protect justice this time.

 

tl;dr

Creating, downloading, and possibly even just viewing the bootleg copy of Michael Wolff’s book linking around Facebook is copyright infringement. We cannot violate this author’s rights now if we expect to have our artistic rights protected tomorrow.

 

Contact Me!

These were just some quick thoughts, and I’m sure there’s more to say on the matter. If you’d like to discuss any copyright issues further, I’m all ears.


Sex Offenders on Social Media?!

Young Choo, MJLST Staffer

 

A sex offender’s access to social media is problematic nowadays on social media, especially considering the vast amount of dating apps you can use to meet other users. Crimes committed through the use of dating apps (such as Tinder and Grindr) include rape, child sex grooming and attempted murder. These statistics have increased seven-fold in just two years. Although sex offenders are required to register with the State, and individuals can get accesses to each state’s sex offender registry online, there are few laws and regulations designed to combat this specific situation in which minors or other young adults can become victims of sex crimes. A new dating app called “Gastby” was introduced to resolve this situation. When new users sign up for Gatsby, they’re put through a criminal background check, which includes sex offender registries.

Should sex-offenders even be allowed to get access to the social media? Recent Supreme Court case, Packingham v. North Carolina, decided that a North Carolina law preventing sex offenders getting access to a commercial social networking web site is unconstitutional due to the First Amendment’s Free Speech Clause. The Court emphasized the fact that accessing to the social media is vital for citizens in the exercise of First Amendment rights. The North Carolina law was struck down mainly because it wasn’t “narrowly tailored to serve a significant governmental interest,” but the Court noted that this decision does not prevent a State from enacting more specific laws to address and ban certain activity of sex offender on social media.

The new online dating app, Gatsby, cannot be the only solution to the current situation. There are already an estimated 50 million people using Tinder in the world and the users do not have a method of determining whether their matches may be sex offenders. New laws narrowly-tailored to address the situation, perhaps requiring dating apps to do background checks on users or an alternative method to prevent sex offenders from utilizing the dating app, might be necessary to reduce the increasing number of crimes through the dating apps.


Congress, Google Clash Over Sex-Trafficking Liability Law

Samuel Louwagie, MJLST Staffer

Should web companies be held liable when users engage in criminal sex trafficking on the platforms they provide? Members of both political parties in Congress are pushing to make the answer to that question yes, over the opposition of tech giants like Google.

The Communications Decency Act was enacted in 1934. In the early 1990s, as the Internet went live, Congress added Section 230 to the act. That provision protected providers of web platforms from civil liability for content posted by users of those platforms. The act states that in order to “promote the continued development of the internet . . . No provider of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” That protection, according to the ACLU, “defines Internet culture as we know it.”  

Earlier this month, Congress debated an amendment to Section 230 called the Stop Enabling Sex Traffickers Act of 2017. The act would remove that protection from web platforms that knowingly allow sex trafficking to take place. The proposal comes after the First Circuit Court of Appeals held in March of 2016 that even though Backpage.com played a role in trafficking underage girls, section 230 protected it from liability. Sen. Rob Portman, a co-sponsor of the bill, wrote that it is Congress’ “responsibility to change this law” while “women and children have . . . their most basic rights stripped from them.” And even some tech companies, such as Oracle, have supported the bill.

Google, meanwhile, has resisted such emotional pleas. Its lobbyists have argued that Backpage.com could be criminally prosecuted, and that to remove core protections from internet companies will damage the free nature of the web. Critics, such as New York Times columnist Nicholas Kristof, argue the Stop Enabling Sex Traffickers Act was crafted “exceedingly narrowly to target those intentionally engaged in trafficking children.”

The bill has bipartisan support and appears to be gaining steam. The Internet Association, a trade group including Google and Facebook, expressed a willingness at a Congressional hearing to supporting “targeted amendments” to the Communications Decency Act. Whether Google likes it or not, eventually platforms will be at legal risk if they don’t police their content for sex trafficking.


Faux News vs. Freedom of Speech?

Tyler Hartney, MJLST Staffer

This election season has produced a lot of jokes on social media. Some of the jokes are funny and other jokes lack an obvious punch line. Multiple outlets are now reporting that this fake news may’ve influenced voters in the 2016 presidential election. Both Facebook and Google have made conscious efforts to reduce the appearance of these fake news stories on their sites in attempt to reduce the click bait, and thus the revenue streams, of these faux news outlets. With the expansion of the use of technology and social media, these types of stories become of a relevant circulation to possibly warrant misinformation being spread on a massive level. Is this like screaming “fire” in a crowded theatre? How biased would filtering this speech become? Facebook was blown to shreds by the media when it was found to have suppressed conservative news outlets, but as a private business it had every right to do so. Experts are now saying that the Russian government made efforts to help spread this fake news to help Donald Trump win the presidency.

First, the only entity that cannot place limits on speech is the state. If Facebook or Google chose to filter the news broadcasted on each site, users still do not have a claim against the entity; this would be a considered a private business choice. These faux news outlets circulate stories that have appeared to be, at times, intentionally and willfully misleading. Is this similar to a man shouting “fire” in a crowded theatre? In essence, the man in the aforementioned commonly used hypothetical knows that his statement is false and that it has a high probability of inciting panic, but the general public will not be aware of the validity of his statement and will have no time to check. The second part of that statement is key. The general public would not hypothetically have time to check the validity of the statement. If government were to begin passing regulations and cracking down on the circulation and creation of these hoax news stories, it would have to prove that these stories create a “clear and present danger” that will bring significant troubles that Congress has the right to protect the public from. This standard was created in the Supreme Court’s decision in Schenck v. United States. The government will not likely be capable of banning these types of faux news stories because, while some may consider these stories dangerous, the audience has the capability of validating the content from these untrusted sources.

Even contemplating government action under this circumstance would require the state to walk a fine line with freedom of political expression. What is humorous and what is dangerously misleading? For example, The Onion posted an article entitled “Biden Forges Presidents Signature Executive Order 54723,” clearly this is a joke; however, it holds the potential ability to insight fury from those who might believe it and create a misinformed public that might use this as material information when casting a ballot. This Onion article is not notably different from another post entitled “FBI AGENT SUSPECTED IN HILLARY EMAIL LEAKS FOUND DEAD IN APPARENT MURDER-SUICIDE” published by the Denver Guardian. With the same potential to mislead the public, there wouldn’t really be any identifiable differences between the two stories. This area of gray would make it extremely difficult to methodically stop the production of fake news while ensuring the protection of the comedic parody news. The only way to protect the public from the dangers of these stories that are apparently being pushed on to the American voting public by the Russian government in an attempt to influence election outcomes is to educate the public on how to verify online accounts.


The Best Process for the Best Evidence

Mary Riverso, MJLST Staffer

Social networking sites are now an integral part of American society. Almost everyone and everything has a profile, typically on multiple platforms. And people like to use them. Companies like having direct contact with their customers, media outlets like having access to viewer opinions, and people like to document their personal lives.

However, as the use of social-networking continues to increase in scope, the information placed in the public sphere is playing an increasingly centralized role in investigations and litigation. Many police departments conduct regular surveillance of public social media posts in their communities because these sites have become conduits for crimes and other wrongful behavior. As a result, litigants increasingly seek to offer records of statements made on social media sites as evidence. So how exactly can content from social media be used as evidence? Ira Robbins explores this issue in her article Writings on the Wall: The Need for an Authorship-Centric Approach to the Authentication of Social-Networking Evidence. The main hurdle is one of reliability. In order to be admitted as evidence, the source of information must be authentic so that a fact-finder may rely on the source and ultimately its content as trustworthy and accurate. However, social media sites are particularly susceptible to forgery, hacking, and alterations. Without a confession, it is often difficult to determine who is the actual author responsible for posting the content.

Courts grapple with this issue – some allow social media evidence only when the record establishes distinctive characteristics of the particular website under Federal Rule of Evidence 901(b)(4), other courts believe authentication is a relatively low bar and as long as the witness testifies to the process by which the record was obtained, then it is ultimately for the jury to determine the credibility of the content. But is that fair? If evidence is supposed to assist the fact-finder in “ascertaining the truth and securing a just determination,” should it not be of utmost importance to determine the author of the content? Is not a main purpose of authentication to attribute the content to the proper author? Social media records may well be the best evidence against a defendant, but without an authorship-centric approach, the current path to their admissibility may not yet be the best process.


Are News Aggregators Getting Their Fair Share of Fair Use?

Mickey Stevens, MJLST Note & Comment Editor

Fair use is an affirmative defense to copyright that permits the use of copyrighted materials without the author’s permission when doing so fulfills copyright’s goal of promoting the progress of science and useful arts. One factor that courts analyze to determine whether or not fair use applies is whether the use is of a commercial nature or if it is for nonprofit educational purposes—in other words, whether the use is “transformative.” Recently, courts have had to determine whether automatic news aggregators can invoke the fair use defense against claims of copyright infringement. An automatic news aggregator scrapes the Internet and republishes pieces of the original source without adding commentary to the original works.

In Spring 2014, MJLST published “Associated Press v. Meltwater: Are Courts Being Fair to News Aggregators?” by Dylan J. Quinn. That article discussed the Meltwater case, in which the United States District Court for the Southern District of New York held that Meltwater—an automatic news aggregator—could not invoke the defense of fair use because its use of copyrighted works was not “transformative.” Meltwater argued that it should be treated like search engines, whose actions do constitute fair use. The court rejected this argument, stating that Meltwater customers were using the news aggregator as a substitute for the original work, instead of clicking through to the original article like a search engine.

In his article, Quinn argued that the Meltwater court’s interpretation of “transformative” was too narrow, and that such an interpretation made an untenable distinction between search engines and automatic news aggregators who function similarly. Quinn asked, “[W]hat if a news aggregator can show that its commercial consumers only use the snippets for monitoring how frequently it is mentioned in the media and by whom? Is that not a different ‘use’?” Well, the recent case of Fox News Network, LLC v. TVEyes, Inc. presented a dispute similar to Quinn’s hypothetical that might indicate support for his argument.

In TVEyes, Fox News claimed that TVEyes, a media-monitoring service that aggregated news reports into a searchable database, had infringed copyrighted clips of Fox News programs. The TVEyes database allowed subscribers to track when, where, and how words of interest are used in the media—the type of monitoring that Quinn argued should constitute a “transformative” use. In a 2014 ruling, the court held that TVEyes’ search engine that displayed clips was transformative because it converted the original work into a research tool by enabling subscribers to research, criticize, and comment. 43 F. Supp. 3d 379 (S.D.N.Y. 2014). In a 2015 decision, the court analyzed a few specific features of the TVEyes service, including an archiving function and a date-time search function. 2015 WL 5025274 (S.D.N.Y. Aug. 25, 2015). The court held that the archiving feature constituted fair use because it allowed subscribers to detect patterns and trends and save clips for later research and commentary. However, the court held that the date-time search function (allowing users to search for video clips by date and time of airing) was not fair use. The court reasoned that users who have date and time information could easily obtain that clip from the copyright holder or licensing agents (e.g. by buying a DVD).

While the court’s decision did point out that the video clip database was different in kind from that of a collection of print news articles, the TVEyes decisions show that the court may now be willing to allow automatic news aggregators to invoke the fair use defense when they can show that their collection of print news articles enables consumers to track patterns and trends in print news articles for research, criticism, and commentary. Thus, the TVEyes decisions may lead the court to reconsider the distinction between search engines and automatic news aggregators established in Meltwater that puts news aggregators at a disadvantage when it comes to fair use.


The Limits of Free Speech

Paul Overbee, MJLST Editor

A large portion of society does not put much thought into what they post on the internet. From tweets and status updates to YouTube comments and message board activities, many individuals post on impulse without regard to how their messages may be interpreted by a wider audience. Anthony Elonis is just one of many internet users that are coming to terms with the consequences of their online activity. Oddly enough, by posting on Facebook Mr. Elonis took the first steps that ultimately led him to the Supreme Court. The court is now considering whether the posts are simply a venting of frustration as Mr. Elonis claims, or whether the posts constitute a “true threat” that will direct Mr. Elonis directly to jail.

The incident in question began a week after Tara Elonis obtained a protective order against her husband. Upon receiving the order, Mr. Elonis posted to Facebook, “Fold up your PFA [protection-from-abuse order] and put it in your pocket […] Is it thick enough to stop a bullet?” According the Mr. Elonis, he was trying to emulate the rhyming styles of the popular rapper Eminem. At a later date, an FBI agent visited Mr. Elonis regarding his threatening posts about his wife. Soon after the agent left, Mr. Elonis again returned to Facebook to state “Little agent lady stood so close, took all the strength I had not to turn the [expletive] ghost. Pull my knife, flick my wrist and slit her throat.”

Due to these posts, Mr. Elonis was sentenced to nearly four years in federal prison, and Elonis v. United States is now in front of the Supreme Court. Typical state statutes define these “true threats” without any regard to whether the speaker actually intended to cause such terror. For example, Minnesota’s “terroristic threats” statute includes “reckless disregard of the risk of causing such terror.” Some states allow for a showing of “transitory anger” to overcome a “true threat” charge. This type of defense arises where the defendant’s actions are short-lived, have no intent to terrorize, and clearly are tied to an inciting event that caused the anger.

The Supreme Court’s decision will carry wide First Amendment implications for free speech rights and artistic expression. A decision that comes down harshly on Mr. Elonis may have the effect of chilling speech on the internet. The difference between a serious statement and one that is joking many times depends on the point of view of the reader. Many would rather stop their posting on the internet instead of risk having their words misinterpreted and charges brought. On the other hand, if the Court were to look towards the intent of Mr. Elonis, then “true threat” statutes may lose much of their force due to evidentiary issues. A decision in favor of Mr. Elonis may lead to a more violent internet where criminals such as stalkers have a longer leash in which to persecute their victims. Oral argument on the case was held on December 1, 2014, and a decision will be issued in the near future.


An Authorship-Centric Approach to the Authentication of Social-Networking Evidence

Sen “Alex” Wang, MJLST Staff Member

In Volume 13 Issue 1 of the Minnesota Journal of Law, Science & Technology, Ira P. Robbins called for special attention for social-networking evidence used in civil and criminal litigation and proposed an authorship-centric approach to the authentication of such evidence. In recent years, social-networking websites like Facebook, MySpace, and Twitter have become an ingrained part of our culture. However, at least as it appears to Robbins, people are stupid with regard to their online postings since they document their every move no matter how foolish or incriminating on social-networking sites. The lives and careers of not only ordinary citizens, but also lawyers, judges, and even Congress members have been damaged by their own social-networking postings.

Social-networking sites are designed to facilitate interpersonal relationships and information exchanges, but they have also been used to harass, intimidate, and emotionally abuse or bully others. With no effective check on fake accounts or false profiles, the anonymity of social-networking sites permits stalkers and bullies to take their harmful conduct above and beyond traditional harrying. The infamous Lori Drew and Latisha Monique Frazier cases provide excellent examples. Moreover, hackers and identity thieves have also taken advantages of the personal information posted on social-networking sites. Thus, Robbins argued that the growth in popularity of social-networking sites and the rising number of fake accounts and incidents of hacking signal that information from social-networking sites will begin to play a central role in both civil and criminal litigation.

Often unbeknownst to the social-networking user, postings leave a permanent trail that law-enforcement agents and lawyers frequently rely upon in crime solving and trial strategy. Robbins argued that the ease with which social-networking evidence can be altered, forged, or posted by someone other than the owner of the account should raise substantial admissibility concerns. Specifically, Robbins stated that social-networking postings are comparable to postings on websites rather than e-mails. Thus, the authentication of social-networking evidence is the critical first step to ensuring that the admitted evidence is trustworthy and, ultimately, that litigants receive a fair and just trial.

Robbins, however, further argued that the current judicial approaches to authentication of such evidence have failed to require rigorous showings of authenticity despite the demonstrated unreliability of information on social-networking sites. In the first approach, the court effectively shirks its gate-keeping function, deflecting all reliability concerns associated with social-networking evidence to the finder of fact. Under the second approach, the court authenticates a social-networking posting by relying solely on testimony of the recipient. The third approach requires testimony about who, aside from the owner, can access the social-networking account in question. With the fourth approach, the court focuses on establishing the author of a specific posting but failed to provide a thorough framework.

As a solution, Robbins proposed an authorship-centric approach that instructs courts to evaluate multiple factors when considering evidence from social-networking websites. The factors fall into three categories: account security, account ownership, and the posting in question. Although no one factor in these categories is dispositive, addressing each will help to ensure that admitted evidence possesses more than a tenuous link to its purported author. For account security, the inquiry should include at least the following questions: (1) Does the social-networking site allow users to restrict access to their profiles or certain portions of their profiles? (2)Is the account that was used to post the proffered evidence password protected? (3) Does anyone other than the account owner have access to the account? (4) Has the account been hacked into in the past? (5) Is the account generally accessed from a personal or a public computer? (6) How was the account accessed at the time the posting was made? As to account ownership, a court should address, at a minimum, the following key questions: (1) Who is the person attached to the account that was used to post the proffered evidence? (2) Is the e-mail address attached to the account one that is normally used by the person? (3) Is the alleged author a frequent user of the social-networking site in question? Finally, the court should ask at least these questions regarding the posting in question: (1) How was the evidence at issue placed on the social-networking site? (2) Did the posting at issue come from a public or a private area of the social-networking website? (3) How was the evidence at issue obtained from the website?

This authorship-centric approach properly shifts a court’s attention from content and account ownership to authorship, it underscores the importance of fairness and accuracy in the outcome of judicial proceedings that involve social-networking evidence. In addition, it fit within the current circumstantial-evidence authentication framework set out by Federal Rules of Evidence 901(b)(4) and will not require the courts to engage in a more exhaustive inquiry than is already required for other types of evidence.


Open Patenting, Innovation, and the Release of the Tesla Patents

Blake Vettel, MJLST Staff Member

In Volume 14 Issue 2 of the Minnesota Journal of Law, Science & Technology, Mariateresa Maggiolino and Marie Lillá Montagnani proposed a framework for standardized terms and conditions for Open Patenting. This framework set forth a standard system for patent holders to license their patents in order to encourage open innovation, in a way that was easy to administer for patent holders of all sizes. Maggiolino and Montagnani argued for an open patenting scheme in which the patent owner would irrevocably spread their patented knowledge worldwide, based on non-exclusive and no-charge licensing. Futhermore, the licensing system would be centrally operated online and allow the patentee to customize certain clauses in the licensing agreement; while maintaining a few compulsory clauses such as a non-assertion pledge that would keep the license open.

On June 12, 2014 Elon Musk, CEO of Tesla Motors, shocked the business world by announcing via blog post that “Tesla will not initiate patent lawsuits against anyone who, in good faith, wants to use our technology.” Musk described his reasoning for opening Tesla’s patents for use by others as a way to encourage innovation and growth within the electric car market, and depicted Tesla’s true competition as gasoline cars instead of electric competitors. By allowing use of their patented technology, Tesla hopes to develop the electric car market and encourage innovation. Some commentators have been skeptical about the altruistic motive behind releasing the patents, arguing that it may in fact be a move intended to entice other electric car manufacturers to produce cars that are compatible with Tesla’s patented charging stations in an effort to develop the network of stations around the country.

However, Musk did not unequivocally release these patents; instead he conditioned their subsequent use upon being in “good faith.” What constitutes a good faith use of Tesla’s technology is not clear, but Tesla could have instead opted for a standardized licensing system as proposed by Maggiolino and Montagnani. A clear standardized licensing scheme with compulsory clauses designed to encourage free movement of patented technology and spur innovation may have been more effective in promoting use of Tesla’s patents. An inventor who wants to use Tesla’s patents may be hesitant under Musk’s promise not to initiate lawsuits, where he could be much more confident of his right to use the patented technology under a licensing agreement. The extent to which Tesla’s patents will be used and their effect on the car market and open innovation is yet to be seen, as is the true value of Tesla’s open innovation.