Twitter stalking case dismissed by Md. judge
The Judge said that protections under the First Amendment extend to online speech
IDG News Service - A U.S. judge in Maryland dismissed on Thursday a criminal case against a person who was charged with stalking a religious leader on Twitter, upholding "a tradition of protecting anonymous speech, particularly anonymous political or religious speech".
District Judge Roger W. Titus of the United States District Court for the District of Maryland also observed that the religious figure could have protected her sensibilities simply by averting her eyes from the defendant's blog and not looking at, or blocking his messages on Twitter.
Even though the Internet is the newest medium for anonymous, uncomfortable expression touching on political or religious matters, online speech is equally protected under the First Amendment to the U.S. Constitution, as there is no basis for qualifying the level of First Amendment scrutiny that should be applied to online speech, Judge Titus noted.
There are certain "well-defined and narrowly limited classes of speech" such as obscenity, defamation, fraud, and speech integral to criminal conduct that remain unprotected by the First Amendment, the Judge added.
Defendant, William Lawrence Cassidy, invoked the Free Speech Clause of the First Amendment, after he was charged with violating a federal stalking statute.
His speech does not fall into any of the recognized exceptions to protection under the First Amendment, the Judge said. The First Amendment protects speech even when the subject or manner of expression is uncomfortable and challenges conventional religious beliefs, political attitudes or standards of good taste, he added.
Section 2261A is an interstate stalking statute originally passed as part of the Violence against Women's Act, but was broadened in 2006 to include as intent not only the intent to "kill or injure," but include the intent to "harass or place under surveillance with the intent to . . . harass or intimidate or cause substantial emotional distress", the Judge said.
The requisite action was also broadened so as to bring within the scope of the law a course of conduct that merely "causes substantial emotional distress", he added. The 2006 changes also expanded the mechanisms of injury to add use of an "interactive computer service" to the existing list which already included use of mail or any facility of interstate or foreign commerce.
Cassidy allegedly violated the statute by intentionally causing substantial emotional distress to the religious leader on Twitter and blogs, according to the government.
Twitter and Blogs are today's equivalent of a bulletin board that one is free to disregard, in contrast, for example, to e-mails or phone calls directed to a victim, the Judge said.
The Electronic Frontier Foundation (EFF), which filed an amicus brief in this case, also pointed out that the religious leader was not merely a private individual but rather an easily identifiable public figure that leads a religious sect, and that many of the defendant's statements relate to beliefs of the sect and her qualifications as a leader, the Judge said.
"Thus, this statute sweeps in the type of expression that the Supreme Court has consistently tried to protect," he added.
EFF said in a statement on Thursday that it argued that even though some criticism of public figures may be offensive, emotional distress was not a sufficient basis on which to criminalize speech.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts