Google, Yahoo, and Microsoft Suppressing Free Speech Online

Total Page:16

File Type:pdf, Size:1020Kb

Google, Yahoo, and Microsoft Suppressing Free Speech Online The Review: A Journal of Undergraduate Student Research Volume 10 Article 4 2009 Google, Yahoo, and Microsoft Suppressing Free Speech Online Brittany Alexander St. John Fisher College, [email protected] Follow this and additional works at: https://fisherpub.sjfc.edu/ur Part of the International and Area Studies Commons How has open access to Fisher Digital Publications benefited ou?y Recommended Citation Alexander, Brittany. "Google, Yahoo, and Microsoft Suppressing Free Speech Online." The Review: A Journal of Undergraduate Student Research 10 (2009): 10-16. Web. [date of access]. <https://fisherpub.sjfc.edu/ur/vol10/iss1/4>. This document is posted at https://fisherpub.sjfc.edu/ur/vol10/iss1/4 and is brought to you for free and open access by Fisher Digital Publications at St. John Fisher College. For more information, please contact [email protected]. Google, Yahoo, and Microsoft Suppressing Free Speech Online Abstract In lieu of an abstract, below is the first paragraph of the paper. Foreign governments censor the online activity of their citizens. Iran and China are the top two countries who have been known to censor, filter, and block content that contains any sexual, women's rights, and anti-governmental blogs or content. The American Search Engines Google, Microsoft, and Yahoo are helping these governments censor their people, thus limiting free speech and expression. Nothing can be done to stop foreign governments from suppressing their own people, but something can and should be done to prevent American Search engines from aiding these countries. This article is available in The Review: A Journal of Undergraduate Student Research: https://fisherpub.sjfc.edu/ur/ vol10/iss1/4 Alexander: Google, Yahoo, and Microsoft Suppressing Free Speech Online Google, Yahoo, and Microsoft Suppressing Free Speech Online Brittany Alexander Foreign governments censor the online Voices Being Silenced in Every Hemisphere activity of their citizens. Iran and China are the American Internet companies, such as top two countries who have been known to Google, Microsoft, and Yahoo, should cease censor, filter, and block content that contains aiding foreign governments in the censorship of any sexual, women's rights, and anti- internet websites, and they should do so as soon governmental blogs or content. The American as possible. Since the internet has become more Search Engines Google, Microsoft, and Yahoo user friendly and widely available, people all are helping these governments censor their over the world are able to access the World people, thus limiting free speech and expression. Wide Web. Sometimes the internet is the only Nothing can be done to stop foreign source of valuable information that is readily governments from suppressing their own people, available. In over 13 different countries but something can and should be done to prevent including two of the biggest online censoring American Search engines from aiding these perpetrators, China and Iran, the number of countries. journalistic stories on the internet far surpasses the number of printed stories (Wu 541). This Google, Yahoo, and Microsoft Suppressing demonstrates how censoring and blocking Free Speech Online internet web sites, including news sites, would The forefathers of America realized the leave many people in the dark; an uniformed, importance of freedom of speech enough to give unaware, and suppressed public results. it a dignified place in the First Amendment of Enjoying the freedoms of nearly the U.S. Constitution. Yet it is a basic right we, unlimited information access, Americans can as Americans, often take for granted. The type any word in a search engine and uncover citizens of Saudi Arabia, Uzbekistan, Egypt, thousands of informative web pages pertaining Cuba, and Belarus are censored by their to that user's topic of choice. Whether it is restrictive governments, especially via different political views, women's activism, gay cyberspace (Carvajal 1). The two most web and lesbian blogging, or just information on restrictive governments with the greatest number sexually transmitted diseases, online information of online filters, blocks, and people thrown in is literally at our finger tips. However, China's jail for free speech online are that of China and internet filters and censors block all sites Iran. Both countries have been known to throw containing Chinese government opposition, gay those who blog against the government into and lesbian information, and sexual content. The prison for lengthy sentences (Moaveni 2). In blocking of all sexual content websites does not particular, China has thrown its fair share of pertain to just porn sites. The Chinese outspoken anti-government, homosexual, and government literally blocks all sites with the women's rights bloggers in jail after sentencing word "sex" residing in the text. Gay and lesbian them in underground trails (Great Fire Wall 1). bloggers have been thrown in jail for "the Surprisingly, the companies helping these perversion of the Chinese internet with liberal governments restrict the speech of their people and immoral ideas." Similarly, in Iran, gay and online are American companies: Google, lesbian individuals have been prosecuted for Microsoft, and Yahoo. America is based on creating blogs about their homosexuality (Tsui democracy; yet three of its largest and most 70). Targeting certain individuals for voicing influential internet search engine companies are their opinions through the internet suppresses helping to limit free speech around the globe and attacks these citizens' freedoms immensely. (U.S. Web Giants 1). In many of these countries, not everyone has computer or internet access at home. Therefore, internet cafes are exceedingly popular and widely used. Because of the large 10 Published by Fisher Digital Publications, 2009 1 The Review: A Journal of Undergraduate Student Research, Vol. 10 [2009], Art. 4 number of citizens that use internet cafes, the persecution of internet users" (Kluver 320-321). government places a series of restrictions, Christopher Cox, representative for the GIFA censors, and blocks for the cafe users. However, bill wrote, "Unfettered access to the Internet when internet cafes fail to operate by the strict would play an integral role of opening up web standards, the government will personally Chinese society" (Kluver 322-323). Overall, the step in. Through censors on the available government has clearly stated it wants to end computers and the wireless web inside these internet censorship and suppression of free cafes, a signal or alarm is sent to a database speech. The American government also believes whenever someone accesses or creates a web ending censorship, particularly in China, would site with restricted content. This database is benefit web-censored societies around the world. checked constantly and any suspicious activity is Thus these U.S. government beliefs can be reported immediately to Chinese government applied to other internet-censored countries as officials. Every city has on call officers to take well. Yet, despite this American policy, Google, care of such activities. In particular, "the Yahoo, and Microsoft continue to aid foreign Chinese government orders clean-ups of all governments in suppressing freedom of speech internet cafes that fail to adequately register their through website censoring. users or block websites" (Tsui 68). For example, Google, Yahoo, and Microsoft limiting in 2002, authorities swooped into an internet free speech overseas does not fairly solidify this cafe in Beijing, resulting in a fire that killed 24 argument as much as knowing the individual civilians. More than 3,000 internet cafes were stories of online suppression inflicted by these shut down that year. American companies. Initiating American China and Iran are not the only countries Search Engine control of internet censorship in that deserve the spotlight. Cuban government China was called the Public Pledge on Self officials censor by restricting access to the Discipline for the China Internet Industry. Over internet itself. "Out of 11 million resident one hundred companies voluntarily drafted and Cubans, only 40,000 people are allowed internet signed this pledge, two of which included Yahoo access and e-mail accounts" (Hamilton 195). and Google (Tsui 80). In order to achieve self- That means less than 1% of the entire population discipline for the Chinese Internet, Yahoo and is allowed internet access. These excessive Google used filters, blocks, and censors to blocks on internet access in Cuba restrict the monitor online content and searches. Thus these potential amounts of communication that could U.S. Internet companies have emerged as take place. Also, the knowledge and enforcers for Chinese suppression. It must be organization that could be potentially gained also stressed that these issues are, of course, not online for schools, workplaces, and homes is involving China alone. As noted in the immense, yet the government still ignores the beginning, this censorship through the aid of potential of internet access for all citizens. American companies is happening across the globe; there are just more profound incidents in American Search Engine Companies China. Censoring Overseas Try searching for terms like Although no one can stop foreign "democracy" or "human rights" on the Chinese governments from censoring the internet, version of Microsoft's blog tool; a white something could be done about Google, background with the words "Unauthorized
Recommended publications
  • Poster: Introducing Massbrowser: a Censorship Circumvention System Run by the Masses
    Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses Milad Nasr∗, Anonymous∗, and Amir Houmansadr University of Massachusetts Amherst fmilad,[email protected] ∗Equal contribution Abstract—We will present a new censorship circumvention sys- side the censorship regions, which relay the Internet traffic tem, currently being developed in our group. The new system of the censored users. This includes systems like Tor, VPNs, is called MassBrowser, and combines several techniques from Psiphon, etc. Unfortunately, such circumvention systems are state-of-the-art censorship studies to design a hard-to-block, easily blocked by the censors by enumerating their limited practical censorship circumvention system. MassBrowser is a set of proxy server IP addresses [14]. (2) Costly to operate: one-hop proxy system where the proxies are volunteer Internet To resist proxy blocking by the censors, recent circumven- users in the free world. The power of MassBrowser comes from tion systems have started to deploy the proxies on shared-IP the large number of volunteer proxies who frequently change platforms such as CDNs, App Engines, and Cloud Storage, their IP addresses as the volunteer users move to different a technique broadly referred to as domain fronting [3]. networks. To get a large number of volunteer proxies, we This mechanism, however, is prohibitively expensive [11] provide the volunteers the control over how their computers to operate for large scales of users. (3) Poor QoS: Proxy- are used by the censored users. Particularly, the volunteer based circumvention systems like Tor and it’s variants suffer users can decide what websites they will proxy for censored from low quality of service (e.g., high latencies and low users, and how much bandwidth they will allocate.
    [Show full text]
  • The Velocity of Censorship
    The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu, Independent Researcher; David Phipps, Bowdoin College; Adam Pridgen, Rice University; Jedidiah R. Crandall, University of New Mexico; Dan S. Wallach, Rice University This paper is included in the Proceedings of the 22nd USENIX Security Symposium. August 14–16, 2013 • Washington, D.C., USA ISBN 978-1-931971-03-4 Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu David Phipps Adam Pridgen [email protected] Computer Science Computer Science Independent Researcher Bowdoin College Rice University Jedidiah R. Crandall Dan S. Wallach Computer Science Computer Science University of New Mexico Rice University Abstract terconnected through their social graph and tend to post about sensitive topics. This biases us towards the content Weibo and other popular Chinese microblogging sites are posted by these particular users, but enables us to mea- well known for exercising internal censorship, to comply sure with high fidelity the speed of the censorship and with Chinese government requirements. This research discern interesting patterns in censor behaviors. seeks to quantify the mechanisms of this censorship: Sina Weibo (weibo.com, referred to in this paper sim- how fast and how comprehensively posts are deleted. ply as “Weibo”) has the most active user community of Our analysis considered 2.38 million posts gathered over any microblog site in China [39]. Weibo provides ser- roughly two months in 2012, with our attention focused vices which are similar to Twitter, with @usernames, on repeatedly visiting “sensitive” users.
    [Show full text]
  • Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest
    Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government.
    [Show full text]
  • Freedom of Speech, Freedom of Self-Expression, and Kant's Public
    Diametros 54 (2017): 118–137 doi: 10.13153/diam.54.2017.1136 FREEDOM OF SPEECH, FREEDOM OF SELF-EXPRESSION, AND KANT’S PUBLIC USE OF REASON – Geert Van Eekert – Abstract. This article turns to early modern and Enlightenment advocates of tolerance (Locke, Spi- noza, John Stuart Mill) to discover and lay bare the line of argument that has informed their com- mitment to free speech. This line of argument will subsequently be used to assess the shift from free speech to the contemporary ideal of free self-expression. In order to take this assessment one step further, this article will finally turn to Immanuel Kant’s famous defense of the public use of reason. In the wake of Katerina Deligiorgi’s readings of Kant, it will show that the idea of free speech requires a specific disposition on behalf of speakers and writers that is in danger of being neglected in the contemporary prevailing conception of free speech as freedom of self-expression. Keywords: John Locke, Baruch Spinoza, Immanuel Kant, John Stuart Mill, freedom of speech, free- dom of self-expression, public use of reason, Enlightenment. Contemporary debates about free speech or freedom of speech primarily deal with the question how free speech should be (in the sense of both “How free should speech be?” and “How should free speech be?”), and not (or at least not mainly) with the question why speech should be free.1 Admittedly, there seems to be no reason to urge the latter question: it is rather generally agreed upon today (at least in liberal democratic societies) that freedom of speech should be both es- teemed and categorically defended because it is both a fundamental human right and a key pillar of democracy and of the (scientific) quest for knowledge.
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • The Right to Privacy in the Digital Age
    The Right to Privacy in the Digital Age April 9, 2018 Dr. Keith Goldstein, Dr. Ohad Shem Tov, and Mr. Dan Prazeres Presented on behalf of Pirate Parties International Headquarters, a UN ECOSOC Consultative Member, for the Report of the High Commissioner for Human Rights Our Dystopian Present Living in modern society, we are profiled. We accept the necessity to hand over intimate details about ourselves to proper authorities and presume they will keep this information secure- only to be used under the most egregious cases with legal justifications. Parents provide governments with information about their children to obtain necessary services, such as health care. We reciprocate the forfeiture of our intimate details by accepting the fine print on every form we sign- or button we press. In doing so, we enable second-hand trading of our personal information, exponentially increasing the likelihood that our data will be utilized for illegitimate purposes. Often without our awareness or consent, detection devices track our movements, our preferences, and any information they are capable of mining from our digital existence. This data is used to manipulate us, rob from us, and engage in prejudice against us- at times legally. We are stalked by algorithms that profile all of us. This is not a dystopian outlook on the future or paranoia. This is present day reality, whereby we live in a data-driven society with ubiquitous corruption that enables a small number of individuals to transgress a destitute mass of phone and internet media users. In this paper we present a few examples from around the world of both violations of privacy and accomplishments to protect privacy in online environments.
    [Show full text]
  • Guidelines and Value Statement on Freedom of Speech and Expression
    FREEDOM OF SPEECH AND EXPRESSION VALUE STATEMENT AND GUIDELINES Approved by USM Board of Regents June 21, 2019 Freedom of Speech and Expression Statement of Values The free exchange of ideas and information is central to higher education’s foremost obligation of fostering both intellectual development and the discovery and dissemination of knowledge. Scholarship and learning can only flourish in an environment in which the unfettered expression of all ideas is nurtured. To that end, the University System of Maryland (USM) is committed to promoting and protecting every person’s freedom to express their views, however controversial, in a lawful manner. With certain exceptions, such as threats of physical violence and unlawful harassment, free speech is protected by the United States Constitution. The State of Maryland and the USM share the commitment to free speech that is imbedded in our nation’s constitution. Any effort to limit protected speech based solely on content is a violation of USM’s legal and academic responsibilities and is therefore impermissible. The USM’s duty to advance facts and the truth -- as well as our commitment to the students, faculty, and staff who comprise the USM community -- can also impose an obligation to condemn, confront, or correct speech that is hateful or discriminatory. Institutional leaders and other campus community members may counter speech designed to denigrate others or undermine evidence- based scholarship with additional speech. Offensive speech cannot be banned, but it can—and often should—be challenged. A healthy and thriving community also depends on the civility of its members towards one another.
    [Show full text]
  • Free Thought, Free Speech, Free Action Intellectual Individualism According to Robert H
    Jacob A. Sandstrom Free Thought, Free Speech, Free Action Intellectual Individualism According to Robert H. Jackson The Robert H. Jackson Center 305 East Fourth Street Jamestown, New York 14701 716.483.6646 www.roberthjackson.org Free Thought, Free Speech, Free Action Intellectual Individualism According to Robert H. Jackson Abstract What can be said of a man whose life was so vibrant, yet so short? For Associate Justice Robert H. Jackson, words were a craft—his sword and his solace. Though Jackson’s life was cut short by a fatal heart attack, his words remain in his masterful writings, speeches, and opinions. Among the themes Jackson references, sanctity of individual thought—the basis of a functional democracy—is constant. A practical man, Jackson professed that though certain forms of harmful speech and action could be subject to limitation, thought was beyond the control of anyone but the individual. Ultimately, the public’s chief goal is to find items of “social value” through consensus, a result of discussions that welcome a wide range of opinions. Jackson’s views of free thought were strengthened by his time serving as U.S. Chief Prosecutor at Nuremberg; his willingness to pen opinions— particularly individual concurrences or dissents—following Nuremberg seems to be more than a mere matter of coincidence. This paradigm begs the question: what did Jackson find at Nuremberg that so profoundly altered his understanding of the world? The physical atrocities of World War II are upsetting to any empathetic human being; there is no doubt that Jackson was disturbed by the blatant horrors of Nazi rule.
    [Show full text]
  • Freedom of Expression and the Liberalism of Fear
    volume 20, no. 34 I. Introduction november 2020 Much recent philosophical work on free speech proceeds in the fol- lowing ostensibly plausible way. Rights, it is said, protect weighty interests (Raz 1986). Therefore, if there is a right to free expression, then there must be some weighty interest(s) that it protects. More- over, reasoning about the best means of protecting and advancing Freedom of Expression and these interests determines a right’s normative limits. For example: if we have a right to free expression because it aids us in the search for truth (as J. S. Mill suggests), then, when limiting speech helps us in our search, we ought to impose the relevant limitations (Leiter 2016). If we the Liberalism of Fear: have a right to freedom of expression because it facilitates democratic deliberation, then, when silencing speech does so better, silencing is justified (Schauer 1982). If we have a right to free expression because A Defense of the Darker Mill such a right promotes the perfection of our capacities, then, when pre- venting some speech does so better, we ought to prevent speech just that far (Brink 2001: 149−172). If a right to free expression protects us against oppression, then our speech can be regulated insofar as it con- stitutes oppression (McGowan 2014). And so on. As Stanley Fish puts the general point, speech “is always produced within the precincts of some conception of the good to which it must yield in the event of conflict” (1994). Or as Erwin Chemerinsky writes, courts must inevitably decide “what speech is protected, under what circumstances, and when and how the government may regulate” (2017: 1237−1238).
    [Show full text]
  • Partisan Platforms: Responses to Perceived Liberal Bias in Social Media
    Partisan Platforms: Responses to Perceived Liberal Bias in Social Media A Research Paper submitted to the Department of Engineering and Society Presented to the Faculty of the School of Engineering and Applied Science University of Virginia • Charlottesville, Virginia In Partial Fulfillment of the Requirements for the Degree Bachelor of Science, School of Engineering Luke Giraudeau Spring, 2021 On my honor as a University Student, I have neither given nor received unauthorized aid on this assignment as defined by the Honor Guidelines for Thesis-Related Assignments Signature __________________________________________ Date __________ Luke Giraudeau Approved __________________________________________ Date __________ Richard Jacques, Department of Engineering and Society Introduction In the United States, public opinion about tech companies’ political biases is divided along partisan lines (Vogels, Perrin, & Anderson, 2020). In the U.S. since 2018, 69 percent of Republicans claim that technology companies favor liberal views, whereas only 19 percent of Democrats say that technology companies favor the alternative view. Over 50 percent of liberals believe that perspectives are treated equally, whereas only 22 percent of conservatives feel this way. Critics who allege bias have organized to promote legislation such as the Ending Support for Internet Censorship Act (2020) as well as an executive order (Executive Order 13,925, 2020). Furthermore, conservative entrepreneurs have produced new social media platforms such as Gab and Parler that claim
    [Show full text]
  • Internet Censorship in Turkey: University Students' Opinions
    World Journal on Educational Technology 1 (2009) 46‐56 www.world‐education‐center.org/index.php/wjet Internet censorship in Turkey: University students' opinions * Hasan Ozkan a , Arda Arikan b a Hacettepe University, Faculty of Education, Beytepe, 06800, Ankara, Turkey b Hacettepe University, Faculty of Education, Beytepe, 06800, Ankara, Turkey Received April 30, 2009; revised May 31, 2009; accepted June 22 , 2009 Abstract The aim of this paper is to study university students’ opinions toward online censorship with references to their socio‐ political and economic variables. Considering the upwards trend and the increasing number of online restrictions in Turkey, the opinions of university students (n=138) are thought to give significant findings. The questionnaire aimed to collect data on some chosen aspects of censorship which are internet access regulation by legal authorities, online pornographic content, websites distributing illegal and crime related information and the political and religious aspects of the internet censorship. The findings about these four basic aspects toward the online censorship revealed that despite the high proportion of approval, participants have a confused and inconsistent attitude towards the issue especially within the application and the idea of censorship. In a broader aspect, the findings can be interpreted as a sign of university students’ insufficient knowledge and understanding towards the current situation and the possible future of online censorship in Turkey. Keywords: Internet; censor; censorship;
    [Show full text]
  • The Public's Burden in a Digital Age: Pressures on Intermediaries and the Privatization of Internet Censorship Julie Adler
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Brooklyn Law School: BrooklynWorks Journal of Law and Policy Volume 20 Issue 1 SYMPOSIUM: Article 8 Adolescents in Society: Their vE olving Legal Status 2011 The Public's Burden in a Digital Age: Pressures on Intermediaries and the Privatization of Internet Censorship Julie Adler Follow this and additional works at: https://brooklynworks.brooklaw.edu/jlp Recommended Citation Julie Adler, The Public's Burden in a Digital Age: Pressures on Intermediaries and the Privatization of Internet Censorship, 20 J. L. & Pol'y (2011). Available at: https://brooklynworks.brooklaw.edu/jlp/vol20/iss1/8 This Note is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Journal of Law and Policy by an authorized editor of BrooklynWorks. THE PUBLIC’S BURDEN IN A DIGITAL AGE: PRESSURES ON INTERMEDIARIES AND THE PRIVATIZATION OF INTERNET CENSORSHIP Julie Adler 1 INTRODUCTION In the summer of 2010, just as Connecticut Attorney General Richard Blumenthal’s U.S. Senate race was heating up,2 so were his efforts to combat prostitution by targeting websites like Craigslist.3 A coalition of state attorneys general (“AGs”) J.D. Candidate, Brooklyn Law School, 2012; B.S., Boston University, 2007. I would like to thank Shaun Clarke and my parents for their love and support. I also wholeheartedly thank Svetlana Mintcheva of the National Coalition Against Censorship for her invaluable guidance throughout the entire Note writing process, and Professor Derek Bambauer for his insights and encouragement. Finally, I thank the editors and staff of the Journal of Law and Policy for going above and beyond the call of duty.
    [Show full text]