© Originally published in the COMMUNIQUÉ (November 2011, Vol. 32, No. 11), the official journal of the Clark County Bar Association. All rights reserved. Click HERE for the Article or visit http://www.clarkcountybar.org.
Anonymous Internet Speakers, Not Immortal
By now, it’s likely that most attorneys have figured out that unmasking an anonymous Internet speaker (“Anony”) seems impossible. It’is also just as likely that the list of questions regarding how to reveal an Anony, so they can be pursued for damages or served with an injunction, is still longer than the list of answers.
Pursuant to what is commonly referred to as § 230(c) immunity, Internet service providers, hosts, websites, and other relevant carriers (“ISPs”) are generally exempt from liability for the speech that is posted on their websites, blogs, chatrooms, and even the speech republished through their search engines. The Communications Decency Act (“CDA”) states, “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” 47 U.S.C. § 230(c)(1) (2008). In other words, providers of the Internet itself, where anyone can generate all manner of speech, is not a ‘publisher’ of content as traditionally understood by the print media.
So who is liable for the massive amount of false, defamatory and libelous information published on the Internet? The original speaker is, whoever that person or entity may be. Allowing an ISP to be free from any liability as it provides third party speakers the tools to defame and harass at-will likely sounds far-fetched and radical to many experienced lawyers, given the body of law regarding print, radio and televised media. However, to an entire generation of attorneys and other young web surfers this ideology is the norm.
Since § 230(c) was enacted, a whole new body of law had to be interpreted by the courts to deal with this new enigma, the Internet. Generally, publishers and reporters find themselves at the center of libel suits when false information is published. A strong incentive exists for newspapers, magazines, and radio/television to protect their reputation and their ‘sources’. ‘Sources’ have rarely been sued because they could not be identified. The popularized “Deep Throat” from the Watergate scandal can likely attest to the way things “used to be”. ISPs closely resemble their publisher cousin, but an effort to not limit commercial activity on the Internet created ISP § 230(c). There is one great distinction between the print/televised media and the Internet…the Internet Protocol Address (“IP Address”).
The IP Address allows the ISP to identify each individual user on the Internet and log their activity. While an IP Address can be masked and proxy servers used by the Anony, which often involves interstate and international activity, often the un-savvy Anony has no idea that their ISP is keeping track of their activity. More importantly, even to the ‘black hat’ or experienced user, it only takes one login without a proxy server for an experienced expert to capture the legitimate IP Address. Likewise, since § 230(c) grants the ISP immunity there is little incentive for the ISP to protect the identity or Internet activity of the Anony. For obvious reasons, the ability of litigants to get access to the ISP logs has become the center of the legal discussion.
With No Pre-litigation Discovery Available, Sue “John Doe”
It only takes about 3 seconds of legal analysis to recognize that it is impossible to serve a subpoena on a person you can’t identify, but it may take quite a bit longer for you to realize you can sue them. What § 230(c) immunity has created is an enormous need for “John Doe” lawsuits. Since the Federal Rules of Civil Procedure only allow for limited pre-litigation discovery under Rule 27 and since Texas is the single state to have extensive pre-litigation investigatory procedures, the other 49 of us must file “John Doe” lawsuits. While traditionally these lawsuits have been discouraged by the courts, the ease with which anyone on an Internet connection can anonymize themselves and create a path of fraud and destruction has necessitated the courts relaxation and allowance of “John Doe” actions.
Given that Anony’s both post tortious statement on their own websites and websites owned by others, the web address of the tortious activity must be identified as a foundational matter. Once the lawsuit is filed, service needs to occur. The only way to identify and serve an unknown party is through additional investigation.
Identifying the Owner of a Website
Every Anony that gains access to the Internet or has a web address is assigned an IP Address. The IP Address is tied to the ISP, including web addresses/websites and emails. The Internet Corporation for Assigned Names and Numbers (“ICANN”) requires that every web address be owned and tied to a name, address and email. The owner of any web address can allow a “Proxy” to be listed in their stead maintaining the owner’s anonymity. The name, address and email of the Proxy must be public information listed with ICANN for service of process and billing. Thus, by researching ICANN one can find the Proxy/owner of any web address from which tortious activity occurs. However, since the Proxy is created for the exclusive purpose of masking the identity of the true owner, the Proxy will generally not provide the identity of the IP Address owner without a subpoena.
Identifying the Owner of a Statement
The retention of an expert that has the ability to forensically track IP Addresses will be required in identifying the owner of a given statement. A forensic Internet expert will be able to gather valuable information that ties certain web addresses, emails or other identifying information to other statements. Though not simple, once the relevant technical information is gathered connecting the IP Address to the tortious activity, one has the support for the “John Doe” lawsuit.
Securing a Subpoena
Given that we have no specific procedure allowing this type of a subpoena in Nevada, a Petition for Pre-Litigation Subpoenas should be made to the court in order to demonstrate the necessity for issuance of subpoenas prior to discovery. Suggested actions prior to filling the Petition include serving the owner, the Proxy and the ISP of the website a copy of the complaint, drafting request letters to the website owner seeking the identity of the “John Doe” and requesting the same from the ISP. Other scenarios include the “John Doe” appearing and filing a Motion to Dismiss, the “John Doe” appearing to file a Motion to Quash, the ISP appearing to file a Motion to Quash, taking a default against the “John Doe” (in the event you can substantially establish website ownership via a Proxy and adequate service). Often times these activities alone provide the identity needed to uncover an identity.
Once the ISP receives the subpoena, they in turn forward it to the owner or Proxy. The ISP will generally provide the personally identifying information, unless the owner files a Motion to Quash the subpoena. Matching the IP Addresses provided by the forensic expert and the ISP log information gathered via subpoena will allow connection of activity to identity.
Drafting the Complaint in Preparation of a Motion to Quash
In the wake of the “John Doe” lawsuits and the resultant subpoenas, jurisdictions have had to wrestle with various Motions to Quash. In response to promptings from the California Court of Appeals, the California legislature enacted Cal. CCP. Code § 1987.2 drastically changing the “John Doe” subpoena landscape and setting the standard. In a nutshell, § 1987.2 provides that when out of state subpoenas are issued in California “for personally identifying information…for use in an action pending in another state…and that subpoena has been served on any Internet service provider”, if a motion to quash is granted, if the “underlying action arises from the moving party’s exercise of free speech rights on the Internet” and if the subpoenaing party fails to “make a prima facie showing of a cause of action”, the court “shall” award attorney’s fees and costs incurred by the moving party. Since so many ISP’s are located in California, significant compliance with local procedure is necessary.
While there are many cases on point in various jurisdictions relevant to what constitutes “a prima facie showing of a cause of action”, the only way to push the weight of the evidence in one’s favor is to plead the complaint with particularity, naming specific websites, statements, actions, emails, etc. This will provide the additional information necessary when an Anony files a motion to quash the subpoena.
The Identity of the Anony
There is no way getting around the fact that putting an identity to an Anony is complicated, time consuming, expert required and court involved. Many times identity can be discovered through simple investigation. Other times filing a “John Doe” lawsuit will be the only remedy. As the courts continue to amend procedural rules and the common Internet user continues to become more astute, hiding your identity online will continue to be an often litigated topic and the subject of much legal debate.
Scott E. Chapman, Esq., MBA, CIPP is Of Counsel with the Las Vegas office of McCormick Barstow LLP, licensed to practice before all Nevada Courts. He received his Bachelor of the Arts degree (1995) and his Juris Doctor degree (1998) at Brigham Young University, his Master of Business Administration (2002) at the University of Nevada, Las Vegas and is a Certified Information Privacy Professional (2007) practicing in the areas of Internet & Privacy Law, General and Commercial Litigation, Insurance Law and General Corporate matters. He can be reached at scott.chapman@mccormickbarstow.com or (702) 949-1100.