Skip to main content

Advertisement

Log in

Overblocking autonomy: the case of mandatory library filtering software

  • Published:
Continental Philosophy Review Aims and scope Submit manuscript

Abstract

In U.S. v. American Library Association (2003), the Supreme Court upheld the Child Internet Protection Act (CIPA), which mandated that libraries receiving federal funding for public Internet access install content-filtering programs on computers which provide that access. These programs analyze incoming content, and block the receipt of objectionable material, in particular pornography. Thus, patrons at public libraries are protected from unintentionally (or intentionally) accessing objectionable material, and, in the case of minors, from accessing potentially damaging material. At least, that is the official story. In this paper, I develop three points. (1) I argue that CIPA and ALA are better read as examples of the enforcement of a regime of normative sexuality. The question of minors accessing pornography is only relevant to the official story insofar as it provides a rhetorically persuasive example of deviance from that normative regime. CIPAs full target includes information about topics such as homosexuality and contraception. (2) Rather than (or in addition to) punishing deviances directly, CIPA attempts to constitute a “public” in which such deviancy can never occur in the first place. Hence, the designation of a “public” space serves to domesticate alternative sexualities and to sanitize that space of sexual difference. (3) This interaction at the border of the public and private spheres offers an opportunity to reflect on and underscore the ways that subject formation and subjectivity are mediated through technological artifacts like the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Butler (2004, p. 124).

  2. U.S. v. American Library Association (2003). The district court decision provides a detailed legislative history of CIPA. See American Library Association v. United States (2002, p. 412).

  3. Connolly (2005).

  4. U.S. v. American Library Association (2003, p. 206). The Court’s discussion of these issues, couched as whether or not the decision to filter sites is analogous to a decision not to acquire a given print item, is unusually dismissive. For further critique of the real-space acquisition analogy, see Laughlin (2003, p. 259). For a critique of too-easy analogies between the Internet and real-space, see Lemley (2003).

  5. The theorist who has most consistently pursued these issues is Yochai Benkler. See Benkler (2006) and Benkler (2003).

  6. U.S. v. American Library Association (2003, p. 206) (internal citation omitted).

  7. For “latent ambiguities” in the context of the Internet, see Lessig (1999). Lessig makes extensive use of Sunstein (1995). For the history of public library censorship in the U.S., see Laughlin (2003, p. 222). For concerns about the Habermasian public sphere, see the essays collected in Calhoun (1992), especially McCarthy (1992), Benhabib (1992), and Fraser (1992). I pursue the question of the relation between the Internet and ex ante individuation of the “public” for issues of intellectual property in Hull (2003).

  8. For this, see, e.g., Cohen (1996).

  9. Reno v. ACLU (1997, pp. 864–866).

  10. Ibid. (p. 853).

  11. The following is for the U.S. only; it should be remembered that most of the world’s people have never used the Internet in any form, and are extremely unlikely to do so anytime soon. The best data on U.S. Internet access is collected by the Pew Internet and American Life Project (2009).

  12. This number is based on census data and Internet usage data. “As of August 2000, only 12.7% of households making under $18,000 per year had personal Internet access, but 18.9% of individuals in that range used the Internet. One in five individuals in this economic range who access the Internet from some place other than the home uses a library.” Goldstein (2002, pp. 1194–1195. The calculation with census data follows).

  13. Legally, they would thus fail the strict scrutiny evaluation to which restrictions on individual speech are subjected. See Doherty (1999, p. 297 and n. 281). Doherty downplays these risks as technologically surmountable. I address this claim in the final section. See also the lower court decisions ALA overrules, in particular, Mainstream Loudon v. Board of Trustees of Loudon County Library (1998).

  14. “The Government [was] not denying a benefit to anyone, but [was] instead simply insisting that public funds be spent for the purposes for which they were authorized” U.S. v. American Library Association (2003, p. 15) (quoting Rust v. Sullivan (1991, p. 194).

  15. McCreary v. ACLU Kentucky (2005).

  16. Lawrence v. Texas (2003). An analysis of ALA perhaps reveals the truth of Lawrence: not a validation of “homosexual identity” as such, but the partial validation of such identity in private, at the price of its radical exclusion from the public sphere. This exclusion achieves what the anti-sodomy statutes could not: if homosexuality is excluded from the public sphere, it becomes ipso facto an illegitimate form of public subjectivity. For example, the majority in Lawrence explicitly refused to extend the decision to protect same-sex marriage. Ibid. (p. 585).

  17. The cases are: affirming sodomy laws, Bowers v. Hardwick (1986); upholding the abortion right, Planned Parenthood v. Casey (1992).

  18. Lawrence v. Texas (2003, p. 589).

  19. Ibid.

  20. Board of Education v. Pico (1982, p. 914) (cited in Mainstream Loudoun v. Board of Trustees of Loudon County Library (1998, p. 561 n 10)).

  21. E-Rate and Filtering: A Review of the Children’s Internet Protection Act (2001).

  22. These constructions were common in the hearing. For example, Representative Charles Pickering, one of the act’s sponsors, opined that “this is a common-sense mainstream constitutional way to protect our children from child predators, from obscenity, from child pornography, that which is already illegal.” He added: “we believe that this is a very mainstream, common-sense approach, and that the agenda of the other side who opposes is out of the mainstream. It is extreme. It would put our children at risk.” Ibid.

  23. These alternative means were credited in the lower court decisions. It should also be stressed that this essay is not a defense of child pornography. The existence and nature of a problem and how one solves it are two different topics; their deliberate conflation is a strategy of power. The District Court in Mainstream Loudon, for example, both assumed that “minimizing access to illegal pornography and avoidance of creation of a sexually hostile environment are compelling governmental interests” of the sort that would therefore survive judicial strict scrutiny (Mainstream Loudoun v. Board of Trustees of Loudon County Library (1998, p. 556)) (internal citations omitted), and struck down a filtering program policy on First Amendment grounds.

  24. The extent of such usage attempts is a matter of vicious debate. The “no more than four examples” is from Mainstream Loudon, ibid. (p. 565). The District Court in ALA credited a study of the Tacoma library indicating that 40% of filtering program blocks were at terminals used by 11–15 year old patrons. ALA v. US (2002, p. 423); on the other hand, the study’s conclusion—that this indicates that teens are attempting to access pornography—presupposes that they are not attempting to access overblocked material. The Court concluded its analysis of access attempts on a cautionary note: “We note, however, that none of the libraries proffered by the defendants presented any systematic records or quantitative comparison of the amount of criminal or otherwise inappropriate behavior that occurred in their libraries before they began using Internet filtering software compared to the amount that happened after they installed the software. The plaintiffs’ witnesses also testified that because public libraries are public places, incidents involving inappropriate behavior in libraries (sexual and otherwise) existed long before libraries provided access to the Internet. Ibid. (p. 424).

  25. See http://www.frc.org/.

  26. “Homosexuality and Child Sexual Abuse,” http://www.frc.org/?i=IS02E3 (on file with author); “How Lawrence v. Texas Will Impact Marriage Law,” http://www.frc.org/index.cfm?i=PV03F01 (on file with author). Other publications in “defense of the family” include a separate category for “How Divorce and Cohabitation Hurt Society,” and titles such as “Opposition to Gay Conduct is not Bigotry,” and “Keeping the Churches Marriage-Friendly: How Scripture and Tradition Refute Gay Theology.” For the list, see http://www.frc.org/get/n03g009.cfm (on file with author).

  27. The overturn was Reno v. ACLU (1997). Congress received the Dangerous Access report in 2000, prior to the passage of CIPA; the point here is that the report was not what caused the interest in filtering. For the summary of Congressional activity, see the government’s brief in ALA: Brief for the United States (2002, pp. 4–50).

  28. Rimm (1995). Rimm says, inter alia, that “83.5% of all images posted on the Usenet are pornographic” and that “Pedo/hebephilic and paraphilic imagery accounts for 2,685,777 downloads, or 48.4%, of all downloads from commercial ‘adult’ BBS.” Ibid. (pp. 1890 and 1892). The article itself takes a strange pleasure in reporting, in graphic detail, its efforts at categorization. Against Rimm’s speculations, the District Court in ALA credits (and the Supreme Court adopts) testimony that about 1–2% of the material online is pornographic. Of course, this amounts to a lot of material, given the size of the web; the court estimates a total of about 100,000 free sites offering sexually explicit material. ALA v. U.S. (2002, p. 420).

  29. Mackinnon (1995).

  30. See Cannon (1996, pp. 55–56, n 103 and accompanying text).

  31. Berkowitz (1999).

  32. Brief of Cities, Mayors and County Commissioners as Amicus Curiae in Support of Appellants (2002, p. 24).

  33. Ross (2000, pp. 504–505). Ross suggests that the studies linking violent speech are sometimes proposed to justify restricting sexual speech. Ibid (p. 505). Independently of whether the causality would function in the same way in both cases, the analogy implies that its proponents think that controversial sexuality is as great a harm as violence. For a more nuanced discussion of the available literature on the links between exposure to media sex and actual sexual behavior, see Levesque (2000, pp. 171–174). Although the picture is complicated, the studies do not support the straightforward causal link asserted by censorship advocates.

  34. E-Rate and Filtering: A Review of the Children’s Internet Protection Act (2001).

  35. Reno v. ACLU (1997, p. 854).

  36. Ross (2000, pp. 484–485).

  37. I do not claim originality for the first two especially, but they bear repeating. See note 11, supra.

  38. Unless otherwise noted, the statistics in this paragraph derive from Rideout, Richardson, and Resnick (2002). The general amount of over and underblocking is highly controversial. For some of the complications, see the District Court opinion: ALA v. U.S. (2002, pp. 437–500). The Court concludes that “we find that commercially available filtering programs erroneously block a huge amount of speech that is protected by the First Amendment. Any currently available filtering product that is reasonably effective in preventing users from accessing content within the filter’s category definitions will necessarily block countless thousands of Web pages, the content of which does not match the filtering company’s category definitions, much less the legal definitions of obscenity, child pornography, or harmful to minors.” Ibid. (p. 448).

  39. ALA v. U.S. (2002, pp. 445–446).

  40. Haselton (2000).

  41. ALA v. U.S. (2002, pp. 415–416).

  42. Ibid. (p. 427). Elisabeth Young-Breuhl suggests that prejudice against adolescents shares the same typologies as homophobia. See her (2002, pp. 263–273).

  43. Levesque (2000, pp. 65–66).

  44. Ross (2000, p. 484) (internal citations omitted).

  45. Levesque (2000, p. 170).

  46. Stein (2003, pp. 162–163) (internal citations omitted).

  47. Benkler (2003, p. 188).

  48. Chun (2006, p. 120).

  49. See Benkler (2003, pp. 180–195).

  50. The “complete subsumption” thesis is Antonio Negri’s; see Hardt and Negri (2000). I discuss this thesis of Empire in relation to Negri’s earlier writings in Hull (2005). It becomes evident in Hardt and Negri (2004), that complete subsumption and Foucault’s understanding of biopower are intimately related. I mention Foucault because of the resonance Foucault’s writings on disciplinary power have had in understanding the Internet. See, e.g., my Hull (2003), Boyle (1997), and the critical discussion in Hayles (1999, pp. 194–207). For a sample of the difficulties involved in this set of issues, see Terranova (2000), noting that, since the Internet’s value increases with its size, individual, private Webpage designers are providing a constant source of surplus value for commercial Internet entities.

  51. That law can and should be expected to regulate norms is explored in detail in Sunstein (1996). For the inefficiency of direct regulation, see Lessig (1999).

  52. Benkler (2006, p. 146).

  53. Ibid. (pp. 146–147).

  54. For more on the substantive (“descriptive”) and formal (“ascriptive”) distinction, see Benkler’s source, Fallon, Jr. (1994, pp. 875–905). The critique of excessive reliance on formal equality as undermining substantive autonomy also has a substantial lineage in feminist and critical race theories. See, for example, Bell (1996); and Riva Siegel on abortion, initially in Siegel (1992).

  55. See, e.g., Benkler (2006), Hayles (1999); and, from analytic philosophy of mind, Clark (2003). As Clark puts it, “we are our own best artifacts, and always have been.” Clark (2003, p. 194). One does not have to endorse left-wing French theory to support the claim I am making.

  56. This is not to repeat the myth of the “end of geography” as criticized in such texts as Mosco (2004). Geography—such as access to a library—clearly does matter; that is precisely why ALA is so problematic. But, pace Mosco, communities can nonetheless form online, largely independent of where their members are physically located. This fact is somewhat uncritically celebrated as an aspect of postmodernism in Turkle (1997). For a useful reminder of the importance of embodiment (and thus geography) to subjectivity, see Hayles (1999). Hayles is listed as one of the offending mythologizers by Mosco, though the tenor of her analysis runs entirely in the opposite direction.

  57. For a useful discussion of legitimation, see Judith Butler’s reminder that subjectivity, particularly a subjectivity that differs from prevailing social norms, is fragile. See Butler (2004).

  58. Lessig (1999, p. 179).

  59. The first reference is to Foucault’s discussion of the political dream behind medieval banishment of lepers: see Foucault (1979, p. 198). The second is to Introna and Nissenbaum (2000).

  60. For a more detailed argument, see, e.g., Doherty (1999).

  61. Latour (1992, p. 232).

  62. See, e.g., Latour (1992) for the point about artifacts in general; for internet-specific discussions, see also Benkler (2003) and Lessig (1999). Studies of particular artifacts have repeatedly refuted the “technology is neutral” thesis.

  63. For this thought, see Rancière (1999).

References

  • ALA. 2002. Brief for the United States. U.S. Briefs 361.

  • American Library Association v. U. S., 201 F. Supp. 2d 401 (E.D. Pa. 2002).

  • Bell, Derrick A. 1996. Serving two masters: Integration ideals and client interests in school desegregation litigation. In Critical race theory: The key writings that formed the movement, ed. Kimberle Crenshaw, et al., 5–19. New York: New Press.

    Google Scholar 

  • Benhabib, Seyla. 1992. Models of public space: Hannah Arendt, the liberal tradition, and Jürgen Habermas. In Habermas and the public sphere, ed. Craig Calhoun, 73–98. Cambridge: MIT Press.

    Google Scholar 

  • Benkler, Yochai. 2003. Through the looking glass: Alice and the constitutional foundations of the public domain. Law and Contemporary Problems 66: 173–224.

    Google Scholar 

  • Benkler, Yochai. 2006. The wealth of networks: How social production transforms markets and freedom. New Haven: Yale University Press.

    Google Scholar 

  • Berkowitz, Howard. 1999. Hate on the internet: The Anti-Defamation League perspective. Prepared Statement to the Senate Committee on the Judiciary, 14 Sept 1999.

  • Board of Education v. Pico, 457 U.S. 853 (1982).

  • Bowers v. Hardwick, 478 U.S. 186 (1986).

  • Boyle, James. 1997. Foucault in cyberspace: Surveillance, sovereignty, and hardwired censors. University of Cincinnati Law Review 66: 177–205.

    Google Scholar 

  • Brief of cities, mayors and county commissioners as amicus curiae in support of appellants. 2002. U.S. Briefs 361.

  • Butler, Judith. 2004. Undoing gender. New York: Routledge.

    Google Scholar 

  • Calhoun, Craig (ed.). 1992. Habermas and the public sphere. Cambridge: MIT Press.

    Google Scholar 

  • Cannon, Robert. 1996. The legislative history of Senator Exon’s Communications Decency Act: Regulating barbarians on the information superhighway. Federal Communications Law Journal 49: 51–94.

    Google Scholar 

  • Children’s Internet Protection Act [CIPA], 20 USC 9134(f) (Public Law 106–554).

  • Chun, Wendy Hui Kyong. 2006. Control and freedom: Power and paranoia in the age of fiber optics. Cambridge: MIT Press.

    Google Scholar 

  • Clark, Andy. 2003. Natural born cyborgs: Minds, technologies, and the future of human existence. Oxford: Oxford University Press.

    Google Scholar 

  • Cohen, Julia. 1996. A right to read anonymously: A closer look at “Copyright Management” in cyberspace. Connecticut Law Review 28: 981–1039.

    Google Scholar 

  • Connolly, William E. 2005. The evangelical capitalist resonance machine. Political Theory 33: 869–886.

    Article  Google Scholar 

  • Doherty, Kelly M. 1999. www.obscenity.com: An analysis of obscenity and indecency regulation on the internet. Akron Law Review 32: 259–281.

    Google Scholar 

  • E-Rate and filtering: A review of the Children’s Internet Protection Act, Hearing of the Telecommunications and the Internet Subcommittee of the House Energy and Commerce Committee. April 4, 2001 (available on Lexis).

  • Fallon Jr., Richard H. 1994. Two senses of autonomy. Stanford Law Review 46: 875–905.

    Article  Google Scholar 

  • Foucault, Michel. 1979. Discipline and punish: The birth of the prison (trans:Sheridan, Alan). New York: Vintage.

  • Fraser, Nancy. 1992. Rethinking the public sphere: A contribution to the critique of actually existing democracy. In Habermas and the public sphere, ed. Craig Calhoun, 109–142. Cambridge: MIT Press.

    Google Scholar 

  • Goldstein, Adam. 2002. Like a sieve: The Child Internet Protection Act and ineffective filters in libraries. Fordham Intellectual Property, Media and Entertainment Law Journal 12: 1187–1202.

    Google Scholar 

  • Hardt, Michael, and Antonio Negri. 2000. Empire. Cambridge: Harvard University Press.

    Google Scholar 

  • Hardt, Michael, and Antonio Negri. 2004. Multitude: War and democracy in the age of empire. New York: Penguin.

    Google Scholar 

  • Haselton, Bennett. 2000. Amnesty intercepted: Global human rights groups blocked by web censoring software. http://www.peacefire.org/amnesty-intercepted/. Accessed Jan 2009.

  • Hayles, N.Katherine. 1999. How we became posthuman: Virtual bodies in cybernetics, literature, and informatics. Chicago: University of Chicago Press.

    Google Scholar 

  • Hull, Gordon. 2003. Thoughts on the fetishization of cyberspeech and the turn from “public” to “private” law. Constellations 10: 113–134.

    Article  Google Scholar 

  • Hull, Gordon. 2005. Capital sive natura: Spinoza and the immanence of Empire. International Studies in Philosophy 37: 29–48.

    Google Scholar 

  • Introna, Lucas D., and Helen Nissenbaum. 2000. Shaping the web: Why the politics of search engines matters. TIS 16: 169–185.

    Google Scholar 

  • Latour, Bruno. 1992. Where are the missing masses? The sociology of a few mundane artifacts. In Shaping technology/building society: Studies in sociotechnical change, ed. Wiebe E. Bijker, and John Law, 225–258. Cambridge: MIT Press.

    Google Scholar 

  • Laughlin, Gregory K. 2003. Sex, lies, and library cards: The first amendment implications of the use of software filters to control access to internet pornography in public libraries. Drake University Law Review 51: 213–282.

    Google Scholar 

  • Lawrence v. Texas, 539 U.S. 558 (2003).

  • Lemley, Mark A. 2003. Place and cyberspace. California Law Review 91: 521–542.

    Article  Google Scholar 

  • Lessig, Lawrence. 1999. Code and other laws of cyberspace. New York: Basic Books.

    Google Scholar 

  • Levesque, Roger J.R. 2000. Adolescents, sex, and the law: Preparing adolescents for responsible citizenship. Washington: American Psychological Association.

    Book  Google Scholar 

  • Mackinnon, Catherine A. 1995. Vindication and resistance: A response to the Carnegie Mellon study of pornography in cyberspace. Georgetown University Law Journal 83: 1959–1967.

    Google Scholar 

  • Mainstream Loudoun v. Board of Trustees of Loudon County Library, 24 F. Supp. 2d 552 (E.D. Va. 1998).

  • McCarthy, Thomas. 1992. Practical discourse: On the relation of morality to politics. In Habermas and the public sphere, ed. Craig Calhoun, 51–72. Cambridge: MIT Press.

    Google Scholar 

  • McCreary v. ACLU Kentucky, 545 U.S. 844 (2005).

  • Mosco, Vincent. 2004. The digital sublime: Myth, power and cyberspace. Cambridge: MIT Press.

    Google Scholar 

  • Pew Internet and American Life Project. 2009. http://www.pewInternet.org/. Accessed Jan 2009.

  • Planned Parenthood v. Casey, 505 U.S. 833 (1992).

  • Rancière, Jacques. 1999. Disagreement (trans: Rose, Julie). Minneapolis: University of Minnesota Press.

  • Reno v. ACLU, 521 U.S. 844 (1997).

  • Resnick, Paul. 2002. See no evil: How internet filters affect the search for online health information. Kaiser Family Foundation. http://www.kff.org/content/2002/20021210a/. Accessed June 2008.

  • Rimm, Marty. 1995. Marketing pornography on the information superhighway: A survey of 917, 410 images, descriptions, short stories, animations downloaded 8.5 million times by consumers in over cities in forty countries, provinces, and territories. Georgetown Law Journal 83: 1849–1925.

    Google Scholar 

  • Ross, Catherine J. 2000. Anything goes: Examining the state’s interest in protecting children from controversial speech. Vanderbilt Law Review 53: 427–524.

    Google Scholar 

  • Rust v. Sullivan, 500 U.S. 173 (1991).

  • Siegel, Riva. 1992. Reasoning from the body: A historical perspective on abortion regulation and the question of equal protection. Stanford Law Review 44: 261–381.

    Article  Google Scholar 

  • Stein, Edward. 2003. Queers anonymous: Lesbians, gay men, free speech, and cyberspace. Harvard Civil Rights-Civil Liberties Law Review 38: 159–213.

    Google Scholar 

  • Sunstein, Cass R. 1995. Incompletely theorized agreements. Harvard Law Review 108: 1733–1772.

    Article  Google Scholar 

  • Sunstein, Cass R. 1996. Social norms and social roles. Columbia Law Review 96: 903–968.

    Article  Google Scholar 

  • Terranova, Tiziana. 2000. Free labor: Producing culture for the digital economy. Social Text 63: 33–58.

    Article  Google Scholar 

  • Turkle, Sherry. 1997. Life on the screen: Identity in the age of the internet, 2nd ed. New York: Simon and Schuster.

    Google Scholar 

  • U.S v. American Library Association, 539 U.S. 194 (2003).

  • Young-Breuhl, Elisabeth. 2002. Homophobias: A diagnostic and political manual. Constellations 9: 263–273.

    Article  Google Scholar 

Download references

Acknowledgement

I would like to thank Pierre Schlag, Nick Smith, and a reader with Continental Philosophy Review for their detailed comments and criticisms of an earlier version of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gordon Hull.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hull, G. Overblocking autonomy: the case of mandatory library filtering software. Cont Philos Rev 42, 81–100 (2009). https://doi.org/10.1007/s11007-009-9097-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11007-009-9097-x

Keywords

Navigation