As we previously discussed in our post “The ‘Commander-in-Tweet’ and the First Amendment,” the POTUS was criticized by the Knight First Amendment Institute for blocking certain Twitter users from his @realDonaldTrump account. According to the Knight First Amendment Institute, President Trump’s Twitter account functions like a town hall meeting where the public can voice their views about government actions and attendees cannot be excluded based on their views under the First Amendment. Therefore, according to the Knight Institute, President Trump is violating the First Amendment by blocking users based on the content of their tweets. Subsequently, on July 11, 2017, the Knight First Amendment filed suit against President Trump and his communications team on this basis.
When the President of the United States, every governor, every member of Congress, and—as Justice Kagan remarked—virtually every under-30 and 35 year-old in the country has a Twitter account, it’s time for social media to be recognized as a pervasive and protectable form of speech. On Monday, during oral arguments in Packingham v. North Carolina, the Supreme Court of the United States seemed to emphatically agree. The case concerns a North Carolina law that prohibits registered sex offenders from “accessing” any “commercial social networking websites” whose membership also includes minors. In particular, SCOTUS made several statements on the nature of social media:
Political campaigns have increasingly turned to social media as a channel to reach voters. Social media not only has the power to reach audiences numbering in the billions, but it also has the power to change the behavior of its users. This far-reaching influence is nothing new—advertisers pay lots of money to use these channels to sell and market their products to targeted audiences. But, could this power be used to sway voters, and is there anything that prevents social media companies from getting into the game of politics?
Today’s online world is all about engaging and staying connected with others via social media. For businesses, establishing a presence on various social media platforms is an enticing way to connect with current customers as well as foster new business.
Yet the immense popularity of social media sites can also draw unwanted attention to its users. Just as businesses are drawn to popular social medial sites to market their brands and products, so, too, are potential cybercriminals interested in targeting those who engage with these sites. On many of these platforms, user engagement is public. In other words, when a user chooses to “follow” a company or leave a comment, not only does the business take notice of the user, but everyone else on the platform can, as well, including those who are not themselves following the business. This provides a would-be cybercriminal a target-rich group upon whom to practice new (and old) scams.
On Saturday, July 23, Facebook acknowledged its anti-spam systems had briefly and accidentally blocked links to WikiLeaks files containing internal Democratic National Committee (DNC) emails. WikiLeaks had released 19,000 leaked documents from the DNC containing communication between Democratic Party officials on Friday, July 22. The following day, people tweeted screenshots of an error message they received when attempting to post links to the leaked documents: “The content you’re trying to share includes a link that our security systems detected to be unsafe.”
GE’s tech chief discusses gamification and cars; Apple and the FBI’s faceoff continues; Microsoft will give developers a new toy to play with; man’s best friend takes a disliking to man’s made friend; and more …
It’s been a week when virtual reality news reigns supreme, with the technology shown off in medicine, film and entertainment, and as part of Apple’s future plans. The FCC has even suggested a spectrum designation for it. Oh, and did you hear about the Google AI’s defeat of a Go pro?
Google goes Trek with a look to the lapel; Facebook continues its push into the workplace; Slack goes down for a few hours; a cyberlocker operator goes down for a few years; and more.