Feeds

US feds subpoena names of anonymous web commenters

Should have hired a Moderatrix

The Power of One Infographic

The all-too-typical violent hyperbole found in reader comments across the internet has landed one Las Vegas newspaper in the hot seat with US prosecutors.

The Las Vegas Review-Journal says it has been served with a federal grand jury subpoena seeking information on people who posted supposedly threatening anonymous comments on a story about a tax fraud trial.

According to LVRJ, the subpoena seeks the identities and contact information of those who made certain posts prosecutors believe allude to acts of violence against the jury and others involved with the case.

In late May, the paper reported on the trial of Robert Kahre, a man accused of paying contractors with gold and silver coinage so he could report their lower face value to the IRS for tax purposes. On the paper's website, the story rather characteristically received hundreds of angry comments condemning the IRS, the court system, the US treasury, paper money, public schools, communists — what have you.

But two posts in particular caught the eye of the US Attorney for Nevada;

"The sad thing is there are 12 dummies on the jury who will convict him. They should be hung along with the feds," posted one of the offending commenters.

Another wagered "quatloos" (an alien currency from Star Trek) that one of the federal prosecutors wouldn't live to see his next birthday.

(Both comments have been removed from the website).

The paper originally received a subpoena on June 2 demanding the identities of every commenter on the article. LVRJ editor Thomas Mitchell declared he would fight the request, saying anonymous speech is "a fundamental and historic part of this country."

Before he could launch a protest, however, federal prosecutors decided their original request was overly broad. Instead, they narrowed their request to the two comments.

Mitchell now says he will comply with the subpoena.

"I'd hate to be the guy who refused to tell the feds Timothy McVeigh was buying fertilizer," Mitchell was quoted by the LVRJ, referring to the 1995 Oklahoma City bombing of a downtown federal building.

"We want to be good citizens and do the proper thing," Mitchell continued. "We will give them what we have, which frankly isn't much, since most postings are anonymous."

Meanwhile, The American Civil Liberties Union of Nevada believes the narrowed request is still unreasonable.

"We don't think any of the comments we've seen are the appropriate target of government inquiry," ALCU staff attorney Margaret McLethie told the paper. Although the organization admitted it hasn't seen the comment that bets on a prosecutors death, it has moved forward with its own motion to quash the subpoena and offered to represent any of the commenters who want their help. ®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.