Respecting Listeners’ Autonomy: The Right to be Left Alone

Introduction

The core of First Amendment free speech doctrine concerns the right of speakers to convey the message of their choice, free of repression or retaliation by the government. In addition, a small but significant body of law also addresses the rights of listeners to obtain access to information and speech in the face of coercive state measures seeking to deprive them of that access. Finally, there is also a well-established “compelled speech doctrine,” which addresses the right of speakers to resist government compulsions to speak—i.e., a right not to speak. This paper considers a question heretofore largely ignored by the courts, which is whether the First Amendment also protects a right against compelled listening.

As it turns out, a right against compelled listening raises complex and difficult questions because such a putative right in fact has two possible aspects to it. The first would be a First Amendment right not to listen that operates against the state, restricting the state’s power to force an unwilling listener to hear the state’s chosen message. Such a right must exist if public discourse among citizens is to play its democracy-empowering role (and also must exist under autonomy-based theories of free speech, for obvious reasons). But it is also, as we shall see, necessarily and distinctly limited.

But the more interesting questions raised by a right against compelled listening concern not disputes between listeners and the state, which are the subject of the classic First Amendment tradition, but rather disputes between non-state speakers and listeners, which the state must somehow accommodate or resolve. In these situations, in short, the question is whether the state may or may not enforce a listener’s desire to be left alone. Furthermore, while disputes strictly between private speakers and listeners of course do not themselves trigger the First Amendment because of the state action doctrine, when the state steps in to resolve those disputes, the First Amendment is very much implicated. This paper’s ultimate goal is to identify the state’s proper and constitutional role in those situations.

Part I briefly summarizes the classic First Amendment rights of speakers to speak and listeners to listen as against state coercion. It then examines the constitutional relationship between speakers, listeners, and their rights. Part II considers whether, just as the right to speak has been interpreted to generate a right not to speak, so too a right to listen should have the converse—a right not to listen. It further explores the two possible aspects of such a “right” described above,1I place the word “right” in quotations because, as we shall see, as against private speakers what is at stake is not technically a constitutional right, but rather a constitutionally relevant interest. and closes by considering the role of the state in the face of speaker versus listener disputes. Finally, Part III considers some doctrinal applications of a listener’s right to be left alone.

I. The Classic First Amendment

In this Part, we will very briefly consider the nature of “classic” First Amendment rights to speak and to listen, as against state coercion. We will then explore the relationship between those rights.

A. Speakers’ Rights and Listeners’ Rights

It is conventional wisdom that First Amendment law focuses almost exclusively on speakers and their “right” to speak, free from state interference. Even those of us who embrace instrumental justifications for protecting free speech, such as advancing democratic self-governance, nonetheless tend to fixate on speakers’ interests in contributing to public discourse when we analyze First Amendment conflicts. Indeed, the bulk of First Amendment doctrine, including the concept of unprotected categories of speech2See, e.g., Chaplinsky v. New Hampshire, 315 U.S. 568, 572 (1942) (defining “fighting words”); Roth v. United States, 354 U.S. 476, 486 (1957) (holding that obscenity is not protected speech); Brandenburg v. Ohio, 395 U.S. 444, 447 (1969) (establishing the incitement standard); New York v. Ferber, 458 U.S. 747, 763 (1982) (prohibiting child pornography). and the foundational distinction between content-based and content-neutral laws,3Reed v. Town of Gilbert, 576 U.S. 155, 163–64 (2015). all concern government suppression of speech or speakers (often, but not always, speech or speakers the state dislikes).

One further point about the right to speak that should be a given: the right to free speech under the First Amendment must incorporate a right to generally choose one’s audience (though, of course, like any other right, this right is not absolute and might be outweighed by a sufficiently strong governmental interest). The right to choose an audience is implicit in the Court’s standard test to evaluate content-neutral “time, place, or manner” regulations, which requires inter alia that any regulation “leave open ample alternative channels of communication.”4Ward v. Rock Against Racism, 491 U.S. 781, 791 (1989) (quoting Clark v. Cmty. for Creative Non-Violence, 468 U.S. 288, 293 (1984)). If such “ample alternative channels” referred to the ability to speak to any audience, the test would have no teeth at all—and that is not the case, as illustrated by numerous cases.5City of Ladue v. Gilleo, 512 U.S. 43, 58–59 (1994); McCullen v. Coakley, 573 U.S. 464, 490–91 (2014); see also Martin v. City of Struthers, 319 U.S. 141, 146–47 (1943). Furthermore, in the leading case dealing with expressive conduct, a topic closely related to content-neutral restrictions on speech, the second Justice Harlan also went out of his way to state that he would not uphold a regulation of conduct with an “incidental” impact on expression if the law “in practice has the effect of entirely preventing a ‘speaker’ from reaching a significant audience with whom he could not otherwise lawfully communicate.”6United States v. O’Brien, 391 U.S. 367, 388–89 (1968) (Harlan, J., concurring).

Admittedly, the courts have not been entirely consistent on this issue. Thus, there are undoubtedly some cases, especially in the lower courts, suggesting that denying a speaker the ability to reach a specific audience need not be fatal to a content-neutral restriction on speech.7Interstate Outdoor Advert., L.P. v. Zoning Bd. of Mount Laurel, 706 F.3d 527, 535 (3d Cir. 2013) (upholding content-neutral restriction on non-commercial billboards, stating that “the mere fact that Interstate will not be able to reach the distinct audience of travelers on the particular section of I-295 that it desires to target does not mean that adequate alternative channels of communication do not exist”). But this simply cannot be correct. For example, this would mean that during the 2024 presidential election, a prohibition on the Trump or Harris campaign advertising in a swing state such as Pennsylvania would be permissible if both candidates were permitted to reach alternative audiences in California and Texas. Such a result would make a mockery of the First Amendment (and democracy).

In addition to a right to speak, there is a well-developed body of doctrine protecting the right of listeners to access speech the state wishes to shield them from. The foundational case here is Lamont v. Postmaster General of the United States.8Lamont v. Postmaster Gen., 381 U.S. 301 (1965). In Lamont, the Court unanimously struck down a federal statute that required the Post Office to block the delivery of material determined to be “communist political propaganda” and only deliver the materials on the written request of the recipient (interestingly, Lamont was the first case in which the Supreme Court invalidated a federal statute on First Amendment grounds).9Id. at 302–04; Xiangnong (George) Wang, Listeners’ Rights in the Time of Propaganda: The Story of Lamont v. Postmaster General, Knight First Amend. Inst. Colum. Univ. (Feb. 14, 2025), https://knightcolumbia.org/content/listeners-rights-in-the-time-of-propaganda-the-story-of-lamont-v-postmaster-general [https://perma.cc/48MF-JSJN]. Crucially, for our purposes, the basis of this holding was not the right of foreigners to mail communist propaganda into the United States, which almost certainly does not exist,10Agency for Int’l Dev. v. All. for Open Soc’y Int’l, 140 S. Ct. 2082, 2089 (2020). but rather the First Amendment rights of addressees to receive information without impediment11Lamont, 381 U.S. at 307.—a point Justice Brennan made explicit in his concurrence.12Id. at 307–08 (Brennan, J., concurring).

If Lamont marks the origin of listeners’ right in the Supreme Court, their apotheosis occurred a little over a decade later, in Virginia State Board of Pharmacy v. Virginia Citizens Consumer Council, Inc.13Va. State Bd. of Pharmacy v. Va. Citizens Consumer Council, Inc., 425 U.S. 748, 773 (1976) [hereinafter Virginia Pharmacy]. There, prescription drug consumers challenged a Virginia ethical rule that barred pharmacists from advertising prescription drug prices.14      Id. at 753. Because no pharmacist joined the lawsuit, the Court could only hear the merits if it recognized a First Amendment right on the part of listeners to receive information—which it explicitly did before holding for the first time that the First Amendment protected commercial speech.15Id. at 756–57

Finally, one additional case in which listeners’ rights were importantly implicated, though not central to the decision, is Red Lion Broadcasting Co. v. Federal Communications Commission.16Red Lion Broad. Co. v. FCC, 395 U.S. 367 (1969). In Red Lion, the Supreme Court upheld the “Fairness Doctrine,” which was a federal regulation requiring radio and television broadcasters who broadcast a “personal attack” on an individual or group to provide airtime to the subject of the attack to respond.17Id. In doing so, the Court emphasized that in the context of broadcasting, because of the “scarcity” of available broadcast frequencies, speakers’ rights could not be the focus of attention.18Id. Instead, the Court said, “it is the right of the viewers and listeners, not the right of broadcasters, which is paramount” in assessing First Amendment challenges to broadcast regulations.19Id. at 390. So, like Lamont before it and Virginia Pharmacy after it, the Red Lion Court appeared to grant constitutional status to the First Amendment interests of listeners. Indeed, Red Lion was cited in Virginia Pharmacy for that proposition.20Virginia Pharmacy, 425 U.S. at 757.

B. Of Speakers and Listeners

The Supreme Court has thus recognized robust First Amendment rights for speakers and listeners, but it has largely treated them as distinct rights—no doubt because in the two key listeners’ rights cases, Lamont and Virginia Pharmacy, willing speakers were absent from the litigation. But this approach cannot be correct. After all, what exactly is the point of “speaking” if no one is listening?21When I use words like “speak” here, I am referring to all forms of communication, including oral speech, writing, video, electronic communications, picketing, marching, etc. And concomitantly, the word “listener” is meant to encompass actual listeners, readers, viewers, and generally all audiences for expression. To shove all of this into “freedom of speech” is of course historical and textual nonsense, for which mea culpa. But at least in this regard I can say that I am following the (bad) lead of the Supreme Court. See, e.g., John Inazu, Liberty’s Refuge: The Forgotten Freedom of Assembly 61–63 (Yale Univ. Press 2012) (noting the disappearance of the Assembly Clause in the Supreme Court’s modern jurisprudence); Sonja R. West, Awakening the Press Clause, 58 UCLA L. Rev. 1025, 1027–28 (2011) (same regarding Press Clause); Ronald J. Krotoszynski, Jr., Reclaiming the Petition Clause: Seditious Libel, “Offensive” Protest, and the Right to Petition the Government for a Redress of Grievances 10–11, 17–19, 157–62 (2012) (same regarding Petition Clause). It is true that some people keep private diaries or talk to themselves aloud—what is called “intrapersonal communication.”22See e.g., Intrapersonal Communication: Different Voices, Different Minds (Donna R. Vocate ed., 1994) (collecting works from various authors on the subject of intrapersonal communication); Paul N. Campbell, Language as Intrapersonal and Poetic Process, 2 Phil. & Rhetoric 200, 204–05 (1969); Patrick Jemmer, Intrapersonal Communication: The Hidden Language, 9 J. Clinical Hypnosis 37, 38 (2009). But there are reasons to doubt whether such audience-less “expression” falls within the First Amendment;23Ashutosh Bhagwat, When Speech Is Not “Speech”, 78 Ohio St. L.J. 839, 854–55 (2017). and in any event, it is certainly not the focus of most First Amendment jurisprudence or disputes. Normally, speech is meaningful, whether viewed from an instrumental or autonomy standpoint, if it has an audience. Admittedly, that audience need not be immediate or identifiable to the “speaker”; after all, we still read Shakespeare and Dickens. But reaching an audience is the point of communication. This is why in the area of expressive conduct, the Supreme Court has explicitly said that conduct is expressive—and so potentially protected by the First Amendment—only when “the likelihood was great that the message [intended to be communicated] would be understood by those who viewed it.”24Texas v. Johnson, 491 U.S. 397, 404 (1989) (quoting Spence v. Washington, 418 U.S. 405, 410–11 (1974)).

Of course, in emphasizing the existence of listeners as necessary for speech to be meaningful, I am in some sense preaching to the choir here, since this symposium specifically focuses on listeners. But I would suggest that focusing on listeners in isolation is also a bit myopic, in the same way as a singular focus on speakers. Because just as speaking without an audience is meaningless, so too is listening without a speaker. What does it mean to speak about “listeners” and “listeners’ rights” while ignoring who the listener is listening to—who, in short, the speaker is? Yet in the few contexts in which the Supreme Court has actually considered listeners’ interests in First Amendment cases, that is largely what it has done.

Consider in this regard Virginia Pharmacy. The Court’s holding in that case that the First Amendment protects recipients of speech/information rather than just speakers, is now well-accepted; but in the context of that case, it is a bit odd. In recognizing the rights of recipients of information, the Court added a caveat that such rights exist “where a speaker exists, as is the case here,” citing to one page in the Stipulated Facts to support this assertion.25Virginia Pharmacy, 425 U.S. at 756, 756 n.14. But given that pharmacists had not chosen to join this lawsuit and in fact had obvious, anticompetitive reasons to avoid advertising prices so long as their competitors did the same, the Court’s assumption that willing speakers already existed seems unjustified. Admittedly, once the advertising ban was struck down, it was likely that some pharmacists would choose to advertise drug prices, but whether that would benefit any individual plaintiff/listener was far from clear absent widespread advertising of drug prices.

The Court did somewhat better in analyzing the relationship between speakers and listeners in Red Lion. Unlike in Virginia Pharmacy, there is little doubt that Red Lion involved willing speakers—in the shape of the broadcasters themselves (the plaintiff in the case was, in fact, a broadcaster26Red Lion Broad. Co. v. FCC, 395 U.S. 367, 371 (1969). )—who would communicate to listeners/viewers. But by failing to seriously analyze both listeners’ and speakers’ interests and incentives in assessing free speech issues, the Red Lion Court created a conundrum. The Fairness Doctrine may have, in theory, advanced broadcast audiences’ interest in receiving balanced coverage of public issues, but it also incentivized broadcasters to avoid taking strong editorial positions on public issues other than anodyne centrist ones. Moreover, it disincentivized coverage of public issues in favor of generic entertainment, in order to avoid the strictures of the Fairness Doctrine.27See Ashutosh Bhagwat, The New Gatekeepers?: Social Media and the “Search for Truth”, 3 J. Free Speech L. 41, 47 (2023); Newton N. Minow, Speech to National Association of Broadcasters, Washington, D.C.: Television and the Public Interest (May 9, 1961) (1961 speech by F.C.C. Chair describing television as “a vast wasteland”), https://www.americanrhetoric.com/speeches/newtonminow.htm [https://perma.cc/QQM5-9PP7]. But faced with this argument, the Court simply (and rather naively) deferred to the FCC’s views that the “possibility [of any such incentive effect] is at best speculative.”28Red Lion, 395 U.S. at 393. Yet less than two decades later the FCC itself, in the course of repealing the Fairness Doctrine, concluded that the doctrine did in fact create substantial “chilling effects” because “the fairness doctrine provides broadcasters with a powerful incentive not to air controversial issue programming.”29In re Complaint of Syracuse Peace Council Against Television Station WTVH Syracuse, New York, FCC 87-266, 2 FCC Rcd. 5043, 5049–50 (1987). Of course if this was true—as is likely—then without speakers, listeners during the Fairness Doctrine era were necessarily left (so to speak) in the dark regarding public policy controversies. So again, by failing to seriously analyze both sides of the communicative relationship, the Court effectively harmed both speakers and listeners.

The point of this discussion is not to suggest that listeners/audience members lack meaningful First Amendment interests—of course they do. It is merely to suggest that discussing listeners’ interests and “rights” without also considering who the relevant speakers might be produces a deeply incomplete, and sometimes meaningless analysis. Expression, in short, is not a solitary activity on either side of the speaker/listener coin. It is a joint activity, a form of interpersonal interaction or association between speakers and audiences. It is relational in nature. The First Amendment, after all, does not protect “the right to speak” or “the right to listen;” it protects “the freedom of speech.”30U.S. Const. amend. I. By focusing on individual “rights,” however, whether of speakers or listeners, courts and commentators have failed to recognize the relational nature of that freedom.

II. A “Right” Not to Listen

Until now, we have generally considered the nature of First Amendment speakers’ and listeners’ rights and their interrelationship with each other. We will now apply those insights to considering what exactly it is that the First Amendment protects vis-à-vis listeners, focusing in particular on a putative right to not listen to unwanted speech.

In considering this issue, it is important to bear in mind a structural point. Most First Amendment law addresses the relationship between speakers or listeners on the one hand, and the state on the other. The question in those cases is what limits there are on the state’s right to coerce speakers or listeners. That is where our discussion will begin, by examining rights not to speak, and not to listen, as against the state. But for reasons already discussed, “the freedom of speech” also implicates another key relationship: that between speakers and listeners. Important and difficult First Amendment questions arise about the nature of and limits on the state’s power to regulate that relationship. These are the topics of Parts II.B and II.C.

A. Converse Rights: Speakers and Listeners v. The State

As we have seen, the First Amendment famously protects the right of speakers to express the message of their choice, free from state interference. But the Court has also interpreted the First Amendment to protect a converse right—to not be compelled to speak against one’s will.31For a careful, theoretical consideration of such converse rights, see generally Joseph Blocher, Rights To and Not To, 100 Cal. L. Rev. 761 (2012). The right against compelled speech was first recognized in the Supreme Court’s famous decision in West Virginia State Board of Education v. Barnette,32W. Va. State Bd. of Educ. v. Barnette, 319 U.S. 624 (1943). in which the Court struck down a requirement that public school students participate in a flag salute that was challenged by school children whose beliefs as Jehovah’s Witnesses forbade them from participating. Barnette thus established that the positive First Amendment right to speak was paired with a negative right not to speak.

While the right against compelled speech was originally a relatively narrow and circumscribed right, in recent years, the Supreme Court has expanded its scope significantly. For example, in the 2018 case National Institute of Family and Life Advocates v. Becerra (“NIFLA”), the Court invoked the right to strike down a California statute that required so-called “crisis pregnancy centers”—medically licensed facilities run by abortion opponents who provide medical services to pregnant women—to post notices informing patients that the State of California provided funding for low- or no-cost abortions (and other family planning services) to eligible women.33Nat’l Inst. of Family and Life Advocs. v. Becerra, 585 U.S. 755 (2018) [hereinafter NIFLA]. While the NIFLA case raised many complex issues, such as whether “professional speech” received lesser First Amendment protection,34Id. at 766–68. the core holding was that the required notice violated the First Amendment.35Id. at 773–75. Importantly, in NIFLA, the majority blurred the distinction between the positive right to speak and the negative right against compelled speech, by holding that “compelling individuals to speak a particular message . . . ‘alte[rs] the content of [their] speech.’ ”36Id. at 766 (quoting Riley v. Nat’l Fed’n of the Blind of N.C., Inc., 487 U.S. 781, 795 (1988)). As such, the Court suggested that in future compelled speech cases it would apply strict scrutiny, the test it uses for content-based restrictions on speech—something the Court had not done with any consistency prior to NIFLA.37Admittedly, the Court had equated compelled speech with speech suppression occasionally, notably in the Riley case quoted in NIFLA, but Riley’s throw away comment was based on a citation to a case, Mia. Herald Publ’g Co. v. Tornillo, 418 U.S. 241, 256 (1974), which did in fact involve a direct restriction on speech, because the “right of reply” statute struck down in that case was triggered by a newspaper’s publication of any story attacking “the personal character or official record” of any candidate for public office. Id. at 244; see also id. at 256 (“The Florida statute exacts a penalty on the basis of the content of a newspaper.”).

Another even more striking example of the extension of the compelled speech doctrine is 303 Creative LLC v. Elenis.38303 Creative LLC v. Elenis, 600 U.S. 570 (2023). In that case, the Court held that a wedding website designer could refuse to work for same-sex couples, in violation of state antidiscrimination law, because to force her to do so would “compel speech [the designer] does not wish to provide.”39Id. at 588. Thus, even in a situation in which a person is engaging in a commercial enterprise and providing services for payment, the Court has found that the compelled speech doctrine provides robust protections.

Of course, even in the current era, the right against compelled speech is not absolute. Most notably, the Court has indicated that in the context of commercial transactions, the First Amendment does not prohibit requiring “the disclosure of ‘purely factual and uncontroversial information about the terms under which . . . the services will be available.’ ”40NIFLA, 585 U.S. at 768 (quoting Zauderer v. Off. of Disciplinary Couns. of the Sup. Ct. of Ohio, 471 U.S. 626, 651 (1985)). As to whether going forward the Court will continue to recognize such limits on the compelled speech doctrine, see generally Alan Chen, Compelled Speech and the Regulatory State, 97 Ind. L.J. 881 (2022). More broadly, the Court has said that “health and safety warnings long considered permissible” remain constitutional41NIFLA, 585 U.S. at 775. and that the speech of professionals may be regulated as an incidental aspect of regulating professional conduct.42Id. at 769–70. In these contexts, current doctrine recognizes that listener interests can sometimes trump a speaker’s interest against compelled speech. But in the realm of ideological and cultural speech, the Court’s rule against compelling expression has come to be well-nigh absolute.

Given the robustness of the modern right against compelled speech, should the First Amendment also be understood to protect a robust right not to listen? Given the general symmetry between speaker and listener rights and their interlinked, relational nature, the answer would seem to be yes. Once the relational nature of “freedom of speech” is recognized, there is no logical reason to grant speakers greater rights than listeners; they are, after all, engaged on equal terms in a joint project—though, to my knowledge, the Court has never addressed the issue.

Moreover, not recognizing a right not to listen would have catastrophic implications for both autonomy-based and instrumental understandings of the purpose of free speech protections. The autonomy point is obvious—it is hard to imagine a greater intrusion on autonomy than forcing an individual to listen to speech they wished to avoid. But the implications for instrumental, democracy-based models of free speech are equally obvious. After all, if an incumbent government party or official can force voters to listen to the party’s propaganda but not their opponents’ propaganda, it is hard to imagine how any subsequent political election could be deemed fair or legitimate. More fundamentally, the shape and content of the public discourse essential for democracy must be under the control of the public, not the government, if popular sovereignty is to have any meaning.

It should be noted, though, that in practice, a right not to listen as against the state, while it must be real and robust in certain spheres—notably public discourse—has significant limits. The government in fact forces us to listen to messages of its choosing all the time as a condition of engaging in certain activities—often while also compelling the relevant speech. Every time one gets on a plane, one is forced to listen to a federally mandated safety announcement (and airlines are required to communicate them). Employees are forced to suffer through state-mandated trainings, such as sexual harassment trainings, all the time (and employers are required to provide them). My own employer, the University of California—a state entity—is particularly training-happy. Safety instructions are required for employees in many hazardous industries—and so on ad infinitum. But within the core First Amendment domains such as public discourse and artistic/literary expression, a very strong right not to listen—which can be offset only by the weightiest state interests—must exist. The only reason it has not been recognized, it would seem, is that governments appear to assume the existence of such a core right and so stay clear of it.

B. Relational Rights: Speakers v. Listeners

While a right not to listen as against the state seems clearly justified by basic First Amendment principles, much harder questions arise when we consider the nature of a right to be left alone in the context of the relationship between speakers and listeners. If individuals have a right not to listen to a message the state seeks to foist on them, what about a message that a private speaker wishes to force them to absorb?

  1. Four Scenarios

To understand the nature of the relationship between speakers and listeners, it is worth considering four different scenarios. In the first, both speaker and listener are willing, and wish to communicate. That is the core of First Amendment law, in which the only question is state power to coerce—when coercing either speaker or listener necessarily coerces the other. A second scenario is when neither speaker nor listener is willing or desirous of communicating. In that situation, state interference would be fairly bizarre, except under specific regulatory circumstances, such as safety videos on airlines or workplace trainings, both situations in which neither the speaker nor listener has a choice not to participate. Indeed, the fact that we sometimes compel both speech and listening is a further indication of how speaker and listener interests are intertwined.43Thanks to Joseph Blocher for this insight.

The difficult question arises when speakers and listeners disagree. When a listener wishes to hear a message but a speaker does not wish to speak, the compelled speech doctrine, when applicable, prevents the government from intervening on behalf of listeners. Of course, the compelled speech doctrine does not always protect speakers. As noted earlier, within the commercial sphere, disclosure requirements are ubiquitous and intended to protect listeners—presumably McDonald’s doesn’t really want to tell customers how many calories are in a Big Mac, no matter how much the customers need or want to know. But in the sphere of political and cultural speech, the speaker’s wishes will generally prevail given the strength of the modern compelled speech doctrine.44For an argument that the Court has gone too far in this area in privileging speakers against listeners, see Toni M. Massaro & Helen Norton, Free Speech and Democracy: A Primer for Twenty-First Century Reforms, 54 U.C. Davis L. Rev. 1631, 1663–67 (2021). Nor of course can listeners engage in self-help, since physically forcing another to engage in expression is generally tortious and/or criminal conduct.

But what about the opposite situation, when a speaker wishes to speak, but their chosen audience does not want to hear their message? In that situation, does the listener have a comparable ability not to listen, as the speaker does not to speak? Note that unlike forcing someone to speak, addressing words at an unwilling listener is not inherently illegal or tortious, so speakers can—and often do—engage in “self-help” in those circumstances by foisting unwanted speech on listeners. The question is: what is the appropriate role of the government, and in particular, can the state protect listeners from unwanted speech? Oddly enough, the Supreme Court has barely addressed this question directly, and insofar as it has done so, it has suggested that the answer is no by giving little weight to listeners’ interests.45I say “interests,” not “rights,” because under the state action doctrine, listeners cannot have First Amendment rights against non-state speakers.

The most significant case to this effect is Cohen v. California.46Cohen v. California, 403 U.S. 15 (1971). In Cohen the Court, in a famously eloquent opinion by Justice Harlan, reversed Cohen’s conviction for wearing a jacket into a courthouse with the words “Fuck the Draft” written on it.47            Id. at 16, 26. The case is generally understood to hold that non-obscene but offensive or indecent speech is protected by the First Amendment. But in the course of so holding, the Court had to address the objection that Cohen had “thrust [his speech] upon unwilling or unsuspecting viewers” and that the government had the right to shield that audience from offense.48Id. at 15. The Court’s response was that absent an “intrusion in to the privacy of the home,” the only remedy for offended viewers was “averting their eyes.”49Id. at 21. The Court failed, it should be noted, to explore how that remedy would work with respect to oral speech.50Id.

A more recent decision involving highly offensive speech, Snyder v. Phelps,51Snyder v. Phelps, 562 U.S. 443 (2011). adopts a similar tone. In Snyder, members of a church (the Westboro Baptist Church of Topeka, Kansas) repeatedly protested at military funerals to publicize their belief that God was punishing the United States for its tolerance of homosexuality, especially in the military.52Id. at 448. After one such protest, the father of the fallen soldier whose funeral the church picketed sued the church and its members for intentional infliction of emotional distress and after trial, won a significant verdict.53Id. at 450. But the Supreme Court, by an 8-1 vote, reversed. It held that because the protesters’ speech was “on a matter of public concern,” the First Amendment flatly precluded imposing liability based on the offensiveness or hurtfulness of the speech.54Id. at 458. And crucially for our purposes, when confronted with an argument based on the enormous (and uncontested) emotional harm that the protesters’ choices imposed on the father, the Court responded as follows: “But Westboro conducted its picketing peacefully on matters of public concern at a public place adjacent to a public street. Such space occupies a ‘special position in terms of First Amendment protection.’ ”55Id. at 456 (quoting United States v. Grace, 461 U.S. 171, 180 (1983)). In other words, the Court’s view was that at least in the public forum, the rights of offensive speakers almost always trump those of offended listeners. Nor are Cohen and Snyder alone in holding that at least in public places, offended audiences must bear the significant burdens and costs of offense.56See, e.g., Erznoznik v. City of Jacksonville, 422 U.S. 205, 210–11 (1975).

The only nod the Court has given towards the notion that audience members have some interest in avoiding unwanted speech can be found in the so-called “captive audience” doctrine. In theory, the captive audience doctrine provides that when speech is being forced upon listeners who cannot reasonably avoid it, the government may step in and silence the speech.57For a good, recent summary of the doctrine, see generally R. George Wright, The Captive Audience Doctrine Today 20 Duke J. Const. L. & Pub. Pol’y 1 (2025). And famously, in 1974 in the Lehman v. City of Shaker Heights decision, the Court—albeit in a splintered opinion—applied that doctrine to uphold a municipal regulation that refused to accept political advertising in the interior of buses and street cars, even though other advertising was accepted.58Lehman v. City of Shaker Heights, 418 U.S. 298, 302 (1974) (plurality opinion); id. at 307–08 (Douglas, J., concurring). But in fact, a closer look shows that since 1974, the so-called “captive audience” doctrine is more bark than bite.

It is true that in a handful of cases, the Court has invoked concepts of captive audiences to uphold restrictions on speech. Thus in Rowan v. United States Post Office Department, the Court cited the captive audience doctrine in upholding a law that permitted mail recipients to refuse to accept more mail from a particular sender.59Rowan v. U.S. Post Off. Dep’t, 397 U.S. 728, 738 (1970). Similarly, in F.C.C. v. Pacifica Foundation, the Court justified a restriction on daytime broadcasts of “indecent” materials in part on the theory, citing Rowan, that broadcasting invades the home.60FCC v. Pacifica Found., 438 U.S. 726, 748–49 (1978). And perhaps most famously, in Frisby v. Schultz, the Court upheld a municipal prohibition on targeted, residential picketing on the basis of the state’s strong interest (citing both Rowan and Pacifica Foundation) in shielding individuals from unwanted speech in their homes.61Frisby v. Schultz, 487 U.S. 474, 484–85 (1988). However, all of those cases involve the home, where special privacy considerations (quite aside from the First Amendment) obviously exist. Outside of the home, Lehman remains the only significant precedent applying concepts of “captive audiences,” and truth be told under the modern (post-1974) public forum doctrine, concepts of captive audiences are likely unnecessary to uphold the City of Shaker Heights’s subject-matter-based, but viewpoint-neutral, restriction on speech in a nonpublic or limited public forum.62Minn. Voters All. v. Mansky, 585 U.S. 1, 12–13 (2018).

The Court’s decision in Snyder also supports the proposition that the captive audience doctrine has, in recent years, been limited to the home. When the plaintiff in Snyder raised a captive-audience argument in favor of restricting the Westboro Baptist Church’s funeral protests, the Court dismissed the idea that a father might be a captive audience at his son’s funeral by invoking Cohen’s holding that the burden was on Mr. Snyder to “avert[] his eyes.”63Snyder v. Phelps, 562 U.S. 443, 459–60 (2011) (quoting Erznoznik v. City of Jacksonville, 422 U.S. 205, 210–11 (1975)). When posed with a captive-audience argument, the Snyder Court strongly suggested that that doctrine was largely restricted to speech intruding into the home, citing Rowan and Frisby.64Id. It is true that in its discussion the Court also referred to the fact that when driving to the funeral, Snyder could only see the tops of Westboro’s signs;65Id. at 460. Snyder saw the content of the signs later that evening on television. Id. at 449. but, there is no indication in the Court’s opinion that the result would have been different if Snyder had seen the signs, so long as the Westboro demonstration did not actively interfere with or disrupt the funeral.

Why is it that a Court that is so ready to recognize a robust right not to speak—one that operates against the state and listeners—seems to be unaware of the possibility of a similar right not to listen (at least outside the listener’s home) as against insistent speakers? The answer, I would posit, lies in the much-neglected interaction between speakers’ and listeners’ rights. In particular, recognizing a right not to listen raises the problem of how to reconcile a speaker’s interest in reaching a particular audience, with a listener’s interest in not being part of that audience. Moreover, the leading scholarly discussion of a putative right not to listen similarly adopts a unilateral rather than a relational approach.66Caroline Mala Corbin, The First Amendment Right Against Compelled Listening, 89 B.U. L. Rev. 939 (2009). In that article, Caroline Mala Corbin makes a compelling case, based both on the autonomy interests of listeners,67Id. at 982–93. and on more instrumental concerns about democratic self-governance,68Id. at 993–96. for a First Amendment right not to listen, and I am happy in this article to accept and build upon that analysis. But she does not address the implications of such a right for the corresponding rights of speakers, or the relationship between what she treats as independent rights of speakers and listeners. We will therefore turn to that issue next.

  1. A Right to Be Left Alone

In evaluating the nature of a right not to listen as against speakers, the crucial initial insight is that when a listener positively objects to being exposed to the speaker’s message, a conflict arises between a speaker’s right to choose her audience, and a listener’s right to choose her speakers/messages. In that situation, the Supreme Court, in cases such as Cohen and Snyder, seems to assume that unless the speaker and speech are intruding into the home, a speaker’s interest in expounding her message to any and all must prevail over a listener’s desire to not listen, and to be left alone. But the Court gives no explanation in any of these cases for why this is so, other than generalized references to the need for robust public discourse. And because the Court has never addressed, much less recognized, a right not to listen outside the home, it does not seem to realize that the situation potentially poses a problem of competing constitutional interests, not just a speaker’s right prevailing over general societal interests. But in fact, for all the reasons already stated there are strong reasons to recognize constitutionally grounded listeners’ interests in such contexts, which makes some effort towards reconciliation necessary.

In seeking to reconcile speakers’ and listeners’ rights when they potentially conflict, it is absolutely essential to recognize the deeply interrelated nature of those rights—something the Court has failed to do. As discussed earlier, speakers and listeners are just two sides of the same expressive coin; indeed, it might be said that there are not two rights at issue here, but rather one joint right to engage in/receive expression. But as in so many other situations, when joint rights holders—or for that matter, joint property owners—disagree, resolving such conflicts is extremely difficult.

Nonetheless, recognizing the joint roles of speakers and listeners in expression does lead to some important insights. Most importantly, recognizing the relational nature of freedom of speech strongly suggests that there is little to no social value associated with speakers who address specific listeners against their will. But even here, an important distinction must be made. When unpopular or even deeply offensive ideas are expounded as a part of what I will call “one-to-many” speech, which is to say speech that is available to the public or significant portions of it,69I thank Eugene Volokh for coming up with this nomenclature. See generally Eugene Volokh, One-to-One Speech vs. One-to-Many Speech, Criminal Harassment Laws, and “Cyberstalking”, 107 Nw. U. L. Rev. 731 (2013). speakers’ rights must normally prevail over listeners’ rights.70For a similar argument, see James Grimmelmann, Listeners’ Choices, 90 U. Colo. L. Rev. 365, 386–87 (2019). The reason is that in that situation, permitting listeners to prevail would scrub public discourse of unpopular ideas, a result which is anathema to the First Amendment. Put differently, permitting individual listeners to invoke a right not to listen to shut down one-to-many speech would amount to an impermissible heckler’s veto.

The analysis is very different, however, when dealing with one-to-one or one-to-a few speech. When speakers address unwilling, individual listeners who have expressed their desire not to be spoken to, the primary goal of continued speech is often no longer to convince or to add to the putative “marketplace of ideas.” It is rather to inflict harm on the listener/victim. As such, it has no legitimate claim to First Amendment protection in light of the greatly diminished speaker interests and very strong listener interest in not listening. It is this principle that led the Court to uphold a ban on targeted, residential picketing in Frisby v. Schultz, while clarifying that a ban on non-targeted residential picketing would almost certainly be invalid.71Frisby v. Schultz, 487 U.S. 474 (1988). The Court seemed to be assuming, reasonably in my view, that targeted picketing was overwhelmingly likely to be one-to-one speech, while nontargeted picketing was one-to-many. Its error was to assume in Frisby and other captive audience cases that a listener’s interest in avoiding one-to-one speech is limited to the home.

The very idea that speakers have some sort of First Amendment right to thrust their speech on unwilling listeners is based on a rigid, “individual rights” based approach to First Amendment analysis, which does not sufficiently account for complexity. Once one recognizes the interpersonal and associational nature of communications as a joint enterprise between speaker and audience, it should be obvious that no speaker has a “right” to thrust their views on unwilling audience members any more than an individual has a right to insist on joining a First Amendment association in which they are not welcome.72Boy Scouts of Am. v. Dale, 530 U.S. 640 (2000). To posit such a right—as the Supreme Court appears to in cases like Cohen and Snyder—is to posit a personal right on the part of individuals to try to persuade or convert other individuals to the speakers’ beliefs against their will, not as a part of public debate and discourse, but as a part of a personal conversation.

But where could such a right possibly arise from? If, as I have posited, the “freedom of speech” protected by the First Amendment is an interpersonal, relational concept, then the right surely does not arise from the First Amendment. After all, we do not understand any constitutional right to encompass an entitlement to coerce others—the Second Amendment may protect gun ownership,73District of Columbia v. Heller, 554 U.S. 570 (2008). but it does not protect the stick up. And it must be remembered that the First Amendment only protects speakers from censorship or silencing by the state, not from censorship by other private individuals.74Manhattan Cmty. Access Corp. v. Halleck, 587 U.S. 802, 808 (2019). Recognizing this seemingly mundane point, however, points a way towards how we might reconcile a posited right to be left alone with a speaker’s right to their chosen audience, all the while bearing in mind important First Amendment limits on state power.

C. Reconciliation: The State as Referee

What then, is the role of the government when a speaker seeks out a specific audience, but that audience is not willing to listen? And in particular, because (as noted earlier) listeners have a limited ability to engage in self-help (at least outside the home) vis-à-vis a persistent speaker, is there a role for the government in empowering unwilling listeners?

In that regard, one conclusion follows easily from basic First Amendment principles. Because “above all else, the First Amendment means that the government has no power to restrict expression because of its message, its ideas, its subject matter, or its content,”75Police Dep’t. of Chi. v. Mosley, 408 U.S. 92, 95 (1972). it is clear that the government may not itself decide, purportedly on behalf of unwilling listeners, that speech of a specific content or viewpoint will be unwelcome. That role lies solely with the listeners themselves, and for the government to take on the role of proxy censor could very easily become a vehicle for censoring speech the government itself disfavors. Indeed, even when empirically it seems very likely that a targeted audience will not want to be exposed to particular speech—for example, anti-abortion speech directed at abortion clinic patients, or anti-military protests directed at attendees at a military funeral—it remains true that the government’s role cannot be to silence the speech on the assumption that it will be unwelcome. This is why the rule against content discrimination remains in place, and should remain in place, even in particularly sensitive situations such as the home, reproductive health care facilities, and funerals.

That said, however, once one recognizes that speakers have no First Amendment right, free of government regulation, to foist themselves upon unwilling listeners—and indeed, that listeners do have legitimate interests in avoiding undesired speakers or content—it seems clear that the government has a legitimate role to act as facilitator, assisting listeners to invoke their “right” to be left alone—or perhaps better put, their desire not to engage in a communicative relationship with a particular speaker. For that reason, there should be no constitutional problem with the state creating mechanisms that enable listeners to communicate to speakers that they desire to be left alone. There should also be no First Amendment barrier, assuming the listener(s) do invoke their First Amendment interest in being left alone, to the government penalizing a speaker who nonetheless persists in pursuing their unwilling victims. In that situation, the speaker has no First Amendment rights at stake, so a penalty is perfectly constitutional.

To be clear, the government has no obligation to create such a mechanism. Since unwilling listeners have no First Amendment rights against private speakers, they have no constitutional claim to be left alone. But what should be recognized is that in the context of willing speakers and unwilling listeners, or vice versa, given the relational nature of the “freedom of speech,” neither party has a constitutional right at stake, and so some forms of government interventions should not be barred.

Putting this insight in doctrinal terms argues for the courts to recognize a separate category of unprotected speech that is based not on the unprotected content of the speech (as with obscenity, “true threats,” etc.), but on the fact that it is foisted (exclusively) upon unwilling listeners after they have invoked their desire not to listen. Whatever one calls this category—harassment, stalking, or something else—it would permit punishment by the state purely upon proof that the speaker was made aware of their audience’s desire not to listen but nonetheless continues to communicate.

Needless to say, however, for reasons already discussed, any mechanism designed to protect listeners’ desires to be left alone cannot be invoked in one-to-many speech situations, in which there are other, willing listeners in the broader audience who would be deprived of their access to speech. In this situation, “freedom of speech” does exist, and so silencing the speaker will violate both the speaker’s and the willing listeners’ First Amendment rights. And because the First Amendment presumptively favors speech over silence, it clearly cannot permit letting some unwilling listeners’ rights to trump two other sets of rights.76I leave aside the question of whether the mere possibility of the existence of a willing listener should trump an unwilling listener’s rights; my instinct is that that issue is too fact-dependent to be susceptible to abstract analysis. Note that with respect to speech occurring in open public dialogue, such as public protests or speech in the media (including social media platforms), there will essentially always be some willing listeners in the audience, and so recognizing a right to be left alone would never result in suppressing such speech. In other words, recognizing a constitutionally based interest in being left alone has little or no implications for broad, public debate. Importantly, this ensures that all individuals, even the most irascible, will regularly be exposed to viewpoints they reject, and so will have the opportunity to change their minds.

Note that under this view, Snyder v. Phelps was correctly decided. The speech in that case, a public protest by the Westboro Church was a form of one-to-many speech, not speech directed solely or mainly at the victim. Indeed, as noted earlier, the plaintiff in that case, the grieving father, did not even see the signs at the time of the protest.77Snyder v. Phelps, 562 U.S. 443, 449 (2011). In that situation, it was impermissible for the state to silence the speakers in order to protect Snyder’s desire to be left alone, because the result would be to silence protected speech as to other listeners. The Pacifica Foundation Court, however, was wrong to uphold the FCC’s restrictions on indecent broadcasting, at least insofar as it relied on the existence of unwilling listeners, because radio broadcasts are a classic form of one-to-many speech (whether protecting children might separately support the rule is a different matter).

Therefore, a right of listeners to be left alone should not impact public debate or cleanse it of unpopular or offensive ideas. In the context of privately communicated speech, however, the implications of the above analysis are significant. It means that individuals who insist on repetitively speaking to their chosen audience/victim(s) after the listener has invoked their right to be left alone have no First Amendment rights—and so can be prosecuted without raising constitutional concerns. It also means that in a myriad of other situations in which the Court has suggested that the burden must be on listeners to avert their eyes, move on to another place, or simply suffer, the state has a legitimate role to play in reducing that burden so long as it does not impact public debate.

Developing a specific legislative proposal for how state or federal laws might assist unwilling listeners in protecting their desire to be left alone is beyond the scope of this paper. It should be noted, however, that some such mechanisms already exist and have been endorsed by the courts—though they all, unsurprisingly, involve the home. Thus in Martin v. City of Struthers, the Court struck down a city ordinance banning the door-to-door distribution of literature, primarily on the grounds that the city could have achieved its goal of protecting tranquility in the home with narrower means such as a model ordinance that “would make it an offense for any person to ring the bell of a householder who has appropriately indicated that he is unwilling to be disturbed.”78Martin v. City of Struthers, 319 U.S. 141, 148 (1943). This approach was preferable, the Court said, because such a law “leaves the decision as to whether distributors of literature may lawfully call at a home where it belongs—with the homeowner himself,”79Id. which in the language of this essay means in the hands of the unwilling listener. The Court’s decision in Watchtower Bible and Tract Society of New York, Inc. v. Village of Stratton, recognizing a home “resident’s unquestioned right to refuse to engage in conversation with unwelcome visitors,”80Watchtower Bible and Tract Soc’y of N.Y., Inc. v. Village of Stratton, 536 U.S. 150, 168 (2002). is to similar effect. The ordinance upheld in Rowan81Rowan v. U.S. Post Off. Dept., 397 U.S. 728, 738 (1970). permitting mail recipients to refuse to receive additional mail from unwanted mailers is as well.82In Frisby v. Schultz, the residential picketing case discussed earlier, Justice Stevens dissented on the grounds that the ordinance banning residential picketing was overbroad because it covered picketing to which the residents did not object. Frisby v. Schultz, 487 U.S. 474, 497–99 (1988) (Stevens, J., dissenting). His point is a fair one and suggests that the statute at issue regulating residential picketing should have been triggered only when residents of the targeted home clearly communicated to the picketers their desire to be left alone.

It is true, of course, that it is much easier to put up an outdoor “No Solicitation” sign at one’s home—the remedy endorsed in Martin and Watchtower Bible—than in public places. But given the above analysis, there is no good reason to limit the principle established in these cases to the home. Moreover, it is not hard to imagine a law stating that when an individual is addressing another and the listener uses unambiguous language indicating an intent to be left alone, such as “please stop talking to me,” “I don’t want to hear this,” or “leave me alone,” the speaker then will have a legally enforceable obligation to stop speaking to that individual (but not to others, so in one-to-many situations this law would have no impact).

Some clarifications are necessary, however. First, at least outside of the home, invoking the right to be left alone cannot be indefinite—any statute protecting that right must specify a time period after which the invocation expires and has to be re-invoked.83Thanks to Christina Koningisor for this insight. That caveat, like the continuing protection for one-to-many speech, leaves open the possibility that unwilling listeners can and will sometimes change their minds. Further, the period after which invocation by unwilling listeners expires may well vary with circumstances—and again, any statute addressing this issue must specify that. And in this respect, homes are arguably special. No Solicitation signs outside one’s home constitute essentially permanent invocations—though signs can of course be taken down—as did the request to stop mail upheld in Rowan, though of course that too could be revoked. In some settings such as online interactions, one can imagine invocations lasting for weeks or months. But in personal interactions, it might well be reasonable to require reinvocations every hour or two. Details such as these are for legislatures to work out, the results of which should be due a good deal of deference from courts.

To be sure, in evaluating situations in which a speaker’s desire to communicate collides with their audience’s wishes not to be communicated to, and the state has stepped in to protect the listener, courts must tread with caution, bearing in mind the following considerations. First, it is inevitable that the government—in the shape of both legislatures and executive enforcers—will sometimes manufacture unwilling listeners as a tool to silence speech that the government itself objects to. Therefore, courts must examine any listeners’ rights laws carefully to smoke out such censorship (most obviously by insisting that the listener, not the state, identify unwanted speech). In addition, courts themselves must be cautious to not permit their own instincts as to what constitutes “undesirable” or “offensive” speech to color their decisions, by finding listener objections when none truly exists. Thus courts must insist that any enforcement of a listener’s right to be left alone must be accompanied by a clear and unambiguous invocation of that right by the rights-holder themselves.

In short, there are details to be worked out, and there are undoubtedly complexities raised by attempts to legally empower listeners to avoid unwanted speech, especially outside the home. But the crucial point is that there should be no First Amendment objection to government efforts to so empower listeners—with all the caveats laid out above, including in particular the point about one-to-many speech. There are statutory mechanisms available that could achieve those goals. Indeed, as the next Part discusses, some such mechanisms are already in place whose constitutionality has been questioned but should not be, albeit perhaps after some changes are made to reflect concerns discussed above.

III.  Applications

In this Part, we will consider some practical applications of listeners’ rights to be left alone in areas where divisive litigation has been common and courts have struggled mightily to craft consistent and facially plausible solutions.

A. Counterman, Stalking/Harassment, and Fighting Words

The most obvious area in which the above analysis has application is the status under the First Amendment of laws regulating harassment and stalking. The Supreme Court considered this issue in its recent decision in Counterman v. Colorado,84Counterman v. Colorado, 600 U.S. 66 (2023). but because the majority completely failed to consider listener interests in its analysis, and as a result failed to distinguish between “threats” cases (which involve the fear of violence) and harassment/stalking cases (which involve unwilling listeners), Justice Kagan’s majority opinion frankly botched the analysis.

Counterman involved a criminal prosecution arising out of a deeply disturbing set of facts. The defendant, Counterman, repeatedly sent Facebook messages to C.W., a local musician whom he had never met.85Id. at 70. Some were prosaic, if bizarre (since they were from a stranger), but others were menacing.86Id. Ultimately, Counterman was convicted under Colorado’s anti-stalking statute, the relevant part of which makes it a crime to “repeatedly . . . make any form of communication with another person” in “a manner that would cause a reasonable person to suffer serious emotional distress and does cause that person . . . to suffer serious emotional distress.”87Id. (quoting Colo. Rev. Stat. § 18-3-602(1)(c) (2022)). The Colorado courts rejected Counterman’s First Amendment defense on the grounds that his speech constituted unprotected “true threats,” applying an objective definition of a threat as speech which a reasonable person would view as threatening.88Id. at 71. The Supreme Court, however, reversed. In a majority opinion by Justice Kagan, the Court held that to prosecute a true threat, the First Amendment required proof of a subjective mental state, in particular recklessness, meaning that the speaker acted with conscious disregard of the risk that the speech at issue would instill fear in the victim.89Id. at 79–82.

What is truly odd about this analysis is that Counterman was not actually a case about threats at all; it was a case about unwanted speech. While some of Counterman’s messages may have been threatening, the harassment and stalking aspects of his awful behavior were not dependent on that—they would have existed even if all the messages were prosaic. The Colorado courts presumably applied the true threat doctrine because they reasonably believed that to uphold Counterman’s conviction, they had to pigeonhole it into a category of “unprotected speech” that the Supreme Court had previously recognized, and true threats is such a category.90Virginia v. Black, 538 U.S. 343, 359 (2003). Indeed, as Genevieve Lakier and Evelyn Douek explain, since the Supreme Court’s pathbreaking 2010 decision in United States v. Stevens sharply limiting the power of courts to recognize new categories of unprotected speech,91United States v. Stevens, 559 U.S. 460 (2010). lower courts have been able to uphold anti-stalking legislation only by characterizing the speech at issue as falling within an already recognized category of unprotected speech—generally either “speech integral to criminal conduct” or “true threats.”92Genevieve Lakier & Evelyn Douek, The First Amendment Problem of Stalking: Counterman, Stevens, and the Limits of History and Tradition, 113 Cal. L. Rev. 143, 148–49 (2025). Eugene Volokh similarly argues that under current law, lower courts cannot treat “harassment” as unprotected speech unless it falls within a category such as threats—a position that Justice Alito took in an opinion predating his elevation to the Supreme Court, which has been followed by numerous other jurisdictions.93Eugene Volokh, Overbroad Injunctions Against Speech (Especially in Libel and Harassment Cases), 45 Harv. J.L. & Pub. Pol’y 147, 191–92 (2022) (citing Saxe v. State Coll. Area Sch. Dist., 240 F.3d 200, 204 (3d Cir. 2001)).

All of which is well and good—but it has no relevance to the Supreme Court itself, which of course does have authority to expand the realm of unprotected speech. Even if Stevens indicates that the Court will not recognize new categories of unprotected speech based on the content of the speech absent a historical tradition,94Stevens, 559 U.S. at 472. it certainly does not close the door to recognizing factors other than content that might take speech outside of First Amendment protections—such as its unwanted nature. The Supreme Court had an opportunity to recognize such a category in Counterman but failed to do so because it failed to distinguish harassment and stalking from threats.95Justice Sotomayor, joined by Justice Gorsuch, were the only members of the Court who seemed to recognize the difference between the stalking behavior in that case and the broader issue of “true threats” in public discourse addressed by the Court. Counterman v. Colorado, 600 U.S. 66, 85–86 (2023) (Sotomayor, J., concurring in part and concurring in the judgment). Yet even they did not take the logical step of simply dismissing Counterman’s First Amendment claims, but rather also ended up stuck in the morass of debating mens rea.

It is quite possible that the Court’s failure to consider harassment/stalking as a separate speech problem from threats was because that is how the parties to the litigation (and the lower courts) posed the issue. But by analyzing the case as it did, the Court has created a serious risk that moving forward, lower courts will treat harassment and stalking issues as co-extensive with the threats doctrine, thereby ignoring the implications of Rowan and the right to be left alone.96Cf. State v. Pierce, 887 A.2d 132, 133, 135 (N.H. 2005) (striking down a ban on “communicat[ing] with [a] person . . . with the purpose to annoy or alarm [such person], having been previously notified that the recipient does not desire further communication,” without citing Rowan). If the Court had analyzed the case properly, it would have recognized that because Counterman’s speech was unwanted, and because his victim had invoked her right to be left alone, as she did in that case by repeatedly blocking Counterman on social media,97Id. at 70. the existence of a threat was irrelevant. Counterman’s expression was a classic case of repeated infliction of unwanted speech in a one-to-one context, and so there should have been no barrier to his prosecution under a properly drafted statute—though it is unclear whether the actual Colorado statute in that case satisfied those standards.

Nor are the implications of paying attention to listeners’ interests limited to stalking. Most obviously, laws designed to enable listeners to enforce their right to be left alone, such as the Federal Trade Commission’s Do Not Call Registry, are clearly constitutional on this view.98National Do Not Call Registry, Fed. Trade Comm’n, https://www.donotcall.gov [https://perma.cc/KXG3-Y8SM]. Similarly, prohibitions on telephone or other harassment under which penalties are triggered when the victim communicates their desire to be left alone also pose no constitutional concerns.99Because my analysis is limited to instances in which a victim has invoked her right to be left alone, it does not address the problem of intentional harassment initiated before such an invocation, which many states also criminalize. Addressing that problem would require recognition of either a new category of unprotected speech or recognizing a power to regulate speech based on a combination of content and bad speaker motive, both topics beyond the scope of this paper. More generally, recognizing that speakers have no First Amendment interest in forcing speech onto unwilling listeners opens the door to a wide range of regulations addressing such things as email spam, spam texting, and even junk mail (following in the footsteps of Rowan).

Consider also harassment litigation arising out of campus protests regarding the Gaza war,100Kathryn Palmer, The Litigation After the Protest Storm, Inside Higher Ed (May 21, 2024), https://www.insidehighered.com/news/governance/executive-leadership/2024/05/21/litigation-after-protest-storm# [https://perma.cc/P7SJ-HCPT]. or complaints by members of Congress that by failing to control such protests campuses permitted harassment of Jewish students.101Jacey Fortin, 5 Takeaways From the Latest Hearing on Campus Antisemitism, N.Y. Times (May 23, 2024), https://www.nytimes.com/2024/05/23/us/college-antisemitism-hearing-protests.html [https://perma.cc/6GRC-A3B7]. Insofar as these harassment claims are rooted in one-to-one speech, such as following students around and yelling slurs or otherwise directing hostile speech at individual students who have demanded to be left alone, the First Amendment under the above analysis provides no protection to such speech. (Whether universities have a legal obligation to protect victims from such speech is, of course, a different matter.) On the other hand, to the extent that claims of harassment are rooted in slogans yelled during protests such as “From the River to the Sea,” which many people consider antisemitic, or the allegedly antisemitic content of signs, this is classic one-to-many speech which cannot be condemned purely because of its unwanted nature; indeed, at least with respect to public universities silencing such speech, it would almost certainly constitute viewpoint discrimination in violation of the First Amendment. The same would be true even regarding calls for genocide that Republican members of Congress such as Elise Stefanik complained about,102Annie Karni, Questioning University Presidents on Antisemitism, Stefanik Goes Viral, N.Y. Times (Dec. 7, 2023), https://www.nytimes.com/2023/12/07/us/politics/elise-stefanik-antisemitism-congress.html [https://perma.cc/EST5-N6YW]. since such calls surely would not qualify as unprotected incitement under the stringent test of Brandenburg v. Ohio.103Brandenburg v. Ohio, 395 U.S. 444, 447 (1969). After all, for better or for worse, there is no “awful speech” exception to the First Amendment.

Finally, consider the “fighting words” doctrine. In its 1942 decision in Chaplinsky v. New Hampshire, the Court held that so-called “fighting words”—which is to say curse words or insults delivered in person—are not protected by the First Amendment.104Chaplinsky v. New Hampshire, 315 U.S. 568, 572 (1942). This holding is rooted in assumptions that fighting words are likely to trigger a violent response from their target, and that such a response would be justified.105Id. The fighting words doctrine has been subject to sharp criticism,106Kathleen M. Sullivan, Forward: The Justices of Rules and Standards, 106 Harv. L. Rev. 22, 42 (1992). but the Court has yet to abandon it. In truth, though, the assumptions underlying the doctrine seem seriously outdated, and are also highly gendered, based as they are on a “real men” ethos. Based on the reasoning of Chaplinsky alone, therefore, the doctrine probably should be overruled.

On the other hand, it seems likely that in most circumstances fighting words are going to be unwanted speech, from the listener’s perspective. Furthermore, the typical fighting words situation involves one-to-one speech (indeed, it is doubtful if the fighting words doctrine would apply to one-to-many speech).107Cf. Terminiello v. City of Chicago, 337 U.S. 1, 4 (1949) (raising, but declining to resolve, the issue). If, however, a target of fighting words expresses to the speaker a desire to be left alone, then any subsequent speech by that speaker would, under my approach, violate the right to be left alone, and so become unprotected. Admittedly, this approach to fighting words does not address the “first blow” of curse words spoken only once; but it does have the advantage of not resting on dubious assumptions.

B. Hill, McCullen, and Avoiding Offense

Another area in which conflicts between speakers and listeners regularly arise is in the context of protests and other expression near health care facilities that provide abortion services. The difficulty arises because on the one hand, the speech of protestors and others—whether pro- or con-abortion rights—is obviously speech on important, controversial, and politically charged topics, and so receives the highest level of First Amendment protection. But on the other hand, it seems reasonable to assume that most members of the audience for this speech—who are overwhelmingly employees or patients of the relevant clinics—would prefer not to hear the speech, sometimes strenuously so. Therefore, courts and legislatures struggle with how to address these conflicts.

While First Amendment cases involving speech near abortion clinics, even in the Supreme Court alone, are myriad, I will focus my discussion on two of the most important and controversial of them. The first is Hill v. Colorado.108Hill v. Colorado, 530 U.S. 703 (2000). Hill involved a challenge to a Colorado statute that limited speech within one hundred feet of the entrance to a healthcare facility.109Id. at 707. In particular, the law prohibited any person within that area from approaching within eight feet of another person without their consent “for the purpose of passing a leaflet or handbill to, displaying a sign to, or engaging in oral protest, education, or counseling with such other person.”110Id. (quoting Colo. Rev. Stat. § 18-9-122(3) (1999)). Characterizing the issue before it as whether this law “reflects an acceptable balance between the constitutionally protected rights of law-abiding speakers and the interests of unwilling listeners,”111Id. at 714. the Court ultimately upheld the statute. In doing so, the Court relied heavily upon the government’s interest in protecting an “unwilling listener’s interest in avoiding unwanted communication,” citing Frisby and Rowan.112Id. at 716–17.

Justice Scalia’s dissent took sharp issue with this reasoning. He argued that because the Colorado statute was based on the assumption that only speech within the statutory prohibition—“protest, counseling, and education”—was likely to be unwelcome, the law was content-based and so invalid.113Id. at 747–48 (Scalia, J., dissenting). At least as to this point, it should be noted, Justice Scalia’s argument is entirely consistent with my analysis set forth above (and concomitantly, the majority’s is not). The State may not decide for itself what speech is unwelcome, and insofar as Colorado did so, its law was invalid.

But Justice Scalia did not stop at this point. He went on to argue that any law targeting unwanted communications was automatically content-based, because the law was triggered by the communicative impact of the unwelcome communication. As such, he would have invalidated any such law.114Id. at 748 (Scalia, J., dissenting). But that goes a step too far, insofar as it suggests that speakers have a right to impose their speech on others when their audience has actively asserted a desire not to listen. In a later abortion case (discussed next), Justice Scalia suggested that his argument that the government had no legitimate interest in protecting people from unwanted speech was limited to restrictions on speech “in the public streets and sidewalks.”115McCullen v. Coakley, 573 U.S. 464, 505 (2014) (Scalia, J., concurring in the judgment). But again, Justice Scalia is off the mark. The key question is not where the speech occurs, but whether the speech is directed solely at unwilling listeners, as opposed to a broader audience (in other words, one-to-one versus one-to-many). Certainly, in many instances, including Snyder, it is reasonable to assume that speech in public places is directed at the public. But that assumption does not hold in the context of all anti-abortion protests, in which the speech is sometimes directed solely and directly at often-unwilling employees and patients. In Snyder, the Westboro Baptist Church sought out a broader audience for their protest by contacting the press and drawing attention to themselves; it is therefore doubtful if the protest would have proceeded if no one aside from funeral attendees had shown up (remember that the plaintiff in Snyder did not even see the speech at the time of the protest). But the same is very much not true of anti-abortion protests, which regularly occur without any broader public presence, and which are sometimes, though certainly not always, designed and intended to cause emotional harm to their “audience.”

Now consider the Court’s most recent, significant decision in this area, McCullen v. Coakley.116Id. at 464. There, the Court unanimously invalidated a thirty-five foot “buffer zone” that Massachusetts mandated around the entrances of abortion clinics, in which no one was allowed to enter or remain in, except for specific purposes such as simply walking through, people on clinic business, and law enforcement and other public functions.117Id. at 471. The Court, however, divided sharply on its reasoning. A five-Justice majority (with Chief Justice Roberts writing) found the law content-neutral but nonetheless concluded that it failed intermediate scrutiny.118Id. at 485, 497. The concurring Justices (led again by Justice Scalia) would have invalidated the law as a content-based restriction on speech.119Id. at 502–05 (Scalia, J., concurring in the judgment).

What is interesting for our purposes is that in the course of finding content-neutrality, even the majority conceded (without mentioning Hill, oddly) that if the Massachusetts law had been “concerned with undesirable effects that arise from ‘the direct impact of speech on its audience’ or ‘listeners’ reaction to speech,’ ” it would have been content-based.120Id. at 481 (quoting Boos v. Barry, 485 U.S. 312, 321 (1988)). And Justice Scalia in his concurring opinion of course agreed with this point (while lambasting the majority for not expressly overruling Hill).121Id. at 504–05 (Scalia, J., concurring in the judgment). The only issue on which the Justices disagreed was whether this was, in fact, the actual purpose of the Massachusetts law.

But unanimous or not, the Justices seem simply wrong on this point. Certainly, anti-abortion speakers have a right to make their case to the public, even if the ways in which they do so are distasteful or offensive. And certainly, the state has no interest in purging their speech from public debate, including in one-to-many speech in particular, simply because some members of the audience object to it. But to suggest that the state has no interest in protecting unwilling speakers at all is just wrong, in giving no weight to listener interests and failing to distinguish between public debate (meaning one-to-many speech) and private speech (meaning one-to-one speech).

In short, the bottom line is that insofar as the Colorado and Massachusetts laws in Hill and McCullen were based on the state’s assumption that anti-abortion speech is unwelcome, the Court was wrong to uphold the Colorado law and correct to invalidate the Massachusetts one. And the Justices are, to reiterate, also clearly correct that speech cannot be expunged from public debate simply because it might offend or discomfit some who hear it. But by going further and suggesting, as Justice Scalia did in Hill and all the Justices did in McCullen, that the state has no interest in enforcing listeners’ expressed preferences to be left alone, they are just wrong. The question of how a state might design a mechanism to enforce those expressed preferences has already been discussed; but for the purposes of this discussion the key point is that the Court appears in these cases to be conflating two entirely separate questions: the exclusion of offensive speech from public debate, which is impermissible, and the enforcement of listeners’ expressly invoked right to be left alone, which is not.

C. Regulating the Internet

In the summer of 2024, the Supreme Court issued an opinion in Moody v. NetChoice, LLC.122Moody v. NetChoice, LLC, 603 U.S. 707 (2024). The case involved challenges to two statutes, one enacted in Florida and the other in Texas, which both regulated the content moderation practices of social media platforms. In particular, the Florida law restricted the power of such platforms to moderate posts by “journalistic enterprise[s]” and posts by and about political candidates.123Id. at 720. The Texas law more broadly forbade platforms from moderating content based on the viewpoint expressed in a post or the viewpoint of the poster.124Id. at 721. Both laws also granted users certain procedural rights when their posts were moderated,125Id. at 720–21. but those aspects of the laws are less relevant to this article. The Supreme Court ultimately declined to resolve the claims because the plaintiffs had chosen to bring a facial, as opposed to as-applied, challenge, and both lower courts had failed to apply the proper standard for facial challenges.126Id. at 723–26. But in the course of providing instructions on remand, a solid majority of the Court made it clear that the First Amendment provided strong protections for platforms’ editorial choices in the form of content moderation.127Id. at 726–40. As such, the Court was quite clear that if platforms chose to bring as-applied challenges to the application of at least the Texas law to their moderated “feeds” or homepages, the challenges were very likely to succeed.128Id. at 740–43.

The majority’s reasoning in NetChoice was clearly correct as a First Amendment matter129Ashutosh Bhagwat, Do Platforms Have Editorial Rights?, 1 J. Free Speech L. 97 (2021). and is more than sufficient to sustain properly framed challenges to the Texas, and, truth be told, Florida, laws. But a focus on listener interests suggests that there is something more fundamentally problematic about Florida’s and Texas’s approaches to regulating platforms. The laws of both states are rooted in the basic assumption that legislators (and Governors) know best what content listeners/users should and should not be exposed to. But that assumption and approach are antithetical to First Amendment principles. It is for individuals, not the state, to decide what expressive interactions they wish to participate in.

A much better approach would be one proposed by a group of researchers at Stanford University, led by Francis Fukuyama, which seeks to introduce competition and choice in “middleware,” meaning the software that that performs editorial and content moderation functions on platforms.130Francis Fukuyama, Barak Richman, Ashish Goel, Roberta R. Katz, A. Douglas Melamed & Marietje Schaake, Report of the Working Group on Platform Scale 30–38 (Stanford Cyber Policy Center 2020), https://cyber.fsi.stanford.edu/publication/report-working-group-platform-scale [https://perma.cc/B29N-PUXQ]. Requiring platforms to permit users to pick their middleware of choice from a competitive menu of options empowers users/listeners to choose what speech to consume, and what not to consume, and so such a law would advance listeners’ rights. Of course, such a legal requirement would still burden platforms’ editorial rights, but in a less blatantly biased (and political) manner than Florida and Texas sought to do and so might be constitutionally defensible.131How a challenge to such a law should be resolved is beyond the scope of this paper.

Another area in which a listener-centric approach yields important insights is in regulations restricting targeted advertising. For example, Article 28(2) of the European Union’s Digital Services Act (“DSA”) prohibits platforms from delivering targeted advertising to users who are minors based on their personal data.132Regulation (EU) 2022/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market For Digital Services and amending Directive 2000/31/EC (Digital Services Act), Art. 28(2), https://eur-lex.europa.eu/eli/reg/2022/2065/oj/eng [https://perma.cc/GZF5-8ETT]. While the First Amendment of course does not apply to the EU, given the so-called “Brussels Effect,”133Anu Bradford, The Brussels Effect: How the European Union Rules the World (Oxford 2020). it would not come as a surprise if the United States or one or more states within the United States, including California, followed the EU’s lead in this regard.

But the EU’s approach is misguided. It assumes that targeted advertising directed at children is inherently harmful or invasive. But, in fact, for vulnerable groups such as LGBTQ youth, shielding them from targeted content can cause substantial harm.134See Bill Easley, Revising the Law That Lets Platforms Moderate Content Will Silence Marginalized Voices, Slate (Oct. 29, 2020), https://slate.com/technology/2020/10/section-230-marignalized-groups-speech.html [https://perma.cc/S94E-5W4X]. And more fundamentally, it is always better for the state to empower listeners, even minor listeners—who after all enjoy significant First Amendment rights to access information135Brown v. Ent. Merchants Ass’n, 564 U.S. 786, 795–96 (2011).—than to make choices for them as the DSA does. For that reason, if the United States or an individual state felt it necessary to restrict targeted advertising directed at minors, it would be much better to empower minors or their parents to opt out of all, or specific forms of, targeted advertising than to enact a flat ban as the DSA does. Admittedly, authorizing parents to restrict targeted advertising could also have deleterious effects on vulnerable youth (sometimes parents are the problem); but that is a difficulty that pervades our society and can only be addressed through broader legal reforms, particularly in family law.

Conclusion

This article argues in favor of recognizing listeners’ rights to, and interests in, not to listen/be left alone. Such a right/interest comes in two forms. The first is a First Amendment right against the state, which generally would prohibit the state from forcing ideological content on unwilling listeners, a proposal that hopefully is not controversial. More difficult is a potential listener interest in avoiding speech from private speakers. Such an interest does not directly implicate the First Amendment, given the lack of state action; but in this paper I argue that nonetheless, the interest is a genuine one rooted in principles of free speech, which should be recognized: a right, as it were, to be left alone. The key implication of recognizing such a right is that it suggests that the First Amendment should not be understood to protect private speech directed at an unwilling listener who has invoked their right to be left alone, at least in a one-to-one situation. This in turn means that the First Amendment does not prohibit the state from adopting measures designed to enable unwilling listeners to invoke and legally enforce their right to be left alone, though nor does it mandate such measures.

This is not to say that protecting the right not to listen, and the right to be left alone, do not raise concerns. For one thing, it will reduce the occasions in which individuals will be exposed to ideas they do not like, which might be to the detriment of the quality of public discourse.136Thanks to Erin Miller for this point. Furthermore, a right to be left alone that must be invoked to be effective might well be less useful to the disempowered in our society, who might therefore be harmed if the government is prevented from taking the initiative in shielding them from harmful speech.137Thanks to Nelson Tebbe for this insight. But all rights come with a cost; and on balance, this paper argues that recognizing and empowering listener autonomy is worth the cost.

Finally, it should be noted that the analysis above regarding a right to be left alone, and how it can be reconciled with a speaker’s right to an audience, can also be extended to the converse situation—when the right to listen conflicts with the right against compelled speech. Here, too, one faces a potential conflict between two First Amendment interests when a listener desires some information or message but the speaker does not want to share it (perhaps the situation in the Virginia Pharmacy litigation). In this situation, as noted earlier, normally the government cannot force speakers to communicate because of the compelled speech doctrine. But as with a right to be left alone, it may well be that the government has a legitimate role in facilitating voluntary relationships between willing speakers and listeners, and in incentivizing reluctant speakers on behalf of listeners. But that is another, and complicated, topic of inquiry.

98 S. Cal. L. Rev. 1129

Download

* Distinguished Professor and Boochever and Bird Endowed Chair for the Study and Teaching of Freedom and Equality, UC Davis School of Law, contact: aabhagwat@ucdavis.edu. Thanks to Professor Erin Miller and the staff of the USC Law Review for organizing this event. Thanks also to Eugene Volokh for agreeing to serve as Discussant for this paper, and to Joseph Blocher, Alan Chen, and all the participants at the 2024 Southern California Law Review Symposium for providing extraordinarily valuable feedback.

Listening on Campus: Academic Freedom and Its Audiences

Introduction

Current debates about campus speech often conflate two related but importantly distinct values: free speech and academic freedom. Both are widely perceived to be in crisis,1Mary Anne Franks, The Miseducation of Free Speech, 105 Va. L. Rev. 218, 218 (2019) (“The claim that America’s campuses are in the midst of a free speech crisis has been made so often and so emphatically that it has widely become accepted as fact.”). See generally Thomas M. Keck, Academic Freedom and Democratic Backsliding in the Contemporary United States (Mar. 18, 2025) (unpublished manuscript), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4914871 [https://perma.cc/L2VJ-9Z83] (describing rise in threats to academic freedom, especially since 2020). but they are not interchangeable, and slippage between the two makes it even harder to frame, let alone address, difficult questions about speech in university settings. Many of the most fundamental challenges—indeed, much of what makes campus speech unique in the first place—arise from the need to accommodate both values. In doing so, defenders of academic freedom must, as advocates of free speech have, more clearly articulate an account of listener interests. The basic project of this Article is to frame that challenge and take a few initial steps toward answering it.

The most prominent (and successful, at least if success is measured by legislative and popular action) critics of the campus speech climate are invoking a free speech paradigm. Their central complaint is that faculty, administrators, and students are selectively silencing speakers and ideas. The paradigmatic victims are often isolated conservative voices,2Keck, supra note 1 (manuscript at 9) (“The archetypical beneficiary of free speech in these statements is the lonely conservative dissenter from left-liberal campus orthodoxy.”). faculty and speakers attacked for things they write or say,3See, e.g., Deirdre Bardolf, Disturbing Audio Captures Anti-Racism Instructor Attacking Principal’s “White Supremacy” Before He Killed Himself, N.Y. Post (Aug. 5, 2023, 3:15 PM), https://nypost.com/2023/08/05/dei-teacher-mocked-principal-richard-bilkszto-who-later-killed-himself-audio [https://web.archive.org/web/20230806093617/https://nypost.com/2023/08/05/dei-teacher-mocked-principal-richard-bilkszto-who-later-killed-himself-audio]; Stuart Kyle Duncan, My Struggle Session at Stanford Law School, Wall St. J. (Mar. 17, 2023, 2:59 PM), https://www.wsj.com/articles/struggle-session-at-stanford-law-school-federalist-society-kyle-duncan-circuit-court-judge-steinbach-4f8da19e [https://web.archive.org/web/20250119074715/https://www.wsj.com/articles/struggle-session-at-stanford-law-school-federalist-society-kyle-duncan-circuit-court-judge-steinbach-4f8da19e]; Jon Sanders, On Prof. Mike Adams’ Suicide, One Year Later, Carolina J. (July 23, 2021), https://www.carolinajournal.com/opinion/on-prof-mike-adams-suicide-one-year-later [https://perma.cc/DQM3-DRDV]. and students who find themselves inhibited from speaking their minds on campus.4Foundation for Individual Rights and Expression, 2025 College Free Speech Rankings 23 (2024), https://www.thefire.org/sites/default/files/2024/09/2025%20College%20Free%20Speech%20Rankings%20Report%20FINAL.pdf [https://perma.cc/5PD7-8G8R] (“Overall, students reported low levels of comfort expressing their views on controversial political topics across five different contexts on campus.”); id. at 25–27 (reporting higher levels of self-censorship among conservative students).

These critics have pushed for a range of purported remedies, including cutting funding for diversity, equity, and inclusion (“DEI”) programs; requiring intellectual diversity statements; weakening the protections of tenure and collective bargaining; forbidding the teaching of certain supposedly divisive concepts involving race, gender, and sexuality;5A recent joint report of the American Association of University Professors (“AAUP”) and American Federation of Teachers (“AFT”) identify these as the four primary themes in recent legislative actions. AAUP & AFT, The Right-Wing Attacks on Higher Education: An Analysis of the State Legislative Landscape 1, https://www.aaup.org/sites/default/files/Higher-Ed-Legislative-Landscape.pdf [https://perma.cc/F2HP-S772]. and ousting university leaders.6See A Look at College Presidents Who Have Resigned Under Pressure Over Their Handling of Gaza Protests, AP (Aug. 15, 2024, 2:02 PM), https://apnews.com/article/college-president-resign-shafik-magill-gay-59fe4e1ea31c92f6f180a33a02b336e3 [https://web.archive.org/web/20250112115803/https://apnews.com/article/college-president-resign-shafik-magill-gay-59fe4e1ea31c92f6f180a33a02b336e3]. Though framed as protections of free speech principles such as viewpoint neutrality, many of these efforts have the effect (and perhaps purpose) of restricting those very principles. In that sense, they invoke free speech but are not actually rooted in the free speech tradition.7Thanks to Ash Bhagwat for pressing me on this point. Sometimes the motivation seems to be nakedly punitive or political—a thumb in the eye of a liberal professoriate—or to make martyrs of provocateurs who have no business speaking in an academic setting to begin with.

But these critiques and purported reforms can also be understood in more principled terms as protecting listeners—most prominently the students and others who have an interest in hearing a range of ideas and speakers. Getting a handle on the campus speech debate therefore requires a clear account of listener interests, as this symposium invites. Doing so is especially important because many of the interventions flowing from the listener-based free speech critique are in tension with, and sometimes flagrantly undermine, the other essential element of campus speech: academic freedom. That freedom has many dimensions, each with its own value proposition: “freedom of research and publication, freedom in the classroom, freedom of intramural speech, and freedom of extramural speech.”8Matthew W. Finkin & Robert C. Post, For the Common Good: Principles of American Academic Freedom 7 (2009). For simplicity’s sake, I will call the expression associated with these freedoms “scholarly speech.”9Academic freedom often but not always directly involves expressive acts like publishing or teaching. But academic freedom is also a matter of universities’ institutional autonomy, which can be threatened by decisions that do not directly involve speech acts, such as hiring and firing faculty, establishing or de-establishing university centers, and so on. A listener-focused approach to academic freedom can help conceptualize the potential harms in those situations, which is the downstream impacts they have on scholarly speech—the production of knowledge and its dissemination to various audiences.

Such speech is governed not by the rules and principles governing public discourse (the free speech paradigm) but by the rules and principles of academic disciplinarity. In the words of the AAUP’s 1940 Statement of Principles on Academic Freedom and Tenure, which codified the principles and practices of academic freedom: “Institutions of higher education are conducted for the common good and not to further the interest of either the individual teacher or the institution as a whole. The common good depends upon the free search for truth and its free exposition.”10AAUP, 1940 Statement of Principles on Academic Freedom and Tenure with 1970 Interpretive Comments 14 [hereinafter 1940 Statement], https://www.aaup.org/file/1940%20Statement.pdf [https://perma.cc/M567-NJNZ] . The search for and exposition of truth in scholarly settings are subject to the academic judgment of peers, not the broadly permissive principles that prevail in the marketplace of ideas.

This does not mean that free speech and disagreement have no place on college campuses; to the contrary, they remain essential.11See, e.g., John Inazu, The Purpose (and Limits) of the University, 2018 Utah L. Rev. 943, 947 (arguing that “a central purpose, if not the central purpose, of the university is to be a place of facilitating disagreement across differences”). But in order to provide the essential benefits that are the core of their mission—the production and dissemination of knowledge12There are other defensible ways to understand the mission of a university, and they might point in different directions with regard to the balance between free speech and academic freedom. But I suspect that all would recognize in one way or another that the rules of public discourse cannot be fully imported to a university setting. —universities must be tightly governed by themselves, not by donors and legislatures, and the relevant standards of research, publication, and teaching must be disciplinary, not political.

In short, the current debate has turned campus speech against itself, in part by leveraging listeners’ free speech interests to undermine academic freedom. The free speech critique has a clear account of value and harm (one largely rooted in listener interests) and has the additional benefit of constitutional moorings that are more secure than those of academic freedom.13Henry Reichman, Understanding Academic Freedom 153 (2021) (arguing that academic freedom is more grounded in “common law tradition and contractual protections” than in the First Amendment). This is not to say, of course, that the constitutional case is entirely lacking. See generally David M. Rabban, Academic Freedom: From Professional Norm to First Amendment Right (2024) (arguing for academic freedom as a distinctive subset of First Amendment law). By invoking the importance of students’ exposure to a broad marketplace of ideas—a distinctly free speech-based frame—would-be reformers have justified a broad range of interference with universities’ self-governance. The tension between those principles has asymmetrically favored free speech both rhetorically and conceptually. Defenders of academic freedom must respond with an account of its value14Louis Menand, Academic Freedom Under Fire, New Yorker (Apr. 29, 2024), https://www.newyorker.com/magazine/2024/05/06/academic-freedom-under-fire [https://perma.cc/SEF5-ZCS6] (“Academic freedom is an understanding, not a law. It can’t just be invoked. It has to be asserted and defended. That’s why it’s so disheartening that leaders of great universities appear reluctant to speak up for the rights of independent inquiry and free expression for which Americans have fought.”). The fact that academic freedom lacks the same legal foundation of free speech makes it, if anything, all the more important that it be defended. See also Jeannie Suk Gersen, Academic Freedom and Discrimination in a Polarizing Time, 59 Hous. L. Rev. 781, 781 (2022) (“[W]e desperately need explicit discussions about academic freedom.”). —as something that not only protects scholars-as-speakers but ultimately and more importantly serves “the common good,”151940 Statement, supra note 10 at 14. which can only happen if scholarly speech reaches the right audiences.

The goal of this Article is to suggest that academic freedom and the scholarly speech that it protects would benefit, as its critics have, by better articulating a listener-based account. Centering threats to scholarly speakers is consistent with standard doctrinal approaches to freedom of speech, and descriptions of individual professors and students facing repercussions for their speech may be rhetorically effective, just as stories of “cancelled” speakers have supported the free speech critique.16Greg Lukianoff & Rikki Schlott, The Canceling of the American Mind: Cancel Culture Undermines Trust and Threatens Us All—But There Is a Solution 10 (2023). But following First Amendment scholarship’s increasing exploration of listener interests in theory17T.M. Scanlon, Jr., Freedom of Expression and Categories of Expression, 40 U. Pitt. L. Rev. 519, 528 (1979) (“Although ‘freedom of expression’ seems to refer to a right of participants not to be prevented from expressing themselves, theoretical defenses of freedom of expression have been concerned chiefly with the interests of audiences and, to a lesser extent, those of bystanders.”). and in doctrine,18See, e.g., Toni M. Massaro & Helen Norton, Free Speech and Democracy: A Primer for Twenty-First Century Reformers, 54 U.C. Davis L. Rev. 1631, 1663 (2021) (“Contemporary courts increasingly favor speakers over listeners when speakers’ preferences collide with listeners’ First Amendment interests in settings both inside and outside of public discourse . . . .”); Burt Neuborne, Limiting the Right to Buy Silence: A Hearer-Centered Approach, 90 U. Colo. L. Rev. 411, 411 (2019) (“Under current Supreme Court doctrine, the speaker is far and away the most powerful resident in Mr. Madison’s First Amendment neighborhood.”).

That is not to say, however, that listener interests have gone entirely unrecognized in the Court’s First Amendment caselaw. See, e.g., Cent. Hudson Gas & Elec. Corp. v. Pub. Serv. Comm’n of N.Y., 447 U.S. 557, 562–66 (1980) (protecting commercial speech that furthers listeners’ First Amendment interests, while permitting the government to regulate false or misleading commercial speech because it frustrates those interests); Red Lion Broad. Co. v. FCC, 395 U.S. 367, 390 (1969) (“It is the right of the viewers and listeners, not the right of the broadcasters, which is paramount.”).
accounts of academic freedom can and must focus on the audiences of scholarly speech.

Part I illustrates how critics of the current campus speech climate are pitting the free speech and academic freedom paradigms against one another, in large part by leveraging listener interests—for example, by attempting to justify interference with university governance as necessary to protect the interests of students-as-listeners. This listener-based critique can and should be answered with a listener-based defense of academic freedom. Doing so is not only important as a matter of rhetorical strategy, but necessary for a full and accurate description of academic freedom’s value. Indeed, the very justification for academic freedom is less concerned with the interests of scholars-as-speakers than it is with their role in producing and spreading knowledge—an inevitably collective activity, and one whose contribution to the common good is broadly predicated on the presence and engagement of various listeners.

Part II explores the distinct interests of three such audiences: students, scholars, and the general public.19Keith E. Whittington, Speak Freely: Why Universities Must Defend Free Speech 15 (2018) (“The fruits of research are to be shared, with other scholars, with students, and with the general public.”). Each raises important issues and challenges. Emphasizing the rights of students-as-listeners may help ground their still-murky claims to academic freedom,20Robert Post, The Kalven Report, Institutional Neutrality, and Academic Freedom, in Revisiting the Kalven Report: The University’s Role in Social and Political Action (Keith E. Whittington & John Tomasi, eds., forthcoming) (last revised Aug. 19, 2023) (manuscript at 1, 1 n.1), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4516235 [https://perma.cc/V5QS-L5Y3] (“In the United States, the academic freedom of students is a concept that has not received much in the way of intellectual or institutional development.”). See also Robert Post, Theorizing Student Expression: A Constitutional Account of Student Free Speech Rights, 76 Stan. L. Rev. 1643 (2024). even as it both confirms and confounds standard accounts of listener interests in the free speech paradigm. On the one hand, the freedom of teaching (one prong of academic freedom) is undeniably rooted in students’ interests as listeners. On the other hand, students-as-listeners—despite being an arguably captive audience, lacking power vis-à-vis their professors—do not have a broad right not to listen, as many First Amendment principles suggest. Moreover, their rights as listeners vary significantly depending on the setting: classrooms and other curricular settings, guest speakers and other extracurricular events, and their dorm rooms.

Faculty are the prototypical speakers in the academic freedom paradigm, but they are also important listeners; the communal nature of knowledge production through research and publication requires as much. Moreover, individual scholars must constantly re-evaluate their own positions in light of others’ work—what I have called elsewhere (in the context of free speech) the “virtue of persuadability,”21Joseph Blocher, “The Road I Can’t Help Travelling”: Holmes on Truth and Persuadability, 51 Seton Hall L. Rev. 105, 110 (2020). and what in the context of academic freedom essentially means holding oneself to disciplinary standards.

Finally, and perhaps most crucially, there are the listening interests of the general public. In the words of the AAUP, universities exercise a “public trust” which requires that they be immune to the “tyranny of public opinion,” allowing them to serve as “an intellectual experiment station, where new ideas may germinate and where their fruit, though still distasteful to the community as a whole, may be allowed to ripen until finally, perchance, it may become part of the accepted intellectual food of the nation or of the world.”22AAUP, 1915 Declaration of Principles on Academic Freedom and Academic Tenure 293, 297 [hereinafter 1915 Declaration], https://www.aaup.org/NR/rdonlyres/A6520A9D-0A9A-47B3-B550-C006B5B224E7/0/1915Declaration.pdf [https://perma.cc/C5E3-E23H]; Menand, supra note 14 (“Professors don’t work for politicians, they don’t work for trustees, and they don’t work for themselves. They work for the public. Their job is to produce scholarship and instruction that add to society’s store of knowledge. . . . In exchange, society allows them to insulate themselves—and to some extent their students—against external interference in their affairs. It builds them a tower.”). That trust will only hold so long as the listening public believes it is indeed receiving something of value. Against a backdrop of growing skepticism about the very notion of scholarly expertise and a troubling rise of public and private attacks on research and teaching, defenders of academic freedom must persuade the public that their work is indeed furthering the common good.

I. Using Listener Interests to Put Free Speech Ahead of Academic Freedom

At the heart of current controversies about expression in colleges and universities23I hold aside the important but distinct concerns involving K-12 education, where principles of academic freedom and free speech have very different valence. Even there, though, the Supreme Court has accorded some protection to students’ freedom to speak and listen. See, e.g., Tinker v. Des Moines Indep. Cmty. Sch. Dist., 393 U.S. 503, 506 (1969) (holding that neither teachers nor students “shed their constitutional rights to freedom of speech or expression at the schoolhouse gate”); Bd. of Educ., Island Trees Union Free Sch. Dist. No. 26 v. Pico, 457 U.S. 853, 870–71 (1982) (striking down “narrowly partisan or political” curation of libraries). are two related but importantly distinct forms of expression: free speech and academic freedom. Both have important roles to play in a university, and I will refer to them collectively as “campus speech.” But to understand or address the perceived crisis it is essential first to be clear about the overlap and distinction between them—and, crucially, the ways in which listener interests are being invoked to turn free speech against academic freedom.24Gersen, supra note 14, at 781 (“[T]hose who purport to champion academic freedom frequently end up attempting to restrict it.”); Keck, supra note 1 (manuscript at 14) (“One notable feature of these recent legislative threats to academic freedom is that their authors and advocates regularly defend them as efforts to protect free speech.”). Keck notes that FIRE, one of the most prominent organizations in the campus speech battles, in 2022 changed its name from the Foundation for Individual Rights in Education to the Foundation for Individual Rights and Expression. Id. (manuscript at 11 n.19). Its director’s most recent co-authored book is focused on “higher education because that’s where Cancel Culture originated and runs most rampant.” Lukianoff & Schlott, supra note 16, at 10.

Many of the most serious concerns about the campus speech climate are about free speech as such. As Keith Whittington puts it in Speak Freely: Why Universities Must Defend Free Speech, “[f]ree speech on college campuses is perhaps under as great a threat today as it has been in quite some time.”25Whittington, supra note 19, at 4. The reasons for and manifestations of these apparent threats take various forms whose propriety in any particular situation might of course be debated: shouting down speakers, students and faculty posting on social media, requesting or demanding trigger warnings, withdrawing job offers for students or faculty based on their speech, and more. The underlying conception of freedom being threatened in this paradigm is roughly akin to the freedom of speech protected by the First Amendment in the public sphere: a broadly libertarian marketplace of ideas in which expression must be “uninhibited, robust, and wide-open.”26N.Y. Times Co. v. Sullivan, 376 U.S. 254, 270 (1964).

The free speech paradigm and the familiar slate of First Amendment rules and principles accompanying it has an important role to play in many areas of university life. Most obviously and explicitly, many campuses have established various “free speech zones” in which students, faculty, and perhaps others can express themselves subject only to relatively narrow limitations for harassment, true threats, and the like. That same broad freedom might extend, whether declared or not, to other areas of a university campus such as open quads, streets, and other arguable analogues of public fora. Indeed, many universities claim to have broad or even absolute commitments to speech and are regularly evaluated or even ranked based on that basis.27See Foundation for Individual Rights and Expression, supra note 4.

The free speech paradigm also plays an important role in the scholarly enterprise that is at the heart of the university. In Whittington’s words, “[f]or universities, . . . free speech is valuable precisely because of its utility in generating, testing, and communicating ideas.”28Whittington, supra note 19, at 30. This epistemological utility is only one of the values that free speech might serve in other contexts, like democratic participation or individual autonomy. Universities are not necessarily set up in opposition to values of democratic participation and individual autonomy, and indeed might well further them,29See Robert C. Post, Democracy, Expertise, and Academic Freedom: A First Amendment Jurisprudence for the Modern State 32, 35 (2012). but their central mission is to generate and disseminate knowledge—to be “a space where ideas are held up to critical scrutiny and our best understanding of the truth is identified and professed.”30Whittington, supra note 19, at 7. As the Supreme Court put it in Sweezy v. New Hampshire—a case often cited in the literatures involving both listener interests and campus speech—we “must always remain free to inquire, to study and to evaluate, to gain new maturity and understanding; otherwise our civilization will stagnate and die.”31Sweezy v. New Hampshire, 354 U.S. 234, 250 (1957). Keyishian v. Board of Regents, which likewise has a prominent place in both literatures, similarly declared that “[t]he classroom is peculiarly the ‘marketplace of ideas.’ The Nation’s future depends upon leaders trained through wide exposure to that robust exchange of ideas which discovers truth ‘out of a multitude of tongues, [rather] than through any kind of authoritative selection.’ ”32Keyishian v. Bd. of Regents, 385 U.S. 589, 603 (1967) (quoting United States v. Assoc. Press, 52 F. Supp. 362, 372 (S.D.N.Y. 1943)). Perhaps even more extreme, in Healy v. James the Court suggested that the full panoply of free speech principles apply on college campuses: “[T]he precedents of this Court leave no room for the view that, because of the acknowledged need for order, First Amendment protections should apply with less force on college campuses than in the community at large.” Healy v. James, 408 U.S. 169, 180–81 (1972).

But the university, let alone the classroom, is a “marketplace of ideas” in a very particularized sense. Surely, scholars must be free to attack shibboleths and to push the boundaries of knowledge beyond received academic orthodoxy. Moreover, the commitments to communication, reasoning, and persuasion in the classroom might make it an especially valuable site of the marketplace’s supposed truth-seeking capability, which has been subject to withering criticism elsewhere.33Many thanks to Greg Magarian for pressing this point. And yet even the most ardent champions of the free speech model would accept that scholarly discourse, including in the classroom, not only permits but requires speech regulations that would not be acceptable in the traditional public marketplace of ideas.34See, e.g., Post, supra note 29, at 9 (“The continuous discipline of peer judgment, which virtually defines expert knowledge, is quite incompatible with deep and fundamental First Amendment doctrines . . . .”). It would violate the First Amendment if a state were to fine its citizens $50 for espousing flat earth beliefs in public discourse. It would not violate the First Amendment if a state university’s geology department were to deny tenure to a faculty member espousing such beliefs in her scholarship. In innumerable ways, communication in university settings is appropriately subject to restrictions that would be unthinkable under standard free speech principles.

Some of these limitations can be reconciled with the free speech paradigm on the grounds that they represent applications of well-worn First Amendment principles like time, place, and manner restrictions, but the underlying tension is fundamental. Time, place, and manner restrictions must be content-neutral,35Clark v. Cmty. for Creative Non-Violence, 468 U.S. 288, 293 (1984). but what is a curriculum except a restriction on the content of faculty and student speech? The prohibition on viewpoint discrimination is nearly ironclad in public discourse,36Joseph Blocher, Viewpoint Neutrality and Government Speech, 52 B.C. L. Rev. 695, 695 (2011). but not in scholarly settings.37Jamal Greene, How Rights Went Wrong: Why Our Obsession with Rights is Tearing America Apart 226, 240–41 (2021) (“Universities discriminate, pervasively, based on the content and viewpoint of the speech to which students are exposed, consistent with the pedagogical judgments of faculty and administrators. . . . They do so in part to ensure that the information conveyed to students is of high quality.”).

To be clear, the viewpoint discrimination that is acceptable in scholarly settings must be tied to disciplinary standards and not, for example, political beliefs. Cass R. Sunstein, Campus Free Speech: A Pocket Guide 24 (2024) (“[T]he ban on viewpoint discrimination is often firm on campus—and essential.”).
How else to describe the situation of the geology professor, who after all is simply advocating a scholarly viewpoint? Or consider the fact that in public discourse, speaker equality is a fundamental principle.38Post, supra note 29, at 23 (“Whereas within public discourse the political imperatives of democracy require that persons be regarded as equal and as autonomous, outside public discourse the law commonly regards persons as dependent, vulnerable, and hence unequal.” (footnotes omitted)). In a scholarly setting, ideas and speakers should not be disregarded simply because they are politically unpopular, but it does not follow that all must be accorded equal respect.39Jack M. Balkin, Information Fiduciaries and the First Amendment, 49 U.C. Davis L. Rev. 1183, 1215 (2016) (“Outside of the realm of public discourse, the law drops its assumption that everyone is equally able, independent, and knowledgeable, and that everyone can equally fend for themselves.” (footnote omitted)). Those that do not measure up to the relevant scholarly standards not only can but should be excluded, even if they must be accepted in public discourse.

The rules governing scholarly speech are fundamentally different than those governing free speech because they have different and sometimes conflicting accounts of value. Academic freedom is protected because of its role in generating and spreading knowledge, not speech as such.40For more on the distinction, see Joseph Blocher, Free Speech and Justified True Belief, 133 Harv. L. Rev. 439 (2019). That requires a different set of rules and principles than those that apply to public discourse, including that scholarly speech be governed by the relevant standards of scholarly disciplinarity. This is why universities’ academic freedom policies often appear alongside their tenure policies; the two are deeply intertwined. In the realm of academic discourse, the right to “speak freely” looks very different than it does in public discourse, and it is not true that all “dissenting voices must be tolerated rather than silenced”41Whittington, supra note 19, at 7. To be clear, Whittington recognizes that “[t]here is a tension between the freewheeling spirit of debate that Mill and others advocated and the careful accumulation of knowledge that modern universities try to foster.” Id. at 49. in all campus settings. The central challenge is determining whether and how universities can regulate speech in service of their educational mission.42In his recent book defending a broad view of speech on campus, Cass Sunstein says that universities can regulate speech when doing so “is genuinely essential to their educational mission,” acknowledging that the phrase “is regrettably vague, might be criticized as too narrow or too broad, requires specification, and leaves a great deal open for discussion and debate.” Sunstein, supra note 37, at 17–18 (footnote omitted).

I do not have a better readymade standard, though it seems to me that this—acknowledging the tensions between free speech and educational mission—is the central challenge in campus speech debates. In her wonderful remarks at this symposium, Rebecca Brown suggested that one important framing question is which value provides the baseline: Is free speech only regulable when essential to the educational mission? Or should it only be embraced to the degree that it is?

Many of the current battles over campus speech are playing out atop this tension, which has at least two potentially pernicious results. The first is evaluating matters of academic freedom—freedom of research and publication or freedom in the classroom, for example—according to the principles of public discourse. The second is prescribing remedies that not only ignore but might in fact undermine the institutional independence necessary for academic freedom. When a state legislature declares that professors are failing to treat their classrooms like the marketplace of ideas, it risks committing the first error. When that legislature then shuts down (or for that matter creates) academic centers with the goal of achieving ideological balance,43See, e.g., Ryan Quinn, UNC ‘Civic Life’ Center Progressing, Over Faculty Objections, Inside Higher Ed (May 31, 2023), https://www.insidehighered.com/news/faculty-issues/shared-governance/2023/05/31/unc-civic-life-center-progressing-over-faculty [https://perma.cc/8NUY-Y6HS] (describing the 2023 creation of the School of Civic Life and Leadership at UNC, which according to its board chair is “an effort to try to remedy” an alleged lack of “right-of-center views” on campus). it risks committing the second.

There are many facets to the tension between free speech and academic freedom—indeed, it might be taken as an overall description of the campus speech crisis44My focus here is on the concepts and values at stake; I do not mean to minimize the enormously important issues of social, political, and economic power. For one account, see Isaac Kamola, Am. Ass’n Univ. Professors, Manufacturing Backlash: Right-Wing Think Tanks and Legislative Attacks on Higher Education, 2021–2023 (May 2024), https://www.aaup.org/file/Manufacturing_Backlash_final_1.pdf [https://perma.cc/K8LQ-79G2].—but for present purposes and in keeping with the theme of this symposium it will suffice to focus on one: the interesting, important, and generally under-appreciated role of listener interests. Broadly speaking, advocates of the free speech paradigm have consistently and effectively invoked listener interests to suggest that students are being deprived of important ideas and that they are being forced to listen to objectionable ones. The latter line has become particularly prominent in the wake of the October 7, 2023 attacks in Israel, and has led to allegations of inconsistency and even hypocrisy on all sides. Whatever one thinks about those complaints, the point is that both are rooted in audience impact. Defenders of the academic freedom paradigm, by contrast, have done little to articulate the listener interests at stake for scholarly speech. The result is that listener interests are being used to turn free speech against academic freedom.

This is perhaps most evident in the strenuous critiques, mostly but not exclusively from the political right, alleging that universities are systematically underprotecting freedom of speech. Some critics have focused on the harms to speakers,45See supra notes 3–6 and sources cited therein. occasionally making martyrs out of provocateurs and others whose potential contributions to knowledge-producing discourse are marginal at best.46Franks, supra note 1, at 238 (“Milo Yiannopoulos, Ann Coulter, and their ilk are not experts, or professors, or intellectuals. They are Internet celebrities. Their appearance on college campuses is objectionable because they are simply not qualified to be there, and universities should not squander precious attention and resources on clowns and provocateurs.”). That strategy has undoubtedly been effective, but it has also had the distorting effect of elevating the profiles of professional attention-getters rather than those with a genuine dedication and ability to contribute meaningful ideas—including unpopular or disfavored ideas—to campus discourse.

Alongside this speaker-focused critique, however, there is a deeper and more serious element that focuses on the interests of potential listeners, including students who are denied access to important voices and ideas (primarily conservative ones). That critique takes multiple forms as well. One emphasizes the danger that conservative students will be alienated and harmed in campus settings where they cannot hear voices like their own or that students who are not exposed to such ideas will be indoctrinated with liberal orthodoxy.47See generally David Horowitz, Indoctrination U.: The Left’s War Against Academic Freedom (2007) (arguing that American universities have been hijacked by leftist radical pushing an ideological curriculum). Some conclude that the appropriate solution is to impose more control from the outside. Often the diagnosis and prescription are explicitly political, as with the “Freedom from Indoctrination Act,” whose supporters say would—by “[r]eclaiming [a]cademic [f]reedom”—give students “the freedom to take coursework without a distinctive left-wing ideological valence.”48Matt Beienburg, Rescue College Classrooms with the Freedom from Indoctrination Act, Am. Enter. Inst. (Sept. 13, 2023), https://www.aei.org/research-products/report/rescue-college-classrooms-with-the-freedom-from-indoctrination-act [https://web.archive.org/web/20240316234150/https://www.aei.org/research-products/report/rescue-college-classrooms-with-the-freedom-from-indoctrination-act].

As a matter of education and pedagogy, the most fundamental risk is that listeners in an academic setting will be harmed if not given sufficient opportunity to hear and consider ideas different than their own.49Students for Academic Freedom, a group sponsored by David Horowitz, adopted as its motto “You can’t get a good education if they’re only telling you half the story.” Students for Academic Freedom, https://studentsforacademicfreedom.org [https://perma.cc/JEB9-X4SC]. As John Stuart Mill put it in On Liberty: “Both teachers and learners go to sleep at their post as soon as there is no enemy in the field.”50John Stuart Mill, On Liberty 105 (Gertrude Himmelfarb ed., Penguin Classics 1987) (1859). If a university community presents only one side, its thinking process is thereby distorted, just as “the thinking process of the community” can be distorted by restrictions on speech (to borrow a phrase form Alexander Meiklejohn).51Alexander Meiklejohn, Political Freedom: The Constitutional Powers of the People 27 (1960) (emphasis omitted). As then-professor Elena Kagan wrote (quoting Meiklejohn) in the course of describing R.A.V. v. City of St. Paul, 505 U.S. 377 (1992): “The ordinance . . . restricted speech in a way that skewed public debate on an issue by limiting the expressive opportunities of one side only. . . . [T]he ordinance ensured that listeners would confront a distorted debate, thus interfering with ‘the thinking process of the community.’ ” Elena Kagan, Private Speech, Public Purpose: The Role of Governmental Motive in First Amendment Doctrine, 63 U. Chi. L. Rev. 413, 418 (1996) (quoting Meiklejohn, supra note 51, at 27 (emphasis omitted)).

One might object to the predicate assumptions—perhaps conservative voices are not being silenced; perhaps students have access to all the viewpoints they need—but at the very least these are arguments, rooted in listener interests, that must be taken seriously. They have been used to “undermine[] the legitimacy” of universities52Franks, supra note 1, at 220 (“[T]he false narrative of the college free speech crisis is how it undermines the legitimacy of the university as a free speech institution.”). and sometimes to directly threaten the institutional autonomy that is essential to academic freedom, for example by imposing restrictions on subject matter,53See Sarah Schwartz, Map: Where Critical Race Theory Is Under Attack, Educ. Wk. (Jan. 30, 2025), https://www.edweek.org/policy-politics/map-where-critical-race-theory-is-under-attack/2021/06 [https://perma.cc/8RJS-Z24H]. interfering with hiring decisions,54See Katie Robertson, Nikole Hannah-Jones Denied Tenure at University of North Carolina, N.Y. Times (July 15, 2022), https://www.nytimes.com/2021/05/19/business/media/nikole-hannah-jones-unc.html [https://web.archive.org/web/20250102032640/https://www.nytimes.com/2021/05/19/business/media/nikole-hannah-jones-unc.html]. and weakening tenure.55This threat is especially acute for the more than two-thirds of faculty having contingent (i.e., not tenure/tenure-track) appointments—figures that are especially high for women and members of under-represented minority groups. Glenn Colby, Am. Ass’n Univ. Professors, Data Snapshot: Tenure and Contingency in US Higher Education 2 (Mar. 2023), https://www.aaup.org/sites/default/files/AAUP%20Data%20Snapshot.pdf [https://perma.cc/HUN9-QBCY]. See also Johann N. Neem, The Subtle Erosion of Academic Freedom, Inside Higher Ed. (Apr. 15, 2019), https://www.insidehighered.com/views/2019/04/16/three-subtle-forces-weakening-academic-freedom-opinion [https://perma.cc/GJP6-AVXS] (“The most obvious and well-known threat to academic freedom is the decline of tenure and shared governance at many established institutions.”).

   Legislative initiatives are already underway to weaken tenure. See, e.g., S.B. 266, 2023 Leg., Reg. Sess. (Fla. 2023) (“[H]iring authority is not bound by the recommendations or opinions of faculty or other individuals.”); Am. Ass’n Univ. Professors, Academic Freedom and Tenure: University System of Georgia 12 (Dec. 2021), https://www.aaup.org/file/Bulletin2022Final-2-USG_0.pdf [https://perma.cc/V7TT-HFQE] (describing University of Georgia Board of Regents policies that “effectively abolished tenure in Georgia’s public colleges and universities” (footnote omitted)).
The most prominent threats appear to be coming from the political right, but left-associated programs like DEI can present threats as well. As Khiara Bridges notes, “If institutions take it as their duty to ensure student comfort—and if antidiscrimination laws are wielded in a way to enforce that duty—then academic freedom surely will suffer.”56Khiara M. Bridges, Evaluating Pressures on Academic Freedom, 59 Hous. L. Rev. 803, 807 (2022).

Defenders of the academy have rightly called out these ongoing attacks. But ringing the alarm bells is only part of the task. Proponents of academic freedom must be able to do at least two things: hold it out as something distinct from free speech, and provide a theory of value. These are not new tasks. Roughly coincident with the awakening of free speech in constitutional doctrine, academic freedom found its first and most important articulation of identity and value in the foundational texts and practices of

American academic freedom: the 1915 Declaration of Principles on Academic Freedom and Academic Tenure57Finkin & Post, supra note 8, at 30 (calling the 1915 Declaration “[t]he first systematic articulation of the logic and structure of academic freedom in America, and arguably the greatest”). and the 1940 Statement of Principles on Academic Freedom and Tenure.58Id. at 48 (“The 1940 Statement has since become the standard of academic freedom in the United States.” (italicization removed)).

At the time of the 1915 Declaration, the “philosophical birth cry” of academic freedom in the United States,59Ralph S. Brown & Jordan E. Kurland, Academic Tenure and Academic Freedom, 53 Law & Contemp. Probs. 325, 326 (1990) (quoting Walter P. Metzger, Academic Tenure in America: A Historical Essay, in Commission on Academic Tenure in Higher Education, Faculty Tenure: A Report and Recommendations 93, 148 (1973)). the major threats to faculty independence were triggered by professors’ speech, not by speech they were supposedly stifling. Today, the threat is often presented as being to free speech itself—a concept that was, as a constitutional matter, still in its infancy at the time of the AAUP’s original efforts.60David M. Rabban, The State of Free Speech Doctrine in 1917, 50 Ariz. St. L.J. 911, 911 (2018) (noting that courts were still overwhelmingly rejecting First Amendment claims in 1917). Responding to that threat today, it seems especially worthwhile to attach the value of academic freedom to its manifestation in scholarly speech.61I hold aside here the interesting and important question of whether and to what degree professors at public universities should be subject to the rule of Garcetti v. Ceballos, which holds that a public employee’s speech made pursuant to “official duties” does not receive First Amendment protection. Garcetti v. Ceballos, 547 U.S. 410, 425–26 (2006). See Aaron Worthen, Note, Think of the Children: How the Role of Students in the Classroom Informs Future Applications of Garcetti v. Ceballos in Academic Contexts, 2014 BYU L. Rev. 983, 1005–06 (2014) (concluding that scholarship, but not teaching, should be exempt from Garcetti); Michael A. Sloman, Note, “A Kind of Continuing Dialogue”: Reexamining the Audience’s Role in Exempting Academic Freedom From Garcetti’s Employee Speech Doctrine, 55 Ga. L. Rev. 935, 957 (2020) (concluding that both scholarship and teaching should be exempt from Garcetti).

This is undoubtedly an important issue, given that in the litigation over Florida’s Stop WOKE Act Florida’s lawyers argued that “the State has unfettered authority to limit what [public university] professors may say in class.” Pernell v. Fla. Bd. of Governors of the State Univ. Sys., 641 F. Supp. 3d 1218, 1233 (N.D. Fla. 2022). Striking down the law, the district court judge called it “positively dystopian,” and said that “[i]t should go without saying that ‘[i]f liberty means anything at all it means the right to tell people what they do not want to hear.’ ” Id. at 1230 (quoting George Orwell, The Freedom of the Press, The Orwell Found., https://www.orwellfoundation.com/the-orwell-foundation/orwell/essays-and-other-works/the-freedom-of-the-press [https://perma.cc/EH45-6CW5] (First published: The Times Literary Supplement 1972).
In doing so, defenders of academic freedom would be well served to embrace the challenge posed by this symposium and articulate a value of listener interests akin to what defenders of free speech have done.

Indeed, there are good reasons to think that for universities—and thus for academic freedom—listener interests have always been central, even if (as with the freedom of speech) the freedoms themselves are articulated in terms of speaker rights. The very raison d’être for academic freedom, after all, is the production and dissemination of knowledge, which presupposes recipients. As Justice Brennan put it in another context (in a passage often cited by those expounding listener interests), “[t]he dissemination of ideas can accomplish nothing if otherwise willing addressees are not free to receive and consider them. It would be a barren marketplace of ideas that had only sellers and no buyers.”62Lamont v. Postmaster Gen., 381 U.S. 301, 308 (1965) (Brennan, J., concurring). It is not coincidental that some of the clearest legal language supporting the listener-focused approach comes from cases involving educational settings.63See, e.g., Kleindienst v. Mandel, 408 U.S. 753, 763 (1972) (“This Court has recognized that [the right to receive information] is ‘nowhere more vital’ than in our schools and universities.” (quoting Shelton v. Tucker, 364 U.S. 479, 487 (1960))); Tinker v. Des Moines Indep. Cmty. Sch. Dist., 393 U.S. 503, 511 (1969) (“In our system, students may not be regarded as closed-circuit recipients of only that which the State chooses to communicate.”); Bd. of Educ., Island Trees Union Free Sch. Dist. No. 26 v. Pico, 457 U.S. 853, 867 (1982) (calling “the right to receive information and ideas” an “inherent corollary of the rights of free speech and press” (quoting Stanley v. Georgia, 394 U.S. 557, 564 (1969))); Keyishian v. Bd. of Regents, 385 U.S. 589, 603 (1967) (describing the classroom as a “marketplace of ideas” and stating that academic freedom is “of transcendent value to all of us and not merely to the teachers concerned”).

Broadly speaking, universities might be a particularly special kind of institution in terms of listener interests—one in which speaker and listener interests are generally aligned. RonNell Andersen Jones has identified and explored this dynamic in the “constitutionally symbiotic relationship between the institutional speakers of the press and their public audiences,” which she calls the “most notable” example.64RonNell Andersen Jones, Press Speakers and the First Amendment Rights of Listeners, 90 U. Colo. L. Rev. 499, 499 (2019). Cf. Red Lion Broad. Corp. v. FCC, 395 U.S. 367, 390 (1969) (“It is the right of the viewers and listeners, not the right of the broadcasters, which is paramount.”). But much of what she says about the press is true of universities as well. Like the press, universities are “a specially protected institutional speaker with both a uniquely powerful speech relationship with listeners and a uniquely heightened threat of being targeted by government regulators.”65Jones, supra note 64, at 515. And like the press, universities are not mere conduits for speech, but rather play an active role along with their listeners in shaping that speech.66See id. at 500.

Of course, universities are not singular entities but institutions comprising a complex web of speakers and listeners, each with different interests, as the following Part explores in more detail.

II. The Audiences of Scholarly Speech

The discussion thus far has attempted to highlight connections between three concepts—free speech, academic freedom, and listener interests—that are themselves contested and hard to define. This Part attempts to make the analysis more concrete in at least two ways.

The first goal is to disaggregate some of the various audiences of the scholarly speech protected by academic freedom, including students, faculty, and the public.67Even this division is somewhat artificial, since of course the same person can at different times play all three roles—for example, “classrooms are a primary medium for the transmission of scholarly expertise to the public.” Post, supra note 29, at 88. Similar challenges of audience-identification arise for other listener-based accounts, though, and it still seems valuable to differentiate roles. Those audiences have different and sometimes-conflicting interests, which raises tensions for the concept of academic freedom and scholarly speech. The second goal is to try to identify particular—and difficult—campus speech issues and controversies that might be illuminated or better understood with attention to the listener interests involved. Recognizing listener interests will not and cannot provide simple solutions.68Leslie Kendrick, Are Speech Rights for Speakers?, 103 Va. L. Rev. 1767, 1798 (2017) (“Recognizing both speakers’ and listeners’ rights makes cases more complex and possibly creates divergent outcomes.” (footnote omitted)). But it might help illustrate the challenge.

A. Students

Perhaps the most obvious and immediate audience for scholarly speech (which, again, I use as shorthand for the kind of speech that academic freedom enables) is students. And, as detailed above, their interests as listeners have been made central to the current debates over free speech on campus, so it makes sense to begin by considering how those interests as listeners relate to academic freedom.

  1. Classrooms and Other Curricular Settings

Classrooms are a “peculiarly”69See Keyishian v. Bd. of Regents, 385 U.S. 589, 603 (1967) (“The classroom is peculiarly the ‘marketplace of ideas.’ ”). useful place to begin considering listener interests, though the lessons they provide in that regard are not straightforward. Indeed, it may be better to think of classrooms as peculiar not in the sense that they are especially a marketplace of ideas but—in keeping with the other meaning of peculiar—that they are an odd marketplace of ideas.

On the one hand, the interests of student-listeners provide a solid justification for instructors’ freedom of teaching, which has been a pillar of academic freedom for at least a century. When professors are prevented from teaching their best understanding of the subject matter in which they are expert, the most significant and concrete harm is likely to the students whose educations are hampered by denial of access to that information. This is fully consistent with the fact that it is typically professors, not students, who assert that freedom. After all, “speakers often have the job of asserting listeners’ rights” because they “are often best placed to challenge allegedly censorial governmental action.”70Kendrick, supra note 68, at 1778; id. (first citing Larry Alexander, Is There a Right of Freedom of Expression? 8–10 (2005); and then citing Frederick Schauer, Intentions, Conventions, and the First Amendment: The Case of Cross-Burning, 2003 Sup. Ct. Rev. 197, 222 n.80 (2004)) (“In asserting the First Amendment in their defense to a criminal, civil, or administrative action, speakers assert a form of third-party standing on behalf of listeners.”).

It does not follow, however, that freedom of teaching is bounded by students’ narrow and immediate preferences. Certainly faculty do not have unbridled freedom to teach students who do not wish to learn; the rights and duties of academic freedom do not work that way, and no one is obliged to attend university and be exposed to ideas they would prefer to avoid. But faculty must and do have control over the curriculum, even when that means teaching material that students—or for that matter legislatures or trustees—find boring, difficult, or otherwise objectionable.71Sunstein suggests a possible exception for “the most egregious cases, in which viewpoint discrimination is unmistakable and cannot be defended by reference to, say, scientific consensus.” Sunstein, supra note 37, at 68. The relevant standards are those of academic disciplinarity and good pedagogy, not what students or others prefer at any given moment. If those standards are satisfied, then students-as-listeners can be expected to give their attention, whether or not they reject the information or even find it despicable or threatening.72Cf. John K. Wilson, The Tennessee Legislature’s Attack on Free Speech, Academe Blog (Feb. 12, 2017), https://academeblog.org/2017/02/12/the-tennessee-legislatures-attack-on-free-speech [https://perma.cc/8BQA-7GN7] (quoting a student from the University of Tennessee College Republicans, speaking at a press conference introducing Tennessee’s anti-campus protest bill: “Students are often intimidated by the academic elite in the classroom, Tennessee is a conservative state, we will not allow out of touch professors with no real world experience to intimidate eighteen-year-olds.”). Students who choose not to listen can legitimately face consequences (such as lower grades); students who disrupt the flow of information to other willing listeners can be disciplined.

This is the central reason why efforts to either forbid or require the teaching of certain subject matters is so troubling: Even as they invoke students’ interests in “free speech” or “academic freedom,” such efforts limit the institutional autonomy to make curricular choices, essentially turning academic freedom on its head and thus undermining students-as-listeners’ interests in being taught by experts.

That does not mean, of course, that individual faculty are free to teach whatever they like—that would be a different, but still inappropriate, use of a free speech paradigm. Attention to disciplinary standards is the core of academic freedom, and it imposes limits both on faculty as speakers and on students as listeners. As then-Judge Samuel Alito put it in a Third Circuit case rejecting a free speech claim brought by a professor who tried to teach religious materials in contravention of curricular expectations, “a public university professor does not have a First Amendment right to decide what will be taught in the classroom.”73Edwards v. Cal. Univ. of Pa., 156 F.3d 488, 491 (3d Cir. 1998).

The situation is therefore one in which the interests of students-as-listeners are paramount—the predicate for freedom of pedagogy—but universities (not outside bodies) must have control of the curriculum. This is in tension with some of the principles that emerge in standard accounts of listener interests within the free speech paradigm. After all, one “fundamental” value at issue in the free speech tradition is that “the state wrongs citizens by arrogating to itself the authority to decide what messages they ought to hear.”74J.W. Howard, Freedom of Speech, Stan. Encyclopedia of Phil. (Jan. 19, 2024), https://plato.stanford.edu/entries/freedom-speech [https://perma.cc/3D4X-Y3NL]. But that is just what teachers do.

A variety of other listener-based principles also play out differently for students in classrooms than for people in public discourse. In most First Amendment settings it is generally accepted that “captive” audiences— those who cannot avoid a message and should not have to abandon a particular space in order to do so—have a greater right not to listen.75Caroline Mala Corbin, The First Amendment Right Against Compelled Listening, 89 B.U. L. Rev. 939, 943–50 (2009). By contrast, those who can take steps to avoid an unwanted message are expected to do so,76Martin v. City of Struthers, 319 U.S. 141, 147 (1943) (rejecting “stringent prohibition” on all door-to-door soliciting when “leaving to each householder the full right to decide whether he will receive strangers as visitors” would protect the unwilling listener). especially in public places.77Leslie Gielow Jacobs, Is There an Obligation to Listen?, 32 U. Mich. J.L. Reform 489, 491 (1999); Madsen v. Women’s Health Ctr., Inc., 512 U.S. 753, 774 (1994) (invalidating a no-approach zone outside an abortion clinic); see also Heffron v. Int’l Soc’y for Krishna Consciousness, Inc., 452 U.S. 640, 657 n.1 (1981) (Brennan, J., concurring in part and dissenting in part) (“[Fairgoers] have no general right to be free from being approached.”). In Cohen v. California, the Supreme Court reasoned that unwilling viewers did not have privacy interests that would justify such speech suppression because, rather than being “powerless to avoid [the] conduct,” they “could effectively avoid further bombardment of their sensibilities simply by averting their eyes.”78Cohen v. California, 403 U.S. 15, 21–22 (1971).

As Caroline Mala Corbin observes, “[l]ike employees at work, students on campus are often a captive audience.”79Corbin, supra note 75, at 962 (footnote omitted). See also Bonnell v. Lorenzo, 241 F.3d 800, 820–21 (6th Cir. 2001) (holding as much). But it would be too much to conclude that students have a right to disregard—or, worse, interfere with others’ access to—pedagogically-appropriate lessons about the rule against perpetuities because they find it too difficult, or Dobbs v. Jackson Women’s Health Organization80Dobbs v. Jackson Women’s Health Org., 142 S. Ct. 2228 (2022). (or for that matter Roe v. Wade81Roe v. Wade, 410 U.S. 113 (1973).) because they find it upsetting. Of course institutions and instructors might choose to provide exceptions and accommodations for pedagogical reasons (pedagogy has its own disciplinarity, which includes understanding one’s listeners), but not simply to avoid relevant materials. Thus, even though it involves listeners who are in some sense captive, the classroom is an exception—or at least qualification—to the notion that “[s]tudents have a right to ignore speech that they find appalling and unpersuasive, or to take up the challenge to counter such speech with arguments of their own.”82Whittington, supra note 19, at 111.

Second, although law sometimes gives primacy to listeners’ interests over those of speakers in contexts where speakers have more power or information,83Helen Norton, Powerful Speakers and Their Listeners, 90 U. Colo. L. Rev. 441, 446 (2019). the same is not true in the classroom. Helen Norton explains:

Even absent any relationship of trust, listeners become vulnerable to speakers when those speakers exert physical, legal, or economic control over them. The sorts of listeners subject to speakers’ dominion in these ways include those in government custody, patients in certain health care settings, and many workers. Listeners in these settings are less likely—and sometimes entirely unable—to question, rebut, or escape powerful speakers.84Id. at 449–50 (footnotes omitted).

Norton does not mention students, but there can be no doubt that in many ways (if not all85Bridges, supra note 56, at 809 (noting that while the power inequality typically favors the professor, “there is a vulnerability that comes from being the intellectual author of a course,” and that the power dynamics do not equally favor “people of color, women, trans and gender-nonconforming individuals, gay and lesbian persons, and people with disabilities”). ) they have “less information or power”86Norton, supra note 83, at 441. than their professors, especially in the classroom setting.87Bridges, supra note 56, at 808 (“In many of our discussions about academic freedom, the classroom figures as the site of an uneven power dynamic wherein the professor reigns as overlord and the student exists as defenseless liege, subject to the professor’s whims.” (footnote omitted)). This is akin to the danger of what Erin Miller has described in the context of media companies as the “skewing power” of an “epistemic funnel,” which can disrupt a person’s epistemic rationality, or “ability to form rational, justified beliefs.”88Erin Miller, Media Power Through Epistemic Funnels, 20 Geo. J.L. & Pub. Pol’y 873, 875–76 (2022). A fundamental goal of teaching is to further epistemic rationality, not undermine it, but the imbalance and risk are ever-present.

And yet, as with the principle of captivity, it does not follow that students can invoke their interests as listeners to opt out of curricular requirements or particular lessons. In that respect, the undoubted inequality between students as listeners and faculty as speakers does not lead to the outcome that it might in the free speech paradigm. In other ways, however, the two are not necessarily inconsistent. After all, in other contexts involving asymmetry of knowledge or power such as professional speech,89Claudia E. Haupt, Professional Speech, 125 Yale L.J. 1238, 1271 (2016) (“The professional relationship is typically characterized by an asymmetry of knowledge.”). free speech principles tolerate various forms of regulation in order to ensure that listeners—even if they are at a disadvantage of power or information—are receiving information that satisfies the relevant professional standards.90See Norton, supra note 83, at 460. In the context of teaching, these listener-protective standards are supplied and enforced by the relevant academic unit. For example, the AAUP’s 1915 Declaration specifically warns faculty to “guard against taking unfair advantage of the student’s immaturity by indoctrinating [them] with the teacher’s own opinions” before the student is in a position to examine other opinions and “form any definitive opinion of [their] own.”91Edwin R. A. Seligman, Charles E. Bennett, James Q. Dealey, Richard T. Ely, Henry W. Farnam, Frank A. Fetter, Franklin H. Giddings, Charles A. Kofoid, Arthur O. Lovejoy, Frederick W. Padelford, Roscoe Pound, Howard C. Warren, Ulysses G. Weatherly & Am. Ass’n Univ. Professors, General Report of the Committee on Academic Freedom and Academic Tenure: Presented at the Annual Meeting of the Association 35 (1915).

Third, many standard listener-based accounts of free speech emphasize the autonomy interests of listeners. As Jones puts it:

If listeners, like speakers, have dignitary rights to self-fulfillment and self-definition, they “must also be free to shape their own identities and preferences.” Listening should be an independent source of legal right because a listener possesses not only “a powerful dignitary interest in shaping and defining the hearer’s self,” but also “an instrumental interest in gaining access to information and ideals that will assist the hearer in making rational, informed choices,” and a legitimate “fear that government will abuse any power to cut the hearer off” from speech that meets these needs.92Jones, supra note 64, at 503 (footnotes omitted) (first quoting Burt Neuborne, Madison’s Music: On Reading the First Amendment 98 (2015); and then quoting Burt Neuborne, The Status of the Hearer in Mr. Madison’s Neighborhood, 25 Wm. & Mary Bill Rts. J. 897, 906–07 (2017)). See also Charles L. Black, Jr., He Cannot Choose but Hear: The Plight of the Captive Auditor, 53 Colum. L. Rev. 960, 965 (1953) (“Why on earth should anyone committed to the central assumptions of our ethical life see anything picayune or petty in the claim of a man to dispose, as he will and as unavoidable circumstances allow, of his attention and of the faculties it marshals, as against the claim of a group of men to take this autonomy away from him for their own profit?”); Charles Fried, The New First Amendment Jurisprudence: A Threat to Liberty, 59 U. Chi. L. Rev. 225, 233 (1992) (“[M]y status as a rational sovereign requires that I be free to judge for myself what is good and how I shall arrange my life . . . .”); Burt Neuborne, Blues for the Left Hand: A Critique of Cass Sunstein’s “Democracy and the Problem of Free Speech”, 62 U. Chi. L. Rev. 423, 443 (1995) (arguing that hearers should not be viewed as weak and malleable creatures in need of widespread government protection).

Once again, a simple version of autonomous listener interests cannot account for curricular settings, at least not without modification. Students might earnestly believe that they should be free to shape their identity and preferences by avoiding particular information. But that will not excuse them from curricular requirements regarding those topics.

There are ways to blunt the tension. One might say that students have, by enrolling in a program with transparent requirements, autonomously pursued their “instrumental interest in gaining access to information and ideals that will assist the hearer in making rational, informed choices,” and that their objections to any particular steps along the way should be subsumed to the larger autonomous choice. This effectively treats the students’ choice to listen as a kind of rolling consent. After all, the student version of academic freedom traces itself to the German Lernfreiheit, or freedom to learn, which originally “referred simply to the freedom to choose one’s course of study.”93Menand, supra note 14.

Of course, none of this means that students do or should have no say in the curriculum.94Bridges, supra note 56, at 810 nn. 21 & 22 (collecting sources showing how law students have been challenging curricular requirements and the content of other required courses). As Khiara Bridges notes, “a society that purports to value equality benefits when professors learn to experience this pressure not as a constraint on academic freedom but rather as an entreaty about the destination to which their exercise of academic freedom might lead.”95Id. at 812. Good pedagogy not only licenses but requires attention to one’s audience. The point is not to describe knowledge but to convey it, and careful instructors therefore account for structure, presentation, and pacing, all of which depend in part on students’ abilities, interest, and experiences. Perhaps a broad mandate of trigger warnings and class exemptions hinders learning. But professors who stubbornly insist on teaching material without considering their students’ perspectives are simply abdicating the responsibility to teach well.

  1. Campus Speakers, Events, and Other Extra-Curricular Settings

The analysis thus far has focused on the classroom, where the importance of students-as-listeners and demands of academic freedom as a form of disciplinarity seem most clear. Matters are more difficult when it comes to nominally extra-curricular campus speech like outside speakers and events.

It is one thing to say that students are obliged to listen and learn the prescribed material in a class for which they have registered or which is otherwise required by the curriculum. It is quite another to say that they are obliged to give their attention to any particular campus speaker or lunchtime event. To do so might be a virtue, but attention is a precious resource96Tim Wu, Is the First Amendment Obsolete?, Knight First Amend. Inst. at Colum. Univ. (Sept. 1, 2017), https://knightcolumbia.org/content/tim-wu-first-amendment-obsolete [https://perma.cc/78KW-7LG8] (“[I]t is no longer speech or information that is scarce, but the attention of listeners.”). and students-as-listeners retain substantial control over how they choose to spend it. In that regard, the autonomy principle plays a more important role when it comes to extra-curricular speech than it does in the classroom.

Most campus speaker controversies—which can serve as a stand-in for the broader category of on-campus, extra-curricular speech—do not involve students deciding not to listen, but rather efforts to protest or disrupt such speeches so that others cannot listen, either. Most (albeit not all97See, e.g., Gregory P. Magarian, When Audiences Object: Free Speech and Campus Speaker Protests, 90 U. Colo. L. Rev. 551, 554 (2019) (“A sound free speech analysis of campus speaker protests should begin with the insight that the student audience’s interest is paramount because the university’s defining purpose is to educate its students. That doesn’t mean students should simply dictate every decision about speaker invitations.”). I might define the mission more broadly to include the advancement and dissemination of knowledge beyond students, but the point—that students have valid audience interests—remains the same.) discussions, celebrations, and condemnations of these efforts have focused on either the protesting students or the “cancelled” speakers. This has had a number of unfortunate effects. One is distorting understandings of the campus speech climate by treating the actions of a few students at a few schools as if they are representative of the millions of students across the country. Another is amplifying the supposed interests of would-be speakers, some of whom are neither seeking nor likely to communicate anything of academic interest. Making the loudest of them into martyrs distorts the real issues of academic freedom at stake, as well as the valid audience-interests that generally count in favor of including controversial scholarly speakers.

Students who object to a speaker might be asserting their own interests as listeners—as they have every right to do—but they also risk interfering with the listening interests of others. Some degree of protest, aggressive questioning, or heckling might be appropriate and could even contribute to the educative value of the event.98Whittington, supra note 19, at 119 (“Far better for students to be thoughtful participants in events on campus than idle spectators, and a robust culture of free speech on campus should give ample space to students to voice their discontents and disagreement with campus speakers.”). But disrupting the match between a willing speaker and a willing audience is the essence of interfering with listeners’ interests.99James Grimmelmann, Listeners’ Choices, 90 U. Colo. L. Rev. 365, 366 (2019) (“The paradigm case of free speech involves a matched pair of a willing speaker and a willing listener.”); Kendrick, supra note 68, at 1791 (“Professor T.M. Scanlon’s Millian Principle posited that it is wrong for the state to interfere with allegedly harmful messages, because doing so fails to treat listeners as autonomous beings capable of evaluating messages on their own.” (footnote omitted)). Student-listeners’ opposition to a speech they are not required to attend cannot, without more, be a reason for either them or the university to unduly disrupt the event. This is generally consistent with First Amendment doctrine, which holds that “[l]isteners’ reactions to speech are not the type of ‘secondary effects’ ” that may insulate a regulation from heightened scrutiny100Boos v. Barry, 485 U.S. 312, 321 (1988) (citing Renton v. Playtime Theatres, Inc., 475 U.S. 41 (1986)).—in this context, the protest or disruption would be the equivalent of a regulation.

As with classroom pedagogy, of course, this does not mean that student objections to a particular speaker or event should be ignored. Greg Magarian’s suggested solution is that a university has a “duty of faithful service to its students,” and that if it invites a speaker “for reasons that diverge from the interests of the student community” then the validity of the invitation should ultimately turn on “the university’s process for inviting the speaker.”101Magarian, supra note 97, at 556–57. This focus on listeners’ interests in the process of selection rather than with regard to the merits of an individual speaker raises an important potential framing question when it comes to listeners’ interests—namely, whether they should be measured at any one moment or across a broader time frame.102Daryl J. Levinson, Framing Transactions in Constitutional Law, 111 Yale L.J. 1311, 1314 (2002) (“The results of constitutional cases turn on the location, size, and shape of often-invisible transactional frames that are positioned prior to any deliberation over the meaning or purposes of constitutional rights. This is the basic problem of ‘framing transactions’ in constitutional law.”). Education, after all, is a process of development over time, many moments of which (exams, particular lessons, and for that matter particular ideas and speakers) might be objectionable to a listener.

  1. Dormitories and Other Private Spaces

While it may be true that the primary mission of a university is the production and dissemination of knowledge, it does not follow that this mission is exclusive, nor even that it is primary in every corner of a campus. In some contexts, academic freedom is not the sole or even primary value, and standard free speech principles hold sway, including that of students-as-listeners to limit the speech of others.

Consider the dormitory. An Urban Institute study based on data from 2015 and 2016 found that nearly two-thirds of full-time students at private nonprofit four-year colleges and universities live in college housing, as do about a third of those at public four-year college students.103Understanding College Affordability – Room and Board, Urb. Institute, https://collegeaffordability.urban.org/prices-and-expenses/room-and-board [https://web.archive.org/web/20240819224542/https://collegeaffordability.urban.org/prices-and-expenses/room-and-board/#/room_and_board_by_type_of_institution]. Student housing occupies something of a liminal space in that it is undoubtedly part of a university, and yet is also at least equally the private home of an individual.104See Ashutosh Bhagwat & John Inazu, Searching for Safe Spaces, Inside Higher Ed (Mar. 20, 2017), https://www.insidehighered.com/views/2017/03/21/easily-caricatured-safe-spaces-can-help-students-learn-essay [https://perma.cc/N8DD-KVQV].

In the First Amendment context, courts and scholars have typically recognized a right to choose what one listens to in the home. That right can be affirmative, as in Stanley v. Georgia, which declared that the “right to receive information and ideas, regardless of their social worth, is fundamental to our free society” and that it gains “an added dimension” when exercised “in the privacy of a person’s own home.”105Stanley v. Georgia, 394 U.S. 557, 564 (1969) (citation omitted). But it also encompasses a right not to listen to unwanted speech in the home,106For more on the structure of such choice rights, see Joseph Blocher, Rights To and Not To, 100 Calif. L. Rev. 761 (2012). even if that means interfering with the flow of ideas. As the Supreme Court put it in Frisby v. Schultz, upholding a restriction on picketing in residential neighborhoods, “[t]here simply is no right to force speech into the home of an unwilling listener.”107Frisby v. Schultz, 487 U.S. 474, 485 (1988). In Rowan v. U.S. Post Office Department, the Court upheld a federal law permitting homeowners to opt out of receiving mailed advertisements that the homeowner believed to be “erotically arousing or sexually provocative,”108Rowan v. U.S. Post Office Dep’t, 397 U.S. 728, 737–38 (1970). invoking a similar rationale:

We therefore categorically reject the argument that a vendor has a right under the Constitution or otherwise to send unwanted material into the home of another. If this prohibition operates to impede the flow of even valid ideas, the answer is that no one has a right to press even “good” ideas on an unwilling recipient.109Id. at 738.

The final line goes a bit too far—the government cannot always shut down speech on behalf of unwilling recipients—but it is generally sound in the context of homes and other locations that people cannot or should not have to leave.110Martin v. City of Struthers, 319 U.S. 141, 148 (1943) (striking down a ban on door-to-door distribution of leaflets and the like, comparing it unfavorably with trespass-after-warning statutes and similar laws that “leave[] the decision as to whether distributers of literature may lawfully call at a home where it belongs—with the homeowner”).

The same listener-focused principle applies to students in campus housing. Whether or not students are a captive audience in every campus context,111See supra notes 75–82 and accompanying text. they have a valid claim to that categorization when in their own rooms. It follows that, just as with freedom of speech, others’ claims of academic freedom do not entitle them to force messages, regardless of their merit, onto students in the privacy of their dorms. Again, this tracks basic listener-based approaches to the freedom of speech, including the Court’s invocation of “the First Amendment rights of speakers against the privacy rights of those who may be unwilling viewers or auditors.”112Erznoznik v. City of Jacksonville, 422 U.S. 205, 208 (1975).

It should go without saying that the distinctions between these categories are neither bright nor inevitable. Indeed, the boundaries of the “home” on campus are significantly contested, and many critics claim that students are over-using it to protect themselves from unwanted ideas.113See, e.g., Conor Friedersdorf, A College Is a Community but Cannot Be a Home, The Atl. (Sept. 24, 2016), https://www.theatlantic.com/education/archive/2016/09/a-college-is-a-community-but-cannot-be-a-home/500882 [https://web.archive.org/web/20220707012447/https://www.theatlantic.com/education/archive/2016/09/a-college-is-a-community-but-cannot-be-a-home/500882] (“Campus life is too diverse at most schools for dorms to serve as a place of respite from uncomfortable ideas.”). In a much-publicized incident at Yale in 2017, students confronted the master of Silliman residential college, with one of them saying to him that “[i]t is your job to create a place of comfort and home for the students that live in Silliman . . . Do you understand that?”114Katy Waldman, Yale Students Erupt in Anger Over Administrators Caring More About Free Speech Than Safe Spaces, Slate (Nov. 7 2015, 5:50 PM), https://slate.com/news-and-politics/2015/11/yale-students-protest-over-racial-insensitivity-and-free-speech.html [https://perma.cc/F44Q-LARA]. When the master responded that he had a different view of the role, the student responded: “Then step down! If that is what you think about being a Master, then you should step down. It is not about creating an intellectual space! It is not! Do you understand that? It’s about creating a home here! You are not doing that. You’re going against that.”115Id. Whatever one thinks of the student’s conclusions or the context and tone in which they were delivered, the invocation of the residential college as a “home” is not unjustified. Universities are more than just classrooms; they are “communities whose members not only work and learn together but also live, eat, and socialize together.”116Whittington, supra note 19, at 71.

The lines between curricular and extra-curricular settings are similarly contestable. It might be easy in theory for a student to avoid listening to a lunchtime speaker, but what if the pressure from faculty, administrators, or classmates is so strong that it shades into compulsion?117Cf. J.M. Balkin, Free Speech and Hostile Environments, 99 Colum. L. Rev. 2295, 2310–12 (1999) (“Generally speaking, people are captive audiences for First Amendment purposes when they are unavoidably and unfairly coerced into listening. . . . Captivity in this sense is a matter of practicality rather than necessity. It is about the right not to have to flee rather than the inability to flee.”). A student may be justified in claiming her dorm room as a private space where she has a freedom not to listen to controversial speech, but what about shared living rooms, quads, dining halls, and the like? What if her roommate does wish to discuss controversial topics? There is simply no way to give a single ex ante definition that will answer such questions, any more so than First Amendment doctrine can easily sort public from limited from nonpublic forums.

B. Scholars

Students are in some sense the most obvious listeners on campus, but they are far from the only ones. Whereas faculty as speakers are often central to debates about campus speech, they are also a crucial audience when it comes to academic freedom and scholarly speech.

The scholarly pursuit of knowledge is a communal enterprise.118Whittington, supra note 19, at 15 (“Although the scholarly life is often imagined to be isolated, even hermetic, the scholarly enterprise is fundamentally communal.”). This is true in the obvious sense that a scholar must publish, teach, or otherwise disseminate what she knows in order for others to hear and benefit from the knowledge-production that justifies her academic freedom. But it is also true in the sense that to acquire such knowledge in the first place she must be embedded in a functioning community of speakers and listeners; one that appropriately takes its cues from (i.e., listens to) disciplinary experts.

The point is that the production of knowledge—the process of scholarly inquiry itself119Robert Post, Debating Disciplinarity, 35 Critical Inquiry 749, 751 (2009) (“When we speak of a discipline, therefore, we speak not merely of a body of knowledge but also of a set of practices by which that knowledge is acquired, confirmed, implemented, preserved, and reproduced.” (footnote omitted)).—involves scholars simultaneously speaking and listening to one another. It is a community-wide instantiation of what Seana Shiffrin has described in treating individuals as “thinkers,” rather than speakers or listeners.120Seana Valentine Shiffrin, Speech Matters: On Lying, Morality, and the Law 79–81 (2014); Seana Valentine Shiffrin, A Thinker-Based Approach to Freedom of Speech, 27 Const. Comment 283, 283-84 (2011). The justification for academic freedom is not simply that universities are in possession of truths that others have a valid interest and perhaps right to hear. Rather, it is that academic freedom is necessary to pursue and identify such truths.

This makes it essential that faculty be able to listen to one another. The freedom of research and publication at the heart of the 1915 Declaration is not solely—nor perhaps primarily—for the benefit of the researcher or publisher, but for those who might read and perhaps respond to her work. Actions that prevent scholars from benefiting from one another’s work threaten academic freedom by undermining those listening interests; they are a form of what Meiklejohn called the “mutilation of the thinking process of the community.”121Meiklejohn, supra note 51, at 27 (emphasis omitted) (“It is that mutilation of the thinking process of the community against which the First Amendment to the Constitution is directed.” (emphasis omitted)).

Meiklejohn was forced out of the presidency of Amherst after pushing an educational model that would, among other things, “substitute discussion for pure lecturing, the disposition to lead the students into original inquiry and speculation rather than to preach dogma to them.” Whittington, supra note 19, at 22 (quoting Raymond S. Tompkins, Twelve Decline Their Degrees from Amherst, Balt. Sun, June 21, 1923, at 13).
Scholars must be able to hear one another in order to build on or for that matter repudiate one another’s work.122Menand, supra note 14 (“Academic discourse is rigorously policed. It’s just that the police are professors.”). This model of knowledge production relies on self-policing institutions, not individuality;123For more on institutional approaches to the First Amendment, see Paul Horwitz, First Amendment Institutions 22 (2013); Joseph Blocher, Institutions in the Marketplace of Ideas, 57 Duke L.J. 821 (2008); Frederick Schauer, Principles, Institutions, and the First Amendment, 112 Harv. L. Rev. 84 (1998). scholars using their expertise to question received orthodoxy are not the same as no-nothings on the internet “just asking questions.”

Faculty also have an important interest in listening to their students,124Magarian, supra note 97, at 578 (“[F]ree speech principles should lead us to conceptualize university students as members of a community that university administrators organize and manage but may not dominate.”). as two of the Court’s most distinguished former professors noted in opinions relating to campus speech. In Justice William O. Douglas’s words, “If we are to become an integrated, adult society, rather than a stubborn status quo opposed to change, students and faculties should have communal interests in which each age learns from the other.”125Healy v. James, 408 U.S. 169, 197 (1972) (Douglas, J., concurring). Justice Felix Frankfurter characterized the interaction between teachers and students as “a kind of continuing dialogue.”126Wieman v. Updegraff, 344 U.S. 183, 197 (1952) (Frankfurter, J., concurring) (quoting Testimony of Robert M. Hutchins, Assoc. Dir. of the Ford Found., Hearings before the House Select Committee to Investigate Tax-Exempt Foundations and Comparable Organizations (Nov. 25, 1952)).

The student connection goes deeper still. It is said that being a student “means being open to others in ways that allow one to expand one’s thinking, to enhance one’s capacities for appreciation, for empathy and for civic participation.”127Michael S. Roth, Academic Freedom Is More Important Now Than Ever, Time (Apr. 23, 2024, 12:06 PM), https://time.com/6969851/academic-freedom-is-more-important-than-ever-now [https://perma.cc/W8KJ-UJX3]. See also Michael S. Roth, The Student: A Short History (2023). Such openness to growth and change surely should not be limited to students. Members of a university community “do not have the right to insist that others in fact find . . . arguments persuasive” but they do “have the right to expect that others in the community will be open to persuasion,”128Whittington, supra note 19, at 98. and that expectation in turn can only be legitimate if faculty expect—and demand—the same of themselves. This does not mean wielding disciplinary standards as a cudgel, but working to shape justified beliefs; as Erin Miller observes, “[p]ersuasion engages, rather than subverts, epistemic rationality.”129Miller, supra note 88, at 876.

I have argued elsewhere for the importance of persuadability as a First Amendment virtue.130Blocher, supra note 21, at 109. See generally Vincent Blasi, Free Speech and Good Character, 46 UCLA L. Rev. 1567 (1999) (celebrating, inter alia, receptivity to change). In the context of scholarly speech, that virtue becomes something closer to a duty.131John Stuart Mill, On Liberty 90–91 (David Bromwich & George Kateb eds., Yale Univ. Press 2003) (1859) (“The steady habit of correcting and completing his own opinion by collating it with those of others . . . is the only stable foundation for a just reliance on it . . . .”). A scholar who is not open to being persuaded is merely a speaker, not a listener, and in that sense is not genuinely involved in knowledge production—just dissemination of what that scholar takes to be the truth.

C. The Public

Faculty’s interests as listeners are essential to the practice of scholarly disciplinarity, but the ultimate justification for academic freedom is rooted in the interests of another audience: the general public. As we have seen, academic freedom as a matter of self-governance—freedom from outside control—was originally justified and must be constantly re-defended on the basis that such disciplinarity is actually practiced and also that it serves “the common good.”1321940 Statement, supra note 10, at 14. Both of those essential propositions are under great stress.

First, much of the current critique of campus speech is based on the notion that professors are failing to apply the disciplinary standards that justify academic freedom.133Jeannie Suk Gersen points to former Harvard President Claudine Gay, saying that “[w]hat her embattled leadership couldn’t survive in the end was the drip-drip of plagiarism accusations, which allowed the public to question whether academic standards were relaxed for Gay in her rise to the presidency.” Jeannie Suk Gersen, The Future of Academic Freedom, New Yorker (Jan. 27, 2024), https://www.newyorker.com/news/the-weekend-essay/the-future-of-academic-freedom [https://web.archive.org/web/20240128014145/https://www.newyorker.com/news/the-weekend-essay/the-future-of-academic-freedom]. Such a failure can be taken as a default on the obligations that in turn justify academic freedom. As the AAUP’s 1915 declaration recognized, “[t]here are no rights without corresponding duties.”1341915 Declaration, supra note 22, at 298. Or in the words of the Executive Director of Heterodox Academy, which is at the forefront of campus speech battles today, “this is a pretty fair bargain. Professors receive wide latitude to run their own affairs as experts, in exchange for a certain professorial ethos of fair-mindedness, intellectual humility, and self-restraint.”135Michael Regnier, The Broken Bargain of Academic Freedom, Heterodox Acad. (Oct. 26, 2023), https://heterodoxacademy.org/blog/the-broken-bargain-of-academic-freedom [https://perma.cc/H4EA-VU6L].

It is important that universities combat the impression of knowledge-stultifying homogeneity. One way to do so might be through modeling the virtue of persuadability described above—showing that scholars are in fact listening in meaningful ways. In their critique of cancel culture on college campuses (which is valuable, though it leans too heavily into the free speech paradigm), Greg Lukianoff and Rikki Schlott argue that, “[t]he antidote to an epistemic crisis is an expert class that exhibits epistemic humility. That means acknowledging when they might be wrong.”136Lukianoff & Schlott, supra note 16, at 91. The perception and arguable reality of “epistemic crisis” and characterization of an over-confident ivory tower can only be addressed through an appreciation of the public’s listening interests.

The second point of stress is that the listening public has increasingly come to doubt that academic expertise really does deliver value. A tendency to distrust the ivory tower is nothing new in American life, of course.137Richard Hofstadter, Anti-Intellectualism in American Life (1963). But in the current moment, that crisis of confidence is increasingly deep and partisan. A survey from 2022 found that only 37 percent of Republicans and 73 percent of Democrats believe that colleges and universities have a “positive effect” on society—numbers that have fallen precipitously.138Rachel Fishman, Sophie Nguyen & Louisa Woodhouse, Varying Degrees 2022: New America’s Sixth Annual Survey on Higher Education, New Am. (July 26, 2022), https://www.newamerica.org/education-policy/reports/varying-degrees-2022/findings [https://perma.cc/A3XS-6QFP]. See also Sharp Partisan Divisions in Views of National Institutions, Pew Rsch. Ctr. (July 10, 2017), https://www.pewresearch.org/politics/2017/07/10/sharp-partisan-divisions-in-views-of-national-institutions [https://perma.cc/PZR4-LGYN]. This undoubtedly feeds into what Lukianoff and Schlott describe as one rule of “the right’s Efficient Rhetorical Fortress”; namely that “[y]ou don’t have to listen to experts (even conservative experts, if they have the ‘wrong’ opinion).”139Lukianoff & Schlott, supra note 16, at 165.

There is no simple solution to this problem. In prior work, I have argued that the basic lodestar of an epistemic approach to the First Amendment might be reimagined not as truth but as knowledge—defined roughly as justified true belief.140See Blocher, supra note 40. To do so would mean focusing not just on the accuracy of information but the basis for believing it. And that, in turn, would direct attention to what ultimately is the underlying crisis of the “post-truth” society; not a failure to value or pursue individualized conceptions of truth, but a tendency to value and pursue individualized conceptions of truth regardless of justification. The crisis is one of social epistemology; of losing shared trust in the institutions that give us justified true belief. Any way out of that crisis must be rooted in the interests and perspectives of the listening public, who must be convinced that “[f]or society’s good—if understanding be an essential need of society—inquiries into these problems, speculations about them, stimulation in others of reflection upon them, must be left as unfettered as possible,”141Sweezy v. New Hampshire, 354 U.S. 234, 262 (1957) (Frankfurter, J. concurring). and that the university “will function for the benefit of society, provided it is a center of independent thought.”142Wieman v. Updegraff, 344 U.S. 183, 197 (1952) (Frankfurter, J., concurring) (quoting Testimony of Robert M. Hutchins, Assoc. Dir. of the Ford Found., Hearings before the House Select Committee to Investigate Tax-Exempt Foundations and Comparable Organizations (Nov. 25, 1952)).

Conclusion

In contexts as diverse as employer speech,143Helen Norton, Truth and Lies in the Workplace: Employer Speech and the First Amendment, 101 Minn. L. Rev. 31, 38 (2016) (“[A] focus on employer speech as occurring within a listener-centered relationship better and more coherently furthers key First Amendment values than do efforts to force employer speech to fit within existing and often unsatisfactory constitutional categories”). robotic speech,144Helen Norton, Robotic Speakers and Human Listeners, 41 Seattle U. L. Rev. 1145, 1149 (2018) (arguing, inter alia, “that we understand the First Amendment to permit the government to privilege listeners’ interests by requiring the truthful disclosure of expression’s robotic origin”). amplified speech,145Erin L. Miller, Amplified Speech, 43 Cardozo L. Rev. 1, 58 (2021) (analyzing amplified speech in part through the prism of listener interests, for example in arguing that “courts should review interventions designed to assist listeners under the lower bar of intermediate scrutiny”). commercial speech,146Va. State Bd. of Pharmacy v. Va. Citizens Consumer Council, Inc., 425 U.S. 748, 757 (1976) (“If there is a right to advertise, there is a reciprocal right to receive the advertising . . . .” (footnote omitted)); Robert Post & Amanda Shanor, Adam Smith’s First Amendment, 128 Harv. L. Rev. F. 165, 170 (2015) (“Ordinary First Amendment doctrine . . . focuses on the rights of speakers, not listeners,” but the “constitutional value of commercial speech lies in the rights of listeners to receive information so that they might make intelligent and informed decisions.” (footnote omitted)). and search engines,147James Grimmelmann, Speech Engines, 98 Minn. L. Rev. 868, 894 (2014). scholars and judges have identified and explored the status and role of listeners in giving life to the freedom of speech and the rights of speakers. For doctrinal and technological reasons, those inquiries are as important today as they have ever been, and this symposium is an invitation to take them further. The goal of this Article has been to suggest some ways in which consideration of listener interests might illuminate current debates about campus speech. Students’ interests as listeners are essential to justifying the freedom to teach, and yet students do not have the full panoply of listener-associated interests one might find in other speech contexts. Faculty, meanwhile, are generally treated as the paradigm speaker in campus speech controversies, but also have essential rights and duties as listeners; the production of knowledge through disciplinarity requires as much. And the academy’s authority to govern itself according to disciplinary standards is fundamentally predicated on convincing the public—a broad but essential audience—that the scholarly enterprise is in fact generating valuable knowledge.

* * *

 

98 S. Cal. L. Rev. 1161

Download

* Lanty L. Smith ’67 Distinguished Professor of Law and Senior Associate Dean of Faculty, Duke Law School. Many thanks to Erin Miller for including me in this symposium, to Ash Bhagwat, Rebecca Brown, Alan Chen, James Grimmelmann, Richard Katskee, Tomer Kenneth, Greg Magarian, and Nomi Stolzenberg for incredibly valuable feedback, and to Jack Townsend for research assistance. 

First Amendment Governance: Social Media, Power, and a Well-Functioning Speech Environment

Introduction

In Moody v. NetChoice, LLC,1Moody v. NetChoice LLC, 603 U.S. 707 (2024). the Supreme Court declared, in a majority opinion by Justice Kagan, that “it is critically important to have a well-functioning sphere of expression, in which citizens have access to information from many sources. That is the whole project of the First Amendment.”2Id. at 732–33. In Moody, social media platforms claimed that their expressive freedom had been violated by state laws mandating certain content-moderation policies.3Id. at 713–17. Although Moody was decided on the criteria required to bring a facial challenge, it nonetheless provided some direction with respect to what the government can and cannot do vis-à-vis the First Amendment rights of social media platforms.4Id. at 717–19.

This decision also implicitly raises the question of what it means for a democracy to have a well-functioning political speech environment in the digital era. This question seems particularly urgent given the profound dilemma that social media poses for democratic theory and practice. On the one hand, social media democratizes communication and promotes egalitarianism by reducing the cost of speech.5See Eugene Volokh, Cheap Speech and What It Will Do, 104 Yale L.J. 1805 (1995); Eugene Volokh, What Cheap Speech Has Done: (Greater) Equality and Its Discontents, 54 U.C. Davis L. Rev. 2303, 2305 (2021). It provides new avenues for expression and association, thereby strengthening public discourse. It has also been harnessed to enable citizen participation in political decision-making.6See Hélène Landemore, Open Democracy and Digital Technologies, in Digital Technology and Democratic Theory 62, 66 (Lucy Bernholz et al. eds., 2021); Roberta Fischli & James Muldoon, Empowering Digital Democracy, 22 Persps. on Pol. 819, 819 (2024). On the other hand, social media can undermine democratic functioning, giving rise to various challenges such as disinformation, echo chambers, troll armies, bots, microtargeting, citizen distrust, and foreign election interference.7See, e.g., Cass R. Sunstein, #Republic: Divided Democracy in the Age of Social Media (2017); Nathaniel Persily, Can Democracy Survive the Internet?, 28 J. Democracy 63 (2017); Richard L. Hasen, Cheap Speech: How Disinformation Poisons Our Politics—and How to Cure It (2022). As various attempts at election subversion, including the attack on the Capitol, demonstrate, election disinformation can have damaging and destabilizing effects on democracy and can diminish the confidence that citizens have in elections. The ongoing stability of political institutions should not be taken for granted in our era of democratic decline.8See, e.g., Tom Ginsburg & Aziz Z. Huq, How to Save a Constitutional Democracy (2018); Steven Levitsky & Daniel Ziblatt, How Democracies Die (2018).

Although free speech has always posed this particular dilemma—both essential for, yet potentially injurious to, democracy—key features of the new digital era raise questions as to whether conventional regulatory approaches are sufficient to safeguard the public sphere. Social media platforms enjoy unprecedented asymmetries of wealth and power as compared to their users. These platforms play a crucial role in providing and regulating the online speech environment9See Jack M. Balkin, Free Speech is a Triangle, 118 Colum. L. Rev. 2011, 2011 (2018). and, hence, in constructing a significant dimension of public discourse. Aside from their dominance, these powerful social media platforms were not created to provide a healthy expressive realm for democracy. Instead, they engage in “surveillance capitalism”—a behavioral advertising business model that sells users’ data for immense profits.10See Shoshana Zuboff, The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power 16 (2019). This profit motive arguably renders the platforms unreliable as self-regulators.11See Abby K. Wood & Ann M. Ravel, Fool Me Once: Regulating “Fake News” and Other Online Advertising, 91 S. Cal. L. Rev. 1223, 1237, 1245 (2018). The outsized power of social media platforms to shape the expressive sphere, combined with their non-public regarding orientation, raises genuine concerns about the ongoing health of the political marketplace of ideas.

While the overwhelming power of the state has always—and rightly—been viewed as particularly perilous for the freedom of speech, dominant private actors, particularly those who either control or have disproportionate access to the means of communication, can likewise pose a threat to free speech. Is it possible to address such asymmetries of power consistent with the First Amendment? Should social media platforms be regulated to provide for the type of speech environment necessary for democracy? What are the normative attributes of a well-functioning sphere of political expression? More generally, what should be done to protect listeners, a category of democratic actor that tends to receive less scholarly attention than speakers?

This Article offers a preliminary analysis of these issues. It is organized in three parts. Part I begins by providing a brief overview of First Amendment doctrine as it applies to speakers and listeners. In addition, it outlines the three principal values—democracy, autonomy, and truth-seeking—that animate the First Amendment. For the purposes of the ensuing analysis, this Article adopts the view that the First Amendment is geared to promoting democratic self-government. Part I then sets out a normative account of a healthy expressive realm. A well-functioning political speech environment for speakers and listeners, I suggest, is one that is free of domination and coercion and in which acute asymmetries in political and economic power do not distort the capacity of individuals to engage in self-government, principally with respect to three central activities: (1) informed voting; (2) discussion and deliberation; and (3) meaningful participation. I claim further that the speech environment ought to protect individuals’ liberty, equality, epistemic, and nondomination interests in order to foster a healthy sphere of expression for these self-governing activities.

While this Article sets out an admittedly idealized account of what a well-functioning political speech environment would entail, and while such an account may never be attained in full (or even in part), a normative theory provides, I suggest, a useful benchmark by which to assess current challenges and their possible regulatory solutions.12To be sure, the idealized account offered here does not on its own furnish a roadmap for reform efforts; its ambition is instead cabined to identifying normative objectives and the problematic features of the world to which such objectives apply, following what Jacob Levy has described as “a back and forth process between cases and principles, evils and ideals.” Jacob T. Levy, There Is No Such Thing as Ideal Theory, 33 Soc. Phil. & Pol’y 312, 328 (2016). To this end, Part I also identifies certain challenges posed by the digital public sphere, and, in addition, advances a claim of “digital exceptionalism”—the idea that the online world of expression has distinctive features that not only distinguish it from the non-digital world but that also pose unique and profound difficulties for the attainment of a well-functioning expressive realm.

Part II turns to First Amendment jurisprudence to see whether it enables the government to address the challenges posed by the digital world so as to provide for a well-functioning political speech environment. It begins by describing the positive conception of the First Amendment, under which the state is viewed as having an affirmative role in protecting the democratic public sphere from the distortive influence of powerful private entities. Part II then offers a snapshot view of the current law of public discourse, focusing in particular on campaign finance regulation and the Moody decision, to show that the Court has largely abandoned the positive conception in favor of an approach that prohibits the government from ensuring a greater diversity of expression.

While the Court’s approach protects listeners from the power of the state, it gives rise to the troubling conundrum that the political speech environment is left unprotected not only from the dominant power of private tech giants but also from the deficits of the digital public sphere. Neither the state nor the platforms protect listeners from the effects of acute asymmetries of private power. Indeed, many regulatory responses to the challenges of digital exceptionalism would likely fall afoul of the First Amendment. For this reason, the sizeable gap between the normative ideal of a well-functioning political speech environment and the often disheartening reality of the digital public sphere cannot be closed by contemporary First Amendment doctrine.

In response to this conundrum, Part III makes an argument for “countervailance,” which is, in essence, the idea that certain mechanisms could counter, or at least lessen, these asymmetries in power and their resulting deficits such that listeners’ interests are better protected, even if that protection does not rise to the level of establishing the kind of equality needed for self-governance. I briefly consider a suite of countervailing mechanisms—including disclosure and transparency rules, a narrow prohibition of false election speech, strategies to manage deepfakes, state-led incentives structures and norms, public jawboning, and civil society efforts—that can be deployed by public entities, social media platforms, and civil society institutions. Given First Amendment constraints, however, these measures are necessarily modest in their scope and cannot serve as full-blown solutions to the challenges of digital exceptionalism.

I. A Well-Functioning Speech Environment and its Challenges

This Part sets out a normative account of a well-functioning political speech environment. It also argues for “digital exceptionalism”—the idea that the challenges faced by the digital public sphere are unique and may therefore require a tailored regulatory response. To ground the discussion, I begin with a brief overview of First Amendment values and doctrine as they apply to speakers and listeners.

A. Speakers, Listeners, and the First Amendment

In his philosophical examination of the freedom of expression, T.M. Scanlon identifies three groups of interests: those of participants, audiences, and bystanders.13See T.M. Scanlon, Jr., Freedom of Expression and Categories of Expression, 40 U. Pitt. L. Rev. 519, 520 (1979). Burt Neuborne’s Madisonian reading of the First Amendment likewise identifies a range of participants in a “neighborhood” of expressive freedom, including, most prominently, speakers and listeners.14See Burt Neuborne, Madison’s Music: On Reading the First Amendment 100 (2015). For Neuborne, listeners ought to be treated as equal partners, who, like speakers, require expressive freedom to develop their own identities and preferences.15See id. Speakers and listeners thus go hand in hand: the “free flow of ideas and information generated by autonomous speakers” is “essential to the ability of hearers to make the informed decisions on which the efficient functioning of choice-dependent institutions like democracy, markets, and scientific inquiry depend.”16Id. at 101.

In First Amendment doctrine, however, listener interests play a limited role; indeed, such interests are typically protected to the extent that they correspond to speaker interests.17See Derek E. Bambauer, The MacGuffin and the Net: Taking Internet Listeners Seriously, 90 U. Colo. L. Rev. 475, 477 (2019). To be sure, the underlying logic of the categorical approach to First Amendment jurisprudence—under which the Supreme Court has created tiers of speech based on the value of particular kinds of speech to public discourse—is implicitly oriented to the perspective of listeners.18See Elena Kagan, Private Speech, Public Purpose: The Role of Governmental Motive in First Amendment Doctrine, 63 U. Chi. L. Rev. 413, 476–77 (1996). For instance, political speech is afforded maximum protection because it provides indispensable information for citizens to fulfill their democratic roles, while libel is accorded no value because defamatory statements do not enhance, and indeed detract from, reasoned discourse.

The Supreme Court has also recognized that under the First Amendment, listeners may enjoy a “right to know” or an “independent right to receive information.”19Neuborne, supra note 14, at 103–04; Lamont v. Postmaster Gen. of U.S., 381 U.S. 301, 308 (1965) (Brennan, J., concurring); Kleindienst v. Mandel, 408 U.S. 753, 762–63 (1972). Indeed, the right of listeners to receive a free flow of information has served as the basis of the First Amendment’s protection of commercial and corporate speech.20Va. State Bd. of Pharmacy v. Va. Citizens Consumer Council, 425 U.S. 748, 771–72 (1976). However, in the face of the Court’s increasingly deregulatory posture toward commercial speech, critics have argued that rather than protecting listener interests, the Court has subordinated them to corporate speech rights.21See Morgan N. Weiland, Expanding the Periphery and Threatening the Core: The Ascendant Libertarian Speech Tradition, 69 Stan. L. Rev. 1389, 1415 (2017). Although speaker interests usually trump listener interests in the event of a conflict, there are some circumstances outside of public discourse in which listener interests can prevail. As Helen Norton explains, when “listeners have less information or power than speakers,” the law can prohibit speakers from providing false information or can require truthful disclosures with respect to, for example, consumer products or professional speech.22See Helen Norton, Powerful Speakers and Their Listeners, 90 U. Colo. L. Rev. 441, 441–42, 453 (2019). The Supreme Court’s deregulatory turn on compelled professional speech,23Nat’l Inst. of Fam. & Life Advocs. v. Becerra, 585 U.S. 755, 755 (2018). however, has created uncertainty about the status of a broad range of consumer-protective regulations.24See Alan K. Chen, Compelled Speech and the Regulatory State, 97 Ind. L.J. 881, 912–13 (2022).

For both speakers and listeners, there are three principal values that animate the First Amendment: democratic self-government; autonomy or self-fulfillment; and truth seeking through the marketplace of ideas.25See Thomas I. Emerson, Toward a General Theory of the First Amendment, 72 Yale L.J. 877, 878–79 (1963). An additional value proposed by Vincent Blasi—checking the abuse of power—also seems particularly relevant for democratic self-government.26See Vincent Blasi, The Checking Value in First Amendment Theory, 2 Am. Bar Found. Rsch. J. 521, 527 (1977). On this view, the freedoms of speech, assembly, and a free press provide a crucial countervailing force for checking the abuse of power by public officials.

However, there is considerable debate as to which value is predominant. According to Alexander Meiklejohn’s influential theory, the First Amendment is exclusively geared to producing a democratic system of government; hence, “[w]hat is essential is not that everyone shall speak, but that everything worth saying shall be said.”27Alexander Meiklejohn, Free Speech and Its Relation to Self-Government 25 (1948). Owen Fiss likewise argues that the “purpose of free speech is not individual self-actualization, but rather the preservation of democracy, and the right of a people, as a people, to decide what kind of life it wishes to live.”28Owen M. Fiss, Free Speech and Social Structure, 71 Iowa L. Rev. 1405, 1409–10 (1986). On this view, individual autonomy is simply a means to achieve collective self-determination.29See id.

For Robert Post, however, the value of autonomy is inseparable from democratic self-government because democracy depends on the active participation of citizens.30See Robert Post, Meiklejohn’s Mistake: Individual Autonomy and the Reform of Public Discourse, 64 U. Colo. L. Rev. 1109, 1120–21 (1993). Public discourse and free public debate—and, by extension, the autonomy of speakers—must be protected in service of democratic government.31See Robert Post, Equality and Autonomy in First Amendment Jurisprudence, 95 Mich. L. Rev. 1517, 1526–27 (1997). Some scholars place primacy on individual autonomy or self-realization apart from self-government,32See Martin H. Redish, The Value of Free Speech, 130 U. Pa. L. Rev. 591, 593 (1982). on the basis that, following Kant, all individuals possess the right to be treated as ends in themselves.33See Charles Fried, Speech in the Welfare State—The New First Amendment Jurisprudence: A Threat to Liberty, 59 U. Chi. L. Rev. 225, 233 (1992). Finally, the value of truth seeking emphasizes the First Amendment’s role in protecting, and indeed maximizing, the free flow of information, in order for society to better pursue the truth. As stated by Justice Holmes, “the best test of truth is the power of the thought to get itself accepted in the competition of the market.”34Abrams v. United States, 250 U.S. 616, 630 (1919) (Holmes, J., dissenting).

This Article takes the view, as expressed by Cass Sunstein, that the First Amendment is “fundamentally aimed at protecting democratic self-government.”35Cass R. Sunstein, Free Speech Now, 59 U. Chi. L. Rev. 255, 263 (1992); see also Cass R. Sunstein, The First Amendment in Cyberspace, 104 Yale L.J. 1757, 1762–63 (1995) [hereinafter Sunstein, Cyberspace]. The other values—autonomy, truth seeking, and checking the abuse of power—will be treated as serving the democracy value.

A related, but conceptually distinct, question concerns the role of the democratic state: should the government regulate speech in order to promote the democracy value? There are two competing constellations of ideas, which correspond roughly with the libertarian and egalitarian approaches to speech. The libertarian approach asserts that state regulation of speech is particularly dangerous for democracy. Speech itself is a form of power: it enables citizens to hold leaders to account and check the abuse of official power. Given state incentives to stifle dissent and criticism, content-based regulations of speech are prohibited save for a few tightly circumscribed and justified exceptions for particularly disfavored speech such as obscenity or libel.36See Cass R. Sunstein, Democracy and the Problem of Free Speech 1–51 (1st Free Press Paperback ed. 1995). The overall posture is one of distrust of government,37See Helen Norton, Distrust, Negative First Amendment Theory, and the Regulation of Lies, 22-07 Knight First Amend. Inst. 3 (Oct. 19, 2022), https://knightcolumbia.org/content/distrust-negative-first-amendment-theory-and-the-regulation-of-lies [https://perma.cc/8F46-R2LH]. in keeping with what Vincent Blasi has termed the “pathological perspective,” whereby the First Amendment is “targeted for the worst of times.”38Vincent Blasi, The Pathological Perspective and the First Amendment, 85 Colum. L. Rev. 449, 449–50 (1985). Under the libertarian approach, expressive liberties are best served by minimizing state regulation, thereby enhancing the free flow of information in the marketplace of ideas. In general, this constellation of ideas is associated with a negative rights approach to the First Amendment, under which the role of the state is to refrain from interfering with citizens’ freedom of speech.

The second, and opposing, constellation of ideas holds that the primary value of a system of free expression is to enable citizens to “to arrive at truth and make wise decisions, especially about matters of public import.”39Kagan, supra note 18, at 424. Under the egalitarian approach, listeners have an interest in being exposed to a wide range of competing views.40See id. at 423–25. However, due to certain factors, such as, for example, the cost of political advertising in the campaign finance context, the marketplace of ideas may be skewed toward elite viewpoints. Listeners would thus be deprived of hearing the full range of ideas and political preferences necessary to reach an informed decision. To ensure that listeners are fully informed, the government may have to impose restrictions in order for all points of view to have a roughly equal opportunity of being heard.41See id. As described in more detail below,42See infra text accompanying notes 94–103. this constellation of ideas is associated with a positive rights approach to the First Amendment, under which the government may have to take affirmative steps to protect individuals’ expressive freedoms.

B. A Normative Account of a Well-Functioning Speech Environment

As Justice Kagan observed, a “well-functioning sphere of expression” is “the whole project of the First Amendment.”43Moody v. NetChoice LLC, 603 U.S. 707, 732–33 (2024). But what does it mean to have such a sphere of expression?44For an alternative account of a well-functioning sphere of expression, see Joshua Cohen and Archon Fung, Democracy and the Digital Public Sphere, in Digital Technology and Democratic Theory (Lucy Bernholz et al. eds., 2021). Cohen and Fung offer an account of the informal public sphere (as opposed to formal political processes of elections and decision-making) which has five elements: rights to expression and association, fair opportunities to participate, access to information from reliable sources, a diversity of views, and the capacity for joint action arising from discussion. Id. at 29–30. This Article argues, as a normative matter, for the promotion of a well-functioning political speech environment for speakers and listeners, one that is free of domination and coercion, and in which acute asymmetries in political and economic power do not distort the capacity of individuals to engage in various self-governing activities, including the following:

(1) Informed Voting: individuals form opinions on public matters based on reliable information in both digital and non-digital mediums, with access to a wide array of competing viewpoints, thereby engaging in informed voting;

(2) Discussion and Deliberation: individuals engage in discussion and deliberation with other citizens whether online or in person as an integral and ongoing democratic practice necessary to self-governing activities, including but not limited to voting; and

(3) Meaningful Participation: individuals participate meaningfully in the democratic process through a variety of avenues, including voting, deliberating, associating with others whether online or in-person, organizing events, consuming or producing political content online, petitioning, and the like, thereby ensuring governmental responsiveness and accountability.

The idea is that democratic citizens should be able to participate in the democratic process with full knowledge and equal freedom.

To foster a healthy expressive realm for these self-governing activities, I further claim that the speech environment ought to protect individuals’ liberty, equality, epistemic, and nondomination interests. The protection of these interests, I suggest, is required to ensure that public discourse is organized and conducted in a manner that serves the value of democratic self-government. To be sure, there will inevitably be conflicts among these interests that would require certain choices and tradeoffs to be made.45For an argument about how the conflicting values of equality and liberty should be instantiated in law, see Yasmin Dawood, Democracy and the Freedom of Speech: Rethinking the Conflict Between Liberty and Equality, 26 Canadian J.L. & Juris. 293 (2013). These interests may also overlap in various ways such that a given outcome could be described as involving, say, both equality and epistemic considerations. While it is beyond the scope of this Article to provide a full account of these interests and their possible conflicts, a few preliminary observations follow.

As described above with respect to the libertarian approach, individuals’ liberty interests are best served by the robust protection of their expressive and associational freedoms under the First Amendment.46See supra text accompanying notes 36–38. Speakers ought to be able to freely express their political opinions and policy preferences, while listeners’ right to know should likewise be shielded from government censorship. In addition to their liberty interests, citizens have equality interests in being exposed to speech that reflects a wide range of competing views, ideas, and political preferences. As described above with respect to the egalitarian approach, the government may have to take affirmative steps to protect listeners’ equality interests in hearing a wide range of viewpoints because the marketplace of ideas may be skewed in favor of elite viewpoints.47See supra text accompanying notes 39–42. For an argument about how the conflicting values of equality and liberty should be instantiated in law, see Yasmin Dawood, Democracy and the Freedom of Speech: Rethinking the Conflict Between Liberty and Equality, 26 Canadian J.L. & Juris. 293 (2013). The speech environment should also protect citizens’ epistemic interests in receiving accurate and reliable information, which is required for reaching good judgments. As Melissa Schwartzberg observes, these epistemic interests ought to also be understood to encompass the kinds of institutions and instruments needed to develop, inform, and assess such judgments.48See Melissa Schwartzberg, Epistemic Democracy and Its Challenges, 18 Ann. Rev. Pol. Sci. 187, 201 (2015). To be sure, epistemic interests may overlap with equality intersts to the extent that good judgments depend upon an exposure to a wide range of viewpoints.

Finally, a healthy expressive environment should also protect democratic actors from domination or coercion. As Philip Pettit argues in his influential account of republican freedom, an individual has dominating power over another person to the extent that they have the capacity to interfere on an arbitrary basis in certain choices that the other is in a position to make.49See Philip Pettit, Republicanism: A Theory of Freedom and Government 52 (1997). An act of interference is arbitrary to the extent that the dominating agent is not forced to track the avowable or relevant interests of the victim but instead can interfere as their will or judgment dictates.50See id. at 55. Individuals’ nondomination interests broadly capture the idea that speakers and listeners ought to be protected from the capacity of powerful agents, whether public or private, to interfere arbitrarily in their choices.51For an elaboration of these ideas in the democratic context, see Yasmin Dawood, The Antidomination Model and the Judicial Oversight of Democracy, 96 Geo. L.J. 1411 (2008).

While these four interests—liberty, equality, epistemic, and nondomination—apply to all three self-governing activities, they take different forms depending on the context. In addition, the self-governing activities overlap in various ways: meaningful participation may require informed discussion, for example. The discussion below provides additional details for each self-governing activity.

  1. Informed Voting

Freedom of speech is a precondition for informed voting. As noted by the Supreme Court, the First Amendment has the objective of “securing . . . an informed and educated public opinion with respect to a matter which is of public concern.”52Thornhill v. Alabama, 310 U.S. 88, 104 (1940). Voters learn about the key issues at stake in the election, the differences among political candidates, and the main features of the platforms of various political parties. As Meiklejohn observes, the well-being of the political community depends on the wisdom of voters to make good decisions.53See Meiklejohn, supra note 27, at 24–25. For voters to make wise decisions, they must be aware, to the extent possible, of all the relevant facts, issues, considerations, and alternatives that bear upon their collective life.

Thus, a well-functioning political speech environment provides voters with epistemically reliable information on matters of public import from a wide range of competing sources and perspectives. For this to take place, speakers’ liberty interests must be fostered, and listeners’ equality, epistemic, and nondomination interests must be satisfied. Under these conditions, listeners as voters have access to the information they need to understand matters of public concern.

  1. Discussion and Deliberation

Discussion and deliberation are crucial activities for those individuals we formally deem to be speakers. However, listeners are also, at times, speakers. Listeners do not develop their views in a vacuum: the activities of discussion and deliberation require democratic listeners to engage with others as they evaluate matters of public importance. The idea here is one of active listening, which involves not just the passive receipt of information but requires discussion and debate. Informal conversations among listeners enable them to consider issues of public policy and to make up their minds about what is best for their common lives—activities that lie at the heart of self-government. The First Amendment is principally concerned with the “authority of the hearers to meet together, to discuss, and to hear discussed by speakers of their own choice, whatever they may deem worthy of their consideration.”54Alexander Meiklejohn, Political Freedom: The Constitutional Power of the People 119 (1966) (emphasis added).

As such, the normative account offered here departs in significant ways from Habermas’s formal account of ideal deliberation. Habermas’s theory of the “ideal speech situation” envisions a reasoned discussion among free and equal participants who aim for consensus by being persuaded by the force of the better argument.55See Jürgen Habermas, Discourse Ethics: Notes on a Program of Philosophical Justification, in Moral Consciousness and Communicative Action 89 (Christian Lenhardt & Shierry Weber Nicholsen, trans., 1990). Formal accounts of deliberative democracy, while differing in various respects, all tend to share a commitment to reaching collective decisions through public reasons, that is, reasons that are generally persuasive to all the participants in the deliberation.

However, in my view, this ideal form of deliberation is not mandatory in order to achieve a well-functioning sphere of expression. Instead, as John Dryzek observes, deliberation can include informal discussion, humor, emotion, and storytelling.56See John S. Dryzek, Deliberative Democracy and Beyond: Liberals, Critics, Contestations 1 (2000). Rather than requiring consensus, we should instead focus on the values of mutual respect, reciprocity, cooperation, and compromise.57See Amy Gutmann & Dennis Thompson, Democracy and Disagreement 346 (1996); James Bohman, Public Deliberation: Pluralism, Complexity, and Democracy 238 (2000); Jane Mansbridge, James Bohman, Simone Chambers, David Estlund, Andrea Føllesdal, Archon Fung, Cristina Lafont, Bernard Manin & José luis Martí, The Place of Self-Interest and the Role of Power in Deliberative Democracy, 18 J. Pol. Phil. 64, 94 (2010). That being said, a basic predicate of a well-functioning speech environment is that speakers and listeners can engage in discussion, debate, and deliberation free of coercion, harassment, and deception.

To be sure, deliberation has come under criticism for being exclusionary because it tends to favor advantaged citizens.58See Lynn M. Sanders, Against Deliberation, 25 Pol. Theory 347, 349 (1997). Critics have also charged that deliberation is simply unfeasible given the complexity of democratic institutions59See Ian Shapiro, Enough of Deliberation: Politics Is About Interests and Power, in Deliberative Politics: Essays on Democracy and Disagreement 28, 31 (Stephen Macedo ed., 1999). or is difficult to realize in practice given the realities of electoral campaigns.60See James A. Gardner, What are Campaigns For? The Role of Persuasion in Electoral Law and Politics 1, 86, 92–93, 115 (2009). In addition, deliberation may accentuate group polarization.61See Cass R. Sunstein, Why Societies Need Dissent 111–14 (2003). These criticisms underscore the need for a more capacious and inclusive understanding of deliberation.

  1. Meaningful Participation and Governmental Responsiveness

A well-functioning political speech environment must also facilitate meaningful participation by listeners and speakers. Participation can take many forms, including voting and deliberating, but can also include such activities as joining a political party, attending a town hall or a candidate rally, volunteering for a political cause, penning an op-ed, marching and protesting, organizing a petition, or running for office. Meaningful participation has online analogues, such as reading or posting messages on social media platforms, consuming or developing political content, reading or writing blogs, listening to podcasts, or running websites. Citizens engage in meaningful participation when they criticize public officials or government policies. Or when they join forces with like-minded others and vote for change. Or when they organize to influence public policy and legislation. All of these activities depend upon a robust sphere of expressive freedom.

Meaningful participation could also be understood as requiring a relatively equal opportunity to influence the outcome of an election. On this view, listeners as voters would have a strong interest in ensuring a somewhat level electoral playing field.62See Burt Neuborne, The Status of the Hearer in Mr. Madison’s Neighborhood, 25 Wm. & Mary Bill Rts. J. 897, 906 (2017). Meaningful citizen participation is also crucial for ensuring governmental responsiveness and accountability. By communicating and associating with one another, citizens can join together to vote for new political leaders. The threat of being removed from office in the next election is one of the most effective mechanisms for ensuring governmental accountability. A well-functioning speech environment is thus indispensable to ensure that state power is responsive to the interests of citizens.

C. Digital Exceptionalism

Does the digital public sphere provide the conditions necessary to foster a well-functioning political speech environment? In what follows, I identify the central features of what I shall call “digital exceptionalism,” the idea that the digital public sphere has distinctive features that not only distinguish it from the non-digital world but that also pose unique challenges for the promotion of a healthy expressive realm.

A principal challenge is that social media platforms wield vast “asymmetries of knowledge and power” over their users.63See Jack M. Balkin, Free Speech in the Algorithmic Society: Big Data, Private Governance, and New School Speech Regulation, 51 U.C. Davis L. Rev. 1149, 1162 (2018). The platforms act as private governors of online speech—enacting, implementing, and enforcing the rules that govern online expression.64See id. at 1197; Kate Klonick, The New Governors: The People, Rules, and Processes Governing Online Speech, 131 Harv. L. Rev. 1598, 1601–03 (2018). In addition, their power is remarkably concentrated: the digital public sphere is controlled in the main by three companies—Apple, Google, and Meta—that serve as the gatekeepers to online public discourse.65See Nikolas Guggenberger, Moderating Monopolies, 38 Berkeley Tech. L.J. 119, 121 (2023). To be sure, the media landscape in the pre-digital age was likewise highly concentrated: three networks shaped the news on television and a small handful of newspapers comprised the national market.66See Henry Farrell & Melissa Schwartzberg, The Democratic Consequences of the New Public Sphere, in Digital Technology and Democratic Theory 198 (Lucy Bernholz et al. eds., 2021). This concentration of pre-digital media power is likewise problematic for it undoubtedly reduced the plurality of differing points of view. However, certain mitigating features of the pre-digital public sphere are either absent, or greatly attenuated, in the digital world, and conversely, certain features unique to the digital world amplify the dangers posed by these power asymmetries. I briefly canvass a few of the relevant distinctions, noting, first, that these observations capture general trends and, second, that there are, of course, notable exceptions to each of these distinctions.

The first difference is that the pre-digital news media exerted a “strong gatekeeper” approach as compared to the “weak gatekeeper” approach of social media platforms.67See id. at 192. The traditional news media is bound by journalistic standards of objectivity and factual reliability. By contrast, social media platforms impose far fewer gatekeeping controls: while they filter certain prohibited topics such as graphic violence and pornography and rank or label other sorts of disfavored messages, there is far less ex ante quality control. Indeed, as of this writing, Meta has announced that it will eliminate fact checkers in the U.S. and rely instead on a “community notes” system similar to X (formerly Twitter).68See Our Approach to Political Content, Meta (Jan. 7, 2025), https://transparency.meta.com/features/approach-to-political-content [https://web.archive.org/web/20250207231253/https://transparency.meta.com/features/approach-to-political-content]. Research suggests, however, that community-based fact checking systems garner greater trust among users than professional fact-checking, in part because community notes provide additional information and context. See Chiara Patricia Drolsbach, Kirill Solovev & Nicholas Pröllochs, Community Notes Increase Trust in Fact-Checking in Social Media, 3 PNAS Nexus 1, 2, 9 (2024).

Second, as a result of this weak gatekeeping, there is said to be higher levels of misinformation on social media platforms. For example, Elon Musk’s false or misleading claims about elections accrued nearly 1.2 billion views on the social media platform X.69See David Ingram, Elon Musk’s Misleading Election Claims Have Accrued 1.2 Billion Views on X, New Analysis Says, NBC News (Aug. 8, 2024), https://www.nbcnews.com/tech/misinformation/elon-musk-misleading-election-claims-x-views-report-rcna165599 [https://perma.cc/7Q79-CYUH]. Recent empirical evidence suggests, however, that the degree of exposure to misinformation tends to be overstated with respect to the vast majority of users, at least in North America and Europe.70For an analysis of the empirical evidence, see Aziz Z. Huq, Islands of Algorithmic Integrity: Imagining a Democratic Digital Public Sphere, 98 S. Cal. L. Rev. 1287, 1297–98 (2025). Jurisdictions that rely heavily on social media, however, may have different outcomes. For instance, digital misinformation has proved to be a serious challenge in Brazil, with 90% of Bolsonaro supporters believing at least one piece of fake news in 2018.71See Christopher Harden, Brazil Fell for Fake News: What to Do About It Now?, Wilson Ctr. (Feb. 21, 2019), https://www.wilsoncenter.org/blog-post/brazil-fell-for-fake-news-what-to-do-about-it-now [https://perma.cc/7Z6M-4GSH]. In addition, deepfake technology may pose significant challenges for public discourse in the future.72See Bobby Chesney & Danielle Citron, Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security, 107 Calif. L. Rev. 1753, 1786 (2019). This is particularly true as the capacity to generate deepfakes using generative AI will soon outstrip both the platforms’ and users’ ability to detect them.73See Commc’ns. Sec. Establishment, Cyber Threats to Canada’s Democratic Process 18 (2023). A counterpoint, however, is that AI was used extensively, reportedly in a largely successful manner, in India’s recent national election, wherein politicians connected with voters by including deepfake impersonations of candidates and deceased politicians in campaign materials.74See Vandinika Shukla & Bruce Schneier, Indian Election Was Awash in Deepfakes—But AI Was a Net Positive for Democracy, The Conversation (June 10, 2024), https://theconversation.com/indian-election-was-awash-in-deepfakes-but-ai-was-a-net-positive-for-democracy-231795 [https://perma.cc/JT4C-3HWN].

A third difference is that social media platforms create a loss of epistemic trust. The decline in trust, rather than truth, may ultimately prove to be more damaging to the public sphere. Experimental evidence suggests that while exposure to deepfakes did not mislead participants, it left them feeling uncertain about the truthfulness of content.75See Cristian Vaccari & Andrew Chadwick, Deepfakes and Disinformation: Exploring the Impact of Synthetic Political Video on Deception, Uncertainty, and Trust in News, 6 Soc. Media + Soc’y 1, 2 (2020). This uncertainty, in turn, led to lower levels of trust with respect to news on social media. Researchers surmise that an increase in political deepfakes “will likely damage online civic culture by contributing to a climate of indeterminacy about truth and falsity that, in turn, diminishes trust in online news.”76Id. Epistemic distrust “can severely undermine a sense of democratic legitimacy among large parts of society.”77See Gilad Abiri & Johannes Buchheim, Beyond True and False: Fake News and the Digital Epistemic Divide, 29 Mich. Tech. L. Rev. 59, 65 (2022). The decay of trust also benefits leaders with authoritarian impulses.78See Chesney & Citron, supra note 72, at 1786. By contrast, in the pre-digital world, misinformation in public discourse was counteracted by civil society organizations, in particular the traditional news media, which maintained common standards for accuracy and objectivity, thereby instilling widespread trust in epistemic authorities.79See Abiri & Buchheim, supra note 77, at 65–66.

Fourth, social media platforms generate “epistemic fragmentation”—the idea that citizens no longer share a common set of facts and understandings about political life.80See id. at 66–67. Social media platforms tailor content for each user, leading to what Sunstein has dubbed “the Daily Me.”81Sunstein, supra note 7, at 2. Platforms also enable political campaigns to engage in microtargeting so that political advertising messages vary depending on the race and gender of the recipient. By contrast, citizens under the traditional news media paradigm were more likely to engage with the same news stories.82See Abiri & Buchheim, supra note 77, at 66–67. This fragmentation has compounded challenges to epistemic trust because “citizens no longer trust the same sources of information, and the reliability of the sources they do trust varies substantially.”83Farrell & Schwartzberg, supra note 66, at 192.

A fifth difference is that social media platforms rely on behind-the-scenes algorithms to do the vast majority of content filtering, in an effort to provide listeners with the kind of filtered experience that each user is seeking.84See Jane Bambauer, James Rollins & Vincent Yesue, Platforms: The First Amendment Misfits, 97 Ind. L.J. 1047, 1068 (2022); James Grimmelmann, Listeners’ Choices, 90 U. Colo. L. Rev. 365, 378–79 (2019). Because the predominant characteristic of the expressive environment online is the scarcity of listener attention, an important “means of controlling speech is targeting the bottleneck of listener attention, instead of speech itself.”85See Tim Wu, Is the First Amendment Obsolete? Knight First Amend. Inst. at Colum. Univ. (Sep. 1, 2017), https://knightcolumbia.org/content/tim-wu-first-amendment-obsolete [https://perma.cc/Y5DM-BJUG]; Tim Wu, The Attention Merchants (2016). As a result of this algorithmic filtering, Erin Miller argues that media companies could exert “skewing power” over certain “consumers’ information pools in a way that prevents them from forming epistemically justified beliefs.”86Erin Miller, Media Power Through Epistemic Funnels, 20 Geo. J.L. & Pub. Pol’y 873, 901 (2022).

Finally, social media platforms “were not created principally to serve democratic values and do not have as their lodestar the fostering of a well-informed and civically minded electorate.”87Persily, supra note 7, at 74. Instead, the platforms engage in “surveillance capitalism,” trading users’ behavioral data for vast profits.88See Zuboff, supra note 10, at 16. This behavioral advertising business model depends on maximizing the amount of time users engage with social media. A variety of deleterious phenomena are thus good for the bottom line, including addictive behavior, sensationalist and divisive content, and weakened privacy norms.89See Lina M. Khan & David E. Pozen, A Skeptical View of Information Fiduciaries, 133 Harv. L. Rev. 497, 505 (2019). Unlike the traditional news media, internet platforms “are not built to create a digital public sphere of common concern.”90Abiri & Buchheim, supra note 77, at 66–67. In addition, the platforms’ system of private governance threatens citizens’ opportunities to engage meaningfully in democratic participation, particularly in light of their lack of accountability to users.91See Klonick, supra note 64, at 1603.

These features of the digital public sphere, taken together, raise serious questions about whether the online speech market provides the conditions necessary to sustain a well-functioning political speech environment. As of this writing, the asymmetry of power between platforms and users has arguably been heightened by the intertwining of governmental and private tech interests. Because social media platforms exert asymmetrical power on users in a way that does not track the public interest, this gives rise to the apprehension that listeners’ interests in nondomination are not satisfied. By contrast, selection intermediaries that act in public-regarding ways, such as a well-run national broadcasting corporation, do not pose the same degree of risk. To be sure, traditional media could also exert dominating power on their listeners to the extent they are not forced to track listeners’ avowable interests in a well-functioning public sphere. What matters is whether the selection intermediary is upholding public-regarding standards such as the provision of accurate information and a diversity of competing viewpoints.

Digital exceptionalism does not mean that the government must intervene in a way that differs from its regulation of traditional news media. Instead, the distinctive features of the digital public sphere suggest that a specialized and tailored set of regulatory responses may be warranted to foster a well-functioning speech environment. Jack Balkin’s distinction between the “old-school” speech regulation of the predigital world and the “new school” speech regulation of digital intermediaries seems applicable.92See Jack M. Balkin, Old-School/New-School Speech Regulation, 127 Harv. L. Rev. 2296, 2306 (2014). Finally, the concerns raised here do not amount to a blanket condemnation of social media platforms. These platforms provide a range of goods such as entertainment, commerce, convenience, and connection that are rightly valued by consumers.

II. Law and the Speech Environment

To what extent is the normative account outlined in Part I reflected in First Amendment jurisprudence? Or to put the question another way: does the First Amendment offer any conceptual resources that would enable the government to respond to the challenges posed by digital exceptionalism? While it is beyond the scope of this Article to provide a comprehensive answer to these questions, this Part begins by briefly describing the positive conception of the First Amendment, under which the state’s role is to affirmatively protect the democratic public sphere from powerful private actors. Part II then offers a snapshot view of the current law of public discourse,93By “public discourse,” I mean speech that is relevant to the formation of public opinion and that deals with matters of public concern. See James Weinstein, Participatory Democracy as the Central Value of American Free Speech Doctrine, 97 Va. L. Rev. 491, 493 (2011). For an alternative interpretation of this concept, see Robert Post, Participatory Democracy and Free Speech, 97 Va. L. Rev. 477, 488 (2011) (arguing that the “boundaries of public discourse are inherently normative”). focusing in particular on campaign finance regulation and the Moody decision to show that the Supreme Court has for the most part abandoned the positive conception and, as a result, has significantly restricted the range of allowable regulatory responses to the deficits of digital exceptionalism.

A. The First Amendment as a Positive Right

A positive conception of the First Amendment, as mentioned above, holds that the government may have to take affirmative steps to protect expressive freedom from powerful private entities.94See supra text accompanying notes 39–42. Owen Fiss asserts, for instance, that “the impact that private aggregations of power have upon our freedom” means that “sometimes the state is needed simply to counteract these forces.”95Owen M. Fiss, The Irony of Free Speech 2–3 (1996). The state has a duty to “preserve the integrity of public debate” in order to “safeguard the conditions for true and free collective self-determination.”96Fiss, supra note 28, at 1416. In keeping with this duty, the state may have to intervene to protect the “robustness of public debate in circumstances where powers outside the state are stifling speech.”97Fiss, supra note 95, at 4. Sunstein argues for a “New Deal for speech” under which the supposed democratic interferences with the autonomy of private actors are not abridgements of speech; indeed, the autonomy of private actors is itself a product of law and may amount to an abridgment.98See Cass R. Sunstein, The Partial Constitution 202 (1993). As such, “what seems to be government regulation of speech might, in some circumstances, promote free speech, and should not be treated as an abridgment at all.”99Id. at 204.     

As Genevieve Lakier observes, the Supreme Court understood the freedom of speech as having a positive dimension during the New Deal and Warren Court eras.100See Genevieve Lakier, The First Amendment’s Real Lochner Problem, 87 U. Chi. L. Rev. 1241, 1247 (2020). That is, the First Amendment did not only provide individuals with personal expressive freedom; it also provided them with the means for democratic self-government.101See id. at 1333. For example, in Red Lion Broadcasting Co. v. FCC, the Supreme Court upheld, against a First Amendment challenge, the FCC’s fairness doctrine, which required broadcasters to provide adequate and fair coverage to public issues in a way that accurately captured competing viewpoints.102Red Lion Broad. Co. v. FCC, 395 U.S. 367, 375 (1969). The FCC repealed the fairness doctrine in 1987. According to the Court, the fairness doctrine furthered the “First Amendment goal of producing an informed public capable of conducting its own affairs.”103Id. at 392. However, in the ensuing years, the Court has largely abandoned the positive conception of

the First Amendment,104But see Turner Broad. Sys., Inc. v. FCC, 520 U.S. 180 (1997) (upholding against a First Amendment challenge must-carry rules requiring cable television networks to allocate some channels to local broadcast stations). including in the campaign finance context, as discussed below.

B. Public Discourse and Campaign Finance Regulation

The Supreme Court has interpreted the First Amendment as providing the highest possible protection to public discourse due to its centrality to self-government. One of the main ways in which public discourse—specifically electoral speech—is regulated is through campaign finance law.105The discussion that follows is drawn from Yasmin Dawood, The Theoretical Foundations of Campaign Finance Regulation, in The Oxford Handbook of American Election Law 817–42 (Eugene D. Mazo ed., 2024). In recent years, the Supreme Court has taken a deregulatory posture to campaign finance law, striking down significant parts of the legal infrastructure governing money in politics. This skepticism was apparent in an early landmark case, Buckley v. Valeo,106Buckley v. Valeo, 424 U.S. 1 (1976). in which the Court struck down limits on campaign expenditures because they were not justified by the government’s interest in preventing the actuality and appearance of corruption. In Buckley, the Court explicitly rejected the egalitarian—or equalization—rationale, stating that “the concept that government may restrict the speech of some elements of our society in order to enhance the relative voice of others is wholly foreign to the First Amendment.”107Id. at 48–49. Hence, the “governmental interest in equalizing the relative ability of individuals and groups to influence the outcome of elections” did not justify expenditure limits.108See id. at 49. The Buckley court found, however, that limits on campaign contributions were justified by the government’s interest in preventing corruption and its appearance. The provision of large contributions “to secure political quid pro quos from current and potential office holders” undermined the integrity of representative democracy.109See id. at 26–27.

In a subsequent decision, Austin v. Michigan State Chamber of Commerce,110Austin v. Mich. Chamber of Com., 494 U.S. 652 (1990), overruled by Citizens United v. FEC, 558 U.S. 310 (2010); see also FEC v. Mass. Citizens for Life, 479 U.S. 238, 257–58 (1986) (observing that the “corrosive influence of concentrated corporate wealth” may make “a corporation a formidable political presence, even though the power of the corporation may be no reflection of the power of its ideas”). the Supreme Court broadened the definition of corruption beyond quid pro quo corruption to encompass the concept of antidistortion which arose from the “corrosive and distorting effects of immense aggregations of wealth that are accumulated with the help of the corporate form and that have little or no correlation to the public’s support for the corporation’s political ideas.”111Austin, 494 U.S. at 660. The antidistortion concept was ultimately based on an equality rationale.112See, e.g., Stephen E. Gottlieb, The Dilemma of Election Campaign Finance Reform, 18 Hofstra L. Rev. 213, 229 (1989); Kathleen M. Sullivan, Political Money and Freedom of Speech, 30 U.C. Davis L. Rev. 663, 679 (1997). Concentrated corporate wealth gives certain voices far greater political influence than others due to the fact that speech is expensive.113See David Cole, First Amendment Antitrust: The End of Laissez-Faire in Campaign Finance, 9 Yale L. & Pol’y Rev. 236, 266 (1991). As a result of these inequities in speech capacities, listeners do not have access to the full range of views, which may affect their voting patterns and, hence, skew electoral outcomes. In McConnell v. FEC,114McConnell v. FEC, 540 U.S. 93 (2003) (quoting FEC v. Colo. Republican. Fed. Comm., 533 U.S. 431, 441 (2001)), overruled by Citizens United v. FEC, 558 U.S. 310 (2010). the Court held that corruption also encompassed the “undue influence on an officeholder’s judgment, and the appearance of such influence.”115Id. at 95. Undue influence arises when political parties sell special access to federal candidates and officeholders, thereby creating the perception that money buys influence. The undue influence standard is concerned with the skew in legislative, rather than electoral, outcomes.

The Supreme Court’s decision in Citizens United v. FEC,116Citizens United v. FEC, 558 U.S. 310 (2010). however, marked a turning point, implicating listener interests in at least four ways. First, the Supreme Court rejected Austin’s antidistortion rationale on the basis that it was actually an equalization rationale in violation of Buckley’s central tenet that the First Amendment prevents the government from restricting the speech of some in order to enhance the voice of others. The Court held that preventing quid pro quo corruption or the appearance thereof was the only governmental interest strong enough to overcome First Amendment concerns. Listener interests in the maintenance of a relatively level electoral playing field were undercut by this decision. In other cases, the Court has rejected equality-based arguments on the grounds that leveling the electoral playing field is impermissible under the First Amendment.117Davis v. FEC, 554 U.S. 724 (2008) (striking down on First Amendment grounds a federal statute that raised contribution limits for non-self-financed candidates who were running against wealthy self-financed opponents); Ariz. Free Enter. Club’s Freedom Club PAC v Bennett, 564 U.S. 721 (2011) (striking down on First Amendment grounds a state law that provided matching funds to publicly financed candidates in order to level the playing field by offsetting high levels of spending by privately funded opponents and independent committees).

Second, the Court held in Citizens United that corporations were henceforth allowed to spend unlimited sums from their general treasury funds as independent expenditures. According to the Court, independent expenditures do not give rise to the actuality or appearance of quid pro quo corruption. This reasoning gave rise to the emergence of Super PACs. In a subsequent case, SpeechNow.org v. FEC,118SpeechNow.org v. FEC, 599 F.3d 686 (D.C. Cir. 2010), cert. denied sub nom Keating v. FEC, 562 U.S. 1003 (2010). a lower court struck down contribution limits on PACs that engaged exclusively in independent spending—entities that are now known as Super PACs. Super PACs can accept unlimited contributions from individuals, corporations, and labor unions to fund independent ads supporting or opposing federal candidates. Listener interests are arguably undermined by the phenomenon of Super PACs: these entities have changed the political landscape by flooding huge sums of money into elections.119See Michael S. Kang, The Year of the Super PAC, 81 Geo. Wash. L. Rev. 1902 (2013). Not only is coordination with candidates a reality,120See Richard Briffault, Super PACs, 96 Minn. L. Rev. 1644 (2012). For a contrary view, see Bradley A. Smith, Super PACs and the Role of “Coordination” in Campaign Finance Law, 49 Willamette L. Rev. 603, 635 (2013). but Super PACs lack accountability and transparency relative to political parties and candidates, thereby further decreasing the influence of individual listeners on the democratic process.

Some may argue, however, that the increases in corporate advertising, and hence in available information, are beneficial to listeners. Indeed, the Court majority in Citizens United took this position, stating that the “right of citizens to inquire, to hear, to speak, and to use information to reach consensus is a precondition to enlightened self-government and a necessary means to protect it.”121Citizens United, 558 U.S. at 339 (emphasis added). The Court also asserted that “it is inherent in the nature of the political process that voters must be free to obtain information from diverse sources in order to determine how to cast their votes.”122Id. at 341.

Third, Citizens United and the deregulatory turn it ushered in, has broader implications for democracy. Money skews legislative priorities because it provides legislative access to large donors and lobbyists.123See Lawrence Lessig, Republic, Lost: How Money Corrupts Congress—and a Plan to Stop It 16 (2011); Christopher S. Elmendorf, Refining the Democracy Canon, 95 Cornell L. Rev. 1051, 1055 (2010) (arguing that “electoral systems should render elected bodies responsive to the interests and concerns of the normative electorate, i.e., the class of persons entitled to vote”). While access does not guarantee legislative outcomes, it is required to exert political influence. As such, officeholders are disproportionately responsive to the wishes of large donors than to other constituents.124See Nicholas O. Stephanopoulos, Aligning Election Law 240–46 (2024). Empirical studies have shown, for instance, that elected representatives are more responsive to the preferences of the affluent than to the preferences of low-income and middle-income individuals.125See, e.g., Larry M. Bartels, Unequal Democracy: The Political Economy of the New Gilded Age (2d ed. 2008); Martin Gilens, Affluence and Influence: Economic Inequality and Political Power in America (2012). It should be noted, however, that this does not speak directly to the impact of campaign money on legislative decision-making. The emphasis on the donor class disproportionately impacts the participation and representation of people of color and ordinary citizens.126See Spencer Overton, The Donor Class: Campaign Finance, Democracy, and Participation, 153 U. Pa. L. Rev. 73 (2004). Empirical research has demonstrated that donors “are not only wealthy, they are almost all white.”127Abhay P. Aneja, Jacob M. Grumbach & Abby K. Wood, Financial Inclusion in Politics, 97 N.Y.U. L. Rev. 566, 569 (2022). This racial gap has an impact on representation by affecting the electoral candidate pool and the behavior of legislators in office.128Id. at 630.

Finally, listener interests were at issue in the Court’s holding that disclosure and disclaimer requirements survived exacting scrutiny. The Court found that disclosure was “justified based on a governmental interest in ‘provid[ing] the electorate with information’ about the sources of election-related spending.”129Citizens United v. FEC, 558 U.S. 310, 368 (2010) (citing Buckley v. Valeo, 424 U.S. 1, 66 (1976)). The transparency resulting from disclosure “enables the electorate to make informed decisions and give proper weight to different speakers and messages.”130Id. at 371. Abby Wood argues that disclosure provides multiple informational benefits for voters.131See Abby K. Wood, Learning from Campaign Finance Information, 70 Emory L.J. 1091, 1102 (2021). By contrast, critics argue that disclosure rules violate privacy and raise the risk of retaliation. In a recent decision, Americans for Prosperity Foundation v. Bonta,132Ams. for Prosperity Found. v. Bonta, 594 U.S. 595 (2021). however, the Supreme Court has made it easier for disclosure laws to be found unconstitutional.133Although Bonta is not a campaign finance case as it concerns disclosure by nonprofit organizations (and not candidates, parties, or PACs), it has clear implications for campaign finance disclosure laws. See Michael Kang, The Post-Trump Rightward Lurch in Election Law, 74 Stan. L. Rev. Online 55, 64–65 (2022); Abby K. Wood, Disclosure, in The Oxford Handbook of American Election Law 923, 924, 928–29 (Eugene D. Mazo ed., 2024).

C. Public Discourse and Social Media Platforms

In the campaign finance realm, listeners’ liberty interests in unrestricted access to the commercial speech market are protected. However, their equality interests in a relatively level electoral playing field are significantly undermined. A similar pattern is evident in the emerging law of social media platform regulation. Listeners’ liberty interests are largely protected on social media platforms given the sheer volume of information available, but their equality interests in a level electoral playing field, an open deliberative sphere, and access to competing viewpoints appear to be compromised in the online world. As described in Part I.C above, listeners’ epistemic and nondomination interests are likewise threatened as a result of the key features of digital exceptionalism.

In Moody v. NetChoice, LLC,134Moody v. NetChoice, LLC, 603 U.S. 707 (2024). the Court considered the constitutionality of state laws from Florida and Texas that restricted the ability of social media platforms to engage in content moderation. The laws required internet platforms to carry speech that might otherwise be demoted or removed due to the platforms’ content moderation policies.135Id. at 713–22. The laws also required a platform to provide an individualized explanation to any user whose posts had been altered or removed.136Id. The states’ underlying concern was that the platforms were politically biased and were unfairly silencing the voices of conservative speakers.137Id. at 740–41; NetChoice, LLC v. Att’y Gen., Fla., 34 F. 4th 1196, 1203 (11th Cir. 2022). NetChoice, an internet trade association, brought facial challenges to the laws. The U.S. Court of Appeals for the Eleventh Circuit upheld a preliminary injunction, finding that the Florida law likely violated the First Amendment.138NetChoice, LLC, 34 F. 4th at 1227–28. However, the Court of Appeals for the Fifth Circuit reversed a preliminary injunction of the Texas law, partially on the basis that the platforms’ content moderation activities did not amount to speech, and hence did not infringe the First Amendment.139NetChoice, LLC v. Paxton, 49 F. 4th 439, 494 (2022).

Writing for the Supreme Court in Moody, Justice Kagan vacated the lower court decisions and remanded the cases, on the grounds that there was an insufficient record to sustain a facial challenge.140Moody, 603 U.S. at 713–18. While the Court was unanimous that NetChoice’s facial challenge had failed, Justice Kagan, speaking for a six-member majority,141Justice Kagan was joined by Chief Justice Roberts and Justices Sotomayor, Kavanaugh and Barrett in full and Justice Jackson in part. nonetheless proceeded to provide substantive guidance as to how the lower courts should conduct the facial analysis.

The Court majority’s central proposition was that the laws in question infringed the First Amendment rights of large social media platforms (specifically with respect to Facebook’s NewsFeed, YouTube’s homepage, and the like). Drawing an analogy to newspapers, the Court asserted that such platforms should be viewed as speakers with the right to compile and curate the speech of others. Justice Kagan relied on Miami Herald Publishing Company v. Tornillo,142Mia. Herald Pub. Co. v. Tornillo, 418 U.S. 241, 258 (1974). in which the Court had struck down a right-of-reply law that required newspapers to print the reply of any political candidate who received critical coverage in their pages. In Tornillo, the Court held that the First Amendment protects newspaper editors in their “exercise of editorial control and judgment.”143Id. at 258. The Court majority drew upon additional cases—involving a private utility’s newsletter (Pacific Gas and Electric Co. v. Public Utilities Commission of California),144Pac. Gas & Elec. Co. v. Pub. Util. Comm’n of Cal., 475 U.S. 1 (1986). must-carry rules for cable operators (Turner Broadcasting System, Inc. v. FCC),145Turner Broad. Sys., Inc. v. FCC, 512 U.S. 622 (1994). The Court noted that in a later decision, the regulation was upheld because it was necessary to protect local broadcasting. Turner Broad. Sys., Inc. v. FCC, 520 U.S. 180, 189–90 (1997). and regulations affecting parades (Hurley v. Irish-American Gay, Lesbian and Bisexual Group of Boston, Inc.)146Hurley v. Irish-Am. Gay, Lesbian & Bisexual Grp. of Boston, Inc., 515 U.S. 557 (1995).—to find that the First Amendment prohibits the government from directing a private entity to include certain messages where that entity is curating the speech of others to create its own expressive product.147Moody v. NetChoice, LLC, 603 U.S. 707, 731–32, 742–43 (2024).

In the same way, the curating activity of social media platforms amounts to expressive activity protected by the First Amendment. Justice Kagan noted that Facebook’s News Feed and YouTube’s homepage use algorithms to create a personalized feed for each user.148Id. at 710. Their content moderation policies filter prohibited topics, such as pornography, hate speech, and certain categories of misinformation, and rank or label disfavored messages. In making these choices, social media platforms “produce their own distinctive compilations of expression.”149Id. at 716. The Moody majority thus appears to have resolved the debate as to whether platforms should be treated as publishers or as common carriers under the First Amendment (at least with respect to Facebook’s NewsFeed and the like).150See, e.g., Adam Candeub, Bargaining for Free Speech: Common Carriage, Network Neutrality, and Section 230, 22 Yale J.L. & Tech. 391 (2020); Eugene Volokh, Treating Social Media Platforms like Common Carriers?, 1 J. Free Speech L. 377 (2021); Ashutosh Bhagwat, Why Social Media Platforms Are Not Common Carriers, 2 J. Free Speech L. 127 (2022).

Consistent with the campaign finance context, the Court majority was adamant that the First Amendment prevents the state from interfering with “private actors’ speech to advance its own vision of ideological balance.”151Moody, 603 U.S. at 741. Government may not “decide what counts as the right balance of private expression,” and must instead “leave such judgments to speakers and their audiences.”152Id. at 719. This principle holds true even when there are credible concerns that certain private parties wield disproportionate expressive power in the marketplace of ideas. The majority noted that the regulations in Tornillo, PG&E, and Hurley “were thought to promote greater diversity of expression” and “counteract advantages some private parties possessed in controlling ‘enviable vehicle[s]’ for speech.”153Id. at 733 (citing Hurley v. Irish-Am. Gay, Lesbian & Bisexual Grp. of Boston, Inc., 515 U.S. 557, 577 (1995)). The Court also drew on its campaign finance jurisprudence, citing Buckley’s proposition that the government may not “restrict the speech of some elements of our society in order to enhance the relative voice of others.”154Id. at 742 (citing Buckley v. Valeo, 424 U.S. 1, 48–49 (1976)). Justice Kagan argued that “[h]owever imperfect the private marketplace of ideas, here was a worse proposal—the government itself deciding when speech was imbalanced, and then coercing speakers to provide more of some views or less of others.”155Id. at 733.

In a concurring judgment, Justice Alito (joined by Justices Thomas and Gorsuch) agreed with the majority’s facial unconstitutionality argument but took issue with the majority’s First Amendment analysis. Justice Alito argued that the states’ laws, at least in some of their applications, appeared to regulate passive carriers of third-party speech, which receive no protection under the First Amendment.156See id. at 788 (Alito, J., concurring). He criticized the majority for failing to address the states’ argument that Facebook and YouTube amount to common carriers,157See id. at 793–94 (Alito, J., concurring). as did Justice Thomas in a separate concurrence.158See id. at 751–52 (Thomas, J., concurring). Justice Alito also seemed more sympathetic to the states’ concerns, noting that the content moderation decisions of social media platforms can have “serious consequences,” including impairing “users’ ability to speak to, [and] learn from,” others; impairing a political candidate’s “efforts to reach constituents or voters”; compromising “the ability of voters to make a fully informed electoral choice”; and exerting “a substantial effect on popular views.”159Id. at 768 (Alito, J., concurring). He described the Florida law as an attempt “to prevent platforms from unfairly influencing elections or distorting public discourse,”160Id. at 770 (Alito, J., concurring). in a manner reminiscent of the very antidistortion arguments that were rejected by the conservative Justices in the campaign finance context.

III.  Possibilities for Countervailance

The Moody majority’s stance was consistent with a long line of precedent that has treated state control of speech with grave distrust. By “requir[ing] the platforms to carry and promote user speech that they would rather discard or downplay,”161Id. at 728. the states’ content moderation policies violated a central tenet that the government may not influence the content of speech. However, the Supreme Court’s interpretation of the First Amendment gives rise to a genuine conundrum: although this approach protects listeners from the power of the state, it does not protect the speech environment from the power of the platforms nor from the deficits that ensue from digital exceptionalism. Indeed, actions on the part of the state that would amount to an effective fix of the challenges of digital exceptionalism would very likely involve too great a governmental intrusion into expressive freedom. Hence, the gap between the ideal of a well-functioning speech environment and the challenges of digital exceptionalism cannot be resolved without dramatic changes to current First Amendment jurisprudence. As a result, there is a very narrow space for measures that might lessen the deleterious effects of digital exceptionalism without falling afoul of the First Amendment.

In light of this conundrum, this Part canvasses some possibilities for countervailance; that is, mechanisms that could lessen the deficits of the digital public sphere such that listeners’ interests are better protected, even if that protection does not rise to the level of establishing the kind of equality required for democratic self-governance. With respect to the challenge of disinformation in social media, I have argued elsewhere for a “multifaceted public-private approach that employs a suite of complementary tactics including: (1) disclosure and transparency laws; (2) content-based regulation and self-regulation; (3) norm-based strategies; and (4) civic education and media literacy efforts.”162Yasmin Dawood, Protecting Elections from Disinformation: A Multifaceted Public-Private Approach to Social Media and Democratic Speech, 16 Ohio State Tech. L.J. 639, 641 (2020). Using Canada as a case study, I suggested that the “combined and interactive effects of a multifaceted approach provide helpful protections against some of the harms of disinformation while still protecting the freedom of speech.”163Id. at 642.

A similar type of approach might be an appropriate way to think about countervailance. The idea is not that any one countervailing tactic will protect listener interests. Instead, the combined and interactive effects of a number of measures may serve as a countervailing force against the immense power of social media platforms. A caveat, however, is in order. These countervailing measures are imperfect, even deeply so, in terms of their ability to counter the challenges of digital exceptionalism. These measures will not on their own bring about a well-functioning speech environment; instead, they will bring such an environment closer to realization. Hence, the effect of this countervailance will no doubt be modest: listeners would still very much be at the mercy of the platforms. The objective would be to at least lessen the acuteness of the asymmetry and its resulting deficits.

Indeed, the majority opinion in Moody suggests that there are possibilities for regulation. Justice Kagan acknowledged, for instance, that “[i]n a better world, there would be fewer inequities in speech opportunities; and the government can take many steps to bring that world closer.”164Moody v. NetChoice, LLC, 603 U.S. 707, 741 (2024). Citing Turner I,165Turner Broad. Sys., Inc. v. FCC, 512 U.S. 622, 647 (1994) (protecting local broadcasting). Justice Kagan explicitly recognized that the “government can take varied measures, like enforcing competition laws, to protect th[e] access”166Moody, 603 U.S. 707 at 732–33. to information from many sources. In recent years, the federal government has been pursuing antitrust cases against Google, Meta, and Amazon. The Court majority also noted that “[m]any possible interests relating to social media” can meet the First Amendment intermediate scrutiny test.167Id. at 711 (citing United States v. O’Brien, 391 U.S. 367, 377 (1968)). Under intermediate scrutiny, a law must advance a “substantial governmental interest” that is “unrelated to the suppression of free expression.” Id. The Court was pointed in its assertion that “nothing said here puts regulation of NetChoice’s members off-limits as to a whole array of subjects.”168Id. at 740.

In what follows, I briefly canvass an array of countervailing mechanisms, including disclosure and transparency rules; a narrow prohibition of false election speech; strategies to manage deepfakes; state-led incentive structures and norms, including mechanisms to provide listeners with increased choices and powers of their own; public jawboning; and civil society efforts. Each of these measures warrants a far more extensive treatment—particularly with respect to their advantages and disadvantages—than I am able to offer here. Although it is beyond the scope of this brief discussion to attempt anything more than a cursory analysis, I hope that it nonetheless provides some indication of the kinds of possibilities that merit attention.

A. Disclosure and Transparency

As described above, disclosure provides multiple informational benefits for voters, including not only the content of the disclosures but also their quality and the amount of information provided.169See Wood, supra note 131, at 1102. Disclosure and disclaimers with respect to online political advertising would help to facilitate counterspeech and deter disinformation.170See Abby K. Wood, Facilitating Accountability for Online Political Advertisements, 16 Ohio State Tech. L.J. 520, 523–24 (2020). Disclosure would also provide listeners with the context they need to assess political advertising. That being said, the disclosure regimen in the campaign finance context is subject to various limitations, including structural barriers to connecting disclosures to voters and enforcing disclosure rules against violators.171See Jennifer A. Heerwig & Katherine Shaw, Through a Glass, Darkly: The Rhetoric and Reality of Campaign Finance Disclosure, 102 Geo. L.J. 1443, 1486, 1498 (2014). Disclosure rules have also been criticized for violating privacy, raising the risk of retaliation, chilling speech, and discouraging political participation.172See, e.g., Richard Briffault, Two Challenges for Campaign Finance Disclosure After Citizens United and Doe v. Reed, 19 Wm. & Mary Bill Rts. J. 983, 988–92, 1013–14 (2011).

Outside of the campaign finance context, online platforms could increase transparency about the content curation decisions they make. Transparency requirements are also an appropriate regulatory response to political disinformation.173See Wood, supra note 170, at 539–40. Compared to other regulatory responses, transparency laws have various benefits: they provide additional information to consumers, allow for public accountability, and nudge companies to make better decisions in anticipation of public disclosure.174See Eric Goldman, The Constitutionality of Mandating Editorial Transparency, 73 Hastings L.J. 1203, 1206 (2022). In his concurring opinion in Moody, Justice Alito remarked that the platforms are providing various disclosures under the European Union’s Digital Services Act, and that “complying with that law does not appear to have unduly burdened each platform’s speech in those countries.”175Moody v. NetChoice, LLC, 603 U.S. 707, 797–98 (2024) (Alito, J., concurring). Justice Alito further suggested that courts on remand should investigate whether such disclosures chilled the platforms’ speech.

B. False Election Speech

In general, falsehoods and lies are constitutionally protected speech.176See N.Y. Times Co. v. Sullivan, 376 U.S. 254, 279–83 (1964). As Sunstein observes, “[p]ublic officials should not be allowed to act as the truth police” because if they are empowered to “punish falsehoods, they will end up punishing dissent.”177Cass R. Sunstein, Liars: Falsehoods and Free Speech in an Age of Deception 3 (2021). There are, of course, a few narrow exceptions to the general rule that false statements are protected speech, such as, for example, regulations concerning defamation and false or misleading advertising.

The best response to false speech is not censorship but counterspeech. As the Supreme Court plurality noted in United States v. Alvarez, “[t]he remedy for speech that is false is speech that is true. This is the ordinary course in a free society.”178United States v. Alvarez, 567 U.S. 709, 727 (2012). Abby Wood observes that as a remedy for disinformation, counterspeech “fits well in the court’s ‘marketplace of ideas’ theory of the First Amendment.”179Wood, supra note 170, at 541. Lies stated by a candidate during an election campaign should likewise be addressed by the counterspeech of the candidate’s political opponent.180See Eugene Volokh, When Are Lies Constitutionally Protected?, 4 J. Free Speech L. 685, 704 (2024). That being said, counterspeech is often ineffective given the realities of echo chambers and the partisan divide in the news media.

Although restrictions on false speech are generally unconstitutional, a narrowly drawn prohibition of false election speech aimed at disenfranchising voters might survive constitutional scrutiny.181See Richard L. Hasen, Deep Fakes, Bots, and Siloed Justices: American Election Law in a “Post-Truth” World, 64 St. Louis U. L.J. 535, 548 (2020). Such a prohibition would target the mechanics of voting. Indeed, in Minnesota Voters Alliance v. Mansky, the Supreme Court indicated that false speech about when and how to vote could be banned by the government.182Minn. Voters All. v. Masky, 585 U.S. 1 (2018). The government’s compelling interest in protecting the right to vote could serve as the justification for the law. An additional consideration is that false speech about the mechanics of voting would be difficult to redress with counterspeech particularly in the few days leading up to an election.183See Volokh, supra note 180, at 707.

C.  Deepfakes and AI

Deepfake technology poses serious threats of harm to democracy, including by distorting public discourse, eroding citizens’ trust in news media, and manipulating elections.184See Chesney & Citron, supra note 72, at 1777. There have been several attempts to regulate deepfakes by the states,185See Jack Langa, Deepfakes, Real Consequences: Crafting Legislation to Combat Threats Posed by Deepfakes, 101 B.U. L. Rev. 761, 786 (2021). such as legislation in California and Texas that prohibited the use of deepfakes within a designated pre-election period.186See Yinuo Geng, Comparing “Deepfake” Regulatory Regimes in the United States, the European Union, and China, 7 Geo. L. Tech. Rev. 157, 162–63 (2023). However, deepfakes are better regulated—by both public officials and private entities—through disclosure and counterspeech rather than by outright bans.187See Sunstein, supra note 177, at 117. Disclosure requirements could, for example, label deepfakes as “altered.”188Hasen, supra note 7, at 27.

To be sure, there are real dangers to having the government determine what is true and false, which suggests that laws regulating deepfakes should be treated with caution. If platforms on their own accord institute deepfake bans, they should exempt parody, education, or art, and should provide accountability to users for any speech that is suppressed, including a meaningful opportunity to contest the decision.189See Chesney & Citron, supra note 72, at 1818.A growing challenge facing both public and private interventions, however, is that it will become increasingly difficult to detect deepfakes, particularly given the availability of generative AI.190See Communications Security Establishment, supra note 73, at 18. As the technology advances, the capacity to create deepfakes “will diffuse and democratize rapidly.”191Chesney & Citron, supra note 72, at 1762.

D. Incentives and Norms

The government can also use incentive structures to pressure platforms into making responsible choices about the democratic public sphere. For example, online platforms are protected from liability for hosting third-party content under Section 230 of the Communications Decency Act—a protection that arguably encourages platforms to moderate harmful speech and thereby perform a task that the government is not permitted to do.192See Erwin Chemerinsky & Alex Chemerinsky, The Golden Era of Free Speech, in Social Media, Freedom of Speech, and the Future of Our Democracy 92 (Lee C. Bollinger & Geoffrey R. Stone eds., 2022). Platforms may also be motivated to respond to harmful content out of a concern that the government could amend Section 230 if they fail to take action (although this eventuality is, of course, dependent on the priorities of the incumbent administration).193See Chesney & Citron, supra note 72, at 1813. The Digital Services Act promulgated by the European Union provides a more extensive regulatory model, one that is unlikely to be adopted in the U.S. It imposes several mandatory obligations on platforms, including transparency, notice-and-takedown systems, internal complaint handling systems, deplatforming, and independent auditing.194Council Regulation, 2022/2065, arts. 14, 16, 20, 23, 39, 2022 O.J. (L 277) 1 (EU).

The government could also create incentives for platforms to provide users with greater control over the content they receive. Many platforms already enable users to block or mute content they do not wish to see. However, they could take additional steps to enable users to actively moderate their own feeds.195See Bambauer, Rollins & Yesue, supra note 84, at 1069. In addition, the government could impose data interoperability requirements, thereby enabling users to easily move their data across platforms.196See Khan & Pozen, supra note 89, at 538–39. Platforms that violate users’ rights would lose followers in favor of rival platforms with healthier environments.197See id. To be sure, greater user control could also lead to greater epistemic fragmentation if users choose to avoid competing viewpoints.

Public-regarding behavior could be indirectly encouraged by such mechanisms as digital charters.198See Dawood, supra note 162, at 663–65. These public-private norm-based initiatives “identify standards, best practices, and objectives to govern the digital world.”199Id. at 663. For example, the Declaration of Electoral Integrity, an initiative between the Canadian government and the major platforms, endorsed the values of integrity, transparency, and authenticity as the pillars of a healthy political discourse.200See id. at 663–64. Another initiative, the Digital Charter, identified ten principles, including universal access; safety and security; control and consent; transparency, portability and interoperability; a level playing field; strong enforcement and real accountability.201See id. at 665. Although these norm-based approaches were not legally binding, they identified democracy-enhancing norms that could serve as a “standard by which to judge actions taken or not taken.”202Id.

E. Public Jawboning

Can public jawboning play a salutary role as a countervailance mechanism? A recent Supreme Court decision, Murthy v. Missouri,203Murthy v. Missouri, 603 U.S. 43 (2024). involves what is colloquially referred to as “jawboning,” which takes place when the government pressures private actors to take certain actions without directly using its coercive power to do so. In Murthy, the record revealed that, over the last few years, White House and other federal officials had routinely communicated with social media platforms about misinformation related to COVID-19 vaccines and electoral processes. Some of these communications were public: government officials, in response to vaccine misinformation on the platforms, opined that reforms to antitrust laws and to Section 230 of the Communications Decency Act may be in order.204See id. at 51–52. Other communications were private: officials in the White House, CDC, FBI, and CISA “regularly spoke” with platforms about misinformation over several years.205See id. at 51. The District Court for the Western District of Louisiana had issued a preliminary injunction, which was affirmed by the Fifth Circuit, on the basis that government officials had “coerced or significantly encouraged” the platforms to censor disfavored speech in violation of the First Amendment.206Missouri v. Biden, 83 F. 4th 350, 392 (5th Cir. 2023).

In a 6-3 majority opinion by Justice Barrett, the Supreme Court overturned the Fifth Circuit’s decision on standing grounds.207See Murthy, 603 U.S. at 58–62. Justice Barrett also rejected the plaintiffs’ “right to listen” theory—which asserted that the First Amendment protects the interest of social media users to engage with the content of other social media users—on the grounds that it provided a “startlingly broad” right to users to “sue over someone else’s censorship.” Id. at 74–75. Dissenting in Murthy, Justice Alito (joined by Justices Thomas and Gorsuch) asserted that the issue was whether the government engaged in “permissible persuasion” or “unconstitutional coercion.”208Id. at 98–100 (Alito, J., dissenting). While the government may inform and persuade, it is barred under the First Amendment from coercing a third party into suppressing another person’s speech.209See id. (Alito, J., dissenting) (citing Bantam Books, Inc. v. Sullivan, 372 U.S. 58, 67 (1963)). Drawing on the Court’s approach in National Rifle Association v. Vullo,210Nat’l Rifle Ass’n v. Vullo, 602 U.S. 175, 189–90 (2024). Justice Alito analyzed three factors—the authority of the government officials; the nature of the statements made by those officials; and the reactions of the third party alleged to have been coerced—to find that the government had engaged in coercion.211See id. at 100–07 (Alito, J., dissenting).

Ashutosh Bhagwat draws a helpful distinction between public jawboning and private jawboning: while public jawboning should rarely be considered coercive, in large part because government actors routinely hector corporations and often do so as part of their official responsibilities, private jawboning can sometimes amount to unconstitutional coercion.212See Ashutosh Bhagwat, The Bully Pulpit or Just Plain Bully: The Uses and Perils of Jawboning, 22 First Amend. L. Rev. 292, 306 (2024). However, “[d]etermining when private jawboning crosses the constitutional line . . . raises extremely difficult questions,” which require courts to engage in a highly contextual analysis.213Id. at 310. Justice Alito contended, for instance, that while the coercion in Murthy was “more subtle than the ham-handed censorship found to be unconstitutional in Vullo . . . it was no less coerceive.”214Murthy, 603 U.S. at 80 (Alito, J., dissenting). The danger is that if “a coercive campaign is carried out with enough sophistication, it may get by.”215Id. Ilya Somin catalogues the various ways in which government agencies post-Murthy can ensure that their pressure tactics avoid judicial scrutiny.216See Ilya Somin, The Supreme Court’s Dangerous Standing Ruling in Murthy v. Missouri, Reason.com: The Volokh Conspiracy (June 26, 2024, 5:57 PM), https://reason.com/volokh/2024/06/26/the-supreme-courts-dangerous-standing-ruling-in-murthy-v-missouri [https://perma.cc/64XB-E7FV].

Despite these legitimate concerns, there may be a role for public, but not private, jawboning to serve as a countervailing force against the power of the tech giants. Helen Norton’s “transparency principle”—namely, “an insistence that the governmental source of a message be transparent to the public”—could serve as a guide.217See Helen Norton, The Government’s Speech and the Constitution 30 (2019). As Norton observes, the “government’s speech is most valuable and least dangerous to the public when its governmental source is apparent: only then is the government’s speech open to the public’s meaningful credibility and accountability checks.”218Id. In an August 2024 letter to Congress, Mark Zuckerberg was unequivocal that Meta would no longer compromise its content standards in response to government pressure.219See Letter from Mark Zuckerburg, Founder, Chairman & CEO of Meta Platforms, Inc. to the Hon. Jim Jordan, Chairman, Comm. on the Judiciary, United States House of Reps. (Aug. 26, 2024). Indeed, Meta later announced the adoption of a new content moderation protocol that, among other things, removed restrictions on topics such as immigration and gender identity. If other platforms follow Meta’s lead, the protection (or not) of listener interests would be even more subject to the platforms’ decisions. Provided that the government’s use of public jawboning does not violate Vullo’s standards for coercion, it may prove to be a useful measure to protect users from the overwhelming power of the platforms.

F. Civil Society and the State

Civil society can also play a countervailing role. Truth-finding institutions, such as journalists and political activists, can combat false statements in an iterative process akin to the scientific method.220See Volokh, supra note 180, at 696–98. Collaborations between platforms and outside researchers could also lead to better responses for online misinformation.221See Ceren Budak, Brendan Nyhan, David M. Rothschild, Emily Thorson & Duncan J. Watts, Misunderstanding the Harms of Online Misinformation, 630 Nature 45, 45 (2024). More generally, the concept of “knowledge institutions,” as developed by Vicki Jackson, captures the indispensable contribution of public and private entities, including universities, government agencies, libraries, and the press, to the collection and dissemination of knowledge needed for democratic self-governance.222See Vicki C. Jackson, Knowledge Institutions in Constitutional Democracies: Preliminary Reflections, 7 Canadian J. Compar. & Contemp. L. 156 (2021); see also Heidi Kitrosser, Protecting Public Knowledge Producers, 4 J. Free Speech L. 473 (2023).

The state can bolster the speech environment by supporting knowledge institutions. Over the last several decades, the federal government has fostered the public sphere by enacting legislation to support newspapers, establishing a system of broadcast licenses, regulating cable, and implementing antitrust laws.223See Martha Minow, Saving the News: Why the Constitution Calls for Government Action to Preserve Freedom of Speech 42–57 (2021). With respect to the threats currently facing private news organizations, Martha Minow argues that “[n]othing in the Constitution forecloses government action to regulate concentrated economic power . . . or strengthen public and private investments in the news functions presupposed by democratic governance.”224Martha Minow, Does the First Amendment Forbid, Permit, or Require Government Support of News Industries?, in Constitutionalism and a Right to Effective Government? 86 (Vicki C. Jackson & Yasmin Dawood eds., 2022). Minow further suggests that the “First Amendment’s presumption of an existing press may even support an affirmative obligation on the government to undertake reforms and regulations to ensure the viability of a news ecosystem.”225Minow, supra note 223, at 98. Emily Bazelon proposes that federal and state governments could create publicly funded TV or radio, in addition to funding nonprofit journalism.226See Emily Bazelon, The Disinformation Dilemma, in Social Media, Freedom of Speech, and the Future of Our Democracy 41, 49 (Lee C. Bollinger & Geoffrey R. Stone eds., 2022). To be sure, the independence of news organizations must be protected by

various mechanisms so that the government cannot control the media it funds and supports.227See Minow, supra note 223, at 138–42.

Finally, community participation in regulating online platforms may also improve the speech environment. For example, Reddit is internally governed by volunteer moderators, who establish and enforce rules about what conduct is permitted or prohibited in each subcommunity.228See Ethan Zuckerman, The Case for Digital Public Infrastructure, Knight First Amend. Inst. at Colum. Univ. (Jan. 17, 2020), https://knightcolumbia.org/content/the-case-for-digital-public-infrastructure [https://perma.cc/F5EX-XTKV]. These moderators often put in “dozens of hours a week to ensure that content meets community standards and that participants understand why their content was permitted or banned.”229Id. Although Reddit is by no means perfect, it may be an example of what Aziz Huq has described as an “island of algorithmic integrity”; that is, a model of a well-functioning social media platform that acts in public-regarding ways and may thereby shift norms and expectations.230See Huq, supra note 70, at 1301–03.

Conclusion

This Article has offered a normative account of a well-functioning speech environment for speakers and listeners, under which individuals engage in three self-governing activities—informed voting; discussion and deliberation; and meaningful participation—while having their liberty, equality, epistemic, and nondomination interests satisfied. It also argued for digital exceptionalism—the idea that the expressive realm on social media platforms suffers from certain unique deficits that not only undermine the speech environment but that also pose challenges for regulation. The Article then turned to the law of public discourse, focusing on campaign finance regulation and the Moody decision, to find that First Amendment jurisprudence provides few conceptual resources to protect listeners’ equality, epistemic, and nondomination interests. Finally, the Article argued for countervailance, which is the idea that certain mechanisms could lessen the deficits of the online realm such that listener interests are better protected.

To be sure, there continues to be great uncertainty about how digital technologies will evolve over time and what new difficulties they will pose. The rapidly changing landscape of social media technology poses genuine challenges for regulation. While the Moody majority insisted that free speech principles do not change despite the challenges of applying them to evolving technology, the concurring Justices expressed reservations about how evolving algorithmic and AI technology would be covered by the First Amendment. For example, Justice Barrett queried whether there was a difference between an algorithm that did the curation on its own versus an algorithm that was directed by humans.231Moody v. NetChoice, LLC, 603 U.S. 707, 745–48 (2024) (Barrett, J., concurring). Justice Alito noted that the vast majority of the content moderation on the platforms is performed by algorithms, and now that AI algorithms are being used, the platforms may not even know why a particular content moderation decision was reached.232See id. at 793–95 (Alito, J., concurring). He asked: “Are such decisions equally expressive as the decisions made by humans? Should we at least think about this?”233Id. (Alito, J., concurring); see also Toni M. Massaro & Helen Norton, Siri-ously? Free Speech Rights and Artificial Intelligence, 110 Nw. U. L. Rev. 1169, 1174 (arguing that AI speakers should be covered by the First Amendment due to the value of their speech to humans and the risk of government suppression). It is fair to say that much work remains to be done when considering how best to protect and promote a well-functioning political speech environment.

98 S. Cal. L. Rev. 1193

Download

* Professor of Law and Political Science, and Canada Research Chair in Democracy, Constitutionalism, and Electoral Law, Faculty of Law, University of Toronto; J.D. Columbia Law School, Ph.D. (Political Science) University of Chicago. I am very grateful to Ashutosh Bhagwat, Daniel Browning, James Grimmelmann, Aziz Huq, Michael Kang, Heidi Kitrosser, Erin Miller, Helen Norton, Eugene Volokh, Abby Wood, and the participants at the Listener Interests Symposium at USC Gould School of Law and the Public Law Colloquium at Northwestern Pritzker School of Law for very helpful comments and conversations. Special thanks to David Niddam-Dent for excellent research assistance and to the editors of the Southern California Law Review for their valuable editorial work.

Listeners’ Choices Online

The most useful way to think about online speech intermediaries is structurally: a platform’s First Amendment treatment should depend on the patterns of speaker-listener connections that it enables. For any given type of platform, the ideal regulatory regime is the one that gives listeners the most effective control over the speech that they receive.

In particular, we should distinguish four functions that intermediaries can play: (1) broadcast, such as radio and television, transmits speech from one speaker to a large and undifferentiated group of listeners, who receive the speech automatically; (2) delivery, such as telephone, email, and broadband Internet, transmits speech from a single speaker to a single listener of the speaker’s choosing; (3) hosting, such as YouTube and Medium, allows an individual speaker to make their speech available to any listeners who seek it out; and (4) selection, such as search engines and feed recommendation algorithms, gives listeners suggestions about speech they might want to receive. Broadcast is relevant mostly as a (poor) historical analogue, but delivery, hosting, and selection are all fundamental on the Internet.

On the one hand, delivery and hosting intermediaries can sometimes be subject to access rules designed to give speakers the ability to use their platforms to reach listeners because doing so gives listeners more choices among speech. On the other hand, access rules are somewhere between counterproductive and nonsensical when applied to selection intermediaries because listeners rely on them precisely to make distinctions among competing speakers. Because speakers can use delivery media to target unwilling listeners, they can be subject to filtering rules designed to allow listeners to avoid unwanted speech. Hosting media, however, mostly do not face the same problem, because listeners are already able to decide which content to request. Selection media, for their part, are what enable listeners to make these filtering decisions about speech for themselves.

Introduction

This is an essay about listeners, the Internet, and the First Amendment. In it, I will argue that the most useful way to think about online speech intermediaries is structurally: a platform’s First Amendment treatment should depend on the patterns of speaker-listener connections that it enables. For any given type of platform, the ideal First Amendment regime is the one that gives listeners the most effective control over the speech that they receive.

This essay does not stand alone. In a previous article, Listeners’ Choices, I outlined a two-part theory of the First Amendment based on recognizing listeners’ choices about what speech to hear.1James Grimmelmann, Listeners’ Choices, 90 U. Colo. L. Rev. 365, 366–67 (2019). First, any free-speech principle that does not take listeners’ choices seriously is self-defeating. In a world where speakers pervasively compete for listeners’ attention—which is to say, in our world—listeners’ choices provide the only normatively appealing way to resolve the inevitable conflicts among speakers. Second, existing First Amendment doctrine regularly defers to listeners’ choices. Many cases that are seemingly about speakers’ rights snap into focus as soon as we pay attention to which listeners are willing and which listeners are not. Listeners’ choices among speakers are typically content- and viewpoint-based, but a legal rule that defers to those choices can be content-neutral.

The theory I presented in Listeners’ Choices was skeletal. Here, my purpose is to flesh out the listeners’-choice principle so that it does useful doctrinal and policy work in our modern media environment. I will analyze the role of listeners’ choices in four structurally different functions that media intermediaries can carry out:

  • Intermediaries carrying out a broadcast function, such as radio and television, connect one speaker to a large and undifferentiated group of listeners who receive the speech automatically;
  • Intermediaries carrying out a delivery function, such as telephone, email, and broadband Internet, transmit speech from a single speaker to a single listener of the speaker’s choosing;
  • Intermediaries carrying out a hosting function, such as YouTube and Medium, allow an individual speaker to make their speech available to any listeners who seek it out; and
  • Intermediaries carrying out a selection function, including search engines and feed recommendation algorithms, give listeners suggestions about speech they might want to receive.

Notice that I refer to distinct “functions,” because media and intermediaries are not monolithic. There is no set of First Amendment rules for “the Internet,” nor can there be. The Internet is too vast and variegated for that to work. Distinguishing among broadcast, delivery, hosting, and selection helps us see that these functions can be disaggregated. On the Internet, we are accustomed to thinking of hosting and selection as intertwined; the term “content moderation” encompasses them both. But they do not necessarily need to be: YouTube the hosting platform and YouTube the search engine are different and could be subjected to different legal rules.

The original sin of broadcast was that it inextricably combined selection and delivery into a single take-it-or-leave-it package, in a way that was uniquely disempowering to listeners. Bandwidth limitations mean that broadcast media present listeners with a limited array of speakers to choose among. And the fact that listeners receive broadcast speech as a group, rather than individually, means that it is hard to protect unwilling listeners from that speech without blocking willing listeners’ ability to receive it. The result is a body of doctrine and theory that purports to act in listeners’ interest but is primarily concerned with allocating scarce bandwidth among competing speakers.

In contrast, listeners can be far more empowered on the Internet than they were offline. Delivery, hosting, and selection are all more listener-friendly than broadcast. The individually targeted nature of delivery media means that media intermediaries can block unwanted communications to unwilling listeners without offending core free-speech values. The pinched kinds of choices that broadcast media needed to make among competing speakers were a poor proxy for the much broader kinds of choices that listeners can make for themselves on hosting media. And the recommendations that selection media provide to help listeners choose among competing speakers are fundamentally oriented towards facilitating listeners’ autonomy, not speakers’.

Turning to the specifics of how these different kinds of media should be regulated, there are two structurally different kinds of legal rules that can apply to them:

  • Access rules ensure that speakers are able to use a medium, even when an intermediary would prefer to exclude them.2 Access rules for listeners raise harder issues because speakers can have associational, privacy, and economic interests in restricting the audience for a communication to exclude willing listeners. An activist organizer’s mailing list might exclude political opponents; a copyright owner’s catalog might have a paywall with different prices for hobbyist and professional subscribers. A communications platform’s access policies for listeners are often inextricably bound up with speakers’ preferences about their audiences. These are subtle questions, and I do not discuss them in this essay.
  • Filtering rules ensure that listeners are able to avoid unwanted speech, even when speakers would prefer to subject them to it. Sometimes they empower an intermediary to reject that speech on behalf of listeners (i.e., they are the opposite of access rules), but sometimes they require speakers and intermediaries to structure their communications in a way that enables listeners themselves to reject the speech.

From a speaker’s point of view, access rules look like they promote free speech and filtering rules look like they inhibit it. But from a listener’s point of view, both types of rules can promote the values of the First Amendment.

For access rules, the key distinction is between rival and non-rival media. Delivery and hosting can be non-rival on the Internet, where bandwidth is immense and can be expanded as needed. Speakers who use delivery and hosting media mostly do not interfere with each other, and so an intermediary can treat most speakers identically. But selection is fundamentally rival: listeners rely on these intermediaries to help them distinguish among speakers, and so selection intermediaries must favor some speakers and disfavor others. As a result, delivery and hosting intermediaries can often be subjected to access rules requiring even-handed treatment of all interested speakers, but the First Amendment mostly forbids imposing access rules on selection intermediaries.

For filtering rules, the key distinction is that delivery situates the relevant choices among speaker-listener pairings upstream (closer to speakers) while hosting situates those choices downstream (closer to listeners). When listeners can make their own choices among speech (as on hosting intermediaries), filtering rules—whether imposed by intermediaries or by the legal system—have the effect of thwarting those choices. However, when speakers make those choices in the first instance (as on delivery intermediaries), sometimes filtering rules are necessary to empower listeners to make choices for themselves. Selection media, for their part, provide listeners the information they need to choose which content on hosting media to request, and which content on delivery media to receive.

In part, this essay is a love letter to selection media, written on behalf of listeners. Selection media play an utterly necessary role in an environment of extreme informational abundance, and they can be more responsive to listeners’ informational choices and needs than any other form of media.3This is a generalization of a point I have been making for decades about search engines. See, generally James Grimmelmann, Don’t Censor Search, 117 Yale L.J. Pocket Pt. 48 (2007); James Grimmelmann, The Structure of Search Engine Law, 93 Iowa L. Rev. 1 (2007); James Grimmelmann, Information Policy for the Library of Babel, 3 J. Bus. & Tech. L. 29 (2008); James Grimmelmann, The Google Dilemma, 53 N.Y. L. Sch. L. Rev. 939 (2009); James Grimmelmann, Speech Engines, 98 Minn. L. Rev. 868 (2014) [hereinafter Grimmelmann, Speech Engines]. Access rules are often nonsensical when applied to them, and filtering rules must be applied with care, lest they trample on the filtering work that selection media are already doing.4See James Grimmelmann, Some Skepticism About Search Neutrality, in The Next Digital Decade: Essays on the Future of the Internet 435, 439–42 (Berin Szoka & Adam Marcus eds., 2010).

But the fact that selection media are often listener-friendly does not mean that they always are. I have argued previously that search engines can be regulated when they behave disloyally or dishonestly towards their users,5Grimmelmann, Speech Engines, supra note 3. and the same goes for selection media. More generally, I will argue here that structural regulation of selection media is often appropriate. For example, an intermediary could be forced to disaggregate its hosting and selection functions; the former can—and sometimes should­—be regulated in ways that the latter cannot. Indeed, an intermediary might need to open its delivery or delivery platform up to competing selection intermediaries (so-called “middleware”) to give listeners broader and freer choice over the speech they receive.

Finally, a note on scope. This is an essay about intermediaries, not an essay about all forms of media. I am focusing on intermediaries’ roles in carrying third-party speech from speakers to listeners, not on their own first-party speech that they want to share with listeners. Different structural and First Amendment considerations apply to first-party speech. I will argue in places that solicitude for intermediaries’ speech interests should not prevent us from regulating them in ways that promote listeners’ speech interests. But this is not primarily an essay about intermediaries’ speech itself.6See generally Stuart Minor Benjamin, Transmitting, Editing, and Communicating: Determining What ‘The Freedom of Speech’ Encompasses, 60 Duke L.J. 1673 (2011) (discussing whether and when the First Amendment encompasses transmission of speech by intermediaries).

This essay has four substantive Parts. Part I provides a short review of the argument from Listeners’ Choices and can be skipped if you are familiar with it. Part II describes the structural differences among broadcast, delivery, hosting, and selection media, and explains how they relate to each other. Part III considers how access rules play out in these four types of media, and Part IV does the same for filtering rules. As we will see, the appropriate legal treatment of these different kinds of intermediaries and rules falls out naturally. First Amendment doctrine becomes radically simpler when we carve up media at their joints.

I. Listeners’ Choices: A Review

The starting point of Listeners’ Choices is that we can think about speech as a matching problem: in an environment where billions of people speak and billions of people listen, who speaks to whom? This way of thinking about speech is mostly content-neutral: it focuses on the network structure of connections between speakers and listeners, rather than on the content of the speech they exchange over those connections. I called an actual arrangement of speakers and listeners a “matching” to emphasize its mutuality and the fact that it is a collective property of speakers and listeners overall.

The possible structures of speaker-listener matching are shaped by two things: choices and scarcities. Regarding the former, speakers make choices about what to say and how; regarding the latter, listeners make choices about what to listen to and how. Not all their choices can be simultaneously honored, but the heart of this way of thinking about free speech is that speakers and listeners make choices among each other, and that these choices are in large part constitutive of the values that free expression serves. They are subjective, individual, and profoundly content- and viewpoint-based. Some conflicts among speakers’ and listeners’ choices arise simply from their diverging values and goals; I called these conflicts “internal” limits on possible speaker-listener matchings.

As for scarcities, another class of limits on speaker-listener matchings are what I called “structural” limits: some combinations of who speaks to whom are physically or practically impossible. In particular, three types of scarcity shape the patterns of speech everywhere and always: bandwidth, attention, and ignorance. Bandwidth limits, such as the limited range of the human voice or the limited number of very high frequency (“VHF”) television channels, restrict the ability of speakers’ messages even to reach listeners. Attention limits are hard-wired into human anatomy and psychology. Although speech consists of information, which is potentially infinitely replicable, each person can only pay attention to one or a few speakers at a time. Finally, ignorance about the content of speech can lead people to make choices about what to listen to—choices that would not have made if they were fully aware of what the speech would be.

The upshot of having these scarcities is that listeners’ choices among competing speakers provide a compelling way to decide among competing speech claims. Listeners’ choices are valuable in themselves because listening is an indispensable part of any communication, and listeners’ choices should be elevated over speakers’ choices because of the scarcity of attention; the capacity to listen is limited in a way that the capacity to speak is not. In order to tune into a preferred speaker, a listener must be able to tune out other speakers, and a speech environment in which listeners cannot do so is one in which effective speech is impossible. From this general point, a few specific observations follow.

First, in one-to-many cases of conflicts between willing and unwilling listeners, willing listeners generally prevail. The “Fuck the Draft” jacket in Cohen v. California7Cohen v. California, 403 U.S. 15, 16 (1971). and the drive-in movie screen in Erznoznik v. Jacksonville8Erznoznik v. Jacksonville, 422 U.S. 205, 206 (1975). were seen by both willing and unwilling viewers. To censor these forms of expression at the insistence of the unwilling ones would deprive the willing ones of speech they were willing (and in Erznoznik, affirmatively choosing) to see. The unwilling ones are expected to avert their eyes or change the channel. This looks like a preference for speakers’ right of expression as against unwilling listeners, but really it is a preference for willing listeners over unwilling ones.

Second, in true one-to-one cases where a speaker addresses a single unwilling listener, the analysis is far less speaker-friendly. The Supreme Court has affirmed homeowners’ rights to literally and figuratively shut their doors to unwanted solicitors9Martin v. City of Struthers, 319 U.S. 141, 150 (1943). and mail.10Rowan v. U.S. Post Off. Dep’t, 397 U.S. 728, 736–37 (1970). A general ordinance prohibiting Jehovah’s Witnesses from going door-to-door11See Martin, 319 U.S. at 142. or prohibiting the mailing of communist literature would be unconstitutional,12Lamont v. Postmaster Gen., 381 U.S. 301, 307 (1965). because of the presence of potentially willing listeners among the audience. That concern drops away when the speaker can stop attempting to communicate with individual listeners who specifically object while still reaching those who do not. Listeners can choose not to pay attention, and speakers who attempt to overcome listeners’ defenses (for example, with amplified sound trucks) can be barred from doing so.13Kovacs v. Cooper, 336 U.S. 77, 89 (1949). The caselaw here is rich and context-sensitive; a rule that listeners always win would be as wrong as a rule that speakers always win. Instead, the cases grapple with the interests of speakers, willing listeners, unwilling listeners, and—importantly—undecided listeners, who cannot decide whether they want to hear what the speaker has to say unless the speaker at least has an initial chance to ask.14See, e.g., McCullen v. Coakley, 573 U.S. 464, 489 (2014) (holding that a state law establishing six-foot buffer zone around people entering abortion facilities interfered with the right of anti-abortion advocates to engage in “consensual conversations” with people seeking abortions (emphasis added)).

Third, the general problem of sorting listeners into the willing and the unwilling involves what I call “separation costs”: the effort that willing listeners must take to hear, or that unwilling listeners must take to avoid hearing, or that speakers must take to distinguish between the two, or some combination of the above. The scale and distribution of separation costs can vary greatly based on the technological environment. I argue that the legal system, in a very rough way, seeks out the least-cost-avoider of speech conflicts: when a party can take a simple and inexpensive action to resolve the conflict, the law often expects them to do so.

II. Four Media Functions

This Part reviews the structural differences among the four media functions: broadcast, delivery, hosting, and selection. Along with some examples of each type, I discuss the ways in which each of them is one-to-one or one-to-many.15Eugene Volokh, One-to-One Speech vs. One-to-Many Speech, Criminal Harassment Laws, and “Cyberstalking”, 107 Nw. U. L. Rev. 731 (2013). I defer discussion of scarcity and bandwidth constraints to the next Part, as these issues bear heavily on access rules.

A. Broadcast

Start with the wired and wireless mass media that dominated most of the twentieth century: radio, broadcast television, satellite television, and cable. These mass media are characterized by their extensive reach: they enabled a single speaker to reach a large potential audience of listeners. They are, in Eugene Volokh’s taxonomy, one-to-many media.

 

To be clear, broadcast media collectively enable numerous speakers to reach large audiences; there are many TV stations, and each station broadcasts many different programs. Instead, when I say that broadcast is one-to-many, I mean that each individual speaker reaches a large and undifferentiated audience. Broadcast aggregates numerous such one-to-many communications, dividing them up by time (for example, WNBC-TV broadcasts the news at 7:00 and Access Hollywood at 7:30) and by intermediary (WNBC-TV and WABC-TV both broadcast their respective news programs at 7:00). The structural point is that WNBC-TV can only broadcast a single program at a time—such as Access Hollywood at 7:30—and when it does, it enables a one-to-many communication from Access Hollywood to its viewers.

B. Delivery

Next, consider delivery media like mail, telegraph, telephone, email, direct messaging, and Internet service. They all transmit speech from an individual speaker to an individual listener selected by the speaker, making them one-to-one media.16Id. at 742. More precisely, they are one-to-one with respect to individual communications from speaker to listener. In aggregate, they are many-to-many. The postal service delivers millions of letters, but each letter goes from a single sender to a single recipient. Delivery is therefore a kind of disaggregated broadcast: instead of sending joint communication to all listeners at once, individual communications are sent to individual listeners at the speaker’s request.

Most delivery media use some form of medium-specific addresses for a sender to specify their chosen recipient. A letter goes to a specific postal address; a telephone call to a specific telephone number; an email to a specific email address; an Internet Protocol (“IP”) datagram to a specific IP address; and so on. A speaker can choose to send the same message to many listeners by sending many individual communications to different addresses. Conversely, by having an address, a listener makes themselves reachable by speakers and then can receive a mostly undifferentiated stream of communications from any speaker who wants to reach them.

Some delivery media—such as telephone and direct messaging—are interactive, but it still makes sense to talk of “the speaker” and “the listener.” First, at the beginning of a conversation, one user is trying to establish a connection with another: the phone rings, or an email appears in the inbox. The user trying to establish the connection is the one who chose to initiate the communication, chose when to do it, and most importantly, chose with whom to establish it. They are a speaker, and if the other user agrees, they receive the message and become a listener. Second, what we think of as “interactive” media are really bidirectional media. A telephone connection is “full duplex”: it requires two speech channels, one in each direction. The same is true for a Zoom call, an email conversation, or anything else that travels on the Internet. These interactive exchanges are made up of individual IP datagrams, each traveling from a sender to a recipient identified by IP address. Third, all delivery media are interactive on a long-enough time scale. Pen pals exchange letters, trading off the roles of speaker and listener. Each letter is still a discrete one-to-one communication carried by the postal service; mail is still a delivery medium.

C.  Hosting

A third category of Internet media consists of hosting platforms. Third-party speakers send content to these intermediaries, which make the content available to listeners on request. For example, an artist uploads illustrations from her portfolio of work to a Squarespace site and individual fans visit the site to view the illustrations.

Other examples of hosting intermediaries include (1) bulk storage like Google Drive and Amazon S3; (2) content-delivery networks (“CDNs”) like Akamai and Cloudflare; (3) hosting functions of social-media platforms like YouTube and X; and (4) web-based self-publishing features of platforms like Medium and Substack. Structurally, online marketplaces are also hosting services as long as they (a) sell digital content instead of physical goods or services, and (b) feature speaker-submitted third-party content. Examples include App Stores by Apple and Google, e-book stores by Barnes & Noble and Amazon, video game stores by Steam and Epic, and even Spotify as a distributor of podcasts and music.

Hosting is the mirror image of delivery. Both are one-to-one media; each individual communication goes from a single speaker to a single listener. The difference is that in delivery media, the speaker selects which listeners to speak to; in hosting media, the listener selects which speakers to listen to. Although hosting is usually thought of as a service offered by platforms to speakers, the listener’s request plays a crucial role in the process. Hosting is also a kind of disaggregated broadcast: instead of sending a joint communication to all listeners at once, individual communications are sent to individual listeners, this time at the listener’s request.

Hosting and delivery functions are often used in conjunction. A website host, for example, responds to a user’s request for a particular URL by sending a response with the contents of the page at that address. The request and the response are both made using delivery media—the Internet service providers (“ISPs”) along the delivery path between the host and the user. (So, for that matter, is the transmission from speaker to the website host with the content the speaker wants to make available, and so is the website host’s acknowledgement that it has received the content.) But the host’s own activities—its responses to listeners’ requests for content—have the listener-selected nature of hosting, not the speaker-selected nature of delivery.

Some intermediaries offer both hosting and delivery. Substack is a good example: each post is both made available on Substack’s website and also mailed out to newsletter subscribers. Substack is a hosting service for listeners who read the post on the website, but it is a delivery service for listeners who read the post in their email inbox. Sometimes the distinction is irrelevant, but sometimes it matters. Substack allows newsletter authors to import a mailing list of subscribers, so it is not safe to assume that everyone who receives a Substack delivery has consented to it. For a user who objects to newsletter spam, Substack is a delivery intermediary, not a hosting intermediary.

Like delivery, hosting can be aggregated into a one-to-many medium. Indeed, this is typically the default on the Internet. Unless a host affirmatively restricts which listeners have access to a speaker’s content—for example, with a list of subscribers to a paywalled publication—anyone with an Internet connection can access it, and it is far easier to leave access unrestricted than to impose selective restrictions. Thus, from a speaker’s perspective, hosting can function like broadcast in that it allows a speaker to reach an indeterminately large audience with a single act of publication.

D. Selection

Finally, consider the selection function of some media, which consists of recommending some content for users. Selection media include general search engines that index third-party sites, such as Google, Bing, Kagi, and DuckDuckGo, as well as site-specific search engines that index the content on a specific platform such as the search bars built into YouTube, TikTok, and X. They also include recommendation engines that may provide personalized results not explicitly tied to a user query, such as the feed algorithms on Facebook and TikTok or the watch-next suggestions on YouTube. The key feature of a selection platform is that it tells users about content, which they can then consume in full if they want.

Selection media are not strictly one-to-one or one-to-many in the same way that broadcast, delivery, and hosting are; they do not by themselves carry content from speakers to listeners. Instead, it is helpful to think of selection media as being many-to-one because they help individual listeners choose speech from a large variety of speakers. They turn an overwhelming volume of available content into a much smaller number of selections or recommendations that a listener can meaningfully experience, and they do so in ways that can be individuated for each specific listener.

Selection media are hardly new, but two features of the Internet make selection media particularly important online. First, the sheer scale of the Internet makes selection an absolute necessity. There is far more content on the Internet, or even on social-media platforms and not-especially large websites, than any one user can plausibly engage with. The shift from bandwidth to attention as the most salient bottleneck makes selection a crucial site of contestation.

Second, the Internet has often enabled selection to be disaggregated from delivery and hosting. The selection function of a television channel is obvious: because it can transmit so little compared with what it might, the choice of what to transmit does most of the work of selection. However, YouTube is both a content host and a content recommender: it can host a video without ever recommending that video to anyone. It is the difference between an album (selection bundled with hosting) and a playlist (selection by itself). This point cuts both ways—distinguishing the two functions takes some First Amendment pressure off of hosting, but piles more onto selection.

III.  Access

A. Scarcity

One of the fundamental structural constraints on choices about speech is scarcity: limits on the number of communications that a given medium, or an intermediary using that medium, can carry. Scarcity forces choices among speakers to be made upstream by the intermediary or by regulators allocating the medium among speakers and intermediaries. In contrast, non-scarce media allow choices among speakers to be made downstream by listeners themselves. Unsurprisingly, there is a long history of scarcity arguments in telecommunications policy.

The standard story, as reflected in caselaw, points to the scarcity of broadcast spectrum as a justification for regulation. First, the available spectrum needs to be allocated to different users to prevent chaos and interference. Then, once it has been handed out, these users can be required to carry a reasonable diversity of speakers so that the intermediaries do not have undue power over speech. The usual citation for this form of argument is Red Lion Broadcasting Co. v. FCC, which used scarcity arguments to uphold the FCC’s fairness doctrine.17Red Lion Broad. Co. v. FCC, 395 U.S. 367, 400–01 (1969).

In contrast, other media are not thought of as scarce in the same way. There is room for many simultaneous speakers, which means there is no need for regulatory intervention. Intermediaries themselves can choose which speakers to carry, and there is less risk of having a handful of powerful intermediaries entirely control the speech environment. The usual citation for this form of argument is Miami Herald Publishing Co. v. Tornillo, which declined to extend Red Lion to newspapers.18Mia. Herald Publ’g Co. v. Tornillo, 418 U.S. 241, 257–58 (1974).

Instead, the Supreme Court upheld newspapers’ First Amendment right to pick and choose what content they print.

Thus, goes the story, there is a spectrum from scarce media, like broadcast, to non-scarce media, like newspapers. The scarcer the medium, the more regulable it is. Other media fall somewhere in between. Cable television, for example, can carry a limited number of channels, but typically more than broadcast can. Thus, the scarcity rationale for regulating cable exists, but is weaker than for regulating broadcast. This tracks with the regulatory regime: cable operators are required to set aside some of their channels for local broadcasters and public-access channels, but cable channels are not regulated for content. It also tracks with judicial treatment: the Supreme Court held 5-4 that this regulatory regime was constitutional in Turner Broadcasting System, Inc. v. FCC, almost exactly halfway in between the 9-0 decisions in Red Lion and Miami Herald.19Turner Broad. Sys., Inc. v. FCC, 520 U.S. 180 (1997).

There are two problems with this story. The first is that it does not obviously explain why there are some media—such as telephone—that are even more regulated than broadcast. The telephone network has much higher capacity than broadcast does (it can carry millions of simultaneous conversations), but it is subject to a strict common-carriage regime. A naive scarcity argument would suggest the exact opposite: that because telephone capacity is effectively unlimited, there is no need for regulation.

The second problem is that even in cases that rely on scarcity arguments, those arguments do not always cut in the direction one would expect. In Miami Herald, it was the newspaper arguing that its editorial space was scarce—in the Supreme Court’s words, that it could not engage in “infinite expansion of its column space.”20Mia. Herald, 418 U.S. at 257. The Supreme Court accepted this argument as a rationale to uphold the newspaper’s First Amendment right to reject unwanted content—the exact opposite of what a naive scarcity argument would suggest.

The way out of these paradoxes is to recognize that there are two dimensions to scarcity. On one hand, there is what I call bandwidth scarcity: the limits on any one intermediary’s ability to carry the speech of multiple speakers. On the other hand, there is what I call entry scarcity: the limits on the number of intermediaries who can operate simultaneously. Entry scarcity cuts in favor of regulation: an intermediary is in a position to control who gets to speak, unconstrained by market forces and the threat of competition. But bandwidth scarcity cuts against regulation: it means that the intermediary necessarily exercises editorial judgment over which speakers have access, and it rules out simple common-carriage regimes that treat all

speakers equally. It is the interplay between these two distinct forms of scarcity that determines whether a medium is regulable.

In particular, mapping the two dimensions of scarcity in a two-by-two diagram reveals the underlying pattern of scarcity arguments:

  • In the top-right quadrant are print media, which are moderately bandwidth-scarce (it is possible to add pages to a newspaper or book, but at some expense and only by modifying its physical layout) and mostly not entry-scarce (physical printing is a commodity business). Thus, both scarcity considerations cut against regulation: there is no physical or economic need to allocate a limited ability to print among competing speakers, and imposing access rules comes at a real cost to a publisher’s ability to print the content it wants. Indeed, as Miami Herald illustrates, the Supreme Court’s solicitude for intermediaries’ speech is at its zenith here.
  • In the bottom-left quadrant are the classic common carriers. They are entry-scarce (the costs of running a second telephone network to every home were prohibitive), but they are not particularly bandwidth-scarce (carrying one more conversation or letter is a trivial burden for the phone network or the mails). Indeed, these are typically the most regulated communications intermediaries.
  • In the top-left quadrant are broadcast media. They are both entry-scarce (only thirteen VHF channels were allocated, and the practical number that could operate in any given area was invariably smaller) and bandwidth-scarce (each VHF television channel had 6 megahertz to carry a 525-line video signal at 30 frames per second). They are off-axis: their entry scarcity cuts in favor of regulation, but their bandwidth scarcity cuts against it. This is why they have historically been required to carry some diversity of content, but never with full common-carriage rules. They are more regulable than print, but less regulable than common-carriage networks.
  • In the bottom-right quadrant are media that are neither entry-scarce nor bandwidth-scarce. This is also an off-axis combination, but it is the opposite of the situation with broadcast, where access rules were both necessary (to give disfavored speakers access) and costly (because doing so comes at the cost of other speech the broadcasters could have carried). Here, access rules do not have a speech cost: giving additional speakers the ability to use an intermediary does not require the intermediary to drop other speakers to make room. However, it is also not clear whether these rules are necessary in the first place, because ordinary market forces would likely suffice to provide all speakers with the ability to speak.

As we will see, this two-dimensional framing of scarcity is quite helpful in situating the speech claims for and against access to the four types of intermediaries discussed in this essay: broadcast, delivery, hosting, and selection. Entry scarcity provides the justification for access rules to ensure listeners the widest possible range of choices among speakers without artificial limits imposed by incumbent intermediaries. However, bandwidth scarcity, when it exists, bespeaks caution: access rules come at their own sharp cost, limiting intermediaries’ ability to select the speech they think their listeners will most appreciate the ability to choose among. Thus, as we will see, hosting and delivery media (which are not bandwidth-scarce) may appropriately be the subject of common-carriage regulation where there are real issues of entry scarcity. However, selection media (which are intrinsically bandwidth-scarce) mostly should not be the subject of regulation regardless of entry scarcity.

I should note that there are competing definitions of “scarcity,” and my intention is to be agnostic among them. At different times and places, scarcity has been used to describe physical constraints (such as the laws of physics that govern electromagnetic interference), economic constraints (such as the cost of building out the infrastructure to run a telephone network), and regulatory constraints (such as limits on the number of cable franchises that will be awarded in a geographic area). Some commentators use scarcity narrowly to include only physical constraints; others use it broadly to include economic and regulatory constraints. These varying uses often reflect different beliefs about what kinds of regulations are appropriate for scarce media.21See generally Richard R. John, Sound Policy: How the Federal Communications Commission Worked in the Age of Radio (2025) (unpublished manuscript) (on file with author) (discussing these debates in the early years of the FCC). My argument here is modular with respect to the definition of scarcity in use. If you, according to your preferred definition, believe that a medium is entry-scarce but not bandwidth-scarce, I hope you will agree with my arguments for why common carriage might be an appropriate regulatory regime.

With these observations about scarcity in mind, we can turn to how access rules play out for different types of media. The focus throughout will be on how different rules increase or limit the choices available to listeners.

B. Broadcast

Twentieth-century broadcast media had highly limited capacity and were both bandwidth- and entry-scarce. These limits were primarily physical and technological and secondarily economic and regulatory. The available techniques for modulating an audio or audiovisual signal into one that could be transmitted through the atmosphere (radio, television, and satellite) or through wires (cable) allowed only a small number of such signals to be transmitted simultaneously in any geographic region. This number expanded over time with developments in telecommunications engineering: from AM to FM radio broadcasting; from VHF (very high frequency) to UHF (ultra high frequency) television broadcasting; from coaxial to fiber-optic cables; and so on. The basic structure remained the same: a fixed, finite menu of channels transmitted simultaneously to all potential listeners.

In such a setting, speaker-listener matching arises from a two-stage process. First, a few speakers are chosen to have access to the available channels, and then each listener chooses from the speech that speakers make available on those channels. In the United States, the first-stage choice among speakers was (and is) made by the operator of the physical infrastructure—the transmitting equipment or physical cable network—subject to some regulatory limits. The second-stage choice was (and is) made by individuals: members of the public with appropriate receiving apparatus (restricted in some cases, such as cable and satellite, who have subscribed to the operator’s service). The phrase most commonly used to describe this second-stage choice—changing the “channel”—reflects the way in which the technological constraints of twentieth-century broadcast funneled speech into a small and finite number of options.

Consider a speaker who is denied access to a channel, or who receives less access than they want, or who is limited in how they are allowed to use it, or who is charged more than they want for their access. In each case, they are obviously aggrieved. It is harder, however, from a purely speaker-centric position to explain why they have been wronged. The challenge—and this is a recurring challenge for speaker-centric analyses—is the problem of symmetry among speakers. It is one thing to say that the lucky speaker who receives access is better off than the unlucky speaker who does not, but it is quite another to make them change places. Doing so simply swaps the problem of the network operator picking winners and losers with the problem of the government picking winners and losers. To give A access and deny it to B amounts to preferring A’s speech to B’s, and on most theories of free speech, this preference is an awkward one for the government to engage in.

Instead, rationales for broadcast content regulation tend to rely on the needs of listeners, rather than speakers. As many scholars have noted,22E.g., David A. Strauss, Rights and the System of Freedom of Expression, 1993 U. Chi. Legal F. 197, 202 (1993). this is the upshot of Alexander Meiklejohn’s famous phrase, “What is essential is not that everyone shall speak, but that everything worth saying shall be said.”23Alexander Meiklejohn, Free Speech and Its Relation to Self-Government 25 (1948). The basic idea of this regulatory paradigm is to give listeners either high-quality content, a wide range of options of content, or both—on the assumption that speakers and broadcasters, left to their own devices, will provide neither. As the Supreme Court put it in Red Lion’s famous phrasing, “It is the right of the viewers and listeners, not the right of the broadcasters, which is paramount.”24Red Lion Broad. Co. v. FCC, 395 U.S. 367, 390 (1969).

Ringing rhetoric aside, it is hard to find actual listeners in the resulting regulatory regime. In an environment of severe bandwidth constraints, it is impossible to solicit and honor all individual listeners’ choices; there are never enough channels to give each member of the audience what they personally want. Instead, they make their desires known only collectively and statistically by tuning in to channels and by paying for those channels or for the things advertised on them. Thus, as the long-running theme in media criticism goes, broadcast was a “vast wasteland” of boring, mediocre, and fundamentally majoritarian content.25Newton N. Minow, Television and the Public Interest, 55 Fed. Commc’n L.J. 395, 398 (2003) (reprinting Minow’s speech on May 9, 1961, before the National Association of Broadcasters). The larger the mass audience, the lower the common denominator.26See C. Edwin Baker, Media, Markets, and Democracy (2002) (arguing that mass media tend towards popular content to the exclusion of content of interest to smaller communities).

Consider some of the most notable examples of broadcast access regulations: the Mayflower doctrine27Mayflower Broad. Corp., 8 F.C.C. 333, 339–40 (1941). and its successor the fairness doctrine,28Rep. on Editorializing by Broadcast Licensees, 13 F.C.C. 1246, 1253 (1949). the right of reply,29Pers. Attacks; Pol. Eds., 32 Fed. Reg. 10303 (July 13, 1967); Red Lion Broad., 395 U.S. at 367 (upholding the constitutionality of the FCC’s right of reply rules). and the equal-time rule.3047 U.S.C. § 315. None of these were concerned with any specific listeners’ choices among speakers. Instead, they were all attempts to provide for listeners’ interests generically—by anticipating what groups of hypothetical listeners might want or need.

The few occasions on which broadcast media regulations have attempted to take account of actual listeners’ choices when setting access rules only show how hard it is to do so. The most striking example is format regulation. For years, the FCC interpreted the Communications Act of 1934’s requirement that broadcast licensees serve the “public convenience, interest, or necessity” to mean that it should consider stations’ formats in its licensing procedures.31Id. § 303. It would deny approval for new pop-music radio licenses, for example, if it felt that an existing market was adequately served by the radio stations already licensed to operate in the area.32Citizens Comm. to Pres. the Present Programming of the Voice of the Arts in Atlanta on WGKA-FM v. FCC, 436 F.2d 263, 270 (D.C. Cir. 1970). Indeed, a licensee seeking permission to change formats was required to petition the FCC for approval.33See Hartford Commc’ns Comm. v. FCC, 467 F.2d 408, 411–12 (D.C. Cir. 1972). These rules have long since gone by the wayside. The FCC now takes the position that broadcasters have a First Amendment right to broadcast any content format they want. In FCC v. WNCN Listeners Guild, the Supreme Court upheld the FCC’s policy decision not to consider formats in licensing renewal and transfer proceedings. 450 U.S. 582, 595–96 (1981).

Format regulation was in theory a listener-based system, but the FCC seemed genuinely flummoxed when actual listeners showed up in licensing procedures demanding a voice in the first-stage choices of who got access to the airwaves and on what terms. In Office of Communication of United Church of Christ v. FCC, a group of civil-rights activists attempted to intervene in a license-renewal proceeding before the FCC, alleging that WLBT in Jackson, Mississippi had aired only pro-segregation viewpoints.34Off. of Commc’n of United Church of Christ v. FCC, 359 F.2d 994, 997–98 (1966). The FCC denied their request, arguing that these “representatives of the listening public”35Id. at 997. could “assert no greater interest or claim of injury than members of the general public.”36Id. at 999. The D.C. Circuit reversed and remanded for an evidentiary hearing, as listeners were “most directly concerned with and intimately affected by the performance of a licensee.”37Id. at 1002.

There followed a string of cases in which the FCC and the D.C. Circuit struggled with how to actually take listeners’ views into account.38E.g., Citizens Comm. to Pres. the Present Programming of the Voice of the Arts in Atlanta on WGKA-FM v. FCC, 436 F.2d 263, 270 (D.C. Cir. 1970); Hartford Commc’ns Comm. v. FCC, 467 F.2d 408, 414 (D.C. Cir. 1972); Lakewood Broad. Serv., Inc. v. FCC, 478 F.2d 919, 924 (D.C. Cir. 1973); Citizens Comm. to Keep Progressive Rock v. FCC, 478 F.2d 926, 929 (D.C. Cir. 1973). In Citizens Committee to Keep Progressive Rock v. FCC, for example, WGLN in Sylvania, Ohio, switched to an all-prog-rock format in late 1971, and then received FCC approval in 1972 to switch to “generally middle of the road music which may include some contemporary, folk and jazz.”39Citizens Comm. to Keep Progressive Rock, 478 F.2d at 928. The Citizens Committee to Keep Progressive Rock petitioned the FCC to object. The D.C. Circuit ordered a hearing on whether the Toledo metropolitan area was adequately served by prog-rock stations as compared with top-forty stations,40Id. at 932. and discussed such details as whether a “golden oldies” format was sufficiently distinct from “middle of the road.”41Id. at 928 n.5. “In essence, one man’s Bread is the next man’s Bach, Bacharach, or Buck Owens and the Buckeroos, and where ‘technically and economically feasible,’ it is in the public’s best interest to have all segments represented,” the opinion sagely intoned.42Id. at 929.

My point here is not that the FCC’s enterprise of supervising formats or of requiring balanced public-interest programming in the name of listener interests was ill-considered. Instead, I want to emphasize that these interventions were more about listeners’ interests than about listeners’ choices. Some of them were about giving listeners information that it is considered important for them to have, and some of them were about moderately diversifying the menu of speech from which listeners could choose. But in an environment of severely limited bandwidth serving mass audiences, there was almost nothing more that could be done.

I make this point here because there are two misconceptions about listeners that are extraordinarily prevalent in the literature on access to the media. Both of them are direct consequences of inappropriately extending reasonable assumptions about the broadcast environment to other domains where they are much worse fits.

The first mistaken assumption is that speakers seeking access to media are necessarily good proxies for listeners. In 1967, Jerome Barron wrote, “It is to be hoped that an awareness of the listener’s interest in broadcasting will lead to an equivalent concern for the reader’s stake in the press, and that first amendment recognition will be given to a right of access for the protection of the reader, the listener, and the viewer.”43Jerome A. Barron, Access to the Press—A New First Amendment Right, 80 Harv. L. Rev. 1641, 1666 (1967) (emphasis added). In broadcast media, a strong right of access for diverse speakers may be a way to promote listeners’ practical ability to choose speech.

In other media, which are not characterized by the same combination of broad distribution and narrow bandwidth, there is much less reason to think of speakers as proxies for listeners. To give a simple example, many of the speakers most loudly demanding—and sometimes suing for—a right of access to Internet platforms are unrepentant spammers.44E.g., Cyber Promotions, Inc. v. Am. Online, Inc., 948 F. Supp. 436, 443–44 (E.D. Pa. 1996). Less charitably, the Republican National Committee. See Republican Nat’l Comm. v. Google, Inc., No. 2:22-cv-01904-DJC-JBP, 2023 U.S. Dist. LEXIS 149076, at *2–3 (E.D. Cal. Aug. 24, 2023). The access they seek is the access of pre-FCC unlicensed broadcast, as in the right to overwhelm media and listeners with high-volume speech that drowns out alternatives and reduces listeners’ practical ability to choose among speakers.

The second misconception about listeners’ choices that arises from seeing all media as broadcast media is the belief that nothing else can be done. Both the justifications for and many of the criticisms of regulations like the fairness doctrine and format review arise from thinking about speech environments in which listeners are fundamentally passive. The only controls they have—or can have—are the channel dial and the on-off switch. It seems to follow that the only useful regulatory interventions must happen upstream and that individual listeners themselves can have little involvement in the matching process. The entire model of media criticism that conceptualizes individuals as television viewers—numb, motionless, and mindless zombies or couch potatoes tuned in to the idiot box—is blind to the ways in which they engage with media that give listeners more agency and more choices.45Even in the case of television, it misses the way that fans engage. See generally Henry Jenkins, Textual Poachers: Television Fans and Participatory Culture (1992); Betsy Rosenblatt & Rebecca Tushnet, Transformative Works: Young Women’s Voices on Fandom and Fair Use, in eGirls, eCitizens 385 (Jane Bailey & Valerie Steeves eds., 2015). This is a different type of agency than the agency I am discussing as listeners. We will see many examples soon. For now, remember that the assumption of listener passivity is just that—an assumption.

C. Delivery

Delivery media are mostly not bandwidth-scarce, especially on the Internet. Any given delivery intermediary’s platform tends to face fewer capacity constraints than broadcast media did. Partly this is structural: delivery media solve a smaller problem because they only try to route a communication to one recipient, rather than many. Partly it is due to physical differences: the phone network could handle more simultaneous connections by running more wires in trunk lines, whereas cable could not increase the number of channels without reengineering every subscriber’s wiring and equipment. Partly it is due to the telecommunications engineering triumphs of the telephone system and the Internet, which have scaled up over many orders of magnitude in their lifetimes. And partly it is due to recognizing the limits of the possible: telegraph companies did not attempt to offer video service.

Whatever the reason, any given communication takes up a much smaller fraction of a delivery provider’s capacity than a corresponding communication would take up of a broadcaster’s capacity. Comcast as a cable operator can offer its subscribers a few hundred channels, while Comcast as an ISP can offer its subscribers delivery to and from millions of sites. The result is that Comcast’s Internet-service subscribers interfere with each other far less than the cable channels vying for transmission do. One more subscriber is trivial from Comcast’s perspective, and it has every economic incentive to sign up as many as it can. However, each cable carriage agreement is individually negotiated, and Comcast is ready to say “no” if the terms are not good enough because Comcast has to devote some of a sharply limited resource to each channel it offers.

Entry scarcity varies among delivery media. Some, such as email, are almost completely open to entrants: anyone can set up their own SMTP server and start exchanging emails. Others, such as telephone and Internet service, have limited competition among intermediaries who can serve any particular customer or region because the need to place physical infrastructure, such as fiber-optic cables or cell-phone towers, in particular locations creates economic and regulatory barriers to entry. The postal service is an extreme example: it has a statutory monopoly on the carriage of letters.4618 U.S.C. § 1694 (fining anyone who, in regular point-to-point service, “carries, otherwise than in the mail, any letters or packets”).

There is a long and robust tradition of speakers’ rights to access delivery media. Older delivery media, in particular, have frequently been subjected to common-carriage rules that require them to accept communications from all senders and for all receivers, and forbid them from discriminating on the basis of the contents of those messages.47See Genevieve Lakier, The Non–First Amendment Law of Freedom of Speech, 134 Harv. L. Rev. 2299, 2316–30 (2021); Blake E. Reid, Uncommon Carriage, 76 Stan. L. Rev. 89, 110–13 (2024). The postal service “shall not . . . make any undue or unreasonable discrimination among users of the mails . . . .”4839 U.S.C. § 403. This statutory obligation is almost certainly a First Amendment rule.49See Blount v. Rizzi, 400 U.S. 410, 416 (1971) (“The United States may give up the Post Office when it sees fit, but while it carries it on the use of the mails is almost as much a part of free speech as the right to use our tongues . . . [P]rocedures designed to deny use of the mail . . . violate the First Amendment unless they include built-in safeguards against curtailment of constitutionally protected expression . . . .”). Similarly, the Communications Act prohibits “any unjust or unreasonable discrimination in charges, practices, classifications, regulations, facilities, or services” by telecommunications common carriers including telephone companies.5047 U.S.C. § 202(a). This is the modern continuation of a long tradition: laws in the nineteenth century required telegraph companies to “operate their respective telegraph lines as to afford equal facilities to all, without discrimination in favor of or against any person, company, or corporation whatever.”51Telegraph Lines Act, ch. 772, 25 Stat. 382–83 (1888) (codified as amended at 47 U.S.C. § 10); See Lakier, supra note 47, at 2320–24 (surveying history of telegraph common-carrier laws). Indeed, the postal service,52See 39 U.S.C. § 101(a) (“The United States Postal Service shall be operated as a basic and fundamental service provided to the people by the Government of the United States . . . .”). telephone network,53See 47 U.S.C. § 254 (establishing universal service policy). and broadband Internet service54See generally FCC, Connecting America: The National Broadband Plan (2010). are all the subjects of universal-service policies that affirmatively attempt to provide access to all American residents.

On the other hand, it is an open doctrinal question whether government can require modern delivery providers—specifically email and broadband Internet—to provide uncensored access to speakers and listeners. The best and most prominent example is the FCC’s network neutrality rules that attempted to require broadband ISPs to carry traffic to and from all edge providers (that is, speakers) on a nondiscriminatory basis.55The most recent version was the Safeguarding and Securing the Open Internet Order of 2024, 89 Fed. Reg. 45404 (June 7, 2024). See 47 C.F.R. § 8.3(a) (2024) (ISPs “shall not block lawful content, applications, services, or non-harmful devices”); id. § 8.3(b) (ISPs shall not “impair or degrade lawful internet traffic on the basis of internet content, application, or service”); id. § 8.3(c)(1) (ISPs shall not “directly or indirectly favor some traffic over other traffic” for compensation); id. § 8.3(d)(1) (ISPs shall not “unreasonably interfere with or unreasonably disadvantage” users’ ability to access and edge providers’ ability to make available lawful content). That order was set aside by the Sixth Circuit. See Ohio Telecom Ass’n v. FCC, 124 F.4th 993, 933 (6th Cir. 2025). It is unlikely that federal network-neutrality rules will be revived in the short run, although state-level counterparts remain in force. See, e.g., Cal. Civ. Code § 3100 (West 2024). The D.C. Circuit upheld one version of the FCC’s network neutrality rules against a First Amendment challenge in 2016.56See U.S. Telecom Ass’n v. FCC, 825 F.3d 674, 675 (D.C. Cir. 2016). Dissenting from denial of rehearing en banc, Judge Kavanaugh argued that ISPs exercise editorial discretion protected by the First Amendment.57See U.S. Telecom Ass’n v. FCC, 855 F.3d 381, 382 (D.C. Cir. 2017). There are also dicta in the Moody v. NetChoice majority opinion describing First Amendment protections for social-media companies’ “choices about the views they will, and will not, convey” that would seem to apply equally well to ISPs.58Moody v. NetChoice, LLC, 603 U.S. 707, 737 (2024).

Indeed, § 230 affirmatively shields Internet delivery media from liability for “any action voluntarily taken in good faith to restrict access to or availability of material that the provider or user considers to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable.”5947 U.S.C. § 230(c)(2)(A). The precise contours of what constitutes “good faith” are unsettled,60See, e.g., Darnaa, LLC v. Google, Inc., No. 15-cv-03221-RMW, 2016 U.S. Dist. LEXIS 152126, at *9 (N.D. Cal. Nov. 2, 2016). as is the scope of the “otherwise objectionable” catchall,61See, e.g., Enigma Software Grp. USA, LLC v. Malwarebytes, Inc., 946 F.3d 1040, 1047 (9th Cir. 2019). but the general result is to preempt any state attempts (by statute or common law) to impose access mandates.62See, e.g., Republican Nat’l Comm. v. Google, Inc., No. 2:22-cv-01904-DJC-JBP, 2023 U.S. Dist. LEXIS 149076, at *10–11 (E.D. Cal. Aug. 24, 2023).

It is also notable that many delivery media are governed by strict privacy rules that limit carriers’ ability even to determine the contents of a message. The USPS is legally prohibited from opening first-class mail without a search warrant.63See 39 U.S.C. § 404(c). Telephone carriers are restricted from listening to conversations by the Wiretap Act,64See 18 U.S.C. § 2511(1)(a) (prohibition on interception); id. § 2511(2)(a)(i) (describing limited exception to that prohibition for interceptions “necessary incident to the rendition of his service or to the protection of the rights or property of the provider of that service”). as are ISPs and email providers.65See, e.g., United States v. Councilman, 418 F.3d 67, 69 (1st Cir. 2005) (finding Wiretap Act interception by email provider). Even beyond legal limits, many delivery providers now use encryption systems that technologically prevent the provider from determining message contents; for example, Apple Messages and Signal are end-to-end encrypted so that only the designated recipient (and not any intermediary, including Apple or Signal) can decrypt a message. A fortiori, carriers who cannot even tell what a message says cannot discriminate on the basis of its contents.

It is easy to justify common-carriage access rules for delivery media—old and new—in light of their structural characteristics. From the intermediary’s point of view, the weak bandwidth constraints mean that carrying any particular communication is not a substantial technical burden. In the aggregate, of course, communications add up, but that is primarily an economic problem—one to be addressed with appropriate pricing and funding.66See generally Brett Frischmann, Infrastructure: The Social Value of Shared Resources (2012). Where pricing is not available or insufficient, capacity limits on the volume of communications to or from a user are largely content-neutral ways of allocating bandwidth.67Similarly, communications that impair the network itself can be addressed through anti-abuse rules that target the harmful effects and only incidentally burden speech. See., e.g., 47 C.F.R. § 68.108 (2023) (allowing telephone providers to discontinue service to customers who attach equipment that harms the network); id. §§ 8.3(a), (b), (d)(2) (making exceptions to network neutrality rules for “reasonable network management”).

Carrying a communication is not a speech problem, except to the extent that the intermediary wants to make an expressive statement by carrying or refusing to carry particular messages. Historically, though, that argument has carried very little weight for traditional delivery media. This attitude is easy to justify by seeing delivery media from the perspective of speakers and listeners. Willing speakers and willing listeners have essentially the same interest in access to delivery media: the goal of forming the core free speech interest by communicating with each other.68Grimmelmann, supra note 1, at 382; Jovy Chan, Understanding Free Speech as a Two-Way Right, 1 Pol. Phil. 156, 164 (2024). If you want to send me an email and I want to receive the email, we are both thwarted if your email provider deletes your email.

An intermediary’s speech claims are weaker when they go up against those of matched speaker-listener pairs. The intermediary may not want to help the speaker and listener connect, but this is fundamentally an objection to their speech, not a claim about its own speech. It might prefer to deliver messages from other speakers it likes better; but when it does so, it forces listeners to receive messages from speakers they prefer less. As I argued in Listeners’ Choices, it is a core free-speech violation to make a listener listen to a speaker whose speech they do not want rather than listen to a speaker whose speech they want.69Grimmelmann, supra note 1, at 388. So while a delivery intermediary’s denial of access to a speaker or listener is not by itself a First-Amendment violation, the First Amendment leaves ample room for government to require delivery intermediaries to provide access.

In general, both speakers and listeners have standing to challenge denials of access to a delivery platform. In Murthy v. Missouri, the Supreme Court held that listeners do not have standing to challenge restrictions on speakers unless “the listener has a concrete, specific connection to the speaker.”70Murthy v. Missouri, 603 U.S. 43, 75 (2024). In the case of a speaker attempting to send a message to a specific listener (as opposed to the hosting platforms at issue in Murthy itself), this connection seems clearly satisfied. And where it is the listener who has been excluded from a platform (for example, disconnected by their ISP over alleged copyright violations), the impact on their speech interests as a listener is equally obvious.

If there is a distinction between analog and digital delivery media, it cuts in favor of applying access rules to modern digital intermediaries, not against. As bandwidth constraints drop further and further away, intermediaries’ arguments that they have a technical or economic need to discriminate among users on the basis of their speech get weaker and weaker. Most arguments to the contrary rest on a confusion between delivery and selection media. Commentators project the strong expressive interests in an intermediary’s selection function (both the intermediary’s own and those of the listeners they serve) onto the intermediary’s delivery function, without stopping to consider whether these functions can be separated and distinguished.

D. Hosting

Common-carriage access rules for hosting media generally facilitate listener choice. There is an obvious argument in favor of access rules: the more speakers that are available through a hosting intermediary, the wider the range of choices it offers to listeners. The entire web was better than AOL’s walled garden; a streaming service with ten million tracks beats one with one million. The hosting intermediary might have self-interested reasons to limit access (for example, to favor its affiliated speakers or to extract more money from speakers through price discrimination), but the listeners who use the platform generally prefer that it offer the widest possible range of speakers and speech. To a first approximation, listeners either side with the speaker in a speaker-hosting platform dispute (if they want the speech) or are at most indifferent (if they do not want the speech).

Common arguments against access rules that apply to other forms of media mostly do not apply to hosting media. First, there is no scarcity of bandwidth compelling hosting intermediaries to pick and choose among speakers to carry. Bandwidth on the Internet is effectively infinite. Cloudflare could serve every user in the United States if it needed to. This is not to say that Cloudflare could, would, or should do so for free—this level of access would be quite expensive and a speaker wanting to support hundreds of millions of massive downloads would quite reasonably be expected to pay commensurately. It is just that Cloudflare could serve everything to everyone.

Second, there are generally no operational constraints that cause one speaker’s content to interfere with another’s. Common Internet hosting intermediaries are technically capable of carrying almost any item of content within a category: videos at a given resolution, files consisting of arbitrary bitstrings, and so on. These items of content may have different sizes—and might be subject to caps for short-run capacity or economic reasons—but from a technical perspective, the intermediary is entirely indifferent as to their content. A broadcast radio station must deal differently with a talk-show host in studio one, a live musical performance in studio two, and a recorded program coming via audio link from a remote location. However, in an important sense, all apps in an app store are the same. Offering speaker A’s app does not divert resources needed to offer speaker B’s.

Third, there is no scarcity of listeners’ attention compelling hosting providers to prioritize some content over others. A delivery platform can fill up a listener’s queue with unwanted speech, making it harder to receive to the speech they want. If your telephone is ringing off the hook with telemarketers, your friends will get a busy signal every time they call. However, a hosting platform does not make any claims on a listener’s attention; it simply sits there passively until the user seeks out and requests the speech. No one is interested in all 100,000,000 tracks on Spotify; but for the most part, having access to an extra 99,900,000 does not take anything away from the 100,000 one might actually be interested in listening to.

To be sure, a hosting platform with 100,000,000 pieces of content is harder to browse than a platform with 100. But this should be understood as more of a selection problem than a hosting problem. Combining hosting and selection into a single platform function takes some of the control over speaker-listener matching away from listeners and vests it in the platform. A movie theater that shows 5 movies at time offers far less listener choice than a streaming platform that gives listeners access to a catalog of 50,000. Give that same listener a list of 5 recommended hot new releases and they have all of the choice-related benefits of the movie theater and none of the drawbacks. The creation of Internet-scale hosting intermediaries creates its own need for equally useful selection intermediaries, but the first step towards facilitating their healthy development is recognizing that selection is distinct from hosting.

None of this is not to say that access rules always actually enhance the choices available to listeners. The economics of multi-sided markets are complicated, and a badly designed access rule could undermine a pricing strategy that successfully attracts more speakers and more listeners to an intermediary. My goal here is narrower. I want to argue that rules that have the effect of increasing the range of speakers available on a hosting platform are pro-listener-choice, whether or not they are structured as open access rules. The actual creation of a regulatory regime involves difficult policy considerations and mechanism designs. My point is only that this policy space ought to be available to regulators and not be foreclosed by the First Amendment.

Indeed, access rules are even easier to justify for commodity hosting platforms than they are for delivery platforms. As we have seen, filtering rules for delivery media frequently translate into corresponding exceptions to access rules. Spam-blocking, for example, might be a case of reasonable network management under network neutrality rules. This, in turn, means that regulators need to be cautious with imposing access rules, lest they inadvertently cut off filtering that listeners depend on. A must-carry rule for email, for example, would be a spammer’s dream.

To the extent that listeners do their own filtering in accessing a hosting platform, hosting platforms do not require the same degree of caution with access rules. If regulators require that Candy Crush be available in app stores, it does no harm to a user who does not enjoy match-three games. If you don’t want to play Candy Crush, don’t download it.

E. Selection

For decades, speakers have been demanding access to selection intermediaries. In the 2000s, the issue of the day was “search neutrality”: equal access to search engines’ rankings.71See generally Grimmelmann, supra note 4. More recently, speakers have complained about being “downranked” on social media—that is, not placed in other user’s algorithmic feeds. In both cases, the complaint is the same: their speech is theoretically available to users but not recommended in practice.

The fundamental challenge with giving a coherent account of access to selection is the baseline problem.72See generally Grimmelmann, supra note 4. It is nearly impossible to describe what “correct” or “neutral” rankings would look like. Different users have different preferences, and even the same user has different preferences in different contexts and at different times. My Facebook News Feed should not be identical to yours; we have different friends and you like fashion while I like sports. My search results for “crab cakes” should be different than my search results for “crab canon,” and even my search for “Vikings” could be referring to Scandinavian seafarers, a football team, Mars probes, a TV series, or kitchen appliances.73See Grimmelmann, Speech Engines, supra note 3, at 913 (discussing challenge of defining relevance). As a result, different selection media can quite reasonably make different choices about speakers. Indeed, for a regulator to prescribe what a selection platform should do is to become a selection platform itself.

Thus, selection stands in sharp contrast to delivery and hosting, both of which have a plausible neutral baseline: deliver or host everything. Selection is more like broadcast in this respect: choices must be made. However, the reason for the choices is very different. The need for choices in broadcast stems from bandwidth being scarce; not all speech can be made available at all. The need for choices in selection stems from attention being scarce; listeners must choose among these the speech available to them. In broadcast, transmission and selection are inextricably linked. However, on the Internet, transmission (that is, hosting plus delivery) and selection can be distinct functions, one of which substantially overcomes the scarcity problem and the other of which confronts it full-force.

Access claims in the selection context are therefore effectively a zero-sum fight among speakers. To move speaker A up one place in a feed means pushing some other speaker B down one place. Platforms might make this choice for a variety of content-based reasons—profit, ideology, whimsy—but it is much harder to identify a legitimate reason for a regulator to prefer A to B or vice-versa. A neutrality rule in a delivery or hosting context works because the government can tell an ISP to deliver all IP datagrams with equal priority (network neutrality) or a cloud-hosting provider to host all lawful content (a must-carry regime); the baseline is content-neutral. But there is no simple corresponding neutrality rule for selection. To select is to choose on the basis of content.

I argued in Speech Engines for a more limited principle of relevance to search users. That is, a search result is a search engine’s guess at what a user will find relevant to their query.74Grimmelmann, Speech Engines, supra note 3, at 913. The user’s goals are subjective from their perspective, but it is an objectively observable fact from the search engine’s perspective how well a result corresponds to a user’s goals. The search engine must make a subjective guess at what the user will find relevant, but it is an objective fact whether the result the engine actually shows to the user corresponds to that best guess. A regulator therefore has a principled basis to intervene when a search engine is disloyal to its users—and it is disloyal when it shows them results that (objectively) differ from the engine’s own (subjective) judgment about what the users are likely to find relevant. This does not mean the regulator can substitute its own relevance judgments for those of the user or the search engine, but it does mean that the regulator can prevent the search engine from lying to users and it might be able to prevent certain conflicts of interest that might tempt the search engine into underplaying its hand.

This argument generalizes into a broader claim about selection intermediaries and listeners. A selection intermediary offers listeners a way to choose among speakers. To prohibit the intermediary from doing so, or to dictate how it makes the selection, is to interfere with listeners’ ability to choose. We should understand this as an interference with listeners’ First Amendment rights to listen (and not just the intermediary’s right to speak). At the same time, we should recognize that a selection intermediary that is dishonest or disloyal also interferes with listeners’ First Amendment interests. The dishonesty and disloyalty can provide a content-neutral basis for identifying problematic recommendations by selection intermediaries, even though those recommendations are themselves content-based.

  1. Moody v. NetChoice

The Supreme Court’s recent decision in Moody v. NetChoice was a missed opportunity to clarify these principles.75Moody v. NetChoice, LLC, 603 U.S. 707, 724–28 (2024). Texas and Florida passed content-moderation laws that, in various ways, prohibited major social-media platforms from restricting content on the basis of political viewpoint (Texas) or from restricting content from political candidates or journalistic enterprises (Florida). The actual holding in Moody was a nothingburger about the appropriate standards for facial challenges; but in dicta, a five-justice majority explained that the platforms’ “selection, ordering, and labeling of third-party posts” were protected expression.76Id. at 727.

This was a thoroughly speaker-oriented perspective. It treated the problem with the states’ laws as that “an entity engaging in expressive activity, including compiling and curating others’ speech, is directed to accommodate messages it would prefer to exclude.”77Id. at 731. This perspective makes perfect sense when the entity is a newspaper or a parade, both of which contribute to the marketplace of ideas by adding perspectives they think that readers or viewers will appreciate. And it is true, in a sense, for social media, where many platforms curate speech in ways that reflect specific viewpoints.

However, in another more accurate sense, the value of selection algorithms on social media is to users as listeners: the selection algorithms help them find speech they find interesting, valuable, and relevant to their diverse interests. A state mandate to insert some speech into a user’s feed or search results interferes with the user’s ability to listen to the speech that the user actually wants to hear. It is not just compelled speech as against the platform—it is also compelled listening as against the user. Put this way, the First Amendment problem is blindingly obvious.78See generally Brief of First Amendment and Internet Law Scholars as Amici Curiae Supporting Respondents, Moody v. NetChoice, LLC, 603 U.S. 707 (2024) (Nos. 22-277 and 22-555) (making this argument).

This shift in perspective—from speaker to listener, from platform to user—is important for two reasons. First, it gives a more convincing response to the states’ argument that the platforms are not really speaking in most of their selection decisions. Facebook does not really have an opinion on whether my cousin’s apple pie photos or my friend’s story about a long line at the grocery store is worthier speech, but I certainly do. There is a sense in which the speech value of Facebook’s ranking decisions is derivative of my speech interests.

This is a compelling response to Texas’s attempt to inject political speech into social-media feeds on a viewpoint-neutral basis. It is a bit uncomfortable for Facebook to argue that it has an expressive preference to discriminate on the basis of viewpoint, but it is perfectly natural for individual users to have expressive viewpoints and to prefer content on that basis. For listeners to choose speakers on the basis of viewpoint is not to interfere with the freedom of speech; it is an exercise of that freedom and the point of the whole enterprise. Subscribing to The Nation instead of The National Review (or vice-versa) is viewpoint discrimination on the user’s part, and that is a good thing! Social-media users want feeds that reflect their divergent interests and viewpoints, and social-media platforms advance, rather than inhibit, First Amendment values when they cater to these listener preferences.

Second, the focus on listeners’ expressive interests in choosing what speech they receive on social-media platforms and on having platforms that can algorithmically make selections in accordance with those interests makes clearer that this is an argument only about selection and not necessarily about hosting. To the extent that states attempt to regulate platforms’ hosting functions with neutrality or must-carry mandates, those laws may rest on a firmer basis than their attempts to regulate platforms’ selection functions.79Eugene Volokh, Treating Social Media Platforms Like Common Carriers?, 1 J. Free Speech L. 377, 448 (2021). As I argued above, there is a plausible neutral baseline for hosting, and regulating hosting by itself does not interfere with listeners’ choices in the same way as regulating selection does.

In the actual Moody and Paxton cases, the platforms’ hosting and selection functions were closely related, and the most common content-moderation remedy they applied was to delete the content entirely.80See generally Eric Goldman, Content Moderation Remedies, 28 Mich. Tech. L. Rev. 1 (2021) (discussing much wider range of remedies available to platforms). Similarly, the states’ laws ran rules that sounded in hosting (“permanently delete or ban”) together with rules that sounded in selection (“post-prioritization” or “shadow ban”), as if all of these practices were entirely equivalent. However, it is possible to imagine future laws that more clearly require hosting of content on a viewpoint-neutral basis while leaving platforms greater discretion over selection. I think these laws pose genuinely harder questions. Moody’s majority opinion collapses these distinctions in an unhelpful way.

  1. Antitrust and Self-Preferencing

A listeners’-choice perspective also shows why antitrust regulation of selection intermediaries is broadly permissible, even when some of the anticompetitive conduct complained of involves the selection of speech.81        See generally Hillary Greene, Muzzling Antitrust: Information Products, Innovation and Free Speech, 95 B.U. L. Rev. 35 (2015). The actual antitrust analysis is highly fact-specific and requires careful technological and economic reasoning about particular products and markets. See generally Erik Hovenkamp, Platform Exclusion of Competing Sellers, 49 J. Corp. L. 299 (2024); Erik Hovenkamp, The Antitrust Duty to Deal in the Age of Big Tech, 131 Yale L.J. 1483 (2022). My point here is only that in many circumstances, the First Amendment does not block a court from reaching the merits of an antitrust case involving a selection intermediary. Again, the key point is that although users have content- and viewpoint-based preferences among speech, the government can act neutrally in terms of content by taking those preferences into account, whatever they are. An app store that rejects fart apps because “the App Store has enough fart, burp, flashlight, fortune telling, dating, drinking games, and Kama Sutra apps, etc. already”82App Review Guidelines § 4.3 Spam, Apple Dev., https://developer.apple.com/app-store/review/guidelines [https://perma.cc/9FA3-N67R]. is certainly expressing a viewpoint. However, to the extent that users want fart apps and the app store is suppressing competing fart apps in favor its own, promoting welfare-enhancing consumer choices is a perfectly

legitimate government interest and the harm is cognizable under traditional antitrust principles.

Thus, rules against self-preferencing by selection intermediaries will generally be permissible under the First Amendment. This position may sound absurd if one sees only the First Amendment interests of the intermediary, and it is still difficult if one takes into account the interests of its competitors. However, it becomes entirely reasonable if one considers the interests of affected users. Indeed, there is a natural congruence between the interests of users as listeners (my argument in this essay) and the interests of users as consumers (the traditional stance of antitrust law).

More specifically, it would be permissible to have a rule that a pure selection intermediary must treat first-party content that it itself produced evenhandedly with third-party content from competitors. The intermediary will have valid, expressive reasons to prefer some content over others, and these decisions will mostly be off-limits to regulatory scrutiny, as discussed above. However, a regulator can make clear that the platform cannot prefer first-party content simply because it is first-party content. The platform can use any ranking rules it wants, but those rules must be applied even-handedly to all—or at least, the platform must give users the option of disabling any self-preferencing.

For similar reasons, disclosure of speech-selection intermediaries’ commercial ties is also generally permissible under traditional consumer-protection principles. Listeners can legitimately expect to know when a speaker has a financial incentive to tell them one thing rather than another, an expectation that applies to speech selection as well as to speech itself. At the moment, paid advertising in search results and in social-media feeds must be disclosed as such; however, a stronger rule that required selection platforms to disclose when recommended content is first-party, or when there are substantial financial ties between the platform and a speaker, would also be allowable for the same reasons.

Finally, full structural separation between hosting, delivery, and selection is a plausible antitrust remedy or regulatory mandate. In Part IV, I will discuss in more detail why this kind of separation might be appealing from a free-speech perspective. For now, I just want to note that the economic and technical separation of these functions is itself plausible from a First Amendment perspective, Moody notwithstanding. I have been arguing that hosting and delivery platforms could be subject to must-carry rules, but selection platforms generally cannot. Much of the gap between the two sides’ positions in Moody arose from the fact that the laws’ proponents generally cited caselaw about common carriage in hosting and delivery settings, while

the laws’ opponents generally cited caselaw about expressive choices in selection settings.

The thing that made the Moody cases difficult to resolve was that the platforms combined both hosting and selection functions, and most of the briefing (and the opinions) ran these functions together. This would seem to open up an argument on the platforms’ part: Moody confirms they have full First Amendment protection when they engage in selection, so even a pure hosting platform is always allowed to engage in selection—i.e., there is a First Amendment right to combine these two functions. However, I think this does not follow from Moody; or to the extent that it does, Moody is wrong.

The thrust of the common-carriage cases is that the public provision of standardized service can be subject to nondiscrimination obligations.83There is a parallel tradition that these standardized services can be structurally separated from other services that involve more individualized offerings. This, for example, is what the Telecommunications Act of 1996 attempted to do with its distinction between “telecommunications service” (standardized and common-carriage) and “information service” (bespoke and unregulated). To the extent that this distinction is coherent (and I think that it is, much of the time), nondiscrimination obligations should apply to the standardized services and not to the individualized ones. Moody may have missed this distinction, but the Court’s opinion in 303 Creative LLC v. Elenis seems to hinge on it; that is, it is First-Amendment-compelled speech to require a designer to make a custom wedding website (“pure speech”), but it is perfectly permissible to require a merchant to sell a commodity product to all comers.84303 Creative LLC v. Elenis, 600 U.S. 570, 593–94 (2023); see also Dale Carpenter, How to Read 303 Creative v. Elenis, Volokh Conspiracy (July 3, 2023, 2:11 PM), https://reason.com/volokh/2023/07/03/how-to-read-303-creative-v-elenis [https://perma.cc/KVQ9-KD2N] (arguing that 303 Creative applies to products that are customized and expressive). In listener terms, listeners are paying attention to the intermediary’s own speech in individualized cases like selection, while paying attention to third-party speech in standardized cases like hosting.

  1. Unranked Feeds

An interesting partial and special case of separating hosting from selection is to require a provider to include an unranked or chronological feed for those users who want it. Facebook offers both “Top Posts” (algorithmically ranked) and “Most Recent” (chronological) feeds; Reddit offers “Best” and “Hot” (algorithmically ranked) but also “New” (chronological) sorting options.

What makes these options feasible is that there is a plausible objective baseline. A chronological feed on Facebook is “all posts from friends and pages I follow, sorted by recency.” This is workable in a way that “all posts I would be interested in” is not. The restriction to content from accounts that one follows is what makes the option to display everything tractable. A purely chronological feed of everything posted to X (the “firehose”) is not of interest to most users—it would be overwhelmingly vast—but a purely chronological feed of everything posted by those they follow is. For similar reasons, a non-algorithmic search engine is an oxymoron except in domains that are so small or simple as to barely require a search engine at all. Anything larger than “find on this webpage” requires contestable choices about ordering.

A chronological-feed option is listener-choice enhancing. A chronological-feed mandate would not be. Facebook and other social-media platforms have extensive evidence showing that users stay on their sites longer and engage with more posts when they see non-chronological feeds. This is a legitimate user preference; given the limits of attention, the user benefits greatly from delegating the choice to Facebook.85I think it is more accurate to call this a “delegation” of choice rather than “choosing not to choose.” Cf. Cass R. Sunstein, Choosing Not to Choose, 64 Duke L.J. 1, 9 (2014). However, not every user wants algorithmic feeds. I, for example, only used chronological ordering on Twitter, and have stuck to that preference on federated platforms. This, too, is a legitimate user preference; a platform that forces algorithmic ordering on everyone when chronological ordering is feasible thwarts some listeners’ choices about speech selection.

This is another way in which Moody paints with too broad a brush. Seeing selection as purely a matter of platform speech makes the majority insensitive to listeners’ speech interests. Requiring a chronological option from social media feeds in addition to a platform’s preferred algorithmic option looks like a restriction on the platform’s speech rights; indeed, to the majority it might even be compelled speech. However, a chronological feed option is also a way of respecting users-as-listeners’ choices about speech without forcing a platform to make ranking choices that it and its users would otherwise disagree with. Requiring a chronological option strictly increases the choices available to listeners, while not interfering with a platform’s ability to provide its preferred ordering to any listeners who are interested in hearing it.

IV. Filtering

Now consider media from the perspective of unwilling listeners. As we will see, there are really three different types of unwilling listeners in media regulation. In each case, it is helpful to distinguish between (1) downstream filtering infrastructure that empowers listeners themselves to avoid unwanted content, and (2) upstream filtering rules that prevent that content from reaching them in the first place.

First, there are listeners who are uninterested in or who actively dislike particular content: opera fans who loathe rap music or reality television fans who find scripted shows unbearably dull. Here, downstream filtering infrastructure is typically sufficient. As long as there is something they would rather watch (an access problem), as long as they are able to find out about it (a selection problem), and as long as they are actually able to switch to it (which is true for most media),86Exceptions typically involve being in public places, such as in an auto mechanic’s waiting room or on a subway car with someone having a loud video call. they can watch operas and reality shows, and ignore the rap and scripted dramas. It does not bother them, because they do not need to see it. Upstream filtering rules are unnecessary.

Second, there are listeners who are individually targeted with specific unwanted content that is hard for them to avoid. This is fundamentally a delivery problem; it does not arise with other types of media. Sometimes speakers target individual listeners, like a harassing telephone caller. Sometimes they target many listeners indiscriminately, like an email spammer. Either way, listeners can try to use self-help downstream filtering to avoid it, but if that fails, they may need upstream filtering to help prevent it from reaching them in the first place.

And third, there are minors. Sometimes, children want to avoid violent, sexual, disturbing, or other adult-themed content because it upsets them, but they come across it by accident and cannot look or flip away in time. Sometimes—perhaps more often—the problem is that children are willing to see this material, but their parents or guardians want to shield them from it. In both cases, the theory is that children are less capable of making choices for themselves as listeners than adults are, and therefore that some kind of upstream filtering rules are necessary because downstream ones will fail. Either the kids themselves will be less good at filtering than their parents would be, or the kids will affirmatively evade the filtering their parents try to impose.

Downstream filtering infrastructure also plays a crucial role in supporting (or undermining) the rationales for other kinds of media regulations. On the one hand, good downstream filtering plays a crucial role in making it possible for listeners to pick and choose among the superabundance of content that access rules try to make available. On the other, good downstream filtering can reduce the need for upstream filtering rules—in First Amendment terms, it is frequently a “less restrictive alternative.”

A. Broadcast

In broadcast media, unwilling listeners were typically expected simply to change the channel. They may not always have had many other broadcast options, but no one was forcing them to watch any particular broadcast. Even this limited measure of choice was sufficient to protect unwilling listeners from programs they despised. As the range of channels expanded (with it, the range of choices), the less of an imposition any one unwanted channel was on listeners—indeed, the less likely they were to notice or care about it at all. Similarly, by their nature, very few broadcast programs were personally targeted at, or specifically harmful to, individual listeners. The local CBS affiliate simply did not care enough about Angela Johnson at 434 Oakview Terrace to preempt Murder She Wrote with an hour-long special insulting Johnson and her life choices.

Instead, the filtering problems on broadcast media primarily concern minors. The theory of “just change the channel” does not work for them for two reasons. First, something offensive or shocking could come up unexpectedly when one is just flipping through channels. This was the case in FCC v. Pacifica Foundation, in which the Supreme Court upheld the FCC’s finding that a radio broadcast of George Carlin’s “seven dirty words” routine was indecent in violation of its regulations.87FCC v. Pacifica Found., 438 U.S. 726, 740–41 (1978). And it is the case with the FCC’s modern attempts to extend its obscenity-and-indecency rules to cover fleeting expletives and other sudden intrusions into otherwise family-friendly broadcasts, like Bono calling U2’s Best Original Song win at the Golden Globes “really, really, fucking brilliant” live on air, or the 2004 Super Bowl wardrobe malfunction.88See generally FCC v. Fox Television Stations, Inc., 567 U.S. 239, 248, 258 (2012) (finding the FCC’s rule unconstitutionally vague as applied to fleeting expletives). These are cases where a listener (here, a parent making choices on behalf of their child) cannot effectively make a choice not to receive the unwanted material because of the linear, real-time nature of broadcast audio and video. The character of the channel changes more quickly than the listener can flip away.

Second, sometimes children want to watch shows their parents do not want them to. Nominally, the theory here is that parents cannot constantly supervise their children’s TV viewing; stations have to do the filtering work that parents cannot.89See J.M. Balkin, Media Filters, the V-Chip, and the Foundations of Broadcast Regulation, 45 Duke L.J. 1131, 1136–38 (1996) (arguing persuasively that the difficulty of parental supervision is the real import of courts’ language that broadcast media are uniquely “pervasive”). This is why the FCC’s indecency regulations are confined to only the hours from 6:00 AM to 10:00 PM each day: at night, when indecency regulations do not apply, kids are assumed to be in bed and not watching TV.9047 C.F.R. § 73.3999(b) (2023). In comparison with indecency rules, obscenity regulations apply at all hours of the day. Id. § 73.3999(a). The indecency rules are an incursion on adults’ abilities as listeners to choose what speech they want to receive. They are an exception to the normal rule that willing listeners beat unwilling listeners. The justification is simply the usual one offered so often in American law: protecting the supposed innocence of the young from the purportedly corrupting influence of being aware that sex is a thing that exists. The eight hours at night when indecency rules do not apply serve as a concession to adults’ interests as listeners.

I say that this is “nominally” the theory of broadcast indecency regulation because it only really makes sense in a world where the main audio and video media are broadcast—a world we have not lived in for decades. Cable, satellite, and other subscription services have never been subject to the indecency rules. Here, the theory is that parents can choose whether or not to subscribe, presumably in a different way than they could choose whether or not to have a TV. Thus, they have an upfront choice that they can use to prevent their children from receiving unwanted indecent material. If you do not want your kids to watch Skinemax late at night, do not get cable, or do not pay extra for premium channels. Similar laws and similar logic apply to “over-the-top” broadcast services on the Internet, like ESPN+’s live sports games. If you do not like it, do not subscribe.

At times, the government has tried to impose more stringent filtering rules on broadcasters. Listeners’ choices provide a simple and compelling explanation of where the doctrine has come to rest. Consider United States v. Playboy Entertainment Group, Inc., where § 505 of the 1996 Telecommunications Act required cable operators to “fully scramble or otherwise fully block”91Codified at 47 U.S.C. § 561(a). sexually explicit programs except between the hours from 10:00 PM to 6:00 AM the next day.92United States v. Playboy Ent. Grp., Inc., 529 U.S. 803, 806 (2000). Of course, most cable operators already scrambled sexually explicit channels for non-subscribers, and sexually explicit channels like Playboy Television were typically “premium” offerings sold à la carte, so only paying subscribers to these specific channels would have a converter box to descramble them.93See id. at 807. So far, this was simply a case of parental choice over what broadcast services to subscribe to.

The technological complication was “signal bleed”; the analog scrambling technologies available in the 1990s could not prevent portions of the audio and video from leaking through, albeit in somewhat garbled form.94Id. at 807–08. To Congress, signal bleed meant that existing scrambling by itself was insufficient, and so cable companies would need to “fully block” such content if they could not “fully scramble” it. However, the Supreme Court observed that there was a less-restrictive alternative to fully banning a channel—“block[ing] unwanted channels on a household-by-household basis.”95Id. at 815. Indeed, this capacity was already required of cable systems by § 504 of the Act,96Codified at 47 U.S.C. § 560. so the law contained its own less-restrictive alternative. In other words, a legal regime requiring upstream filtering for all listeners by broadcast intermediaries was unconstitutional because there was a downstream alternative that gave individual listeners a more granular choice.

A more technical complex broadcast filtering system is the “V-chip,” which the 1996 Telecommunications Act required in all televisions shipped through interstate commerce.9747 U.S.C. § 330(c)(1); see generally Balkin, supra note 89. The Act describes the V-chip bloodlessly as “a feature designed to enable viewers to block display of all programs with a common rating,”9847 U.S.C. § 303(x). but the intent and implementation were that the rating systems would flag programs with sexual, violent, or other type of adult content. While the V-chip is mandated by law, the ratings that it interprets are not. The TV Parental Guidelines, which include classic bangers like TV-14-LS (many parents would find the contents unsuitable for children under 14 because of crude language and sexual situations) are “voluntarily rated by broadcast and cable television networks, or program producers.”99Frequently Asked Questions, TV Parental Guidelines, http://tvguidelines.org/faqs.html [https://perma.cc/CMF3-PQWK]. Indeed, there is a strong argument that a mandatory rating system would constitute unconstitutional compelled speech. See Book People, Inc. v. Wong, 91 F.4th 318, 336–40 (5th Cir. 2024) (holding unconstitutional a mandatory self-applied age-rating system for websites). Overall use of the V-chip seems to have peaked at about 15 percent of parents.100Henry J. Kaiser Family Foundation, Parents, Children, & Media: A Kaiser Family Foundation Survey, KFF, https://www.kff.org/wp-content/uploads/2013/01/entmedia061907pres.pdf [https://web.archive.org/web/20250221161327/https://kff.org/wp-content/uploads/2013/01/entmedia061907pres.pdf].

It is enlightening to consider the V-chip, like § 504, as a mechanism for creating listener choice under the choice-unfriendly conditions of broadcast. In both cases, signals are still transmitted indiscriminately to all listeners, but in both cases, listeners can individually choose whether to opt in or opt out of making those signals intelligible. Section 504 does so in a less granular way (entire channels), while the V-chip does so in a more granular way (individual programs), but the general idea is the same. It is not a coincidence that in both cases, the regulatory regime converged on a technical system that put more choices in the hands of individual households. This overall downstream movement of choices about speech—from speakers and intermediaries to listeners; from “push” media to “pull” media—is one of the most significant trends in recent media history.

B. Delivery

Now consider filtering rules that help unwilling listeners avoid unwanted deliveries. The First Amendment does not operate directly here; outside of some narrow contexts involving a “captive audience,” there is no First Amendment right not to be spoken to.101See Frisby v. Schultz, 487 U.S. 474, 487–88 (1988) (upholding an ordinance against residential picketing on the grounds that people are captive audiences in their own homes); Snyder v. Phelps, 562 U.S. 443, 459–60 (2011) (rejecting liability for funeral protests on the ground that the mourners were not a captive audience when the protesters “stayed well away from the memorial service”). Instead, laws designed to protect listeners from unwilling communications in delivery media are generally constitutional, provided that they are suitably tailored to the actual harms suffered by listeners who are genuinely unwilling.

The most obvious example is that anti-harassment laws have repeatedly been upheld when they involve one-to-one communications.102E.g., Lebo v. State, 474 S.W.3d 402, 407 (Tex. Ct. App. 2015) (upholding conviction for repeatedly sending threatening emails and telephone calls to victim). Repeated telephone calls or harassing emails can be the subject of valid restraining orders, civil judgments, or criminal convictions.103See, e.g., 47 U.S.C. § 223(a) (prohibiting telephone harassment). See also United States v. Lampley, 573 F.2d 783, 788 (3d Cir. 1978) (upholding constitutionality of § 223(a)); United States v. Darsey, 342 F. Supp. 311, 312–14 (E.D. Pa. 1972) (describing problems § 223(a) was meant to solve). See generally Genevieve Lakier & Evelyn Douek, The First Amendment Problem of Stalking: Counterman, Stevens, and the Limits of History and Tradition, 113 Calif. L. Rev. 143, 170–77 (2025) (discussing history of anti-stalking law). The key here, as I argued in Listeners’ Choices, is that these restrictions do not prevent speakers from addressing willing listeners.104Grimmelmann, supra note 1, at 392. They remain free to telephone anyone else they want; only one particular number is forbidden. The legal system can therefore protect the unwilling victims of harassment without interfering in the core First Amendment relationship between willing speaker and willing listener.105See generally Leslie Gielow Jacobs, Is There an Obligation to Listen?, 32 U. Mich. J.L. Reform 489 (1999). An order requiring a speaker to take down a blog post about the victim interferes with that relationship; an order requiring them to stop sending direct messages to the victim does not.106See Volokh, supra note 15, at 742–43 (making one-to-many vs. one-to-one distinction).

Listeners can opt out of unwanted one-to-one commercial speech. The Controlling the Assault of Non-Solicited Pornography and Marketing Act (“CAN-SPAM”) for email, the Telephone Consumer Protection Act (“TCPA”) for telephone and Short Message Service (“SMS”), Do-Not-Call for telephone, and the TCPA for faxes all broadly prohibit sending certain types of commercial solicitations to unwilling listeners. CAN-SPAM uses an opt-out system; a sender gets one bite at the apple but must refrain from further emails once a recipient objects.10715 U.S.C. § 7704(a)(3)(A)(i). With some exceptions, TCPA prohibits the use of automated dialers and prerecorded messages (that is, bulk communications particularly unlikely to be of interest to individuals) unless they affirmatively opt in.10847 U.S.C. § 227(b)(1)(B). Do-Not-Call bars all unsolicited commercial calls to numbers on the list,10915 U.S.C. § 6151; 16 C.F.R. §310.4(b)(1)(iii)(B) (2024). and TCPA bars all unsolicited commercial faxes.11047 U.S.C. § 227(b)(1)(C). All of these laws have been upheld against First Amendment challenges.111See generally Mainstream Mktg. Servs., Inc. v. FTC, 358 F.3d 1228 (10th Cir. 2004) (discussing Do-Not-Call); United States v. Smallwood, No. 3:09-CR-249-D(07), 2011 U.S. Dist. LEXIS 76880 (N.D. Tex. July 15, 2011) (discussing CAN-SPAM); Moser v. FCC, 46 F.3d 970 (9th Cir. 1995) (discussing telephone provisions of TCPA); Missouri ex rel. Nixon v. Am. Blast Fax, Inc., 323 F.3d 649 (8th Cir. 2003) (discussing fax provisions of TCPA).

The First Amendment rule for unwanted postal mail is even stronger. In Rowan v. United States Post Office Department, the Supreme Court upheld a law under which “a person may require that a mailer remove his name from its mailing lists and stop all future mailings to the householder.”112Rowan v. U.S. Post Off. Dep’t, 397 U.S. 728, 729 (1970). Although the law was framed in terms of allowing recipients to opt out of receiving “erotically arousing or sexually provocative” advertisements,113Id. at 730. it allowed recipients “complete and unfettered discretion in electing whether or not [they] desired to receive further material from a particular sender,”114Id. at 734. and the legislative history indicated that neither the postal service nor a reviewing court could “second-guess[]” the recipient’s decision.115Id. at 739 n.6. “Nothing in the Constitution compels us to listen to or view any unwanted communication,” wrote Chief Justice Burger for a unanimous court.116Id. at 737. Compare Rowan with Bolger v. Youngs Drug Products Corp., in which the Court held a law prohibiting the mailing of contraceptive advertising unconstitutional:117Bolger v. Youngs Drug Prods. Corp., 463 U.S. 60, 72 (1983). that is, a prohibition on the use of mailings was constitutional when the prohibition was requested by the recipient (Rowan) but unconstitutional when the prohibition was imposed by the government (Bolger).

Although Rowan is sometimes discussed as a captive-audience case,118E.g., Snyder v. Phelps, 562 U.S. 443, 459–60 (2011). it is better understood as a case about delivery media. Consider Frisby v. Schultz, a true captive-audience case: there is nowhere to go to hide from protesters outside your door, so a law prohibiting residential picketing is constitutional.119Frisby v. Schultz, 487 U.S. 474, 487–88 (1988). By contrast, the Supreme Court has treated self-help as effective against unwanted mail. Bolger stated that the “short, though regular, journey from mail box to trash can is an acceptable burden, at least so far as the Constitution is concerned.”120Bolger, 463 U.S. at 72 (internal quotation omitted). The only way this Bolger dictum can be squared with Rowan is if the basis of Rowan’s holding is listeners’ rights against unwanted communications, rather than one being a captive audience in one’s home against unwanted postal mail.

It is also widely accepted that there is no First Amendment problem if a delivery carrier implements some form of filtering or blocking at the request of a user. Wireless and landline telephone companies offer call blocking to their customers, which allows a user to block all further calls from a number. Indeed, FCC regulations explicitly permit providers to block calls that are likely to be unwanted based on “reasonable analytics”12147 C.F.R. § 64.1200(k)(3)(i) (2023). so long as the recipient has an opportunity to opt out of the blocking.122Id. § 64.1200(k)(3)(iii). Email filtering is also incredibly widely deployed. Some users do the filtering themselves, manually or with an app, but many rely on the filtering (both explicit blacklists and using machine learning) offered by their email providers. Here again, § 230 plays a role: the most common reason that delivery media block “otherwise objectionable” communications is that their users object to them, and spam is a common reason.123See, e.g., Republican Nat’l Comm. v. Google, Inc., No. 2:22-cv-01904-DJC-JBP, 2023 U.S. Dist. LEXIS 149076, at *11 (E.D. Cal. Aug. 24, 2023).

Finally, many laws require speakers to accurately identify themselves upstream when using delivery media so that listeners downstream can decide whether or not to receive their speech. CAN-SPAM prohibits false or misleading header information,12415 U.S.C. § 7704(a)(1). prohibits deceptive subject lines,125Id. § 7704(a)(2). and requires that advertisements be disclosed as such.126Id. § 7704(a)(5)(i). The Truth in Caller ID Act prohibits spoofing caller ID information “with the intent to defraud, cause harm, or wrongfully obtain anything of value.”12747 U.S.C. § 227(e)(1). The Junk Fax Prevention Act of 2005 (“JFPA”) requires clear “identification of the business, other entity, or individual sending the [fax] message.”128Id. § 227(d)(1)(B). Although there is a right to speak anonymously under many circumstances, there are limits on how far a speaker can go in lying about their identity to trick a listener into hearing them out. Importantly, some of these laws require delivery intermediaries to implement the infrastructure for accurate identification. The FCC, for example, requires telephone providers to implement a comprehensive framework against caller-ID spoofing known as “secure telephone identity revisited and signature-based handling of asserted information using tokens standards,” otherwise abbreviated as “STIR/SHAKEN.”12947 C.F.R. § 64.6300 (2023).

C. Hosting

Listener choices play a central role in the justifications for hosting providers’ First Amendment rights—and also in the justification for speakers’ access rights to hosting platforms. These justifications presume that listeners can voluntarily choose to engage with hosted content they want and to avoid hosted content they do not want. In the terminology of Listeners’ Choices, listeners can be asked to bear the necessary “separation costs” because they can easily and inexpensively choose where to click.130Grimmelmann, supra note 1, at 395–96. It follows, then, that unwilling listeners’ objection to content are not a sufficient reason to prevent it from being hosted for willing listeners.

The Supreme Court’s decision in Snyder v. Phelps is a nice example.131See generally Snyder v. Phelps, 562 U.S. 443 (2011). In addition to its funeral protests, the Westboro Baptist Church has a website that is, if anything, more offensive and upsetting. However, a website is even easier for an unwilling listener to avoid. The Church physically picketed at Albert Snyder’s son’s funeral, but he only found the website “during an Internet search for his son’s name.”132Id. at 449 n.1. Unsurprisingly, he pressed only the funeral-protest theory before the Supreme Court and abandoned his tort claims based on the website.133Id. The Court held that the First Amendment protected the Church’s picketing, and the argument is even stronger for the website.

Now consider whether hosting providers can have responsibilities to avoid carrying harmful-to-minors material. To simplify only slightly, the history of anti-indecency regulation is that some adults have tried to restrict minors’ access to sexually themed content by passing upstream filtering laws requiring speakers and hosting platforms to prevent the posting of such content. The courts have responded by invalidating these laws whenever listener-controlled downstream filtering is a plausible alternative. Indeed, it is striking how many contexts the same basic rationale has worked in.

Start with Sable Communications of California, Inc. v. FCC, in which federal law regulated “dial-a-porn” services by prohibiting the transmission of indecent interstate commercial telephone messages.134Sable Commc’ns of Cal., Inc. v. FCC, 492 U.S. 115, 118 (1989). While the prohibition might have been constitutional as to minors, adults have a constitutional right to view indecent but not obscene material. Because the statute prohibited transmission to adults as well, it restricted protected speech, and therefore was unconstitutional.

Put this way, Sable is a classic hosting case of both willing and unwilling listeners. The fact that the speech might reach some unwilling (minor) listeners does not mean that it can be prohibited entirely in such a way as to deprive willing (adult) listeners. Indeed, this first-cut explanation will apply perfectly well to almost all of the cases in this section. It is not wrong.

However, Sable is also a filtering case. The FCC had previously considered multiple technologies to block minors without blocking adults, including credit-card verification, access codes that would be provided only following an age verification process, message scrambling requiring a descrambler that only adults would be able to purchase, and customer-premises blocking, in which subscribers could block their phones from being

able to call entire exchanges (including the paid numbers over which Sable and other dial-a-porn operators provided their services). The Court specifically identified these technical schemes as plausible “less restrictive means, short of a total ban, to achieve the Government’s interest in protecting minors.”135Id. at 129.

These are all technologies to distinguish adults from minors, but they are also all filtering technologies. All four of them require a user to take an affirmative step to listen to particular speech. Indeed, the act of dialing a phone number itself is an affirmative step that these other mechanisms could piggyback on. This is why I describe Sable as a close cousin to a hosting case. To be sure, Sable Communications was delivering its own speech and not that of third parties, but it was fundamentally sending content to listeners on demand, and in such a way that they could predict the general outlines of the speech they were about to receive. (This fact alone is sufficient to distinguish FCC v. Pacifica Foundation and the other broadcast-indecency cases.136FCC v. Pacifica Found., 438 U.S. 726, 748–49 (1978).)

The same arc is visible in the Supreme Court’s caselaw on indecency on the Internet. The first stop was Reno v. American Civil Liberties Union.137See generally Reno v. Am. C.L. Union, 521 U.S. 844 (1997). The Communications Decency Act prohibited the transmission of indecent or sexual material to minors138Id. at 859–60.—including a good deal of material that was fully constitutional for adults to receive.139Id. at 870–76. The government tried to defend the statute by arguing that it only required intermediaries to refrain from sending such material to minors, while leaving them free to send it to adults.140Id. at 876–79. However, the Court held that “this premise is untenable”—that “existing technology did not include any effective method for a sender to prevent minors from obtaining access to its communications on the Internet without also denying access to adults.”141Id. at 876. In other words, the absence of effective age verification turned a de jure rule against sending indecent material to minors into a de facto rule against hosting it in general.142The Supreme Court is currently reconsidering the constitutional status of age-verification technology, in the context of numerous state laws requiring pornographic sites to implement age verification. See Free Speech Coal., Inc. v. Paxton, 95 F. 4th 263, 284 (5th Cir. 2024), cert. granted, 144 S. Ct. 2714 (2024).

Seven years later, in Ashcroft v. American Civil Liberties Union, the Supreme Court confronted a more narrowly drafted law, the Child Online Protection Act (“COPA”).143See generally Ashcroft v. Am. C.L. Union, 542 U.S. 656 (2004). Again, the statute prohibited sending to minors certain material that was constitutional for adults to receive.144Id. at 661–62. This time, however, the affirmative defenses were broader; providers were protected as long as they required a credit card, digital age verification, or any other “reasonable measures that are feasible under available technology.”145Id. at 662. The Court held that COPA was unconstitutional because “blocking and filtering software”—software operated and controlled by parents to limit the sites their children can access—was a less restrictive and more effective alternative.146Id. at 666–70.

As in Playboy Entertainment Group, the availability of more effective downstream filtering technologies meant that a law requiring upstream filtering was unconstitutional. However, unlike in Playboy Entertainment Group, the downstream filters were made available by third parties. The fact that parents could install their own filtering software meant that website hosts were under no duty to do their own filtering. This is a listener-choice-facilitating rule: Yes, it transfers some of the burdens of filtering from intermediaries to listeners, but it also means that each family can choose for itself how to tune its filters, if any.

In United States v. American Library Ass’n, the Supreme Court upheld the provisions of the Children’s Internet Protection Act (“CIPA”), which conditioned federal funding to schools and libraries on their installation of filtering software.147United States v. Am. Libr. Ass’n, Inc., 539 U.S. 194, 214 (2003). A four-Justice plurality held that the condition was a valid exercise of Congress’s Spending Clause power and that library Internet access was not a public forum.148Id. at 205–06. Meanwhile, Justice Kennedy and Justice Breyer’s concurrences in the judgment made nuanced arguments about listeners’ choices. Justice Kennedy’s argument rested on the government’s claim that “on the request of an adult user, a librarian will unblock filtered material or disable the Internet software filter without significant delay”—that is, CIPA allowed willing adult listeners to decide for themselves what sites to view.149Id. at 214. Justice Breyer made a similar point, arguing that an unblocking request was a “comparatively small burden.”150Id. at 220. Whether or not these claims are empirically accurate, the general principle is consistent with a deference to listener-controlled choices about filtering, subject only to the carve-out that minors are not regarded as having the autonomy to choose to view certain material that their elders regard as harmful to them.

D. Selection

I have argued that selection generally facilitates listener choices among speech, and that government attempts to alter platforms’ selection decisions interfere with listeners’ practical ability to find the content that they want. This is not to say that platforms’ selection decisions are ideal or give listeners the full degree of choices they might enjoy. Platforms will almost always get some users’ choices wrong some of the time. Every update you scroll past or search result you ignore is a mistake from your perspective. Platform-provided selection is better than the chaos of content without selection, but there is almost always room to improve.151See generally James Grimmelmann, The Virtues of Moderation, 17 Yale J.L. & Tech. 42 (2015) (discussing moderation in online communities).

It is helpful, then, to recognize that the bundling of hosting and selection on today’s social-media platforms may be a bug rather than a feature. The previous subsection argued that separation of hosting and selection could be permissible as a way for government to ensure that speakers are able to be heard by listeners who genuinely want to hear them (hosting) while not forcing their speech on listeners who do not (selection). However, there is another advantage to clearly separating the two functions, whether required by regulation or voluntarily adopted by a platform.

What would a world where social-media platforms separated hosting from selection look like? The short answer is that it would look much more like web search already does. Hosting providers make content available at speakers’ request, with stable URLs at reachable IP addresses, and transmit that content to listeners at listeners’ request. Meanwhile, search engines index the content and provide recommendations of relevant content to listeners, also at listeners’ request. Listeners have a choice of competing search engines to help them make their choice among competing speakers. The system is not perfect—Google has a dominant market share for general web search in the United States—but there is competition for those users who are willing to use other search engines. For example, Bing, DuckDuckGo, and Kagi are three highly creditable alternatives.

Several commentators have described a similar possible separation for social media. One proposal from a group of Stanford researchers is for “middleware,” defined as “software, provided by a third party and integrated into the dominant platforms, that would curate and order the content that users see.”152Francis Fukuyama, Barak Richman, Ashish Goel, Roberta R. Katz, A. Douglas Melamed & Marietje Schaake, Middleware for Dominant Social Platforms: A Technological Solution to A Threat to Democracy, Stan. Cyber Pol’y Ctr. (2021), https://fsi-live.s3.us-west-1.amazonaws.com/s3fs-public/cpc-middleware_ff_v2.pdf [https://perma.cc/SZ9Z-AW3P]; see also Francis Fukuyama, Richard Reisman, Daphne Keller, Aviv Ovadya, Luke Thorburn, Jonathan Stray & Shubhi Mathur, Shaping the Future of Social Media with Middleware, Found. for Am. Innovation (Dec. 2024), https://cdn.sanity.io/files/d8lrla4f/staging/1007ade8eb2f028f64631d23430ee834dac17f8e.pdf/Middleware [https://perma.cc/7TBA-UUR3]. Users on the platform would rely on the platform for hosting speakers’ content, but third-party middleware would do the selection. The first and most obvious virtue of middleware is that it introduces competition into the selection process, even when a platform is “dominant”; a monopoly on hosting does not automatically translate into a monopoly on selection.

The authors of the Stanford proposal argue that middleware would “dilute[] the enormous control that dominant platforms have in organizing the news and opinion that consumers see.”153Fukuyama, Richman, Goel, Katz, Melamed & Schaake, supra note 152, at 6. This is entirely correct, but I would put the point differently. Middleware pushes control from a platform towards its users, specifically towards users as listeners. An integrated platform benefits from its position at the center of the two-sided market for hosting, even if its selection is disappointing to users. However, when selection is broken out, selection intermediaries will attract users precisely to the extent that they succeed in satisfying those users’ desire for useful advice about what speech to listen to. That is, middleware selection providers compete along the right axis.

A close relative of middleware—or perhaps a subset of it—is “user agents”: software controlled by the end user that takes the content from a platform and curates it. The difference between middleware and a user agent is that middleware is integrated with the platform and takes over the selection function, while a user agent starts from the content selected by the platform and performs a second round of selection on it. For example, an ad blocker integrated into a user’s browser takes the content selected by a website and curates it by removing the ads. I have argued that these user agents are important for user autonomy in deciding what software to run on their computers, and a similar argument applies to users’ autonomies over what speech they receive.154James Grimmelmann, Spyware vs. Spyware: Software Conflicts and User Autonomy, 16 Ohio St. Tech. L.J. 25 (2020).

Ben Thompson, a technology and business analyst and journalist, offered a fascinating road-not-taken proposal for Twitter (prior to its transformation into X by Elon Musk).155Ben Thompson, Back to the Future of Twitter, Stratechery (Apr. 18, 2022), https://stratechery.com/2022/back-to-the-future-of-twitter [https://perma.cc/3P3G-94KG]. Thompson argued that Twitter should be split in two: TwitterServiceCo would be “the core Twitter service, including the social graph”; TwitterAppCo would be “all of the Twitter apps and the advertising business.”156Id. TwitterAppCo would pay TwitterServiceCo for application programming interface (“API”) access to post to timelines and read tweets, but so could other companies. As Thompson observes, this solution would “cut a whole host of Gordian Knots”: it would make it easier for new social-media entrants to compete on offering better clients or better content moderation; it would pull many controversial content-moderation decisions closer to the users they directly affect; and it would enable a far greater diversity of content moderation policies (both geographically and based on user preferences).157Id.

Needless to say, this was not the route that Musk followed after his acquisition of Twitter—but it is much closer to the route that many post-Twitter social-media services are following. In their ways, Mastodon, Bluesky, and Threads have embraced a version of the middleware ideal, but with an interesting twist. All three of these systems have a “federated” approach to hosting. Users have a direct affiliation with a server or system; they upload their posts to it, and they read other users’ posts through it.

So far, so familiar. The difference is that these services all federate with other services providing similar functionality to their own users. They copy posts from other servers; they make their own users’ posts available for other servers to copy. The result is that content posted by a user anywhere is available to all users everywhere. As a consequence, any given server has less power over its users; they can migrate to a different server without cutting themselves off from their connections on the social graph. Mastodon, for example, has built-in migration functionality that allows users to change servers and have their contacts automatically update subscriptions to the new one.

Federation also has substantial content-moderation benefits because, like middleware, it pushes content moderation closer to the listeners who are directly affected by it. Each federated server can have its own content-moderation policy—that is, each server can implement its own selection algorithm. This is not quite middleware as such, in that a server combines hosting and selection. However, it is much closer than a fully integrated platform would be. Indeed, once it hits a basic baseline of technical competence and reliability, a federated server’s principal differentiator is its moderation policy. So here, too, users who prefer a particular set of policies as listeners have the ability to choose on that basis. This, too, is speech-promoting.

The most careful theorization is of this model is Mike Masnick’s Protocols, Not Platforms.158Mike Masnick, Protocols, Not Platforms: A Technological Approach to Free Speech, Knight First Amend. Inst. at Colum. Univ. (Aug. 21, 2019), https://knightcolumbia.org/content/protocols-not-platforms-a-technological-approach-to-free-speech [https://perma.cc/ET69-VQ4E]. Masnick argues that the key move is to separate a platform into a standardized open protocol and a particular proprietary implementation of that protocol. The interoperable nature of the protocol is what ensures that implementations are genuinely competing on the basis of users’ preferences over content, and not just based on the lock-in network effects of a single platform that has the largest userbase. That is, interoperability enables migration, which enables competition, which promotes competition and speech values. Masnick gives a detailed argument for why this model promotes diversity in users’ speech preferences. I would add only that this diversity is primarily diversity of users as listeners.

To finish, I would like to note a type of selection that can come closer to the middleware goal of facilitating listener choice, even within proprietary platforms. Shareable blocklists (a) allow users to make and share a list of users they do not want to see or receive any content from, and (b) allow other users to import and use another’s shared blocklist.159See generally R. Stuart Geiger, Bot-Based Collective Blocklists in Twitter: The Counterpublic Moderation of Harassment in a Networked Public Space, 19 Info. Commc’n & Soc’y 787 (2016). Blocking is a relatively crude form of selection; it does not necessarily work against abusers or spammers who change their identity or use sock puppet accounts, nor does it let through individual worthwhile posts from users who are otherwise blocked. Still, blocklists satisfy the key desideratum: they are listener-controlled filters. Shareable blocklists have been used for email, on Twitter (before X discontinued this feature), and for ad-blocking on the web, among other settings.

Conclusion

Internet media come in different bundles of functions than pre-Internet media did. Offline, broadcast combined transmission and selection in a way that made it appear that there was a natural connection between speakers’ access to a platform and listeners’ interests, and that both were naturally opposed to media intermediaries’ own speech claims. All of this was true enough in that context, given the structural constraints of the broadcast medium.

However, the assumption that listeners and speakers are united against intermediaries is simply not true when applied beyond the broadcast context. Instead, we frequently find that intermediaries are listeners’ allies, providing them with useful assistance in finding and obtaining the speech of interest to them—and that they form a united front against speakers trying to push their speech on unwilling listeners. Applying the broadcast analogy in this context can result in making unwilling listeners into captive audiences, all while claiming that it is necessary in the Orwellian name of listeners’ rights.

Instead, I have argued that to think clearly about speech on the Internet, we must distinguish between the functions of delivering, hosting, and selecting content, and that we must see each of them from listeners’ point of view. In such a setting, carefully drafted neutrality rules on delivering and hosting can be genuinely speech-facilitating because they promote listeners’ choices. In contrast, most attempts to regulate selection interfere with listeners’ choices. There are a few exceptions—structural separation, interoperability and middleware, restrictions on self-preferencing, and chronological feed options—but all of them are about giving listeners genuine choice among selection intermediaries, or about ensuring loyalty within the intermediary-listener relationship. Beyond that, selection intermediaries should largely be free to select as they see fit, and listeners should largely be free to use them or not, as they see fit.

Seeing the Internet from listeners’ perspective is a radical leap. It requires making claims about the nature of speech and about where power lies online, which can seem counterintuitive if you are coming from the standard speaker-oriented First Amendment tradition. But once you have made that leap, and everything has snapped into focus again, it is impossible to unsee.160See Eugene Volokh, Cheap Speech and What It Will Do, 104 Yale L.J. 1805, 1834–36 (1995) (presciently arguing that the Internet will lead to an abundance of speech and shift control over that speech from speakers to listeners).

This is not to say that listeners should always get what they want, any more than speakers should. A democratic self-governance theory of the First Amendment might be acutely concerned that groups of like-minded listeners will wall themselves off inside echo chambers and filter bubbles. This is a powerful argument, and to refute it by appealing to a pure listeners’ choice principle is to beg the question. However, even if a shift to listeners’ perspective cannot resolve the debate between self-governance theories and individual-liberty theories—between collective needs and individual choices—such a shift can still clarify these debates. The fear of echo chambers and filter bubbles is fundamentally a concern about listeners’ choices, not one about speakers’ rights. Focusing on what listeners want, and on the consequences of giving it to them, makes clear what is really at stake. It also sheds light on the tradeoffs involved in adopting one media-policy regime as opposed to another.

Listeners online live in a world where countless chattering speakers vie for their attention using every dishonest and manipulative tactic they can—partisans, fraudsters, advertisers, and spammers of every stripe. Selection intermediaries are listeners’ best, and in some cases their only, line of defense against the cacophony; it can be the only way to tune out the racket and hear what they actually want to hear. Intermediaries have immense power over listeners because of it, but what listeners need is to moderate that power and tip the balance more in their favor, instead of eliminating the intermediaries entirely. Being more protective of platforms’ selection decisions gives us more room to be skeptical of their hosting and delivery decisions; it lets us better distinguish when speakers have legitimate claims against platforms and when they do not.

Listeners are at the center of the First Amendment and more so online than ever before. It is time for First Amendment theory and doctrine to get serious about listeners’ choices among speech on online platforms.

 

98 S. Cal. L. Rev. 1231

Download

* Tessler Family Professor of Digital and Information Law, Cornell Law School and Cornell Tech. I presented an earlier version of this article at The First Amendment and Listener Interests symposium at the University of Southern California on November 8–9, 2024. My thanks to the participants and organizers, and to Aislinn Black, Jane Bambauer, Kat Geddes, Erin Miller, Blake Reid, Benjamin L.W. Sobel, and David Gray Widder. The final published version of this article will be available under a Creative Commons license.

Islands of Algorithmic Integrity: Imagining a Democratic Digital Public Sphere

Introduction

A class of digitally mediated online platforms play a growing role as the primary sources of Americans’ knowledge about current events and politics. Prominent examples include Facebook, Instagram, TikTok, and X (which had formerly been known as Twitter). While only eighteen percent of Americans cited social media platforms as their preferred source of news in 2024, this number had risen by a striking six points since 2023.1Christopher St. Aubin & Jacob Liedke, News Platform Fact Sheet, Pew Rsch. Ctr. (Sept. 17, 2024), https://www.pewresearch.org/journalism/fact-sheet/news-platform-fact-sheet [https://perma.cc/SJ49-28W6]. These platforms also compete in “one of the most concentrated markets in the United States,”2Caitlin Chin-Rothmann, Meta’s Threads: Effects on Competition in Social Media Markets, Ctr. for Strategic & Int’l Stud. (July 19, 2023), https://www.csis.org/analysis/metas-threads-effects-competition-social-media-markets [https://perma.cc/2MQN-YSUR]. as a consequence of network effects and high barriers to entry.3Id. Current trends suggest that social media will soon outpace traditional news websites as the main source for a plurality of Americans’ understanding of what happens in the world.4St. Aubin & Liedke, supra note 1. Such platforms, which I will call “social platforms” here, are thus in practice a central plank of the political public sphere given their growing role in supplying so many people with news.

The role that social platforms play in public life has sparked a small avalanche of worries even before the extraordinary entanglement of big tech’s corporate leadership with the partisan policy projects of the second Trump administration.5This essay was completed in late 2024 and edited in early 2025. I have not tried here to account for the synergistic entanglement of Elon Musk and the Trump White House, nor for the ways in which the X social platform has changed as a result. It is, as I write, too early to say how this exorbitant display of codependency between partisan and technological projects will alter the American public sphere. The worries are diverse. Many commentators have aired concerns about the effects of social-platform use on mental health and sexual mores,6See, e.g., Surgeon General Issues New Advisory About Effects Social Media Use Has on Youth Mental Health, U.S. Dept. of Health & Human Servs. (May 23, 2023), https://www.hhs.gov/about/news/2023/05/23/surgeon-general-issues-new-advisory-about-effects-social-media-use-has-youth-mental-health.html (noting “ample indicators that social media can also pose a risk of harm to the mental health and well-being of children and adolescents”). or the extent of economic exploitation in this platform-based gig economy.7See, e.g., Veena Dubal, On Algorithmic Wage Discrimination, 123 Colum. L. Rev. 1929, 1944 (2023). These important cultural and economic worries are somewhat distinct from worries surrounding the political functions of the digital public sphere. It is the latter’s pathologies, and only those problems, that this essay—as well as the broader symposium on listeners’ rights in which it participates—concentrates on.

Even within the narrower compass of political speech defined in strict and demotic terms, the role of social platforms raises several distinct concerns. I take up three common lines of criticism and concern here. A first line of critique focuses on these platforms’ alleged harmful effects on a broad set of user beliefs and dispositions thought to be needful for democratic life. Social platforms, it is said, pull apart the electorate by feeding them fake news, fostering filter bubbles, and foreclosing dialogue—to the point where democratic dysfunction drives the nation toward a violent precipice. This first argument concerns platforms’ effects on the public at large.

A second common line of argument, by contrast, makes no claim about the median social platform user. It instead focuses on the “radicaliz[ing]” effect of social media engagement on a small handful of users at the ideological margin.8Steven Lee Myers & Stuart A. Thompson, Racist and Violent Ideas Jump from Web’s Fringes to Mainstream Sites, N.Y. Times (June 1, 2022), https://www.nytimes.com/2022/06/01/technology/fringe-mainstream-social-media.html [https://web.archive.org/web/20250219041047/https://www.nytimes.com/2022/06/01/technology/fringe-mainstream-social-media.html]. If even these few users resort to violence to advance their views, it might be said that social media has had a deadly effect.9Id. This is an argument not about social platforms’ effects on the mass of users, but upon the behavior of a small tail of participants in the online world.

Yet a third sort of argument against social platforms does not sound in a strictly consequentialist register. It does not lean, that is, on any empirical evidence as to how users are changed by their engagement. Rather, it is a moral argument that picks out objectionable features of the relationship between platforms and their users. This plainly asymmetrical arrangement, it is said, allows invidious manipulation, exploitation, or even a species of domination. Even if users’ behaviors do not change, these characteristics of the platform-user relationship are said to be insalubrious. Especially given the role that algorithmic design plays in shaping users’ online experiences, it is argued, a morally problematic imbalance emerges between ordinary people and the companies that manage social platforms. In the limited case, in which there are few potential sources of information and in which those sources are controlled and even manipulated by their owners (usually men of a certain age who are disdainful of civility and truthfulness norms), an acute concern about domination arises.

If one accepts one of these arguments (and I will try to offer both their best versions and to explore their weaknesses in what follows), then there is some reason to think closely about the way social platforms are governed, and to look for regulatory interventions. Such governance might be supplied by platforms’ own endogenous rules, which are usually embodied in their contractual terms of service or other internal procedures (such as mechanisms to dispute a take-down or deplatforming decision). Alternatively, governance could be supplied by exogenous legislation or regulation promulgated by a state. Private governance and legal regulation, of course, are potential substitutes. They can both be used to achieve the same policy goals. But how? What should such governance efforts, whether private or public, aspire to? And which policy levers are available to achieve it?

Where a platform employs algorithmic tools to shape users’ experience by determining what they see, the range of potential interventions will be especially large. This is a result of the complexity of common computational architectures today. There are many ways to craft the algorithms on which many platforms run.10See Arvind Narayanan, Understanding Social Media Recommendation Algorithms, Knight First Amend. Inst. 9–12 (March 9, 2023), https://knightcolumbia.org/content/understanding-social-media-recommendation-algorithms [https://perma.cc/9WVD-7NJ6] (discussing common structural elements). And there are many technical choices about which instruments to use, how to calibrate them, and what parameter (engagement? a subset of engagement?) to optimize. Many of these decision points offer opportunities for unavoidably normative choices about the purpose and intended effects of social platforms. Resolving those choices in turn requires some account of what it means exactly to talk about a normatively desirable social platform: That is, what should a social platform do? And for whom?

Such questions takes on greater weight given (1) recent regulatory moves by American states to control platforms’ content moderation decisions;11Tyler Breland Valeska, Speech Balkanization, 65 B.C. L. Rev. 903, 905 (2024) (“In 2021 and 2022 alone, state legislators from thirty-four states introduced more than one hundred laws seeking to regulate how platforms moderate user content.”). (2) a recent Supreme Court decision responding to those efforts;12Moody v. NetChoice, LLC, 603 U.S. 707 (2024); see infra text accompanying notes 124–26. and (3) the European Union’s Digital Services Act, a statute that takes yet a different and more indirect tack in modulating platform design and its ensuing costs.13Regulation (EU) 2022/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market for Digital Services and Amending Directive 2000/31/EC (Digital Services Act), 2022 O.J. (L 277) 3 [hereinafter “Digital Services Act”]. Or consider a 2025 U.S. Supreme Court decision, rendered on a tightly expedited schedule, to uphold federal legislation banning TikTok.14TikTok Inc. v. Garland, 145 S. Ct. 57, 72 (2025) (per curiam). The legislation in question is the Protecting Americans from Foreign Adversary Controlled Applications Act, Pub. L. No. 118–50, 138 Stat. 955 (2024). The decision makes the remarkable suggestion that legislative control over social platforms—exercised by reshaping (or cutting off) the ordinary market from corporate control (for example, by forcing or by restricting a sale)—raises only weak First Amendment concerns. Applied broadly, such an exception from close constitutional scrutiny might allow broad state control over social platforms.

My main aim in this essay is to offer a new and fruitful analytic lens for thinking about these problems as questions of democratic institutional design. This is a way of approaching the problem of institutional design, not a set of prescriptions for how to do such design. I do so by pointing to a model of a desirable platform, and then asking how we can move toward that aspiration, and how much movement might be impeded or even thwarted. My aspirational model is not conjured out of the ether; rather, I take inspiration from an idea found in the scholarly literatures in political science and sociology that evaluates pathways of economic development. The idea upon which I draw is that development policy should aim to seed “islands of integrity” into patrimonial or nepotistic state structures as a way of building foundations for a more robust—and hence public-regarding—state apparatus.15For examples of the term in recent studies, see Monica Prasad, Proto-Bureaucracies, 9 Socio. Sci. 374, 376 (2022); Eliška Drápalová & Fabrizio Di Mascio, Islands of Good Government: Explaining Successful Corruption Control in Two Spanish Cities, 8 Pol. & Governance 128, 128 (2020). For further discussion, see infra Part II. This literature focuses on the question of the state’s seeds and nurtures zones (or those of another interested party, such as a private foundation or an international organization) where public-regarding norms, not self-regarding or selfish motives, dominate as a means of generating public goods.

By analogy to the examples of effective public administration discussed in this literature, I will suggest here that we should think about public-regarding platforms as “islands of algorithmic integrity” that advance epistemic and deliberative public goods with due regard to the potential for either exploitation or manipulation inherent in the use of sophisticated computational tools. With that threshold understanding in mind, we should then focus on how to achieve that specific, affirmative model—and not simply on how to avoid narrowly-defined and specific platform-related

harms. An affirmative ideal, that is, provides a baseline against which potential reform proposals can be evaluated.16I am hence not concerned here with the First Amendment as a template or limit to institutional design. The constitutional jurisprudence of free speech provides a different benchmark for reform. I largely bracket that body of precedent here in favor of an analytic focus on the question of what functionally might be most desirable.

To be very clear up front, this approach has limitations. It draws on the “island of integrity” literature here as a general source for inspiration, instead of a source for models that can be directly transposed. I do not think that there is any mechanical way of taking the lessons of development studies and applying them to the quite different virtual environment of social platforms. To the extent lessons emerge, they are at a high level of abstraction. Still, studies of islands of bureaucratic integrity in the wild can nevertheless offer a useful set of analogies: they point toward the possibility of parallel formations in the online world. They also help us see that there are already significant web-based entities that exemplify certain ideals of algorithmic integrity in practice because they hew to the general lessons falling out of the islands of integrity literature. These studies can illuminate how a more democratically fruitful digital public sphere might begin to be built given our present situation, even if they cannot offer a full blueprint of its ultimate design.

It is worth noting that my analytic approach here rests on an important and controversial assumption. That is, I help myself to the premise that reform of the digital public sphere can proceed first by the cultivation of small-scale sites of healthy democratic engagement and that these can be scaled up. But this assumption may not be feasible. It may instead be necessary to start with a “big bang”: a dramatic and comprehensive sweep of extant arrangements followed by a completely new architecture of digital space. If, for example, you thought that the problem of social platforms began and ended in their concentrated ownership in the hands of a few bad-spirited people, then the creation of new, more democratic platforms would not necessarily lead to a comprehensive solution. Given disagreement about the basic diagnosis of social platforms’ malady, it is hard to know which of these approaches is more sensible. Therefore, there is some value to exploring a piecemeal reform approach of the sort illuminated here. But that does not rule out the thought that a more robust “big bang” approach is in truth needed.

Part I of this essay begins with a brief survey of the main normative (consequentialist and deontic) critiques that are commonly lodged against social platforms, focusing on the three listed above. In Part II, I introduce the “islands of integrity” lens—briefly summarizing relevant sociological and political science literature—as a means to directly think about social platform reforms. My aim in so doing is to provide a litmus test for thinking about social platform reform in the round. With that lens in hand, Part III critically considers the regulatory strategies pursued by the American states and the European Union to date. I suggest some reasons to worry that these are unlikely to advance islands of algorithmic integrity. I close by reflecting on some alternative regulatory tactics that might move us quicker toward that goal.

I. The Case(s) Against Social Platforms

What is a social platform? Do such all platforms work in the same way and raise the same kind of normative objections? Or are objections to platforms better understood as training on a subset of cases or applications? This Part sets some groundwork for answering these questions by defining the object of my inquiries and by offering some technical details about different kinds of platforms. I then taxonomize the three different objections that are commonly lodged against social platforms as they currently operate.

A. Defining Social Platforms and Their Algorithms

A “platform” is “a discrete and dynamic arrangement defined by a particular combination of socio-technical and capitalist business practices.”17Paul Langley & Andrew Leyshon, Platform Capitalism: The Intermediation and Capitalisation of Digital Economic Circulation, 3 Fin. & Soc’y 11, 13 (2017). A subset of platforms are understood by their users as distinctively “social” rather than “commercial” insofar they provide a space for interpersonal interaction, intercalated with other activities such as “reading political news, watching media events, and browsing fashion lines.”18Lisa Rhee, Joseph B. Bayer, David S. Lee & Ozan Kuru, Social by Definition: How Users Define Social Platforms and Why It Matters, Telematics & Informatics, 1, 1 (2020). The leading “social platforms,” as I shall call them here, are Facebook, X, Instagram, and TikTok.19Id. I have added TikTok to the list in the cited text. I use the term “social platforms” because “social media platforms” is overly clunky and merely “platforms” is too vague.

Not all social platforms propagate content in the same way. There are two dominant kinds of system architecture. The first is the social network, where users see posts by other users who they follow (or subscribe to) as well as posts those users chose to amplify.20Narayanan, supra note 10, at 10. When Facebook and Twitter allowed users to reshare or retweet posts, they enabled the emergence of networks of this sort.21Id. Note that before the affordances that allowed users to share content in these ways, these had limited network capacity. Here, what one sees depends on who one “knows.” Interconnected webs of users on a network can experience “information cascades” as information flows rapidly across the system.22Id. This is known colloquially as “going viral.” The possibility of virality depends not just on platform design but also on users’ behaviors. But, in practice a very small number of posts go viral on social networks.23Id. at 15. Attention is a scarce commodity. We cannot and do not absorb most of what’s posted online. Our inability to absorb much means that it is only possible for a few items to achieve virality.

The second possible architecture is centered around an algorithm (or, more accurately, algorithms). On platforms of this sort, the stream of data observed by a user is largely shaped by a suite of complex algorithms, which are computational decisional tools that proceed through a series of steps to solve a problem. These algorithms, in the aggregate, are designed with certain goals in mind, such as maximizing the time users spend on the platform.24Id. at 10. Networks require both content processing tools (e.g., face recognition, transcription, and image filters) and also content propagation tools (e.g., search, recommendation, and content moderation). Id. at 8. I am largely concerned here with content propagation tools. TikTok’s “For You Page,” Google Discover, and YouTube all rely at least in part on algorithms.25Id. at 11.

In practice, what is for the sake of simplicity called “the algorithm” can be disaggregated into several different design elements, each of which is in truth a distinct algorithm or digital artifact. These include (1) the “surfaces of exposure” (that is, the visual interface encountered by users); (2) a primary ranking model (often a two-stage recommender system that combs through and filters potential posts); (3) peripheral models, which rank content that appears around the main surface of exposure (for example, ads); and (4) auxiliary models (for example, content moderation for illegal materials or posts that violate terms of service).26Kristian Lum & Tomo Lazovich, The Myth of the Algorithm: A System-Level View of Algorithmic Amplification, Knight First Amend. Inst. (Sept. 13, 2023), https://knightcolumbia.org/content/the-myth-of-the-algorithm-a-system-level-view-of-algorithmic-amplification [https://perma.cc/4WBQ-34WN]. For the sake of simplicity, I will refer to them together only as “the algorithm,” but it is worth keeping in mind that this is a simplification, and in fact there are multiple instruments at stake.

Algorithm design implicates many choices. At the top level, for example, an algorithmic model can be braided into a network model or integrated into a subscription-service model.27Narayanan, supra note 10, at 10–11 (“[N]o platform implements a purely algorithmic model . . . .”). At a more granular level, algorithms can be designed to optimize a broad range of varied parameters. These range from “meaningful social interactions” (Facebook’s measure at one point in time) to user’s watch time (YouTube’s measure) to a combination of liking, commenting, and watching frequencies (TikTok’s measure).28Id. at 19. The choice of parameter to optimize is important. Most common parameters quantify some element of users’ engagement with the platform, but they do so in different ways. Engagement measures are relevant from the platforms’ perspectives given their economic reliance on the revenue from advertising displayed to users.29For a useful account of the behavioral advertising industry, see generally Tim Hwang, Subprime Attention Crisis (2020). In theory, more engagement means more advertising revenue. But engagement on social platforms is surprisingly sparse. Somewhere between only one percent and five percent of posts on most social platforms generate any engagement at all.30Narayanan, supra note 10, at 28. And the movement from engagement to advertising is rarer still: most targeted online advertising is simply “ignored.”31Hwang, supra note 29, at 77; accord Narayanan, supra note 10, at 29.

B. Consequentialist Critiques of Social Platforms

There are, as I read the literature, three clusters of normative concerns raised by social platforms that merit consideration as the most important and common criticisms made of those technologies.32I recognize that there are complaints beyond those that I adumbrate here. I have selected those that seem to me supported by evidence and a coherent moral theory. I have ignored those wanting in such necessary ballast. Two are consequentialist, in the sense of training on allegedly undesirable effects of social platforms. Of course, such arguments need some means of evaluating downstream effects as either desirable or undesirable. In practice, they rest on some account of democracy as an attractive—even ideal—political order. (Note that as is often the case in legal scholarship, the precise kind of “democracy” at work in these critiques is not always fully specified. This lack of specification is a gap that will prove relevant in the analysis that follows.)33For an illuminating recent discussion on the varieties of democratic theory, see generally Jason Brennan & Hélène Landemore, Debating Democracy: Do We Need More or Less? (2021). The other cluster is deontic, in the sense of picking out intrinsically unattractive qualities of social platforms. These accounts do not rely on a causal claim about the effects of social platforms; they instead assert the prima facie unacceptability of platforms in themselves.

Let’s begin with the two consequentialist arguments and then move on to the deontic critique.

A first view widely held in both the academic and non-academic public spheres is that social platforms cause political dysfunction in a democracy because of their effects on the dispositions and beliefs of the general public.34See, e.g., Helen Margetts, Rethinking Democracy with Social Media, 90 The Pol. Q., Jan. 2019, 107, at 107 (assigning blame to social media for “pollution of the democratic environment through fake news, junk science, computational propaganda and aggressive microtargeting and political advertising”; for “creating political filter bubbles”; and for “the rise of populism, . . . the end of democracy and ultimately, the death of democracy.”). Using social platforms, this argument goes, drives (1) a dynamic of “affective polarization” (negative emotional attitudes towards members of opposition parties), or (2) traps us in “echo chambers” or filter bubbles that are characterized by limited, biased information.35Jonathan Haidt, Yes, Social Media Really Is Undermining Democracy, The Atlantic (July 28, 2022), https://www.theatlantic.com/ideas/archive/2022/07/social-media-harm-facebook-meta-response/670975 [https://perma.cc/7FFV-QRPB]. Social media users are also said to be exposed to “fake news,” which are “fabricated information that mimics news media content in form but not in organizational process or intent.”36David M. J. Lazer, Matthew A. Baum, Yochai Benkler, Adam J. Berinsky, Kelly M. Greenhill, Filippo Menczer, Miriam J. Metzger, Brendan Nyhan, Gordon Pennycook, David Rothschild, Michael Schudson, Steven A. Sloman, Cass R. Sunstein, Emily A. Thorson, Duncan J. Watts & Jonathan L. Zittrain, The Science of Fake News: Addressing Fake News Requires a Multidisciplinary Effort, 359 Sci. 1094, 1094 (2018); see also Edson C. Tandoc Jr., The Facts of Fake News: A Research Review, Soc. Compass, July 25, 2019, at 1, 2 (“[Fake news] is intended to deceive people, and it does so by trying to look like real news.”). For examples, see Aziz Z. Huq, Militant Democracy Comes to the Metaverse?, 72 Emory L.J. 1105, 1118–19 (2023). The terms “misinformation” and “disinformation” are also used to describe fake news and its variants. I leave aside questions about how to exactly define and distinguish these terms. High levels of exposure are said to be driven by algorithmic amplification.37See, e.g., Haidt, supra note 35; Zeynep Tufekci, Algorithmic Harms Beyond Facebook and Google: Emergent Challenges of Computational Agency, 13 Colo. Tech. L.J. 203, 215 (2015) (criticizing Facebook for its power to “alter the U.S. electoral turnout” through algorithmic manipulation). Recent advances in deep-fake-creation tools have further spurred worries about an “information apocalypse” that destroys “public trust in information and the media.”38Mateusz Łabuz & Christopher Nehring, On the Way to Deep Fake Democracy? Deep Fakes in Election Campaigns in 2023, 23 Eur. Pol. Sci. 454, 457 (2024). Platforms, in this view, foster a world in which citizens lack a shared reservoir of mutual tolerance and factual beliefs about the world. Such deficiencies are said to render meaningful political debate on social platforms challenging—perhaps even impossible. As a result of these changes in peoples’ dispositions, the possibility of democratic life moves out of reach.

These arguments hence assume that democratic life requires the prevalence of certain attitudes and beliefs in order to be durably sustained (an assumption that may or may not be empirically justified). Another way in which these concerns can concretely be understood is to view them in light of the rise of anti-system parties,39Giovanni Capoccia, Anti-System Parties: A Conceptual Reassessment, 14 J. Theoretical Pol. 9, 10–11 (2002) (offering several different definitions of that term). which are characterized by their limited regard for democratic norms. Platforms might facilitate the growth of such anti-system candidates who disrupt or even undermine democratic norms such as broad trust in the state and in co-citizens. Through this indirect path, platforms have a detrimental effect on democracy’s prospects.

There are surprisingly few empirical studies that support the existence of a robust causal connection between social platforms and democratically necessary trust.40There is one experiment focused on search ranking that finds political effects, but the experiment is more than a decade old and focuses on how search results are displayed, not on the central issue of platform design today. Robert Epstein & Ronald E. Robertson, The Search Engine Manipulation Effect (SEME) and Its Possible Impact on the Outcomes of Elections, 112 Proc. Nat’l Acad. Sci. E4512, E4518–20 (2015). Yet some evidence for it can be found in the behaviors and beliefs of significant political actors. President Donald Trump, for example, declared in November 2016 that Facebook and Twitter had “helped him win” the 2016 U.S. presidential election.41Rich McCormick, Donald Trump Says Facebook and Twitter ‘Helped Him Win’, The Verge (Nov. 13, 2016, 7:02 PM PST), https://www.theverge.com/2016/11/13/13619148/trump-facebook-twitter-helped-win [https://perma.cc/5MUQ-7R73]. Since 2020, conservative donors such as the Bradley Impact Fund and the Conservative Partnership Fund have contributed millions to Republican-aligned groups combating effects to “take a tougher line against misinformation online.”42Jim Rutenberg & Steven Lee Myers, How Trump’s Allies Are Winning the War Over Disinformation, N.Y. Times, https://www.nytimes.com/2024/03/17/us/politics/trump-disinformation-2024-social-media.html [https://web.archive.org/web/20250401001211/https://www.nytimes.com/2024/03/17/us/politics/trump-disinformation-2024-social-media.html]. Such significant financial investments by important political actors, beyond merely cheap talk, suggest that social platforms do have predictable partisan effects for candidates and parties that have an arguable anti-systemic orientation.43A mea culpa: in previous work, I was too credulous in respect to claims of platform-related harms. Huq, supra note 36, at 1118–19. I should have been more cautious.

On the other hand, well-designed empirical studies have cast doubt on the negative, large-“N” effects of social platforms.44For a prescient popular argument to that effect, see Gideon Lewis-Kraus, How Harmful Is Social Media?, New Yorker (June 3, 2022), https://www.newyorker.com/culture/annals-of-inquiry/we-know-less-about-social-media-than-we-think [https://perma.cc/7FFV-QRPB]. Four studies are illustrative. A first well-designed randomized experiment, which tested the effect of platform deactivation for several weeks before the 2020 election, found no statistically significant effects of platform exposure on affective polarization, issue polarization, or vote choice.45The study found a non-significant pro-Trump effect from Facebook usage but cautioned against treating this finding as generalizable. Hunt Allcott, Matthew Gentzkow, Winter Mason, Arjun Wilkins, Pablo Barberá, Taylor Brown, Juan Carlos Cisneros, Adriana Crespo-Tenorio, Drew Dimmery, Deen Freelon, Sandra González-Bailón, Andrew M. Guess, Young Mie Kim, David Lazer, Neil Malhotra, Devra Moehler, Sameer Nair-Desai, Houda Nait El Barj, Brendan Nyhan, Ana Carolina Paixao de Queiroz, Jennifer Pan, Jaime Settle, Emily Thorson, Rebekah Tromble, Carlos Velasco Rivera, Benjamin Wittenbrink, Magdalena Wojcieszak, Saam Zahedian, Annie Franco, Chad Kiewiet de Jonge, Natalie Jomini Stroud & Joshua A. Tucker, The Effects of Facebook and Instagram on the 2020 Election: A Deactivation Experiment, 121 Proc. Nat’l Acad. Sci., 1, 8–9 (2024). A second random experiment focused on the difference between Facebook’s default algorithms and a reverse-chronological feed. Again, the study found no effect on affective polarization, issue polarization, or political knowledge after switching from a network-driven feed to an algorithmically-driven feed, even though the use of a reverse chronological feed increased the amount of “untrustworthy” content seen.46Andrew M. Guess, Neil Malhotra, Jennifer Pan, Pablo Barberá, Hunt Allcott, Taylor Brown, Adriana Crespo-Tenorio, Drew Dimmery, Deen Freelon, Matthew Gentzkow, Sandra González-Bailón, Edward Kennedy, Young Mie Kim, David Lazer, Devra Moehler, Brendan Nyhan, Carlos Velasco Rivera, Jaime Settle, Daniel Robert Thomas, Emily Thorson, Rebekah Tromble, Arjun Wilkins, Magdalena Wojcieszak, Beixian Xiong, Chad Kiewiet de Jonge, Annie Franco, Winter Mason, Natalie Jomini Stroud & Joshua A. Tucker, How Do Social Media Feed Algorithms Affect Attitudes and Behavior in an Election Campaign?, 381 Sci. 398, 402 (2023). This null finding from a study of opting into algorithmic content propagation has been replicated in a separate study of YouTube.47Homa Hosseinmardi, Amir Ghasemian, Aaron Clauset, Markus Mobius, David M. Rothschild & Duncan J. Watts, Examining the Consumption of Radical Content on YouTube, 118 Proc. Nat’l Acad. Sci., 1, 1 (2021).

Finally, an empirical inquiry into exposure to fake news found only a very small positive effect on the vote share of populist candidates in European elections.48Michele Cantarella, Nicolò Fraccaroli & Roberto Volpe, Does Fake News Affect Voting Behaviour?, Rsch. Pol’y, Jan. 2023, at 1, 2. Another study of 1,500 users in each of three countries (France, the United Kingdom, and the United States) identified no correlation between social platform use and more extreme right-wing views; indeed, in the United States, they found a negative correlation.49Shelley Boulianne, Karolina Koc-Michalska & Bruce Bimber, Right-Wing Populism, Social Media and Echo Chambers in Western Democracies, 22 New Media & Soc’y 683, 695 (2020). The authors concluded that their “findings tend to exonerate the Internet generally and social media in particular, at least with respect to right-wing populism.”50Id. Finally, a 2017 study found that President Trump erred when he claimed that Twitter and X helped him in the 2016 election; again, that study found a negative correlation between more extreme right-wing views and social platform usage.51Jacob Groshek & Karolina Koc-Michalska, Helping Populism Win? Social Media Use, Filter Bubbles, and Support for Populist Presidential Candidates in the 2016 US Election Campaign, 20 Info., Commc’n & Soc’y 1389, 1397 (2017) (“American voters who used social media to actively participate in politics by posting their own thoughts and sharing or commenting on social media were actually more likely to not support Trump as a candidate.”).

Summarizing the available research (including these studies) in a June 2024 issue of Nature, a team of respected scholars concluded that “exposure to misinformation is low as a percentage of people’s information diets” and further “the existence of large algorithmic effects on people’s information diets and attitudes has not yet been established.”52Ceren Budak, Brendan Nyhan, David M. Rothschild, Emily Thorson & Duncan J. Watts, Misunderstanding the Harms of Online Misinformation, 630 Nature 45, 47–48 (2024); accord Sacha Altay, Manon Berriche & Alberto Acerbi, Misinformation on Misinformation: Conceptual and Methodological Challenges, Soc. Media + Soc’y, Jan.–Mar. 2023, at 1, 3 (“Misinformation receives little online attention compared to reliable news, and, in turn, reliable news receives little online attention compared to everything else that people do.”). The Nature team warned that the extent to which social platforms undermine political knowledge depends on the availability of other news sources. Where countries “lack reliable mainstream news outlets,” their negative knowledge-related spillovers may be greater.53Budak et al., supra note 52, at 49. I do not pursue that suggestion here, since it invites a bifurcated analysis that separately considers different national jurisdictions, depending on the robustness of their non-digital media ecosystems. What follows should be taken as parochially relevant to North American and European democracies (at least for now) but not the larger world beyond that.

A second view of social platforms’ harms identifies not its spillovers at scale, but rather its effects on certain narrow slices of the population—in particular, those at the tails of the ideological distribution. The intuition here is that engagement with social platforms may not change the dispositions or beliefs of most people, but there is a small subset of individuals who adopt dramatically divergent beliefs (and even behaviors) as consequences of their platform use. “Tail effects” of this sort may not be significant for democratic life under some circumstances, but of particular relevance, there is some evidence of increased support for political violence among Americans.54At least some surveys suggest rising levels of positive attitudes to violence. See Ashley Lopez, More Americans Say They Support Political Violence Ahead of the 2024 Election, NPR, https://www.npr.org/2023/10/25/1208373493/political-violence-democracy-2024-presidential-election-extremism [https://perma.cc/ZM4L-BRRV]. For other findings exhibiting a concentration of such support at the rightward end of the political spectrum, see Miles T. Armaly & Adam M. Enders, Who Supports Political Violence?, 22 Persp. on Pol. 427, 440 (2024). Extremism at the tails in this context and about this sentiment may have profound consequences. At a moment when President Trump has (twice) faced near-assassination during the 2024 presidential election cycle, and considering how his supporters previously precipitated a deadly confrontation at a 2021 Joint Session of Congress meant to count Electoral College votes, it seems prudent to reckon with the risk that radicalized individuals—even if few in number—may be able to inflict disproportionate harms on institutions that are necessary for core democratic political processes.

This more narrowly gauged claim stands on firmer empirical ground than the critiques of social platforms’ large-“N” effects discussed above. A 2024 study of fake news’ circulation on Twitter found that 0.3 percent of users account for four-fifths of its fake news volume.55Sahar Baribi-Bartov, Briony Swire-Thompson & Nir Grinberg, Supersharers of Fake News on Twitter, 384 Sci. 979, 980 (2024). These “supersharers,” who tended to be older, female, and Republican, in turn reached a “sizable 5.2% of registered voters on the platform.”56Id. at 979. Note that this is not necessarily the population one would expect to engage in political violence. A different study published around the same time also found “asymmetric . . . political news segregation” with “far more homogenously conservative domains and URLs circulating on Facebook” and “a far larger share” of fake news on the political right.57Sandra González-Bailón, David Lazer, Pablo Barberá, Meiqing Zhang, Hunt Allcott, Taylor Brown, Adriana Crespo-Tenorio, Deen Freelon, Matthew Gentzkow, Andrew M. Guess, Shanto Iyengar, Young Mie Kim, Neil Malhotra, Devra Moehler, Brendan Nyhan, Jennifer Pan, Carlos Velasco Rivera, Jaime Settle, Emily Thorson, Rebekah Tromble, Arjun Wilkins, Magdalena Wojcieszak, Chad Kiewiet de Jonge, Annie Franco, Winter Mason, Natalie Jomini Stroud & Joshua A. Tucker, Asymmetric Ideological Segregation in Exposure to Political News on Facebook, 381 Sci. 392, 397 (2023).

Such findings are consistent with wider-angle studies of partisan polarization, which find different microfoundations on the political left and right.58Craig M. Rawlings, Becoming an Ideologue: Social Sorting and the Microfoundations of Polarization, 9 Socio. Sci. 313, 337 (2022). The Nature team mentioned above hence concluded that exposure to misinformation is “concentrated among a small minority.”59Budak et al., supra note 52, at 48. Those who consume false or otherwise potentially harmful content are already attuned to such information and actively seek such content out.60Id. Platforms, however, do not release “tail exposure metrics” that could help quantify the risk of harm from such online interactions.61Id. at 50; see also Vivian Ferrillo, r/The_Donald Had a Forum: How Socialization in Far-Right Social Media Communities Shapes Identity and Spreads Extreme Rhetoric, 52 Am. Pol. Rsch. 432, 443 (2024) (finding that users who engage often with a far-right community also use far-right vocabulary more frequently in other spaces on their platform, contributing to the spread and normalization of far-right rhetoric). As a result, it is hard to know how serious the problem may be.

What of the concern that social platforms conduce to “filter bubbles” that constrain the range of information sources users can access in problematic ways?62For an influential treatment of the topic, see generally Eli Pariser, The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think (2012). Once again, the evidence is at best inconclusive. A 2016 study found that social homogeneity of users predicted the emergence of echo chambers characterized by asymmetrical patterns of news sharing.63Michela Del Vicario, Alessandro Bessi, Fabiana Zollo, Fabio Petroni, Antonio Scala, Guido Caldarelli, H. Eugene Stanley & Walter Quattrociocchi, The Spreading of Misinformation Online, 113 Proc. Nat’l Acad. Sci. 554, 558 (2016). At the same time, the study offered no empirical evidence about the extent or effects of filter bubbles “in the wild,” so to speak. A 2021 review identified divergent results in studies surveying human users of social platforms or digital trace data; yet, it identified only a handful of studies substantiating the concern.64Ludovic Terren & Rosa Borge, Echo Chambers on Social Media: A Systematic Review of the Literature, 9 Rev. Commc’n Rsch. 99, 110 (2021) (reviewing fifty-five studies and finding only five yielding no evidence of echo chambers). A 2022 meta-study found that “most people have relatively diverse media diets,” and only “small minorities, often only a few percent, exclusively get news from partisan sources.”65Amy Ross Arguedas, Craig T. Robertson, Richard Fletcher & Rasmus K. Nielsen, Echo Chambers, Filter Bubbles, and Polarisation: A Literature Review 4 (2022), available at https://ora.ox.ac.uk/objects/uuid:6e357e97-7b16-450a-a827-a92c93729a08. Again, the empirical foundations of the normative worry here seem shaky.

Even if the evidence of filter bubbles existing was more robust, filter bubbles’ substantiated existence would not necessarily be cause for concern. Concern about filter bubbles focuses on the asymmetric character of the information voters consume; this then assumes that there is a counterfactual condition under which the voter might receive a “balanced” diet of information. But what does it mean to say that a person’s news inputs are balanced or symmetrical? Does it require equal shares of data that support Republican and Democratic talking points? What if one of those parties is more likely than the other to lean on false empirical claims? Should a balanced informational diet reflect or discount for such a lean? How are the problems of misinformation or distorted information to be addressed? Is it part of a balanced informational diet to receive a certain amount of “fake news”? These questions admit of no easy answers. Rather, they suggest that the concern with filter bubbles trades on a notion of balance that is hard to cash out in practice without difficult anterior ideological and political choices.

In brief, the available empirics suggest that consequentialist critiques of social platforms are better focused on tail effects instead of the way platform engagement changes the median user or the mass of users. It is also worth underscoring a point that is somewhat obscured by the bottom-line results of these studies but implicit in what I have just set out. That is, the tail effects of social platforms arise from a complex and unpredictable mesh of interactions between technical design decisions and users’ decisions. The external political environment hence shapes platforms’ spillover effects, and when that environment is more polarized and more prone to panics or even violence, it seems likely that the tail risks of social platforms would correspondingly rise. When, by contrast, there are a plethora of reliable non-digital sources which are accurate and easily accessible, the threat to democratic life from social platforms may well be far less acute.

C. Deontic Critiques of Social Platforms

Critiques of social platforms do not need to rest on evidence of their consequences. It is also possible to pick out features of the relationship between platforms and users as morally problematic even in the absence of any harm arising. Two particular strands of such “deontic” critique can be traced in existing literature.

First, social platforms (among other entities) gather data about their users and then use that data to target advertisements to those same users. For many, this circular pattern of data extraction and deployment constitutes a morally problematic exploitation. Such exploitation occurs when “one party to an ostensibly voluntary agreement intentionally takes advantage of a relevant and significant asymmetry of knowledge, power, or resources” to offer otherwise unacceptable contracting terms.66Claire Benn & Seth Lazar, What’s Wrong with Automated Influence, 52 Canadian J. Phil. 125, 135 (2022).

Shoshana Zuboff, who is perhaps the leading expositor of this view, argues that platforms have “scraped, torn, and taken for another century’s market project” the very stuff of “human nature.”67Shoshana Zuboff, The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power 94 (2019). She condemns the “rendition” and “dispossession of human experience” through “datafication.”68Id. at 233–34. Zuboff’s critique of platform exploitation is nested in a broader set of concerns about the presently hegemonic form of “informational” or “financial” capitalism. Reviewing Zuboff’s book, Amy Kapczynski thus asserts that “informational capitalism brings a threat not merely to our individual subjectivities but to our ability to self-govern.”69Amy Kapczynski, The Law of Informational Capitalism, 129 Yale L.J. 1460, 1467 (2020). Similarly, danah boyd characterizes private firms’ use of digital power as a malign manifestation of “late-stage capitalism . . . driven by financialization.”70danah boyd, The Structuring Work of Algorithms, 152 Dædalus 236, 238 (2023). And as Katharina Pistor puts it, “[t]he real threat that emanates from Big Tech using big data is not just market dominance . . . [but] the power to transform free contracting and markets into a controlled space that gives a huge advantage to sellers over buyers.”71Katharina Pistor, Rule by Data: The End of Markets?, 83 Law & Contemp. Probs. 101, 117 (2020); accord Julie E. Cohen, Law for the Platform Economy, 51 U.C. Davis L. Rev. 133, 145–48 (2017). The structure of financial or quasi-financial transactions on social platforms, in this view, conduces systemically to users’ exploitation.

In an earlier piece, I have expressed sharp skepticism elsewhere about the empirical and normative arguments offered by Zuboff and Kapczynski.72Mariano-Florentino Cuéllar & Aziz Z. Huq, Economies of Surveillance, 133 Harv. L. Rev. 1280, 1298 (2020). Their concerns about exploitation seem to trade on imprecise and potentially misleading analogies to more familiar and normatively troubling forms of economic exploitation, despite meaningful differences in structure and immediate effect. Indeed, both analogies fail to take those differences seriously. More generally, their arguments borrow a suite of concerns associated with the larger structures of economic life labeled “neoliberalism,” which have developed since the 1970s. Such critiques of neoliberalism, however, concern aspects of economic life that have little to do with social platforms (for example, deregulation and financialization). One can have neoliberalism with or without social platforms. I see little analytic gain in combining these very different lines of argument respecting quite distinct targets, and I see no reason to invite confusion by mushing together distinct phenomena to achieve guilt-by-association more generally.

Second, concern about exploitation overlaps with a distinct worry about non-domination. Claire Benn and Seth Lazar capture this possibility in their argument that social platforms might compromise an intrinsic, non-instrumental “value of living in societies that are free and equal.”73Benn & Lazar, supra note 66, at 133. They argue that the public is necessarily ignorant about the “tech companies’ control of the means of prediction” and so have “no viable way of legitimating these new power relations.”74Id. at 137. But the empirical premise of this argument—widespread public ignorance about predictive tools—seems shaky: As the empirical studies of fake news and political distortion show, there is publicly available knowledge about many salient effects of social platforms. To the extent that the public misconstrues those effects, Benn and Lazar’s argument likely overestimates their magnitude.75See supra notes 35 and 37 for examples of such overestimation. I hardly think these critiques are secret.

Still, I think Benn and Lazar are on to something useful when they identify the fact of corporate control as a morally salient one. Social platforms stand in an asymmetrical relation to the general public because of (1) knowledge asymmetries enabled by the corporate form; (2) collective action problems implicit in the one-to-many relation of firms to consumers; and (3) ideological effects (for example, false beliefs in the necessity of unregulated digital markets for economic growth). As a consequence of these dynamics, social platforms exercise a certain kind of unilateral power over the public. Such power might be especially worrying if it is concentrated in the hands of a limited number of people—and if these people have close connections to those in high state office (with the Musk/Trump relationship offering an obvious, highly salient example). This slate of worries comes sharply into play whenever platforms comprise an important part of the democratic public sphere. Under these conditions, Benn and Lazar point out that platforms ought not to merely prevent negative consequences for democratic politics; they must also ensure “that content promotion is regulated by epistemic ideals.”76Benn and Lazar, supra note 66, at 144. This entails, in their view, a measure of “epistemic paternalism.”77Id. It rests on platforms’ unilateral, and effectively unconstrained, judgments about interface and algorithmic design.

This deontic argument can also be stated in the terms of Philip Pettit’s influential theory of republican freedom. On Pettit’s account, an individual wields dominating power over another if the former has the capacity to interfere in certain choices of the latter on an arbitrary basis.78Philip Pettit, Republicanism: A Theory of Freedom and Government 52 (1997). Pettit asserts that this arbitrariness condition is satisfied if an agent’s actions are subject only to the arbitrium—the will or judgment—of the agent, and when the interfering agent is not “forced to track the interests and ideas of the person suffering the interference.”79Id. at 55. For example, a person ranked by law as a slave is just as unfree even if their master always acts with their interests in mind. Even when an arbitrary legal relationship is exercised in a beneficent fashion with the interest of the weaker party in mind, Pettit suggests that there is a displacement of the subject’s “involvement, leaving [them] subject to relatively predictable and perhaps even beneficial forms of power that nevertheless ‘stifle’ and ‘stultify.’ ”80Patchen Markell, The Insufficiency of Non-Domination, 36 Pol. Theory 9, 12 (2008). To be clear, Markell here is criticizing and extending Pettit’s account.

Yasmin Dawood has fruitfully deployed Pettit’s framework for thinking about the abuse of public power in democratic contexts.81Yasmin Dawood, The Antidomination Model and the Judicial Oversight of Democracy, 96 Geo. L.J. 1411, 1431 (2008). Her conceptual framing, moreover, could be extended to private actors such as social platforms without too much difficulty. For instance, one might view the exercise of extensive control over the informational environment online as a species of domination, whether or not it was exercised in a malign or a paternalistic direction. That idea might be rendered more precise by drawing on work by Moritz Hardt, Meena Jagadeesan, and Celestine Mendler-Dünner that defines the “performative power” of an algorithmic instrument in terms of “how much participants change in response to actions by the platform, such as updating a predictive model” as a numerical parameter.82Moritz Hardt, Meena Jagadeesan & Celestine Mendler-Dünner, Performative Power, 2022 NIPS ’22: Proc. of the 36th Int’l Conf. on Neural Info. Processing Sys. 2. This concept of “performative power” usefully captures the way that platforms “steer” populations.83Id. at 5–6. As such, it offers a way of understanding and measuring “domination” in social platforms more precisely.

In setting out these two kinds of deontic critiques of social platforms, I thus suggest that there are plausible grounds for worry about social platforms, even absent robust empirical findings of spillovers onto users’ beliefs and dispositions. I recognize that both the exploitation and the domination critiques rest on further moral premises, which I have neither spelled out in full nor tried to substantiate. But I spell out both deontic arguments here to show readers the minimally plausible non-consequentialist grounds for concern about the structure and operation of social platforms and to allow readers to make their own judgments.

D. Making a Better Case Against Social Platforms

Social platforms have become scapegoats of sorts for many of the ills that democratic polities are now experiencing. But the available evidence suggests that many of these critiques miss the mark. For many people, platforms simply do not play a very large or dominant epistemic role (although this may well change in the near future). They also seem not to have the polarizing and epistemically distorting effects many bemoan.

That is not to say, however, that there is no reason for concern. Consequentialist worries about the behavior of users on the tails of the ideological distribution, as well as deontic worries about exploitation or domination, point toward the need for reforming measures. Of course, these arguments might not all point in the same direction in terms of practical change. But reforms that render platforms more responsive and responsible to epistemically grounded truths and the interests of all their users (as well as interests of the general public at large) are plausibly understood to respond to all the salient critiques discussed above.

II. Islands of Integrity—Real and Digital Examples

One way of thinking about how existing social platforms might be reformed is to identify an aspirational end-state, or a model, of how they might ideally work. With an understanding of the best version of a social platform in view, it may be easier to evaluate extant reform strategies and to propose new ones. This inquiry might proceed at the retail level—focusing on what an “ideal” or a “better” platform might look like—or at a general level—asking how the digital ecosystem overall should be designed. With the first of these paths in mind, I introduce in this Part a conceptual framework for thinking about “islands of integrity” developed in the sociological and political science studies of development. While that literature has not yielded any simple or single formula for reaching that aspiration, it still offers a useful lens for starting to think about well-functioning social platforms. Or so I hope to show in what follows.

A. Building Islands of Integrity in the Real World

In recent decades, concern about the legality and the quality of governance has shaped the agenda of international development bodies such as the World Bank.84Aziz Z. Huq, The Rule of Law: A Very Short Introduction 75–78 (2024). One of the strategies identified to enhance the quality of public administration centers the idea of “islands of integrity” or “pockets of effectiveness” in sociopolitical environments that are “otherwise dominated by patrimonialism, corruption, and bureaucratic dysfunction.”85Prasad, supra note 15, at 376. An island of integrity has been defined as an entity or unit (generally of government) that is “reasonably effective in carrying out [its] functions and in serving some conception of the public good, despite operating in an environment in which most agencies are ineffective and subject to serious predation . . . .”86David K. Leonard, ‘Pockets’ of Effective Agencies in Weak Governance States: Where Are They Likely and Why Does It Matter?, 30 Pub. Admin. & Dev. 91, 91 (2010); see also Michael Roll, The State That Works: A ‘Pockets of Effectiveness’ Perspective on Nigeria and Beyond, in States at Work: Dynamics of African Bureaucracies 365, 367 (Thomas Bierschenk & Jean-Pierre Olivier de Sardan eds., 2014) (“A pocket of effectiveness (PoE) is defined as a public organisation that provides public services relatively effectively despite operating in an environment, in which public service delivery is the exception rather than the norm.”). The normative intuition is that it is possible to seed islands of integrity, despite pervasive corruption, as a starting point for more large-scale reforms.

There are by now a wide variety of case studies on islands of integrity. Monica Prasad, for example, points to the recently stood-up Indian Institutes of Technology (“IITs”), an archipelago of meritocratic technology-focused colleges across the subcontinent, as an instance where an educational mission is successfully pursued against “a context of patrimonialism and corruption.”87Prasad, supra note 15, at 380. IITs’ mission is preserved and protected from distortion through the use of selection strategies of “meritocratic decoupling” that sort both students and teachers based on academic merit, alongside efforts to show how the institution benefited those who were excluded.88Id. at 382–83.

In a different case study, Eliška Drápalová and Fabrizio Di Mascio identify a pair of municipalities in Spain as “islands of integrity.”89Drápalová & Di Mascio, supra note 15, at 128. They contend that the key move in creating them was the fashioning of a “fiduciary relationship between mayors and city managers,” which allowed for the development of a bureaucratic structure shaped by professional (rather than patrimonial) norms.90Id. at 129–30, 135. City managers, they find, offer “accountability and responsiveness” to elected leaders without compromising the integrity of service-oriented institutions.91Id. at 135. Similarly, Michael Roll maps the emergence in Nigeria of well-run agencies managing food and drug regulation on the one hand, and human trafficking on the other, to demonstrate that islands of integrity can emerge even under very difficult circumstances given the right leadership.92Roll, supra note 86, at 370–73.

Most, but not all, of these case studies on islands of integrity concern real-world public administration, often at a local level.93One article applies the concept to public broadcasters in developing countries, but does not do so with enough detail to be useful. Cherian George, Islands of Integrity in an Ocean of Commercial Compromises, 45 Media Asia 1, 1–2 (2018). The generalizations drawn by the literature are concededly fragile: The heterogeneity of cultural, political, and institutional context makes inference instable, at least at a useful level of granularity.94Leonard compiles a number of general lessons, but these are pitched at a very high level of abstraction. Leonard, supra note 86, at 93. Still, a couple of regularities do tentatively emerge from a review of the available case studies in the development literature.

Crudely stated, the “islands of integrity” literature underscores the importance of institutional means and leadership motives for resisting patrimonial or corrupt political cultures. First, an island of integrity needs to internalize control over its own workings in order to “create a culture of meritocracy and commitment to the organization’s mission.”95Prasad, supra note 15, at 376. Underpinning this culture, it seems, must be a clear understanding of the public goods that the agency or body is supposed to produce. The truism that leadership is key seems to hold particularly strongly.96Leonard, supra note 86, at 94 (noting the importance of “leadership, personnel management, resource mobilisation and adaptability”). Autonomy over personnel choice is also crucial in order to maintain that culture.97Roll, supra note 86, at 379.

Second, there is a consistent institutional need for the creation of tools to resist demands from powerful external actors who try to capture a body for their immediate political or economic gains, which are unrelated to the public-regarding goals of the institution.98Id. at 377–78 (noting the role of tools for “political management”). Tools by which to mitigate such threats to institutional autonomy vary. Indian universities, Prasad found, tout the local jobs they create in cleaning and maintenance—even as they maintain the separation of student and faculty selection from local pressures—as a way of deflecting local politicos.99Prasad, supra note 15, at 385. Spanish city managers, Drápalová and Di Mascio explain, promise improvements in top-line municipal services to mayors who threaten their autonomy.100Drápalová and Di Mascio, supra note 15, at 135. In effect, reform is purchased in both cases by strategic payoffs to those who threaten its progress.

Just as it is important to work out how to build public-regarding institutional spaces in the real world, so too is it important to identify how to create such spaces in the virtual, digitally mediated world. Just as the bodies in India, Spain, and Nigeria need to have motive and means to keep the corroding forces of public sphere at bay, so too does a social platform that strives to be an island of integrity need leadership, internal culture, and means to create a non-exploitative, non-dominating structure while managing tail risk better than existing platforms. Taken as metaphor, therefore, “islands of integrity” offer a template for the desirable end goal of social platform reform as well as some modest clues about how to get there. Still, it is important not to make too much of this metaphor. The claim that the “islands of integrity” literature can be an inspiration for social platform reform is, at bottom, an argument from analogy, and one that needs to be tested carefully through the application of that analogy.

B. Digital Islands of Integrity: Two Examples

The aforementioned analogy gains force when one realizes that there are already examples of digital islands of integrity online. The two most prominent examples are Wikipedia and the British Broadcasting Company (“BBC”). To be clear, neither is a quintessential social platform as I have used that term here. Nor do they operate at the same scale as X or Instagram. But I offer a brief discussion of both by way of proof of concept.

Wikipedia emerged from the wreckage of an attempted for-profit online encyclopedia called Nupedia.101Emiel Rijshouwer, Justus Uitermark & Willem de Koster, Wikipedia: A Self-Organizing Bureaucracy, 26 Info., Commc’n & Soc’y 1285, 1291 (2023). The latter’s assets (for example, domain names, copyrights, and servers) were subsequently placed in an independent, charitable organization, the Wikimedia Foundation (“WMF”).102Id. at 1293. At first, corporate governance “emerged” organically from the efforts of those building the site, rather than being imposed from above.103Id. at 1298 (explaining that “bureaucratization emerges from interactions among constituents” of Wikipedia). A group of founders then “transformed their charismatic community into a bureaucratic structure” in which “power was diffused and distributed” across “a sprawling bureaucracy with a wide range of formal positions” in response to the perceived mission-related needs of the organization.104Id. at 1294. The organization’s trajectory has also been characterized by moments of greater centralization. For example, in the early 2010s, Wikipedia’s CEO led an effort to be “more inclusive and more open,” somewhat to the chagrin of the then-contributors.105Id. at 1296. That is, Wikipedia’s governance history centers on a choice of corporate form that insulates leadership from external profit-related pressures, a selection of strong leadership, and an exercise of leadership to broaden and empower the organization’s constituencies (potentially mitigating criticism of the organization) to generate a certain kind of “corporate culture.”106Cf. Pasquale Gagliardi, The Creation and Change of Organizational Cultures: A Conceptual Framework, 7 Organizational Stud. 117, 121–26 (1986) (exploring the meaning of the term “organizational value” and culture).

Even more directly relevant is the web presence of the BBC. The BBC produces thousands of new pieces of content each day for dissemination over a range of sites, such as BBC News, BBC Sport, BBC Sounds, BBC iPlayer, and World Service.107Alessandro Piscopo, Anna McGovern, Lianne Kerlin, North Kuras, James Fletcher, Calum Wiggins & Megan Stamper, Recommenders with Values: Developing Recommendation Engines in a Public Service Organization, Knight First Amend. Inst. (Feb. 5, 2024), https://knightcolumbia.org/content/recommenders-with-values-developing-recommendation-engines-in-a-public-service-organization [https://perma.cc/APX5-T9T2]. The corporation’s charter defines its mission as serving all audiences by providing “impartial, high-quality and distinctive output and services which inform, educate and entertain.”108Id. Like Wikipedia, the BBC is organized into a corporate form that is relatively impermeable by law to commercial pressures. To advance its charter goals, the BBC uses machine-learning recommender algorithms created by multi-disciplinary teams of data scientists, editors, and product managers.109Id. Once a recommender system has been built,110Id. Public service broadcasters such as the BBC cannot rely on “off-the-shelf” recommenders because they optimize for very different goals. Jockum Hildén, The Public Service Approach to Recommender Systems: Filtering to Cultivate, 23 Television & New Media 777, 787 (2022). editorial staff can offer “continuous feedback” on the design and operation of recommendatory systems to identify legal compliance questions and to ensure “BBC values” are advanced.111Piscopo et al., supra note 107.

Available accounts of this process—while perhaps a touch self-serving because they are written by insiders—suggest that the organization strives to cultivate a distinctive cultural identity. It then leverages that identity as a means of advancing its values via algorithmic design. Specifically, an important part of this recommender design process focuses on empowering users to make their own choices and to avoid undesirable (from the service’s perspective) behaviors. The BBC’s recommender tools are designed to permit personalization, albeit only to the extent that doing so can “coexist with the BBC’s mission and public service purposes.”112Id. An insider informant speaking anonymously reported that the BBC understands itself as “as ‘morally obliged’ to provide their users with the possibility of tweaking their recommendations.”113Hildén, supra note 110, at 786. In the same study, the employee of an unnamed European public broadcaster that managed a recommender system reported that their system proactively identified “users who consume narrow and one-sided media content and recommend[ed to] them more diverse content.”114Id. at 788. That is, the system was designed to anticipate and mitigate, to an extent, the possibility of extremism at the tails of the user distribution, while also preserving users’ influence over the content of their feeds. This is in stark contrast to systems that are designed to maximize engagement under conditions in which predictability entails driving users to more extreme (and even dangerous) content.

I do not want to strain the parallels between the “islands of integrity” literature and these digital examples too much. Both of the latter, nevertheless, point to ways in which the means and the motives to sustain an “island of integrity” can be imagined in an online world. Both services are, for example, explicitly oriented toward a public service mission in terms of leadership. They both also opted for corporate forms that allow for some protection against potentially compromising market forces. Both have systems in place to preserve and transit a valued internal culture, while buffering themselves somewhat against the risks of distorting external or internal pressure. Finally, both seem to have successfully cultivated persisting cultures of service to public-service goals by hard-wiring their cultures into bureaucratic structures or, alternatively, algorithmic designs.

III.  The Governance of Social Platforms: Aspiring to Build Islands of Algorithmic Integrity

With the general idea of “islands of integrity” in hand, along with the specific proofs of concept described in Section II.B, it is possible to ask how certain social platforms might be reformed with an ideal of islands of algorithmic integrity in mind. That is, how might we move toward alternative platform designs and operations that address the normative concerns outlined in Part II? What kind of private governance might be imagined that mitigates exploitation and domination concerns, while addressing the tail risk of extremism as best as we can? Could legal regulation play a role? Again, it would be a mistake to frame these questions as mechanical applications of the “islands of integrity” literature. It is better to think of them as falling out of the same institutional design goal.

I approach this inquiry in two stages. I first begin by critiquing leading regulatory strategies observed in the American states and the European Union from an “islands-of-algorithmic-integrity” standpoint. At bottom, these critiques draw out ways in which those regulatory strategies take social platforms as potential sources of harm, largely without an account of the positive role platforms could play. Second, I draw together a number of possible tactics for public or private actors to help build islands of algorithmic integrity. My positive accounting here is concededly incomplete. My hope, however, is that this effort serves as initial evidence of the fruitfulness of an approach oriented toward the aspiration of islands of algorithmic integrity.

A. The Limits of Existing Platform Regulation Regimes

Since 2020, social platforms have become an object of regulatory attention on both sides of the Atlantic. Three main regulatory strategies can be observed. These take the form of new state regulations purportedly targeting “censorship,”115Mary Ellen Klas, DeSantis Proposal Would Protect Candidates Like Trump from Being Banned on Social Media, Mia. Herald, https://www.miamiherald.com/news/politics-government/state-politics/article248952689.html [https://web.archive.org/web/20221017063802/https://www.miamiherald.com/news/politics-government/state-politics/article248952689.html] (quoting Florida governor Ron DeSantis). fresh efforts to extend common law tort liabilities to social platforms, and a risk-based regulatory regime that has been promulgated by the European Union. Broadly speaking, all such legal intervention is premised on concern about platforms’ society-wide effects on listeners, although deontic concerns may play a role too. The tools seized for those tasks, however, have been inadequate. Their shortfall can be traced to the way in which they focus exclusively on platform harms (missing the importance of benefits), misconstrue those harms, and then fail to incentivize the formation of platforms with the means and the motive to mitigate documented harms while resisting exploitation or domination.

  1. Regulating Ex Ante for Harms

The 2022 Digital Services Act (“DSA”) offers a first model of ex ante platform regulation. In important part, it trains on the potential for harms by recommender systems without any account of their positive effects. It contains a suite of new legal obligations: Article 25, for example, prohibits any digital platform design that “deceives or manipulates the recipients of their service or in a way that otherwise materially distorts or impairs the ability of the recipients of their service to make free and informed decisions.”116Digital Services Act, supra note 13, at art. 25 § (1). Article 38 provides a right to opt out of non-personalized algorithms.117Id. at art. 38 (mandating “at least one option for each of their recommender systems which is not based on profiling as defined in Article 4, point (4), of Regulation (EU) 2016/679 ”). Articles 14 and 26 set out some disclosure obligations on certain companies.118Id. at art. 14 § (1) and art. 26 § (1)(d). Most importantly, for present purposes, Article 34 of the DSA requires “very large online platforms and . . . online search engines” to conduct an annual assessment of any systemic risks stemming from the design or functioning of their service, including negative effects on civic discourse, electoral processes, or fundamental rights.119Id. at art. 34. For a close reading of Article 34, see Neil Netanel, Applying Militant Democracy to Defend Against Social Media Harms, 45 Cardozo L. Rev. 489, 566 (2023).

At first blush, the DSA seems oriented toward the creation of islands of algorithmic integrity. But there are reasons for being skeptical of conceptualizing the project this way. To begin with, the Article 38 opt-out is unlikely to be exercised by those “supersharers” at the tails of the ideological distribution who are most responsible for the diffusion of fake news.120Baribi-Bartov et al., supra note 55, at 979. Self-help remedies never avail those already fixated on harming themselves and others. Moreover, Article 34 risk assessments impose no clear affirmative command to build epistemically robust speech environments.121But see Netanel, supra note 119, at 566–67 (proposing that platforms be required to make “recommender system modifications to improve the prominence of authoritative information, including news media content that independent third parties have identified as trustworthy”). Netanel, however, is proposing in this passage an extension of Article 34 rather than offering a gloss on it, so far as I can tell. In effect, the act offers no clear account of how social platforms could or should enable democratic life. Even more problematic, the DSA ultimately leans on platforms themselves to accurately document and remedy their own flaws. It does not seem excessively cynical to predict that profit-oriented companies will not be falling over themselves to flag the negative externalities of their own products in publicly available documents and flagellate themselves over how to remedy them. The DSA, in short, is promising as theory. But it may fall substantially short in practice.

  1. Regulating Ex Ante for Balance

Both Florida and Texas have enacted statutes intended to limit platforms’ abilities to “deplatform” a person because of their violation of terms of service.122Florida defines “deplatform” as “the action or practice by a social media platform to permanently delete or ban a user or to temporarily delete or ban a user from the social media platform for more than 14 days.” Fla. Stat. § 501.2041(1)(c) (2021). Texas’s law has a similar provision. See H.B. 20, 87th Leg., Reg. Sess. (Tex. 2021) (prohibiting social media platforms from censoring users or a user’s expressions based on the viewpoint expressed in the content). The Florida statute, for example, prohibits platforms from “willfully deplatform[ing] a candidate for office who is known by the social media platform to be a candidate, beginning on the date of qualification and ending on the date of the election or the date the candidate ceases to be a candidate.”123Fla. Stat. § 106.072(2) (2021). In its July 2024 decision in Moody v. NetChoice, the U.S. Supreme Court cast doubt on the constitutionality of such measures.124Moody v. NetChoice, LLC, 603 U.S. 707 (2024). While litigation is ongoing as this essay goes to press, it seems likely that the deplatforming elements of both statutes will not survive.

Relying on familiar doctrinal tools from the First Amendment toolkit, a majority of the Moody Court reached two conclusions that are relevant here. First, Justice Elena Kagan’s majority opinion explained that when an entity “provide[s] a forum for someone else’s views” and is thereby “engaged in its own expressive activity, which the mandated access would alter or disrupt,” a First Amendment interest is implicated.125Id. at 728. Second, the Court held that the government has no constitutionally cognizable interest “in improving, or better balancing, the marketplace of ideas.”126Id. at 732. This anti-distortion argument is familiar from the campaign finance context.127See, e.g., Citizens United v. FEC, 558 U.S. 310, 340–41 (2010) (“By taking the right to speak from some and giving it to others, the Government deprives the disadvantaged person or class of the right to use speech to strive to establish worth, standing, and respect for the speaker’s voice.”). There, however, the argument is deployed generally by conservative justices to resist governmental efforts to advance an equality interest in political speech given its “dangerous[] and unacceptable” effects.128Id. at 351. In the Florida and Texas cases, by contrast, the argument was listed against efforts by Republican state governments to enforce their understanding of balance on the platform-based speech. Such ideological valence thus flipped from campaign finance to platform regulation.

Independent of these familiar constitutional logics, there are more empirically grounded reasons to conclude that Florida’s and Texas’s efforts to mitigate platforms’ curatorial capacity are likely to undermine, rather than promote, the emergence of islands of algorithmic integrity. These reasons run parallel to Justice Kagan’s reasoning, but are distinctive in character.

The first reason is banal and empirical. The available research suggests that conservative voices in the United States are asymmetrically responsible for the dissemination of fake news.129Baribi-Bartov et al., supra note 55, at 979 (“Supersharers had a significant overrepresentation

of women, older adults, and registered Republicans.”); González-Bailón et al., supra note 57, at 397 (“We also observe on the right a far larger share of the content labeled as false by Meta’s 3PFC.”). There is more to be said about rhetorical use of “balance” claims in law and politics, and its dynamic effects upon the tendency of people to go to extremes.
To the extent that Florida and Texas leaned on a conception of “balance” in the speech environment, they did so by culpably ignoring the platforms’ interest in a generally reliable and trustworthy news environment. Enforcement of the Florida and Texas laws, to the contrary, seems likely to lead (all else being equal) to a decline in the quality of those platforms. That is to say, by a sort of Gresham’s law for political speech, the increasing proportion of misleading speech on a platform will tend to drive out those concerned with truthfulness. Such an effect creates a vicious circle of sorts, one that is absent from the campaign finance context.

This argument might be supplemented by a further observation. As I show below, there are a number of fairly obvious affirmative measures that private and public actors can take if they are truly concerned with the creation of islands of algorithmic integrity.130See infra Part III.B. If we see a government failing to take these needful steps while affirmatively adopting counterproductive measures, there is some reason to doubt the integrity of its claim to be acting in the public interest. The islands of algorithmic integrity frame can be put to work here as a lens through which one may understand the gap between a state’s professed interests and its actual ambitions.131Cf. Geoffrey R. Stone, Free Speech in the Twenty-First Century: Ten Lessons from the Twentieth Century, 36 Pepp. L. Rev. 273, 277 (2009) (noting that “government officials will often defend their restrictions of speech on grounds quite different from their real motivations for the suppression, which will often be to silence their critics and to suppress ideas they do not like”). If, as Justice Kagan once suggested in her academic role, the First Amendment doctrine is best understood as “a series of tools to flush out illicit motives and to invalidate actions infected with them” and a “kind of motive-hunting,”132Elena Kagan, Private Speech, Public Purpose: The Role of Governmental Motive in First Amendment Doctrine, 63 U. Chi. L. Rev. 413, 414 (1996). then the failure to pick low-hanging fruit while making elaborated and far-fetched claims about one’s integrity-related aims is a telling one. To the extent that it identifies some of those low-hanging fruit, the islands of algorithmic integrity grafts on comfortably to advance those goals.

A second reason to be skeptical of measures such as Florida’s and Texas’s is conceptual in character: balance-promoting measures of their ilk help themselves to the assumption that there is a neutral baseline that has been disturbed by a platform’s algorithm. But “the most common choice of baseline fundamentally depends on the state of some components of the system,” and assumes away the effect of past bias and amplification.133Lum & Lazovich, supra note 26. Accordingly, the Florida and Texas laws’ presupposition of a neutral baseline of undistorted speech is misplaced; it is better to instead focus on the structural qualities associated with islands of integrity. Where a government asserts an interest in “neutrality” or “fairness” in the context of social platforms, its arguments should be viewed as pro tanto dubious since it is striving to return to a status quo that, for technological reasons, is imaginary. A version of this baseline difficulty arises in the campaign finance context, albeit for different reasons.134For a nuanced account of the difficulty of curbing the “bad tendencies of democracy,” see David A. Strauss, Corruption, Equality, and Campaign Finance Reform, 94 Colum. L. Rev. 1369, 1378–79 (1994). It also lacks the sociotechnical foundation that is present in the platform context.

  1. Tort Liability for Harmful Algorithmic Design

The Texas and Florida statutes impose ex ante controls on social platforms. An alternative regulatory strategy when it comes to platforms involves the ex poste use of tort liability to incentivize “better” (by some metric) behavior. Platforms benefit from a form of intermediate immunity from tort liability under Section 230 of the Communications Decency Act.13547 U.S.C. § 230; see also Zeran v. Am. Online, Inc., 129 F.3d 327, 328 (4th Cir. 1997) (holding that Section 230 immunized an online service provider from liability for content appearing on its site created by another party). Section 230 immunity is likely wider than the immunity from liability available under the First Amendment,136Cf. Note, Section 230 as First Amendment Rule, 131 Harv. L. Rev. 2027, 2030 (2018) (noting that “[j]udges and academics are nearly in consensus in assuming that the First Amendment does not require § 230”). although the scope of constitutionally permissible tort liability remains incompletely defined.137Jack M. Balkin, Free Speech Is a Triangle, 118 Colum. L. Rev. 2011, 2046 (2018).

Recent lawsuits have tried to pierce Section 230 immunity from various angles. Some have tried to exploit federal statutory liability for aiding and abetting political violence.138See, e.g., Twitter, Inc. v. Taamneh, 598 U.S. 471, 503 (2023) (rejecting that reading of federal statutory tort liability). Others lean on common law tort theories, but contend that Section 230 does not extend to suits that turn on platforms’ use of algorithmic controls to sequence and filter content. For example, in an August 2024 decision, a panel of the Third Circuit reversed a district court’s dismissal of a common law tort complaint against TikTok for its promotion of content that played a role in the death of a minor.139Nylah Anderson watched a TikTok video on the “Blackout Challenge” and died imitating what she saw. Anderson v. TikTok, Inc., 116 F.4th 180, 181 (3rd Cir. 2024). The circuit court held that Section 230 did not extend to a claim that TikTok’s “algorithm was defectively designed because it ‘recommended’ and ‘promoted’ the Blackout Challenge.”140Id. at 184. The Blackout Challenge, said the panel, was “TikTok’s own expressive activity,” and as such fell outside Section 230’s scope.141Id. This construction of Section 230 has been severely criticized.142See, e.g., Ryan Calo, Courts Should Hold Social Media Accountable—But Not By Ignoring Federal Law, Harv. L. Rev. Blog (Sept. 10, 2024), https://harvardlawreview.org/blog/2024/09/courts-should-hold-social-media-accountable-but-not-by-ignoring-federal-law [https://perma.cc/CFE6-3ZDZ]. Thus, it is far from clear how this ruling can be squared with the seemingly unambiguous Section 230 command that no platform can “be treated as the publisher or speaker of any information provided by another information content provider.”14347 U.S.C. § 230(c)(1) (emphasis added).

Reflection on the prospect of tort liability that is delimited in this fashion and consistent with Section 230 (especially with the idea of “islands of algorithmic integrity” in mind) offers some further reasons for skepticism of the Third Circuit’s decision and the consequences of tort liability for algorithmic design more generally. For it is far from clear how algorithmic-design-based liability of the sort that the Third Circuit embraced can be cabined. Every algorithmic decision changes the overall mix of content on the platform. So, it is always the case that such decisions in some sense “cause” the appearance of objectionable content.144One might interpose here some notion of algorithmic proximate cause. That presents, to say the least, rather difficult questions of doctrinal design. Indeed, one could argue that any mechanism imposed to limit one sort of harmful speech necessarily increases the likelihood that other sorts of speech (including other sorts of harmful speech) will feature prominently on the platform. For example, a decision to filter out speech endorsing political violence is (all else being equal) going to increase the volume of speech that is likely conducive to adolescent mental health problems. In this way, the Third Circuit’s decision (at least as written) has the practical effect of carving out all algorithmic content-moderation activity from Section 230’s scope. It is hard to imagine this concurs with Congress’s enacting intent.

Indeed, tort liability for algorithmic decision will inevitably push platforms to rely more on networks, rather than algorithms, as drivers of content. But the empirical evidence suggests that network-based platform designs are more, not less, likely to experience higher levels of fake news, and that they are less amenable to technical fixes.145See supra text accompanying notes 44–65. Tort liability, at least as understood by the Third Circuit in the TikTok case, therefore pushes platforms away from socially desirable equilibria. Paradoxically, all else being equal, it is likely to increase, and not decrease, the volume of deeply troublesome material on platforms of the sort at issue in the Third Circuit TikTok case. More generally, it is again hard to see how liability for algorithmic design decisions, all else being equal, is socially desirable.

B. The Possible Vectors of Algorithmic Integrity

The fact that state and national governments opt for partial or unwise regulatory strategies does not mean that are no promising paths forward. To the contrary, the examples examined in Part II suggest a range of useful reforms. I outline three here briefly.

To begin with, the examples of Wikipedia and the BBC suggest that it may be possible to build at least small-scale islands of algorithmic integrity either in the private or the public sector. Those examples further suggest that whether state or private in character, such an island needs mechanisms to shield itself from the pressure to maximize profits. An entity that is exposed to the market for corporate control is unlikely to be able to resist commercial pressures for long.

Corporate form hence matters. For example, social platforms’ incentive to maximize engagement, and hence maximize advertising revenue, has been “critical” to driving the dissemination of radicalizing and hateful speech.146Daron Acemoglu & Simon Johnson, Power and Progress 362 (2023). The transformation of Twitter to X after its purchase by Elon Musk, and the subsequent degradation and coarsening of discourse on the platform, offer an abject lesson in the perils of the unfettered free market for islands of algorithmic integrity.147There is some evidence that X systematically favored right-leaning posts in late 2024, suggesting a link between corporate control and political distortion. Timothy Graham & Mark Andrejevic, A Computational Analysis of Potential Algorithmic Bias on Platform X During the 2024 US Election (Queensland Univ. of Tech., Working Paper, 2024)), https://eprints.qut.edu.au/253211. The market for corporate control, which is often glossed over in light of the efficient capital markets hypothesis, is commonly viewed as an unproblematic good.

One of the main lessons of the islands of integrity literature, however, is the need for well-motivated leadership of the sort that has been described at Wikipedia and the BBC. It is hard to see how such motivation survives under the shadow of potential corporate takeover.

Second, islands of integrity require the right means (or tools), as well as the right motive. The use of algorithmic tools to curate a platform creates means in a way that reliance on network effects does not. It is thus a mistake to assume, as the Third Circuit seems to have done in the TikTok case, that an algorithmically managed platform is worse than a network based one. As Part I illustrated, the empirical evidence suggests that algorithmically managed platforms are generally not more polluted by misinformation than ones driven by users’ networks.148Budak et al., supra note 52, at 48; accord Hosseinmardi et al., supra note 47, at 1. Quite the contrary.

Moreover, a social platform built around an algorithm may have tools to improve its epistemic environment that a network-based platform lacks. For instance, a 2023 study found that certain “algorithmic deamplification” interventions had the potential to “reduce[] engagement with misinformation by more than [fifty] percent.”149Benjamin Kaiser & Jonathan Mayer, It’s the Algorithm: A Large-Scale Comparative Field Study of Misinformation Interventions, Knight First Amend. Inst. (Oct. 23, 2023), https://knightcolumbia.org/content/its-the-algorithm-a-large-scale-comparative-field-study-of-misinformation-interventions [https://perma.cc/Y4KU-76BY]. Another example of an instrument for epistemic integrity is, somewhat surprisingly, a feature of Facebook’s algorithm, which has baked in a preference for friends-and-family content that “appears to be an explicit attempt to fight the logic of engagement optimization.”150Narayanan, supra note 10, at 31.

Third, there is a range of tailored reforms that precisely target ways in which social platforms stand in asymmetrical relations of exploitation and dominance to their users. As a very general first step, Luca Belli and Marlena Wisniak have proposed the use of “nutrition labels,” detailing key parameters of platform operation as a way of enabling better informed consumer choice between platforms.151Luca Belli & Marlena Wisniak, What’s in an Algorithm? Empowering Users Through Nutrition Labels for Social Media Recommender Systems, Knight First Amend. Inst. (Aug. 22, 2023), https://knightcolumbia.org/content/whats-in-an-algorithm-empowering-users-through-nutrition-labels-for-social-media-recommender-systems [https://perma.cc/N7MW-SEVT]. This kind of notice-based strategy, while plausible to implement, assumes a measure of user choice over which platform to use. At present, such choice is largely illusory because of the market dominance of a small number of platforms.152Lina M. Khan, The Separation of Platforms and Commerce, 119 Colum. L. Rev. 973, 976 (2019) (“A handful of digital platforms exert increasing control over key arteries of American commerce and communications.”). It is also hard to see how consumers, particularly those already at the ideological margin, could be persuaded to make the right kind of choice. Inducing more competition, and hence more consumer choices, in social platforms would give notice-oriented measures more bite. Some work has been done on potential varieties of platform design,153For a recent survey of other possible models of “decentraliz[ed]” platform governance, see Ethan Zuckerman & Chand Rajendra-Nicolucci, From Community Governance to Customer Service and Back Again: Re-Examining Pre-Web Models of Online Governance to Address Platforms’ Crisis of Legitimacy, 9 Soc. Media + Soc’y, July–Sept. 2023, at 1, 7–9. but there remains ample room for inquiry and improvement. The basic point, though, is that some combination of increased competition and better consumer-facing notices would better allow certain users to select among different social platforms based on their own preferences—although it is hard to be confident that the right users, so to speak, will be those aided.

There are also steps that can be taken by a well-motivated platform manager. Within a platform, for example, the BBC’s strategy of promoting personalization could be adopted and redeployed in a number of ways. For instance, bots, or “user-taught” agents could be supplied to help individual users curate the shape of their feeds over time.154Kevin Feng, David McDonald & Amy Zhang, Teachable Agents for End-User Empowerment in Personalized Feed Curation, Knight First Amend. Inst. (Oct. 10, 2023), https://knightcolumbia.org/content/teachable-agents-for-end-user-empowerment-in-personalized-feed-curation [https://perma.cc/RAN8-QT7S]. These bots, however, might be constrained by the understanding of the platform’s mission, which excluded normatively troublesome activity characterizing the tails of the ideological distribution.

Finally, another way of mitigating exploitation concerns focuses on advertisers rather than users. Firms advertising on platforms are often unaware their products or services are marketed next to fake news, despite having an aversion to that arrangement.155Wajeeha Ahmad, Ananya Sen, Charles Eesley & Erik Brynjolfsson, Companies Inadvertently Fund Online Misinformation Despite Consumer Backlash, 630 Nature 123, 125–28 (2024). They lack, however, information on when and how this occurs. Increased disclosure by platforms on “whether . . . advertisements appear on misinformation outlets,” as well as increased “transparency for consumers about which companies advertise” there, provides the potential to stimulate a collective shift to a more truthful equilibrium.156Id. at 129. Such disclosures help ensure that “the means of ensuring legibility [will not completely] fade into the background of the ordinary patterns of our li[ves],”157Henry Farrell & Marion Fourcade, The Moral Economy of High-Tech Modernism, 152 Dædalus 225, 228 (2023). as platform affordances become too banal to notice. Such disclosures, finally, might be mandated by law, potentially as a means of mitigating fraud concerns related to platform use.

Conclusion

In this essay, I have tried to offer an affirmative vision of social platform governance in the long run, or at least the seeds of such a vision. No doubt this vision is leagues away from the grubby, venal, and hateful reality of social platforms now. It is, indeed, a stark contrast to those extant realities. But one of the functions of scholarship is to generate plausible pathways away from a suboptimal institutional status quo. The articulation of alternatives is itself of value.

As I have suggested, drawing on sociological and political science literature on islands of integrity in public administration allows us to see some of the limits of existing regulatory strategies with respect to social platforms. Doing so opens up new opportunities for improved public and private governance. Of course, the model of islands of integrity in a public administrative context cannot be mechanically transposed over to the platform context. But by offering us a new North Star for reforming governance efforts, I hope it can advance our understanding of how to build platforms fit for our complex, yet (perhaps still) fragile democratic moment.

98 S. Cal. L. Rev. 1287

Download

*  Frank and Bernice J. Greenberg Professor of Law, University of Chicago Law School, and associate professor, Department of Sociology. Thanks to Erin Miller for extensive and illuminating comments, and to participants in the symposium—in particular Yasmin Dawood—for terrific questions and conversation. The editors of the Southern California Law Review, in particular Michelle Solarczyk and Tyler Young, did exemplary work in making this essay better. The Frank J. Cicero Foundation provided support for this work. 

In the Name of Accountability

Introduction

The Supreme Court has increasingly embraced legal doctrines that empower elected officials to hide politically inconvenient information and ideas from the American people. Two lines of precedent illuminate this phenomenon and its reach across seemingly disparate areas of the case law. The first is a development in First Amendment law known as government speech doctrine and the closely related rule that public employees receive no First Amendment protection for their work product speech—that is, for anything that they write or say while doing their jobs. This precedent puts at risk the ability of public employees or publicly subsidized experts—ranging from auditors hired to ferret out agency misconduct to scientists commissioned to study and report on changing climate patterns—to convey truthful information and competent, good faith analyses consistent with disciplinary and professional norms. The second line of precedent is the aspect of separation of powers law known as unitary executive theory (“UE theory,” “UE,” or “unity”). UE proponents argue that the president must fully control all discretionary executive activity in the United States, at minimum through an unfettered removal power. This jeopardizes the independence of federal actors who are charged with research and reporting on matters ranging from public corruption to public health.

The two doctrines not only have similar impacts on information and analysis in the United States, but also share a common rationale: political accountability. Proponents of government speech doctrine emphasize that the people can respond to government speech at the ballot box, rewarding elected officials for speech that they like or punishing them when they dislike what they hear. As for UE theory, supporters emphasize that the president is the only elected official in the federal executive branch. Indeed, they describe the president as more politically accountable than anyone else holding elected office in the United States, as the president alone is subject to nationwide election. It is crucial, they argue, that the president alone exercises discretionary executive power so that the people know whom to blame or reward electorally for the use of such power. Similarly, they brush away concerns about presidential abuses by stressing the ability of the people to punish transgressions at the ballot box.

The judiciary is far from alone in crafting and buttressing these schools of thought. To the contrary, UE theory was shaped and heavily promoted by the modern conservative legal movement well before the Roberts Court embraced it. Indeed, even as the Supreme Court rejected UE theory in the 1988 case of Morrison v. Olson, the Justice Department under Attorney General Meese relied on it internally and championed it externally along with the then-nascent Federalist Society. Today, with the support of the Supreme Court, and with Donald Trump retaking the presidency and characterizing career experts across government as parts of a rogue “deep state,” UE theory and its accountability rationale have more influence than ever.

Although, to my knowledge, no similarly probing intellectual history has been done with respect to government speech doctrine, the doctrine aligns intuitively with classic complaints about how Americans’ tax dollars are spent, including on public education, public broadcasting, and other forms of knowledge production. Such gripes are not intrinsically partisan, but they can be marshalled in a partisan fashion when framed as appeals to stop “wrongheaded” or “offensive” views from being supported by public funds. Over the past several years, we have indeed seen campaigns, in both legal and political realms, for elected officials to control the communicative output of a range of government programs. These campaigns often characterize civil servants as parts of a leftist deep state, echoing the rhetoric of unitary executive theorists. Their targets include elementary school teachers, college professors, and librarians whom they deem “woke” and indoctrinating. The major thread of argument in these political and legal attacks has been accountability—specifically, the notion that the electorate, through elected representatives, should get the final word on the content of publicly funded knowledge production. Framed in legal terms, the argument is that all such output is the government’s own speech.

Yet even as accountability serves as a rallying cry for proponents of UE theory and government speech doctrine, there is a profound tension between that call to arms and the negative impacts of both government speech doctrine and UE theory on the information ecosystem. This tension stems from two very different visions of accountability. Government speech and unitary executive arguments each focus on a thin vision of accountability, one that I have elsewhere called “formal accountability.” Formal accountability requires only that there exist some means, mainly the ballot box, by which the public can accept or reject officials.1Those officials include the president, in the case of unitary executive theory, and the officials behind any given instance of government expression in the case of government speech doctrine.

A more robust vision of accountability—one that I label “substantive accountability”—recognizes that accountability “is a ‘they,’ not an ‘it.’ ”2See Kenneth A. Shepsle, Congress Is a “They,” Not an “It”: Legislative Intent as Oxymoron, 12 Int’l Rev. L. & Econ. 239, 244 (1992). Indeed, the casting of a single vote for an official—even assuming the opportunity to vote for or against them again some number of years later—is too blunt an instrument to constitute considered approval of all manner of decision whether big or small, technical or non-technical, anticipated or unanticipated. Rather, holding officials accountable entails countless acts over time, ranging from legislative oversight to internal and external whistleblowing to fearless investigative journalism. All of these acts—including, but not limited to, voting—require the gathering and exchange of information and ideas. In the longer-term, they require a knowledge ecosystem that reliably produces such communications and supports a citizenry capable of assessing them. If one’s goal is substantive accountability, then government speech doctrine and UE theory are woefully inadequate to achieve it. To the contrary, they profoundly undermine it, especially when they are interpreted broadly.

Given the growing importance of UE theory and government speech doctrine in both legal and political realms, it is more important now than ever to understand how they undermine, rather than protect, meaningful, substantive accountability. Viewing these two schools of thought together also helps us to see how doctrines across seemingly disparate areas of the law can interact with and buttress one another and be harnessed by partisan interests.

In Part I of this Article, I summarize the respective accountability-based cases for UE theory and government speech doctrine. I explain that each rationale is premised on a simplistic, formal vision of accountability. In contrast, I argue that substantive accountability, which is antithetical to UE theory and to broad interpretations of government speech doctrine, is more faithful to constitutional principles and more desirable as a practical matter. In Part II, I elaborate on and illustrate the points made in Part I by drawing from the major Supreme Court cases on UE theory and government speech doctrine. In Part III, I present several examples of how UE theory and government speech doctrine have been wielded in the courts and the political branches to undermine substantive accountability. In Part IV, I consider where the case law leaves openings to impose limits on each doctrine to preserve substantive accountability.

I. Substantive Accountability and the Constitution

Proponents of UE theory and government speech doctrine assume a very simplistic vision of government accountability. In the case of UE theory, they suggest that because the president is the only elected member of the executive branch, he alone can be accountable to the people in executing the law.3See, e.g., Steven G. Calabresi, Some Normative Arguments for the Unitary Executive, 48 Ark. L. Rev. 23, 58 (1995); Lawrence Lessig & Cass R. Sunstein, The President and the Administration, 94 Colum. L. Rev. 1, 97–99 (1994); Saikrishna Bangalore Prakash, Hail to the Chief Administrator: The Framers and the President’s Administrative Powers, 102 Yale L.J. 991, 998–99, 1012–15 (1993). See also Heidi Kitrosser, The Accountable Executive, 93 Minn. L. Rev. 1741, 1747–48 nn.28–32 (2009) (summarizing accountability-based unity arguments and their sources) [hereinafter Kitrosser, The Accountable Executive]. Thus, UE proponents bolster their textual and historical arguments—which I and others have discussed elsewhere4See, e.g., Heidi Kitrosser, “A Government That Benefits from Expertise”: Unitary Executive Theory & the Government’s Knowledge Producers, 72 Syracuse L. Rev. 1473, 1482–83 (2022) [hereinafter, Kitrosser, “A Government That Benefits from Expertise”] (citing Christine Kexel Chabot, Interring the Unitary Executive, 98 Notre Dame L. Rev. 129, 152 (2022); David M. Driesen, The Specter of Dictatorship: Judicial Enabling of Presidential Power 28–31 (2021); Jed Handelsman Shugerman, Presidential Removal: The Marbury Problem and the Madison Solutions, 89 Fordham L. Rev. 2085, 2086–87, 2097–2102 (2021); Daniel D. Birk, Interrogating the Historical Basis for a Unitary Executive, 73 Stan. L. Rev. 175, 187–88, 228–29 (2021); Julian Davis Mortenson, The Executive Power Clause, 168 U. Pa. L. Rev. 1269, 1334 (2020); Jed Handelsman Shugerman, The Imaginary Unitary Executive, Lawfare (July 6, 2020, 8:54 AM), https://www.lawfareblog.com/imaginary-unitary-executive [https://web.archive.org/web/20230909021003/https://www.lawfaremedia.org/article/imaginary-unitary-executive]; Victoria Nourse, Reclaiming the Constitutional Text from Originalism: The Case of Executive Power, 106 Calif. L. Rev. 1, 23–24 (2018); Peter M. Shane, The Originalist Myth of the Unitary Executive, 19 U. Pa. J. Const. L. 323, 328–30, 352–60 (2016); Heidi Kitrosser, Reclaiming Accountability: Transparency, Executive Power, and the U.S. Constitution 155–57 (2015) [hereinafter Kitrosser, Reclaiming Accountability]). and which I address briefly in Part II—by suggesting that accountability is a core reason why text and history dictate a unitary executive,5See, e.g., Heidi Kitrosser, Interpretive Modesty, 104 Geo. L.J. 459, 506 (2016) [hereinafter Kitrosser, Interpretive Modesty] (citing Saikrishna Prakash, The Essential Meaning of Executive Power, 2003 U. Ill. L. Rev. 701, 783; Calabresi, supra note 3, at 42–45). See also Kitrosser, The Accountable Executive, supra note 3, at 1747 nn. 25–26 and accompanying text. and that accountability independently demands a unitary executive.6See sources cited supra note 3. Proponents elaborate further on presidential accountability by comparing the president not only to unelected bureaucrats, but also to members of Congress. Although the latter are elected, the argument goes, the president alone is subject to election by the entire nation through the Electoral College. He is also uniquely visible in culture and society.7See Kitrosser, The Accountable Executive, supra note 3, at 1747–48 nn.30–32 and accompanying text.

In the case of government speech doctrine, the Supreme Court and other proponents have treated accountability—again, in the form of elections—as a safety net that enables the people to register disapproval of unpopular government speech. They also suggest that government speech itself bolsters accountability, both in the sense that the government can give the people what they want through speech and that it can seek to persuade them through speech.

A number of scholars have critiqued the Court’s treatment of accountability in both UE theory and government speech doctrine cases. With respect to UE theory, critics observe that it massively oversimplifies how accountability is achieved as a practical matter. Indeed, it seems naïve to believe that a single vote for president held once every four years can bear the accountability load for virtually all executive branch activity. Even if we put aside the Electoral College—on account of which the popular vote winner lost the presidency twice in the last quarter of a century—and the fact that voters across the country are not a monolith, the assumption that a presidential election result constitutes a referendum on every discretionary decision of the executive branch, including the most obscure and technical ones, is heroic.8See, e.g., Peter M. Shane, Political Accountability in a System of Checks and Balances: The Case of Presidential Review of Rulemaking, 48 Ark. L. Rev. 161, 197–202 (1995). See also Kitrosser, The Accountable Executive, supra note 3, at 1748–50 (citing Shane’s argument as well as related criticisms by other scholars of the accountability-based argument for unity).

Furthermore, to the extent that constitutional accountability is about the electoral relationship between the people and elected officials, those officials include members of Congress as well as the president.9See infra note 13 and accompanying text. See also, e.g., Martin S. Flaherty, The Most Dangerous Branch, 105 Yale L.J. 1725, 1785 (1996); Cynthia R. Farina, The Consent of the Governed: Against Simple Rules for a Complex World, 72 Chi.-Kent L. Rev. 987, 992–1007, 1017–20 (1997); Jerry L. Mashaw, Structuring a “Dense Complexity”: Accountability and the Project of Administrative Law, 5 Issues in Legal Scholarship 1, 12–15, 35–38 (2005). See also Kitrosser, The Accountable Executive, supra note 3, at 1748–49 nn. 34–36 (citing Flaherty, Farina, and Mashaw, among others). As Blake Emerson writes, unity proponents “do not grapple with the competing democratic authority of Congress to structure the Executive Branch.”10Blake Emerson, Liberty and Democracy Through the Administrative State: A Critique of the Roberts Court’s Political Theory, 73 Hastings L.J. 371, 376 (2022). See also Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1484–85 (citing Emerson’s observation). To the contrary, unity is invoked to invalidate legislation passed by both houses of Congress—and, it is no small matter, signed by the president11The only exception, of course, being a rare case involving a presidential veto and a supermajority override of that veto by each house of Congress. —that seek to create some independence from unfettered presidential control in the administrative state.

Many if not most of the statutory innovations targeted by unity proponents themselves are designed to foster accountability—for instance, by shielding internal investigations from direct partisan control. This is not to say that administrative independence always enhances accountability. The point, rather, is that devising structures to maximize accountability, let alone to do so while preserving other goals and values, calls for legislative innovation and flexibility rather than categorical rules. As Justice Kagan put it, dissenting in 2020 in Seila Law v. Consumer Financial Protection Bureau, “[d]iverse problems of government demand diverse solutions. They call for varied measures and mixtures of democratic accountability and technical expertise, energy and efficiency. Sometimes, the arguments push toward

tight presidential control of agencies. . . . At other times, the arguments favor greater independence from presidential involvement.”12Seila Law LLC v. Consumer Fin. Prot. Bureau, 591 U.S. 197, 282 (2020) (Kagan, J., dissenting).

Justice Kagan’s point dovetails nicely with another major scholarly critique of UE theory’s formalistic accountability. That is, formal accountability is consistent neither with the ordinary meaning of accountability nor with the conception of it embodied in the Constitution’s structure. Elsewhere, I have summarized some of the major literature on these points as follows:

[Unity’s] vision of accountability is inconsistent with the far more complex [scheme] envisioned by the Constitution, [which] creates a web of accountability shared by multiple legislators representing multiple constituencies and by the presidency alike. Furthermore, constitutional accountability mechanisms are not directed solely toward vindicating majority policy preferences . . . but also toward guarding against abuse, incompetence, and majoritarian tyranny. In the context of the administrative state . . . constitutional accountability values demand not only multiple avenues for political accountability, but also intra-bureaucratic accountability mechanisms characterized by “complex chains of authority and expertise.”13Kitrosser, Reclaiming Accountability, supra note 4, at 163. See also id. at 258, 259 nn.66–68 (first citing Edward Rubin, The Myth of Accountability and the Anti-administrative Impulse, 103 Mich. L. Rev. 2073, 2076–83, 2119–22, 2134–35 (2005); then citing Rebecca L. Brown, Accountability, Liberty, and the Constitution, 98 Colum. L. Rev. 531, 552–59, 564–65 (1998); Flaherty, supra note 9, at 1785; Shane, supra note 8, at 197–209; Peter M. Shane, Independent Policymaking and Presidential Power: A Constitutional Analysis, 57 Geo. Wash. L. Rev. 596, 613–14 (1989)). For more recent discussions of the accountability-promoting effect of internal executive branch checking mechanisms, including restraints on political control of the administrative state, see, e.g., Jon D. Michaels, Constitutional Coup: Privatization’s Threat To The American Republic 63–65, 155–56, 170–71, 176–77 (2017); Gillian E. Metzger, Foreword: 1930s Redux: The Administrative State Under Siege, 131 Harv. L. Rev. 1, 71–72, 79–81 (2017).

I have built on these insights in my own work by focusing on the role that transparency plays in fostering meaningful, or substantive, accountability.14See generally Kitrosser, Reclaiming Accountability, supra note 4; Kitrosser, “A Government That Benefits from Expertise,” supra note 4; Kitrosser, The Accountable Executive, supra note 3. Even if our only goal were electoral responsiveness, that goal cannot be realized without popular access to information about government and an electorate capable of assessing it. Unfettered presidential control of the administrative state enables presidents to frustrate these ends by stifling or manipulating politically inconvenient information ranging from misconduct investigations to economic or scientific analyses that might cast doubt on administration priorities. The problem is yet more apparent when one considers the array of accountability mechanisms beyond the franchise, all of which require a reliable flow of information and analyses.

As for government speech doctrine, a key critique of the accountability rationale is that it assumes a level of authorship transparency that is not necessarily present in state-created or state-disseminated speech. As Helen Norton writes, “government speech is most valuable and least dangerous when members of the public can identify the government as its source. If, on the other hand, the expression’s government source is obscured . . . then political accountability provides no meaningful safeguard.”15Helen Norton, Constraining Public Employee Speech: Government’s Control of Its Workers’ Speech to Protect Its Own Expression, 59 Duke L.J. 1, 20, 27 (2009). Although the Supreme Court has said that it might weigh public perception among other factors to determine whether speech is private or public,16See Daniel J. Hemel & Lisa Larrimore Ouellette, Public Perceptions of Government Speech, 2017 Sup. Ct. Rev. 33, 35–36 (citing Pleasant Grove City v. Summum, 555 U.S. 460, 471 (2009), Walker v. Tex. Div., Sons of Confederate Veterans, Inc., 576 U.S. 200, 212–14 (2015), and Matal v. Tam, 137 S. Ct. 1744, 1760 (2017)). See also Shurtleff v. City of Boston, 142 S. Ct. 1583, 1589–90 (2022) (describing its distinction between government speech and private speech as “not mechanical,” but noting that it has, in past cases, considered factors including “the history of the expression at issue; the public’s likely perception as to who (the government or a private person) is speaking; and the extent to which the government has actively shaped or controlled the expression.”). the Court has developed no “reliable method” to gauge it.17Hemel & Larrimore, supra note 16, at 36–37. To make matters worse, the other factors that the Court considers—such as the extent of government control over speech—can themselves undermine accountability if they are not accompanied by authorship transparency.18See Shurtleff, 142 S. Ct. at 1590 (listing the factors that the Court has considered in the past). See also Hemel & Larrimore, supra note 16, at 58 (“[T]he emphasis on selectivity in several of the Court’s cases leads to the counterintuitive result that Free Speech Clause scrutiny is relaxed when government exerts greater control over the flow of ideas.”).

A closely related problem can occur, even where there is no doubt that the speech at issue is produced or disseminated by the government, if that speech is falsely presented as a product of expertise or evidence-based fact-finding rather than political pressure. As with UE theory, the problem is politicized knowledge production. Elsewhere, I have referred to this phenomenon as “distortion.”19See, e.g., Heidi Kitrosser, Distorting the Press, Knight First Amend. Inst. (July 16, 2024), https://knightcolumbia.org/content/distorting-the-press [https://perma.cc/AUZ7-CQA7].

Distortion occurs when the government—whether through employment or subsidies—sponsors the creation or dissemination of speech but imposes conditions that distort the nature of the speech or its production.20Id. In the context of government speech doctrine, the conditions would typically be imposed on the receipt of subsidies or on continued employment. In the unitary executive context, the means of enforcing conditions can vary and will depend partly on how aggressively UE theory is interpreted. At minimum, enforcement can entail actual or threatened removal from office. Recently, I illustrated the phenomenon of distortion as follows:

Take the example of a climate scientist who works for NASA and contributes to publicly issued reports and testimony that purport to detail scientific findings. Presumably, it is no secret that the scientist works for a government agency and is paid with public funds. Yet an accountability concern remains insofar as the public can be expected to assume that the scientist’s contributions to public reporting are based on professional judgment and scientific best practices. Were those contributions instead shaped by political directives, the public would effectively be duped through distortion that cloaks political messaging in the vestments of science.21Heidi Kitrosser, The Government Speech Doctrine Goes to School, Knight First Amend. Inst. (Oct. 11, 2024), https://knightcolumbia.org/content/the-government-speech-doctrine-goes-to-school [https://perma.cc/4Q85-2KKU] [hereinafter Kitrosser, The Government Speech Doctrine Goes to School].

Distortion can have both near-term and very far-reaching impacts on substantive accountability. To be sure, the line between short- and long-term consequences is a fuzzy one. For example, suppose that political appointees pressured civil servant scientists in an agency to bury or skew research findings that cast doubt on the feasibility of a presidential initiative. In the short run, such intimidation might prevent the public from hearing the unvarnished views of scientists on an electorally salient matter. In the longer run, the pressure campaign—particularly if it were not an isolated incident—might drive highly qualified scientists from the affected agency and deter others from serving in the first place. Such churn, along with the atmosphere that precipitated it, could impact public access to good-faith products of scientific expertise. Still more perniciously, it might undermine the capacity of the public to distinguish expertise from unfounded assertion.

Nonetheless, rough distinctions can be drawn between actions that undermine accountability in the near term and those that do so over time. Indeed, the preceding example suggests an intuitive place to draw a line: between acts or policies designed to keep discrete pieces of information or analysis from reaching the public, and those designed to politicize public knowledge-producing institutions from the inside. This distinction loosely parallels one made by political scientist Terry Moe between two techniques through which presidents wield control over the administrative state: centralization, whereby presidents institutionalize top-down White House control over agencies, and politicization, whereby presidents seek to shape

agencies through appointment and removal powers so that they are politically in tune with the White House in the first place.22See Terry M. Moe, The Politicized Presidency, in The New Direction in American Politics 235, 244–45 (John E. Chubb & Paul E. Peterson eds., 1985).

In pointing to both short- and long-term impacts to accountability, I mean to highlight the depth of the threat that government speech doctrine and UE theory pose to substantive accountability. From a short-term perspective, even if a knowledge institution were to remain fundamentally unchanged by political interference, the partisan manipulation of discrete pieces of data or expert analyses can distort the very picture of reality against which the electorate votes. In the longer run, the impact is yet more serious and harder to reverse, as politicization permeates state-funded enterprises purportedly devoted to disciplinary and professional expertise.

II. Major Judicial Precedent (and a Glimpse at Executive Branch Precedent)

A. Government Speech Doctrine

In this Section, I review the major Supreme Court cases on government speech doctrine, emphasizing their relationships to accountability. The Court has developed the doctrine over the past few decades. Its premise is largely uncontroversial: “[w]hen the government speaks, it is not barred by the Free Speech Clause from determining the content of what it says.”23Walker v. Tex. Div., Sons of Confederate Veterans, Inc., 576 U.S. 200, 207 (2015). For example, as Justice Rehnquist wrote in 1991’s Rust v. Sullivan, “[w]hen Congress established a National Endowment for Democracy to encourage other countries to adopt democratic principles, . . . it was not constitutionally required to fund a program to encourage competing lines of political philosophy such as communism and fascism.”24Rust v. Sullivan, 500 U.S. 173, 194 (1991). Similarly, Justice Breyer, writing for the majority in Shurtleff v. Boston in 2022, posited that “Boston could not easily congratulate the Red Sox on a victory were the city powerless to decline to simultaneously transmit the views of disappointed Yankees fans.”25Shurtleff v. City of Boston, 142 S. Ct. 1538, 1589 (2022).

Despite the commonsense idea at the doctrine’s core—and the intuitive appeal of examples like those invoked by Rehnquist and Breyer—the doctrine’s scope is heavily contested. Two categories of cases raise especially tough questions. The first entails restrictions that fall on speech that can plausibly be characterized as private, rather than governmental speech. For example, the Supreme Court held in Walker v. Texas Division, Sons of Confederate Veterans that specialty license plates in Texas, even those designed by private groups to reflect private hobbies and interests, constitute government speech.26Walker, 576 U.S. at 204–05, 214–15; id. at 221–22, 225–26 (Alito, J., dissenting). Dissenting on behalf of himself and three other justices, Justice Alito lamented the Court’s “capacious understanding of government speech” that “threatens private speech that government finds displeasing.”27Id. at 221–22 (Alito, J., dissenting). Sounding a similar alarm, Mary-Rose Papandrea wrote that Walker put “the Court’s growing deference to government institutional actors . . . on steroids, allowing the government to disfavor private speech in the name of protecting its image.”28Mary-Rose Papandrea, The Government Brand, 110 Nw. U. L. Rev. 1195, 1197 (2016).

The second category, and the one on which I focus in this essay, arises when government purports to subsidize speech that reflects evidence-based reasoning or that otherwise is governed by professional or disciplinary norms, but conditions its support on terms that would distort the nature of the undertaking. Distortion would occur, for example, if the government were to hire investigators to probe alleged wrongdoing or climate scientists to undertake research and report their findings while pressuring them to bury politically unwelcome results.

Distortion undermines free speech values in the same way that it undermines accountability: in the short term, it uses subsidized speakers to launder political messaging and present it as professional or disciplinary expertise; in the long run, it degrades the public’s capacity to consume and process information necessary to oversee their government.

The distorting potential of government speech doctrine is as old as the doctrine itself. Indeed, commentators most often trace the doctrine’s origins to Rust v. Sullivan, a case that itself raises the specter of distortion. In Rust, the Supreme Court upheld federal regulations barring family planning clinics from mentioning abortion in the course of providing federally subsidized counseling.29Rust, 500 U.S. at 191. Although the Rust Court did not invoke the concept of government speech explicitly,30Id. at 196 (characterizing the regulations as simply setting boundaries on the scope of a government-funded program). the Supreme Court described Rust in these terms just a few years later, in Rosenberger v. Rector and Visitors of the University of Virginia.31Rosenberger v. Rector & Visitors of U. of Va., 515 U.S. 819, 833 (1995). The Rosenberger Court characterized Rust as grounded in the notion that “when the government appropriates public funds to promote a particular policy of its own it is entitled to say what it wishes.”32Id. See also Legal Servs. Corp. v. Velazquez, 531 U.S. 533, 541 (2001) (explaining that “Rust did not place explicit reliance” on the government speech rationale, but that, “when interpreting the holding in later cases . . . we have explained Rust on this understanding”). Rust’s critics have argued that the challenged conditions forced medical providers to choose between funding and professional and ethical norms; in short, that the conditions distorted the funded healthcare.33See, e.g., Heidi Kitrosser, Politics, Knowledge, and Government Speech, in Elgar Companion to Free Expression (Alan Chen & Ashutosh Bhagwat eds.) (forthcoming 2025) (citing Robert C. Post, Subsidized Speech, 106 Yale L.J. 151, 174 (1996); Caroline Mala Corbin, Mixed Speech: When Speech Is Both Private and Governmental, 83 N.Y.U. L. Rev. 605, 667 (2008)).

Fifteen years after Rust, the Supreme Court decided the government speech case that is most conducive to distortion: Garcetti v. Ceballos.34See generally Garcetti v. Ceballos, 547 U.S. 410 (2006). Garcetti established that public employees receive no First Amendment protection against termination or other job-related penalties for speech that they convey while doing their jobs. Garcetti relies at least partly on a government speech rationale, characterizing public employee work product speech as speech that “the employer itself has commissioned or created.”35Id. at 422. Indeed, to support this point, the Garcetti Court cites Rosenberger’s description of Rust’s holding. Id. (citing Rosenberger, 515 U.S. at 833). See also, e.g., Norton, supra note 15, at 20 (critiquing Garcetti as an outgrowth of an overly expansive government speech doctrine). The assumption that government employees invariably convey a government-crafted message when they speak runs headlong into distortion concerns in the many cases in which employees are hired to provide professional judgment and expertise.

The Supreme Court regularly parries concerns about abuses of the doctrine by invoking political accountability. In Shurtleff v. City of Boston, for example, the Court reiterated its view that “[t]he Constitution . . . relies first and foremost on the ballot box, not on rules against viewpoint discrimination, to check the government when it speaks.”36Shurtleff v. City of Boston, 142 S. Ct. 1538, 1589 (2022). In Walker, the Court similarly argued that “the democratic electoral process . . . provides a check on government speech,” and added that such speech itself is an expression of voters’ wishes: “members of the public . . . influence the choices of a government that, through words and deeds, will reflect its electoral mandate.”37Walker v. Tex. Div., Sons of Confederate Veterans, Inc., 576 U.S. 200, 207 (2015).

The Garcetti Court also suggested that electoral accountability will yield legislation to protect public employee speech that is in the public interest. Writing for the Garcetti majority, Justice Kennedy cited the existence of a “powerful network of legislative enactments—such as whistle-blower protection laws and labor codes—available to those who seek to expose wrongdoing.”38Garcetti, 547 U.S. at 425. See also Heidi Kitrosser, On Public Employees and Judicial Buck-Passing: The Respective Roles of Statutory and Constitutional Protections for Government Whistleblowers, 94 Notre Dame L. Rev. 1699, 1708–10 (2019) [hereinafter Kitrosser, Judicial Buck-Passing] (criticizing this statement by the Garcetti Court for, among other reasons, overstating the depth and breadth of statutory whistleblower protections). This reasoning is similar to that invoked by the Court in 1983’s Bush v. Lucas.39Bush v. Lucas, 462 U.S. 367, 387 (1983). The Lucas Court held that most First Amendment damages claims brought by federal employees against their employers are precluded by federal statutory civil service protection laws,40Id. at 368. even as the Court “assumed, arguendo, that the [statutory] remedies . . . were not ‘as effective as an individual damages remedy.’ ”41Kitrosser, Judicial Buck-Passing, supra note 38, at 1706 (quoting Lucas, 462 U.S. at 372). The Court reasoned that Congress has ample incentive to protect public employee speech, particularly whistleblowing, given Congress’s “special interest in informing itself about the efficiency and morale of the Executive Branch.”42Lucas, 462 U.S. at 389.

B. Unitary Executive Theory

At first blush, UE theory has little in common with government speech doctrine; the former is an argument about government structure—specifically, the separation of powers—and pertains only to the federal government. Unity’s core assertion is that the president must control all discretionary activity in the federal executive branch, at minimum by having the power to remove anyone whose job entails such activity. The theory is grounded partly in interpretations of Article II’s text and history.

Yet UE theory shares important features with government speech doctrine. Most importantly, unity threatens substantive accountability even as its proponents justify it largely by reference to formal accountability. As with government speech doctrine, distortion is the main means by which UE theory can undermine substantive accountability.

A 1988 memorandum opinion by the Justice Department’s Office of Legal Counsel (“OLC”) illustrates how UE theory can enable political control of ostensibly non-political, even highly technical, communications.43This discussion of the OLC memo, including citations, is taken from Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1488. In that memo, the OLC took the position that Congress could not constitutionally require the Director of the Centers for Disease Control (“CDC”) to mail “AIDS information fliers” to the public “without necessary clearance” by the president.44Charles J. Cooper, Statute Limiting the President’s Authority to Supervise the Director of the Centers for Disease Control in the Distribution of an AIDS Pamphlet, in Opinions of the Office of Legal Counsel of the United States Department of Justice: Consisting of Selected Memorandum Opinions Advising the President of the United States, the Attorney General and Other Officers of the Federal Government in Relation to Their Official Duties 47, 47 (1988). “It matters not at all,” the OLC asserted, “that the information in the AIDS fliers may be highly scientific in nature. The president’s supervisory authority encompasses all of the activities of his executive branch subordinates, whether those activities be technical or non-technical in nature.”45Id. at 57. This “necessarily follows,” the opinion continues, “from the fact that the Constitution vests ‘[t]he entire executive Power,’ without subject matter limitation, in the President.” Id. The OLC further stressed the categorical nature of the president’s authority by quoting a 1982 OLC opinion to the effect that the president’s “ultimate control over subordinate officials . . . includes the right to supervise and review [their] work . . . including reports issued either to the public or to Congress.”46Id. (emphasis omitted).

As we have seen, unity’s proponents deem it essential to preserve accountability,47See, e.g., Calabresi, supra note 3, at 35–37, 45, 59, 65–66; Lessig & Sunstein, supra note 3, 97–99; Prakash, supra note 3, 998–99, 1012–15. See also Kitrosser, The Accountable Executive, supra note 3, 1747–48 nn.28–32 and accompanying text (summarizing accountability-based unity arguments and their sources). despite its negative effects on substantive accountability. Recall the major features of the accountability-based argument for unity. First, proponents observe that the president is the only elected member of the federal executive branch and contrast him with unelected bureaucrats.48See, e.g., Kitrosser, The Accountable Executive, supra note 3, at 1747 (citing Lessig & Sunstein, supra note 3, at 97–99). They also deem him more politically accountable than members of Congress, given his high visibility and the fact that he alone is subject to election by the entire nation through the Electoral College.49See, e.g., Kitrosser, The Accountable Executive, supra note 3, at 1748 (citing Calabresi, supra note 3, at 58–70; Prakash, supra note 3, at 993, 1012–15). As such, it is only when the president “controls all law execution in the United States [that] the national electorate has a clear object of blame or reward for such activity.”50Kitrosser, The Accountable Executive, supra note 3, at 1747 (citing Calabresi, supra note 3, 35–37, 59, 65–66).

The accountability rationale for unity is not extolled only by sympathetic scholars and executive branch lawyers. It has also been central to unity-friendly judicial precedent since the 1926 case of Myers v. United States.51The summary of Myers that follows, including citations, is drawn largely from a more detailed summary in Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1476–78. In Myers, the Court invalidated legislation that required the president to obtain Senate approval before removing a postmaster whom the president had appointed with the Senate’s advice and consent.52Myers v. United States, 272 U.S. 52, 176 (1926). Fittingly, the Court’s opinion was written by Chief Justice Taft, the only Justice in history to have previously served as U.S. President.53See Robert Post, Tension in the Unitary Executive: How Taft Constructed the Epochal Opinion of Myers v. United States, 45 J. Sup. Ct. Hist. 167, 167 (2020) (noting that “Taft is the only person ever to have served as both president of the United States and as chief justice of the Supreme Court,” and that this “unique confluence of roles is evident in Myers”). Much of Taft’s analysis centered on the so-called “Decision of 1789,”54See Myers, 272 U.S. at 176. a lengthy debate in the First Congress on the president’s power to remove officers.55See id. at 146. Taft characterized the Decision partly as a referendum on the accountability rationale. Quoting James Madison in the 1789 Debate, Taft wrote:

If the President should possess alone the power of removal from office, those who are employed in the execution of the law will be in their proper situation, and the chain of dependence be preserved: the lowest officers, the middle grade, and the highest will depend, as they ought, on the President, and the President on the community.56Id. at 131.

Taft also stressed the relative depth of presidential accountability: “the President, elected by all the people, is rather more representative of them all than are the members of either body of the Legislature, whose constituencies are local and not country wide.”57Id. at 123.

More than seven decades would pass before unity arguments would again be received so enthusiastically by the Supreme Court. In the interim, the Court decided a series of cases in which it upheld statutory restrictions on removal, distinguishing each from the provision reviewed in Myers and thus effectively narrowing Myers’ reach.58Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1478–79 (citing generally Humphrey’s Ex’r v. United States, 295 U.S. 602 (1935), Bowsher v. Synar, 478 U.S. 714 (1986); Morrison v. Olson, 487 U.S. 654 (1988)). In Humphrey’s Executor v. United States, decided just nine years after Myers, the Court deemed Myers’ holding limited to “purely executive officers.”59Humphrey’s Ex’r, 295 U.S. at 631–32. See also Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1479 n. 34 (“More pointedly, Justice Sutherland specified that any aspects of Justice Taft’s lengthy exposition in Myers going beyond that core point are mere dicta. Sutherland also declared that ‘[i]n so far as’ any statements in Justice Taft’s opinion in Myers ‘are out of harmony’ with those expressed in Humphrey’s Executor, the former ‘are disapproved.’ ”) (citing Humphrey’s Ex’r, 295 U.S. at 626). In two 1980s cases—Bowsher v. Synar60Bowsher, 478 U.S. at 724–25. and Morrison v. Olsen61Morrison, 487 U.S. at 686–90 (1988).—the Court characterized Myers as a directive against Congress reserving the removal power for itself; Myers did not categorically bar other limits, such as for-cause requirements, on the president’s power to remove even purely executive officers.62Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1479 (citing Morrison, 487 U.S. at 686, 689). Chief Justice Rehnquist, writing for the Morrison Court, explained that the validity of a removal restriction turns on a flexible, functional question: whether the restriction is “of such a nature that [it impedes] the President’s ability to perform his constitutional duty.”63Morrison, 478 U.S. at 691 (cited in Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1479).

As the lone dissenter in Morrison, Justice Scalia penned an opinion that has since become a classic in the UE theory canon and that presaged the Roberts Court’s warm embrace of unity.64See Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1480 (citing Ganesh Sitaraman, The Political Economy of the Removal Power, 134 Harv. L. Rev. 352, 380 (2020); Amanda Hollis-Brusky, Helping Ideas Have Consequences: Political and Intellectual Investment in the Unitary Executive Theory, 1981–2000, 89 Denv. U. L. Rev. 197, 209–10 (2011)). Among other things, Scalia invoked accountability.65Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1479–80 (citing Morrison, 487 U.S. at 729 (Scalia, J., dissenting)). The president, he observed, “is directly dependent on the people.” Indeed, the Constitution’s founders touted the relative accountability of a single president as opposed to a multi-member body: “since there is only one President . . . [t]he people know whom to blame” when something goes awry.66Morrison, 487 U.S. at 729 (Scalia, J., dissenting). In the case of prosecutors, an unfettered presidential removal power ensures that “when crimes are not investigated and prosecuted fairly . . . the President pays the cost in political damage to his administration.”67Id. at 728–29.

Beginning in 2010, the Roberts Court retreated from the functional approach that the Supreme Court had embraced for most of the twentieth century.68See Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1480 (“Since 2010, when Chief Justice Roberts wrote for the majority in Free Enterprise Fund v. Public Company Accounting Oversight Board (PCAOB), the Roberts Court has distanced itself from the deference exhibited in Humphrey’s Executor and Morrison.”) (citing Free Enter. Fund v. Pub. Co. Acct. Oversight Bd., 561 U.S. 477, 483 (2010)). As of now, the Court has not explicitly overruled Humphreys Executor, Bowsher, or Morrison. It has, however, reframed them, suggesting that they stand only for discrete “exceptions to the President’s unrestricted removal power.”69Seila Law LLC v. Consumer Fin. Prot. Bureau, 591 U.S. 197, 204–06, 228–30 (2020). See also Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1481–82 (discussing this line of reasoning in both Seila and PCAOB). Accordingly, the Roberts Court has struck down several statutes imposing limits on this power, including a law that permitted the president to remove the director of the Consumer Financial Protection Bureau only for “inefficiency, neglect of duty, or malfeasance in office.”70Seila, 591 U.S. at 206–07.

Like the Taft Court, the Roberts Court identifies accountability as a central reason why the Constitution demands a unitary executive. Indeed, in every case in which it has rejected presidential removal restrictions, the Roberts Court has followed Taft’s lead by quoting James Madison’s 1789 statement that “the lowest officers, the middle grade, and the highest,” ought to depend “on the President, and the President on the community.”711 Annals of Cong. 518 (1789) (Joseph Gales ed., 1834) (J. Madison) (quoted in Seila, 591 U.S. at 223–25; Collins v. Yellen, 594 U.S. 220, 251–52 (2021); Free Enter. Fund, 561 U.S. at 498); see also Myers v. United States, 272 U.S. 52, 171 (1926) (quoting Taft’s use of same quote in Myers); Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1482 n.66 and accompanying text.

To be sure, unity’s proponents do not rely solely on accountability; they also invoke arguments from constitutional history and text. Elsewhere, I have recounted and built on some of the major rejoinders to these text and history-based arguments.72See, e.g., Kitrosser, “A Government That Benefits from Expertise,” supra note 4, at 1482–83; Kitrosser, Interpretive Modesty, supra note 5, at 507–10. Although my focus in this Essay is on accountability, it is worth noting that unity’s text and history-based arguments—and their failings—are themselves intertwined with unity’s enervated vision of accountability. This is true, for example, of unity proponents’ over-reading of founding-era arguments linking constitutional and statutory provisions to accountability. Proponents tend to leap from highly case-specific founding era arguments to a broad, acontextual constitutional unity directive, a move enabled by their fixation on formal, rather than substantive accountability.73See, e.g., Kitrosser, Interpretive Modesty, supra note 5, at 512. This phenomenon is illustrated by unity proponents’ use of the founding era decision not to append an advisory council to the president. As I explained in a previous article:

[U]nity proponents cite founding fears that the President would hide behind his council, blaming it for his own poor decisions and thus defeating accountability. From this, unity proponents leap to the conclusion that the founders wanted the President to fully control all discretionary executive decisions and executive officers. Yet this conclusion massively oversimplifies the nature of the council debate. Council opponents focused on features specific to the proposed council, including its small size and its ability to collude with the President in relative secrecy. Notably, they also feared that the President and his council would seek to appoint executive branch officers who “possess[ed] the necessary insignificance and pliancy to render them the obsequious instruments of [the President’s] pleasure.” At minimum, the council debate, centering as it did on the specific features of the proposed council, simply did not address whether the executive branch must in all respects be unitary. If anything, the accountability-related concerns articulated in the debate suggest that the founders feared full presidential control over executive branch decision making and officers. Unfettered control could, among other things, foster secretive collusions between the President and those in his thrall.74Kitrosser, Interpretive Modesty, supra note 5, at 512 (citing Kitrosser, Reclaiming Accountability, supra note 4, at 146, 152–55; The Federalist No. 76, at 458 (Alexander Hamilton) (Clinton Rossiter ed., 1961)).

III.  Contemporary Threats to Substantive Accountability

In Part III, I present three sets of examples that span the period from the post-Watergate years to the earliest days of the second Trump Administration. In Section III.A, I look at the development of UE theory in the Department of Justice (“DOJ”) during the late 1970s and 1980s and its use by the Department to resist post-Watergate ethics and oversight measures. I observe that Donald Trump has picked up this mantle in more recent years, including through his resistance to oversight by Inspectors General. In Section III.B, I look at the impact of both unity and government speech doctrine on the civil service more broadly. In Section III.B.1, I discuss the relationship between the federal civil service and UE theory. I focus especially on “Schedule F,” newly reinstated through executive order on the first day of the second Trump Administration and aimed at replacing vast swaths of the civil service with political appointees. In Section III.B.2, I summarize two key reasons, including Garcetti’s impact, for the enervated state of first amendment protections for federal civil servants. In Section III.B.3, I cite several examples—including a recent spate of state laws regulating the classroom speech of public school teachers and professors—of government speech doctrine’s effect on state and local employees.

A. Unitary Executive Theory and Federal Investigations

Investigations that could implicate the president or his allies are classic locations for dispute over the constitutionality and wisdom of restrictions on the president’s ability to fire personnel or interfere with their work. Morrison v. Olson itself involved a challenge to the independent counsel provisions of the 1978 Ethics in Government Act. Enacted in the wake of Watergate, the Act was an effort to confront public corruption, in part by creating an independent counsel (“IC”) with some degree of distance from presidential control. The Act’s IC provisions were responsive to fears that presidents would, as Richard Nixon had done, interfere with Justice Department investigations in which they could be implicated. Olson challenged these provisions partly on the basis that the IC was incompatible with a unitary executive because the IC did not serve at the president’s pleasure. Instead, the IC could be terminated only by the Attorney General (“AG”), who herself is subject to at-will dismissal by the president. The AG could fire the IC “only for good cause, physical or mental disability . . . or any other condition that substantially impairs [the IC’s] performance of . . . [their] duties.”75Ethics in Government Act, 28 U.S.C. § 596(a)(1) (1978).

The majority and dissenting opinions in Morrison reflected two very different ideas about unity and accountability. To the majority, written by Justice Rehnquist, the judicial mission was limited and functional: its role was not “to define rigid categories”76Morrison v. Olson, 487 U.S. 654, 689 (1988). but to ensure that legislation does not “interfere impermissibly with [the president’s] constitutional obligation to ensure the faithful execution of the laws.”77Id. at 693. Among the factors that Rehnquist cited to explain why the removal restriction passed this practical assessment, it “was essential, in the view of Congress, to establish the necessary independence of the office,” an office that could be tasked with investigating the president or close advisors.78Id. To Justice Scalia, the lone dissenter, the president possessed all the executive power—a conclusion that he reached by interpreting Article II’s opening words, “[t]he executive Power shall be vested in a President of the United States,” to mean “all of the executive power”—and such power necessarily entails complete and indefeasible removal authority.79Id. at 705 (Scalia, J., dissenting). As for the risk that the president might abuse this power, Justice Scalia answered that “the primary check against prosecutorial abuse is a political one. The prosecutors who exercise this awesome discretion are selected and can be removed by a President, whom the people have trusted enough to elect.”80Id. at 728. Justice Scalia’s vision of accountability was so narrow that he treated the IC provisions, enacted by elected members of Congress and subject to presidential veto, as constitutionally intolerable because they might subject the president and their advisers to popular scrutiny. The provisions, Scalia said, “weaken[] the Presidency by reducing the zeal of his staff” and “enfeeble[] him more directly in his constant confrontations with Congress, by eroding his public support.”81Id. at 713.

Although functionalism—and substantive accountability—prevailed over formalism in Morrison, Justice Scalia’s views would eventually receive a much warmer reception in the Roberts Court. Within the executive branch, unitary executive theorists did not need to wait nearly so long to see their ideas put into practice. The Justice Department in the Reagan Administration was deeply entwined with the conservative legal movement,82See Deborah Pearlstein, The Democracy Effects of Legal Polarization: Movement Lawyering at the Dawn of the Unitary Executive, 2 J. Am. Const. Hist. 357, 365–67, 378 (2024); Sitaraman, supra note 64, at 377–78; Hollis-Brusky, supra note 64, at 202–03, 214–15; Steven M. Teles, Transformative Bureaucracy: Reagan’s Lawyers and the Dynamics of Political Investment, 23 Stud. Am. Pol. Dev. 61, 62–63, 66, 69–75, 79–80 (2009). and both the Department and the broader movement made the advancement of UE theory a priority.83See Pearlstein, supra note 82, at 366–67, 378; Sitaraman, supra note 64, at 377–80; Hollis-Brusky, supra note 64, at 205–06, 212–13. Conservative legal elites viewed unity as one means of reigning in the perceived liberalism of the administrative state, and were also drawn to it because Republicans at the time had better electoral chances with the presidency than in either house of Congress.84See Pearlstein, supra note 82, at 362 (citing Jack Goldsmith, The Accountable Presidency, The New Republic, (Jan. 31, 2010), https://newrepublic.com/article/72810/the-accountable-presidency [https://perma.cc/H2SA-3SLW] (quoting Jeffrey Hart, The Presidency: Shifting Conservative Perspectives?, 26 Nat’l Rev. 1351, 1353, 1355 (1974))); see also Charlie Savage, Takeover: The Return of the Imperial Presidency and the Subversion of American Democracy 44–46 (2007); see generally Charles Fried, Order and Law: Arguing the Reagan Revolution—A Firsthand Account (1991).

Much of the pro-unity activity in the Reagan-era Justice Department was directed against post-Watergate legislation that imposed oversight measures on executive branch lawyers. Recounting these efforts, Deborah Pearlstein writes:

[T]he first sustained campaigns to apply unitary executive theory to the day-to-day workings of government began within the Department of Justice, and some of the most important battles focused on just [the] claim . . . that an appropriate understanding of the executive power required recognizing constitutional limits on the ability of Congress and the federal courts to engage in professional oversight of Justice Department lawyers. On some occasions quite visibly, on others largely in secret, movement lawyers deployed unitary executive arguments to challenge or block three of the major tools that post-Watergate reformers had pursued to ensure government attorneys would worry more about being held accountable for their misconduct: (1) strengthened rules of professional ethics; (2) an Office of Professional Responsibility inside the Department of Justice to investigate ethics complaints against government attorneys; and (3) independent inspectors general to investigate allegations that government officials were responsible for waste, fraud, or abuse.85Pearlstein, supra note 82, at 370.

Unity proponents also made their cases—for UE theory generally and against independent oversight of federal officials in particular—to the practicing bar, to legal academics, and to law students.86See id., at 365–67, 378; Hollis-Brusky, supra note 64, at 205–06, 212–13 Sitaraman, supra note 64, at 377–80; Teles, supra note 82, at 62–63, 66, 69–75, 79–80. These efforts contributed to unity’s eventual reversal of fortune in the courts. They also helped to shift the norms of acceptable conduct among government officials, both because they “weakened internal ethics checks” and created a permission structure for ethical breaches.87Id. at 359, 370. Indeed, the repeated refrain that oversight legislation weakens the president and affronts voters lends itself to arguments that even highly credible and serious misconduct allegations are mere “partisan attack[s].”88Id. at 359.

Although UE theory has a decided partisan valence historically, its allure as a means to push back against oversight has not been lost on Democrats when they occupy the oval office. Although the DOJ Inspector General—against which movement lawyers fought—was not established until 1988,89Id. at 377–78. the initial Inspectors General Act was enacted in 1978, and then-President Jimmy Carter’s OLC objected to two aspects of the law as inconsistent with unitary presidential control of subordinates.90See generally John M. Harmon, Assistant Att’y Gen., Off. Legal Couns., Memorandum Opinion for the Attorney General: Inspector General Legislation (Feb. 21, 1977). John Harmon, Carter’s Acting Assistant AG for the OLC, objected in a memorandum to the Act’s removal provision, which gave the president at-will removal power over Inspectors General (“IGs”) but required them to notify both Houses of Congress of their reasons for removal. Citing Myers, Harmon called this an “improper restriction on the President’s exclusive power to remove Presidentially appointed executive officers.”91Id. at 18. Harmon also objected to the IG’s statutory “obligation to keep Congress fully and currently informed” and the related “requirement that [the IG] provide any additional information or documents requested by Congress . . . without executive branch clearance or approval.”92Id. at 17. In Harmon’s view, these informing rules interfere with the president’s “general administrative control over those executing the laws,” which “includes the right to coordinate and supervise all replies and comments from the executive branch to Congress.”93Id.

Finally, and unsurprisingly, Donald Trump has been especially brazen in resisting accountability measures and in invoking unity to do so. Examples to this effect include his dismissals of Inspectors General during his first administration and in the first week of his second administration. During his first administration, Trump notoriously fired several Inspectors General who investigated controversies ranging from the administration’s handling of the Covid-19 pandemic to the call between Trump and the Ukrainian president that led to Trump’s first impeachment.94See, e.g., Bob Bauer & Jack Goldsmith, Inspector General Reform on the Table, Lawfare (Oct. 5, 2021, 3:23 PM), https://www.lawfareblog.com/inspector-general-reform-table [https://perma.cc/9KCR-PQ79]; Melissa Quinn, The Internal Watchdogs Trump Has Fired or Replaced, CBS News (May 19, 2020, 11:43 AM), https://www.cbsnews.com/news/trump-inspectors-general-internal-watchdogs-fired-list [https://perma.cc/4Y4U-TZ89]; Michael C. Dorf, Inspector General Firings Highlight the Danger of the Unitary Executive Theory, Dorf On L. (May 18, 2020), http://www.dorfonlaw.org/2020/05/inspector-general-firings-highlight.html [https://perma.cc/KAY3-QNBL]. Trump made clear his view that UE theory empowered him to take such actions.95Steven D. Schwinn, Trump’s Tears Against Inspectors General Tell Us It’s Time to Abandon the Unitary Executive Theory, Jurist (Apr. 13, 2020, 6:03 PM), https://www.jurist.org/commentary/2020/04/steven-schwinn-trumps-tears [https://perma.cc/6YVP-HXCD]. As of this writing, less than one week into Trump’s second administration, he has already fired more than a dozen Inspectors General in the course of a single Friday evening. The firings eschewed the applicable statutory requirement that Congress receive thirty days’ notice of any removal including a “substantive rationale” with “detailed and case-specific reasons” for removal.96See David Nakamura, Lisa Rein & Matt Viser, Trump Defends Ousting at Least 15 Independent Inspectors General in Late-Night Purge, Wash. Post (Jan. 25, 2025), https://www.washingtonpost.com/politics/2025/01/24/trump-fire-inspectors-general-federal-agencies [https://web.archive.org/web/20250225161555/https://www.washingtonpost.com/politics/2025/01/24/trump-fire-inspectors-general-federal-agencies]; Megan Messerly, Josh Gerstein, Kyle Cheney & Nahal Toosi, Trump Fires Independent Inspectors General in Friday Night Purge, Politico (Jan. 25, 2025, 9:20 PM), https://www.politico.com/news/2025/01/25/donald-trump-inspectors-general-firing-00200611 [https://web.archive.org/web/20250127090247/https://www.politico.com/news/2025/01/25/donald-trump-inspectors-general-firing-00200611].

B. Broader Attacks on the Civil Service: UE Theory and Government Speech Doctrine at Work

  1. Unitary Executive Theory

UE theory also threatens the federal civil service on the whole, including disciplinary experts such as scientists, economists, and public health researchers. Unity can undermine their ability to disseminate competent, good-faith information and analyses that an administration finds politically inconvenient. Such impacts have both short-term and long-term aspects. In the short term, presidents and their political subordinates may invoke unity to block or manipulate certain communications. In the longer run, they may nip such communications in the bud more seamlessly by thinning out the merit-based civil service in favor of a largely political workforce.

As for short-term impacts, there are two major categories of valuable civil service communications at risk. The first is whistleblowing regarding wrongdoing in federal agencies. Currently, civil service laws protect federal employees who blow the whistle on bad acts including illegality, waste, and abuse.97Jason Zuckerman & Eric Bachman, The Whistleblower Protection Act: Empowering Federal Employees to Root Out Waste, Fraud and Abuse 2–3 (2017). These protections would be compromised should an administration assert, and even more so should courts agree, that such legislation cannot constitutionally prevent the president from removing, at will, anyone who exercises discretionary executive power. As I elaborate in Part IV, it is by no means a foregone conclusion that courts would allow presidents to bypass civil service protections on unitary executive grounds. It is possible, however, that courts would indeed extend the logic of the Roberts Court removal cases so far. Courts might also draw to the same effect on the Supreme Court’s recent decision in Lucia v. Securities and Exchange Commission in which the Court expanded the definition of “officers” who constitutionally cannot be part of the civil service.98Lucia v. SEC, 585 U.S. 237, 237–38 (2018).

UE theory can also be invoked to stifle civil servants who seek to convey information or analysis in the ordinary course of doing their jobs. Recall, for example, the OLC’s 1988 opinion to the effect that Congress may not require executive branch personnel to distribute even highly technical information without a chance for presidential intervention.99See supra text accompanying notes 44–46. Although the CDC Directorship is not a civil service position, see Barry Sullivan, Lessons of the Plague Years, 54 Loyola U. Chi. L.J. 15, 59 (2022) (noting that the CDC director is a political appointee). The same rationale can be applied to civil servants whose duties include generating or disseminating information or who testify before Congress. Furthermore, to the extent that some such speech falls within the terms of federal whistleblower protection laws,100For example, a government auditor or investigator might make a report in the course of doing their job that also constitutes whistleblowing under the Act. Or scientists or public health experts may discover, in the course of doing job-related research, events that constitute “a substantial and specific danger to public health or safety.” 5 U.S.C. § 2302(b)(8) (listing statutorily protected whistleblower disclosures, including “a substantial and specific danger to public health or safety”). it is vulnerable to the same unity-based threats as that faced by federal whistleblowers more broadly.

Unity can enable much more than the blocking of isolated pieces of information and analysis. It can have a deep, long-range impact by thinning out the ranks of the civil service, enabling the president to fill and potentially fire large swaths of the federal workforce previously designated as nonpartisan merit hires. As noted, it is by no means inevitable that courts would sign off on such sweeping changes. Existing case law does, however, open the door to such a possibility, and at minimum, it can embolden presidents to test the boundaries of precedent by trying to initiate such action.

Donald Trump seems determined to push the limits of a president’s power to politicize the federal workforce. On the first day of his new administration, January 20, 2025, he issued an executive order (“EO”) reinstating the so-called “Schedule F” order that he had issued in the waning days of his first administration.101The new class of political appointments is referred to as “policy / career” appointments, whereas Trump’s earlier EO called them “Schedule F” appointments. See Exec. Order No. 14,171 § 3(a), 90 Fed. Reg. 8625 (Jan. 20, 2025). See also, e.g., Nick Bednar, President Trump and the Civil Service: Day 1, Lawfare (Jan. 23, 2025, 1:32 PM), https://www.lawfaremedia.org/article/president-trump-and-the-civil-service–day-1 [https://perma.cc/U4QJ-RZWA]; Drew Friedman, Trump Revives Executive Order Aiming to Strip Some Federal Employees of Civil Service Protections, Fed. News Network (Jan. 21, 2025, 6:59 PM), https://federalnewsnetwork.com/workforce/2025/01/trump-revives-executive-order-aiming-to-strip-some-federal-employees-of-civil-service-protections [https://perma.cc/Q7VM-DDB3]. The EO authorizes the transition of potentially tens of thousands of career positions throughout the federal workforce into political appointments.102See, e.g., Friedman, supra note 101. The EO expansively defines the jobs that qualify as “policy/career” appointments that can be removed from the civil service. Exec. Order No. 14,171 § 2–3 (incorporating definition from Schedule F with some amendments); Exec. Order 13,957 85 Fed. Reg. 67631 § 5(c) (Oct. 21, 2020) (incorporated into new EO). See also, e.g., Bednar, supra note 101. In its purpose section and even its title, the EO projects confidence that it is permitted, even demanded, by unity and accountability.103See, e.g., Bednar, supra note 101 (“The executive order reinstating Schedule F begins by echoing unitary executive theory.”). The EO is entitled “Restoring Accountability to Policy-Influencing Positions Within the Federal Workforce,” and it asserts that the president has “sole and exclusive authority over the executive branch.” It adds that any power held by federal employees “is delegated by the President,” and that employees “must be accountable to the President, who is the only member of the executive branch, other than the Vice President, elected and directly accountable to the American people.”104Exec. Order No. 14,171 § 1. Fittingly, the idea behind Schedule F during Trump’s first administration originated in a memorandum suggesting that Trump “[e]xplore the ‘Constitutional Option’ for firing federal employees,”105Donald P. Moynihan, Public Management for Populists: Trump’s Schedule F Executive Order and the Future of the Civil Service, 82 Pub. Admin. Rev. 174, 175 (2021) (citing a 2017 Memorandum from James Sherk to White House Domestic Policy Council). and that civil service protections might be unconstitutional.106Id.

There is also an obvious kinship between the EO’s reliance on the notion of presidential accountability and Trump’s longstanding rhetoric about the abuses of the so-called “deep state.”107See, e.g., id. at 175; James Oliphant & Steve Holland, How Trump Plans to Cement Control of Government by Dismantling the ‘Deep State,’ Reuters (Jan. 18, 2025, 4:56 PM), https://www.reuters.com/world/us/how-trump-plans-cement-control-government-by-dismantling-deep-state-2025-01-18 [https://perma.cc/N8B5-MHKJ]; Jeannie Suk Gersen, How Much of the Government Can Donald Trump Dismantle?, New Yorker (Jan. 16, 2025), https://www.newyorker.com/news/the-lede/how-much-of-the-government-can-donald-trump-dismantle [https://perma.cc/TCX5-QP8W]. As Donald Moynihan writes, “Trump was not just antagonistic toward the career public service: this hostility was central to his political identity. He had openly campaigned against the ‘deep state.’ ”108Moynihan, supra note 105, at 175. The EO’s own language frames it as a reaction to “numerous and well-documented cases of career Federal employees resisting and undermining the policies and directives of their executive leadership,” and as a “restor[ation of] accountability to the career civil service.”109Exec. Order No. 14,171 § 1.

  1. Federal Employees and the First Amendment

Federal civil service laws are especially crucial to protect accountability-enhancing speech because federal employees lack robust First Amendment protections. On the rare occasions that an employee’s free speech lawsuit proceeds to the merits, it confronts the Garcetti hurdle. Should a court conclude that the employee’s speech either occurred outside of the course of their employment or warrants an exception from Garcetti, the employee still must overcome a balancing test that defers substantially to employers’ rationales.110Turner v. U.S. Agency for Global Media is a rare example of a First Amendment case in which a federal employee prevailed on the merits. See Turner v. U.S. Agency for Glob. Media, 502 F. Supp. 3d 333 (D.D.C. 2020). Judge Howell found that the federal civil service laws did not preclude those aspects of the complaint that challenged structural changes to the agency as opposed to individual employee disciplinary actions. Id. at 364–70. Judge Howell also found that the type of employment at issue—journalism—fit within an exception to Garcetti. Id. at 374–75. Finally, because the structural changes at issue imposed ex ante limits on a wide swath of communications rather than targeted, post hoc discipline, Judge Howell applied a standard more deferential than the balancing test ordinarily applied in employee speech cases. Id. at 377.

As noted earlier, the reason why federal employees are rarely able to invoke the First Amendment to sue their employers directly is because the Supreme Court held in 1983’s Bush v. Lucas111Bush v. Lucas, 462 U.S. 367, 389–90 (1983). that the federal civil service laws preclude such suits.112Id. at 368. The Lucas Court expressed confidence that Congress would protect whistleblowers.113See id. at 387; supra note 42 and accompanying text. It did not, apparently, anticipate a future in which whistleblower protection laws might themselves be overtaken by aggressive interpretations of UE theory. Even on their own terms, such laws have not reliably served as the “powerful network” that the Garcetti Court assured would protect whistleblowers in lieu of robust first amendment protections.114See Kitrosser, Judicial Buck-Passing, supra note 38, at 1700 and accompanying text. For example, at the time that the Court decided Garcetti, federal whistleblower protection law contained the same hole that

Garcetti created in constitutional coverage—namely, it did not encompass speech made as part of one’s job.115See id. at 1709–10.

  1. The First Amendment and State and Local Employees

Although state and local employees can invoke their First Amendment rights directly, those rights have been narrowed considerably by courts, particularly through the government speech doctrine and Garcetti. Furthermore, as we have seen, the notion underlying a broad government speech doctrine—that public employee speech is rightly, even necessarily subject to political control—also has substantial political currency. That political appeal—coupled with legislators and executive officers feeling emboldened by the state of the case law—have helped give rise to a number of restrictive policies, ranging from sweeping public employee gag rules to legislation micro-managing the classroom speech of public school teachers. In this Section, I discuss three examples of such measures: post-hoc discipline for employee speech, prior restraints on employee communications with the media, and laws targeting public school educators in particular.

First, Garcetti and some lower court interpretations of it negatively impact substantive accountability by opening the door to retaliation for two categories of speech: employee reports of wrongdoing and employee communications on matters of public interest in the course of doing their jobs. The latter requires little explanation, as Garcetti explicitly permits discipline for speech that constitutes work product, however truthfully and competently performed. The former also follows plainly from Garcetti to the extent that catching and reporting on internal wrongdoing is a part of one’s job. Furthermore, although lower court interpretations of Garcetti are not monolithic, some define job duty speech broadly enough to capture a good deal of such whistleblowing. For example, some courts treat the fact that an employee reported wrongdoing through their “chain of command,” or through some other avenue that lacks a “civilian analogue,” as evidence that the report fell within their job duties.116See Heidi Kitrosser, The Special Value of Public Employee Speech, 2015 Sup. Ct. Rev. 301, 320–23 (2016) (and cases cited therein) [hereinafter Kitrosser, Special Value of Public Employee Speech]; Frank D. LoMonte, Putting the ‘Public’ Back into Public Employment: A Roadmap for Challenging Prior Restraints that Prohibit Government Employees from Speaking to the News Media, 68 U. Kan. L. Rev. 1, 23–24 (2019) (and cases cited therein). Some courts accord the same meaning to the fact that an employee’s speech is directed toward resolving problems that interfere with their duties.117See Kitrosser, Special Value of Public Employee Speech, supra note 116, at 317–19 (and cases cited therein). Furthermore, despite contrary language in a 2014 Supreme Court case,118Lane v. Franks, 573 U.S. 228, 240 (2014) (“[T]he mere fact that a citizen’s speech concerns information acquired by virtue of his public employment does not transform that speech into employee—rather than citizen—speech. The critical question under Garcetti is whether the speech at issue itself is ordinarily within the scope of an employee’s duties, not whether it merely concerns those duties.”). some lower courts have treated the fact that an employee learned about information on the job as a factor that weighs against First Amendment coverage should they face discipline for communicating it.119See Kitrosser, Special Value of Public Employee Speech, supra note 116, at 315–17 (and cases cited therein).

Second, although there is a sound basis to conclude that Garcetti does not license agencies to impose sweeping prior restraints on employee speech,120See, e.g., LoMonte, supra note 116, at 13–19, 25–32 (explaining that prior restraints on employee speech are properly analyzed under United States v. NTEU (1995) rather than Garcetti and that most cannot survive review under NTEU); Univ. of Fla. Brechner Ctr. for Freedom of Info., Protecting Sources and Whistleblowers: The First Amendment and Public Employees’ Right to Speak to the Media 4–9 (2019). and some courts indeed have struck down such policies,121LoMonte, supra note 116, at 29–32; Brechner Ctr., supra note 120, at 5–9. there remain scores of federal, state, and local directives that bar employees across multiple agencies from speaking to reporters without authorization. A 2019 report by the Brechner Center for Freedom of Information at the University of Florida found “dozens of examples of policies that either forbid government employees from speaking to journalists at all, or require that they obtain a supervisor’s permission before doing so.”122Brechner Ctr., supra note 120, at 3. See also id. at 7–8, 10–12; LoMonte, supra note 116, at 36 (citing Brechner Center’s research). Such policies persist in part because “Garcetti fueled a mindset among government managers and their counsel that the courts would view restrictions on employee speech deferentially.”123LoMonte, supra note 116, at 26–27. The political currency of the notion underlying Garcetti and government speech doctrine more broadly—that agency employees can be made to speak in one voice, dictated by political leadership—plays an important role as well.

Third, over the past several years, public school teachers—college and university professors as well as K12 instructors—have faced a host of state laws barring them from conveying certain ideas about race or gender in the classroom.124See Kitrosser, The Government Speech Doctrine Goes to School, supra note 21 (citing and discussing these laws). State and public school board defendants have leaned heavily on the government speech doctrine to justify the laws. To defend its restrictions on the instructional speech of public college professors, for example, the state of Florida asserted that the First Amendment “categorically does not apply” because such communications constitute “heartland government speech.”125Defendants’ Response in Opposition to Plaintiffs’ Motion for a Preliminary Injunction at 10, 15, Pernell v. Fla. Bd. of Governors, No. 22-cv-00304 (N.D. Fla. Sept. 22, 2022), 2023 WL 18357418. Defendants have also invoked accountability to bolster their government speech arguments. In the Florida litigation, for example, the state argued that anyone displeased with the restrictions on professorial speech could seek recourse “[at] the ballot box.”126Id. at 10. The laws’ proponents similarly invoke political accountability in their appeals to the public. For example, Nate Hochman, writing in the Manhattan Institute’s City Journal, characterized critics as “suggest[ing] that public educators should be insulated from accountability and democratic oversight.”127Nate Hochman, Critical Race Theory and Academic Freedom, City J. (June 17, 2021), https://www.city-journal.org/article/critical-race-theory-and-academic-freedom [https://perma.cc/TRV9-B6DG]. Judicial responses to lawsuits challenging such restrictions have been mixed thus far. In cases involving college and university professors, courts have sided with plaintiffs, identifying an academic freedom exception to Garcetti that I discuss further in Part IV.128See, e.g., Kitrosser, The Government Speech Doctrine Goes to School, supra note 21, at IV.A.2. Courts have been less favorable to plaintiffs in the K–12 educational setting, concluding that primary and secondary school teachers are subject to Garcetti’s rule.129See, e.g., id. at IV.B.2. In the latter cases, however, plaintiffs have had some success in arguing that the laws are too vague to pass constitutional muster.130See, e.g., id. at IV.D.

IV. Some Kernels of Hope

       Although both UE theory and government speech doctrine have made substantial strides in the courts and the political branches, they are not invulnerable to limiting principles. Indeed, courts already have imposed or laid the groundwork for some boundaries on each doctrine’s reach. These aspects of precedent can, and should, be built on with substantive accountability among the lodestars in the process. I have explored these points in more detail elsewhere,131With respect to unitary executive theory, see Kitrosser, “A Government That Benefits From Expertise,” supra note 4, at Part III. With respect to government speech doctrine, see, e.g., Kitrosser, Distorting the Press, supra note 19, and Kitrosser, The Government Speech Doctrine Goes to School, supra note 21. and highlight a few aspects here.

       Turning first to UE theory, there are a few respects in which the current case law leaves the door open for some substantive accountability-based limits. For example, the Supreme Court has not, as of yet, weighed in on the constitutionality of civil service protections. Indeed, Chief Justice John Roberts, writing for the Court in a 2010 case, noted that “[n]othing in [its] opinion . . . should be read to cast doubt on the use of what is colloquially known as the civil service system within independent agencies.”132Free Enter. Fund v. Pub. Co. Acct. Oversight Bd., 561 U.S. 477, 507 (2010). Presumably, the PCAOB Court singled out independent agencies, rather than executive agencies, because the for-cause protections enjoyed by independent agency heads ensure that civil servants in such agencies will be separated from presidential control by at least two for-cause layers. This matters because the PCAOB Court invalidated a scheme that separated the heads of the Public Company Accountability Oversight Board from unfettered presidential removal through two layers of “for cause” removal—one between the President and the commissioners of the Securities and Exchange Commission (“SEC”), and one between the SEC commissioners and the PCAOB board members. Id. at 484, 486–87. Roberts observed that many civil servants “would not qualify as ‘Officers of the United States’ who ‘exercise significant authority pursuant to the laws of the United States;’ ” accordingly, they may not “be subject to the same sort of [presidential] control.”133Id. at 506 (quoting Buckley v. Valeo, 424 U.S. 1, 126 (1976)). In a future case, the Court could decide the question that it has left open and affirm the constitutionality validity of civil service tenure protections. To its reasoning about the limited scope of civil servants’ roles, the Court might add one about the work that they do perform. Namely, much of it entails the production of knowledge that reflects expertise and evidence-based analysis—for example, generating scientific reports or undertaking audits or inspections. Such work creates much of the factual backdrop against which the public and other branches can judge elected officials. By guarding against political interference with knowledge production, civil service protections support substantive accountability.

       Similar substantive-accountability based arguments can be made regarding other questions that the Supreme Court has not, to date, decided. This includes the constitutionality of the limited removal restrictions that currently apply to IGs and of the still more ambitious proposals to provide IGs with for-cause protection from removal.134See Kitrosser, “A Government That Benefits From Expertise,” supra note 4, at 1493–94 (explaining that there remains some opening in judicial precedent to justify such protections).

       As for government speech doctrine, the case law contains the seeds of an important limiting principle that I call the anti-distortion doctrine. It amounts to a wariness of conditions on state-sponsored knowledge production that would distort the nature of the sponsored programs or their communicative outputs. Perhaps the most overt use of the principle occurs in the 2001 case of Legal Services v. Velazquez.135See generally Legal Servs. Corp. v. Velazquez, 531 U.S. 533 (2001). The Velazquez Court invalidated a law restricting the types of arguments that congressionally funded legal services attorneys could make in litigation.136Id. at 537–39. The Court observed that Congress had funded the attorneys not to transmit government speech but rather to represent private clients.137Id. at 541–43, 547–48. Having done so, Congress could not limit the stock of arguments from which the attorneys could draw to advise and to advocate for their clients. Such a limit, said the Court, “distorts the legal system by altering the traditional role of the attorneys” as zealous advocates for their clients.138Id. at 544. Among the problems with such distortion is that it “prohibits speech and expression upon which courts must depend for the proper exercise of the judicial power.”139Id. at 545.

           

Garcetti itself contains some anti-distortion reasoning. The Garcetti Court left open the possibility of an exception for the expressive work of public school academics to the general rule that work product speech is unprotected. The Garcetti Court acknowledged that “[t]here is some argument that expression related to academic scholarship or classroom instruction implicates additional constitutional interests that are not fully accounted for by this Court’s customary employee-speech jurisprudence.”140Garcetti v. Ceballos, 547 U.S. 410, 425 (2006). An academic freedom exception is necessarily grounded in an anti-distortion principle, specifically in the notion that the state may not create or fund an institution of a type ordinarily characterized by academic freedom but then curtail that freedom.

CONCLUSION

       The doctrines explored here undermine substantive accountability in the name of accountability. Those attempting to limit the reach of UE theory and government speech doctrine, whether in the courts, the political branches, or the realm of public debate, must understand that their appeal lies partly in their proponents’ insistence that the doctrines do not undercut accountability but in fact protect accountability. Highlighting the errors of that claim and the danger that the doctrines pose is one small but necessary step in any efforts to staunch their forward march.

98 S. Cal. L. Rev. 1321

Download

*  William W. Gurley Professor, Northwestern University – Pritzker School of Law. I am very grateful to Erin Miller for inviting me to participate in the symposium for which I wrote this article, to Christina Koningisor for her wonderful turn as discussant for this piece, and to the student editors of the Southern California Law Review for their terrific work in organizing the symposium and editing this piece. I owe many thanks as well to Ronnell Anderson Jones and her colloquium students at the University of Utah Law School and to the faculty at the University of North Carolina Law School for inviting me to present this paper and for their thoughtful questions and comments.

Fear and Free Speech

INTRODUCTION

Fear changes lives. And for this reason, fear sometimes changes the law.

Because of fear’s debilitating effects, the law often forbids behavior that causes its targets to fear for their physical safety. Think of the laws that prohibit threats in order to free their targets “to go about their own lives.”1Kenneth L. Karst, Threats and Meanings: How the Facts Govern First Amendment Doctrine, 58 Stan. L. Rev. 1337, 1345 (2006). Think too of stalking laws that restrict fear-engendering behavior that “violates basic social norms of privacy and consent by persisting even in the face of a lack of consent.”2Genevieve Lakier & Evelyn Douek, The First Amendment Problem of Stalking: Counterman, Stevens, and the Limits of History and Tradition, 113 Calif. L. Rev. 143, 190 (2025).

A different type of fear—speakers’ fear of the government’s punishment—shapes pivotal First Amendment doctrine. The U.S. Supreme Court focused on this fear in Counterman v. Colorado when it held that the First Amendment requires the prosecutor in a “true threats” case to establish the speaker’s recklessness—that is, that the speaker “consciously disregarded a substantial risk” that his statements would make his target fear for her physical safety.3Counterman v. Colorado, 143 S. Ct. 2106, 2111–12 (2023). In the interest of full disclosure, I note that I served on the team representing the state of Colorado in Counterman before the U.S. Supreme Court. In so holding, the majority underscored that requiring such proof “reduc[es] an honest speaker’s fear that he may accidentally [or erroneously] incur liability,” thus “provid[ing] ‘breathing room’ for more valuable speech.”4Id. at 2115 (quoting United States v. Alvarez, 567 U.S. 709, 733 (2012) (Breyer, J., concurring)).

But this doctrinal choice is not without its costs, costs borne by the many targets of threats who lack access to evidence of the speaker’s interior mental state. This is the case, for example, of “[a] delusional speaker [who] may lack awareness of the threatening nature of her speech; a devious speaker [who] may strategically disclaim such awareness; and a lucky speaker [who] may leave behind no evidence of mental state for the government to use against her.”5Counterman, 143 S. Ct. at 2141 (Barrett, J., dissenting); see also Farmer v. Brennan, 511 U.S. 825, 836–37 (1994) (explaining that criminal recklessness requires a subjective showing that the defendant disregarded a risk of harm of which they were aware).

Free speech, of course, is not always free for everyone. A great deal of First Amendment law requires the targets of harmful speech to pay the price for the speaker’s freedom to speak and for the public’s freedom to receive that expression. To illustrate, the Supreme Court’s defamation jurisprudence sometimes requires innocent targets to bear the costs of reputation-damaging falsehoods when those targets cannot prove the speaker’s recklessness.6Gertz v. Robert Welch, Inc., 418 U.S. 323, 342–43 (1974). So too did a grieving father pay, with his pain, for the protected expression of speakers who exploited his loss to amplify their religious and political views.7Snyder v. Phelps, 562 U.S. 443, 460–61 (2011). Doctrinal choices are sometimes difficult because they require courts to pick between important, but incommensurable, values. When push comes to shove, First Amendment law generally chooses to protect speech on matters of public concern—the speech that lies at the core of the First Amendment—at the expense of its targets’ reputation and at the expense of its targets’ freedom from emotional cruelty.8E.g., N.Y. Times Co. v. Sullivan, 376 U.S. 254, 270 (1964) (emphasizing “the principle that debate on public issues should be uninhibited, robust, and wide-open, and that it may well include vehement, caustic, and sometimes unpleasantly sharp attacks on government and public officials”).

But different, and difficult, doctrinal choices arise when we recognize that speech interests sometimes lie on both sides of a First Amendment dispute, thus requiring courts to choose between important and commensurate values. As we will see, the fear induced by threats and by stalking can silence targets’ expression at least as directly and frequently as the fear induced by the prospect of the government’s punishment silences speakers’ expression. Consider the many targets who stop going out in public, stop using the phone, stop engaging online, stop making music and other forms of art, and stop participating in public life.9See infra notes 62–71 and accompanying text. Identifying free speech as a “preferred” constitutional value should thus require attention to the free speech costs of law’s failure to adequately protect the targets of threats and stalking.10See Frederick Schauer, Fear, Risk and the First Amendment: Unraveling the “Chilling Effect”, 58 B.U. L. Rev. 685, 732 (1978) (describing the First Amendment as a “preferred value”).

Yet an ostensibly speech-protective Supreme Court failed to acknowledge those costs in Counterman v. Colorado, a case that required it to define the contours of the category of threats unprotected by the First Amendment. “True threats” cause their targets to fear for their physical safety—and this fear, in turn, disrupts those targets’ lives.11See R.A.V. v. City of St. Paul, 505 U.S. 377, 388 (1992) (explaining that the law punishes threats to protect their targets “from the fear of violence, from the disruption that fear engenders, and from the possibility that the threatened violence will occur”). For these reasons, the Supreme Court has long treated true threats as among the handful of speech categories entirely unprotected by the First Amendment.12Id. Until Counterman, however, the Supreme Court had never directly engaged the question of how to determine when speech constitutes an unprotected threat. In the meantime, lower courts disagreed over whether the universe of unprotected threats should be determined through a subjective, or instead, an objective inquiry. Some took a subjective approach, requiring the prosecution (or, in a civil case, the plaintiff) to prove that the speaker intended to make his target fear for her physical safety, thus privileging defendants’ speech interests.13See, e.g., United States v. Bachmeier, 8 F.4th 1059, 1064 (9th Cir. 2021); United States v. Heineman, 767 F.3d 970, 975 (10th Cir. 2014). A majority of lower courts instead approached the problem from the target’s perspective, adopting an objective approach that asked whether the speaker’s statement would cause a reasonable person in the target’s position to fear for their physical safety, thus privileging targets’ interests—including, but not limited to, their speech interests.14See, e.g., United States v. Nishnianidze, 342 F.3d 6, 15 (1st Cir. 2003); Heller v. Bedford Cent. Sch. Dist., 665 F. App’x 49, 51 n.1 (2d Cir. 2016); United States v. White, 670 F.3d 498, 509 (4th Cir. 2012); Porter v. Ascension Par. Sch. Bd., 393 F.3d 608, 616 (5th Cir. 2004); United States v. Stewart, 411 F.3d 825, 828 (7th Cir. 2005); United States v. Ivers, 967 F.3d 709, 718 (8th Cir. 2020).

The Supreme Court resolved this question in Counterman by requiring a subjective standard, holding that speech communicating a serious intent to commit unlawful violence constitutes an unprotected “true threat” only when the prosecution can prove the defendant’s recklessness—in other words, the defendant’s conscious disregard of the risk that his statements could make his target fear for her physical safety.15Counterman v. Colorado, 143 S. Ct. 2106, 2111 (2023). The Counterman Court justified this choice as speech-protective, emphasizing that speakers’ expression might be chilled if they fear punishment under a legal standard too quick to view their speech as threatening.16Id. at 2113 (“Counterman contends . . . that the absence of such a mens rea requirement will chill protected, non-threatening speech. . . . To combat the kind of chill he references, our decisions have often insisted on protecting even some historically unprotected speech through the adoption of a subjective mental-state element. We follow the same path today, holding that the State must prove in true-threats cases that the defendant had some understanding of his statements’ threatening character.”).

But this was not the only speech-protective choice available to the Court. In choosing to privilege the defendant’s speech over the target’s reasonable fear for their physical safety, the majority also effectively chose to privilege the defendant’s speech over the target’s expression. And just as the public loses valuable speech when the prospect of governmental punishment deters speakers from speaking, so too does the public lose valuable speech when the law permits the silencing of targets’ speech.17See infra notes 30–31, 62–71 and accompanying text.

To be sure, we should worry about doctrinal choices that deter valuable speech by making a potential speaker fear that the government will punish them for what they intended as a joke or as political rhetoric. Recall, for example, eighteen-year-old Robert Watts, who was convicted of threatening President Lyndon B. Johnson during the Vietnam War for saying to laughing listeners at a political rally on the Washington, D.C. Mall that “I have already received my draft classification as 1–A and I have got to report for my physical this Monday coming. I am not going. If they ever make me carry a rifle the first man I want to get in my sights is L. B. J.”18Watts v. United States, 394 U.S. 705, 706 (1969) (per curiam). The Supreme Court overturned Watts’s conviction, holding that his speech constituted “political hyperbole” rather than a “true threat” against the president.19Id. at 708 (internal quotation marks omitted).

At the same time, however, we should also worry about doctrinal choices that enable the silencing of targets’ expression by insufficiently protecting those targets from reasonable fear for their physical safety. Think now of musician C.W., the victim in Counterman, who received hundreds of disturbing messages from a complete stranger who repeatedly resisted her efforts to block him. As a result, C.W. stopped walking alone, stopped attending public events, and canceled her own public musical performances.20See Counterman, 143 S. Ct. at 2112. Think too of the many threats to journalists and election officials that silence and suppress their work foundational to a free and fair democracy.21See infra notes 65–71 and accompanying text. The speech-silencing effects of fear-inducing speech are by no means limited to artists and journalists: they extend to all targets, because all are potential speakers.

Courts often resolve difficult First Amendment disputes—including that in Counterman, which called upon the Court to define the contours of a category of unprotected speech—by concluding that the defendant’s speech interests outweigh the target’s substantial but incommensurate interests in reputation or peace, among other values. But threats and stalking cases present even greater challenges for those who consider speech to be a preferred value because commensurate speech interests lie on both sides of these disputes.

The First Amendment issues triggered by the regulation of fear-inducing speech thus require hard choices between speakers’ and targets’ free speech interests, choices that also affect the public’s access to valuable speech. This Article both criticizes the Court’s approach in Counterman and offers a guide to addressing targets’ expressive interests in threats and stalking cases after Counterman. More specifically, it seeks to foster a mindset for considering the First Amendment problems involving fear-inducing speech that attends to targets’ expression as much as defendants’ expression. To this end, it examines the ways in which threats and stalking can silence targets’ speech and deter their participation in public life, and then considers available choices that attend to targets’—not just defendants’—expressive interests.

I. Fear on Both Sides, Speech on Both Sides

This Part starts by describing concerns that fear of government punishment will cause speakers to censor themselves, thus “chilling” their speech. It then explains how the fear induced by threats and stalking can cause their targets to engage in self-censorship of their own.

A. Speakers’ Fear of the Government

 “A chilling effect,” Frederick Schauer explained, occurs “when individuals seeking to engage in activity protected by the first amendment are deterred from so doing by governmental regulation not specifically directed at that protected activity.”22See Schauer, supra note 10, at 693 (emphasis omitted). In other words, concerns about chilling effects anticipate that government’s efforts to modify some unprotected behavior will inadvertently chill protected behavior. As Leslie Kendrick observed, “intuition suggests that some legal rules will chill speech. The further a law encroaches on protected speech, the greater the risk that such speech will be penalized. The more likely speakers are to be penalized, the less they will speak.”23Leslie Kendrick, Speech, Intent, and the Chilling Effect, 54 Wm. & Mary L. Rev. 1633, 1638 (2013).

Because chilling effects harm speakers—and the rest of us, too—by stifling the delivery of opinions, facts, and ideas, the Court’s instrumental concerns about chilling effects not infrequently drive its doctrinal choices.24See Monica Youn, The Chilling Effect and the Problem of Private Action, 66 Vand. L. Rev. 1473, 1483 (2013) (“[T]he chilling effect concept does not delineate a discrete, freestanding doctrinal category. . . . [Instead, it informs] a number of procedural, categorical, and substantive doctrines in First Amendment case law.”). Under its defamation jurisprudence, for example, the more valuable the speech potentially chilled by the prospect of defamation liability, the higher the bar for proving the mental state required to establish such liability.25See N.Y.  Times Co. v. Sullivan, 376 U.S. 254, 271–72, 279–80 (1964). This doctrine thus requires defamation plaintiffs who are public officials or public figures to show that a speaker made a defamatory statement with “ ‘actual malice’—that is, with knowledge that it was false or with reckless disregard of whether it was false or not”—before they can establish the speaker’s liability for reputation-damaging falsehoods.26Id. at 279–80. The Court has explained this doctrinal innovation as necessary to ensure breathing space for speech critical of those in the public eye or otherwise on matters of public concern—the speech at the core of the First Amendment.27Id. at 271–72.

In the same vein, the Counterman Court explained its doctrinal choice as “based on fear of ‘self-censorship’—the worry that without such a subjective mental-state requirement, the uncertainties and expense of litigation will deter speakers from making even truthful statements.”28Counterman v. Colorado, 143 S. Ct 2106, 2115 (2023) (quoting N.Y. Times, 376 U.S. at 279). In explaining its decision to require the prosecution in a “true threats” case to show the defendant’s reckless mental state, the Court catalogued the ways in which the prospect of the government’s punishment can chill a speaker’s expression by instilling fear of various consequences: “The speaker’s fear of mistaking whether a statement is a threat; his fear of the legal system getting that judgment wrong; his fear, in any event, of incurring legal costs—all those may lead him to swallow words that are in fact not true threats.”29Counterman, 143 S. Ct at 2116; see also id. at 2115 (“The result is ‘self-censorship’ of speech that could not be proscribed—a ‘cautious and restrictive exercise’ of First Amendment freedoms.”) (quoting Gertz v. Welch, 418 U.S. 323, 340 (1974)).

True, so far as it goes. But nowhere did the Counterman majority similarly detail targets’ fear for their physical safety and the resulting costs of such fear—costs that include the silencing of their speech along with many other life disruptions. The silencing of targets’ speech harms the general public, too, by denying it the expression that targets would otherwise deliver.30See infra notes 64–71 and accompanying text. The majority instead simply noted the “profound harms” imposed by threats without specifying those harms.31Counterman, 143 S. Ct at 2117 (noting “the profound harms, to both individuals and society, that attend true threats of violence—as evidenced in this case”). Justice Sotomayor’s concurring opinion was more direct, though brief, in acknowledging the harms to targets: “Stalking can be devastating and dangerous. Lives can be ruined, and in the most tragic instances, lives are lost. . . . Even isolated threatening speech can do real harm. Such speech not only disrupts lives, it can silence the speech of others who become afraid to speak out.” Id. at 2123 (Sotomayor, J., concurring in part and concurring in the judgment) (citation omitted).

Judges (like other human beings) sometimes mask the difficulty of hard trade-offs—making those trade-offs feel considerably easier than they actually are—by failing to identify and weigh the costs of their choices. As Mary Anne Franks observed, courts’ “concern about chilling effects tends to be highly selective.”32Mary Anne Franks, Fearless Speech, 17 First Amend. L. Rev. 294, 306 (2019). Others have also observed this dynamic. See Danielle Keats Citron, From Bad to Worse: Stalking, Threats, and Chilling Effects, 2023 Sup. Ct. Rev. 175, 180 (2023); R. George Wright, Counterman v. Colorado: True Threats, Speech Harms, and Missed Opportunities, 99 Ind. L.J. 27, 30 (2023). Indeed, even as the Counterman majority described

itself as balancing competing interests, it particularized only speakers’ interests.33See Counterman, 143 S. Ct at 2119.

The majority’s choice may have been motivated not only by its instrumental concerns about chilling defendants’ expression but also by deontic commitments to punish only morally blameworthy speakers. In this vein, the majority described “reckless defendants” as “morally culpable” because they “have done more than make a bad mistake. They have consciously accepted a substantial risk of inflicting serious harm.”34Id. at 2118; see also Kendrick, supra note 23, at 1633 (suggesting that courts’ intuitions about moral culpability contribute to their doctrinal choices in this area because “the difficulties of measuring and remedying chilling effects cast doubt on whether they could ever provide the sole justification for the choice of one intent requirement over another”). But moral principles cut both ways here, too, as the targets of threats themselves are often entirely innocent victims who experience life-changing harm regardless of the speaker’s mental state. Think again of C.W., the victim in Counterman whose daily existence and musical career were “upended” by hundreds of disturbing messages from a man she had never met.35Counterman, 143 S. Ct at 2112. Think too of journalists and election officials targeted by threats who live in fear for their, and their families’, safety for simply doing their jobs—jobs foundational to a functioning democracy.36See infra notes 65–71 and accompanying text. That we can identify deontic as well as instrumental concerns on both sides of these disputes adds to the difficulties in deciding them, difficulties that judges should not obscure.37See Seana Valentine Shiffrin, The Moral Neglect of Negligence, in 3 Oxford Studies in Political Philosophy 213 (David Sobel, Peter Vallentyne & Steven Wall eds., 2017) (describing the moral failures of negligence as involving “a failure to take and exercise appropriate responsibility for one’s agency; and, when that failure involves other people, negligence involves a failure properly to recognize and acknowledge their moral significance”).

B. Targets’ Fear for Their Physical Safety

Threats and stalking are related but distinct in important ways. I use the term “threat” to mean speech that causes its target to fear for their physical safety.38See R.A.V. v. City of St. Paul, 505 U.S. 377, 388 (1992) (explaining that law punishes threats to protect their targets “from the fear of violence, from the disruption that fear engenders, and from the possibility that the threatened violence will occur”). And by “stalking,” I mean repeated and unwelcome conduct, contact, or communication that causes its target fear or other severe emotional distress.39See, e.g., Colo. Rev. Stat. § 18-3-602(1)(c) (2023) (making it unlawful “[r]epeatedly [to] follow[], approach[], contact[], place[] under surveillance, or make[] any form of communication with another person . . . in a manner that would cause a reasonable person to suffer serious emotional distress and does cause that person . . . to suffer serious emotional distress”). Both threats and stalking can inflict life-disrupting fear. But they often do so in different ways: all threats, by definition, involve speech, while stalking sometimes involves only conduct, sometimes only speech, and sometimes a mix of the two.40See infra notes 116–18 and accompanying text; see also Lakier & Douek, supra note 2 (“It is this violation of social norms and its disregard for the autonomy of the listener—her right to withdraw from the relationship and to not have to hear what the speaker has to tell her—that makes stalking speech so frightening. It also threatens the target’s sense of agency and freedom because of its (seemingly unstoppable) intrusion into the victim’s private life.”) And although a speaker may be held liable for a single threatening statement or for many, stalking laws impose liability only for “repeated” unwelcome conduct, contact, or communication.41See infra notes 114–15 and accompanying text.

Fear for one’s physical safety literally changes lives—and not for the better, as fear is among the most debilitating of human experiences. Consider psychologist Abraham Maslow’s hierarchy of human needs.42A. H. Maslow, A Theory of Human Motivation, 50 Psych. Rev. 370, 394–95 (1943) (identifying physical safety as among the most important of human goals and thus among those that “monopolize” our time, energy, and attention). Foundational to this hierarchy is our need for physical survival in the form of food, water, shelter, and physical security: only when this need is satisfied can we pursue higher-level social and emotional needs like intimacy, belonging, self-esteem, confidence, and more.43Id. For these reasons, requiring a target to pay for a defendant’s free speech with fear for their physical safety exacts a significantly higher price than requiring them to pay for a defendant’s free speech with their reputation or with their freedom from emotional cruelty.

Fear-inducing speech inflicts harm both physical and mental. One study, for example, reported “high levels of psychopathology among stalking victims,” whose overall psychological distress was about three times higher than that of the general population.44Eric Blaauw, Frans W. Winkel, Ella Arensman, Lorraine Sheridan & Adriënne Freeve, The Toll of Stalking: The Relationship Between Features of Stalking and Psychopathology of Victims, 17 J. Interpersonal Violence 50, 57–58 (2002). Medical evidence demonstrates the life-changing effects of chronic fear that include insomnia and sleep disruptions,45Id.; Jaime Rosenberg, The Effects of Chronic Fear on a Person’s Health, Neuroscience Educ. Inst. Cong. (Nov. 11, 2017), https://www.ajmc.com/view/the-effects-of-chronic-fear-on-a-persons-health [https://perma.cc/M9RM-7JSV]. immune system dysfunction,46Rosenberg, supra note 45. gastrointestinal issues like ulcers and irritable bowel syndrome,47Joe Pierre, How Does Fear Influence Risk Assessment and Decision-Making?, Psych. Today (July 15, 2020), https://www.psychologytoday.com/us/blog/psych-unseen/202007/how-does-fear-influence-risk-assessment-and-decision-making. sexual dysfunction and decreased fertility,48Id. and accelerated aging.49Mai Stafford, Tarani Chandola & Michael Marmot, Association Between Fear of Crime and Mental Health and Physical Functioning, 97 Am. J. Pub. Health 2076, 2078 (2007) (finding that some study participants had “limitations in physical functioning . . . that were commensurate with that of people 9 years” older). Medical evidence also establishes that chronic fear is associated with generally poor mental health,50See Jessica Miles, Straight Outta SCOTUS: Domestic Violence, True Threats, and Free Speech, 74 U. Mia. L. Rev. 711, 735 (2020) (“In addition to an increased risk of physical violence, intimate partner stalking victims suffer from high rates of anxiety and depression.”). with mental health injuries that include anxiety,51Blaauw et al., supra note 44, at 57. depression,52Id. post-traumatic stress disorders,53Sean Wake, Jolie Wormwood & Ajay B. Satpute, The Influence of Fear on Risk Taking: A Meta-Analysis, 34 Cognition & Emotion 1143, 1148 (2020). panic and obsessive compulsive disorders,54Id. impaired formation of long-term memories,55Rosenberg, supra note 45. and suicidal ideation.56Blaauw et al., supra note 44, at 57 (approximately one third of stalking victims reported repeated thoughts about committing suicide). One study found that those who reported higher levels of fear were 50% more likely to show signs of a mental health disorder and 90% more likely to have symptoms of depression than those who reported lower levels of fear.57Stafford et al., supra note 49.

Moreover, the targets of threats and stalking often fear for their physical safety for very good reason. Criminal justice scholar Mary Brewster, for instance, canvassed the experiences of victims of intimate partner violence to conclude that threats served as “a strong and statistically significant predictor of violence.”58Mary P. Brewster, Stalking by Former Intimates: Verbal Threats and Other Predictors of Physical Violence, 15 Violence & Victims 41, 50 (2000); see also Miles, supra note 50, at 734–35 (“Research on stalking demonstrates that a strong correlation exists between intimate partner stalking and physical violence, as eighty-one percent of women who were stalked by a current or former intimate partner were also physically assaulted by that partner.”). By causing targets to fear for their physical safety, threats and stalking not only inflict physical and mental health injuries, but also change the ways in which those targets live their lives.59See Paul E. Mullen & Michele Pathé, Stalking, 29 Crime & Just. 273, 296 (2002) (“All but six of the one hundred victims [surveyed] reported major lifestyle changes and modified their daily activities in direct response to being stalked.”). Stalking, for instance, often forces its targets to miss work,60See Patricia Tjaden & Nancy Thoennes, Nat’l Inst. of Just. & Ctrs. for Disease Control & Prevention, Stalking in America: Findings from the National Violence Against Women Survey 11 (1998), https://www.ojp.gov/pdffiles/169592.pdf [https://perma.cc/BLY2-25T5]; Mullen & Pathé, supra note 59, at 297. to leave their jobs, or their homes.61See Katrina Baum, Shannan Catalano, Michael Rand & Kristina Rose, Bureau of Just. Stat. Special Rep., Stalking Victimization in the United States 6 (2009) (“One in 7 victims reported they moved as a result of the stalking.”); Mullen & Pathé, supra note 59, at 296–97.

Most relevant to this Article, threats and stalking also change their targets’ lives by causing them to speak less, to speak differently, and to participate less in public life. Indeed, the targets of threats and stalking commonly, and reasonably, respond to threats to their physical survival by making themselves silent and invisible.62See Jonathon W. Penney, Understanding Chilling Effects, 106 Minn. L. Rev. 1451, 1510–12 (2022) (“[T]hreats of violence and physical harm are a powerful force for self-censorship, which trigger deeper psychological states of fear, anxiety, and severe emotional distress that then in turn amplify social conformity.” (footnote omitted)). To illustrate, recall the musician’s experience in Counterman: C.W. stopped walking alone, stopped attending other musicians’ events, and canceled her own performances.63See Counterman v. Colorado, 143 S. Ct. 2106, 2112 (2023). Danielle Keats Citron explains how stalking silences protected expression more generally:

[Cyber stalking victims] stop using their phones. Victims change how they express themselves; they are less controversial, more muted, and connect with fewer people. Their withdrawal from online engagement isolates them from friends and family. When victims change their phone numbers to prevent stalkers from calling them, they become unreachable.64Citron, supra note 32, at 198–99.

Consider too the many journalists targeted by threats of death or rape. One recent study found that one in ten journalists surveyed had been threatened with death in the preceding year because of their work;65Erin C. Carroll, Obstruction of Journalism, 99 Denv. L. Rev. 407, 415 (2022). another found that three quarters of female journalists surveyed reported that “they had experienced online abuse, harassment, threats, and attacks.”66Id. at 409. These threats interfere with journalists’ watchdog and educator functions,67See Vincent Blasi, The Checking Value in First Amendment Theory, 2 Am. Bar Found. Rsch. J. 521, 538–39 (1977) (explaining the press’s role as a watchdog for government misconduct); RonNell Andersen Jones, Press Speakers and the First Amendment Rights of Listeners, 90 U. Colo. L. Rev. 499, 537–43 (2019) (explaining the press’s functions as educating the public on a wide range of matters and serving as the public’s proxy by observing what the public does not have the time or resources or other ability to observe for itself). inflicting injury not only to their individual targets, but also to a public’s hopes for a healthy democracy. Free press scholar Erin Carroll has detailed more specifically how threats inhibit and distort the reporting that journalists produce and that the public thus receives:

Obstruction operates on at least three levels: the story, the beat, and the pipeline. At the story level, threats and abuse prevent journalists from covering particular events or incidents. At the beat level, perpetual abuse around broad topics like politics, economics, and immigration dissuades reporters from aggressively covering these beats or even covering them at all. At the pipeline level, violence leads reporters to leave or consider leaving the profession entirely.68Carroll, supra note 65, at 411.

Illustrating these dynamics more specifically, one study found that 37% of female journalists who reported that they had been threatened, harassed, or attacked indicated they avoided certain stories; 8% changed the content or perspectives of the news that they write about; 16% considered requesting a transfer or different beat and 6% requested a transfer or different beat; and 29% indicated the threats and attacks they received made them think about getting out of the profession.69Michelle Ferrier, TrollBusters & Int’l Women’s Media Found., Attacks and Harassment: The Impact on Female Journalists and Their Reporting 39, 44 (Elisa Lees Munoz ed., 2018), https://www.iwmf.org/wp-content/uploads/2018/09/Attacks-and-Harassment.pdf [https://perma.cc/L4ZU-BCE9].

As additional examples, threats against election officials deter those officials from doing work necessary to the democratic self-governance at the core of the First Amendment. A nationwide study of local election officials found that more than one in three of those surveyed reported that they have experienced threats, harassment, or abuse because of their work; more than half reported that they worry about their colleagues’ safety; more than a quarter worried about their own physical safety; and more than a third reported that they knew of local election officials who had left their jobs at least in part because of fear for their safety.70The Brennan Ctr. for Justice, Local Election Officials Survey 9, 15, 19 (2024), https://www.brennancenter.org/our-work/research-reports/local-election-officials-survey-may-2024 [https://perma.cc/C3EN-WUDH]. Not surprisingly, many local jurisdictions now report high levels of turnover among their election officials.71Miles Park, In Some States, More than Half of the Local Election Officials Have Left Since 2020, NPR (Sept. 26, 2023, 5:12 PM), https://www.npr.org/2023/09/26/1200616113/election-official-threats-harassment-turnover [https://perma.cc/7T97-FKL2]; Michael Beckel, Amelia Minkin, Amisa Ratliff, Ariana Rojas, Kathryn Thomas & Adrien Van Voorhis, Issue One, The High Cost of High Turnover 1 (2023), https://issueone.org/wp-content/uploads/2023/09/The-High-Cost-of-High-Turnover-Report.pdf [https://perma.cc/M53Z-NKD3].

II. Attending to Targets’ Free Speech Interests in Threats and Stalking Cases

As Frederick Schauer observed, courts often choose to err on the side of overprotecting defendants’ speech when crafting First Amendment doctrine:

The chilling effect doctrine reflects the view that the harm caused by the chilling of free speech (or other protected activity) is comparatively greater than the harm resulting from the chilling of the other activities involved. And, the logical and necessary mandate of the chilling effect doctrine is that legal rules be formulated so as to allocate the risk of error away from the preferred value, thereby minimizing the occurrence of those errors which we deem the most harmful.72Schauer, supra note 10, at 705.

The Counterman majority made precisely this choice when it required proof of a speaker’s recklessness as predicate to identifying a “true threat” unprotected by the First Amendment.73See supra notes 15–17, 28–31 and accompanying text.

Again, that is a choice—but by no means the only justifiable, and speech-protective, choice. Because speech interests lie on both sides of threats and stalking cases, those cases require courts to choose not only whether to prefer speakers’ expression over incommensurate harms experienced by targets (like harms to their mental and physical health and their quality of life) but also whether to protect the speaker’s expression at the expense of the target’s expression. This Part considers possibilities for treating targets’ and speakers’ expressive interests in threats and stalking cases with at least the same regard.

A. The First Amendment Argument for Symmetrical Concern for Speakers’ and Targets’ Expressive Interests in Threats Cases

Neither the Counterman majority nor Billy Counterman’s own briefing offered any evidence that anyone’s speech—much less Counterman’s—had been chilled by an objective listener-centered approach (like Colorado’s) for identifying unprotected true threats.74See Brief on the Merits for Respondent at 38–39, 45, Counterman v. Colorado, 143 S. Ct. 2106 (2023) (No. 22-138) (pointing out that Counterman’s anecdotal discussion of fact patterns offered to suggest an objective standard’s potential for chilling did not involve speech prosecuted under a threats theory or involved speech prosecuted under Counterman’s proposed specific intent standard). As dissenting Justice Barrett observed, “objective tests are effectively the status quo today, yet Counterman still struggles to identify past prosecutions that came close to infringing on protected speech.”75Counterman v. Colorado, 143 S. Ct. 2106, 2138 (2023) (Barrett, J., dissenting) (“Before we took this case, the vast majority of Courts of Appeals and state high courts had upheld [statutes that required only an objective showing] as constitutional.”). A number of scholars have noted the limited empirical support for chilling effects concerns. See Suneal Bedi, The Myth of the Chilling Effect, 35 Harv. J.L. & Tech. 267, 307 (2021) (questioning courts’ reliance on chilling effect concerns when crafting doctrine); Jennifer M. Kinsley, Chill, 48 Loy. U. Chi. L.J. 253, 253 (2016) (criticizing chilling effects concerns as making “too may false assumptions about the speakers’ knowledge of the law, their ability to correctly apply the law, and their willingness to conform to the law”); Kendrick, supra note 23, at 1675; Penney, supra note 62, at 1454–55, 1470 (challenging conventional understandings of the chilling effect as “empirically weak” and asserting that most people “are often not sufficiently aware of the law or state activities such that any possible legal harm or sanction could impact their decision about speaking or acting.”); Schauer, supra note 10, at 730 (“While the chilling effect concept appears to be premised upon predictions or assumptions about human behavior, no evidence has been proffered to justify those predictions. It has not been clearly established that individuals are mistakenly deterred or become overly cautious as a result of the existence of particular statutes, rules, or regulations.”). Nevertheless, concern about the law’s chilling effect—that is, the “overdeterrence of benign conduct that occurs incidentally to a law’s legitimate purpose or scope”76Kendrick, supra note 23, at 1649 (emphasis omitted).—is legitimate, indeed intuitively powerful, as a background assumption about how the world works.77See Joseph Blocher & Reva B. Siegel, When Guns Threaten the Public Sphere: A New Account of Public Safety Regulation Under Heller, 116 Nw. U. L. Rev. 139, 186–89 (2021) (discussing the background assumptions that inform the Court’s constitutional doctrine in various areas despite the lack of empirical evidence for such assumptions). For this reason, the Counterman majority was not wrong to worry about chilling effects even absent anecdotal or empirical evidence of chilling.

But courts committed to robust free speech protections should also credit the equally valid premise that a legal standard that fails adequately to protect the targets of threats and stalking will enable the silencing of targets’ speech. Indeed, the First Amendment case for attending to targets’ free speech interests is at least as strong as that for attending to chilling concerns given that targets’ fear for their physical safety demonstrably deters their expression.78See supra notes 62–71 and accompanying text. Just as a speaker’s First Amendment defense need not include evidence that their—or anyone’s—speech was chilled by the prospect that they could be held liable for objectively terrifying statements, a prosecutor or plaintiff need not prove that the target’s—or anyone’s—speech was silenced by their reasonable fear for their physical safety. In short, when developing and applying First Amendment doctrine, courts should weigh the free speech costs borne by the targets of threats and stalking as heavily as the free speech costs borne by speakers chilled by the prospect of the government’s legal action.

The First Amendment argument for this approach gathers additional force when we recognize that targets of threats and stalking cannot meaningfully rely on the traditional self-help remedies of counterspeech and avoidance.79See Whitney v. California, 274 U.S. 357, 377 (1927) (Brandeis, J., concurring) (“If there be time to expose through discussion the falsehood and fallacies, to avert the evil by the processes of education, the remedy to be applied is more speech, not enforced silence.”). For example, only 9% of stalking victims surveyed who tried to discourage their stalkers reported that their engagement improved the situation.80Mary P. Brewster, An Exploration of the Experiences and Needs of Former Intimate Stalking Victims 47 (1998), https://www.ojp.gov/pdffiles1/nij/grants/175475.pdf [https://perma.cc/7VZM-94AX]; see also James Geistman, Brad Smith, Eric G. Lambert & Terry Cluse-Tolar, What to Do About Stalking: A Preliminary Study of How Stalking Victims Responded to Stalking and Their Perceptions of the Effectiveness of These Actions, 26 Crim. Just. Stud. 43, 60 (2013) (“Our findings suggest that stalking victims who confronted stalkers on their own, regardless of whether they were victims of violent or nonviolent stalking, were likely to perceive that their efforts were ineffective. In some cases, their responses had the opposite effect and the victims reported that the stalking behavior worsened.”). A target’s engagement with a stalker through counterspeech can aggravate and escalate the stalker’s behavior81See Mullen & Pathé, supra note 59, at 294 (reporting that some “stalkers will react with extreme violence to their victim’s repeated rebuffs”). and can fuel a stalker’s delusions of an actual relationship with the target by “gratify[ing] the stalker’s wishes to have, and to hold onto, a relationship and reinforc[ing] the pursuit.”82Id.; see also id. at 310 (reporting that “any contact with the perpetrator, however intermittent, will reinforce the unwanted behavior”); Mary Anne Franks, How Stalking Became Free Speech: Counterman v. Colorado and the Supreme Court’s Continuing War on Women, Geo. Wash. L. Rev. On Docket (2022), https://www.gwlr.org/how-stalking-became-free-speech-counterman-v-colorado-and-the-supreme-courts-continuing-war-on-women [https://perma.cc/E2BZ-MYZK] (“[S]talkers often sincerely believe that their behavior is welcome. These delusional beliefs make them more, not less, dangerous to their victims.” (footnote omitted)). For these reasons, targets are often counseled not to engage with stalkers.83See Stalking Prevention, Awareness & Res. Ctr., Stalking Safety Strategies 2 (2022), https://www.stalkingawareness.org/wp-content/uploads/2022/05/Safety-Strategies.pdf [https://perma.cc/FP8G-KMH2] (“Consider cutting off any and all communication with the stalker. Many stalkers misinterpret any contact (even negative contact) as encouragement.”). Nor, due to limited resources, can many targets protect themselves through avoidance. “[M]oving to a new home or changing jobs or schools to avoid threatened violence are less likely to be options for domestic violence victims than for other threat victims,” legal scholar Jessica Miles explains.84Miles, supra note 50, at 736; see also id. at 736–37 (“The relationship between poverty and the increased likelihood of violence is further supported by research that shows that domestic violence victims with the fewest resources experience the highest rates of repeat abuse.”).

A target-centered approach is not without precedent, as the Supreme Court sometimes chooses to shape categories of less-protected speech in ways that privilege listeners’ interests when those listeners cannot protect themselves from harmful speech through rebuttal or escape: this is often the case when speakers enjoy advantages of information or power (or both) over their listeners.85Elsewhere, I have examined settings involving these asymmetries in more detail. See generally Helen Norton, What Twenty-First-Century Free Speech Law Means for Securities Regulation, 99 Notre Dame L. Rev. 97 (2023) (discussing corporations’ speech to investors and shareholders); Helen Norton, Manipulation and the First Amendment, 30 Wm. & Mary Bill Rts. J. 221 (2021) (discussing online platforms’ interactions with their users); Helen Norton, Discrimination, the Speech That Enables It, and the First Amendment, 2020 U. Chi. Legal F. 209 (2020) (discussing employers’ speech to workers); Helen Norton, Powerful Speakers and Their Listeners, 90 U. Colo. L. Rev. 441 (2019) [hereinafter Norton, Powerful Speakers and Their Listeners] (describing asymmetries of information and power between speakers and listeners in several contexts); Helen Norton, Pregnancy and the First Amendment, 87 Fordham L. Rev. 2417 (2019) (discussing the speech of those providing reproductive health care services to pregnant women); Helen Norton, Robotic Speakers and Human Listeners, 41 Seattle U. L. Rev. 1145 (2018) (discussing communications produced by artificial intelligence); Helen Norton, Truth and Lies in the Workplace: Employer Speech and the First Amendment, 101 Minn. L. Rev. 31 (2016) (discussing employers’ speech to workers); Helen Norton, Secrets, Lies, and Disclosures, 27 J.L. & Pol. 641 (2012) (discussing campaign speakers’ and donors’ speech to voters). Recall the Court’s defamation jurisprudence, which requires public officials and public figures to show a speaker’s recklessness (in other words, “actual malice”) before imposing liability for that speaker’s reputation-damaging falsehoods, while relaxing the showing required of private-figure plaintiffs with less ability to remedy reputational harm themselves through counterspeech. More specifically, the Court enables private figures to recover presumed and punitive damages for defamatory falsehoods on matters of private concern without any showing of the speaker’s recklessness.86Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 U.S. 749, 761 (1985) (plurality opinion). The Supreme Court also understands the First Amendment to permit defamation plaintiffs who are private figures to recover actual damages for defamatory falsehoods on matters of public concern upon a showing of the speaker’s negligence (but requires proof of the speaker’s actual malice to recover presumed or punitive damages in such cases). Gertz v. Robert Welch, Inc., 418 U.S. 323, 347–50 (1974). While this more target-friendly choice rests in great part on the lower First Amendment value of reputation-damaging falsehoods that do not address matters of public concern, it also turns on private figures’ more limited ability (compared to public officials) to protect their reputational interests through rebuttal:

Public officials and public figures usually enjoy significantly greater access to the channels of effective communication and hence have a more realistic opportunity to counteract false statements than private individuals normally enjoy. Private individuals are therefore more vulnerable to injury, and the state interest in protecting them is correspondingly greater.87Gertz, 418 U.S. at 344 (footnote omitted).

When balancing speakers’ expressive interests against private figures’ non-speech (that is, reputational) interests for defamation purposes, the Court thus requires targets to prove no more than a speaker’s recklessness—and sometimes only their negligence. More powerful still is the First Amendment argument for privileging targets’ free speech interests over those of speakers’, especially when those targets cannot meaningfully protect themselves through the traditional self-help remedies of exit and voice. In other words, although recklessness might be an appropriate First Amendment compromise in threats cases if courts were simply balancing defendants’ speech interests against targets’ incommensurate non-speech interests in health and quality of life, recklessness is a much less obvious First Amendment choice if we attend to both parties’ speech interests.

As an illustration, consider the Court’s listener-centered understanding of the First Amendment that treats “false or misleading” commercial speech as entirely unprotected by the First Amendment because of the harm it inflicts on targets’ (consumers’) First Amendment interests in making informed and autonomous decisions regardless of the commercial speaker’s mental state.88Cent. Hudson Gas & Elec. Corp. v. Pub. Serv. Comm’n of New York, 447 U.S. 557, 563–64 (1980) (“The First Amendment’s concern for commercial speech is based on the informational function of advertising. Consequently, there can be no constitutional objection to the suppression of commercial messages that do not accurately inform the public about lawful activity.” (citation omitted)); see also Zauderer v. Off. of Disciplinary Couns., 471 U.S. 626, 638 (1985) (“The States and the Federal Government are free to prevent the dissemination of commercial speech that is false, deceptive, or misleading . . . .”). This listener-centered approach also recognizes that consumers cannot meaningfully protect themselves from these informational harms, because commercial actors have considerably greater access to accurate information about their own goods and services than do consumers.89See Norton, Powerful Speakers and Their Listeners, supra note 85, at 446–48 (explaining commercial actors’ informational advantages over consumers). For these reasons, many false advertising laws have long prohibited false or misleading commercial speech—regardless of the commercial speaker’s mental state—because of the harm posed to consumers as the targets of such speech.90E.g., Aaron v. SEC, 446 U.S. 680, 696–702 (1980) (Section 17(a)(3) of the Securities Act of 1933 “quite plainly focuses upon the effect of particular conduct on members of the investing public, rather than upon the culpability of the person responsible”); FTC v. Algoma Lumber Co., 291 U.S. 67, 81 (1934) (explaining that advertisers’ lack of culpable mental state does not insulate them from liability under the Federal Trade Commission Act’s bar on deceptive trade practices). 

Because fear—and speech—are on both sides of threats and stalking cases, a robust understanding of the Free Speech Clause supports a standard similarly attentive to targets’ expressive interests. To be clear, my point is not that the First Amendment necessarily requires a listener-centered standard when the free speech interests of speakers and their targets collide. But neither does the First Amendment require a speaker-centered standard when we must choose between speakers’ and targets’ expression. I suggest instead that the First Amendment permits—indeed, supports—governmental choices to privilege targets’ free speech interests in certain settings. To this end, I urge that the First Amendment doctrine of threats and stalking cases treat the free speech costs borne by speakers and targets with at least equal concern. This symmetrical concern for speakers’ and targets’ expression in threats cases recognizes that objective listener-centered standards advance free speech as least as much as subjective speaker-centered standards. This approach thus understands the First Amendment to permit legislatures or courts to choose from a range of speech-protective standards such that the Counterman Court was wrong to deny Colorado’s Supreme Court that choice.

What might this symmetrical concern look like in practice? The rest of this Article identifies some possibilities.

B. The Counterman Court’s Missed Opportunity: Defining Unprotected True Threats Through an Objective Target-Centered Standard

Start with the road not taken by the Counterman majority: the Colorado Supreme Court’s objective target-centered approach for identifying unprotected true threats. Developed in a case involving high school students’ heated late-night Twitter (now known as “X”) argument shortly after a local school shooting, that context-driven standard required courts to consider the surrounding circumstances to determine whether “an intended or foreseeable recipient would reasonably perceive [the statement(s)] as a serious expression of intent to commit an act of unlawful violence.”91In re R.D., 464 P.3d 717, 721, 731 (Colo. 2020), abrogated by Counterman v. Colorado, 600 U.S. 66 (2023). In my view, this test treated speakers’ and targets’ free speech interests with equal concern by requiring courts to consider multiple factors that attend to both sets of interests.92This Article focuses on the appropriate First Amendment analysis for threats and stalking cases that involve demonstrably direct collisions between speakers’ and targets’ speech interests—and to be sure, this includes attention to the speech-silencing harm of hate speech that takes the form of threats or stalking. See Virginia v. Black, 538 U.S. 343, 363 (2003) (considering cross-burning’s potential as a “particularly virulent” type of threat given its “long and pernicious history as a signal of impending violence”). This Article does not, however, address the First Amendment analysis to be applied to hate speech or harassment that does not cause the target to fear for their physical safety. See Snyder v. Phelps, 562 U.S. 443, 458–59 (2011) (holding that the First Amendment protected hate speech on a matter of public concern in a context that did not cause a target’s potentially speech-silencing fear for their physical safety). Note, however, that objective standards like Colorado’s approach also protect the equality interests of members of marginalized communities who both disproportionately experience enforcement action as speakers and disproportionately experience threats and stalking as targets. See Counterman, 143 S. Ct. at 2122–23 (Sotomayor, J., concurring in part and concurring in the judgment) (“The burdens of overcriminalization will fall hardest on certain groups . . . . Members of certain groups, including religious and cultural minorities, can also use language that is more susceptible to being misinterpreted by outsiders. And unfortunately, yet predictably, racial and cultural stereotypes can also influence whether speech is perceived as dangerous.”); Danielle Keats Citron, Cyber Civil Rights, 89 B.U. L. Rev. 61, 69–81 (2009) (describing how cyberharassment disproportionately targets women and people of color). These factors included:

  • The statement’s role in any broader exchange or events—for example, whether the statement “was spontaneous or [instead] responsive to some other communication,” where statements that matched the “overall tone” of a conversation in which it joined were less likely to be experienced as objectively terrifying.93In re R.D., 464 P.3d at 732.
  • The medium or platform through which the statement was communicated (including any “distinctive conventions or architectural features”)—where, for example, “prevailing norms in a particular genre” or forum might “recast violent language in a less threatening light.”94Id. at 731–32; see also Lyrissa Barnett Lidsky & Linda Riedemann Norbut, #I🔫U: Considering the Context of Online Threats, 106 Calif. L. Rev. 1885, 1910–28 (2018) (discussing how platforms’ architectural features affect the meaning of posts on those platforms and the value of expert witnesses in explaining the meaning of speech in these settings).
  • The manner in which the statement was conveyed (“e.g., anonymously or not, privately or publicly”95In re R.D., 464 P.3d at 722.)—in which, depending on the context, the speaker’s anonymity and the choice to personally target the statements rather than direct them to a large public audience might cause a reasonable target to experience the statements as threatening.
  • Any relationship between the speaker and target—including any history of violence, the speaker’s awareness of the target’s particular vulnerabilities, or the target’s awareness of the speaker’s patterns of speech or emotional state.96Id. at 733.
  • The audience’s subjective reaction: Contrast Watts v. United States, in which the Court relied in part on the audience’s laughter to identify a statement as protected political hyperbole rather than an unprotected threat97Watts v. United States, 394 U.S. 705, 707 (1969) (per curiam).with statements that prompt their audience to report their concerns about potential violence with law enforcement or trusted adults.98In re R.D., 464 P.3d at 733.

C. Target-Attentive Approaches to Threats Cases After Counterman

Unless and until the Court chooses to revisit its decision in Counterman, however, an objective context-driven standard is precluded in threats cases, which now require prosecutors and plaintiffs to establish a speaker’s recklessness before imposing criminal or civil punishment.99See supra note 3 and accompanying text. That the same First Amendment standard applies to both criminal and civil law settings (like civil protection orders) only raises the expressive stakes of this requirement.100See Counterman v. Colorado, 143 S. Ct. 2106, 2140 (2023) (Barrett, J., dissenting) (“[T]his case is about the scope of the First Amendment, not the interpretation of a criminal statute. Accordingly, the Court’s holding affects the civil consequences for true threats just as much as it restricts criminal liability.”); see also id. at 2140–41 (canvassing the consequences of a recklessness requirement for targets’ ability to secure civil protections from threats through restraining orders, civil enforcement statutes, and school discipline). Counterman and its limitations now present new choices among available approaches, some more attentive to targets’ free speech interests than others.

First, because Counterman establishes recklessness as a First Amendment floor and not a ceiling,101See id. at 2139 (“The optimal balance strikes me as a question best left to the legislature, which could calibrate the mens rea to the circumstance—for example, higher for the criminal context and lower for the civil.”). legislatures remain free to impose even higher levels of mens rea (like intent or knowledge) as a condition of criminal or civil liability. And some do.102E.g., Cal. Penal Code § 76 (prohibiting threats of “any elected public official” made with the speaker’s “specific intent that the statement is to be taken as a threat”); Mass. Gen. Laws ch. 258E, § 1 (2025) (defining harassment (in other words, actionable threats) as “3 or more acts of willful and malicious conduct aimed at a specific person committed with the intent to cause fear, intimidation, abuse or damage to property”). But Counterman does not require legislatures to so choose. Attention to targets’ free speech interests thus supports the legislative choice, consistent with free speech values, not to require any subjective mental state greater than recklessness, which already leaves targets unprotected in the many threats cases in which targets lack access to evidence of the defendant’s interior mental state.103See supra notes 4–5 and accompanying text.

Second, courts’ recklessness determinations in threats cases can sometimes be informed by targets’ experiences. The Counterman majority articulated its recklessness standard as focused on the defendant’s “insufficient concern with risk, rather than awareness of impending harm.”104Counterman, 143 S. Ct. at 2117. A law requiring the defendant’s “awareness of impending harm,” in contrast, requires the prosecution to prove a defendant’s awareness “that [a] result is practically certain to follow.” Id. (quoting United States v. Bailey, 444 U.S. 394, 404 (1980)). As the Court explained in an earlier decision, “[t]hat risk need not come anywhere close to a likelihood. Speeding through a crowded area may count as reckless even though the motorist’s ‘chances of hitting anyone are far less [than] 50%.’ ”105Borden v. United States, 141 S. Ct. 1817, 1824 (2021) (quoting Wayne R. LaFave, Substantive Criminal Law § 5.4(f) (3d ed. 2018)). To demonstrate a defendant’s conscious disregard “of a substantial risk” that his statements would cause his target to fear for her physical safety, prosecutors and plaintiffs may present circumstantial evidence of recklessness—that is, evidence that the defendant ignored “obvious” risks or knew of facts that would have made the danger obvious to someone in the defendant’s situation.106See Farmer v. Brennan, 511 U.S. 825, 842 (1994) (Whether the defendant “had the requisite knowledge of a substantial risk is a question of fact subject to demonstration in the usual ways, including inference from circumstantial evidence, and a factfinder may conclude that [the defendant] knew of a substantial risk from the very fact that the risk was obvious.” (citation omitted)). To be sure, the defendant remains free to introduce evidence that they were unaware of risks that others would find obvious.107See id. at 844 (“[I]t remains open to the [defendants] to prove that they were unaware even of an obvious risk to inmate health or safety. That a trier of fact may infer knowledge from the obvious, in other words, does not mean that it must do so.”). Whether these risks are obvious to the defendant can sometimes be informed by the target’s experience and behavior. For instance, a defendant’s awareness that his target had repeatedly blocked his calls, texts, or other messages—an awareness perhaps demonstrated by his creation of new accounts from which to message his target—can show that he was aware of “obvious” risks that his target experienced his communications as threatening. So, too, could his awareness that his target had changed her expressive (or other) behavior in response to his statements.108See Lyrissa Barnett Lidsky & RonNell Andersen Jones, Of Reasonable Readers and Unreasonable Speakers: Libel Law in a Networked World, 23 Va. J. Soc. Pol’y & L. 155, 177 (2016) (predicting that skeptical juries “will rarely accept a defendant’s argument that she truly believed her delusional and defamatory statements”).

Of course, a target could ensure that a speaker was aware of this risk by telling him that she experienced his statements as threatening—but, as discussed above, such engagement can itself be existentially dangerous.109See supra notes 82–83 and accompanying text. This remains among Counterman’s major deficits in choosing a recklessness inquiry focused on the defendant’s interior mental state rather than threats’ speech-silencing effects on their targets.

D. Target-Attentive Approaches to the Many Stalking Cases That Do Not Involve Threats and Where Counterman Thus Does Not Apply

As explained above, stalking laws protect targets from speech-silencing and life-disrupting fear in ways related to, but distinct from, the protections offered by threats laws.110See supra notes 38–41 and accompanying text. While threats laws address speech that causes its target to fear for their physical safety, stalking laws address fear induced by repeated and unwelcome conduct, contact, or communication. Many stalking cases thus do not, and need not, turn on any allegedly threatening content of the speaker’s communications. In those cases, the default First Amendment rules applynot Counterman’s recklessness requirement.111E.g., State v. Labbe, 314 A.3d 162, 179 (Me. 2024) (“Some stalking prosecutions, like Counterman’s, may rely in whole or in part on words used by a defendant to establish the ‘course of conduct’ and consequent effect upon the victim. It does not follow, however, that the Counterman standard applies to every stalking prosecution in which words are spoken or electronic communication devices are used. Rather, Counterman’s holding is clear: where the State relies on the content of a defendant’s expression as the basis for a stalking charge and to establish harm to the victim, the additional requirement to prove subjective mens rea of recklessness applies.”). Nevertheless, because Counterman addressed threats in the context of a stalking case, the danger remains that courts will inappropriately apply its recklessness standard to stalking cases that do not involve threats.112Indeed, for a time this was the case in Colorado, until the state supreme court overruled a trial court’s holding that a prosecutor had to prove recklessness in a stalking case even though the prosecutor made clear that he would not be proceeding under a true threats theory. People v. Crawford, No. 24SA226, slip op. at *P2 (Colo. May 12, 2025) (holding that “the charges the prosecution brought here, carefully based on repeated actions—including contacts (i.e., texts, phone calls, and emails) but not their contents— do not require proof that the defendant communicated or otherwise acted with a reckless state of mind.”). In the interest of full disclosure, I note that I served on the team representing Colorado’s Attorney General in an amicus filing before the state supreme court in Crawford.

So the first step in attending to stalking targets’ free speech interests is to make sure that courts understand that Counterman’s recklessness requirement does not apply to stalking cases that do not allege unprotected true threats.113See Citron, supra note 32, at 204 (“Counterman did not rule that unprotected true threats are necessary for cyber stalking convictions to comport with the First Amendment. But law enforcers could get the [mistaken] impression that now there must be proof of recklessly made threats in any cyber stalking case.”). The second step is to engage targets’ free speech interests when applying the appropriate First Amendment analysis in the many stalking cases that do not involve threats—and where the free speech costs to the target remain substantial while the defendant’s expressive interests are low (since the repeated and unwelcome nature of stalking, rather than its content, often induces fear).114See Lakier & Douek, supra note 2, at 192 (discussing how an endless of barrage of messages can cause fear regardless of their content: “Their mere presence in her inbox, the fact of their constant arrival, that they just did not stop, made [the defendant’s messages] distressing regardless of what they said”).

To illustrate how courts’ assessment of First Amendment challenges to the enforcement of anti-stalking laws can attend to targets’ free speech interests, consider the following fact patterns:

  • Defendant (D) repeatedly follows and watches Target (T) as they walk to and from their car to their office, gym, grocery store, and home;
  • D calls T every morning and hangs up as soon as they answer;
  • D calls T every morning and says, “Hello, beautiful” when T answers; and
  • D calls T every morning and says, “Die” when T answers.

Each of these fact patterns involves repeated and unwelcome behaviors that, depending on the circumstances, could cause a reasonable person to experience fear and thus violate a state’s stalking statute.115E.g., Colo. Rev. Stat. § 18-3-602(1)(c) (2022) (making it unlawful “[r]epeatedly [to] follow[], approach[], contact[], place[] under surveillance, or make[] any form of communication with another person” in “a manner that would cause a reasonable person to suffer serious emotional distress and does cause that person . . . to suffer serious emotional distress”). But some of the fact patterns do so in ways that involve no communication—or if they do involve communication, they do so regardless of the communication’s content.

In short, as this Section explains, the government’s prosecution of conduct normally triggers no First Amendment review. If a defendant nevertheless seeks to challenge the prosecution of conduct on First Amendment grounds, the defendant would have to establish that their conduct was sufficiently expressive to warrant First Amendment protection. If a court determines the conduct to be expressive, then intermediate scrutiny applies. If a defendant challenges the content-neutral prosecution of speech (for example, repeated and unwelcome communications regardless of any threatening content), then again intermediate scrutiny applies. These analyses can, and should, foreground targets’, as well as speakers’, free speech interests.

  1. Stalking That Takes the Form of Conduct Only

Fact patterns A (repeatedly following and watching the target) and B (repeatedly dialing the target’s phone number and hanging up without speaking) involve stalking that takes the form of repeated unwelcome conduct, not speech, since the speaker makes no oral or written communication. Consider these additional illustrations of such courses of conduct: a speaker that “send[s] envelopes of unknown white powder to the victim in the mail;” “repeatedly infect[s] the victim’s computers with viruses;” “open[s] unwanted on-line dating profiles under the victim’s identity;” or “arrange[s] every day for deliveries to be made at the victim’s home at all hours of the night.”116United States v. Ackell, 907 F.3d 67, 73 (1st Cir. 2018) (discussing how stalking often takes the form of conduct rather than speech).

Here, the government seeks to regulate what the defendant did, not what they said.117See Rumsfeld v. F. for Acad. & Institutional Rts., Inc., 547 U.S. 47, 60 (2006) (explaining that federal law regulates “conduct, not speech” when “[i]t affects what law schools must do—afford equal access to military recruiters—not what they may or may not say”). (As Genevieve Lakier and Evelyn Douek explain, “the term stalking was borrowed from the hunting context to emphasize the similarities between the way a hunter stalks their prey and the practices of surveillance and following that characterized the first well-publicized stalking cases.”118Lakier & Douek, supra note 2, at 147.) Stalking laws thus frequently address conduct with only incidental burdens on expression—triggering (and generally satisfying) no more than intermediate scrutiny.

More specifically, the First Amendment analysis of the government’s regulation of such repeated and unwelcome conduct should either be rational basis review (if the court determines the conduct to be nonexpressive) or intermediate scrutiny (if the court determines the conduct to be expressive).119Rumsfeld, 547 U.S. at 65–66 (considering whether regulated conduct is sufficiently expressive to trigger First Amendment review). Determining whether regulated conduct is sufficiently expressive to trigger intermediate scrutiny generally turns on whether the actor intends to communicate a message through their conduct and whether onlookers reasonably understand the actor to be delivering a message through their conduct.120Texas v. Johnson, 491 U.S. 397, 404 (1989); Spence v. Washington, 418 U.S. 405, 410–11 (1974) (per curiam).

When a speaker repeatedly follows and watches their target, do they intend to communicate a message, and does their target understand them to be communicating a message? If, depending on the facts, the answer is “no,” deferential rational basis review will apply to the government’s enforcement.121E.g., Corrigan v. State, No. A23-1942, 2024 Minn. App. Unpub. LEXIS 604 at *10 (Minn. Ct. App. July 22, 2024) (“[The challenger’s] conviction here was based on his conduct in following, monitoring, or pursuing the other driver and not on the content of his expressions or speech. Thus, the holding in Counterman does not apply to [his] case.”). Perhaps some will take the view, however, that this conduct is expressive. For example, a speaker who repeatedly calls and hangs up on their target without saying anything (maybe only breathing heavily) might seek to send, and might be understood as communicating, a message of possessiveness, hostility, or even love toward the target such that application of the stalking law regulates repeated and unwelcome conduct that incidentally burdens expression.122See United States v. O’Brien, 391 U.S. 367 (1968) (applying intermediate scrutiny to the government’s restriction of expressive conduct and holding that the law satisfied such scrutiny because it was narrowly tailored to the government’s significant regulatory interest). Here, too, the First Amendment analysis should remain attentive to the target’s expressive interests. For example, the application of stalking law to this conduct satisfies intermediate scrutiny when the government’s regulatory interests are unrelated to the suppression of ideas and when the enforcement action instead seeks to address the life-disrupting—including speech-silencing—effects of conduct that has little if any First Amendment value of its own.123See R.A.V. v. City of St. Paul, 505 U.S. 377, 390 (1992) (“Where the government does not target conduct on the basis of its expressive content, acts are not shielded from regulation merely because they express a discriminatory idea or philosophy.”); Wisconsin v. Mitchell, 508 U.S. 476, 487 (1993) (explaining that state hate crimes statute targets violent conduct unprotected by First Amendment).

The Supreme Court’s analysis of First Amendment challenges to the enforcement of hate crimes laws to punish certain acts of violence illustrates these dynamics. Even when a defendant’s violence might seek to communicate, and be understood as communicating, a message of hatred based on the target’s protected class status, the Court has described hate crimes laws as the government’s constitutionally permissible regulation of conduct.124Mitchell, 508 U.S. at 487. Along the same lines, the Court has stated that the First Amendment poses no bar to the government’s regulation of verbal harassment in the workplace that “produce[s] a violation of Title VII’s general prohibition against sexual discrimination in employment practices.”125R.A.V., 505 U.S. at 389–90. In these cases, the Court did not state whether the regulated conduct—violent hate crimes and workplace harassment—was sufficiently expressive to trigger intermediate scrutiny, suggesting instead that the conduct did not merit First Amendment protection regardless of the review applied.126See id.; see also Mitchell, 508 U.S. at 487. Lower courts have taken similar approaches, for example, when holding that laws prohibiting the physical obstruction of reproductive health care facilities to ensure access to lawful health care services satisfy intermediate scrutiny even though the regulated obstruction may seek to communicate a message and be understood as communicating a message.127Terry v. Reno, 101 F.3d 1412, 1419 (D.C. Cir. 1996).

  1. Stalking That Takes the Form of Communications That Instill Fear Regardless of Their Content

Turn next to stalking prosecutions of communications that cause fear because of their repeated and unwelcome nature—in other words, because of those communications’ frequency, volume, or persistence rather than their content.128See Counterman v. Colorado, 143 S. Ct. 2106, 86 (Sotomayor, J., concurring in part and concurring in the judgment) (“The content of the repeated communications can sometimes be irrelevant, such as persistently calling someone and hanging up, or a stream of ‘utterly prosaic’ communications.” (quoting Id. at 2111–12)); State v. Labbe, 314 A.3d 162, 179–80 (Me. 2024) (“The ‘course of conduct’ for which [the defendant] was indicted and convicted involved a series of electronic communications—phone calls and texts—to the victim during a period of several weeks. Viewed in the context of the record as a whole, the stalking charge here was not predicated on the content of those communications but rather on the act of communicating itself—the repeated, unwelcome contact carried out through electronic devices—even after he was asked to stop; even after his possessions were returned; and even after he had been served with a protection order prohibiting him from having any direct or indirect contact with the victim. . . . This is plainly evident from the record. The content of the calls and messages was not threatening (‘utterly prosaic’); some were devoid of meaningful content; some were unanswered or were merely hang-ups; one consisted of dead air and just breathing.”). This can be the case, for example, of fact pattern C, where the defendant called the target every day with prosaic messages like “Hello beautiful.” Or by leaving a daily message on the target’s answering machine playing the target’s favorite song. Along the same lines, consider a speaker who made:

“multiple [phone calls] throughout the evening, often ‘back-to-back,’ ” and “into the early morning hours,” despite being told that he “needed to stop calling” and “I don’t want you calling this house anymore.” When the complainant unplugged her phone, the defendant then called each of her parents and he was again told not to call. A few days later, he showed up at the complainant’s apartment building and “stood outside for a couple of minutes,” until he was directed to leave by security. Then he returned the following day again, and “security informed him that he was not permitted in the building.” Several months later, he again placed “nonstop calls” to the complainant from 1:30 a.m. to 3:00 a.m., and during that time he again showed up to the complainant’s apartment and tried calling her from the apartment’s call box. He then tried sneaking into the apartment building to get to the complainant, but was again thwarted. Notice that we have not said one word about the content of the defendant’s speech . . . because it was immaterial to his stalking conviction. He could have been trying to sell his victim a vacuum cleaner and the above actions would still have amounted to stalking.129Mashaud v. Boone, 295 A.3d 1139, 1161 (D.C. 2023) (citations omitted) (describing the facts in Atkinson v. United States, 121 A.3d 780 (D.C. 2015)).

The content-neutral regulation of such repeated and unwelcome communications again triggers intermediate scrutiny, in which courts again assess whether the restriction is narrowly tailored to serve a significant government interest. Courts undertaking this intermediate scrutiny consider, among other things, whether the government’s content-neutral regulation leaves open ample alternative means of expression.130See Frisby v. Schultz, 487 U.S. 474, 484–88 (1988) (upholding a town’s content-neutral ban on picketing targeted at specific homes as narrowly tailored to achieve the government’s significant interest in protecting residential privacy, especially because it left untouched ample alternative means of communication like distributing literature door-to-door). Moreover, the Supreme Court has made clear that the government’s content-neutral speech regulation “need not be the least restrictive or least intrusive means of” achieving its interests; instead, the government’s content-neutral regulation of speech satisfies intermediate scrutiny when it advances a substantial government interest that would otherwise be achieved less effectively.131Ward v. Rock Against Racism, 491 U.S. 781, 798–99 (1989).

Here, too, this analysis can and should foreground targets’—not just speakers’—free speech interests. The content-neutral application of stalking law to repeated and unwelcome communications regardless of their content satisfies intermediate scrutiny when the government’s regulatory interests are unrelated to the suppression of ideas and when the enforcement action instead seeks to address the life-disrupting—including speech-silencing—effects of repeated and unwelcome communications. That the traditional self-help remedies of exit and voice are so often ineffective—and indeed, frequently dangerous—for their targets further support the enforcement of stalking law as a narrowly tailored response.

  1. Stalking That Takes the Form of Threatening Speech

Depending on the circumstances, fact pattern D (daily messages telling the target to “die”) might support a content-neutral stalking prosecution based on the communications’ repeated and unwelcome time, place, and manner, regardless of their content. And depending on the circumstances, fact pattern D may also support prosecution as true threats, which now requires proof of the defendant’s conscious disregard of the risk that his statements were causing his target to fear for her physical safety in addition to proof of each of the statutory elements. Note that these two possibilities require prosecutors and plaintiffs, as a strategic matter, to choose between distinct theories that trigger different First Amendment analyses.132See Lakier & Douek, supra note 2, at 203 (“[L]ike most stalking laws, the Colorado law under which Counterman was convicted not only requires that the emotionally distressing communications be made on multiple occasions but also requires proof that those speech acts have a significant emotionally distressing effect on their recipient, and reasonably so. All of these requirements cabin the reach of the law and ensure that what it punishes is sustained and abusive communication, not an isolated, and therefore potentially misconstrued, speech act.”).

  1. Stalking That Involves Both Conduct and Speech

The foregoing examples illustrate how the variety of repeated and unwelcome behaviors that constitute stalking can invite enforcement under different theories that trigger distinct First Amendment analyses. Some fact patterns involve repeated and unwelcome fear-inducing conduct—and, depending on the facts, that conduct may or may not be expressive. Some involve repeated and unwelcome speech that induces fear not because of its content but because of its repeated and unwelcome time, place, or manner. Some involve repeated and unwelcome speech that induces fear at least in part because of its threatening content.133See, e.g., State v. Lindell, 828 N.W.2d 1, 2–3 (Iowa 2013) (upholding stalking conviction based on repeated contact that included both speech and conduct like a “handwritten note and flowers,” “hang-up calls,” physical surveillance, and damage to personal property). And some fact patterns may involve combinations that invite prosecutors and plaintiffs to make strategic choices among multiple theories.134Again, theories that do not rely on evidence of speech of a threatening nature as an element of the case do not trigger Counterman’s recklessness requirement. But see Lakier & Douek, supra note 2, at 169 (expressing skepticism that stalking laws can be applied to communications in content-neutral ways, and canvassing the relevant regulatory tradition to suggest the possibility of a category of less-protected “unwanted, persistent and fear-producing speech” in which some showing of mens rea like recklessness might still be required). Whatever the First Amendment analysis, however, it should include attention to targets’, as well as defendants’, expressive interests.

Conclusion

Speakers who fear the prospect of the government’s punishment often express themselves less—or express themselves differently—than they would if they were not fearful. This, in turn, harms the speaker’s and the public’s First Amendment interests by stifling the delivery of opinions, facts, and ideas.

At the same time, targets fearful for their physical safety at the hands of a speaker often speak less, and speak differently, than they would if they were not fearful. And this, too, harms both the target’s and the public’s First Amendment interests.

Fear, and speech, are thus on both sides of threats cases and also many stalking cases. Courts’ doctrinal choices in threats and stalking cases sometimes chill speakers’ expression. And sometimes they instead permit the silencing of targets’ speech. A robust commitment to free speech, in my view, requires attention not only to the speech deterred by legal standards that are too quick to punish speakers but also to the speech silenced when the law fails adequately to protect the targets of threats and stalking from reasonable fear for their safety.

When courts ignore targets’ free speech interests to privilege defendants’ free speech interests, they pretend to make hard First Amendment problems easy. But principled problem-solving requires that we take care to recognize and explain what makes difficult problems difficult, as is the case here, where we must choose between speakers’ and targets’ important free speech interests.

Courts must, and do, make choices all the time when calibrating the categories of unprotected speech (for example, in true threats cases), and when otherwise applying First Amendment doctrine (for instance, in stalking cases that do not allege true threats). The Court’s choice in Counterman to privilege speakers’ free speech interests over targets’ was a choice—but that choice was neither inevitable nor necessarily speech-protective. When we illuminate, rather than obscure, the free speech injuries experienced by the targets of threats and stalking, we can identify doctrinal choices that attend to targets’ expressive interests as well as defendants’.

 

98 S. Cal. L. Rev. 1351

Download

*  University Distinguished Professor and Rothgerber Chair in Constitutional Law, University of Colorado School of Law. Thanks to RonNell Andersen Jones, Nelson Tebbe, Alan Chen, Danielle Keats Citron, Yasmin Dawood, Margot Kaminski, Christina Koningisor, Margaret Kwoka, Genevieve Lakier, Lyrissa Lidsky, Toni Massaro, Joe Michaels, Francesca Procaccini, Blake Reid, Scott Skinner-Thompson, Phil Weiser, and the participants at Yale Law School’s Free Expression Scholars Conference and the University of Southern California Gould School of Law’s symposium on “The First Amendment and Listener Interests” for their insightful comments and questions. Thanks, too, to Kenzie Larrenaga, Devin Schultze, Olivia Sharp, and Claire Power Tate for outstanding research assistance.

Remarks on Academic Freedom and Free Speech: Reflections on Blocher

Joseph Blocher’s article is a rich contribution to our thinking about campus speech.1Joseph Blocher, Listening on Campus: Academic Freedom and Its Audiences, 98 S. Cal. L. Rev. 1161 (2025). It takes the academic endeavor seriously—both for its rights and for its responsibilities—while simultaneously warning of its fragility under the threat of strong free speech claims.

Professor Blocher struck a poignant note with his insight that the value of academic freedom needs defending. He reminds us that public trust in academic judgment is diminished or gone. That is a devastating observation because if campus speech problems are to be addressed responsibly, it is only academic judgment that will get us there. Without trust in it, solutions seem elusive.

But his article sounds the alarm, warning that efforts to address the complex conundrums posed by campus speech—if beholden to only the values of free speech and listener interests—can in fact strain, and even threaten, the independence that universities need to exist as centers of teaching and intellectual engagement. To shed light on this threat, we must frankly confront and seek to understand free speech and academic freedom as separate values, each playing an important role in sustaining a democratic polity—but in different ways.

There is little need to rehearse the familiar rationales for free speech, which assert its importance to the pursuit of truth through a competition often called the “marketplace of ideas”;2ed Lion Broad. Co. v. FCC, 395 U.S. 367, 390 (1969) (citing Abrams v. United States, 250 U.S. 616, 630 (1919) (Holmes, J., dissenting)). its value to democratic self-rule;3Alexander Meiklejohn, Free Speech and Its Relation to Self-Government 93–94 (1948). and its role in assuring individual fulfillment, a core aspect of human dignity.4Thomas I. Emerson, Toward a General Theory of the First Amendment, 72 Yale L.J. 877, 879–81 (1963). Academic freedom, on the other hand, has different derivations and different justifications, not nearly so familiar. Just as free speech theory in the public domain is anchored on a theory of the government, speech in the university setting—along with its companion, academic freedom—must emanate from a theory of the university.

The university as an institution is conducted for the common good—not for its own good, and not for the good of any individuals who are part of it. Thus, unlike many other institutions that serve the public in other ways, society has considered it appropriate—since the founding of our nation—for the public to establish and fund universities, with the first public university (University of North Carolina) established in 1789.5History of the University, U.N.C. Chapel Hill, https://www.unc.edu/about/history-and-traditions [https://perma.cc/PX7Y-EAQY].

Benjamin Franklin confirmed that “[a]lmost all Governments have . . . made it a principal Object of their Attention, to establish and endow with proper Revenues, such Seminaries of Learning, as might supply the succeeding Age with Men qualified to serve the Publick with Honour to themselves, and to their Country.”6Benjamin Franklin, Proposals Relating to the Education of Youth in Pensilvania 5 (Univ. of Pa. Press 1931) (1749), https://archives.upenn.edu/digitized-resources/docs-pubs/franklin-proposals [https://perma.cc/67DE-WU7Z]. In Franklin’s vision, the public invests in the university and gleans returns in the form of graduates: an educated citizenry that is an asset to the common good.

But the mere fact that universities have been established and endowed with proper revenues by the government, as an investment in the betterment of society, does not automatically render those institutions equivalent to the government itself. This distinction is critical because the theories underlying free speech do not necessarily support equating universities with governments. Universities, while part of the polity, are not coextensive with government. Franklin’s statement suggests that governments, when they support institutions of higher learning, necessarily endow those institutions with the means to achieve their mission—the means to achieve the common good that Franklin described.

In its famous 1915 Declaration of Principles on Academic Freedom and Academic Tenure—which has shaped discussion of universities for over a century—the American Association of University Professors identified a university’s purpose as threefold: “to promote inquiry and advance the sum of human knowledge”; “to provide general instruction to the students”; and “to develop experts for various branches of the public service.”7Am. Ass’n of Univ. Professors, Appendix I: 1915 Declaration of Principles on Academic Freedom and Academic Tenure 295 (1915), https://www.aaup.org/NR/rdonlyres/A6520A9D-0A9A-47B3-B550-C006B5B224E7/0/1915Declaration.pdf [https://perma.cc/G3Z8-HE8L]. Even today, most university websites identify their mission as involving the creation and advancement of knowledge.8See, e.g., Mission Statement, Princeton Univ., https://www.princeton.edu/meet-princeton/mission-statement [https://perma.cc/F47B-FHDV] (“advances learning through scholarship, research, and teaching”); Mission Statement, MIT, https://www.mit.edu/about/mission-statement [https://perma.cc/K8HZ-RWZV] (“generating, disseminating, and preserving knowledge”); Who We Are, Stan. Univ., https://www.stanford.edu/about [https://perma.cc/F3DF-DY3A] (“to create and share knowledge”). From that universal recognition of a core purpose comes a corresponding need: the government must promise not to interfere in academic judgment or undermine educational decisions, in exchange for the university’s contribution to the public good of education.9See Keyishian v. Bd. of Regents, 385 U.S. 589, 603–04 (1967). The institution itself is properly understood to be the holder of academic freedom, a “special concern of the First Amendment, which does not tolerate laws that cast a pall of orthodoxy over the classroom.”10Id. at 603. Academic freedom thus insulates the academy from government or politics for the betterment of the common good. As Justice Felix Frankfurter suggested in a famous concurring opinion, “ ‘the four essential freedoms’ of a university [are] to determine for itself on academic grounds who may teach, what may be taught, how it shall be taught, and who may be admitted to study.”11Sweezy v. New Hampshire, 354 U.S. 234, 263 (1957) (Frankfurter, J., concurring) (quoting Acad. Freedom Comms. of the Univ. of Cape Town & the Univ. of the Witwatersrand, Johannesburg, The Open Universities in South Africa and Academic Freedom 1957–74, at 10–12 (1974)).

But the goal of this Comment is to push harder on the question of what governments transmit to universities in addition to a degree of independence known as academic freedom. I would submit that there is no reason to assume that governments also pass along to universities the separate obligation to adhere to the free speech paradigm applicable to government itself and the public sphere in general. Indeed, there are very good reasons not to do so.

A key tenet of Blocher’s article is that free speech principles and academic freedom principles are not the same thing and can work in tension with one another. This clash, I submit, comes from a reflexive transplanting of doctrines designed to function in different settings. That is not to say free speech has no place in the academy. Rather, we should ask: where do free speech obligations come from with regard to a university?

The simple answer is that the Supreme Court has long held that the First Amendment’s protection of free speech applies fully to public universities.12Healy v. James, 408 U.S. 169, 180–81 (1972). But I believe that the Court made a category mistake in its holding, and so I would like to think further about what the right answer ought to be with regard to the question of free speech obligations for universities.

The better answer, in my view, is that universities do not take on the constitutional obligations of free speech that governments hold. But what about the importance of free speech for academic discourse? While a form of free inquiry and communication is essential to the academic enterprise, its success also depends on judgments about the truth of speech that are utterly inconsistent with the idea of unregulated speech in society at large. Robert Post, who has developed one of the most comprehensive accounts of academic freedom,13For representative works by Robert Post on academic freedom, see generally Robert C. Post, Democracy, Expertise, Academic Freedom: A First Amendment Jurisprudence for the Modern State (2012) [hereinafter Post, Democracy, Expertise, Academic Freedom]; Matthew W. Finkin & Robert C. Post, For the Common Good: Principles of American Academic Freedom (2009); Robert Post, The Structure of Academic Freedom, in Academic Freedom After September 11th 61 (Beshara Doumani ed., 2006); Robert Post, Debating Disciplinarity, 35 Critical Inquiry 749 (2009). offers a persuasive illustration: “Although the First Amendment would prohibit government from regulating the New York Times if the newspaper were inclined to editorialize that the moon is made of green cheese, no astronomy department could survive if it were prevented from denying tenure to a young scholar who was similarly convinced.”14Post, Democracy, Expertise, Academic Freedom, supra note 13, at 67.

My argument is that freedom of speech is best understood not as a free-standing obligation of universities as it is for governments; rather, free speech in the university setting is subsumed within academic freedom, properly understood. With this nesting of dominance, free speech and academic freedom can avoid the catastrophic collision course that Professor Blocher describes. Both free speech and academic freedom are separate but related means designed to further the noble purpose of the academy.

The University of Chicago’s Foundational Principles attest that a university has a “commitment to free, robust, and uninhibited debate and deliberation among all members of the University’s community.”15The Comm. on Free Expression, Univ. of Chi. Off. of the Provost, Report of the Committee on Freedom of Expression (2015), https://provost.uchicago.edu/sites/default/files/documents/reports/FOECommitteeReport.pdf [https://perma.cc/U4MD-FHUJ] [hereinafter Chicago Principles]. Many scholars agree that the central purpose of a university is, first and foremost, to facilitate disagreement across differences.16See Erwin Chemerinsky & Howard Gillman, Free Speech on Campus 51–52 (2018) (describing modern view of a university as a place in which “beliefs should be tested by free-thinking human beings . . . after engaging in debate and experimentation”); Prof. Geoffrey Stone Discusses Free Speech on Campus at the American Law Institute, Univ. of Chi. L. Sch., https://www.law.uchicago.edu/news/prof-geoffrey-stone-discusses-free-speech-campus-american-law-institute [https://perma.cc/6QPQ-3Z47] (fostering debate is an “essential part of the University’s educational mission”). These tropes are commonly taken as evidence that free speech is a critical value to universities. The words do suggest a free speech value, and certainly some universities and scholars have interpreted them that way—that universities are indistinguishable from public fora for speech.17See Chemerinsky & Gillman, supra note 16, at xx–xxi, 75–78 (arguing for a robust application of free speech principles to universities).

But the words are misleading. In my view, the commitment to debate and deliberation that Chicago rightly identifies as defining the educational mission of a university does not derive from the First Amendment at all. Indeed, I suggest that the free speech value is not a consequence of the First Amendment. Rather, it is a component part of the educational mission of colleges and universities.

Disagreement, engagement, communication—they are all forms of speech. However, that is not why they are central to academia; they are critical to universities because they are essential aspects of the learning process, and to the production and dissemination of knowledge, and thus fall under the rubric of the university’s commitment to academic freedom. It is wrong to assume that, because education requires speech, free speech holds an independent power within the university. That error influenced the Supreme Court, animates many of the critiques of universities, and has led to the problems that Professor Blocher identifies in his article. There should be only one overarching existential value guiding the university: the umbrella known as the pursuit of the educative mission and its guardian, academic freedom.

As Professor Blocher has so ably shown, free speech untethered from its relationship with academic freedom can become a threat to it. Thus, in the university setting, free speech should be considered subservient to academic freedom. To the extent that free speech values can validly claim a place in the university, they do so only to further the legitimate goals of education—goals that free speech supports rather than controls.

This is not the place to make a full-throated defense of the claim that the First Amendment should not apply to universities, public or private—but the concluding discussion will suggest a nod in that direction.

For one thing, the stakes are very different between speech regulation by a university and speech regulation by a government. When a university in some way restricts speech—whether it be a student’s placard in the quad or a white supremacist speaker’s rant at a campus rally—the regulation does not limit speech outside the university’s gates and thus causes significantly less potential speech harm than a government law that regulates speech in the world. The student is free to wave a placard out on the public sidewalk, and the speaker can conduct a rally at a public park.

Why would we assume that universities are public fora for speech? Listener interests, one might reply—people on campus need to be able to hear unfettered speech to achieve the knowledge and training that they seek. But I would respond that the university’s job is to consider the legitimate listener interests in the enterprise of academic engagement. Indeed, as Professor Blocher emphasizes, listener interests are really at the heart of the educational enterprise.

But the university owes no duty to listeners as such, separate from what contributes to the educational mission. If it does owe a duty to permit certain speakers, it is not because the speaker is entitled to speak to the students, or because the students are entitled to hear from every possible speaker. Rather, the duty is to support the acquisition of knowledge and to support speakers who contribute to that enterprise. This would leave out, for example, the people Professor Blocher calls “provocateurs who have no business speaking in an academic setting to begin with.”18Blocher, supra note 1, at 1162. The university simply is not the public square.

Additionally, of course, the final cause of government is very different from that of universities. The Constitution protects free speech to support self-government, informed democracy, and civic virtue. The university has

a different purpose, which is not always compatible with free speech for its own sake.

The protection of listeners is absolutely core to the academic mission of a university; knowledge cannot be attained, improved, or shared without the inculcation and practice of listening. Listening, critically evaluating what is heard, and engaging in meaningful dialogue are the processes by which learning occurs. Speech and listening are the lifeblood of the university, and they are a blood that nourishes its soul.

For example, if a university believes that hate speech is interfering with learning by causing conflict and insecurity among targeted students, it should have the power to limit expression to the degree necessary to prevent a genuine interference with learning, something that hampers the constructive debate and mutual respect that are essential to true academic engagement. This result is antithetical to the free-speech paradigm.19See Chemerinsky & Gillman, supra note 16, at 103 (claiming that hate speech regulation on campus both is and should be prohibited by the First Amendment).

Indeed, the Chicago Principles addressing campus speech explicitly reject any special accommodations to protect targets of hate speech, on the ground that unrestricted speech is the value to which they are committed. But I suggest that they should not be committed to that value if it conflicts with the academic mission. Universities have a core duty to manage speech to promote the advancement of knowledge, not sacrifice it in the name of unrestricted speech.

So, does this help at all with Professor Blocher’s powerful point about how the value of the academic enterprise, including its speech, is contested now and suffers low public regard? Perhaps in this very subtle way: Free speech is often touted as a right—as a sword, not a shield—and those inside and outside of academia are heard shouting, “I have the right to say it, so I am going to say it, and the university cannot keep me from saying it.”20See Defending Your Rights: Reforming College Policies, FIRE, https://www.thefire.org/defending-your-rights/reforming-college-policies [https://perma.cc/JU7U-8U7C] (working “to proactively and systematically challenge campus policies that violate college students’ and faculty members’ free speech rights”). With free speech in charge, there is less obligation to justify one’s claims. One can make any outrageous, false, offensive, and/or anti-intellectual statement, based solely on the right to speak. In such a scenario, the professional, empirical, or scientific basis for a claim is not offered—is not demanded—because, under the First Amendment, it is not required. But for the academic enterprise, justification is always required. Thus, when the free speech model overcomes the academic model, the terms of debate veer away from any foundation that might inspire trust. This can degrade the currency of academic judgment.

If we could move to a paradigm where universities were thought of more as enclaves governed by the ethos of academic integrity—where speech is justified and tested in dialectic, rather than as a contest of who can yell louder or be more provocative—perhaps there could be more of an emphasis on what Professor Blocher has persuasively defended as “justified true belief.”21See Joseph Blocher, Free Speech and Justified True Belief, 133 Harv. L. Rev. 439, 444 (2019) (setting forth a knowledge-based account of free speech). In the academic setting, the goal is not an unregulated marketplace of ideas but rather a shared quest for knowledge. This underscores the obligation of the academy to ensure dialectic and responsiveness—give and take—as much as protecting speakers as such.

In this world in which ideas are often communicated in the form of twenty-second TikTok videos, memes, and tweets, one thing that has suffered is reasoned argument—or even reasons, period. Conspiracy theories catch on precisely because they lack a foundation in justified true belief and fail to be subject to robust interrogation. This is the free-speech paradigm at work. But in the academic enclave, I wonder whether re-emphasizing academic freedom and de-emphasizing free speech might help restore to academic expertise the appearance of justification and, in turn, public value.

There are pragmatic objections to how such a regime would be implemented, and this brief Comment does not aim to resolve them. The aim was rather to plant the seed of a model of campus speech that nests free speech within an emboldened concept of academic freedom, making free speech the handmaiden of academic freedom, rather than its antagonist.

98 S. Cal. L. Rev. 1379

Download

* The Rader Family Trustee Chair in Law, University of Southern California. This Comment was prepared for the SCLR Symposium 2024: The First Amendment and Listener Interests, November 8–9, 2024. I am grateful to Erin Miller and Bob Rasmussen for comments.