Sandvig v. Sessions ( 2018 )


Menu:
  •                             UNITED STATES DISTRICT COURT
    FOR THE DISTRICT OF COLUMBIA
    CHRISTIAN W. SANDVIG, et al.,
    Plaintiffs,
    v.                                         Civil Action No. 16-1368 (JDB)
    JEFFERSON B. SESSIONS III, in his
    official capacity as Attorney General of the
    United States,
    Defendant.
    MEMORANDUM OPINION
    It’s a dangerous business, reading the fine print. Nearly every website we visit features
    Terms of Service (“ToS”), those endless lists of dos and don’ts conjured up by lawyers to govern
    our conduct in cyberspace. They normally remain a perpetual click away at the bottom of every
    web page, or quickly scrolled past as we check the box stating that we agree to them. But to
    knowingly violate some of those terms, the Department of Justice tells us, could get one thrown in
    jail. This reading of federal law is a boon to prosecutors hoping to deter cybercrime. Yet it also
    creates a dilemma for those with more benign intentions. Plaintiffs in this case, for instance, are
    researchers who wish to find out whether websites engage in discrimination, but who have to
    violate certain ToS to do so. They have challenged the statute that they allege criminalizes their
    conduct, saying that it violates their free speech, petition, and due process rights. First, however,
    they must show that they have a sufficient injury to make it through the courthouse door, and that
    their suit is plausible enough to continue. For the following reasons, the Court finds that plaintiffs
    have standing, and that they can bring one (but not the rest) of their claims.
    1
    I. BACKGROUND
    This case centers on a few sections of the Computer Fraud and Abuse Act (CFAA), a law
    dedicated to “deterring the criminal element from abusing computer technology.” H.R. Rep. No.
    98–894, at 4 (1984). Plaintiffs directly challenge one section, referred to here as the Access
    Provision, which sweeps in the greatest amount of conduct. The Access Provision states that
    “[w]hoever . . . intentionally accesses a computer without authorization or exceeds authorized
    access, and thereby obtains . . . information from any protected computer . . . shall be punished as
    provided in subsection (c) of this section.” 18 U.S.C. § 1030(a)(2)(C). The CFAA defines
    “protected computer” to mean, among other things, “a computer . . . which is used in or affecting
    interstate or foreign commerce or communication.”          
    Id. § 1030(e)(2)(B).
        This definition
    encompasses just about all computers hooked up to the Internet—including computers that house
    website servers. See, e.g., United States v. Nosal, 
    676 F.3d 854
    , 859 (9th Cir. 2012). The statute
    also defines “exceeds authorized access” as “to access a computer with authorization and to use
    such access to obtain or alter information in the computer that the accesser is not entitled so to
    obtain or alter.” 18 U.S.C. § 1030(e)(6). Thus, the Access Provision applies to anyone who
    purposely accesses an Internet-connected computer without authorization, or uses a legitimate
    authorization to receive or change information that they are not supposed to, and thereby obtains
    information from the computer.
    The CFAA provides for a fine and/or imprisonment for up to one year upon a first violation
    of the Access Provision, or up to ten years for any further offenses. 
    Id. § 1030(c)(2)(A),
    (C).
    However, the punishment for an initial violation rises to a sentence of up to five years’
    imprisonment if the offense (1) “was committed for purposes of commercial advantage or private
    financial gain,” (2) was “in furtherance of any criminal or tortious act in violation of the
    2
    Constitution” or state or federal law, or (3) involved obtaining information valued at more than
    $5,000. 
    Id. § 1030(c)(2)(B).
    Thus, meeting one of these three conditions makes a first violation
    a felony; if none are met, the first violation is a misdemeanor.
    Plaintiffs in this case are four professors and a media organization: Christian W. Sandvig
    of the University of Michigan; Kyratso “Karrie” Karahalios of the University of Illinois; Alan
    Mislove of Northeastern University; Christopher “Christo” Wilson of Northeastern University;
    and First Look Media Works, Inc. (“Media Works”), which publishes the online news platform
    The Intercept. Compl. [ECF No. 1] ¶¶ 13–14, 16–17, 19. Plaintiffs are conducting studies to
    respond to new trends in real estate, finance, and employment transactions, which increasingly
    have been initiated on the Internet. 
    Id. ¶¶ 15,
    18, 55. Data brokers assemble consumers’
    information from myriad sources and place consumers into models that include racial, ethnic,
    socioeconomic, gender, and religious inferences about them. 
    Id. ¶¶ 56–57.
    After brokers create
    consumer profiles, those profiles follow consumers around online through tracking technologies
    such as cookies. 
    Id. ¶¶ 58–59.
    Tracking allows websites and advertisers to display content targeted
    at particular groups, based on consumers’ inferred characteristics or the sorts of websites they visit.
    
    Id. ¶¶ 59–60.
    But plaintiffs are concerned, “[g]iven the . . . history of racial discrimination in
    housing and employment,” that this technology may be “harnessed for discriminatory purposes.”
    
    Id. ¶ 61.
    They are also concerned that, “when algorithms automate decisions, there is a very real
    risk that those decisions will unintentionally have a prohibited discriminatory effect.” 
    Id. ¶ 62.
    One way to determine whether members of protected classes are being discriminated
    against is to engage in “outcomes-based audit testing.” 
    Id. ¶ 67.
    Such testing commonly involves
    accessing a website or other network service repeatedly, generally by creating false or artificial
    user profiles, to see how websites respond to users who display characteristics attributed to certain
    3
    races, genders, or other classes. 
    Id. ¶ 70.
    This method is similar to classical paired testing
    procedures, in which multiple people—identical but for one legally protected trait—apply for the
    same house or job. Such procedures are often used to uncover violations of housing and
    employment discrimination laws in the physical world. 
    Id. ¶¶ 41,
    50, 52.
    Plaintiffs plan to engage, and are engaging, in such audit testing. Sandvig and Karahalios
    are investigating whether computer programs that decide what to display on real estate websites
    discriminate against users based on race or other factors. 
    Id. ¶ 82.
    They are writing a computer
    program that will create bots—automated agents that will each browse the Internet and interact
    with websites as a human user might. 
    Id. ¶ 88.
    Each bot will create a number of distinct user
    profiles, each of which is called a “sock puppet.” 
    Id. ¶ 89.
    Sandvig and Karahalios will program
    the bots to visit real estate websites and search for properties, while also engaging in behaviors
    correlated with members of a particular race. 
    Id. ¶¶ 90–91.
    Sandvig and Karahalios will use an
    automatic data recording technique known as scraping to record the properties that each bot sees
    on the real estate sites. 
    Id. ¶¶ 90,
    92. They can then examine their data to determine whether race-
    associated behaviors caused the sock puppets to see different sets of properties. 
    Id. ¶ 93.
    Similarly, Mislove and Wilson plan to conduct a study to see whether hiring websites’
    algorithms end up discriminating against job seekers based on protected statuses like race or
    gender. 
    Id. ¶ 107.
    They will first use bots to crawl the profiles of a random selection of job-
    seekers to obtain baseline demographic data, then create fake employer profiles so that they can
    search for candidates and record how the algorithms rank those candidates. 1 
    Id. ¶¶ 114–17.
    They
    will also create fictitious sock-puppet job seeker profiles, and have the fictitious seekers—who
    1
    This second step involves both crawling the profiles of ranked candidates to determine their demographic
    data and scraping to record the overall rankings. Compl. ¶¶ 114–16.
    4
    will vary along different demographic axes—apply for fictitious jobs, to examine how the
    algorithms rank the candidates. 
    Id. ¶¶ 118–19,
    121–22. Mislove and Wilson will prevent real
    people from applying for the false jobs by giving them titles that say “[t]his is not a real job, do
    not apply,” and will delete the fictitious accounts and jobs when they finish. 
    Id. ¶ 120.
    Media Works and its journalists seek to investigate online companies, websites, and
    platforms, including by examining any discriminatory effects of their use of algorithms. 
    Id. ¶ 130.
    Mislove and Wilson plan to publish their findings in academic papers, and to bring the
    results of their research to the public. 
    Id. ¶ 123.
    Media Works intends to use the results of its
    journalistic investigations to inform the public about online business practices. 
    Id. ¶ 132.
    Sandvig
    and Karahalios do not explicitly claim that they will publish their work, but state that their findings
    “would produce important new scientific knowledge about the operation of computer systems,
    discrimination, and cumulative disadvantage.” 
    Id. ¶ 94.
    Plaintiffs are all aware that their activities will violate certain website ToS. 
    Id. ¶¶ 95,
    124,
    131. All intend to use scraping to record data, which is banned by many of the websites plaintiffs
    seek to study. Id.; see 
    id. ¶¶ 70–71.
    Many of the housing websites that Sandvig and Karahalios
    will study prohibit the use of bots. 
    Id. ¶¶ 71,
    95. All of the hiring websites that Mislove and
    Wilson will study prohibit the use of sock puppets, and most prohibit crawling. 
    Id. ¶¶ 71,
    124.
    Additionally, some websites control when and how visitors may speak about any information
    gained through the site—even in other forums—by including non-disparagement clauses in their
    ToS. 
    Id. ¶ 72.
    Some sites also have ToS that require advance permission before using the sites
    for research purposes, which, plaintiffs allege, creates the possibility of viewpoint-discriminatory
    permission schemes. 
    Id. ¶ 73.
    Aside from their ToS violations, plaintiffs’ experiments will have
    at most a minimal impact on the operations of the target websites. 
    Id. ¶¶ 96,
    125. All plaintiffs
    5
    but Media Works have already begun some of the activities involved in their research plans,
    including activities that require violating websites’ TOS. 
    Id. ¶¶ 98,
    126.
    Plaintiffs claim that they must either refrain from conducting research, testing, and
    investigations that (they argue) constitute protected speech or expressive activity, or else expose
    themselves to the risk of prosecution under the Access Provision of the CFAA. 
    Id. ¶ 137.
    Plaintiffs
    therefore filed this suit against the Attorney General, raising four causes of action: (1) a facial
    overbreadth and as-applied challenge under the Free Speech and Free Press Clauses of the First
    Amendment, 
    id. ¶¶ 180–86;
    (2) a First Amendment Petition Clause challenge, ¶¶ 187–93; (3) a
    vagueness claim under the Fifth Amendment’s Due Process Clause, 
    id. ¶¶ 194–98;
    and (4) a claim
    of unconstitutional delegation to private parties under the Fifth Amendment, 
    id. ¶¶ 199–202.
    The
    government has moved to dismiss under Federal Rules of Civil Procedure 12(b)(1) and 12(b)(6)
    for lack of standing and failure to state a claim. See Mot. to Dismiss [ECF No. 10].
    II. DISCUSSION
    We begin with the familiar standards that govern Rule 12(b) analysis. When facing a Rule
    12(b)(1) motion to dismiss for lack of subject-matter jurisdiction, a plaintiff “bears the burden of
    showing that he has standing.” Summers v. Earth Island Inst., 
    555 U.S. 488
    , 493 (2009). Just
    because a plaintiff makes it through the courthouse doors on one claim does not mean that other
    claims can tag along; rather, a plaintiff “must demonstrate standing for each claim he seeks to press
    and for each form of relief that is sought.” Town of Chester v. Laroe Estates, Inc., 
    137 S. Ct. 1645
    ,
    1650 (2017) (citation omitted). On a motion to dismiss, plaintiffs must plead facts that, taken as
    true, raise a plausible standing claim. See Humane Soc’y of the U.S. v. Vilsack, 
    797 F.3d 4
    , 8
    (D.C. Cir. 2015). The Court must take all facts alleged in the complaint as true and make all
    reasonable inferences in plaintiffs’ favor. See Gulf Coast Mar. Supply, Inc. v. United States, 867
    
    6 F.3d 123
    , 128 (D.C. Cir. 2017). However, the Court “may consider materials outside the pleadings
    in deciding whether to grant a motion to dismiss for lack of jurisdiction.” 
    Id. To survive
    a motion to dismiss for failure to state a claim under Rule 12(b)(6), a complaint
    must “contain sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible
    on its face.’” Ashcroft v. Iqbal, 
    556 U.S. 662
    , 678 (2009) (quoting Bell Atl. Corp. v. Twombly,
    
    550 U.S. 544
    , 570 (2007)). Plausibility does not mean certainty, or that a claim is more likely to
    succeed than not, but rather that the claim at issue rises “above the speculative level.” 
    Twombly, 550 U.S. at 555
    . In other words: if what plaintiffs lay out in the complaint actually happened, is it
    more than merely possible that the law has been violated? Plaintiffs cannot meet this standard
    through “[t]hreadbare recitals of the elements of a cause of action, supported by mere conclusory
    statements.” 
    Iqbal, 556 U.S. at 678
    . Likewise, a court need not accept a plaintiff’s legal
    conclusions, even if they are dressed up as factual allegations. See Sickle v. Torres Advanced
    Enter. Sols., LLC, 
    884 F.3d 338
    , 345 (D.C. Cir. 2018). However, courts must accept as true all
    facts stated in the complaint, making all reasonable inferences in plaintiffs’ favor. 
    Id. A. THE
    INTERNET AS PUBLIC FORUM
    At the outset, it is necessary to answer a question that affects both the standing and the
    merits inquiries in this case: what is the First Amendment status of the Internet? And, more
    particularly, what powers does the government possess to regulate activity on individual websites?
    The government bases much of its argument that plaintiffs do not have standing, and that
    they have not alleged a First Amendment violation, on the premise that this case is about “a private
    actor’s abridgment of free expression in a private forum.” Reply in Supp. of Def.’s Mot. to Dismiss
    (“Def.’s Reply”) [ECF No. 15] at 2; see Mem. of P. & A. in Supp. of Def.’s Mot. to Dismiss
    (“Def.’s Mem.”) [ECF No. 10-1] at 10–13, 22–24. This argument finds some support in Supreme
    7
    Court case law, which has rejected the First Amendment claims of individuals who wished to
    distribute handbills or advertise a strike in shopping centers against the wishes of the property
    owners. See Hudgens v. NLRB, 
    424 U.S. 507
    , 520 (1976); Lloyd Corp. v. Tanner, 
    407 U.S. 551
    ,
    567–68 (1972). Private property, the Court determined, does not “lose its private character merely
    because the public is generally invited to use it for designated purposes.” 
    Lloyd, 407 U.S. at 569
    .
    Why, then, would it violate the First Amendment to arrest those who engage in expressive activity
    on a privately owned website against the owner’s wishes?
    The answer is that, quite simply, the Internet is different. The Internet is a “dynamic,
    multifaceted category of communication” that “includes not only traditional print and news
    services, but also audio, video, and still images, as well as interactive, real-time dialogue.” Reno
    v. Am. Civil Liberties Union, 
    521 U.S. 844
    , 870 (1997). Indeed, “the content on the Internet is as
    diverse as human thought.”       
    Id. (citation omitted).
        Only last Term, the Supreme Court
    emphatically declared the Internet a primary location for First Amendment activity: “While in the
    past there may have been difficulty in identifying the most important places (in a spatial sense) for
    the exchange of views, today the answer is clear. It is cyberspace . . . .” Packingham v. North
    Carolina, 
    137 S. Ct. 1730
    , 1735 (2017) (citation omitted).
    With this special status comes special First Amendment protection. The Packingham Court
    applied public forum analysis to a North Carolina law that banned former sex offenders from using
    social media websites, employing intermediate scrutiny because the law was content-neutral. See
    
    id. at 1736.
    The fact that the statute restricted access to particular websites, run by private
    companies, did not change the calculus. Consider: on one of the sites the Court treated as an
    exemplar of social media, LinkedIn, “users can look for work, advertise for employees, or review
    tips on entrepreneurship,” 
    id. at 1735—the
    same activities in which Mislove and Wilson wish to
    8
    engage for their research. As the Court warned, the judiciary “must exercise extreme caution
    before suggesting that the First Amendment provides scant protection for access to vast networks
    in [the modern Internet].” 
    Id. at 1736.
    The government’s proposed public/private ownership
    distinction cannot account for the Court’s determination in Packingham that privately-owned sites
    like Facebook, LinkedIn, and Twitter are part of a public forum, government regulation of which
    is subject to heightened First Amendment scrutiny.          The Internet “is a forum more in a
    metaphysical than in a spatial or geographic sense, but the same principles are applicable.”
    Rosenberger v. Rector & Visitors of Univ. of Virginia, 
    515 U.S. 819
    , 830 (1995).
    An analogy to the real world, while necessarily imperfect, may help illustrate the point.
    Stroll out onto the National Mall on any day with decent weather and you will discover a phalanx
    of food trucks lining the streets. Those food trucks are privately owned businesses. Customers
    interact with them for the private purpose of buying a meal. If they were a brick-and-mortar store
    on private property, they would encounter no First Amendment barrier to removing a patron who
    created a ruckus. Yet if a customer standing on a public sidewalk tastes her food and then yells at
    those in line behind her that they should avail themselves of the myriad other culinary options
    nearby, the truck could not call the police to arrest her for her comments. She is in a public forum,
    and her speech remains protected even when she interacts with a private business located within
    that forum.
    It makes good sense to treat the Internet in this manner. “Each medium of expression . . .
    must be assessed for First Amendment purposes by standards suited to it, for each may present its
    own problems.” Se. Promotions, Ltd. v. Conrad, 
    420 U.S. 546
    , 557 (1975). Regulation of the
    Internet presents serious line-drawing problems that the public/private distinction in physical space
    does not. The decisions in Lloyd and Hudgens concerned “property privately owned and used
    9
    nondiscriminatorily for private purposes only.” 
    Lloyd, 407 U.S. at 568
    . It is difficult to argue that
    most websites readily meet this description. As the Supreme Court has recognized, the Internet
    “provides relatively unlimited, low-cost capacity for communication of all kinds.” 
    Reno, 521 U.S. at 870
    . Much of this communication takes place on websites that, in the physical world, would be
    seen solely as private, commercial spaces. Take Amazon.com. As a “popular retail website,”
    Amazon undoubtedly has a private use “as a seller of products.” 
    Packingham, 137 S. Ct. at 1741
    (Alito, J., concurring in the judgment). Yet the site also “facilitates the social introduction of
    people for the purpose of information exchanges,” since it “allows a user to create a personal
    profile” and, “[w]hen someone purchases a product on Amazon, the purchaser can review the
    product and upload photographs, and other buyers can then respond to the review.”                        
    Id. Conversely, Facebook—to
    which the Court pointed in Packingham as a quintessential site for
    protected First Amendment activity—allows users to buy and sell products in its Marketplace, and,
    like many social media sites, sells ads to make revenue. 2 Simply put: the public Internet is too
    heavily suffused with First Amendment activity, and what might otherwise be deemed private
    spaces are too blurred with expressive spaces, to sustain a direct parallel to the physical world.
    At the same time, however, it would be ill-advised to “equate the entirety of the [I]nternet
    with public streets and parks.” 
    Id. at 1738
    (emphasis added). To do so would “gloss[] over the
    dual public and private nature of digital arenas,” and subject to heightened scrutiny regulations on
    even the Internet’s most secluded nooks and crannies. Note, First Amendment-Freedom of
    Speech-Public Forum Doctrine-Packingham v. North Carolina, 131 Harv. L. Rev. 233, 238 (2017).
    Rifling through a business’s confidential files is no less a trespass merely because those files are
    located in the cloud. A hacker cannot legally break into a Gmail account and copy the account-
    2
    See Facebook, Facebook Ads, https://www.facebook.com/business/products/ads; Facebook, Marketplace,
    https://www.facebook.com/marketplace/learn-more.
    10
    holder’s emails, just as a busybody cannot legally reach into someone else’s mailbox and open her
    mail. The First Amendment does not give someone the right to breach a paywall on a news website
    any more than it gives someone the right to steal a newspaper.
    What separates these examples from the social media sites in Packingham is that the
    owners of the information at issue have taken real steps to limit who can access it. But simply
    placing contractual conditions on accounts that anyone can create, as social media and many other
    sites do, does not remove a website from the First Amendment protections of the public Internet.
    If it did, then Packingham—which examined a law that limited access to websites that require user
    accounts for full functionality—would have come out the other 
    way. 137 S. Ct. at 1737
    ; see also
    Orin S. Kerr, Cybercrime’s Scope: Interpreting “Access” and “Authorization” in Computer Misuse
    Statutes, 78 N.Y.U. L. Rev. 1596, 1658 (2003) (“Applying a contract-based theory of authorization
    in a criminal context . . . may be constitutionally overbroad, criminalizing a great deal beyond core
    criminal conduct, including acts protected by the First Amendment.”). Rather, only code-based
    restrictions, which “carve[] out a virtual private space within the website or service that requires
    proper authentication to gain access,” remove those protected portions of a site from the public
    forum. Orin S. Kerr, Essay, Norms of Computer Trespass, 116 Colum. L. Rev. 1143, 1171 (2016).
    Stealing another’s credentials, or breaching a site’s security to evade a code-based restriction,
    therefore remains unprotected by the First Amendment.
    To return to the National Mall example, suppose that a food truck remains stationed on the
    Mall but boards up for the night, and the owner returns home. By shutting the food in a truck,
    perhaps along with her cooking instructions, the owner has placed a barrier between that property
    and the public forum outside. Thus, while the police could not arrest a customer for telling others
    in line that the food tastes terrible, or for reading the menu on the truck’s exterior, they could arrest
    11
    that customer for breaking into the boarded-up truck seeking confidential culinary information.
    This is true even if the customer claimed she was doing so in order to broadcast to the world the
    truck’s substandard ingredients and ill-conceived recipes. While the First Amendment has free
    rein on the Mall generally, it does not protect those who circumvent barriers that demarcate private
    areas, even if those private areas are surrounded by an otherwise public forum. This distinction
    guides the Court’s analysis here.
    B. STANDING
    Before reaching the merits of plaintiffs’ claims, the Court must assure itself that they have
    standing—a sufficient stake to transform this dispute into one of the “Cases” or “Controversies”
    on which federal courts may pass judgment.            U.S. Const. art. III, § 2.   “The ‘irreducible
    constitutional minimum of standing contains three elements’: (1) injury-in-fact, (2) causation, and
    (3) redressability.” Rainbow/PUSH Coal. v. FCC, 
    330 F.3d 539
    , 542 (D.C. Cir. 2003) (quoting
    Lujan v. Defs. of Wildlife, 
    504 U.S. 555
    , 560 (1992)). Plaintiffs must plead or prove each element
    of standing “with the manner and degree of evidence required at the successive stages of the
    litigation.” 
    Lujan, 504 U.S. at 561
    . Here, therefore, “general factual allegations of injury resulting
    from the defendant’s conduct may suffice” to allege standing, “for on a motion to dismiss we
    ‘presum[e] that general allegations embrace those specific facts that are necessary to support the
    claim.’” 
    Id. (alteration in
    original) (citation omitted). For any given claim or form of relief, “the
    presence of one party with standing is sufficient” to reach the issue. Rumsfeld v. Forum for Acad.
    & Institutional Rights, Inc., 
    547 U.S. 47
    , 53 n.2 (2006).
    Because this is a pre-enforcement challenge, plaintiffs must meet more specific conditions
    to satisfy the injury-in-fact requirement. They must plausibly allege “an intention to engage in a
    course of conduct [1] arguably affected with a constitutional interest, but [2] proscribed by a
    12
    statute, and [3] [that] there exists a credible threat of prosecution thereunder.” Susan B. Anthony
    List v. Driehaus, 
    134 S. Ct. 2334
    , 2342 (2014) (quoting Babbitt v. United Farm Workers Nat’l
    Union, 
    442 U.S. 289
    , 298 (1979)). The government argues that plaintiffs cannot meet this test.
    See Def.’s Mem. at 8–19. Plaintiffs contend that they do intend to engage in constitutionally
    protected speech, and that they have pled a credible threat of prosecution. See Pls.’ Mem. of P. &
    A. in Opp’n to Def.’s Mot. to Dismiss (“Pls.’ Mem.”) [ECF No. 13] at 18–30. It is clear that any
    injury to plaintiffs is caused by the government’s criminalization of websites’ ToS, and that the
    declaratory and injunctive relief plaintiffs seek, see Compl. at 46–47, would redress the injury.
    Therefore, the question is whether plaintiffs allege a sufficient injury in the first place.
    Generally speaking, a court’s standing analysis must be “especially rigorous when reaching
    the merits of the dispute would force us to decide whether an action taken by one of the other two
    branches of the Federal Government was unconstitutional.” Raines v. Byrd, 
    521 U.S. 811
    , 819–
    20 (1997). However, the D.C. Circuit has interpreted the Supreme Court’s pre-enforcement
    standing doctrine broadly in the First Amendment sphere. Indeed, “the courts have shown special
    solicitude to pre-enforcement challenges brought under the First Amendment.” N.Y. Republican
    State Comm. v. SEC, 
    799 F.3d 1126
    , 1135 (D.C. Cir. 2015). Therefore, the Circuit has found,
    “the courts’ willingness to permit pre-enforcement review is ‘at its peak’ when claims are rooted
    in the First Amendment.” 
    Id. at 1135
    (citation omitted). “Pre-enforcement review, particularly in
    the First Amendment context, does not require plaintiffs to allege that they ‘will in fact’ violate
    the regulation in order to demonstrate an injury.” U.S. Telecom Ass’n v. FCC, 
    825 F.3d 674
    , 739
    (D.C. Cir. 2016) (quoting 
    Driehaus, 134 S. Ct. at 2345
    ), reh’g en banc denied, 
    855 F.3d 381
    (D.C.
    Cir.), cert. docketed, No. 17-504 (U.S. Oct. 3, 2017). Nor need they show that they are likely to
    be prosecuted. Rather, “[s]tanding ‘to challenge laws burdening expressive rights requires only a
    13
    credible statement by the plaintiff of intent to commit violative acts and a conventional background
    expectation that the government will enforce the law.’” 
    Id. (quoting Act
    Now to Stop War & End
    Racism Coal. v. District of Columbia (ANSWER I), 
    589 F.3d 433
    , 435 (D.C. Cir. 2009)).
    1. “Arguably Affected With a Constitutional Interest”
    Plaintiffs assert that their conduct falls within three categories of First Amendment-
    protected activity. Scraping data from their target websites, they allege, is subject to the First
    Amendment right to record or preserve information. Pls.’ Mem. at 10–14. Moreover, employing
    bots and sock puppets and creating false user accounts constitute harmless false speech. 
    Id. at 14–
    17. And their planned post-research activities are protected by the right to publish. 
    Id. at 17–18.
    All of these claims are sufficiently plausible to conclude that plaintiffs’ proposed conduct is
    “arguably affected with a constitutional interest.” 
    Driehaus, 134 S. Ct. at 2342
    .
    First, scraping plausibly falls within the ambit of the First Amendment. “[T]he First
    Amendment goes beyond protection of the press and the self-expression of individuals to prohibit
    government from limiting the stock of information from which members of the public may draw.”
    First Nat. Bank of Boston v. Bellotti, 
    435 U.S. 765
    , 783 (1978). The Supreme Court has made a
    number of recent statements that give full First Amendment application to the gathering and
    creation of information. 3 Additionally, six courts of appeals have found that individuals have a
    First Amendment right to record at least some matters of public interest, in order to preserve and
    3
    See 
    Packingham, 137 S. Ct. at 1737
    (holding that banning people from “gain[ing] access to information,”
    “knowing current events,” and “checking ads for employment” through social media inhibits “the legitimate exercise
    of First Amendment rights”); Sorrell v. IMS Health Inc., 
    564 U.S. 552
    , 570 (2011) (“This Court has held that the
    creation and dissemination of information are speech within the meaning of the First Amendment. Facts, after all, are
    the beginning point for much of the speech that is most essential to advance human knowledge and to conduct human
    affairs.” (citations omitted)); Brown v. Entm’t Merchants Ass’n, 
    564 U.S. 786
    , 792 n.1 (2011) (“Whether government
    regulation applies to creating, distributing, or consuming speech makes no difference.”); Citizens United v. FEC, 
    558 U.S. 310
    , 340 (2010) (“Laws enacted to control or suppress speech may operate at different points in the speech
    process . . . .”).
    14
    disseminate ideas. 4 That plaintiffs wish to scrape data from websites rather than manually record
    information does not change the analysis. Scraping is merely a technological advance that makes
    information collection easier; it is not meaningfully different from using a tape recorder instead of
    taking written notes, or using the panorama function on a smartphone instead of taking a series of
    photos from different positions. And, as already discussed, the information plaintiffs seek is
    located in a public forum. Hence, plaintiffs’ attempts to record the contents of public websites for
    research purposes are arguably affected with a First Amendment interest.
    Second, plaintiffs have a First Amendment interest in harmlessly misrepresenting their
    identities to target websites. The complaint alleges that plaintiffs’ research requires them to create
    false employer and job-seeker profiles on employment websites, and to use sock puppets to make
    it appear to a number of housing and employment sites that multiple people are accessing the
    information they have made available. Compl. ¶¶ 88–93, 114–21. Because “some false statements
    are inevitable if there is to be an open and vigorous expression of views in public and private
    conversation,” and because “[t]he Government has not demonstrated that false statements
    generally should constitute a new category of unprotected speech,” false claims that are not “made
    to effect a fraud or secure moneys or other valuable considerations” fall within First Amendment
    protection. United States v. Alvarez, 
    567 U.S. 709
    , 718, 722–23 (2012). Plaintiffs allege that their
    conduct will cause minimal, if any, harm to the targeted websites, and that they will take steps to
    avoid affecting third-party users of the website (such as informing job seekers that their fake
    4
    See Gericke v. Begin, 
    753 F.3d 1
    , 7 (1st Cir. 2014); Fields v. City of Philadelphia, 
    862 F.3d 353
    , 359 (3d
    Cir. 2017); Turner v. Lieutenant Driver, 
    848 F.3d 678
    , 688–89 (5th Cir. 2017); ACLU of Ill. v. Alvarez, 
    679 F.3d 583
    ,
    595 (7th Cir. 2012); Animal Legal Def. Fund v. Wasden, 
    878 F.3d 1184
    , 1203 (9th Cir. 2018); W. Watersheds Project
    v. Michael, 
    869 F.3d 1189
    , 1195–97 (10th Cir. 2017); Smith v. City of Cumming, 
    212 F.3d 1332
    , 1333 (11th Cir.
    2000); see also Rideout v. Gardner, 
    838 F.3d 65
    , 75 (1st Cir. 2016), cert. denied, 
    137 S. Ct. 1435
    (2017) (stating that
    “[t]here are strong First Amendment interests” in photographically recording one’s own completed ballot, because the
    “‘use of illustrations or pictures . . . serves important communicative functions’” (citation omitted)).
    15
    positions are fake). Compl. ¶¶ 96, 120, 125. Thus, plaintiffs’ harmless false or misleading speech
    to website owners is arguably affected with a constitutional interest. 5
    Third, plaintiffs contend that they have the right, and the desire, to publish the results of
    their research, and that some sites’ ToS prohibit them from doing so without prior permission or
    else employ anti-disparagement clauses. Pls.’ Mem. at 17. The Supreme Court has made very
    clear that the right to publish falls within the core of the First Amendment’s protections. See, e.g.,
    Bartnicki v. Vopper, 
    532 U.S. 514
    , 527 (2001) (“As a general matter, ‘state action to punish the
    publication of truthful information seldom can satisfy constitutional standards.’” (quoting Smith
    v. Daily Mail Publishing Co., 
    443 U.S. 97
    , 102 (1979)). Applying criminal sanctions for
    publishing original material that uses publicly available information, or for making negative
    statements about a website, triggers First Amendment scrutiny.
    The government raises two overarching objections to all of these alleged rights. It initially
    claims that the First Amendment does not regulate the decisions that private entities make about
    how to control access to their private websites—in other words, that there is no state action here.
    See Def.’s Mem. at 21–24; Def.’s Reply at 6–12; see also Columbia Broad. Sys., Inc. v.
    Democratic Nat. Comm., 
    412 U.S. 94
    , 114 (1973) (“[The First Amendment] is a restraint on
    government action, not that of private persons.”). However, private speech prohibitions can still
    implicate the First Amendment when given the imprimatur of state protection through civil or
    criminal law. See, e.g., New York Times Co. v. Sullivan, 
    376 U.S. 254
    , 265 (1964). Moreover,
    plaintiffs claim injury from a potential criminal action against them—and “a criminal prosecution
    under the CFAA would undoubtedly constitute state action” because the government itself is
    5
    The government counters that Alvarez and the cases that follow it do not “address facially neutral statutes
    of general applicability, such as the CFAA.” Def.’s Reply at 10. However, that goes to the standard of review on the
    merits rather than to whether plaintiffs’ activities are imbued with any First Amendment interest at all.
    16
    policing website ToS violations. hiQ Labs, Inc. v. LinkedIn Corp., 
    273 F. Supp. 3d 1099
    , 1114
    n.12 (N.D. Cal. Aug. 14, 2017), appeal docketed, No. 17-16783 (9th Cir. Sept. 6, 2017).
    The government also claims that the First Amendment does not protect plaintiffs’ conduct
    because, under Zemel v. Rusk, 
    381 U.S. 1
    , 16–17 (1965), and Houchins v. KQED, Inc., 
    438 U.S. 1
    , 10–11 (1978) (plurality opinion), the First Amendment does not create a right to acquire
    information in whatever manner one desires. Def.’s Mem. at 10–12. In Zemel, the Court held that
    the government did not implicate any First Amendment rights by refusing to issue the plaintiff a
    passport to visit Cuba, which the plaintiff claimed interfered with his ability to acquaint himself
    with the effects of the government’s policies in relation to 
    Cuba. 381 U.S. at 16
    . The Court
    rejected the claim, stating that “[t]he right to speak and publish does not carry with it the
    unrestrained right to gather information.” 
    Id. at 17.
    Then, in Houchins, the Court held that
    journalists had no special First Amendment right to access inmates in a jail just because they sought
    to write stories about the jail; the Court rejected the “notion that the First Amendment confers a
    right of access to news 
    sources.” 438 U.S. at 11
    . However, the Court did note that “[t]he right to
    receive ideas and information is not the issue in this case,” and that “[t]he issue is a claimed special
    privilege of access.” 
    Id. at 12.
    Thus, “[t]here is an undoubted right to gather news ‘from any
    source by means within the law,’” but the First Amendment does not “compel[] others—private
    persons or governments—to supply information.” 
    Id. at 11.
    Here, plaintiffs are not asking the Court to force private websites to provide them with
    information that others cannot get. Instead, they seek only to prevent the government from
    prosecuting them for obtaining or using information that the general public can access—though
    they wish to do so in a manner that could have private consequences, such as a website banning
    them or deleting their accounts. See Compl. ¶ 4 (“[Plaintiffs] have no intent . . . to access any data
    17
    or information that is not made available to the public.”). Because plaintiffs neither want a special
    privilege of access nor seek to force websites to give them otherwise unobtainable information,
    the Zemel and Houchins line of cases is inapposite here. Plaintiffs therefore plausibly allege that
    their conduct is arguably affected with a constitutional interest.
    2. “Proscribed by a Statute”
    Under D.C. Circuit precedent, “at the motion to dismiss stage, a plaintiff’s non-frivolous
    contention regarding the meaning of a statute must be taken as correct for purposes of standing.”
    Info. Handling Servs., Inc. v. Def. Automated Printing Servs., 
    338 F.3d 1024
    , 1030 (D.C. Cir.
    2003). Because plaintiffs’ reading of the statute to encompass all ToS violations is not frivolous,
    and because plaintiffs allege that their conduct would violate websites’ ToS, it is clear for standing
    purposes that their intended actions would violate the statute.
    The government contests this conclusion in only one instance. In two sentences in its reply
    brief, the government claims that plaintiffs lack standing for any injuries relating to their ability to
    publish. As the government sees it, “[t]he Complaint contains no allegation that any website on
    which plaintiffs intend to conduct their activity contains” a restriction on future publication, “and
    plaintiffs lack standing to assert claims based on hypothetical circumstances.” Def.’s Reply at 12.
    This argument is unavailing. True, plaintiffs do not explicitly allege that their target
    websites restrict subsequent publication. But the complaint does allege that “[p]laintiffs wish to
    . . . report on their findings to the public,” and that “[t]he research, testing, and investigative
    methods they have designed would, if carried out, violate the [Access] Provision, because they all
    require violating the [ToS] of the targeted website.” Compl. ¶¶ 134–35 (emphasis added); see also
    
    id. ¶ 160
    (“Plaintiffs wish to have the option of publishing the results of their research, including
    any findings of discrimination, even if a target website’s ToS prohibit doing so.”). “[O]n a motion
    18
    to dismiss we presum[e] that general allegations embrace those specific facts that are necessary to
    support the claim.” Food & Water Watch, Inc. v. Vilsack, 
    808 F.3d 905
    , 913 (D.C. Cir. 2015)
    (second alteration in original) (citation omitted). Plaintiffs’ allegations allow for the presumption
    that reporting on their research findings would violate some targeted websites’ ToS. While far
    from the degree of proof necessary for summary judgment, see 
    Lujan, 504 U.S. at 561
    , at this early
    stage plaintiffs have plausibly alleged that the CFAA prevents all of their conduct.
    3. “Credible Threat of Prosecution”
    Even if plaintiffs’ intended conduct is arguably affected with a constitutional interest, and
    is prohibited by the CFAA, plaintiffs still must show that there is a credible threat of prosecution
    for that conduct under the statute. See 
    Driehaus, 134 S. Ct. at 2342
    . The government asserts that
    plaintiffs cannot meet this test, because “plaintiffs make no allegation that the government has
    threatened them with CFAA enforcement,” plaintiffs “cite no instances in which the government
    has enforced the challenged provision for harmless [ToS] violations,” and DOJ “has expressly
    stated that it has no intention of prosecuting harmless [ToS] violations that are not in furtherance
    of other criminal activity or tortious conduct.” Def.’s Reply at 13. The government is, for the
    most part, correct on the facts. The complaint does not allege that plaintiffs have actually been
    threatened with prosecution. The two cases plaintiffs cite to show that prosecutors have used the
    Access Provision to punish ToS violations did, in fact, involve harmful conduct. And DOJ’s
    guidance to federal prosecutors does discourage them—though somewhat tepidly—from bringing
    CFAA cases based solely on harmless ToS violations. See U.S. Att’y Gen., Intake and Charging
    Policy for Computer Crimes Matters (“Charging Policy”) (Sept. 11, 2014) [ECF No. 15–1] at 5.
    However, both Supreme Court and D.C. Circuit precedent create a low standing bar in
    cases like this one. Because plaintiffs “challenge [a] law[] burdening expressive rights,” and
    19
    because their complaint provides “a credible statement . . . of intent to commit violative acts,”
    plaintiffs may rely on the “conventional background expectation that the government will enforce
    the law.” U.S. Telecom 
    Ass’n, 825 F.3d at 739
    (citation omitted); accord Act Now to Stop War
    & End Racism Coal. v. District of Columbia (ANSWER II), 
    846 F.3d 391
    , 401–02 (D.C. Cir.
    2017), cert. denied, 
    138 S. Ct. 334
    (2017) (mem.). Indeed, the D.C. Circuit has occasionally found
    standing without inquiring into whether the government has actually enforced the challenged
    restriction. See U.S. Telecom 
    Ass’n, 825 F.3d at 739
    –40.
    Here, there are sufficient indications of a credible threat to enforce the Access Provision,
    both in general and as applied to plaintiffs’ activities. To begin with, the parties have sparred over
    whether DOJ has enforced the Access Provision specifically against harmless ToS violations. See
    Compl. ¶ 31; Def.’s Mem. at 14–17; Pls.’ Mem. at 3–4, 25. Yet a number of cases have looked to
    whether the statutory provision as a whole—or at least the particular term being challenged—has
    been enforced through prosecutions, without asking whether the facts were similar to those the
    plaintiffs alleged. See, e.g., Holder v. Humanitarian Law Project, 
    561 U.S. 1
    , 16 (2010); 
    Babbitt, 442 U.S. at 302
    ; N. Carolina Right to Life, Inc. v. Bartlett, 
    168 F.3d 705
    , 710 (4th Cir. 1999). If
    one need only find a history of enforcement of the Access Provision generally, or enforcement of
    the “exceeds authorized access” language in particular, plaintiffs would have no trouble showing
    that there is a significant history. Indeed, the Supreme Court decided a case just two years ago
    that involved a prosecution under the Access Provision, in part for exceeding authorized access.
    Musacchio v. United States, 
    136 S. Ct. 709
    , 713 & n.1 (2016). 6
    6
    For some other recent examples, see United States v. Batti, 
    631 F.3d 371
    , 372 (6th Cir. 2011); United States
    v. Willis, 
    476 F.3d 1121
    , 1124 (10th Cir. 2007); United States v. Cave, No. 8:12CR417, 
    2013 WL 3766550
    , at *1 (D.
    Neb. July 16, 2013); United States v. Roque, No. CRIM. 12-540 KM, 
    2013 WL 2474686
    , at *1 (D.N.J. June 6, 2013);
    United States v. Auernheimer, No. 11-CR-470 SDW, 
    2012 WL 5389142
    , at *1 (D.N.J. Oct. 26, 2012), rev’d, 
    748 F.3d 525
    (3d Cir. 2014); United States v. Aleynikov, 
    737 F. Supp. 2d 173
    , 190 (S.D.N.Y. 2010).
    20
    Even looking more closely at similar factual scenarios, plaintiffs have shown that
    prosecutions have stemmed from close enough facts that it would be credible to fear a future
    prosecution for their own activities. Plaintiffs cite two cases in which individuals were prosecuted
    under the Access Provision for violating ToS agreements: United States v. Lowson, No. 10-cr-114
    (KSH), 
    2010 WL 9552416
    (D.N.J. Oct. 12, 2010), and United States v. Drew, 
    259 F.R.D. 449
    (C.D. Cal. 2009). Compl. ¶ 31. Lowson, as the government points out, did not solely involve
    violations of website ToS; it also involved ticket scalpers’ attempts “to defeat code-based security
    restrictions” on Ticketmaster’s website. 
    2010 WL 9552416
    , at *5. However, the indictment
    alleged “both contract- and code-based violations,” 
    id. at *6,
    and laid out the websites’ prohibitions
    that the defendants allegedly violated, see Superseding Indictment at 5–9, Lowson, 
    2010 WL 9552416
    (No. 10-cr-114), ECF No. 10-2. More directly on point is Drew, in which the government
    prosecuted a woman for lying about her age and creating a false account on Myspace in order to
    cyberbully her daughter’s teenage classmate—thus violating Myspace’s ToS in order to commit
    the tort of intentional infliction of emotional 
    distress. 259 F.R.D. at 452
    . Prosecutors included
    both a felony count under the Access Provision—because the violation was in furtherance of a
    tortious act—and a misdemeanor count for the standalone ToS violations. 
    Id. at 451.
    The jury
    acquitted Drew on the felony count, id.; the court then dismissed the misdemeanor conviction, as
    coverage of ToS violations rendered the Access Provision unconstitutionally vague, 
    id. at 467.
    That the government brought the Drew case without enough evidence to ultimately prove
    the added harm required for a felony conviction, and chose to include a misdemeanor count for
    harmless ToS violations, lends some credibility to plaintiffs’ fears of prosecution. The government
    also does not know whether prosecutors may have employed the Access Provision to obtain plea
    agreements in which defendants admitted to harmless ToS violations. See Tr. of Mot. Hr’g [ECF
    21
    No. 20] at 17:15–18:13. 7 These prior prosecutions, whether under the Access Provision generally
    or under related factual circumstances, provide “somewhat more than the ‘conventional
    background expectation that the government will enforce the law.’” ANSWER 
    I, 589 F.3d at 435
    (citation omitted). Thus, even if more were necessary, plaintiffs have provided it.
    Finally, the government has not expressly disavowed any intent to prosecute plaintiffs,
    which would defeat the normal expectation of enforcement. The government points to a 2014
    memorandum that the Attorney General sent to United States Attorneys regarding charging policy
    under the CFAA, which the government claims is the current “binding guidance” on this issue.
    Def.’s Reply at 14. According to the government, plaintiffs’ fear of prosecution is “implausible”
    because (1) the charging policy focuses on several factors that would not apply to harmless ToS
    violations, (2) prosecutions based solely on such violations are discouraged, and (3) attorneys must
    consult with the Criminal Division of DOJ before making CFAA charging decisions.                                    
    Id. However, to
    disprove an otherwise credible threat of prosecution, courts have normally required
    an explicit statement “that plaintiffs will not be prosecuted if they do what they say they wish to
    do.” Humanitarian Law 
    Project, 561 U.S. at 16
    . The government has not made such a declaration.
    DOJ’s charging policy states that, “if the defendant exceeded authorized access solely by violating
    an access restriction contained in a contractual agreement or [ToS] with an Internet service
    provider or website, federal prosecution may not be warranted.” Charging Policy at 5 (emphasis
    added). This is a far cry from the sort of disavowal required by case law. 8
    7
    It also matters that the CFAA is a civil as well as a criminal statute. The possibility of administrative or
    private civil actions, even without a threat of criminal prosecution, may buttress—or perhaps independently provide—
    standing for pre-enforcement challenges. See, e.g., 
    Babbitt, 442 U.S. at 302
    n.13; Chamber of Commerce v. FEC, 
    69 F.3d 600
    , 603 (D.C. Cir. 1995).
    8
    The government also offers the statement of the Deputy Assistant Attorney General for the Criminal
    Division before a congressional subcommittee in 2015, in which the DAAG stated that DOJ “has no interest in
    prosecuting harmless violations of use restrictions” and suggested amending the CFAA so that it would essentially
    only apply to the acts that currently give rise to a felony under the Access Provision. Statement of David M. Bitkower,
    Deputy Ass’t Att’y Gen., Crim. Div., Dep’t of Justice, Before the Subcomm. On Crime and Terrorism, S. Comm. on
    22
    In an attempt to provide such a disavowal, and at the Court’s suggestion, the government
    filed an affidavit from John T. Lynch, Jr., Chief of the Computer Crime and Intellectual Property
    Section of the Criminal Division of DOJ. Aff. of John T. Lynch, Jr. [ECF No. 21-1]. He points
    to the charging factors mentioned above, 
    id. at 2–3,
    and states that he “do[es] not expect that the
    Department would bring a CFAA prosecution based on such facts and de minimis harm,” 
    id. at 3.
    But many things that we do not expect in fact come to pass. An official’s prognostication does not
    substitute for a declaration of non-prosecution. Moreover, even explicit disavowals are most
    valuable when they are made “on the basis of the Government’s own interpretation of the statute
    and its rejection of plaintiffs’ interpretation as unreasonable.” Blum v. Holder, 
    744 F.3d 790
    , 798
    (1st Cir. 2014). Here, the government has implicitly—and in past prosecutions, explicitly—read
    the Access Provision to include ToS violations. See Charging Policy at 4–5. “[T]o rely upon
    prosecutorial discretion to narrow the otherwise wide-ranging scope of a criminal statute’s highly
    abstract general statutory language places great power in the hands of the prosecutor.” Marinello
    v. United States, No. 16-1144, 
    2018 WL 1402426
    , at *6 (U.S. Mar. 21, 2018). The Constitution
    “does not leave us at the mercy of noblesse oblige,” United States v. Stevens, 
    559 U.S. 460
    , 480
    (2010), which is all the government ultimately offers.
    One final point.       Until now, this standing analysis has focused on plaintiffs’ First
    Amendment challenge. But plaintiffs also bring due process claims. In Seegars v. Gonzales, 
    396 F.3d 1248
    (D.C. Cir. 2005), the D.C. Circuit applied a more rigorous “imminence” standard for
    non-First-Amendment constitutional claims. But the court took pains to point out that it was forced
    to follow circuit precedent that conflicted with the Supreme Court’s and the D.C. Circuit’s own
    the Judiciary (July 8, 2015) [ECF No. 10-3] at 6. However, this is no stronger a disavowal than is DOJ’s statement in
    its charging policy. Moreover, Congress never adopted DOJ’s proposed amendments.
    23
    laxer standing test for First Amendment pre-enforcement challenges.           See 
    id. at 1252–54.
    Subsequent cases have confirmed that the “more demanding standard” required by Seegars does
    not apply when challenging “laws burdening expressive rights.” ANSWER 
    I, 589 F.3d at 435
    .
    Here, plaintiffs’ Fifth Amendment claims allege an injury-in-fact essentially identical to that
    alleged for their First Amendment claims. Pls.’ Mem. at 23 n.2. Both the Supreme Court and the
    D.C. Circuit have upheld standing for dual First- and Fifth-Amendment pre-enforcement
    challenges, under a less rigorous imminence standard, without distinguishing between the two
    amendments for standing purposes. See Humanitarian Law 
    Project, 561 U.S. at 11
    –12, 15–16;
    ANSWER 
    II, 846 F.3d at 396
    , 401–02; ANSWER 
    I, 589 F.3d at 434
    –35. Plaintiffs therefore have
    standing to bring their Fifth Amendment claims along with their First Amendment ones.
    For the foregoing reasons, plaintiffs have plausibly pled standing at the motion to dismiss
    stage, and the government’s Rule 12(b)(1) motion will be denied.
    C. INTERPRETING THE STATUTE
    Plaintiffs allege only constitutional claims in this case. Likely because they are bringing a
    pre-enforcement challenge, they are not claiming that the statute, properly read, does not apply to
    them. However, nearly all of their claims require the Court to determine the reach of the Access
    Provision before deciding the constitutional question. Since the Court does not accept plaintiffs’
    legal conclusions as true for purposes of a motion to dismiss under Rule 12(b)(6), see Doe v.
    Rumsfeld, 
    683 F.3d 390
    , 391 (D.C. Cir. 2012), plaintiffs’ reading of the statute to cover their
    conduct does not control. Instead, the Court must interpret the law.
    Courts are split as to how to read the relevant provisions. The CFAA defines the phrase
    “exceeds authorized access” as “to access a computer with authorization and to use such access to
    obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.”
    24
    18 U.S.C. § 1030(e)(6). The Second, Fourth, and Ninth Circuits have held that this language
    prohibits only unauthorized access to information. See United States v. Valle, 
    807 F.3d 508
    , 523–
    28 (2d Cir. 2015); WEC Carolina Ener. Solutions LLC v. Miller, 
    687 F.3d 199
    , 206 (4th Cir.
    2012); 
    Nosal, 676 F.3d at 863
    ; see also Pulte Homes, Inc. v. Laborers’ Int’l Union of N. Am., 
    648 F.3d 295
    , 304 (6th Cir. 2011) (stating, based on Ninth Circuit precedent, that “an individual who
    is authorized to use a computer for certain purposes but goes beyond those limitations . . . has
    ‘exceed[ed] authorized access’” (citation omitted) (alteration in original)). Meanwhile, the First,
    Fifth, and Eleventh Circuits have held that it also covers (at least in some instances) unauthorized
    use of information that a defendant was authorized to access only for specific purposes. See EF
    Cultural Travel BV v. Explorica, Inc., 
    274 F.3d 577
    , 583 (1st Cir. 2001); United States v. John,
    
    597 F.3d 263
    , 271 (5th Cir. 2010); United States v. Rodriguez, 
    628 F.3d 1258
    , 1263 (11th Cir.
    2010); see also Int’l Airport Centers, LLC v. Citrin, 
    440 F.3d 418
    , 420–21 (7th Cir. 2006) (holding
    that an employee who deleted his employer’s files in violation of his employment contract had
    terminated the agency relationship that authorized him to access the information). Courts have
    also split over whether violating a website’s ToS exceeds authorized access for purposes of the
    CFAA. 9 The D.C. Circuit has never opined on either question. Several district judges in this
    9
    Compare Facebook, Inc. v. Power Ventures, Inc., 
    844 F.3d 1058
    , 1067 (9th Cir. 2016) (“[A] violation of
    the terms of use of a website—without more—cannot establish liability under the CFAA.”), cert. denied 
    138 S. Ct. 313
    (2017) (mem.); 
    Valle, 807 F.3d at 528
    (rejecting unauthorized use reading of “exceeds authorized access” because
    “the government’s interpretation of ‘exceeds authorized access’ makes every violation of a private computer use policy
    a federal crime”); WEC 
    Carolina, 687 F.3d at 206
    (noting that the unauthorized use reading “would impute liability
    to an employee who with commendable intentions disregards his employer’s policy against downloading information
    to a personal computer so that he can work at home”), with EarthCam, Inc. v. OxBlue Corp., 703 Fed. App’x 803,
    808 & n.2 (11th Cir. 2017) (stating that “one of the lessons from [circuit precedent] may be that a person exceeds
    authorized access if he or she uses the access in a way that contravenes any policy or term of use governing the
    computer in question,” and noting the dissenting views of other circuits); CollegeSource, Inc. v. AcademyOne, Inc.,
    597 Fed. App’x 116, 130 (3d Cir. 2015) (suggesting that defendants can be prosecuted under the CFAA if they
    “breach[ed] any technological barrier or contractual term of use”); EF Cultural Travel BV v. Zefer Corp., 
    318 F.3d 58
    , 62 (1st Cir. 2003) (“A lack of authorization could be established by an explicit statement on the website restricting
    access. . . . Many webpages contain lengthy limiting conditions, including limitations on the use of scrapers.”).
    25
    Circuit, however, have held that the provision only applies to unauthorized access to information,
    not to unauthorized use of properly accessed material. See Hedgeye Risk Mgmt., LLC v. Heldman,
    
    271 F. Supp. 3d 181
    , 194–95 (D.D.C. 2017) (collecting cases).
    At one point in their briefing, plaintiffs suggest a different dividing line: a limiting
    construction that carves out harmless ToS violations from the statute. Pls.’ Mem. at 31–33, 35.
    However, “[t]he text will not bear such a reading.” INS v. Yueh-Shaio Yang, 
    519 U.S. 26
    , 30
    (1996).     It is one thing to carve out such violations by determining that the statute is
    unconstitutional as applied, but the text of the statute itself—“exceeds authorized access”—and its
    statutory definition do not appear to allow for such a surgical slicing off of conduct. How does
    the text differentiate between ToS violations and violations of employers’ computer use policies,
    for instance? And how does the text distinguish between “[ToS] violations alone,” Pls.’ Mem. at
    35, and ToS violations that cause damage or involve fraud, which plaintiffs admit are covered by
    §§ 1030(a)(4) and (a)(5), 
    id. at 31–32?
    One can just as easily “use [authorized] access to obtain
    or alter information in the computer that the accesser is not entitled so to obtain or alter,”
    § 1030(e)(6), whether it is a website or some other entity that is doing the authorizing, and whether
    the violation is harmful or harmless.
    The question thus remains whether “exceeds authorized access” refers to access alone or
    to access, use, and other violations. The Court finds the narrow interpretation adopted by the
    Second, Fourth, and Ninth Circuits—and by numerous other district judges in this Circuit—to be
    the best reading of the statute. First, the text itself more naturally reads as limited to violations of
    the spatial scope of one’s permitted access. To “exceed[] authorized access,” one must have
    permission to access the computer at issue, and must “use such access”—i.e., one’s authorized
    presence on the computer—“to obtain or alter information in the computer.” 
    Id. Thus, unlike
    the
    26
    phrase “unauthorized access” used alongside it in several CFAA provisions, the phrase “exceeds
    authorized access” refers not to an outside attack but rather to an inside job. See, e.g., 
    Nosal, 676 F.3d at 858
    . The rest of the definition requires that the information at issue be information “that
    the accesser is not entitled so to obtain or alter.” 
    Id. The key
    word here is “entitled.” “And, in
    context, the most ‘sensible reading of “entitled” is as a synonym for “authorized.”’” 
    Hedgeye, 271 F. Supp. 3d at 194
    (quoting 
    Nosal, 676 F.3d at 857
    ). The focus is thus on whether someone is
    allowed to access a computer at all, in the case of “unauthorized access,” or on whether someone
    is authorized to obtain or alter particular information, in the case of “exceeds authorized access.”
    In neither instance does the statute focus on how the accesser plans to use the information. 10
    The statutory context buttresses this narrower reading of the text. Reading “exceeds
    authorized access” to turn on the accesser’s purpose in seeking out the information would eliminate
    a major difference between the Access Provision—which has no purpose requirement—and other
    provisions that require intent to defraud. E.g., 18 U.S.C. § 1030(a)(4). It would also water down
    the difference between the misdemeanor penalty provisions and the felony provisions that enhance
    sentences for violations committed for fraud or financial gain. 
    Id. § 1030(c)(2);
    see also S. Rep.
    No. 104-357, at 8 (1996) (“[T]he statutory penalties are structured to provide that obtaining
    information of minimal value is only a misdemeanor, but obtaining valuable information, or
    misusing information in other more serious ways, is a felony.” (emphasis added)). After all, just
    about any attempt to use proprietary information to defraud or for personal or commercial gain
    would likely violate a computer use policy or website ToS. See 
    Nosal, 676 F.3d at 858
    n.4.
    10
    Nor does the word “so,” which has inspired a good deal of exegesis in prior opinions, see WEC 
    Carolina, 687 F.3d at 205
    –06; 
    Nosal, 676 F.3d at 857
    –58, meaningfully change this focus. Read in the context of the phrase
    “so to obtain or alter,” “so” most naturally refers back to the earlier phrase “such access,” emphasizing that the accesser
    must not have been entitled to obtain or alter that particular information through the particular authorization used—
    even if, theoretically, there were another way in which the accesser might legally obtain or alter the information.
    27
    Congress knew how to draft a specific intent requirement, and did so in these other sections of the
    CFAA. It would be rather odd, then, for Congress to also smuggle a specific intent factor into its
    definition of the actus reus of the offense. While this context is certainly not dispositive—
    Congress often drafts overlapping or even redundant provisions—it is best to avoid readings that
    “would render superfluous another part of the same statutory scheme.” Marx v. Gen. Revenue
    Corp., 
    568 U.S. 371
    , 386 (2013).
    Legislative history also points to an access-based, rather than an intended-use-based,
    reading of “exceeds authorized access.” The Second Circuit has already canvassed in great detail
    the congressional intent and history behind the definition of “exceeds authorized access,” see
    
    Valle, 807 F.3d at 525
    –26, and this Court will not repeat it here. This Court agrees with the Second
    Circuit, however, that “the legislative history consistently characterizes the evil to be remedied—
    computer crime—as ‘trespass’ into computer systems or data, and correspondingly describes
    ‘authorization’ in terms of the portion of the computer’s data to which one’s access rights extend.”
    
    Id. at 525.
    Congress thus viewed exceeding authorized access as the digital equivalent of being
    allowed into a house but entering a room within it that the owner has declared to be off-limits. A
    sensible conception, particularly considering that the language at issue was written in 1986—
    before the World Wide Web or websites existed. See Kerr, Norms of Computer 
    Trespass, supra, at 1161
    .
    The amendment history of the definition supports this reading. The initial language of the
    CFAA applied to anyone who, knowingly “having accessed a computer with authorization, uses
    the opportunity such access provides for purposes to which such authorization does not extend,
    and thereby obtains information.” Counterfeit Access Device and Computer Fraud and Abuse Act
    of 1984, Pub. L. No. 98-473, tit. II, ch. 21, § 2102(a), 98 Stat. 1837, 2190–91 (emphasis added).
    28
    In 1986, however, in a section entitled “Modification of Authorized Access Aspect of Offenses,”
    Congress replaced this language with the phrase “exceeds authorized access,” and, in a section
    entitled “Conforming Amendments to Definitions Provision,” added the current definition of that
    phrase. See Computer Fraud and Abuse Act of 1986, Pub. L. No. 99-474, § 2(c), (g)(4), 100 Stat.
    1213, 1215. It is not clear that Congress intended this language change to be substantive. See S.
    Rep. No. 99-432, at 9 (1986) (“The Committee intends this change to simplify the language in 18
    U.S.C. 1030(a)(1) and (2), and the phrase ‘exceeds authorized access’ is defined separately in
    Section (2)(g) of the bill.”); 132 Cong. Rec. 28,821 (1986) (statement of Rep. Hughes) (stating, as
    the chairman of the drafting subcommittee just before final passage, that “the basic thrust of this
    bill remains its three new offenses with some minor changes in the existing law”). Yet it is notable
    that Congress did not simply transpose the existing, purpose-oriented language into the definition
    section—which still would have simplified the language of § 1030(a), as desired—but instead
    replaced it with new language that focuses on authorization to access particular information.
    Indeed, if Congress did not think it was making a substantive change, the legislative history
    suggests that this was because Congress thought the initial language also was limited to access,
    since “when Congress referenced the user’s ‘purposes,’ it spoke in terms of the particular computer
    files or data to which the user’s access rights extended.” 
    Valle, 807 F.3d at 526
    .
    Finally, plaintiffs raise numerous First and Fifth Amendment concerns with the Access
    Provision that would arise out of reading “exceeds authorized access” to include the purpose or
    use restrictions that appear in many ToS. When a court is “deciding which of two plausible
    statutory constructions to adopt,” and when “one of them would raise a multitude of constitutional
    problems, the other should prevail.” Clark v. Martinez, 
    543 U.S. 371
    , 380–81 (2005). This maxim
    holds doubly true for criminal statutes. See Marinello, 
    2018 WL 1402426
    , at *4 (“[Courts] have
    29
    traditionally exercised restraint in assessing the reach of a federal criminal statute, both out of
    deference to the prerogatives of Congress and out of concern that ‘a fair warning should be given
    to the world in language that the common world will understand, of what the law intends to do if
    a certain line is passed.’” (citation omitted)). While the CFAA’s text and legislative history point
    strongly toward an access-only interpretation of “exceeds authorized access,” a broader reading is
    not entirely implausible; therefore, constitutional avoidance applies. Cf. Jennings v. Rodriguez,
    
    138 S. Ct. 830
    , 842 (2018). In interpreting the statutory text, the Court need not determine whether
    plaintiffs’ constitutional arguments would actually win the day. Rather, the Court undertakes “a
    narrow inquiry” into whether one reading “presents a significant risk that [constitutional
    provisions] will be infringed.” NLRB v. Catholic Bishop of Chicago, 
    440 U.S. 490
    , 533 (1979).
    Here, significant risks abound. By providing for both civil and criminal enforcement of
    websites’ limitless ToS—including enforcement by the same entities that write the ToS—a broader
    reading of the CFAA “would appear to criminalize a broad range of day-to-day activity” and
    “subject individuals to the risk of arbitrary or discriminatory prosecution and conviction,” raising
    Fifth Amendment concerns. United States v. Kozminski, 
    487 U.S. 931
    , 949 (1988); see 
    Valle, 807 F.3d at 527
    –28; 
    Nosal, 676 F.3d at 862
    . By incorporating ToS that purport to prohibit the purposes
    for which one accesses a website or the uses to which one can put information obtained there, the
    CFAA threatens to burden a great deal of expressive activity, even on publicly accessible
    websites—which brings the First Amendment into play. See 
    Packingham, 137 S. Ct. at 1736
    . If
    “exceeds authorized access” is read broadly, plaintiffs claim, the Access Provision could even run
    afoul of the Fifth Amendment by delegating power to private parties to define restrictions
    “limitless in time and space,” which can then operate as petty civil and criminal codes. Pls.’ Mem.
    at 10; see Ass’n of Am. R.Rs. v. U.S. Dep’t of Transp. (Ass’n of Am. R.Rs. II), 
    821 F.3d 19
    , 31
    30
    (D.C. Cir. 2016) (“[T]he Supreme Court has consistently concluded the delegation of coercive
    power to private parties can raise . . . due process concerns.”); Note, The Vagaries of Vagueness:
    Rethinking the CFAA as a Problem of Private Nondelegation, 127 Harv. L. Rev. 751, 768–71
    (2013) (arguing that a broadly-read CFAA violates the nondelegation doctrine). One need neither
    slay nor succumb to this Hydra-headed set of objections to acknowledge it as formidable.
    All of these factors, therefore, lead the Court to adopt a narrow reading of the term “exceeds
    authorized access.” 11 Just as an individual “accesses a computer ‘without authorization’ when he
    gains admission to a computer without approval,” an individual “‘exceeds authorized access’ when
    he has approval to access a computer, but uses his access to obtain or alter information that falls
    outside the bounds of his approved access.” WEC 
    Carolina, 687 F.3d at 204
    .
    This interpretation gets us far, but not all the way. At oral argument, both parties agreed
    that the Access Provision applies only to access restrictions. See Tr. of Mot. Hr’g at 19:17–20:3,
    34:10–35:22. But they have very different ideas about what that means. The government treats
    this difference as a largely temporal one. It argues that “the moment the violation occurs is on
    access,” so that subsequent usage of information lawfully obtained does not constitute a CFAA
    violation. 
    Id. at 20:12–:18.
    But the government also claims that “it’s appropriate to analyze the
    issue of whether access is authorized according to a broad context of background facts that could
    include limitations on the purpose for which information is accessed,” such as “access restrictions
    that are contained in the [ToS] that the website itself has prepared.” 
    Id. at 19:21–20:2.
    Plaintiffs,
    11
    A number of other courts have applied the rule of lenity to limit the scope of “exceeds authorized access.”
    See 
    Valle, 807 F.3d at 526
    ; WEC 
    Carolina, 687 F.3d at 204
    ; 
    Nosal, 676 F.3d at 363
    . The rule of lenity “requires
    ambiguous criminal laws to be interpreted in favor of the defendants subjected to them.” DePierre v. United States,
    
    564 U.S. 70
    , 88 (2011) (citation omitted). However, lenity is to be used “only ‘at the end of the process of construing
    what Congress has expressed’ when the ordinary canons of statutory construction have revealed no satisfactory
    construction.” Lockhart v. United States, 
    136 S. Ct. 958
    , 968 (2016) (citation omitted). Text, context, legislative
    history, congressional intent, and constitutional avoidance all point in one direction here. Because these tools “allow
    [the Court] to make far more than ‘a guess as to what Congress intended,’ the rule of lenity does not apply.” 
    DePierre, 564 U.S. at 89
    . If the question were closer, however, lenity would undoubtedly come to plaintiffs’ aid.
    31
    on the other hand, argue that the distinction between access and use turns on the conduct being
    prohibited, rather than whether the website attempts to cast the conduct as related to access rather
    than use. 
    Id. at 61:17–:23.
    Plaintiffs’ reading is the more natural one, and better reflects the
    constitutional avoidance concerns that support the Court’s interpretation of the statute. Therefore,
    the Court must make an objective inquiry into the conduct alleged to violate websites’ ToS. The
    focus is on what information plaintiffs plan to access, not on why they wish to access it, the manner
    in which they use their authorization to access it, or what they hope to do with it.
    Applying this standard, it becomes clear that most of plaintiffs’ proposed activities fall
    outside the CFAA’s reach. Scraping or otherwise recording data from a site that is accessible to
    the public is merely a particular use of information that plaintiffs are entitled to see. The same
    goes for speaking about, or publishing documents using, publicly available data on the targeted
    websites. The use of bots or sock puppets is a more context-specific activity, but it is not covered
    in this case. Employing a bot to crawl a website or apply for jobs may run afoul of a website’s
    ToS, but it does not constitute an access violation when the human who creates the bot is otherwise
    allowed to read and interact with that site. See Kerr, Norms of Computer 
    Trespass, supra, at 1170
    .
    The website might purport to be limiting the identities of those entitled to enter the site, so that
    humans but not robots can get in. See Star Wars: Episode IV – A New Hope (Lucasfilm 1977)
    (“We don’t serve their kind here! . . . Your droids. They’ll have to wait outside.”). But bots are
    simply technological tools for humans to more efficiently collect and process information that they
    could otherwise access manually. Cf. Star Wars: Episode II – Attack of the Clones (Lucasfilm
    2002) (“[I]f droids could think, there’d be none of us here, would there?”).
    Out of plaintiffs’ proposed activities, then, only Mislove and Wilson’s plan to create
    fictitious user accounts on employment sites would violate the CFAA. Unlike plaintiffs’ other
    32
    conduct, which occurs on portions of websites that any visitor can view, creating false accounts
    allows Mislove and Wilson to access information on those sites that is both limited to those who
    meet the owners’ chosen authentication requirements and targeted to the particular preferences of
    the user. 12 Creating false accounts and obtaining information through those accounts would
    therefore fall under the Access Provision.                With that in mind, the Court must turn to the
    government’s motion to dismiss plaintiffs’ constitutional claims.
    D. FREEDOM OF SPEECH AND FREEDOM OF THE PRESS
    Plaintiffs first claim that the Access Provision violates the First Amendment’s guarantees
    of freedom of speech and of the press. 13 They assert that the provision is both facially overbroad
    and unconstitutional as applied to their own conduct. The Court will analyze these claims in turn.
    1. Facial Overbreadth
    Plaintiffs allege that the Access Provision “creates virtually limitless restrictions on speech
    and expressive activity,” such that the statute “is unconstitutionally overbroad on its face.” Compl.
    ¶ 183. In a typical facial challenge, plaintiffs must show “‘that no set of circumstances exists under
    which [the Access Provision] would be valid,’ . . . or that the statute lacks any ‘plainly legitimate
    sweep.’” 
    Stevens, 559 U.S. at 472
    (citations omitted). However, First Amendment cases allow
    for “‘a second type of facial challenge,’ whereby a law may be invalidated as overbroad if ‘a
    substantial number of its applications are unconstitutional, judged in relation to the statute’s plainly
    12
    Professor Kerr argues that “a website that appears to require a username and password to access the
    contents of the site, but that actually grants access for any username and password combination,” should not be seen
    as creating an access restriction, because it “would appear to a user to regulate by code, but would actually work more
    like a system of regulation by contract.” Kerr, Cybercrime’s 
    Scope, supra, at 1646
    . The distinction between code-
    based and contract-based barriers matters for First Amendment analysis, 
    see supra
    Part II.A, but it does not quite line
    up with the Court’s reading of the CFAA. Social media sites like Facebook, for instance, grant access for any
    username and password combination, but they still allow those with accounts to access data that those who merely
    visit the site without signing up cannot. Hence, conditions placed on account creation can still be access restrictions.
    13
    Courts normally subject free speech and free press claims to the same level of scrutiny. See, e.g., Citizens
    
    United, 558 U.S. at 352
    ; McConnell v. FEC, 
    251 F. Supp. 2d 176
    , 234–35 (D.D.C.) (three-judge court) (per curiam),
    aff’d in part, rev’d in part, 
    540 U.S. 93
    (2003). The Court will thus treat the speech claim as a proxy for both.
    33
    legitimate sweep.’” 
    Id. at 473
    (citation omitted). This second, lower bar is the one against which
    plaintiffs—and the Court—measure their challenge.
    The government argues that plaintiffs have failed to state a plausible overbreadth claim.
    See Def.’s Reply at 18–19. The Court agrees. “The first step in overbreadth analysis is to construe
    the challenged statute; it is impossible to determine whether a statute reaches too far without first
    knowing what the statute covers.” United States v. Williams, 
    553 U.S. 285
    , 293 (2008). The
    Court has now done so. Plaintiffs have operated under the assumption that the Access Provision
    covers all ToS violations; but, properly read, the Access Provision incorporates only those ToS
    that limit access to particular information. This fact alone is enough to dispose of plaintiffs’
    overbreadth claim. “Invalidation for overbreadth is strong medicine,” 
    id. (citation omitted),
    to be
    “employed . . . sparingly and only as a last resort,” Broadrick v. Oklahoma, 
    413 U.S. 601
    , 613
    (1973). A court should not invalidate a provision for overbreadth “when a limiting construction
    has been or could be placed on the challenged statute.” 
    Id. Plaintiffs concede
    that a limiting construction would address their overbreadth concerns—
    though they contend that the Access Provision would need to be “construed not to reach [ToS]
    violations alone.” Pls.’ Mem. at 35. While the Court’s reading of “exceeds authorized access” is
    not as narrow as the reading plaintiffs might prefer, it does eliminate many of the potentially
    unconstitutional applications of the Access Provisions.            To be overbroad, a statute’s
    unconstitutional scope must be “substantial, not only in an absolute sense, but also relative to the
    statute’s plainly legitimate sweep.” 
    Williams, 553 U.S. at 292
    . As purpose, use, or manner
    restrictions fall outside the Access Provision’s reach, plaintiffs have not plausibly alleged that the
    provision’s potentially unconstitutional applications are substantial relative to its legitimate ones.
    Moreover, plaintiffs also bring an as-applied claim, and facial challenges are disfavored when a
    34
    case “may be disposed of on narrower grounds.” Texas v. Johnson, 
    491 U.S. 397
    , 403 n.3 (1989).
    Hence, Plaintiffs’ overbreadth claim will be dismissed.
    2. As-Applied Challenge
    Plaintiffs allege that, “[a]s applied to the[m],” the Access Provision “unconstitutionally
    restricts their protected speech.” Compl. ¶ 184. “[T]o prevail on an as-applied First Amendment
    challenge,” plaintiffs “must show that the [Access Provision is] unconstitutional as applied to their
    particular speech activity.” Edwards v. District of Columbia, 
    755 F.3d 996
    , 1001 (D.C. Cir. 2014).
    “‘[T]he distinction between facial and as-applied challenges . . . goes to the breadth of the remedy
    employed by the Court, not what must be pleaded in a complaint.’ . . . The substantive rule of law
    is the same for both challenges.” 
    Id. (citations omitted).
    Aside from the overarching objections that the Court has already rejected, the
    government’s primary response to plaintiffs’ as-applied claim is that the Access Provision
    regulates conduct, rather than speech, and is therefore subject to limited scrutiny. See Def.’s Mem.
    at 21, 27. But even if a law “says nothing about speech on its face,” it is “subject to First
    Amendment scrutiny” if “it restricts access to traditional public fora.” McCullen v. Coakley, 
    134 S. Ct. 2518
    , 2529 (2014). As the Access Provision both limits access to and burdens speech in the
    public forum that is the public Internet, 
    see supra
    Part II.A, heightened First Amendment scrutiny
    is appropriate. “In particular, the guiding First Amendment principle that the ‘government has no
    power to restrict expression because of its message, its ideas, its subject matter, or its content’
    applies with full force in a traditional public forum.” 
    Id. (citation omitted).
    Content- or viewpoint-
    based restrictions receive strict scrutiny. See Reed v. Town of Gilbert, 
    135 S. Ct. 2218
    , 2226
    (2015); 
    Rosenberger, 515 U.S. at 829
    . On the other hand, if a statute is content-neutral and only
    “impose[s] reasonable restrictions on the time, place, or manner of protected speech,” McCullen,
    
    35 134 S. Ct. at 2529
    , it is subjected to intermediate scrutiny. “In order to survive intermediate
    scrutiny, a law must be ‘narrowly tailored to serve a significant governmental interest,’”
    
    Packingham, 137 S. Ct. at 1736
    (citation omitted), and must “leave open ample alternative
    channels for communication of the information,” 
    McCullen, 134 S. Ct. at 2529
    . 14
    Plaintiffs claim that the Access Provision allows websites to impose direct speech
    restrictions, including content-based restrictions, and that it is therefore subject to strict scrutiny.
    Pls.’ Mem. at 34–35. However, the statute itself does not target speech, or impose content-based
    regulations, on its face. Nor have plaintiffs plausibly alleged that the government’s purpose is to
    restrict speech based on its content or viewpoint. Indeed, while the government has not yet been
    able to proffer much evidence of the purposes behind the provision, the legislative history indicates
    that Congress was interested in passing the Access Provision to prevent the digital equivalent of
    theft. See S. Rep. 104–357, at 7 (“The proposed subsection 1030(a)(2)(C) is intended to protect
    against the interstate or foreign theft of information by computer. . . . This subsection would
    ensure that the theft of intangible information by the unauthorized use of a computer is prohibited
    in the same way theft of physical items are protected [sic].”). Therefore, strict scrutiny does not
    apply. See Pursuing America’s Greatness v. FEC, 
    831 F.3d 500
    , 509 (D.C. Cir. 2016) (stating that
    courts must determine content neutrality based on text, and then purpose).
    14
    The standard that governs expressive conduct prohibitions with “incidental limitations on First Amendment
    freedoms,” see United States v. O’Brien, 
    391 U.S. 367
    , 376 (1968), is inapposite to this as-applied claim. “The law
    here may be described as directed at conduct, . . . but as applied to plaintiffs the conduct triggering coverage under the
    statute consists of communicating a message.” Humanitarian Law 
    Project, 561 U.S. at 28
    . Plaintiffs are informing
    the websites of who they are, and claiming to be employers, much in the same way that the defendant in Alvarez had
    claimed to be a decorated war veteran, or the plaintiffs in Humanitarian Law Project had sought to train terrorists to
    engage in peaceful activity. All of these forms of conduct communicate messages to the recipients. Moreover, it is
    the content of plaintiffs’ speech to the targeted websites—that they represent their identities falsely or misleadingly
    instead of truthfully—that triggers the sites’ ToS and, thereby, the criminal penalties of the CFAA. In other words,
    Mislove and Wilson would violate the Access Provision “because of the [false] content of [their] particular message.”
    
    Id. In these
    circumstances, the government must meet a “more demanding standard” than the O’Brien test. 
    Id. (quoting Johnson
    , 491 U.S. at 403). Even if that test were applicable, however, “in the last analysis [it] is little, if any,
    different from the standard applied to time, place, or manner restrictions,” 
    Johnson, 491 U.S. at 407
    , and incorporates
    narrow tailoring requirements, see 
    Edwards, 755 F.3d at 1002
    –03, so the analysis would not meaningfully change.
    36
    From the information available so far, significant interests appear to underlie the Access
    Provision. In addition to the legislative history regarding theft prevention, the government
    suggests that the Court analogize the CFAA to trespass law, arguing that Congress was also trying
    to prohibit the digital equivalent of trespassing. Def.’s Reply at 3–5. While plaintiffs dispute the
    trespass analogy, they recognize that the CFAA was passed to prevent computer theft and other
    cybercrime, and have not disputed that this is a significant interest. Pls.’ Mem. at 31. The question
    is thus whether the statute fails narrow tailoring as applied to Mislove and Wilson’s plan to
    “creat[e] profiles containing false information,” Compl. ¶ 124, and “access[] websites using
    artificial tester profiles, in violation of [ToS] that prohibit providing false information,” 
    id. ¶ 154.
    “To satisfy narrow tailoring, the [government] must prove the challenged regulations
    directly advance its asserted interests.” 
    Edwards, 755 F.3d at 1003
    . This means “the government
    must show ‘a close fit between ends and means,’” such “that the regulation ‘promotes a substantial
    government interest that would be achieved less effectively absent the regulation,’” and does “not
    ‘burden substantially more speech than is necessary to further the government’s legitimate
    interests.’” A.N.S.W.E.R. Coalition v. Basham, 
    845 F.3d 1199
    , 1213–14 (D.C. Cir. 2017)
    (citations omitted). At this early stage, the government has not put forward any evidence to show
    that prosecuting those who provide false information when creating accounts, without more, would
    advance its interest in preventing digital theft or trespass.
    Indeed, presuming the allegations in the complaint to be true, it appears that the
    government’s interest “is not implicated on these facts” at all. 
    Johnson, 491 U.S. at 410
    . Plaintiffs
    allege that their conduct “will not cause material harm to the target websites’ operations,” and that
    “they have no intent to commit fraud or to access any data or information that is not made available
    to the public.” Compl. ¶ 4. It is difficult to argue that trespass or theft concerns can justify
    37
    restricting—or even apply to—viewing information that a website makes available to anyone who
    chooses to create a username and password. Cf. Kerr, Cybercrime’s 
    Scope, supra, at 1646
    . And
    any inadvertent “fraud” plaintiffs may perpetrate against the target websites by creating fictitious
    accounts will be, plaintiffs allege, harmless. The CFAA already punishes harmful, intentional
    fraud in a separate section, see 18 U.S.C. § 1030(a)(4), providing additional evidence that the
    government can further its legitimate interests just as well without applying the Access Provision
    to plaintiffs’ bare false statements. At this stage, “absent any evidence that the speech [would be]
    used to gain a material advantage,” 
    Alvarez, 567 U.S. at 723
    , plaintiffs’ false speech on public
    websites retains First Amendment protection, see 
    id. at 722,
    and rendering it criminal does not
    appear to advance the government’s proffered interests. Hence, plaintiffs have plausibly alleged
    an as-applied First Amendment claim, and the motion to dismiss that claim will be denied.
    E. RIGHT TO PETITION
    In addition to their free speech and press claims, plaintiffs allege that the Access Provision
    violates their rights under the Petition Clause of the First Amendment. Compl. ¶ 193. That clause
    states: “Congress shall make no law . . . abridging . . . the right of the People . . . to petition the
    Government for a redress of grievances.” U.S. Const. amend. I. Plaintiffs assert that the Access
    Provision, by criminalizing websites’ prohibitions on critical speech or publishing, prevents people
    from using any information they might gain from plaintiffs’ planned research to inform Congress
    or agencies about potential discrimination by those websites. 
    Id. ¶¶ 162–67,
    189. They also assert
    that, for the same reasons, the Access Provision prevents people from accessing the courts to
    enforce Title VII or the Fair Housing Act: nobody who had visited a website with a non-
    disparagement clause in its ToS could bring discrimination claims against that site in court without
    opening him- or herself up to a potential CFAA prosecution. 
    Id. ¶¶ 168–69,
    190.
    38
    These allegations are focused on ToS that restrict subsequent speech: disparagement, for
    instance, or use of the sites’ information in court. However, such ToS constitute restrictions on
    the use of information, not on access to it. They therefore do not fall within the Access Provision’s
    ambit, as properly interpreted. But even if one assumes that plaintiffs allege that access restrictions
    criminalized by the Access Provision violate the Petition Clause, see Compl. ¶ 162, plaintiffs’
    petition challenge is, at best, no stronger than their free speech challenge. Speech and petition
    rights are “generally subject to the same constitutional analysis,” Wayte v. United States, 
    470 U.S. 598
    , 610 n.11 (1985), unless “the special concerns of the Petition Clause would provide a sound
    basis for a distinct analysis,” Borough of Duryea v. Guarnieri, 
    564 U.S. 379
    , 389 (2011). Here,
    the rights appear to overlap: plaintiffs’ Petition Clause claim focuses on speech restrictions that
    could then affect the petitioning process. Thus, plaintiffs “just as easily could have alleged”—and
    do, in fact, allege—a Speech Clause violation on the same set of facts. 
    Id. at 387.
    And it is on that free speech claim that plaintiffs’ First Amendment case must rise or fall.
    The Speech and Press Clauses, rather than the Petition Clause, provide the more natural home for
    plaintiffs’ concerns about the Access Provision. Plaintiffs assert that the CFAA “prevents them
    from engaging in” petitioning because some websites’ ToS (and thus the Access Provision)
    “prohibit the speech necessary to engage in . . . petitioning.” Pls.’ Mem. at 43. The real concern,
    then, is the Access Provision’s alleged restrictions on speech, which have ripple effects in a variety
    of contexts. The application of the Access Provision to the petitioning process constitutes one
    small subset of the speech and conduct the provision allegedly prohibits. Any effect the statute
    might have on plaintiffs’ petition rights, then, is an extra step removed from the central speech
    harm, and is thus too attenuated to state a plausible claim for relief.
    39
    Ultimately, “the Petition Clause protects the right of individuals to appeal to courts and
    other forums established by the government for resolution of legal disputes,” and “[i]nterpretation
    of the Petition Clause must be guided by the objectives and aspirations that underlie the right.”
    Borough of 
    Duryea, 564 U.S. at 387
    –88. As the government notes, the clause is not aimed at the
    right to gather facts, or to speak while doing so, as a preliminary step to help prepare that petition
    in a preferred way. See Def.’s Mem. at 28. That right is more naturally the province of the Speech
    and Press Clauses than of the Petition Clause. See Burt Neuborne, Madison’s Music: On Reading
    the First Amendment 11–12, 89 (2015) (arguing that the First Amendment’s protected rights form
    “a rigorous chronological narrative of free citizens governing themselves in an ideal democracy,”
    and that the Petition Clause “concludes Madison’s narrative, protecting [an] idea’s introduction
    into the formal democratic process, forcing the legislature to place the issue on its agenda”).
    Hence, plaintiffs’ Petition Clause claim will be dismissed.
    F. VAGUENESS
    Plaintiffs next allege that the Access Provision violates the Due Process Clause because it
    is unconstitutionally vague. A statute is void if it is “[1] so vague that it fails to give ordinary
    people fair notice of the conduct it punishes, or [2] so standardless that it invites arbitrary
    enforcement.” Johnson v. United States, 
    135 S. Ct. 2551
    , 2556 (2015). Plaintiffs allege that the
    Access Provision meets both prongs of this test. Compl. ¶¶ 171–72. Because of potential chilling
    effects, “a more stringent vagueness test” applies when a law “interferes with the right of free
    speech.” Vill. of Hoffman Estates v. Flipside, Hoffman Estates, Inc., 
    455 U.S. 489
    , 499 (1982).
    Properly interpreted, however, the Access Provision is not unconstitutionally vague. “A
    plaintiff whose speech is clearly proscribed cannot raise a successful vagueness claim” based on a
    lack of fair notice. Expressions Hair Design v. Schneiderman, 
    137 S. Ct. 1144
    , 1151–52 (2017)
    40
    (quoting Humanitarian Law 
    Project, 561 U.S. at 20
    ). Nor can that plaintiff bring a facial vagueness
    challenge “based on the speech of others.” Humanitarian Law 
    Project, 561 U.S. at 20
    . As we have
    already seen, the Access Provision plainly proscribes the creation of false accounts, but does not
    prohibit plaintiffs’ other activities. Indeed, plaintiffs allege that they are aware that their proposed
    conduct would violate their target websites’ ToS restrictions on creating false accounts. Compl.
    ¶ 124. As the Court has determined that the Access Provision applies to one of their activities but
    not to the others, and as plaintiffs admit that they have the requisite mens rea to commit the crime,
    no facial claim or as-applied notice claim can go forward.
    Nor can plaintiffs plausibly allege that the Access Provision invites arbitrary enforcement.
    “[A] statute’s vagueness is either susceptible to judicial construction or is void for vagueness based
    on the application of traditional rules for statutory interpretation.” United States v. Bronstein, 
    849 F.3d 1101
    , 1106 (D.C. Cir. 2017). Thus, “before striking a federal statute as impermissibly vague,”
    courts must “consider whether the prescription is amenable to a limiting construction.” Welch v.
    United States, 
    136 S. Ct. 1257
    , 1268 (2016) (citation omitted). The Court has already determined
    that a more limited construction is not only possible, but is in fact more natural than the broad
    reading that raises vagueness concerns. Read to apply only to access, and not to use, restrictions,
    the Access Provision severely curtails both websites’ ability to define the law and prosecutors’
    freedom arbitrarily to enforce it. Plaintiffs’ Fifth Amendment vagueness claim will be dismissed.
    G. NONDELEGATION DOCTRINE
    Finally, plaintiffs allege that the Access Provision violates the Fifth Amendment because
    it delegates the content of criminal law to private parties. Compl. ¶¶ 173–77, 201. The primary
    case laying out the private nondelegation doctrine is Carter v. Carter Coal Co., 
    298 U.S. 238
    (1936). The statute at issue in that case delegated to coal industry groups the power to create
    41
    binding codes for the regulation of coal miners’ wages and hours. 
    Id. at 310–11.
    The Court stated
    that this power “is legislative delegation in its most obnoxious form; for it is not even delegation
    to an official or an official body, presumptively disinterested, but to private persons whose interests
    may be and often are adverse to the interests of others in the same business.” 
    Id. at 311.
    Prior to
    Carter Coal, the Supreme Court also twice struck down ordinances that sanctioned a “standardless
    delegation of power to a limited group of property owners.” City of Eastlake v. Forest City
    Enterprises, Inc., 
    426 U.S. 668
    , 678 (1976) (discussing Eubank v. Richmond, 
    226 U.S. 137
    (1912),
    and Washington ex rel. Seattle Title Trust Co. v. Roberge, 
    278 U.S. 116
    (1928)).
    The D.C. Circuit has gleaned two rules from these cases. First, “[f]ederal lawmakers
    cannot delegate regulatory authority to a private entity.” Ass’n of Am. R.Rs. v. U.S. Dep’t of
    Transp. (Ass’n of Am. R.Rs. I), 
    721 F.3d 666
    , 670 (D.C. Cir. 2013), vacated and remanded on
    other grounds, 
    135 S. Ct. 1225
    (2015). Unlike with delegations to agencies, “[e]ven an intelligible
    principle cannot rescue a statute empowering private parties to wield regulatory authority.” 
    Id. at 671.
    And second, “the due process of law is violated when a self-interested entity is ‘intrusted
    with the power to regulate the business . . . of a competitor.’” Ass’n of Am. R.Rs. 
    II, 821 F.3d at 31
    (quoting Carter 
    Coal, 298 U.S. at 311
    ). Plaintiffs claim that the Access Provision violates the
    first of these principles. They allege that the law allows website owners to define the content of a
    crime—thus sweeping beyond other statutes that merely enforce private contractual agreements—
    and that the statute relinquishes any government control over the lawmaking process. Compl.
    ¶¶ 174–76. They also assert that the Access Provision provides no standards to guide what website
    owners may effectively criminalize. See Pls.’ Mem. at 40.
    Plaintiffs raise an intriguing argument, but it is ultimately an unsuccessful one. As with
    First Amendment overbreadth and vagueness, the courts can avoid nondelegation concerns by
    42
    “giving narrow constructions to statutory delegations that might otherwise be thought to be
    unconstitutional.” Mistretta v. United States, 
    488 U.S. 361
    , 373 n.7 (1989). Plaintiffs assert that
    the Access Provision provides a limitless, standardless delegation of power to individual websites
    to define crimes. But that assertion is based on a reading of the provision that sweeps in use,
    purpose, or manner restrictions on obtaining or altering information. Properly read as applying
    only to access restrictions, websites can write whatever ToS they please, but a congressionally-
    imposed standard limits which ToS can lead to liability or prosecution. Nor do websites have the
    power to impose formal rules on an industry or otherwise exercise regulatory authority in the
    manner that courts have found constitutionally impermissible. See, e.g., Yakus v. United States,
    
    321 U.S. 414
    , 424 (1944); Carter 
    Coal, 298 U.S. at 310
    –11; Ass’n of Am. R.Rs. 
    I, 721 F.3d at 670
    –72. Plaintiffs have cited no case—nor has the Court found one—in which a court struck down
    on private nondelegation grounds a statute that incorporated private parties’ chosen restrictions,
    which are only binding on those who interact with those parties’ individual businesses. It is thus
    difficult to argue that the Access Provision improperly delegates legislative or regulatory authority.
    Indeed, when read narrowly, the Access Provision looks similar to many criminal laws that
    are rendered operative by a private party’s decision whether to authorize certain conduct.
    Examples cited in the government’s brief, see Def.’s Mem. at 32–33, include criminal trespass
    laws, see D.C. Code § 22–3302; 25 C.F.R. § 11.411, and laws against misappropriation of trade
    secrets, see 18 U.S.C. § 1831, copyrights, see 17 U.S.C. §§ 106, 506, individuals’ identities, see
    18 U.S.C. § 1029, and money (e.g., embezzlement). In none of these instances does a private
    party’s control over the law’s operation render it a nondelegation problem. Rather, “a legislative
    delegation to private citizens” is constitutional so long as “[1] the underlying exercise of authority
    [is] a reasonable regulation within the power of the government . . . . and [2] the legislature’s
    43
    restriction [is] in the form of a general prohibition, and the delegation [is] in the form of permitting
    private citizens to waive the protection of that prohibition.” Silverman v. Barry, 
    845 F.2d 1072
    ,
    1086 (D.C. Cir. 1988). A different rule would make it so that “[a]lmost any system of private or
    quasi-private law could be subject to the” nondelegation doctrine. New Motor Vehicle Bd. of Cal.
    v. Orrin W. Fox Co., 
    439 U.S. 96
    , 109 (1978). Since the Access Provision creates a blanket
    prohibition on accessing information in protected computers, which owners of those computers
    can waive through permission, plaintiffs do not plausibly allege that the provision
    unconstitutionally delegates legislative power. Hence, the nondelegation claim will be dismissed.
    CONCLUSION
    This case raises important questions about the government’s ability to criminalize vast
    swaths of everyday activity on the Internet. However, the Court need not answer all of them today,
    because it concludes that the CFAA prohibits far less than the parties claim (or fear) it does. For
    the reasons explained above, plaintiffs have plausibly alleged that they have standing to sue, and
    that the Access Provision violates the Free Speech and Free Press Clauses of the First Amendment
    as applied to them. The government’s motion to dismiss for lack of standing and on this single as-
    applied claim will therefore be denied. But the Access Provision, as the Court reads it, does not
    sweep widely enough to render plausible plaintiffs’ First Amendment overbreadth and petition
    claims, or their Fifth Amendment vagueness and nondelegation claims. The government’s motion
    to dismiss those claims, therefore, will be granted. A separate order will issue on this date.
    /s/
    JOHN D. BATES
    United States District Judge
    Dated: March 30, 2018
    44
    

Document Info

Docket Number: Civil Action No. 2016-1368

Judges: Judge John D. Bates

Filed Date: 3/30/2018

Precedential Status: Precedential

Modified Date: 3/31/2018

Authorities (72)

EF Cultural Travel BV v. Explorica, Inc. , 274 F.3d 577 ( 2001 )

EF Cultural Travel v. Explorica, Inc. , 318 F.3d 58 ( 2003 )

north-carolina-right-to-life-incorporated-north-carolina-right-to-life , 168 F.3d 705 ( 1999 )

United States v. Rodriguez , 628 F.3d 1258 ( 2010 )

Smith v. City of Cumming , 212 F.3d 1332 ( 2000 )

United States v. Willis , 476 F.3d 1121 ( 2007 )

Rainbow/Push Coalition v. Federal Communications Commission , 330 F.3d 539 ( 2003 )

Seegars, Sandra v. Ashcroft, John , 396 F.3d 1248 ( 2005 )

United States v. John , 597 F.3d 263 ( 2010 )

International Airport Centers, L.L.C. v. Jacob Citrin , 440 F.3d 418 ( 2006 )

United States v. Batti , 631 F.3d 371 ( 2011 )

United States v. Nosal , 676 F.3d 854 ( 2012 )

Pulte Homes, Inc. v. Laborers' International Union of North ... , 648 F.3d 295 ( 2011 )

American Civil Liberties Union of Ill. v. Alvarez , 679 F.3d 583 ( 2012 )

Eubank v. City of Richmond , 33 S. Ct. 76 ( 1912 )

Washington Ex Rel. Seattle Title Trust Co. v. Roberge , 49 S. Ct. 50 ( 1928 )

Information Handling Services, Inc. v. Defense Automated ... , 338 F.3d 1024 ( 2003 )

Robert I. Silverman v. Marion Barry, Mayor of the District ... , 845 F.2d 1072 ( 1988 )

McConnell v. Federal Election Commission , 251 F. Supp. 2d 176 ( 2003 )

United States v. Aleynikov , 737 F. Supp. 2d 173 ( 2010 )

View All Authorities »