Machine speech.

AuthorWu, Tim
PositionDe facto functionality doctrine in determining First Amendment rights for computer generated speech

INTRODUCTION I. THE PROBLEM II. BOUNDARIES A. Personhood 1. The Rights of Creators and Users B. Speech 1. Communications versus Speech 2. Exclusions and Inclusions 3. Algorithmic Output: Speech or Communication? C. Motive D. Abridgement III. THE FIRST AMENDMENT'S DE FACTO FUNCTIONALITY DOCTRINE A. Functionality Generally B. The First Amendment's Functionality Doctrine 1. Carrier/Conduits 2. Communicative Tools IV. EASY AND HARD CASES: SEARCH ENGINES AND CONCIERGES A. Easy Cases B. Hard Cases 1. Search Engines 2. Automated Concierges and Other Services CONCLUSION INTRODUCTION

Computers are making an increasing number of important decisions in our lives. They fly airplanes, navigate traffic, and even recommend books. In the process, computers reason through automated algorithms and constantly send and receive information, sometimes in ways that mimic human expression. When can such communications, called here "algorithmic outputs," claim First Amendment protection?

The question of "rights for robots," if once limited to science fiction, has now entered the public debate. In recent years, firms like Verizon and Google have relied on First Amendment defenses against common-law and regulatory claims by arguing that some aspect of an automated process is speech protected by the Constitution. (1) These questions will only grow in importance as computers become involved in more areas of human decision-making.

A simple approach, favored by some commentators, says that the First Amendment presumptively covers algorithmic output so long as the program seeks to communicate some message or opinion to its audience. (2) But while simplicity is attractive, so is being right. In practice, the approach yields results both absurd and disruptive; (3) the example of the car alarm shows why. The modern car alarm is a sophisticated computer program that uses an algorithm to decide when to communicate its opinions, and when it does it seeks to send a particularized message well understood by its audience. h meets all the qualifications stated: yet clearly something is wrong with a standard that grants Constitutional protection to an electronic annoyance device. Something is missing.

The big missing piece is functionality. More specifically, what's being overlooked is the differential treatment courts should accord communications closely tied to some functional task. A close reading of the relevant cases suggests that courts, in fact, limit coverage in a way that reserves the power of the state to regulate the functional aspects of the communication process, while protecting its expressive aspects. (4) Here, I go further and suggest that the law contains a de facto functionality doctrine that must be central to any consideration of machine speech.

The doctrine operates in two distinct ways. First, courts tend to withhold protection from carrier/conduits--actors who handle, transform, or process information, but whose relationship with speech or information is ultimately functional. Definitive examples are Federal Express or the telephone company, common carriers to whom the law does not grant speech rights. Those who merely carry information from place to place (courier services) generally don't enjoy First Amendment protection, while those who select a distinct repertoire, like a newspaper or cable operator, do. Similarly, those who provide the facilities for job interviews are not recognized as speakers, nor are the manufacturers of technologies that record or transform information from one form into another--like a typewriter, photocopier, or loudspeaker. (5)

Second, courts do not normally protect tools--works whose use of information is purely functional, such as navigational charts, court filings, or contracts. The reasons are complex, and related to a broader non-protection of information that by its very communication performs some task. In the words of language philosophers these are "speech acts," "illocutionary acts," or "situation-altering utterances." The broader category includes the communications embodied in criminal commands, commercial paper, nutritional information, and price-fixing conspiracies. (6)

Combined, these two tendencies form a de facto functionality doctrine, which, as we shall see, is central to understanding the First Amendment in the context of algorithmic output (and, thankfully, excludes car alarms from the protections of the Constitution). For one thing, in many cases the fact that an algorithm makes the decisions in software cases is in tension with the requirement of knowing selection or intimate identification. Other times, algorithmic output falls into the category of communication that acts by its very appearance. (7) Warnings, status indications, directions, and similar signals are common outputs for computer software in this category. These outputs act to warn or instruct and are therefore similar analytically to something like a criminal command or conspiracy.

In an area as complex as this, a rule of thumb might be useful. Generally, we can distinguish software that serves as a "speech product" from that which is a "communication tool." Communication tools fall into the categories just described: they primarily facilitate the communications of another person, or perform some task for the user. In contrast, speech products are technologies like blog posts, tweets, video games, newspapers, and so on, that are viewed as vessels for the ideas of a speaker, or whose content has been consciously curated.

The boundary between one and the other may be imperfect, but it must be drawn somewhere if the First Amendment is to be confined to its primary goal of protecting the expression of ideas, and if we are to prevent its abuse. If a software designer is primarily interested in facilitating some task for the user, he will be unlikely to have the space to communicate his own ideas. At a minimum, his ideas must bend to operations. Thus, the intent is not to communicate ideas, of, as the Supreme Court puts it, "affect public attitudes and behavior in a variety of ways, ranging from direct espousal of a political or social doctrine to the subtle shaping of thought which characterizes all artistic expression." (8)

In what follows, I introduce these ideas more thoroughly and, along the way, consider the speech status of blogging and microblogging software like Twitter, GPS navigation software, search engines, and automated concierges. The importance of these matters cannot be overstated. Too little protection would disserve speakers who have evolved beyond the printed pamphlet. Too much protection would threaten to constitutionalize many areas of commerce and private concern without promoting the values of the First Amendment.

  1. THE PROBLEM

    Humans have long created machines capable of responding to external conditions in a manner that resembles a decision. The thermostat, a device that controls the temperature of a room, might be said to decide when to turn on or off a heater. Automatic transmission might similarly be said to decide when to switch gears.

    Over the last century, such machine decisionmaking has become much more sophisticated, as has the expression of its results. In the past, computers communicated the results of their processes to humans with simple lights, dials, or sounds. Today, machines express outputs in forms easily understood by humans: words on a screen, pictures, or speech. This is analogous to the difference between an oven that beeps when it reaches a desired temperature, and a GPS device that verbally instructs its user how to get home. In communications theory terms, both are signals. (9) The latter, however, is more readily described as "speech" because it is translated into language and mimics human expression.

    To further flesh out the problem of automated reasoning, it might help to consider the following examples of algorithms, computerized or otherwise, that function in twenty-first-century life in arguably expressive ways:

    1. A computerized car alarm, when active, monitors the inputs of various shock sensors and motion detectors, and, on that basis, decides whether to sound a warning or a full alarm.

    2. A computerized antilock braking system, noticing that brakes are in danger of locking, overrides a braking decision and reduces braking force on a wheel about to lock, signaling such by vibrating the brake pedal.

    3. Apple's navigation program, based on available routes and traffic data, suggests the fastest way to drive from Hyde Park to O'Hare Airport.

    4. Google decides which web links and other information to display in response to queries like "NFL schedule" and "Rosh Hashanah." (10)

    5. Facebook, based on a user's specified interests (say "motorcycles" and "travel"), decides which ads to display to that user.

    6. Amazon chooses books to recommend to a customer based on the fact that other people bought books similar to ones the customer already purchased.

    7. Apple's automatic DJ program personalizes a playlist for users based on the songs they own.

    8. In the course of a computer game, a computer-generated villain decides to fire a missile to kill the human-controlled player.

      In all of these examples, a computer, following a program or algorithm, decides among several alternatives, and expresses that choice in a manner understandable to a human. As such, it creates a narrow but vexing category of expression. II. BOUNDARIES

      The main goal of this Part is to specify the conditions under which the First Amendment is triggered by algorithmic output. I do not present a new descriptive theory in this Part. Rather, the goal is to describe what generally triggers constitutional scrutiny.

      It is important to clarify the meaning of "trigger." Courts face two distinct questions when determining whether a law violates the First Amendment. The first is whether the First Amendment is even relevant--that is, whether the law should even be evaluated with respect to the standards of...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT