Code as speech
From Wikipedia the free encyclopedia

Code as speech is the legal and philosophical doctrine in the United States that computer source code and similar digital expressions are forms of speech protected by the First Amendment. The idea emerged prominently during the "crypto wars" in the 1990s, when the courts disputed the U.S. government's notion that encryption software constituted munitions, instead recognizing code's expressive function in cases such as Bernstein v. United States. Since then, debates over encryption, privacy tools, cryptocurrency, and 3D-printed gun files have continued to test the boundaries of how law treats code as a medium of expression and continues to be the subject of legal and scholarly debate.[1][2][3]
History
[edit]Encryption as munitions
[edit]
In 1977, the United States began restricting non-governmental uses of cryptography. The restrictions began when a member of the National Security Agency sent a letter to the Institute of Electrical and Electronics Engineers (IEEE) warning that the presentation material at a Cornell cryptography conference might violate weapons export regulations.[5] In the early 1990s, the U.S. government started to more actively enforce that strong encryption software was a munition under export regulations, meaning it could not legally be shared overseas without a license.[6] This classification of encryption as munitions was strongly opposed by computer scientists as well as civil liberties, privacy advocates, and cypherpunks who argued that encryption algorithms were mathematical ideas and publishing source code should be protected as speech.[6][7]
Activists printed cryptographic code on T-shirts, mugs, posters and more as a way of demonstrating code's expressive utility and protesting what they viewed as censorship.
Bernstein v. United States
[edit]In Bernstein v. United States, the Ninth Circuit Court of Appeals ruled that source code is a form of speech protected under the First Amendment. A lower court ruling on this case reasoned, "Like music and mathematical equations, computer language is just that, language, and it communicates information either to a computer or to those who can read it."[8] The case was brought by mathematician Daniel Bernstein who challenged these export controls after the government prohibited him from publishing his encryption algorithm, Snuffle.[9] Bernstein was represented by the Electronic Frontier Foundation (EFF), which has since played a major role in digital free speech litigation.[10]
This decision established code as speech as a legal precedent that became central to later legal disputes. In 2015, the United Nations issued a report stating that access to encryption software is a human right.[11]
Apple, the FBI, and compelled speech
[edit]In 2016, the FBI sought to compel Apple to create special software to bypass security on an iPhone used by the San Bernadino shooter.[12] Apple refused, arguing that the code itself is expressive and compelling software engineers to write it would violate the First Amendment's ban on compelled speech.[13] The dispute ended when the FBI unlocked the device by other means, but it remains a landmark legal dispute over code's status as protected expression.
Cryptocurrency and blockchain privacy tools
[edit]
In the 2010s and 2020s, debate began to ensue about whether Bitcoin constituted code protected as speech. Proponents argue that Bitcoin's source code and protocol are themselves political statements about decentralization, censorship resistance, and distrust of centralized authority.[14] Some legal scholars and activists argue that publishing or running Bitcoin software is inherently protected speech because it expresses economic and ideological beliefs and because it is code.[15][16]
In the 2020s, U.S. authorities began to target developers of open-source privacy tools that interface with blockchains. In 2022, the U.S. Treasury sanctioned Tornado Cash, an Ethereum mixing protocol.[17] Critics of this sanction argued that this constituted a sanction of the code rather than the criminal use.[17] The EFF also defended the Tornado Cash developers arguing that publishing open-source privacy tools is protected expression.[18] In 2024, the developers of Samourai Wallet, a Bitcoin privacy tool that uses Coinjoin to mix transactions, were indicted.[19] Critics of this action argued that the government was using stopping criminal activity as a justification to instead target code as speech.[20]
3D-printed guns
[edit]
In 2013, Cody Wilson and his group Defense Distributed published the CAD files for the Liberator, a 3D-printable gun.[21] The U.S. State Department ordered him to remove the files, triggering a legal battle with Wilson arguing that the code constitutes protected speech.[22][23] In the lawsuit, DD argued that it “believed, and continues to believe, that the United States Constitution guarantees a right to share truthful speech. Especially speech concerning fundamental constitutional rights in open forums.”[24]
Wilson also developed the Ghost Gunner, a small CNC milling machine that can finish metal gun parts.[25] DD portrayed the project as technological activism and a First Amendment test, asserting that restricting code files or machine instructions amounts to censorship.[26][27] Supporters argue that publishing design files, similar to publishing encryption algorithms, is expressive conduct.[28][29]
DRM, piracy, and the Free Speech Flag
[edit]
In 2007, an AACS encryption key was developed. This is a hexadecimal number used to bypass digital rights management (DRM) on HD DVDs.[30] It was posted widely on Digg.com, causing a controversy.[31] The movie industry sent takedown notices to Digg.com under the Digital Millennium Copyright Act (DMCA).[32][33] Digg.com's site administrators attempted to prevent users from posting links revealing the encryption key. Users subsequently resisting this action by mass posting the key onto the site.[34] One user coined this occurrence as a "digital Boston Tea Party."[34]
Activists went so far as to create the Free Speech Flag: a symbolic image whose color values encode the banned key.[35][35] The flag became an emblem of digital rights protests, highlighting how even a short number or snippet of code can carry political meaning and be treated as illegal.[36]
The fight over the AACS key also impacted debates on piracy, intellectual property, and fair use.[37] Particularly, whether sharing code that defeats copy protection, even just as a statement or an artistic form, is First Amendment protected speech. In the DRM and piracy debates, the EFF has criticized takedown demands and the DMCA's anti-circumvention provisions as unconstitutional restrictions on speech, especially when they target publication of code or encryption keys.[38][39]
See also
[edit]References
[edit]- ^ "Code as Speech". www.hks.harvard.edu. Retrieved 2025-07-10.
- ^ Wang, Xiangnong, De-Coding Free Speech: A First Amendment Theory for the Digital Age (February 15, 2021). 2021 Wis. L. Rev. 1373, Available at SSRN: https://ssrn.com/abstract=4038356
- ^ Browder, John J. (2000). "Encryption Source Code and the First Amendment". Jurimetrics. 40 (4): 431–444. ISSN 0897-1277.
- ^ "Export of cryptography from the United States", Wikipedia, 2025-05-24, retrieved 2025-07-10
- ^ McGregor, Susan (2016-05-11). "The Second Amendment Case for the Right to Bear Crypto". VICE. Retrieved 2025-07-10.
- ^ a b "When Encryption Was a Crime: The 1990s Battle for Free Speech in Software". Reason.com. 2020-10-21. Retrieved 2025-07-10.
- ^ "Opinion | Encryption and Free Speech". The Washington Post. 1999-05-10. ISSN 0190-8286. Retrieved 2025-07-10.
- ^ Dame-Boyle, Alison (2015-04-16). "EFF at 25: Remembering the Case that Established Code as Speech". Electronic Frontier Foundation. Retrieved 2025-07-10.
- ^ "Dan Bernstein's Attempt to Publish Snuffle and The Legal Issues Raised". groups.csail.mit.edu. Retrieved 2025-07-10.
- ^ "Court Hears Appeal in Encryption Case". archive.nytimes.com. Retrieved 2025-07-10.
- ^ "Encryption key to free speech, says UN report". BBC News. 2015-05-29. Retrieved 2025-07-10.
- ^ Devlin Barrett, Danny Yadron and Daisuke Wakabayashi. "Apple and Others Encrypt Phones, Fueling Government Standoff". WSJ. Archived from the original on 2025-07-10. Retrieved 2025-07-10.
- ^ Yadron, Danny; Ackerman, Spencer; Thielman, Sam (2016-02-25). "Apple accuses FBI of violating constitutional rights in iPhone battle". The Guardian. ISSN 0261-3077. Retrieved 2025-07-10.
- ^ a b "The Bitcoin Ideology". Archived from the original on 2020-01-16. Retrieved 2025-07-10.
- ^ Jeong, Sarah (2014-02-07). "Is Bitcoin Free Speech?". Slate. ISSN 1091-2339. Retrieved 2025-07-10.
- ^ Chang, Samantha (July 3, 2019). "U.S. Can't Ban Bitcoin Because It's Free Speech: Abra CEO". Yahoo! Finance.
- ^ a b "A First Amendment fight for the future of the internet - The Boston Globe". BostonGlobe.com. Archived from the original on 2024-07-17. Retrieved 2025-07-10.
- ^ Opsahl, Kurt (2022-08-22). "Code, Speech, and the Tornado Cash Mixer". Electronic Frontier Foundation. Archived from the original on 2025-05-06. Retrieved 2025-07-10.
- ^ Book, Joakim (2024-05-01). "Groundhog Day for the crypto wars: The DOJ on bitcoin prowl". Reason.com. Retrieved 2025-07-10.
- ^ Huang, Roger. "Samourai Indictment & FBI Notice Are An Assault On Bitcoin And Privacy". Forbes. Retrieved 2025-07-10.
- ^ "The blueprint for a 3-D-printed gun was uploaded in book form to Amazon as a free speech exercise. Amazon removed it". Washington Post. 2018-08-23. Archived from the original on 2022-12-16. Retrieved 2025-07-10.
- ^ Greenberg, Andy. "State Department Demands Takedown Of 3D-Printable Gun Files For Possible Export Control Violations". Forbes. Retrieved 2025-07-10.
- ^ "The Fight Over 3-D-Printed Guns". The New York Times. 2018-08-01. ISSN 0362-4331. Retrieved 2025-07-10.
- ^ Feuer, Alan. "Cody Wilson, Who Posted Gun Instructions Online, Sues State Department". Archived from the original on 2018-03-09. Retrieved 2025-07-10.
- ^ Greenberg, Andy. "This "Ghost Gun" Machine Now Makes Untraceable Metal Handguns". Wired. ISSN 1059-1028. Retrieved 2025-07-10.
- ^ "'Downloadable Gun' Clears a Legal Obstacle, and Activists Are Alarmed". Archived from the original on 2018-07-13. Retrieved 2025-07-10.
- ^ Doherty, Brian (2021-04-30). "The State Department Fought To Allow 'Ghost Gun' Files and Won. Why Is It Still Trying To Remove Them?". Reason.com. Retrieved 2025-07-10.
- ^ O'Sullivan, Andrea (2018-07-18). "When Code Is Speech, Tech Like 3D-Printed Guns Sees Greater Protection from Censorship". Reason.com. Retrieved 2025-07-10.
- ^ "Is Code Free Speech?". www.pbs.org. 2018-07-27. Retrieved 2025-07-10.
- ^ "09 f9 11 02 9d 74 e3 5b d8 41 56 c5 63 56 88 c0 is the number they tried to ban - The Inquirer". www.theinquirer.net. Archived from the original on 2009-10-29. Retrieved 2025-07-10.
- ^ "Digg revolt over HD DVD codes | Australian IT". www.australianit.news.com.au. Archived from the original on 2007-07-03. Retrieved 2025-07-10.
- ^ Coleman, Gabriella (2013-03-21). "Code Is Speech". Reason.com. Retrieved 2025-07-10.
- ^ Bushell-embling, Dylan. "Digg finds the key is safety in numbers". Brisbane Times. Archived from the original on 2025-06-07. Retrieved 2025-07-10.
- ^ a b "Digg's DRM Revolt - Forbes.com". www.forbes.com. Archived from the original on 2007-05-04. Retrieved 2025-07-10.
- ^ a b "Digg finds the key is safety in numbers - web - Technology". www.brisbanetimes.com.au. Archived from the original on 2015-09-24. Retrieved 2025-07-10.
- ^ "WEBLOGS AND ACTIVISM: A SOCIAL MOVEMENT PERSPECTIVE ON THE BLOGOSPHERE". etda.libraries.psu.edu. Archived from the original on 2016-03-04. Retrieved 2025-07-10.
- ^ Stone, Brad (2007-05-03). "In Web Uproar, Antipiracy Code Spreads Wildly". The New York Times. ISSN 0362-4331. Retrieved 2025-07-10.
- ^ Release, Press (2022-01-13). "EFF Asks Appeals Court to Rule DMCA Anti-Circumvention Provisions Violate First Amendment". Electronic Frontier Foundation. Retrieved 2025-07-10.
- ^ Lohmann, Fred von (2007-11-28). "Year-End 2007: Darknet Assumptions Still True". Electronic Frontier Foundation. Retrieved 2025-07-10.