Wikileaks and the Protect-Ipact: a New Public-Private Threat to The

Total Page:16

File Type:pdf, Size:1020Kb

Wikileaks and the Protect-Ipact: a New Public-Private Threat to The WikiLeaks and the protect-ip Act: A New Public-Private Threat to the Internet Commons Yochai Benkler Abstract: The WikiLeaks affair and proposed copyright bills introduced in the Senate are evidence of a Downloaded from http://direct.mit.edu/daed/article-pdf/140/4/154/1830072/daed_a_00121.pdf by guest on 26 September 2021 new, extralegal path of attack aimed at preventing access and disrupting the payment systems and adver- tising of targeted sites. In this model, the attacker may be a government agency seeking to circumvent constitutional constraints on its power or a private company trying to enforce its interests beyond those afforded by procedural or substantive safeguards in the law. The vector of attack runs through the tar- geted site’s critical service providers, disrupting technical services, such as Domain Name System service, cloud storage, or search capabilities; and business-related services, such as payment systems or advertising. The characteristics that make this type of attack new are that it targets an entire site, rather than aiming for removal or exclusion of speci½c offending materials; operates through denial of business and ½nan- cial systems, in addition to targeting technical systems; and systematically harnesses extralegal pressure to achieve results beyond what law would provide or even permit. In December 2010, a website that the Pentagon had described in 2008 as dedicated “to expos[ing] un- ethical practices, illegal behavior, and wrongdoing YOCHAI BENKLER is the Berkman within corrupt corporations and oppressive regimes Professor of Entrepreneurial Legal in Asia, the former Soviet bloc, Sub-Saharan Africa, Studies at Harvard University, and the Middle East,” and that in 2009 had received where he also serves as Faculty Co- the Amnesty International New Media Award for director of the Berkman Center for reporting on extrajudicial killings in Kenya, came Internet and Society. His publica- tions include “The Commons as under a multisystem denial-of-service attack in- a Neglected Factor of Information tended to prevent it from disseminating informa- Policy,” Telecommunications Pol- tion. The attacks combined a large-scale technical icy Research Conference (1998); distributed-denial-of-service (DDoS) attack with “From Consumers to Users: Shift- new patterns of attack aimed to deny Domain Name ing the Deeper Structures of Regu- System (dns) service and cloud-storage facilities, lation Toward Sustainable Com- disrupt payment systems services, and disable an mons and User Access,” Federal Communications Law Journal (2000); iPhone app designed to display the site’s content. and The Wealth of Networks: How The site was WikiLeaks. The attackers ranged from Social Production Transforms Markets unidenti½ed DDoS attackers to Senator Joseph and Freedom (2006). Lieberman and, more opaquely, the Obama admin- © 2011 by Yochai Benkler 154 istration. The latter attack is of particular free context for designating sites as legal- Yochai interest here, having entailed an extra- ly suspect actors, while making critical ser- Benkler legal public-private partnership between vice providers immune from responsibil- politicians gunning to limit access to the ity for any action they take by denying site, functioning in a state constrained by technical, payment, and business process the First Amendment, and private ½rms systems to targeted sites. Together, these offering critical functionalities to the elements form the basis for extralegal site–dns, cloud storage, and payments, attacks on critical services, thereby creat- in particular–that were not similarly ing a shortcut to shutting down allegedly constrained by law from denying service offending sites. The insinuation of illegal- to the offending site. The mechanism cou- ity creates the basis for public pressure on pled a legally insuf½cient but publicly sa- the service providers to deny service; im- Downloaded from http://direct.mit.edu/daed/article-pdf/140/4/154/1830072/daed_a_00121.pdf by guest on 26 September 2021 lient insinuation of illegality and danger- munity replicates the legal void that allows ousness with a legal void. By publicly stat- service-provider action well beyond any- ing or implying that WikiLeaks had acted thing a court would have ordered. unlawfully, the attackers pressured ½rms Combining denial-of-payment systems skittish about their public image to cut off with the use of extrajudicial mechanisms their services to WikiLeaks. The inapplica- and private party enforcement appears to bility of constitutional constraints to non- extend basic techniques developed in the state actors created the legal void, per- war on terrorism into the civilian domain. mitting ½rms to deny services to Wiki- It represents a new threat not only to the Leaks. This, in turn, allowed them to ob- networked commons, but to the very tain results (for the state) that the state is foundations of the rule of law in the Unit- prohibited by law from pursuing directly. ed States. The range of systems affected by the attack was also new: in addition to disrupting On November 28, 2010, WikiLeaks, in technical service providers–which had cooperation with The New York Times, the been familiar targets since efforts to con- Guardian, Der Spiegel, Le Monde, and El País, trol the Net began in the 1990s–the attack began to release a set of leaked U.S. em- expanded to include payment systems. bassy cables. The following is a condensed This pattern of attack is not an aberra- version of a detailed and fully document- tion. One need only observe its similari- ed event study of the response to that dis- ties to current efforts by the copyright in- closure.3 WikiLeaks, a site dedicated to dustries to shut down sites that challenge making materials leaked by whistleblow- their business models. This objective was ers public, had published a series of items laid out most explicitly in the ½rst draft of from the Pentagon and the State Depart- the Combating Online Infringements ment between April and November 2010. and Counterfeits Act (coica)1 that was The ½rst release, a video showing Ameri- introduced in September 2010, and a pow- can helicopters shooting a Reuters pho- erful version of it remains in the present tographer and his driver, exposed previ- version of the bill, the Preventing Real ously hidden collateral damage incurred Online Threats to Economic Creativity in the pursuit of insurgents. The video was and Theft of Intellectual Property Act followed by the release of thousands of war (protect-ip Act) of 2011.2 The coica/ logs in which ½eld commanders described protect-ip approach, which replicates conditions on the ground in Afghanistan the dynamics of the WikiLeaks attack, en- and Iraq. The disclosures were initially de- deavors to create a relatively procedure- scribed by the administration as highly 140 (4) Fall 2011 155 A New damaging to the security of troops and ter. In a critical move, PayPal discontin- Public- human rights workers, but as time passed, ued its service to WikiLeaks; a vice pres- Private Threat formal Pentagon assessments sent to ident of the ½rm, commenting publicly, to the Congress suggested that no such harm pointed to the November 27 letter, not to Internet 4 Commons had occurred. On November 28, Wiki- Senator Lieberman’s call, as the reason Leaks and its traditional-media partners that PayPal believed WikiLeaks had bro- began to release documents selected from ken the law, thus triggering the ½rm’s de- a cache of about 250,000 classi½ed cables cision to stop payment service to Wiki- that U.S. embassies around the world had Leaks.6 The State Department letter was sent to the State Department. In late No- complemented by a series of public state- vember and December they published, ments that tried to frame WikiLeaks’s em- in redacted form, a few hundred of these bassy cable release as international ter- Downloaded from http://direct.mit.edu/daed/article-pdf/140/4/154/1830072/daed_a_00121.pdf by guest on 26 September 2021 cables. WikiLeaks’s decision to publish the rorism. Secretary of State Hillary Clinton materials, including when and how they called the release of the cables “an attack were published, was protected by First on the international community.” Vice Amendment law. Indeed, precedents es- President Joseph Biden explicitly stated tablished at least as far back as the Pen- that Julian Assange, the founder of Wiki- tagon Papers case support the proposition Leaks, was “more like a high-tech terror- that a U.S. court would not have ordered ist than the Pentagon Papers.” Senator removal or suppression of the documents, Dianne Feinstein wrote a Wall Street Jour- nor would it have accepted a criminal pros- nal editorial calling for Assange’s pros- ecution of WikiLeaks or any of its editors ecution under the Espionage Act. Some and writers.5 right-wing politicians simply called for Despite the constitutional privilege that his assassination on the model of U.S. allowed WikiLeaks to publish the leaked targeted killings against Taliban and Al documents, American political ½gures Qaeda leaders.7 widely denounced the disclosures. More- Against the backdrop of this massive over, critics appeared to blame only Wiki- public campaign against WikiLeaks, Sen- Leaks, even though traditional outlets such ator Lieberman’s December 1 public ap- as The New York Times were providing ac- peal was immediately followed by a series cess to the same cables, and in the same of service denials: form. The most effective critic, Chairman • December 1: Storage. Amazon removes of the Senate Homeland Security Com- WikiLeaks materials from its cloud- mittee Senator Joseph Lieberman, urged storage facility. companies providing services to Wiki- –Countermeasure: WikiLeaks moves stor- Leaks to cease doing so. Senator Lieber- age to ovh in France. man issued his call on December 1, 2010, following a well-crafted letter from the • December 2: DNS. Everydns, the dns State Department to WikiLeaks sent No- registrar serving the WikiLeaks.org do- vember 27, 2010.
Recommended publications
  • Copyrighted Material
    1 The Duality of Peer Production Infrastructure for the Digital Commons, Free Labor for Free‐Riding Firms Mathieu O’Neil, Sophie Toupin, and Christian Pentzold 1 Introduction There never was a “tragedy of the commons”: Garrett Hardin’s overgrazing farmers were victims of a tragedy of self‐management, as they failed to collectively regulate, as equals, their common pasture. When Elinor Ostrom was awarded the Nobel Prize in Economics in 2009, the immemorial notion that there are only two types of goods in the world – private and public, coordinated by markets or the state – was finally put to rest. In the most general terms, peer producers are people who create and manage common‐pool resources together. It sometimes seems as if “peer production” and “digital commons” can be used interchangeably. Digital commons are non‐rivalrous (they can be reproduced at little or no cost) and non‐excludable (no‐one can prevent others from using them, through prop- erty rights for example). So, practically speaking, proprietary objects could be produced by equal “peers,” however we argue that peer production has a normative dimension, so that what chiefly char- acterizes this mode of production is that “the output is orientated towards the further expansion of the commons; while the commons, recursively, is the chief resource in this mode of production” (Söderberg & O’Neil, 2014, p. 2). Though there are many historical antecedents, the term “peer pro- duction,” as an object of public and scientific interest, is historically situated in the early 2000s.1 The meanings associated with a term that is deeply connected to the Internet as it was 20 years ago are bound to change.
    [Show full text]
  • Book Review – Yochai Benkler, the Wealth of Networks: How Social Production Transforms Markets and Freedom
    CLPE Research Paper 6/2007 Vol. 03 No. 02 (2007) James Brink Book Review – Yochai Benkler, The Wealth of Networks: How Social Production Transforms Markets and Freedom Keywords: networked economy, internet regulation, peer production JEL Classification: K10, K29, K42 Osgoode Hall Law School, York University 4700 Keele St., Toronto, ON, Canada M3J 1P3 Email: [email protected] Published in (2006) 7 German Law Journal 853, online: http://www.germanlawjournal.com/article.php?id=765. 967505 CLPE Research Paper 6/2007 Vol. 03 No. 02 (2007) James Brink BOOK REVIEW – YOCHAI BENKLER, THE WEALTH OF NETWORKS: HOW SOCIAL PRODUCTION TRANSFORMS MARKETS AND FREEDOM Benkler argues that the West is engaged in an escalating culture war between the industrial information economy—a one-way, capital- intensive, and professionally-produced model that has held sway for 150 years—and the networked information economy (NIE)—a many- to-many, low-capital, and cooperative model that has been emerging in the last 15 years. The NIE is built on the infrastructure of the internet and is characterized by characterized by (1) non-proprietary strategies, (2) rising non-market production, and (3) more effective, large-scale cooperative efforts; in other words, “peer production of information, knowledge, and culture.” These aspects challenge our economies and our polities, and hold significant promise for enhancing personal autonomy; however, Benkler, in writing what amounts to a manifesto for the internet, pays little attention to the way in which the NIE is vulnerable to technical capture in the same way the industrial information economy is vulnerable to capital capture, taking a “wait-and-see” approach to regulatory intervention.
    [Show full text]
  • Wikimania 2006 Invited Speaker Biographies
    Wikimania 2006 Invited Speaker has been a forceful advocate for open science and open access scientific publishing - the free release of the Biographies material and intellectual product of the scientific research. He is co-Founder of Public Library of Science Yochai Benkler is Professor of Law at Yale Law (PLoS). He serves on the PLoS board, and is an advisor School. His research focuses on commons-based to Science Commons. approaches to managing resources in networked environments. His publications include “The Wealth of Rishab Aiyer Ghosh first developed and sold free Networks: How Social Production Transforms Markets” and software in 1994. He switched from writing in C and “Freedom and Coase’s Penguin, or Linux and the Nature of the assembly to English, and has been writing about the Firm”. economics of free software and collaborative production since 1994. He is the Founding Karen Christensen is the CEO of Berkshire International and Managing Editor of First Monday, the Publishing group, a reference work publisher known for most widely read peer-reviewed on-line journal of the specialty encyclopedias. Her primary responsibility is Internet, and Senior Researcher at the Maastricht bringing together global teams and building Economic Research Institute on Innovation and relationships with experts and organizations around the Technology (MERIT) at the University of Maastricht world. Karen has also served as an encyclopedia editor; and United Nations University, the Netherlands. In as coeditor on the “Berkshire Encyclopedia of World Sport” 2000 he coordinated the European Union -funded (June 2005) and “Global Perspectives on the United States” FLOSS project, the most comprehensive early study of (three volumes, forthcoming), and as senior editor of free/libre/open source users and developers.
    [Show full text]
  • Peer Production of Survivable Infrastructures
    Peer Production of Survivable Critical Infrastructures The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, Peer Production of Survivable Critical Infrastructures, in The Law and Economics of Cybersecurity 73 (Mark F. Grady & Francesco Parisi eds., 2005). Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:37078634 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA © Yochai Benkler 2004. This version of the work is released under the creative commons noncommercial attribution license. To view a copy of the license visit http://creativecommons.org/licenses/by-nc-sa/1.0 or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Peer Production of Survivable Critical Infrastructures Yochai Benkler* Abstract The paper describes an approach to provisioning survivable critical communications and computation infrastructures by deploying radically distributed, peer-based systems for communication, computation, and data storage and retrieval. The paper focuses on system survivability as an approach to robustness, rather than on artifact-oriented hardness or impregnability. Based on a survey of experience with ad hoc wireless mesh networks, peer-to-peer storage and retrieval systems, and distributed computing, the paper identifies a class of solutions that mobilize redundant capacity resident in privately owned, extant unlicensed wireless devices, desktops, laptops, and handhelds around the periphery of the network to provide redundant, adaptive, self-healing systems.
    [Show full text]
  • Striking the Right Chord: a Theoretical Approach to Balancing Artists’ Intellectual Property Rights on Remix Audio-Sharing Platforms
    \\jciprod01\productn\C\CRN\102-1\CRN104.txt unknown Seq: 1 8-NOV-16 13:30 NOTE STRIKING THE RIGHT CHORD: A THEORETICAL APPROACH TO BALANCING ARTISTS’ INTELLECTUAL PROPERTY RIGHTS ON REMIX AUDIO-SHARING PLATFORMS Nicole Greenstein† INTRODUCTION ........................................... 212 R I. BACKGROUND ..................................... 216 R A. The Rise of Remix Culture and the Copyright Backlash ..................................... 216 R B. Licensing Sampling-Based Music ............. 218 R C. Remixes and the Fair Use Defense ............ 219 R II. A REMIXER’S LABOR OF LOVE: LOCKEAN THEORY OF INTELLECTUAL PROPERTY ............................ 221 R A. An Introduction to Locke’s Labor Theory ...... 221 R B. A Lockean Approach to Intellectual Property and Remix Rights ............................ 223 R C. The Law of Accession and the Improving Remixer ...................................... 226 R III. FOSTERING MUSICAL CREATION: UTILITARIAN THEORIES OF INTELLECTUAL PROPERTY ......................... 229 R A. The Tragedy of the Free Rider ................. 229 R B. The Freedom in the Commons ................ 232 R IV. THE SOUL BEHIND THE SONGS: PERSONHOOD THEORY OF INTELLECTUAL PROPERTY ......................... 234 R A. An Introduction to Personhood Theory ........ 234 R B. The Personhood Right in Remix Culture ....... 235 R CONCLUSION: SOLVING THE REMIX RIGHTS STALEMATE ........ 237 R † University of Pennsylvania, B.A., 2014; Cornell Law School, Candidate for J.D., 2017; Publishing Editor, Cornell Law Review Volume 102. I would like to thank Professor Gregory Alexander for contributing inspiration and thoughtful comments to this Note, as well as Professors Oskar Liivak and Michael Olivas for their excellent instruction in intellectual property. Thanks also to the members of the Cornell Law Review for their hard work in preparing this Note for publication. Last but certainly not least, I am grateful to my family and friends for their endless support throughout law school and all of my endeavors.
    [Show full text]
  • November 15, 2011 Hon. Patrick Leahy, Chairman Hon. Chuck
    November 15, 2011 Hon. Patrick Leahy, Chairman Hon. Lamar Smith, Chairman Hon. Chuck Grassley, Ranking Hon. John Conyers Jr., Ranking Member Member Senate Judiciary Committee House Judiciary Committee 224 Dirksen Senate Office Building 2138 Rayburn House Office Building US Capitol US Capitol Washington, DC 20002 Washington, DC 20003 Dear Committee Chairmen, On behalf of the undersigned student and youth organizations, we are writing today to express our serious concerns about legislation being considered by the House and Senate in the name of fighting Internet piracy. We oppose, in their current forms, legislation approved by the Senate Judiciary Committee ( S. 968, the Protect IP Act) and legislation introduced by members of the House Judiciary Committee (HR 3261, the Stop Online Piracy Act-SOPA) that, while pursuing the laudable goal of fighting Internet piracy, will curtail the legitimate free flow of information, hurt efforts to promote human rights, create undue censorship of legitimate websites and interfere with the growth of the Internet economy so important to our futures as young people. The Senate bill, while narrowed from earlier versions, contains many objectionable provisions including the DNS Internet blocking system that attacks the very foundation of the Internet address system and according to some will undermine security and the provision that specifically targets "Information Location Tools / Search Engines” that has the potential of crippling the gate ways to the Internet and its wealth of information by forcing the platforms we use to search for information to become censors rather than compasses. The House bill goes even further than its Senate counterpart by including an overly broad definition of an infringing website subject to immediate blocking.
    [Show full text]
  • "Gover Be Rnment Ma Efore the H Testim Chief of Am W Andated DN
    This statement was drafted in connection with a proposed hearing before the House Oversight and Government Reform Committee that would haave examined legislative proposals to block access to websites containing coopyright inffringing materials. The testimony was submitted to the Committee, but thhe hearing was postponed before the testimony could be entered in the record. Testimony of Michael W. Macleod-Ball Chief of Staff/First Amendment Counsel American Civil Liberties Union Washington Legislativve Office On "Government Mandated DNS Blocking and Search Takedowns - Will It End the Internet as We Know It? Before the House Committee on Oversight and Government Reform January 18, 2012 1 Chairman Issa, Ranking Member Cummings, and Members of the Committee: Thank you for holding this hearing and extending to the American Civil Liberties Union the privilege of offering testimony. We oppose current proposals to take down infringing online content through Domain Name Service (DNS) and/or search engine blocking because such mechanisms assuredly will also block lawful non-infringing content. Moreover, current proposals fall short procedurally by failing to provide notice of the takedown to the owners or producers of such lawful content and by failing to provide those parties any opportunity to participate in the proceedings relevant to the restriction. The American Civil Liberties Union (ACLU) is a non-partisan advocacy organization having more than a half million members, countless additional activists and supporters, and 53 affiliates nationwide. We are dedicated to the principles of individual rights, equality, and justice as set forth in the U. S. Constitution. For more than 90 years since its founding, the ACLU has been America’s leading defender of First Amendment free speech principles.
    [Show full text]
  • The Wealth of Networks: How Social Production Transforms Markets and Freedom
    Harvard Journal of Law & Technology Volume 20, Number 1 Fall 2006 THE WEALTH OF NETWORKS: HOW SOCIAL PRODUCTION TRANSFORMS MARKETS AND FREEDOM BY YOCHAI BENKLER NEW HAVEN, CT: YALE UNIVERSITY PRESS, 2006 PP. 515. $40.00 (HARDCOVER). ISBN: 0-300-11056-1 Megan Ristau Baca* TABLE OF CONTENTS I. INTRODUCTION..............................................................................271 II. THE EMERGING NETWORKED INFORMATION ECONOMY .............272 A. What Is the Networked Information Economy?........................272 1. Diversity of Production Incentives........................................273 2. Technological Shifts..............................................................275 B. Commons-Based Production and Peer Production .................276 C. Responses.................................................................................278 III. THE EFFECT ON THE POLITICAL ECONOMY ................................279 A. Individual Freedom..................................................................280 B. Political Freedom.....................................................................281 1. Criticisms of the Mass Media................................................281 2. The Internet as a Counterforce to Mass Media......................282 3. Can the Internet Really Democratize?...................................283 C. Cultural Freedom.....................................................................284 D. Justice and Development .........................................................284 IV. CONCLUSION ..............................................................................285
    [Show full text]
  • CONGRESSIONAL RECORD—SENATE, Vol. 158, Pt
    January 23, 2012 CONGRESSIONAL RECORD—SENATE, Vol. 158, Pt. 1 149 Senate. Senator KIRK is such a decent, Last week, the Congress did what the the U.S. companies that direct traffic, proc- caring, and thoughtful man, and all of American people called for instead of ess payments, serve advertisements and lo- us enjoy working with him in the Sen- what the Washington insiders wanted. cate information online to end their support for the site in question. Copyright and trade- ate on various kinds of bills. Godspeed, That is what I call real change. It was mark owners would be able to follow up Senator KIRK, for a healthy recovery. a grassroots victory for the history those court orders by seeking injunctions We are thinking of you tonight and you books, and, as one commentator said, against payment processors and advertising are in our prayers. I am very glad the now we are in unexplored territory. networks that do not comply. senior Senator from Illinois has re- Here is why. Eight million of 162 mil- Cutting off the financial lifeblood of com- flected the concerns of everybody from lion who visited Wikipedia took action panies dedicated to piracy and counter- feiting makes sense. A similar approach to his home State tonight. to influence their Member of Congress; illegal online gambling has shown that it is f 7 million Americans signed Google’s technically feasible for payment processors petition to block consideration of THE INTERNET to stop directing dollars from U.S. bettors to PIPA; hundreds of thousands of Ameri- gambling sites anywhere in the world.
    [Show full text]
  • One World LED, Pty, LTD
    A Request for Legislation Support of Australian Innovation: Submission to Hon. MP Ms. Nicolle Flint September 28, 2020 The Need for Legislation to Protect Australian Innovation A Report to Honourable MP Ms. Nicolle Flint By One World LED, Pty, LTD. September 30, 2020, Updated October 1, 2020 Adelaide, South Australia A Request for Legislation Support of Australian Innovation: Submission to Hon. MP Ms. Nicolle Flint September 28, 2020 Introduction This is One World LED's request for legislation to support the innovation in Australia. There is an urgent need to update the legislation in a highly competitive global technology environment in order to even the playing field for Australian inventors and innovation investors competing against global hi-tech conglomerates that enjoy the support of their respective governments with updated laws. Australia’s IP laws predate the global internet and modern worldwide web technologies and innovations and are of little or no value in protecting Australian innovation and inventors in the international setting. Following is a summary of the proposed legislation: 1. Australia Invents Act - Protect Australian Inventors and Investors. A. Supporting enforcement of IP rights in Australia against conglomerates. B. Supporting Investors claims in Australian courts against global infringement 2. Economic Support for Innovation in Australia - Removing Australian innovation barriers by: A. Government Tenders disqualifying conglomerates that violate Australian IP B. Government Tenders preference for Australian IP in the underlying products and services 3. Transparency in Government Contracts A. Full transparency with Government contracts – Open access to contract information for Australian innovative companies B. Prevention of costs subversion & add-ons - No allowance for hidden charges or overcharging the Australian government without a re-bid C.
    [Show full text]
  • Fighting Online Piracy Or Stifling Free Speech
    Center for Ethical Organizational Cultures Auburn University http://harbert.auburn.edu Hollywood v. Silicon Valley Fighting Online Piracy or Stifling Free S peech? ISSUE: Will more effective laws enforcing copyright infringement on the Internet halt innovation and undermine free speech? On January 18, 2012, some of the world’s most popular Internet sites staged a protest against two proposed laws being considered by the United States Congress: the Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA). Over 115,000 websites participated including Google, Craigslist, and Wikipedia. Wikipedia was temporarily unavailable during the day, while Google blacked out its logo. Opponents stated that the passage of PIPA and SOPA would prevent innovation and act as a detriment to the right for free expression on the Internet. On the other hand, proponents of the laws, including the CBS Corporation, argued that current laws meant to protect intellectual property are ineffective when it comes to the Internet. While the Digital Millennium Copyright Act (DMCA) provides the right to remove unauthorized content from websites, proponents claim the law does not go far enough in preventing infringement of intellectual property. This issue is especially pronounced overseas, where it is even harder to pursue copyright infringement. SOPA and PIPA intended to stop online piracy by using methods such as blocking violating sites from their U.S.- based funding, payment processors, search engine appearances, and web browser visibility. Platforms and websites that contain unauthorized content can be targeted and would have to remove content or links. One way to achieve these goals would include altering the DNS system, an important part of the Internet.
    [Show full text]
  • Reviewing Yochai Benkler, the Wealth of Networks: How Social Production Transforms Markets and Freedom (2006))
    University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2007 Wealth without Markets? (reviewing Yochai Benkler, The Wealth of Networks: How Social Production Transforms Markets and Freedom (2006)) Lior Strahilevitz Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Lior Strahilevitz, "Wealth without Markets? (reviewing Yochai Benkler, The Wealth of Networks: How Social Production Transforms Markets and Freedom (2006))," 116 Yale Law Journal 1472 (2007). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. LIOR JACOB STRAHILEVITZ Wealth Without Markets? The Wealth of Networks: How Social Production Transforms Markets and Freedom BYYOCHAI BENKLER NEW HAVEN: YALE UNIVERSITY PRESS, 20o6. PP. 528. $40.00 A UT HO R. Professor of Law, University of Chicago Law School. The author thanks Yochai Benkler, Richard Epstein, Brett Frischmann, Orin Kerr, Saul Lcvmore, Doug Lichtman, Jonathan Masur, Randy Picker, and Cass Sunstein for their comments, Emily McKinney for helpful research assistance, and the Morton C. Seeley Fund and Sarah Scaife Foundation for research support. 1472 Imaged with the Permission of Yale Law Journal REVIEW CONTENTS INTRODUCTION 1474 I. ASSESSING THE WEALTH OF NETWORKS 1475 A. On the Shoulders of Aristotle: Explaining Excess Capacity 1476 B. On the Shoulders of Titmuss: A Theory of Social Production 1478 C. On the Shoulders of Coase: A Framework for Understanding the Choice of Production Regimes 1484 D.
    [Show full text]