The New Surveillance
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Privacy Vs. Piracy
KATYAL: PRIVACY VS. PIRACY ARTICLE PRIVACY VS. PIRACY SONIA K. KATYAL* I. COMPETING FRAMEWORKS OF PRIVACY AND PROPERTY ...... 231 A. A SYMBIOTIC VIEW FROM REAL SPACE ........................... 233 B. A HIERARCHICAL VIEW FROM CYBERSPACE ................... 241 1. PLACE AND PANOPTICISM ......................................... 244 2. THE DIGITAL PERSONA AS PROPERTY ....................... 251 II. THE CONVERGENCE BETWEEN CONSUMER AND PIRACY SURVEILLANCE .................................................................... 263 A. ORIGINS OF PIRACY SURVEILLANCE ............................... 271 1. THE DIGITAL MILLENNIUM COPYRIGHT ACT AND PEER- TO-PEER JURISPRUDENCE ......................................... 271 2. THE LEGACY OF VERIZON ......................................... 281 B. SPECTERS OF PIRACY SURVEILLANCE ............................. 290 1. M ONITORING ............................................................ 293 2. M ANAGEM ENT .......................................................... 304 3. INTERFERENCE ......................................................... 311 III. TOWARDS A REGIME OF PANOPTIC PUBLICATION ................. 316 A. PRIVACY AND AUTONOMY ............................................... 319 B. DUE PROCESS AND FREEDOM OF EXPRESSION ............... 328 IV. BALANCING PRIVATE AND PUBLIC ENFORCEMENT .............. 335 V . C ON CLU SION ....................................................................... 345 This article was jointly reviewed and edited by YALE JOURNAL OF LAW & TECHNOLOGY and INTERNATIONAL JOURNAL -
Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Sharing Networks
University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2003 Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Sharing Networks Lior Strahilevitz Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Lior Strahilevitz, "Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Sharing Networks," 89 Virginia Law Review 505 (2003). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. VIRGINIA LAW REVIEW VOLUME 89 MAY 2003 NUMBER 3 ARTICLE CHARISMATIC CODE, SOCIAL NORMS, AND THE EMERGENCE OF COOPERATION ON THE FILE- SWAPPING NETWORKS Lior Jacob Strahilevitz * INTROD U CTION ................................................................................... 507 I. AN INTRODUCTION TO NAPSTER, GNUTELLA, AND THE FILE-SWAPPING HYBRIDS ........................................... 510 A . Nap ster ................................................................................... 511 1. Napster in Brief ............................... 511 2. Napster's G rowth ............................................................. 512 3. The Napster Litigation and Its Fallout.......................... 513 B . G n utella ................................................................................. -
When Code Isn't Law
Columbia Law School Scholarship Archive Faculty Scholarship Faculty Publications 2003 When Code Isn't Law Tim Wu Columbia Law School, [email protected] Follow this and additional works at: https://scholarship.law.columbia.edu/faculty_scholarship Part of the Intellectual Property Law Commons, and the Science and Technology Law Commons Recommended Citation Tim Wu, When Code Isn't Law, VIRGINIA LAW REVIEW, VOL. 89, P. 679, 2003; UNIVERSITY OF VIRGINIA SCHOOL OF LAW PUBLIC LAW & LEGAL THEORY RESEARCH WORKING PAPER NO. 03-10 (2003). Available at: https://scholarship.law.columbia.edu/faculty_scholarship/1290 This Working Paper is brought to you for free and open access by the Faculty Publications at Scholarship Archive. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Scholarship Archive. For more information, please contact [email protected]. UNIVERSITY OF VIRGINIA SCHOOL OF LAW 2003 SPRING PUBLIC LAW AND LEGAL THEORY RESEARCH PAPERS SERIES WHEN CODE ISN’T LAW TIM WU WORKING PAPER NO. 03-10 This Paper Can Be Downloaded Without Charge From The Social Science Research Network Electronic Paper Collection Http://Ssrn.Com/Abstract_Id=413201 101 102 Virginia Law Review Vol. 89:nnn 2003] Compliance & Code 103 VIRGINIA LAW REVIEW VOLUME 89 JUNE 2003 NUMBER 4 ARTICLE WHEN CODE ISN’T LAW Tim Wu* INTRODUCTION...................................................................................104 I. A THEORY OF CODE, CHANGE, AND AVOIDANCE ...........................110 A. Reactions to Law in General Theories of Regulation .............110 B. When Groups Get Sick of Complying.....................................112 1. Avoidance Mechanisms ...................................................112 2. Change Mechanisms........................................................116 3. Summary: The Change/Avoidance Choice .......................118 C. -
Peer-To-Peer Distribution Systems: Will Napster, Gnutella, and Freenet Create a Copyright Nirvana Or Gehenna? Damien A
William Mitchell Law Review Volume 27 | Issue 3 Article 1 2001 Peer-to-peer Distribution Systems: Will Napster, Gnutella, and Freenet Create a copyright Nirvana or Gehenna? Damien A. Riehl Follow this and additional works at: http://open.mitchellhamline.edu/wmlr Recommended Citation Riehl, Damien A. (2001) "Peer-to-peer Distribution Systems: Will Napster, Gnutella, and Freenet Create a copyright Nirvana or Gehenna?," William Mitchell Law Review: Vol. 27: Iss. 3, Article 1. Available at: http://open.mitchellhamline.edu/wmlr/vol27/iss3/1 This Article is brought to you for free and open access by the Law Reviews and Journals at Mitchell Hamline Open Access. It has been accepted for inclusion in William Mitchell Law Review by an authorized administrator of Mitchell Hamline Open Access. For more information, please contact [email protected]. © Mitchell Hamline School of Law Riehl: Peer-to-peer Distribution Systems: Will Napster, Gnutella, and Fr PEER-TO-PEER DISTRIBUTION SYSTEMS: WILL NAPSTER, GNUTELLA, AND FREENET CREATE A COPYRIGHT NIRVANA OR GEHENNA? Damien A. Riehl I. INTRODUCTION ....................................................................1762 II. DESCRIPTION OF PEER-TO-PEER SYSTEMS ............................1764 III. N APSTER ...............................................................................1766 A. Introduction .............................................................. 1766 B. Napster's Software Architecture ..................................... 1768 C. A & M Records, Inc. v. Napster, Inc ............................1768 -
JXTA Search: Distributed Search for Distributed Networks
JXTA Search: Distributed Search for Distributed Networks Steve Waterhouse Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA 650 960-1300 Introduction JXTA Search started life in June 2000 when Gene Kan and Yaroslav Faybishenko of Infrasearch created a demo search engine which connected multiple Web servers together using a peer-to-peer protocol. This demo consisted of a Web front-end to a distributed set of servers, each running a node hardcoded to respond to certain types of queries. The founders of Infrasearch conceived the idea to distribute queries to network peers best capable of answering them. For example, the Infrasearch search engine responded intelligently to queries for: ¥ Text, by hitting a Moreover News database ¥ Stock quotes, by sending the query to Yahoo! Finance ¥ Pictures, by using OnlinePhoto Lab ¥ Arithmetic, by sending the query to a calculator Nearly a year later, the Infrasearch team is now part of Sun’s Project JXTA (http://jxta.org), but has the same missions and objectives to provide a common distributed query mechanism for devices from Web servers to small computers, effectively p2p-ing the Web via JXTA and Infrasearch s distributed search technology. In addition, the original Infrasearch demo has been extended to work not only on the Web, but also as part of the JXTA framework. Infrasearch now provides the default searching methodology for the JXTA framework in the form of JXTA Search. The JXTA Search Network Communication over the JXTA Search network is performed via an XML protocol called the Query Routing Protocol (QRP). The QRP defines mechanisms for sending and responding to queries in the JXTA Search network, as well as mechanisms for defining meta-data for nodes in the network. -
Pvp.Boalt.Draft Katyal
July 15, 2003 Draft-in-progress—Please do not quote, cite, or circulate without permission Privacy vs. Piracy Sonia K. Katyal* Introduction ...........................................................................................................................................................................1 Part I: A Dialectical Relationship Between Privacy and Property....................................................................................6 A. Real Space: Some Basic Points on the “Private” Nature of Property Ownership...............................................6 B. Rethinking Property in Cyberspace.......................................................................................................................11 C. Peer-to-Peer Panopticism .......................................................................................................................................16 Part II: Spectres of Piracy Surveillance ...........................................................................................................................23 A. Origins of Piracy Surveillance...............................................................................................................................24 B. Methods of Piracy Surveillance.............................................................................................................................32 1. Monitoring ..........................................................................................................................................................37 -
Peer to Peer.Pdf
Peer to Peer: Harnessing the Power of Disruptive Technologies Andy Oram (editor) First Edition March 2001 ISBN: 0-596-00110-X, 448 pages This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. The contributors are leading developers of well-known peer-to-peer systems, such as Gnutella, Freenet, Jabber, Popular Power, SETI@Home, Red Rover, Publius, Free Haven, Groove Networks, and Reputation Technologies. Topics include metadata, performance, trust, resource allocation, reputation, security, and gateways between systems. Table of Contents Preface 1 Andy Oram Part I. Context and Overview 1. A Network of Peers: Models Through the History of the Internet 8 Nelson Minar and Marc Hedlund 2. Listening to Napster 19 Clay Shirky 3. Remaking the Peer-to-Peer Meme 29 Tim O'Reilly 4. The Cornucopia of the Commons 41 Dan Bricklin Part II. Projects 5. SETI@home 45 David Anderson 6. Jabber: Conversational Technologies 51 Jeremie Miller 7. Mixmaster Remailers 59 Adam Langley 8. Gnutella 62 Gene Kan 9. Freenet 80 Adam Langley 10. Red Rover 86 Alan Brown 11. Publius 93 Marc Waldman, Lorrie Faith Cranor, and Avi Rubin 12. Free Haven 102 Roger Dingledine, Michael J. Freedman, and David Molnar Table of Contents (cont...) Part III. Technical Topics 13. Metadata 121 Rael Dornfest and Dan Brickley 14. Performance 128 Theodore Hong 15. Trust 153 Marc Waldman, Lorrie Faith Cranor, and Avi Rubin 16. Accountability 171 Roger Dingledine, Michael J. Freedman, and David Molnar 17. Reputation 214 Richard Lethin 18. -
Napster, the Net Act, and the Criminal Prosecution of File-Sharing." American University Law Review 50, No.2 (2000): 473-532
American University Law Review Volume 50 | Issue 2 Article 7 2000 COMMENT: A Nation of Felons?: Napster, the Net Act, and the Criminal Prosecution of File- Sharing Aaron M. Bailey American University Washington College of Law Follow this and additional works at: http://digitalcommons.wcl.american.edu/aulr Part of the Law Commons Recommended Citation Bailey, Aaron M. "COMMENT: A Nation of Felons?: Napster, the Net Act, and the Criminal Prosecution of File-Sharing." American University Law Review 50, no.2 (2000): 473-532. This Comment is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. COMMENT: A Nation of Felons?: Napster, the Net Act, and the Criminal Prosecution of File-Sharing This comment is available in American University Law Review: http://digitalcommons.wcl.american.edu/aulr/vol50/iss2/7 BAILEYPP.DOC 8/15/2001 11:40 AM COMMENT A NATION OF FELONS?: NAPSTER, THE NET ACT, AND THE CRIMINAL PROSECUTION OF FILE-SHARING ∗ AARON M. BAILEY TABLE OF CONTENTS Introduction.........................................................................................474 I. Background ...............................................................................478 A. The Fury Over MP3 “File-sharing”.....................................478 -
A Network of Peers: Models Through the History of the Internet 8 Nelson Minar and Marc Hedlund
Peer to Peer: Harnessing the Power of Disruptive Technologies Andy Oram (editor) First Edition March 2001 ISBN: 0-596-00110-X, 448 pages This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. The contributors are leading developers of well-known peer-to-peer systems, such as Gnutella, Freenet, Jabber, Popular Power, SETI@Home, Red Rover, Publius, Free Haven, Groove Networks, and Reputation Technologies. Topics include metadata, performance, trust, resource allocation, reputation, security, and gateways between systems. Table of Contents Preface 1 Andy Oram Part I. Context and Overview 1. A Network of Peers: Models Through the History of the Internet 8 Nelson Minar and Marc Hedlund 2. Listening to Napster 19 Clay Shirky 3. Remaking the Peer-to-Peer Meme 29 Tim O'Reilly 4. The Cornucopia of the Commons 41 Dan Bricklin Part II. Projects 5. SETI@home 45 David Anderson 6. Jabber: Conversational Technologies 51 Jeremie Miller 7. Mixmaster Remailers 59 Adam Langley 8. Gnutella 62 Gene Kan 9. Freenet 80 Adam Langley 10. Red Rover 86 Alan Brown 11. Publius 93 Marc Waldman, Lorrie Faith Cranor, and Avi Rubin 12. Free Haven 102 Roger Dingledine, Michael J. Freedman, and David Molnar Table of Contents (cont...) Part III. Technical Topics 13. Metadata 121 Rael Dornfest and Dan Brickley 14. Performance 128 Theodore Hong 15. Trust 153 Marc Waldman, Lorrie Faith Cranor, and Avi Rubin 16. Accountability 171 Roger Dingledine, Michael J. Freedman, and David Molnar 17. Reputation 214 Richard Lethin 18. -
Music on the Internet: Is There an Upside to Downloading?
S. HRG. 106–1060 MUSIC ON THE INTERNET: IS THERE AN UPSIDE TO DOWNLOADING? HEARING BEFORE THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE ONE HUNDRED SIXTH CONGRESS SECOND SESSION JULY 11, 2000 Serial No. J–106–96 Printed for the use of the Committee on the Judiciary ( U.S. GOVERNMENT PRINTING OFFICE 74–728 WASHINGTON : 2001 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 VerDate 11-MAY-2000 13:55 Oct 05, 2001 Jkt 074728 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 E:\HR\OC\B728.XXX pfrm07 PsN: B728 COMMITTEE ON THE JUDICIARY ORRIN G. HATCH, Utah, Chairman STROM THURMOND, South Carolina PATRICK J. LEAHY, Vermont CHARLES E. GRASSLEY, Iowa EDWARD M. KENNEDY, Massachusetts ARLEN SPECTER, Pennsylvania JOSEPH R. BIDEN, JR., Delaware JON KYL, Arizona HERBERT KOHL, Wisconsin MIKE DEWINE, Ohio DIANNE FEINSTEIN, California JOHN ASHCROFT, Missouri RUSSELL D. FEINGOLD, Wisconsin SPENCER ABRAHAM, Michigan ROBERT G. TORRICELLI, New Jersey JEFF SESSIONS, Alabama CHARLES E. SCHUMER, New York BOB SMITH, New Hampshire MANUS COONEY, Chief Counsel and Staff Director BRUCE A. COHEN, Minority Chief Counsel (II) VerDate 11-MAY-2000 13:55 Oct 05, 2001 Jkt 074728 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 E:\HR\OC\B728.XXX pfrm07 PsN: B728 C O N T E N T S STATEMENTS OF COMMITTEE MEMBERS Page Hatch, Hon. Orrin G., a U.S. Senator from the State of Utah ........................... -
CI Capitol Hill Bulletin 7/13/00
THE CALIFORNIA INSTITUTE FOR FEDERAL POLICY RESEARCH 419 New Jersey Avenue, SE, Washington, D.C. 20003 202-546-3700 Fax: 202-546-2390 E-mail:[email protected] Web:http://www.calinst.org California Capitol Hill Bulletin Volume 7, Bulletin 23 -- July 13, 2000 To expand communications between Washington and California, the California Institute provides periodic faxed bulletins regarding current activity on Capitol Hill which directly impacts our state. Bulletins are published weekly during sessions of Congress, and occasionally during other periods. The e-mail edition is made possible in part by in kind donations from Sun Microsystems and IBM Corp. SENATE PASSES EXPORT CONTROL REVIEW AMENDMENT On Wednesday, July 12, the Senate included in the Defense CONTENTS: Authorization bill (S. 2549) an amendment to shorten from 180 days to 60 days the period of time Congress has in which to act on the Senate Passes Export Control Review Amendment ...............1 Administration’s proposed changes to export controls on high performance computers. See, Bulletin Vol. 7, No. 17 (5/18/00). Under the 1998 Senate Subcommittee’s Up Energy & Water Bill Cuts DOE’s High National Defense Authorization Act, after the Administration increases the Energy Physics and Fusion ....1 processing capability (measured in millions of theoretical operations per second or MTOPS) of computers that may be exported, Congress has 180 Judiciary Subcommittee Examines Genome Patents ............2 days to review the change and legislatively preempt it if it chooses. Information technology companies have long argued that the 180 day Supplemental Sent to President ...3 review process is too extensive, given the rapid pace of changes in the Senate Includes Permanent R&D industry and global competition. -
Governance in Namespaces
Loyola of Los Angeles Law Review Volume 36 Number 3 Symposium: ICANN Governance Article 6 3-1-2003 Governance in Namespaces Stefan Bechtold Follow this and additional works at: https://digitalcommons.lmu.edu/llr Part of the Law Commons Recommended Citation Stefan Bechtold, Governance in Namespaces, 36 Loy. L.A. L. Rev. 1239 (2003). Available at: https://digitalcommons.lmu.edu/llr/vol36/iss3/6 This Symposium is brought to you for free and open access by the Law Reviews at Digital Commons @ Loyola Marymount University and Loyola Law School. It has been accepted for inclusion in Loyola of Los Angeles Law Review by an authorized administrator of Digital Commons@Loyola Marymount University and Loyola Law School. For more information, please contact [email protected]. GOVERNANCE IN NAMESPACES Stefan Bechtold* The assignment of numbers is also handled by Jon. If you are developing a protocol or application that will require the use of a link, socket, port, protocol, or network number please contact Jon to receive a number assignment.' Anyone can assign names. We each do that all the time.2 eBay reserves the right to modify, alter or suspend any User ID at any time (at our sole discretion and without notice)3 for any reason whatsoever. * Research Assistant, University of Tilbingen Law School, Germany; Fellow, 2002-2003, Center for Internet & Society, Stanford Law School; J.S.M., 2002, Stanford Law School; Dr. lur. (J.S.D.), 2001, University of Ttlbingen Law School, Germany; Referendar (J.D.), 1999, University of Tilbingen Law School, Germany. I would like to thank Peter Bechtold, Jonathan Greenberg, Jeff Gould, Brian Hemphill, Kurt Jaeger, Lawrence Lessig, Nelson Minar, Wernhard M.schel, Milton Mueller, Markus MOiler, Tomas Sander, and the participants who attended workshops and seminars at Stanford Law School and the University of Tobingen Law School, Germany, as well as the TPRC 2002 participants for their valuable comments and suggestions.