- check out the stylin' NEW Collusion haxor gear at Jinx Hackwear!!! -
- sign up on the Collusion Syndicate's infotainment discussion lists!!! -

Volume 31
Jan 2002


 HOME

 TechKnow
 Media Hack
 Parallax
 Reviews
 Fiction
 Humor
 Events
 Offsite

 Mission
 Responses
 Discussion
 #Collusion
 NEW!

 Submit a Story
 Collusioneers
 © & TM Info
 Contact Us


SETI@Home

Join the
Collusion
SETI Team!




Internet and Society 2002
 by Jonathan Zittrain

Class 1: How it all got started... - ICANN - Monday, 1/28

Class 2: Getting between you and where you want to go - CDA, PICS & ISP Liability - Monday 2/4

Early on, some people surmised that the Internet was about "disintermediation" - a long word for "getting rid of the middleman." It was a blissful thought. From the demand side of the equation, people who needed something could just access the Internet and get it on their own. If you wanted to find information about your hobby or your job search or your elected representatives, you could just go to a Web site and find out what you needed to know. If you wanted to buy a gift for someone, no need to go to a retail outlet; you could go straight to the wholesaler, and pay lower prices as a result. Likewise, from the supply side of the equation, those who wanted to publish something could publish what they liked, without needing a publisher and without fear of sensorship.

But the blissful picture of no more middlemen turned out to be much more complicated. The process of getting to the Internet, and then sifting through its unfathomable mass of information, proved hard for most people. Some of the familiar old middlemen may have gone, but new middlemen replaced them. Instead of "disintermediation," there was "reintermediation." Sometimes the new middleman was your Internet Service Provider: AOL, say, or Compuserve or Prodigy. Sometimes the new middleman was your cable provider: AT&T, MediaOne, or RCN. Sometimes the new middleman was a filtering service that you paid to keep your kids away from dangerous online content. Some fear that the new middleman is your government. Various authorities, both public and private, also became interested in telling people what they could and could not post to the Internet, raising speech and privacy issues. What started out as a simple ideal quickly became a quagmire.

Readings:

Class 3: Too Much Music - IP, digital music, Napster, P2P - Monday, 2/11

Napster started a revolution, there's no question about it. A couple of guys, a cool idea, and a simple technology flung the music publishing business into turmoil. The biggest players in the entertainment industry were badly frightened. Campus computer networks policies will never be the same, as bandwidth concerns became the order of the day. Some of America's most famous lawyers fought it out in court; some of the richest venture capitalists lost their shirts; and ultimately a business deal closed out the story - at least for now.

The much harder question is what Napster's story - and the Peer-to-Peer (P2P) movement in general - means for the law related to the Internet. The notion of file sharing persists, in many formats and many business models. Some of the thorny intellectual property issues raised in the Napster case (and, in some cases, in the Sony case before it), remain unresolved. Entertainers and publishers continue to line up on both sides of the debate. And the lawsuits keep coming.

Readings:

Class 4: Too Little Music - Trusted Systems, DeCss, Anti-Circumvention - Monday, 2/18

Last week we saw how the digital music revolution swept the web. At times this "revolution" has seemed unstoppable. But, this week, we will see that that while the law provides one option, technology may provide more. This session will address the technological advances related to trusted systems and the legal mechanisms set in place by the Digital Millennium Copyright Act. The pieces by Stefik and Zittrain answer the question you may be asking yourself at this moment ("What's a trusted system?") and explore what the advent of these technologies means for content control. We'll explore the drawbacks of these technologies, and the possibility that trusted systems which only work a little may still be good enough.

Readings:

Background

Class 5: Meet the new boss, same as the old boss - Webcasting, CARP - Monday, 2/25

This lecture will explore the compulsory licensing scheme that exacts royalties from online webcasters. Why are webcasters different from conventional radio broadcasters? We will consider the technology behind webcasting and the fears of copyright holders in coming to understand the death of a new industry at the hands of copyright legislation. Lastly, we will consider similar mandatory royalties exacted from audio recording device manufacturers by the Audio Home Recording Act and some piecemeal exemptions from copyright infringement found in the Fairness in Music Licensing Act.

Readings:

Class 6: Privacy: Commercial Surveillance - Monday, 3/4

Today privacy is something of an endangered species. More and more personal information and communication are available online, and ever more effective government surveillance technology takes advantage of this source of knowledge. Frequently the government can easily access information online that would not be available offline or would at least require a warrant. Commercial surveillance is also extremely effective. Online tracking and data collection allow many companies to amass very specific consumer profiles.

The threats to the private sphere are real but are the consequences really dire? There have been many suggestions about how to prevent further encroachment into privacy through the law, code, norms, and the market, but these suggestions are slow to be acted upon and are treated by many as attempts to stifle the growth of commerce and communication on the Internet. In many ways, it seems as though the public does not really care about privacy, or at least values the benefits of targeted commercial offers and more effective law enforcement more than the disadvantages of losing anonymity and being subjected to greater scrutiny. Maybe this is not surprising since many of the privacy invasions are almost imperceptible; they are easier to ignore. Will privacy, thus, become an endangered species more like smallpox than the giant panda - all but a few academics would rather just let it become extinct? If the answer is yes, then the final consideration should be that once gone, certain aspects of privacy will be virtually impossible to get back. Even if we are willing to sacrifice privacy for certain gains now, are we willing to relinquish it for all time and let it become extinct?

Readings:

Background

Class 7: Privacy: Government Surveillance - Monday, 3/11

Today privacy is something of an endangered species. More and more personal information and communication are available online, and ever more effective government surveillance technology takes advantage of this source of knowledge. Frequently the government can easily access information online that would not be available offline or would at least require a warrant. Commercial surveillance is also extremely effective. Online tracking and data collection allow many companies to amass very specific consumer profiles.

The threats to the private sphere are real but are the consequences really dire? There have been many suggestions about how to prevent further encroachment into privacy through the law, code, norms, and the market, but these suggestions are slow to be acted upon and are treated by many as attempts to stifle the growth of commerce and communication on the Internet. In many ways, it seems as though the public does not really care about privacy, or at least values the benefits of targeted commercial offers and more effective law enforcement more than the disadvantages of losing anonymity and being subjected to greater scrutiny. Maybe this is not surprising since many of the privacy invasions are almost imperceptible; they are easier to ignore. Will privacy, thus, become an endangered species more like smallpox than the giant panda - all but a few academics would rather just let it become extinct? If the answer is yes, then the final consideration should be that once gone, certain aspects of privacy will be virtually impossible to get back. Even if we are willing to sacrifice privacy for certain gains now, are we willing to relinquish it for all time and let it become extinct?

Readings:

Governement Surveillance

Class 8: Harmful Speech - Scary speech and ways to stop it - 3/18

The World Wide Web and the Internet significantly shifted two of the boundaries that used to constrain speech: the ability to speak anonymously and the ease of making oneself heard. With the increasing popularity of the web and email, people with something to say could easily get their message out (whether or not others would choose to read it) and without making their identities known (to the average computer user). These two changes encouraged/allowed a proliferation of speech of a sort that used at a more or less stable level of hard-to-find-unless-you-knew-where-to-look.

For some this change was liberating: it allowed those who were marginalized in their local environments to find others like them on the net or gave them access to information on touchy subjects without forcing them to reveal their identity; it allowed those with unpopular ideas to publish them more aggressively and to increase their strength in spite of their small numbers. For others the change appeared dangerous: it allowed children to gain access to pornography and other material their parents didn't want them to see, and allowed pornographers and perverts to contact them; it allowed people to publish hate speech anonymously without fear of accountability or reprisal. Technical means, such as filters, have been used to try to make the net safe for kids.

How effective are they? Are they a good thing? How should the law handle this? How can U.S. law handle this consistent with the Constitution?

Readings:

Class 9: Too few boundaries - Yahoo!, bordercontrol.com, iCrave TV - Monday, 4/1

This lecture will explore the issue of jurisdiction on the internet and an argument for the minimal intrusion of "local" regimes. We will also discuss two cases where competing legal ideals collided on the internet and the resulting battles were fought along jurisdictional lines. In one case, U.S. copyright law was brought to bear on a Canadian company in order to protect U.S. business interests. In the other, a U.S. company struggles to resist enforcement of a judgment under French law. Lastly, we will consider technological "solutions" to the problem of compliance across disparate jurisdictions and their implications for the evolution of the internet.

Class 10: Cyber Security - Monday, 4/8

The protection of the public safety and the protection of civil liberties often do not go hand-in-hand, and the Internet context is no exception. Some fear that the national infrastructure is at risk and that criminals and hackers hide in the tangled digital folds of the Internet - and that powerful tools in the hands of government officials is a necessary precaution. Others contend that the fears are overblown, and that the real fear is the undue intrusion by government into the lives of private, net-using individuals. Or perhaps there's a middle ground?

Readings:

  • Critical Infrastructure Commission Report
  • Offensive vs. Defensive Measures - Review week 6 Government Surveillance readings
  • Carolyn Meinel, "How Hackers Break In & How They Are Caught" & Phillip Zimmerman, "Cryptography for the Internet," Scientific American, October 1998
  • Government Response to Cases:
    • AUSA Daniel A. Morris, "Tracking a Computer Hacker"
    • - Kent Alexander & Scott Charney, "Computer Crime," Emory Law Review Vol. 45, No. 3 (Summer 1996) Sections on "Understanding the Law Enforcement Challenge" & "Developing Computer Crime Policy" pp. 933-945 & 954-957
  • Targets
  • The Penalties: Kevin Mitnick
    • Background: John Markoff, "Hacker Case Underscores Internet's Vulnerability" New York Times, (2/17/95)
    • Parole Terms

     

    Optional

  • Kent Alexander & Scott Charney, "Computer Crime," Emory Law Review Vol. 45, No. 3 (Summer 1996) especially Section on Understanding the Law Enforcement Challenge" pp. 933-945
  • Larry Lessig, "Preventing Intrusion through Encryption," Code and Other Laws of Cyberspace, pp. 30 - 42 (with particular attention to pp. 35 - 40)

Class 11: What's different about the Internet? Microsoft, Eldridge v. Reno -- sometime during week of 4/14

Microsoft is the ultimate technology company success story, from start-up to the company with the largest market capitalization of any company in the world within less than two decades. If any company has succeeded in cornering the markets for control, it's Microsoft. Indeed, according to the United States Department of Justice and at least one federal judge, they succeeded too well. The Microsoft case continues to unfold in with enormous potential implications for the law of cyberspace as well as antitrust law in general.

Readings:

  • QWERTY:

  • Paul David, Clio and the Economics of QWERTY, 75 American Economic Review, 332 (1985).
  • Stan Liebowitz & Stephen E. Margolis, Should Technology Choice Be a Concern of Antitrust Policy?, 9 Harv. J. L. & Tech. 283, selections (1996).

Microsoft:

Class 12: There's a new sheriff in town - Vixie, Marsh, Intel v. Hamidi - Monday, 4/22

For better or worse, we are used to a lot of public space, public interaction, governmental limitations and Constitutional rights in "real space". Things are different online. The infrastructure of the Internet is privately owned, from the pipes to the ISPs to the computers we use. Regulation of behavior online is largely done by "private sheriffs". The government is left to regulate the sheriffs themselves, and is often constrained by the Constitutional limitations on interfering with peoples' actions in a private sphere.

What is the effect of this state of affairs? What are the "private sheriffs" doing? Are Constitutional rights being violated when the goverment steps in? Is the Constitutional structure being ignored if the goverment doesn't step in?

Readings:

Class 13: Bringing it all together - The Tivo-ization of America - Monday, 4/29