17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

194<br />

Solutions<br />

networks because <strong>the</strong>y will find <strong>the</strong>mselves shunned by o<strong>the</strong>r ISPs if <strong>the</strong>y perm<strong>it</strong><br />

excessive anonymous spam—a system similar <strong>to</strong> <strong>the</strong> MAPS and Google/<br />

S<strong>to</strong>pBadware regimes discussed in <strong>the</strong> previous chapter. This opportun<strong>it</strong>y for<br />

greater direct liabil<strong>it</strong>y reduces <strong>the</strong> pressure on those processing incoming<br />

e-mail—both <strong>the</strong> designated recipients and <strong>the</strong>ir ISPs—<strong>to</strong> resort <strong>to</strong> spam filtration<br />

heuristics that may unintentionally block leg<strong>it</strong>imate e-mail. 82<br />

The same principle can apply <strong>to</strong> individuals’ uses <strong>of</strong> <strong>the</strong> <strong>Internet</strong> that are said<br />

<strong>to</strong> harm legally protected interests. Music industry lawsu<strong>it</strong>s against individual<br />

file sharers may be bad policy if <strong>the</strong> underlying substantive law demarcating <strong>the</strong><br />

protected interest is <strong>it</strong>self ill-advised—and <strong>the</strong>re are many reasons <strong>to</strong> think that<br />

<strong>it</strong> is—but from <strong>the</strong> point <strong>of</strong> view <strong>of</strong> generativ<strong>it</strong>y, such lawsu<strong>it</strong>s inflict l<strong>it</strong>tle<br />

damage on <strong>the</strong> network and PCs <strong>the</strong>mselves. The <strong>Internet</strong>’s future may be<br />

brighter if technology perm<strong>it</strong>s easier identification <strong>of</strong> <strong>Internet</strong> users combined<br />

w<strong>it</strong>h legal processes, and perhaps technical lim<strong>it</strong>ations, <strong>to</strong> ensure that such<br />

identification occurs only when good cause exists. The mechanisms <strong>to</strong> make <strong>it</strong><br />

less than impossible <strong>to</strong> find copyright infringers and defamers ought not <strong>to</strong><br />

make <strong>it</strong> trivial for author<strong>it</strong>arian states <strong>to</strong> single out subversives.<br />

As <strong>the</strong> discussion <strong>of</strong> FON explained, a growing number <strong>of</strong> <strong>Internet</strong> users are<br />

acquiring wireless routers that default <strong>to</strong> sharing <strong>the</strong>ir connection w<strong>it</strong>h anyone<br />

nearby who has a PC configured w<strong>it</strong>h a wireless antenna. Consumers may not<br />

intend <strong>to</strong> open <strong>the</strong>ir networks, but doing so creates generative benef<strong>it</strong>s for those<br />

nearby w<strong>it</strong>hout <strong>the</strong>ir own <strong>Internet</strong> access. 83 Usage by o<strong>the</strong>rs does not typically<br />

impede <strong>the</strong> original consumer’s enjoyment <strong>of</strong> broadband, but should outsiders<br />

use that connection, say, <strong>to</strong> send viruses or <strong>to</strong> pirate copyrighted files, <strong>the</strong> original<br />

consumer could be blamed when <strong>the</strong> <strong>Internet</strong> connection is traced. 84 Current<br />

legal doctrine typically precludes such blame—nearly all secondary liabil<strong>it</strong>y<br />

schemes require some form <strong>of</strong> knowledge or benef<strong>it</strong> before imposing<br />

responsibil<strong>it</strong>ies 85 —but a sea change in <strong>the</strong> abil<strong>it</strong>y <strong>of</strong> lawbreakers <strong>to</strong> act untraceably<br />

by using o<strong>the</strong>rs’ wi-fi could plausibly result in an adjustment <strong>to</strong> doctrine.<br />

As such examples arise and become well known, consumers will seek <strong>to</strong> cut<br />

<strong>of</strong>f o<strong>the</strong>rs’ access <strong>to</strong> <strong>the</strong>ir surplus network resources, and <strong>the</strong> manufacturers <strong>of</strong><br />

wireless routers might change <strong>the</strong> default <strong>to</strong> closed. If, <strong>how</strong>ever, genuine individual<br />

ident<strong>it</strong>y can be affirmed in appropriate circumstances, wi-fi sharing need<br />

not be impeded: each user will be held responsible for his or her own actions<br />

and no more. Indeed, <strong>the</strong> FON system <strong>of</strong> sharing wireless access among members<br />

<strong>of</strong> <strong>the</strong> “FON club” maintains users’ accounts for <strong>the</strong> purpose <strong>of</strong> ident<strong>it</strong>y<br />

tracing in lim<strong>it</strong>ed circumstances—and <strong>to</strong> prevent add<strong>it</strong>ional pressure on regu-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!