17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

282<br />

Notes <strong>to</strong> Page 114<br />

a Filtered <strong>Internet</strong>, in ACCESS DENIED: THE PRACTICE AND POLICY OF GLOBAL INTERNET<br />

FILTERING (Ronald J. Deibert et al. eds., 2008).<br />

56. See James Boyle, Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors,<br />

66 U. CIN. L. REV. 177 (1997); see also Jonathan Z<strong>it</strong>train, A His<strong>to</strong>ry <strong>of</strong> Online Gatekeeping,<br />

19 HARV. J.L. & TECH. 253, 295 (2006). Boyle believes <strong>the</strong> “Libertarian gotcha” <strong>to</strong><br />

be contingent, not inherent. In o<strong>the</strong>r words, because code can be changed, <strong>it</strong> is possible<br />

<strong>to</strong> take a technology and <strong>the</strong>n refashion <strong>it</strong> <strong>to</strong> make <strong>it</strong> easier <strong>to</strong> regulate.<br />

57. FAREED ZAKARIA, THE FUTURE OF FREEDOM: ILLIBERAL DEMOCRACY AT HOME AND<br />

ABROAD 81–85, 91–92, 156 (reprint ed. 2004).<br />

58. Ingrid Marson, China: Local S<strong>of</strong>tware for Local People, CNET NEWS.COM, Nov. 14, 2005,<br />

http://news.com.com/ChinaLocals<strong>of</strong>twareforlocalpeople/2100-7344_3-<br />

5951629.html.<br />

59. See, e.g., Bantam Books, Inc. v. Sullivan, 372 U.S. 58, 70 (1963) (“Any system <strong>of</strong> prior<br />

restraints <strong>of</strong> expression comes <strong>to</strong> this Court bearing a heavy presumption against <strong>it</strong>s<br />

const<strong>it</strong>utional valid<strong>it</strong>y.”); see also LAWRENCE TRIBE, AMERICAN CONSTITUTIONAL LAW<br />

(1999).<br />

60. See Lyombe Eko, New Medium, Old Free Speech Regimes: The His<strong>to</strong>rical and Ideological<br />

Foundations <strong>of</strong> French & American Regulation <strong>of</strong> Bias-Motivated Speech and Symbolic Expression<br />

on <strong>the</strong> <strong>Internet</strong>, 28 LOY. L.A. INT’L & COMP. L. REV. 69, 123–24 (2006) (noting<br />

a possible connection between U.S. prior restraint doctrine and <strong>the</strong> U.S. conception <strong>of</strong><br />

<strong>the</strong> <strong>Internet</strong> as a “free marketplace <strong>of</strong> ideas”); John G. Palfrey, Jr. & Robert Rogoyski,<br />

The Move <strong>to</strong> <strong>the</strong> Middle: The Enduring Threat <strong>of</strong> “Harmful” Speech <strong>to</strong> <strong>the</strong> End-<strong>to</strong>-End<br />

Principle, 21 WASH. U. J.L. & POL’Y 31, 52 (2006) (discussing a Pennsylvania law requiring<br />

ISPs <strong>to</strong> deny access <strong>to</strong> Web s<strong>it</strong>es containing child pornography and a court decision<br />

that declared <strong>the</strong> law unconst<strong>it</strong>utional, partly on prior restraint grounds) (c<strong>it</strong>ing<br />

Ctr. for Democracy & Tech. v. Pappert, 337 F. Supp. 2d 606 (E.D. Pa. 2004)); see also<br />

Zieper v. Metzinger, 392 F. Supp. 2d 516 (S.D.N.Y. 2005), aff’d, 474 F.3d 60 (2d Cir.<br />

2007).<br />

61. Exetel Hosting Support Facil<strong>it</strong>ies, Frequently Asked Questions, http://www.exetel.com<br />

.au/a_support_hosting.php#webspace2 (last vis<strong>it</strong>ed July 4, 2007).<br />

62. See Un<strong>it</strong>ed States v. Am. Library Ass’n, 539 U.S. 194, 215–16 (Breyer, J., concurring)<br />

(2003) (arguing that <strong>the</strong> standard should have been heightened scrutiny for a law requiring<br />

libraries <strong>to</strong> use filtering systems in order <strong>to</strong> receive public funding and noting<br />

that “[t]he [filtering] technology, in <strong>it</strong>s current form, does not function perfectly, for <strong>to</strong><br />

some extent <strong>it</strong> also screens out const<strong>it</strong>utionally protected materials that fall outside <strong>the</strong><br />

scope <strong>of</strong> <strong>the</strong> statute (i.e., ‘overblocks’) and fails <strong>to</strong> prevent access <strong>to</strong> some materials that<br />

<strong>the</strong> statute deems harmful (i.e., ‘underblocks’)”); ACLU v. Ashcr<strong>of</strong>t, 322 F.3d 240, 266–<br />

67 (3d Cir. 2003), aff’d and remanded by 542 U.S. 656 (2004) (“We conclude that [<strong>the</strong><br />

Child Online Protection Act (COPA)] is substantially overbroad in that <strong>it</strong> places significant<br />

burdens on Web publishers’ communication <strong>of</strong> speech that is const<strong>it</strong>utionally<br />

protected as <strong>to</strong> adults and adults’ abil<strong>it</strong>y <strong>to</strong> access such speech. In so doing, COPA encroaches<br />

upon a significant amount <strong>of</strong> protected speech beyond that which <strong>the</strong> Government<br />

may target const<strong>it</strong>utionally in preventing children’s exposure <strong>to</strong> material that is obscene<br />

for minors.”); Ka<strong>the</strong>rine A. Miltner, Note, Discrimina<strong>to</strong>ry Filtering: CIPA’s Effect

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!