17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Notes <strong>to</strong> Pages 197–202 311<br />

96. See Doug Lichtman & David Jacobson, Anonym<strong>it</strong>y a Double-Edged Sword for Pirates<br />

Online, CHICAGO TRIB., Apr. 13, 2000, at N25 (describing <strong>the</strong> music industry’s attempt<br />

<strong>to</strong> “take aim at <strong>the</strong> pirates’ ships” by flooding file-sharing s<strong>it</strong>es w<strong>it</strong>h thousands <strong>of</strong><br />

decoy files w<strong>it</strong>h names similar <strong>to</strong> popular songs).<br />

97. For one such proposal, see WILLIAM W. FISHER III, PROMISES TO KEEP 199‒259<br />

(2004). But see Salil Mehra, The iPod Tax: Why <strong>the</strong> Dig<strong>it</strong>al Copyright System <strong>of</strong> American<br />

Law Pr<strong>of</strong>essors’ Dreams Failed in Japan, 79 U. COLO. L. REV. (forthcoming 2008),<br />

available at http://ssrn.com/abstract 1010246 (noting that a dig<strong>it</strong>al recording tax in<br />

Japan similar <strong>to</strong> <strong>the</strong> proposals made by Fisher and o<strong>the</strong>rs failed <strong>to</strong> produce <strong>it</strong>s intended<br />

result).<br />

98. See, e.g., Terry Frieden, 27 Charged in Child Porn Sting, CNN.COM, Mar. 16, 2006,<br />

http://www.cnn.com/2006/LAW/03/15/childporn.arrests/index.html (describing a<br />

child pornography bust by <strong>the</strong> U.S. Department <strong>of</strong> Justice in early 2006 and <strong>the</strong> use <strong>of</strong><br />

<strong>Internet</strong> secur<strong>it</strong>y measures <strong>to</strong> try <strong>to</strong> keep file-sharing out <strong>of</strong> <strong>the</strong> eye <strong>of</strong> <strong>the</strong> law, and<br />

s<strong>how</strong>ing that <strong>the</strong> eventual infiltration <strong>of</strong> this group by law enforcement was due <strong>to</strong> <strong>the</strong><br />

fact <strong>the</strong> group was open—even if only a l<strong>it</strong>tle—<strong>to</strong> new members not personally known<br />

by existing members).<br />

99. See, e.g., ROBERT J. BUNKER, NETWORKS, TERRORISM AND GLOBAL INSURGENCY 150<br />

(2006) (noting, in <strong>the</strong> context <strong>of</strong> a general analysis <strong>of</strong> <strong>the</strong> effects <strong>of</strong> networks on terrorism<br />

and global conflict, that Al Qaeda has been “increasing <strong>it</strong>s use <strong>of</strong> <strong>the</strong> <strong>Internet</strong> for<br />

propaganda, recru<strong>it</strong>ing and training purposes”); GUS MARTIN, UNDERSTANDING TER-<br />

RORISM 406–12 (2003) (describing <strong>how</strong> <strong>the</strong> <strong>Internet</strong> facil<strong>it</strong>ates <strong>the</strong> interests <strong>of</strong> terrorists,<br />

such as through <strong>the</strong>ir use <strong>of</strong> chat rooms, which improve communication w<strong>it</strong>h new<br />

recru<strong>it</strong>s and existing members, especially when members are separated by a large distance);<br />

D. WHITTAKER, TERRORISTS AND TERRORISM IN THE CONTEMPORARY WORLD<br />

39 (2004) (discussing <strong>Internet</strong> use by <strong>the</strong> Liberation Tigers <strong>of</strong> Tamil Elam, in Sri<br />

Lanka, <strong>to</strong> “pump out propaganda and <strong>to</strong> recru<strong>it</strong> <strong>the</strong>ir ranks”). See generally GABRIEL<br />

WEIMANN, TERROR ON THE INTERNET (2006);<br />

100. BENKLER, supra note 77, at 287–88.<br />

101. See Isaiah Berlin, Two Concepts <strong>of</strong> Liberty, in FOUR ESSAYS ON LIBERTY 122 (1969).<br />

CHAPTER 9. MEETING THE RISKS OF GENERATIVITY<br />

1. ADVISORY COMM. TO THE SEC’Y OF HEALTH, EDUC. & WELFARE, RECORDS, COMPUT-<br />

ERS AND THE RIGHTS OF CITIZENS, at § II (1973), available at http://aspe.hhs.gov/<br />

datacncl/1973privacy/<strong>to</strong>cprefacemembers.htm.<br />

2. See Daniel J. Solove, Privacy and Power: Computer Databases and Metaphors for Information<br />

Privacy, 53 STAN. L. REV. 1393 (2001) (examining <strong>the</strong> dangers <strong>to</strong> personal privacy<br />

posed by electronic databases).<br />

3. See generally id.<br />

4. U.S. S. COMM. ON GOV’T OPERATIONS & U.S. H. GOV’T OPERATIONS SUBCOMM. ON<br />

GOV’T INFO. & INDIVIDUAL RIGHTS, LEGISLATIVE HISTORY OF THE PRIVACY ACT OF<br />

1974, at 9–28, 97–150, available at http://www.loc.gov/rr/frd/Mil<strong>it</strong>ary_Law/LH_

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!