Notes: Chapter 4

1See Kevin Burns, TCP/IP Analysis and Troubleshooting Toolkit 5–28 (2003), available at http://www.wiley.com (search for ISBN “978-0-471-42975-3” and select “Read Excerpt 1”) (describing the seven-layer OSI protocol model and the four-layer DOD protocol model, the two foundational network communications protocols).

2. Thus this book’s earlier description, in Chapter One, of four layers: technology, including physical and protocol; application; content; and social.

3See infra note 72.

4. Microsoft and Apple have both shown interest in becoming one-stop shops for applications that run on their respective platforms. Software packages like Office and iLife suggest the broad market that their respective makers hope to capture. See Apple, iLife, http://www.apple.com/ilife (last visited May 16, 2007); Microsoft, Office Products, http://www.microsoft.com/products (select “Office” from left-hand navigation bar) (last visited May 16, 2007). This all-in-one approach does carry some legal risks: for example, in a recent antitrust case, Microsoft was accused of putting a thumb on the scale for its own browser, not by designing its system to exclude new code, but by exploiting the power of system default options. See United States v. Microsoft Corp., 159 F.R.D. 318, 321 (D.D.C. 1995) (discussing the antitrust investigation against Microsoft and subsequent charges).

5See John Markoff, Apple Earnings Bolstered by iPod and Notebook Sales, N.Y. Times, July 20, 2006, at C3 (reporting Apple’s 4.6 percent share of the U.S. PC market).

6See Donald A. Norman, The Invisible Computer 52 (1998) (arguing that the usefulness of a tool for a particular task is the key virtue of “information appliances”). Indeed, “the primary motivation behind the information appliance is clear: simplicity. Design the tool to fit the task so well that the tool becomes a part of the task . . . . The primary advantages of appliances come from their ability to provide a close fit with the real needs of their users, combined with the simplicity and elegance that arises from focus upon a simple activity.” Id.

7. In fact, Norman argues that multifunction tools are not necessarily preferable to tools featuring fewer functions: “Take another look at the Swiss Army knife, one of those knives with umpteen blades. Sure, it is fun to look at, sure it is handy if you are off in the wilderness and it is the only tool you have, but of all the umpteen things it does, none of them are done particularly well.” Id. at 71.

8. Historically, the adjective “plastic” has meant “moldable” or “sculptable,” from Greek; about a century ago it came to refer to a new class of materials capable of being molded in a soft or molten state, then hardened. See Oxford English Dictionary (2d ed. revised 2005) (“plastic: adjective . . . [of substances or materials] easily shaped or moulded: rendering the material more plastic; relating to moulding or modelling in three dimensions, or to produce three-dimensional effects: the plastic arts; [in science and technology] of or relating to the permanent deformation of a solid without fracture by the temporary application of force . . . from French plastique or Latin plasticus, from Greek plastikos, from plassein ‘to mould’); see also Lawrence Lessig, Social Norms, Social Meaning, and the Economic Analysis of Law, 27 J. Legal Stud. 661 (1998).

9. GNU, The Free Software Definition, http://www.gnu.org/philosophy/free-sw.html (last visited May 16, 2007). This definition should not be confused with Franklin D. Roosevelt’s Four Freedoms. See Franklin D. Roosevelt, President of the United States, Annual Message to Congress (“Four Freedoms Speech”) (Jan. 6, 1941), in 87 Cong. Rec. 44, 46–47 (1941), available at http://www.ourdocuments.gov/doc.php?flash=true&doc;=70&page;=pdf.

10. Cooperative Linux is an example of a free, open source method for running Linux on Microsoft Windows. See coLinux, http://www.colinux.org (last visited May 16, 2007). Conversely, Wine is an open source implementation of Windows on top of Unix. See WineHQ, http://www.winehq.com (last visited May 16, 2007).

11. The Free Software Foundation is working to change its licenses to prohibit bolting a generative system inside a non-generative one. See Free Software Found., GPLv3, http://gplv3.fsf.org (last visited May 16, 2007) (discussing the rationale for the new provisions).

12. For a general discussion of objective affordances, see James J. Gibson, The Theory of Affordancesin Perceiving, Acting, and Knowing (Robert Shaw & John Bransford eds., 1978). For a discussion of subjective affordances, see Donald A. Norman, The Psychology of Everyday Things (1998), which defines “affordance” as “the perceived and actual properties of the thing, primarily those fundamental properties that determine just how the thing could possibly be used.” Id. at 9. For example, a “chair affords (‘is for’) support and, therefore, affords sitting.” (emphasis added). Id.

13See, e.g., Lawrence Lessig, The Future of Ideas: The Fate of the Commons in a Connected World (2002).

14See Brett M. Frischmann, An Economic Theory of Infrastructure and Commons Management, 89 Minn. L. Rev. 917, 918–19 (2005).

15. Tim Wu, Network Neutrality, Broadband Discrimination, 2 J. Telecomm. & High Tech. Law 141, 145–47 (2003).

16See, e.g., Clayton M. Christensen, The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail xiii–xvii (1997); Rebecca Henderson, The Innovator’s Dilemma as a Problem of Organizational Competence, 23 J. Product Innovation Mgmt. 5, 6–7 (2006).

17See Cubby, Inc. v. CompuServe, Inc., 766 F. Supp. 135, 139–40 (S.D.N.Y. 1991) (discussing the nature of CompuServe’s involvement in running the forums).

18See Advances in Behavioral Economics (Colin F. Camerer, George Loewenstein & Matthew Rabin eds., 2003); Christine Jolls, Cass R. Sunstein & Richard Thaler, A Behavioral Approach to Law and Economics, 50 Stan. L. Rev. 1471 (1998); Daniel Kahneman & Amos Tversky, Prospect Theory: An Analysis of Decision Under Risk, 47 Econometrica 263 (1979).

19See Cass R. Sunstein, Infotopia 80 (2006).

20. Tim Wu, Wireless Carterfone, 1 Int’l. J. Comm. 389, 404–15 (2007), available at http://ijoc.org/ojs/index.php/ijoc/article/view/152/96.

21See id. at 419.

22. Andrew Currah, Hollywood, the Internet and the World: A Geography of Disruptive Innovation, 14 Industry & Innovation 359 (2007).

23Id.

24See Christensen, supra note 16.

25Id. at 15 (footnote omitted).

26Id. at 24.

27See Henderson, supra note 16.

28See Mary J. Benner & Michael L. Tushman, Exploitation, Exploration, and Process Management: The Productivity Dilemma Revisited, 28 Acad. Mgmt. Rev. 238, 240 (2003).

29See Google Jobs, http://www.google.com/support/jobs/bin/static.py?page=about.html (last visited May 16, 2007).

30See supra Ch. 2, p. 12.

31See Intermatic, Inc. v. Toeppen, 947 F. Supp. 1227 (N.D. Ill. 1996) (discussing the actions of Dennis Toeppen, who registered over two hundred domain names associated with leading companies which had neglected to register those names themselves).

32See Joshua Quittner, Billions Registered, Wired News, Oct. 1994, http://www .wired.com/wired/archive/2.10/mcdonalds.html.

33. According to Alexa.com, which monitors Internet traffic, as of March 2, 2007, Ebay.com was the seventh-most-visited Web site in the United States, and Craigslist.org was the tenth. See Alexa.com, http://www.alexa.com/site/ds/top_sites?cc=US&ts;_mode=country?=none (last visited Sep. 29, 2007).

34See Chris Anderson, The Long Tail: Why the Future of Business Is Selling Less of More 50–51 (2006).

35See, e.g., Eric Von Hippel, Democratizing Innovation 19 (2005); Eric Von Hippel, The Sources of Innovation 25 (1988); Eric Von Hippel, Christoph Hienerth, & Peter Kragh, Slides: Users as Innovators: Implications for Denmark’s User-Centered Innovation Initiative Address at Copenhagen Business School (on file with author).

36See William E. Splinter, Center-pivot Irrigation, 234 Sci. Am. 90 (June 1976); Eric von Hippel, Remarks at the Berkman Center for Internet and Society (Aug. 30, 2007) (notes on file with author).

37. Eric von Hippel, supra note 36; REI, CamelBak, http://www.rei.com/product/733668 (last visited Sep. 28, 2007).

38See Mark Brogan, Clock Speed: A Provenance Retrospective on Two Decades of Personal Computing, Provenance, Mar. 1996, http://www.netpac.com/provenance/vol1/no2/features/clkspd3.htm.

39See Laura Dunphy, Star Search, L.A. Bus. J., Mar. 13, 2000, at 1 (reporting that it costs the recording industry approximately $1 million to launch a new recording artist); Jennifer Ordonez, Behind the Music: MCA Spent Millions on Carly Hennessy—Haven’t Heard of Her?—Pop Hopeful’s Washout Is All-Too-Familiar Tune, Wall St. J., Feb. 26, 2002, at A1 (reporting that of the thousands of albums released in the United States each year by the five major recording companies, fewer than 5 percent become profitable).

40See Larry Downes & Chunka Mui, Unleashing The Killer App: Digital Strate- gies for Market Dominance (1998); see also Simple Programs Make File Sharing Inevitable, New Scientist, Jan. 8, 2005, at 20, available at http://www.newscientist.com/article.ns?id=mg18524812.900 (discussing Tiny P2P, a peer-to-peer file-sharing program written by Edward Felten of Princeton University that consists of only fifteen lines of code).

41See generally David Both, A Short History of OS/2 (2002), available at http://www.millennium-technology.com/HistoryOfOS2.html (providing a general history of the IBM OS/2 operating system).

42See Frederic E. Davis, Open Letter, Red Herring, Oct. 1, 1995, available at http://www.weblust.com/writing/herring2.html.

43See Jay P. Kesan & Rajiv C Shah, Deconstructing Code, 6 Yale J. L. & Tech. 277, 292– 97 (2004).

44See Posting of Moorman to Forums: SourceForge.net, http://sourceforge.net/forum/forum.php?forum_id=425379 (Nov. 23, 2004) (“The viral nature of open source quickly became apparent when we first opened the site to the public. Since 1999 our biggest challenge has been trying to stay ahead of the growth curve. Today we have close to 1,000,000 users and 100,000 projects.”). As of September 2007, the SourceForge front page reported that there were 158,761 projects. SourceForge.net, http://sourceforge.net (last visited Sep. 29, 2007).

45See generally Yochai Benkler, Coase’s Penguin, or, Linux and the Nature of the Firm, 112 Yale L.J. 369, 371 (2002) (“At the heart of the economic engine of the world’s most advanced economies, . . . we are beginning to take notice of a hardy, persistent, and quite amazing phenomenon. A new model of production has taken root, one that should not be there, at least according to our most widely held beliefs about economic behavior. The intuitions of the late twentieth century American resist the idea that thousands of volunteers could collaborate on a complex economic project. . . . And yet, this is precisely what is happening in the software industry.”).

46See, e.g., TrueCrypt: Free Open-Source On-The-Fly Encryption, http://truecrypt.sourceforge.net (last visited May 16, 2007).

47See, e.g., eMule, http://www.emule-project.net/home/perl/general.cgi?l=1 (last visited May 16, 2007).

48See, e.g., Citadel: The Groupware Server for Web 2.0, http://www.citadel.org (last visited May 16, 2007).

49See, e.g., Wikipedia, Comparison of Web Browsershttp://en.wikipedia.org/wiki/Comparison_of_web_browsers (as of May 5, 2007, 00:24 GMT).

50See, e.g., GIMP, http://www.gimp.org (last visited May 16, 2007) (providing access to, and assistance with, the GNU image manipulation program); MusE-Linux Music Editor, http://sourceforge.net/projects/lmuse (last visited May 16, 2007). A more comprehensive list of current SourceForge projects can be found on Wikipedia. See Wikipedia, Category: SourceForge Projectshttp://en.wikipedia.org/wiki/Category:SourceForge_projects (as of Apr. 5, 2007, 17:51 GMT).

51. Eric Raymond refers in this regard to the concept of “indirect sale value.” See Eric S. Raymond, The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary (1999); see also Mikko Välimäki, Dual Licensing in Open Source Software Industry, 8 Systemes d’Information et Management 63 (2003) (discussing the related phenomenon of software distributed under a “dual license” system).

52. In 1998, browser pioneer Netscape reacted to the dominance of rival Microsoft’s Internet Explorer by releasing the code for its flagship software under a public license (the “Netscape Public License”), which enabled the public to freely use and develop the software, while allowing the company to continue publishing proprietary software based upon it. See Netscape Public License: Version 1.0, http://www.mozilla.org/MPL/NPL-1.0.html (last visited May 16, 2007); see also Netscape, Netscape Communicator Open Source Code White Paper (2000), available at http://wp.netscape.com/browsers/future/whitepaper.html. This process marked the beginning of the Mozilla open source project. Today, the commercial imperative no longer exists; however, one of the most common Internet browsers, Mozilla Firefox, and a leading e-mail client, Mozilla Thunderbird, have their genesis in this process. Another example is OpenOffice.org, a set of freely available Microsoft Office–style applications, which is based on proprietary code released by its owners, Sun. Users continue to develop OpenOffice.org, which is freely available, while Sun markets the “StarOffice Office Suite,” a “professional office productivity solution based on OpenOffice.org that provides enterprise value-add components including administration tools, commercial quality spellchecker and relational database.” OpenOffice.org, http://www.sun.com/software/star/openoffice/index.xml (last visited May 16, 2007).

53. Even these organizations have made their content available to subscribers through the Web, whereas formerly it was accessible solely via their own proprietary software. See Terry Psarras, Lexis & Westlaw: Proprietary Software Versus Browser Based, LLRX.com, Sept. 3, 2001, http://www.llrx.com/features/webvsoftware.htmsee also Linnea Christiani, Meeting the New Challenges and LexisNexis: Post-SIIA Summit Interviews with Michael Wilens and Lisa Mitnick, Searcher, May 2002, http://www.infotoday.com/searcher/may02/christiani.htm. Both Mitnick and Wilens noted that a key priority was expanding their stock of proprietary content that would not be available elsewhere. According to Mitnick, Senior Vice President of LexisNexis, “LexisNexis has focused on acquiring proprietary, value-added content, such as Shepard’s and Matthew Bender, and signed exclusive licensing agreements with CCH, Tax Analysts, and Congressional Quarterly.” Id. However, even these services are not without competition; there is a growing number of free legal information services including BAILII, which contains links to British and Irish law-related material; AsianLII, with databases covering twentyseven Asian countries and territories; and WorldLII, which aggregates these and other regional services. See, e.g., BAILII, http://www.bailii.org (last visited May 16, 2007); AsianLII, http://www.asianlii.org (last visited May 16, 2007); AustLII, http://www .austlii.org (last visited Mar. 28, 2007); WorldLII, http://www.worldlii.org (last visited May 16, 2007); see also FindLaw, http://www.findlaw.com (last visited June 2, 2007); Cornell Legal Information Institute, http://www.law.cornell.edu (last visited June 2, 2007).

54See The Hamster Dance, http://www.webhamster.com (last visited May 16, 2007).

55See Ina Fried, Apple: Widget Writers Wanted, ZDNet News, Dec. 9, 2004, http://news.zdnet.com/2100-3513_22-5486309.html (“The Mac maker has launched a contest for developers who create programs in Dashboard—a part of Tiger, the update to Mac OS X. . . . The idea behind Dashboard, as well as a similar third-party program called Konfabulator, is that computer users want easy access to small programs that do things like showing stock quotes or displaying photos. . . . [T]he company wants to jump-start development of the widgets that work with Dashboard. Apple is hoping that the prospect of creating widgets will appeal to more than just the usual crop of Apple developers, given that only standard Web site skills are needed.”).

56See Geoffrey A. Moore, Inside the Tornado: Marketing Strategies from Silicon Valley’s Cutting Edge 101 (1995); Geoffrey A. Moore, Inside the Tornado: Strategies for Developing, Leveraging, and Surviving Hypergrowth Markets (2004). Both identify different classes of technology adopters, including, notably, a “late majority” which require a complete product, with appropriate support and training, as they lack the financial and organizational capacity to undertake such tasks themselves. See generally Everett Rogers, Diffusion of Innovations (5th ed. 2003).

57. One example is the continuing success of the commercial Red Hat Enterprise Linux, despite the many freely available Linux distributions, including Fedora Core, on which Red Hat is based.

58See World Community Grid, http://www.worldcommunitygrid.org/index.html (last visited May 16, 2007) (“World Community Grid’s mission is to create the largest public computing grid benefiting humanity. Our work is built on the belief that technological innovation combined with visionary scientific research and large-scale volunteerism can change our world for the better.”). The site makes it easy to become involved: “Donate the time your computer is turned on, but is idle, to projects that benefit humanity!” Id.

59See SETI@home, http://setiathome.berkeley.edu (last visited Dec. 1, 2007); see also Wikipedia, SETI@homehttp://en.wikipedia.org/wiki/Seti_at_home (as of May 12, 2007, 02:06 GMT).

60. BitTorrent allows many people to download the same file without slowing down everyone else’s download. This is possible because downloaders swap portions of the file with one another, instead of downloading it all from a single server. As each downloader uses up bandwidth, he also contributes bandwidth back to the swarm. This contribution is encouraged because those clients trying to upload to other clients gets the fastest downloads. See BitTorrent, What is Bit Torrent?, http://www.bittorrent.com/what-is-bittorrent (last visited May 16, 2007); see also Wikipedia, BitTorrenthttp://en.wikipedia.org/wiki/Bittorrent (as of Mar. 28, 2007, 16:30 GMT).

61. John Stuart Mill, On Liberty and Other Essays 75 (John Gray ed., 1998).

62Id.

63. Yochai Benkler, The Wealth of Networks 275 (2006).

64Id. at 277; see also Yochai Benkler, Freedom in the Commons: Towards a Political Economy of Information, 52 Duke L.J. 1245, 1248–49 (2003) (“Together these shifts can move the boundaries of liberty along all three vectors of liberal political morality. They enable democratic discourse to flow among constituents, rather than primarily through controlled, concentrated, commercial media designed to sell advertising, rather than to facilitate discourse. They allow individuals to build their own windows on the world, rather than seeing it largely through blinders designed to keep their eyes on the designer’s prize. They allow passive consumers to become active users of their cultural environment, and they allow employees, whose productive life is marked by following orders, to become peers in common productive enterprises. And they can ameliorate some of the inequalities that markets have often generated and amplified.”).

65. Yochai Benkler, Sharing Nicely: On Shareable Goods and the Emergence of Sharing as a Modality of Economic Production, 114 Yale L.J. 273 (2004).

66See Yochai Benkler & Helen Nissenbaum, Commons-based Peer Production and Virtue, 14 J. Pol. Phil. 394 (2006) (arguing that socio-technical systems of commons-based peer production offer not only a remarkable medium of production for various kinds of information goods, but also serve as a context for positive character formation, as a society that provides opportunities for virtuous behavior is one that is more conducive to virtuous individuals, and suggesting that the practice of effective, virtuous behavior may lead to more people adopting the virtues as their own, or as attributes of what they see as their self-definition).

67See John Fiske, Television Culture (1988).

68. William W. Fisher III, Theories of Intellectual Property, in New Essays in the Legal and Political Theory of Property 169–73 (Stephen R. Munzer ed., 2001).

69See Edward Tufte, The Cognitive Style of PowerPoint: Pitching Out Corrupts Within (2003).

70. Neil Postman, Building a Bridge to the 18th Century: How the Past Can Improve Our Future (1999).

71. Neil Postman, Technopoly: The Surrender of Culture to Technology (1992).

72See Raaj Kumar Sah & Joseph E. Stiglitz, The Architecture of Economic Systems: Hierarchies and Polyarchies, 76 Am. Econ. Rev. 716 (1986); Raaj K. Sah & Joseph E. Stiglitz, The Quality of Managers in Centralized Versus Decentralized Organizations, 106 Q.J. Econ. 289 (1991). These articles are summarized well in Tim Wu, Intellectual Property, Innovation, and Decentralized Decisions, 92 Va. L. Rev. 123 (2006).

73See Paul Freiberger & Michael Swaine, Fire in the Valley 204 (2d ed. 2000).

74See CVS Wiki, http://ximbiot.com/cvs/wiki/index.php (as of May 16, 2007, 12:00 GMT); see also Simson Garfinkel, Super Sync, Tech. Rev., Nov. 11, 2001, at 11, available at http://www.technologyreview.com/Infotech/12642/.

75See CERN, Basic Description of the CVS System, http://wwwasd.web.cern.ch/wwwasd/cvs/tutorial/cvs_tutorial_1.html#SEC1 (last visited May 16, 2007).

76See About the World Wide Web Consortium (W3C), http://www.w3.org/Consortium (last visited May 16, 2007). Notes to Pages 91–95 273 YD8852.249-328 1/30/08 12:55 PM Page 273

77See Comm. on the Internet in the Evolving Info. Infrastructure et al., The Internet’s Coming of Age 408–10 (2001); World Wide Web Consortium, HTML Converters, http://www.w3.org/Tools/Filters.html (last visited May 16, 2007) (providing information on various means to convert to and from HTML, as well as links to secondary sources).

78See I Made This!; New Tools and Services Make It Surprisingly Easy—Not to Mention Cheap—to Build Your Own Website, Fortune, Winter 2000 (Special Issue), at 229.

79See David Kline & Dan Burstein, Blog!: How the Newest Media Revolution Is Changing Politics, Business, and Culture (Arne J. De Keijzer & Paul Berger eds., 2005).

80See Fredrik Wacka, Why Blogs Rank High in Search Engines, WebProNews, Jan. 4, 2005, http://www.webpronews.com/insiderreports/2005/01/04/why-blogs-rank-high-in-search-engines (explaining that blog entries rank high because they are filled frequently with relevant keywords, cut straight to the point, use entry titles as page titles, are coded well, and usually stick to one topic per post).

81See Lost Camera, http://lostcamera.blogspot.com.

82See Peter Meyers, Fact-Driven? Collegial? Then This Site Wants You, N.Y. Times, Sept. 20, 2001, at G2.

83See Ward Cunningham, Wiki Design Principles http://www.c2.com/cgi/wiki?WikiDesignPrinciples (as of Mar. 26, 2007, 12:00 GMT) (explaining that his goals for the first release of Wiki included designing an “organic” system in which “[t]he structure and text content of the site are open to editing and evolution,” in which “[t]he mechanisms of editing and organizing are the same as those of writing so that any writer is automatically an editor and organizer,” and in which “[a]ctivity within the site can be watched and reviewed by any other visitor to the site”). Cunningham also notes that an additional principle was that “[e]verybody can contribute; nobody has to.” Id.

84See Meyers, supra note 82; Wikipedia, Ward Cunninghamhttp://en.wikipedia.org/wiki/Ward_Cunningham (as of May 10, 2007, 13:31 GMT); Wikipedia, Wikihttp://en.wikipedia.org/wiki/WikiWiki (as of May 16, 2007, 23:11 GMT).

85See Wikipedia, Wikisupra note 84; Wikipedia, Wikipediahttp://en.wikipedia.org/wiki/Wikipedia#History (as of May 16, 2007, 15:44 GMT).

86. For further discussion of commons-based peer production (including an examination of free software and Wikipedia) as an alternate economic modality, see Benkler, supra note 65, at 334–36.

87. There is evidence this is, in fact, already occurring. See Don Tapscott & Anthony D. Williams, Wikinomics: How Mass Collaboration Changes Everything (2006); Chrysanthos Dellarocas, Strategic Manipulation of Internet Opinion Forums: Implications for Consumers and Firms, 52 Mgmt. Sci. 1577 (2006), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=585404; Von Mathias Peer, Wikipedia-Artikel, Die Man Kaufen Kann, WeltOnline, Aug. 24, 2006, http://www.welt.de/data/2006/08/24/1009086.html.

88. For a good discussion of the evolution of domain name disputes, see Archived Information for Domain Name Disputes, http://domains.org/archived_domain_disputes.html (last visited Mar. 28, 2007) (providing links to discussions about domain name disputes); see also R. Lynn Campbell, Judicial Involvement in Domain Name Disputes in Canada, 34 Revue de Droit de l’Universite de Sherbrooke 373 (2003); Jacqueline D. Lipton, Beyond Cybersquatting: Taking Domain Name Disputes Past Trademark Policy, 40 Wake Forest L. Rev. 1361 (2005); Colby B. Springer, Master of the Domain (Name): A History of Domain Name Litigation and the Emergence of the Cybersquatting Consumer Protection Act and the Uniform Dispute Resolution Policy, 17 Santa Clara Computer & High Tech L.J. 315 (2003).

89. A fair unit of measurement, given creativity’s role as an essential ingredient of the “good life.” See William W. Fisher III, Reconstructing the Fair Use Doctrine, 101 Harv. L. Rev. 1661, 1746–51 (1988). A “good society” encourages its members to live lives of self-determination and creativity by facilitating “conditions that increase and make more apparent people’s opportunities for self-expression and communication,” fostering a rich and shared artistic tradition, and encouraging and protecting the formation of communities and “constitutive group affiliations”—all of which are roles that the Internet increasingly fulfills. Id. at 1751–53.

90See William W. Fisher III, Promises to Keep: Technology, Law, and the Future of Entertainment 28–31 (2004).

91. Such a scenario need not be hypothetical. See, e.g., Ken Silverstein, The Radioactive Boy Scout, Harper’s Mag., Nov. 1998, at 59 (recounting the story of a child who created a nuclear reactor in his backyard shed).

92See Ultramares Corp. v. Touche, Niven & Co., 174 N.E. 441 (N.Y. 1931).

93. The term is said to have been coined in 1991 by D. James Bidzos, the then-president of RSA Data Security, when he said that the government’s digital signature standard provided “no assurance that foreign governments cannot break the system, running the risk of a digital Pearl Harbor.” See Scott Berinato, The Future of Security, CIO.com, Dec. 30, 2003, www.cio.com/article/32033/The_Future_of_Security. The term has since become prominent in public debate, being employed most notably by former member of the National Security Council Richard A. Clarke. See Assoc. Press, U.S. Cyberspace Chief Warns of ‘Digital Pearl Harbor,’ CNN.com, Dec. 8, 2000, http://archives.cnn.com/2000/TECH/computing/12/08/security.summit.ap/.

94See Benkler, supra note 1, in Notes to Introduction to Part II, note 1, at 23.

95See Mill, supra note 61, at 75.

96See Chapter Nine for a full discussion of this problem.

97See Mill, supra note 61, at 73.

98See Postini StatTrack, http://www.postini.com/stats (last visited May 16, 2007).