Preface To The Second Edition Preface To The First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles From Cyberspace Borders Governors Jake’s Communities Worms That Sniff Themes Regulability Regulation by Code Latent Ambiguity Competing Sovereigns Part One. “Regulability” Chapter 3. Is-ism is the way it is the way it must be? Cyber-places: Harvard Versus Chicago Chapter 4. Architectures Of Control Who did What, Where?Identity and Authentication: Real Space Identity and Authentication: Cyberspace Identity and Authentication: Regulability Architectures of Identification Who Did What, Where? Who Did What, Where? Results Chapter 5. Regulating Code Regulating Architecture: The regulatory two-step Car Congestion Telephones Telephones: Part 2 Data Retention Encryption Regulating Code to Increase Regulability The General Form East Coast and West Coast Codes Z-Theory Part Two - Regulation By Code Chapter 6. Cyberspaces The Values of a Space Cyber-places America Online Counsel Connect LambdaMOO .law.cyber SecondLi(f/v)e(s) The Internet How Architectures Matter and Spaces Differ Regulating Code to Regulate Better Tapes Televisions Anti-Circumvention Broadcast Flags Chapter 7. What Things Regulate A Dot’s Life On Governments and Ways to Regulate The Problems of Indirection Where This Leads Chapter8. The Limits In Open Code Bytes That Sniff Machines That Count Code on the Net A Short History of Code on the Net Regulating Open Code Where This Leads Part Three - Latent Ambiguities Chapter 9. Translation Chapter 10. Intellectual Property On the Reports of Copyright’s Demise Law to the Rescue The Promise for Intellectual Property in Cyberspace The Limits on the Protection of Property Private Substitutes for Public Law The Anonymity That Imperfection Allows Permission Culture vs. Free The Problems That Perfection Makes Choices Anonymity The Commons Chapter 11. Privacy Privacy in Private Privacy in Public: Surveillance The Internet Searches E-mail V-mail Voice Video Body Parts Privacy in Public: Data Solutions Surveillance Control of Data (1) Limits on Choice (2) The Process to Protect Privacy (3) Rules to Enable Choice About Privacy Privacy Compared Chapter 12. Free Speech The Regulators of Speech: Publication Regulations of Speech: Spam and Porn Real-Space Regulations: Spam and Porn Cyberspace Regulations: Spam and Porn Regulating Net-Porn Regulating Spam The Regulations of Speech: Free Culture The Regulators of Speech: Distribution Speech Lessons Chapter 13. Interlude Part Four - Competing Sovereigns Chapter 14. Sovereignty The Sovereign of the Space: Rules The Sovereign of the Space: Choosing Rules Chapter 15. Competition Among Sovereigns Conflicts 1. Protecting the French 2. Protecting Hollywood Reciprocal Blindness On Being “in” Cyberspace Possible Resolutions The No Law Rule The One Law Rule The Many Laws Rule (and the technology to make it possible) Part Five - Responses Chapter 16. The Problems We Face Problems with Courts Problems with Legislators Problems with Code Chapter 17. Responses Responses of a Judiciary Responses for Code Responses of a Democracy Chapter 18. What Declan Doesn't Get Appendix Footnotes 1. 1. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 1. 2. 3. 4. 5. 6. 7. 8. 9. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 1. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 1. 2. 3. 4. 5. 6. 7. 8. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
Regulability “Regulability” is the capacity of a government to regulate behavior within its proper reach. In the context of the Internet, that means the ability of the government to regulate the behavior of (at least) its citizens while on the Net. The story about Boral was thus a story about regulability, or more specifically, about the changes in regulability that cyberspace brings. Before the Internet, it was relatively easy for the attorney general of Boral to control commercial gambling within her jurisdiction; after the Internet, when the servers moved outside of Boral, regulation became much more difficult.
For the regulator, this is just a particular instance of a much more general story. To regulate well, you need to know (1) who someone is, (2) where they are, and (3) what they’re doing. But because of the way the Internet was originally designed (and more on this below), there was no simple way to know (1) who someone is, (2) where they are, and (3) what they’re doing. Thus, as life moved onto (this version of) the Internet, the regulability of that life decreased. The architecture of the space — at least as it was — rendered life in this space less regulable.
The balance of Part I is about regulability. Can we imagine a more regulable cyberspace? Is this the cyberspace we are coming to know?