Preface To The Second Edition Preface To The First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles From Cyberspace Borders Governors Jake’s Communities Worms That Sniff Themes Regulability Regulation by Code Latent Ambiguity Competing Sovereigns Part One. “Regulability” Chapter 3. Is-ism is the way it is the way it must be? Cyber-places: Harvard Versus Chicago Chapter 4. Architectures Of Control Who did What, Where?Identity and Authentication: Real Space Identity and Authentication: Cyberspace Identity and Authentication: Regulability Architectures of Identification Who Did What, Where? Who Did What, Where? Results Chapter 5. Regulating Code Regulating Architecture: The regulatory two-step Car Congestion Telephones Telephones: Part 2 Data Retention Encryption Regulating Code to Increase Regulability The General Form East Coast and West Coast Codes Z-Theory Part Two - Regulation By Code Chapter 6. Cyberspaces The Values of a Space Cyber-places America Online Counsel Connect LambdaMOO .law.cyber SecondLi(f/v)e(s) The Internet How Architectures Matter and Spaces Differ Regulating Code to Regulate Better Tapes Televisions Anti-Circumvention Broadcast Flags Chapter 7. What Things Regulate A Dot’s Life On Governments and Ways to Regulate The Problems of Indirection Where This Leads Chapter8. The Limits In Open Code Bytes That Sniff Machines That Count Code on the Net A Short History of Code on the Net Regulating Open Code Where This Leads Part Three - Latent Ambiguities Chapter 9. Translation Chapter 10. Intellectual Property On the Reports of Copyright’s Demise Law to the Rescue The Promise for Intellectual Property in Cyberspace The Limits on the Protection of Property Private Substitutes for Public Law The Anonymity That Imperfection Allows Permission Culture vs. Free The Problems That Perfection Makes Choices Anonymity The Commons Chapter 11. Privacy Privacy in Private Privacy in Public: Surveillance The Internet Searches E-mail V-mail Voice Video Body Parts Privacy in Public: Data Solutions Surveillance Control of Data (1) Limits on Choice (2) The Process to Protect Privacy (3) Rules to Enable Choice About Privacy Privacy Compared Chapter 12. Free Speech The Regulators of Speech: Publication Regulations of Speech: Spam and Porn Real-Space Regulations: Spam and Porn Cyberspace Regulations: Spam and Porn Regulating Net-Porn Regulating Spam The Regulations of Speech: Free Culture The Regulators of Speech: Distribution Speech Lessons Chapter 13. Interlude Part Four - Competing Sovereigns Chapter 14. Sovereignty The Sovereign of the Space: Rules The Sovereign of the Space: Choosing Rules Chapter 15. Competition Among Sovereigns Conflicts 1. Protecting the French 2. Protecting Hollywood Reciprocal Blindness On Being “in” Cyberspace Possible Resolutions The No Law Rule The One Law Rule The Many Laws Rule (and the technology to make it possible) Part Five - Responses Chapter 16. The Problems We Face Problems with Courts Problems with Legislators Problems with Code Chapter 17. Responses Responses of a Judiciary Responses for Code Responses of a Democracy Chapter 18. What Declan Doesn't Get Appendix Footnotes 1. 1. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 1. 2. 3. 4. 5. 6. 7. 8. 9. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 1. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 1. 2. 3. 4. 5. 6. 7. 8. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
Themes Four stories, four themes, each a window into one aspect of cyberspace that will be central in all that follows. My aim in the balance of this book is to work through the issues raised by these four themes. I thus end this chapter with a map of the four, laid out in the order they will appear in the balance of the book. That order begins with story number two.