See Mitchell Kapor, 'The Software DesignManifesto,' available at http://hci.stanford.edu/bds/1-kapor.html (cached: http://www.webcitation.org/5IwlcyQ3F); David Farber, 'A Note on the Politics of Privacy and Infrastructure,' November 20, 1993, available at http://www.interesting-people.org/archives/interesting- people/199311/msg00088.html (cached: http://www.webcitation.org/5IwlerVLw); 'Quotations,' available at http://www.cs.arizona.edu/icon/oddsends/farber.htm (cached: http://www.webcitation.org/5IwlhA4Sz); see also Pamela Samuelson et al., 'A Manifesto Concerning the Legal Protection of Computer Programs,'
23.
Jed Rubenfeld has developed most extensively an interpretive theory that grounds meaning in a practice of reading across time, founded on paradigm cases; see 'Reading the Constitution as Spoken,'
24.
See
25.
See Steve Silberman, 'We're Teen, We're Queer, and We've Got E-Mail,'
26.
Cf.
Part I notes
Chapter Three notes
1.
David Johnson and David Post, 'Law and Borders — The Rise of Law in Cyberspace,'
2.
Tom Steinert-Threlkeld, 'Of Governance and Technology,'
3.
J. C. Herz,
4.
The design of the network has changed slightly in the years since this was written. Some authentication is now required on the Chicago network, but once Ethernet ports have been assigned an IP address, that address remains 'as long as it doesn't misbehave, we won't know that has happened. In that sense, it is much the way it was.' Audio Tape: Interview with Greg Jackson (1/9/06) (on file with author).
5.
See Helen Nissenbaum, 'Values in the Design of Computer Systems,'
6.
As network adminstrator Greg Jackson described to me, while certain ports (including the wireless network) require that the user initially register the machine, there is no ongoing effort to verify the identity of the user. And, more importantly, there are still a significant number of ports which remain essentially unregulated. That doesn't mean that usage, however, isn't regulated. As Jackson described, 'But the truth is, if we can identify a particular peer-to-peer network that is doing huge movie sharing, we will assign it a lower priority so it simply moves slower and doesn't interfere with other people. So, we do a lot of packet shaping of that sort. Almost never does that extend to actually blocking particular sites, for example, although there are a few cases where we have had to do that just because . . .' According to Jackson, it is now Columbia that earns the reputation as the free-est network. 'Columbia . . . really doesn't ever try to monitor at all who gets on the wired network on campus. They just don't bother with that. Their policy is that they protect applications, not the network.' Audio Tape: Interview with Greg Jackson (1/9/06) (on file with author).
7.
For an extremely readable description, see Peter Loshin_, TCP/IP Clearly Explained_ (San Francisco: