Chapter Fourteen

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

0465039146-RM

12/5/06

12:31 AM

Page 389

notes to chapter fourteen

389

74. See Turner Broadcasting System, Inc. v Federal Communications Commission, 512 US
622, 63738 (1997); see also Huber, Law and Disorder in Cyberspace.
75. See National Broadcasting Company, Inc. v. Columbia Broadcasting System, 213.
76. See Ronald H. Coase, The Federal Communications Commission, Journal of Law and
Economics 2 (1959): 1.
77. Paul Starr, The Creation of Media: Political Origins of Modern Communications (Basic
Books, 2004), 2546.
78. Yochai Benkler, Net Regulation: Taking Stock and Looking Forward, University of
Colorado Law Review 71 (2000): 1203.
79. See, for example, research at MIT to build viral mesh networks which increase in
capacity as the number of users increases. Collaborative (Viral) Wireless Networks, available at
link #99.
80. Ethernet effectively functions like this. Data on an Ethernet network are streamed
into each machine on that network. Each machine sniffs the data and then pays attention to the
data intended for it. This process creates an obvious security hole: sniffers can be put on
promiscuous mode and read packets intended for other machines; see Loshin, TCP/IP Clearly
Explained, 4446.
81. See Yochai Benkler and Lawrence Lessig, Net Gains, New Republic, December 14,
1998.
82. The founder of this argument must be Eli Noam; see Spectrum Auctions: Yesterdays
Heresy, Todays Orthodoxy, Tomorrows AnachronismTaking the Next Step to Open Spectrum Access, Journal of Law and Economics 41 (1998): 765. Benkler has spiced it up a bit (in my
view, in critical ways) by adding to it the value of the commons. For an extraordinarily powerful
push to a similar political (if not technological) end, see Eben Moglen, The Invisible Barbecue, Columbia Law Review 97 (1997): 945. Moglen notes the lack of debate regarding the
sociopolitical consequences of carving up telecommunication rights at the Great Barbecue
and draws a parallel with the Gilded Ages allocation of benefits and privileges associated with
the railroad industry.

CHAPTER FOURTEEN

1. Audio Tape: Interview with Philip Rosedale 2 (1/13/06) (transcript on file with author).
2. Ibid., 46.
3. Ibid., 5.
4. Castronova, Synthetic Worlds, 207.
5. Ibid., 216.
6. Ibid., 213.
7. See Judith N. Shklar, American Citizenship: The Quest for Inclusion (Cambridge, Mass.:
Harvard University Press, 1991), 2562; James A. Gardner, Liberty, Community, and the Constitutional Structure of Political Influence: A Reconsideration of the Right to Vote, University
of Pennsylvania Law Review 145 (1997): 893; Quiet Revolution in the South, edited by Chandler
Davidson and Bernard Grofman (Princeton, N.J.: Princeton University Press, 1994): 2136.
8. See Lani Guinier, The Tyranny of the Majority: Fundamental Fairness in Representative
Democracy (New York: Free Press, 1994); Richard Thompson Ford, Beyond Borders: A Partial
Response to Richard Briffault, Stanford Law Review 48 (1996): 1173; Richard Thompson Ford,
Geography and Sovereignty: Jurisdictional Formation and Racial Segregation, Stanford Law
Review 49 (1997): 1365; Jerry Frug, Decentering Decentralization, University of Chicago Law
Review 60 (1993): 253; Jerry Frug, The Geography of Community, Stanford Law Review 48
(1996): 1047.

You might also like