Download pdf - 417

Transcript
Page 1: 417

Fingerprints/thumbprints, 42Finkelstein, Seth, 245Firefox, 147First Amendment: copyright and,

186–187; effects of, 18, 20, 115, 116,121, 186–187, 214, 294, 386n45;“Madisonian” conception of, 260;times when ignored, 315

Fishkin, James, 332Ford, Richard, 286Fourteenth Amendment, 167, 286Fourth Amendment: as constraint on

regulation, 213, 214; dignity/searchesand, 211–213, 214; historicalbackground of, 21, 22, 158–160;latent ambiguities and, 157–158,160–165; search/burden and, 22–23;searches (“invisible”) of computers,21–22, 23; text of, 158; warrants and,21, 22, 158, 159–160, 370n8; See alsospecific court cases

Frankfurter, Felix, 271Free Culture (Lessig), 110“Free software,” 56, 139Free Software Foundation’s General Public

License (GPL), 148“Free software movement,” 199Free speech: architectural significance,

236, 237, 383n3, 4; countrydifferences in, 235–236, 294;credibility and, 241–242; “indecency”and, 250; protection/regulationmodalities and, 233, 234, 234–236,275; values and, 255, 258, 260, 261,267–268; See also Speech constraints;Speech regulation

French Revolution and Paris architecture,127

Friedman, Milton, 235FTC (Federal Trade Commission), 266,

305FTP (file transfer protocol), 144, 145Future of Ideas, The (Lessig), 111{TXB3}Gambling on Internet, 15–16, 23, 69,

307–308Gandy, Oscar, 219GDPs of virtual worlds, 108Geist, Michael, 62, 305General Public License (GPL), 148Generative Internet (Zittrain), 74–76

Geographic identity, 57–59Geography as architectural constraints,

127–128George II/III, Kings, 21Georgetown University Law Review, 249Geoselect IP mapping service, 58Gibson,William, 3Ginsberg (“harmful to minors”) speech,

250, 257, 258Ginsberg v. New York, 247, 251GNU/Linux, 147–148, 369n20, 22GNU project, 147Godwin, Mike, 84Goldsmith, Jack, 58, 298, 301Gomez, Jean-Jacques, 295, 297Goodale, James, 237–238Google: advertising method, 205; China

and, 80, 309; Gmail records, 204,205–206; government demand fordata, 47, 204–205; “neutral” searchprinciple of, 70–80; privacy policy of,226

Gore, Al, 244–245Gore, Bush v., 141Government/regulation: digital IDs and,

68–72; “East Coast Code”/“West CoastCode,” 72–74, 324, 357n34; examples,62–67; exploiting commerce, xiii, xiv,72–73, 77, 80, 81; in China, 79–80;intervention conditions, 338; inVernon Vinge story, xii; overview,61–62; See also Sovereignty

Government/regulation (indirect);choosing indirect/direct methods, 132,366n53, 54; democracy and, 138;overview, 67–68; problems with,132–137, 138; responsibilitymisdirection with, 133–134;segregation example, 134–135;violence on television, 115–116; WhitePaper on intellectual property,173–174

“Grand Theft Auto,” 19, 107Grokster/Grokster, 147Guinier, Lani, 286Gyges, 59{TXB3}Hacker meaning, 8Hafner, Katie, 101Hansen, Chuck, 240Harter, Peter, 150

index 403

0465039146-RM 12/5/06 12:31 AM Page 403