Reading Ch. 12 in your Lessig book share your thoughts about the following. Explain what Lessig says, then provide your arguments and examples:
- There are modalities of both regulation and protection…[that] function both as constraints on behavior and as protections against other constraints. (p. 234).
- But on top of this list of protectors of speech in cyberspace is (once again) architecture. Relative anonymity, decentralized distribution, multiple points of access, no necessary tie to geography, no simple system to identify content, tools of encryption–all these features and consequences of the Internet protocol make it difficult to control speech in cyberspace. The architecture of cyberspace is the real protector of speech in cyberspace; it is the real “First Amendment in cyberspace,” (p. 236, para 3’ish).
- Regulations of Speech: Publication: give a current example from the last couple of years illustrating this tension here. What is the tension? What is the government’s position (p. 239)? What is prior restraint? (p. 239)….Thus the architecture of the Net, Abrams suggested, eliminates the need for the constitutional protection. (p. 241).
- Regulations of Speech: Spam and Porn: What is pam? (p. 245). Regardless of personal feelings, should law support spam? (p. 246) How is spam regulated extensively? (p. 246). How is porn regulated (p. 246, bottom)? Obscenity? (p. 247).
- Thus as with porn, a different architectural constraint means a radically different regulation of behavior. Both porn and spam are…regulated in real space; in cyberspace, this difference in architecture means neither is effectively regulated at all. (p. 249). How so…
- Regulating Net-Porn: p. 251: What id Ginsberg establish?
- Page 253: What is the <H2M> tag? What does it do for porn?
- Page 255: What is the ACLU’s concern? What do you think?
- P. 257: What’s the deal with the ratings and the filtering? How does it impact Freedom of Speech?
- p. 258: Between the filtering regime and the H2M+KMB solution, private zoning of speech, which would you prefer? Consider the arguments at bottom of p. 258 in your response and tell us what you feel, ultimately?
- What does Lessig argue vis a vis point 10? See page 260, bottom half.
- Page 262: Most of feel the law can’t be too effective at regulating spam. How so? What should the regulation be? What does Lessig advocate? p. 262.
- Regulations of speech: Free culture: What is the role of copies in digital space vs. real life space? (p. 268).
- Should First Amendment values have a role in this world beyond the minimal protections accorded to the idea/expression distinction and its relationship with “fair use”?
- Regulations of Free Speech: Distribution: p. 272, bottom para: How does WiFi example illustrate how spectrum works? p. 274: Spectrum allocated v. spectrum shared architectures: Which do you prefer and why? Explain both…