Between Truth and Power

tags
Privacy Julie Cohen

Notes

Introduction

focused not only on the moral costs of militarization but also on the opportunity costs.

NOTER_PAGE: (14 . 0.40462427745664736)

deterministic claims about the way that code “is” have evolved into normative claims about the way that it should be.

NOTER_PAGE: (15 . 0.16680429397192403)

Even the technologies in use in democratic societies increasingly incorporate, at their core, capabilities for differen- tiation, modulation, and interdiction of information flows.

NOTER_PAGE: (15 . 0.3699421965317919)

The essence of power lies precisely in its ability to shape-shift — to elude the perfect, crystalline characterizations with which scholars have attempted to both capture and cabin its methods of operation.

NOTER_PAGE: (16 . 0.33608587943848056)

the neoliberal political orientation emphasizes not only market liberties but also a market-based approach to structuring political and social participation.

NOTER_PAGE: (18 . 0.40049545829892647)

law is not simply superstructure but rather the means through which expressions of economic ration- ality and governmentality become specific, detailed, and actionable.

NOTER_PAGE: (19 . 0.16184971098265896)

new institutional settlements that alter the horizon of possibility for protective countermovements.

NOTER_PAGE: (20 . 0.12056151940545004)

once again, critics of law’s neoliberalization have focused principally on a set of burgeoning crises for public law but have largely neglected to ask a set of more fundamental questions

NOTER_PAGE: (20 . 0.13790255986787778)
NOTER_PAGE: (20 . 0.6036333608587944)

I. PATTERNS OF ENTITLEMENT AND DISENTITLEMENT

1. Everything Old Is New Again — Or Is It?

NOTER_PAGE: (26 . 0.1486374896779521)

emergence of informational capitalism in terms of three large-scale shifts that together constitute the movement toward informational capitalism: the propertization (or enclosure) of intangible resources, the dematerialization and datafication of the basic factors of industrial production, and the embedding (and rematerialization) of patterns of barter and exchange within in- formation platforms.

NOTER_PAGE: (26 . 0.6069364161849711)

evolution of modern regimes of intellectual property protection, identifying a series of profound changes that relate to both imagined justifications and patterns of exploitation and use.

NOTER_PAGE: (27 . 0.08670520231213873)

basic factors of industrial production identified by Polanyi—Iabor, land, and money—are becoming dematerialized

NOTER_PAGE: (27 . 0.13459950454170105)
NOTER_PAGE: (27 . 0.6895127993393889)
NOTER_PAGE: (28 . 0.4062758051197357)
NOTER_PAGE: (28 . 0.4533443435177539)
aathorship of commissioned works should flow to the party that had assumed the economic risk.
NOTER_PAGE: (28 . 0.5912469033856317)
Courts rejected a long-standing rule allowing competitors to exploit “unworked” patents in exchange for a reasonable royalty, clearing the way for corporate patent owners to amass portfolios of patents
NOTER_PAGE: (28 . 0.6870355078447563)
Whereas nineteenth-century rhetoric had emphasized the public and democratic benefits to be gained from underwriting progress in science and learning, the distinctive flavor of instrumentalism that developed beginning in the mid-twentieth century focused more narrowly on incentives to production.
NOTER_PAGE: (29 . 0.45251857968620973)
The Supreme Court has cited both the argument from intermediary incentives and the argument from trade as ineluctable realities.
NOTER_PAGE: (29 . 0.7068538398018166)
foundations for the industrial organization of cultural and technical production have shifted to facilitate amassing intangible capital at scale.
NOTER_PAGE: (30 . 0.10404624277456646)
permits drafters in certain industries to practice systematic vagueness, and firms also have learned to practice selective, patent-preempting disclosure
NOTER_PAGE: (30 . 0.35590421139554085)
NOTER_PAGE: (30 . 0.6011560693641618)

Brand Values

NOTER_PAGE: (31 . 0.3996696944673823)
The growing prominence of brands and branding during the first half of the twen- tieth century reflected both the proliferation of mass-manufactured, prepackaged goods and the efforts of the nascent marketing industry.
NOTER_PAGE: (31 . 0.6564822460776217)
in any case marketers sought not only to understand tastes but also to shape them.
NOTER_PAGE: (32 . 0.08587943848059454)

cf Platform Enclosure of Human Behavior and its Measurement: Using Behavioral Trace Data against Platform Episteme

brands and branding have come to function both as tools for self-articulation and as heuristics for so- cial sorting. Brands and branding underwrite complex systems of performative and fundamentally social consumption,
NOTER_PAGE: (32 . 0.4393063583815029)
Although courts and commentators initially characterized infringement lawsuits against down-market counterfeits as doctri- nally and economically baseless, mark owners eventually convinced courts to find infringement based on a novel theory of “post-sale confusion,”
NOTER_PAGE: (33 . 0.45582163501238643)
supplementary entitlements in brands have proliferated in ways that tacitly acknowledge and reinforce the expressive power of capital.
NOTER_PAGE: (33 . 0.7241948802642444)
shift toward a more diverse and differentiated landscape of intangible intellectual property entitlements.
NOTER_PAGE: (34 . 0.16845582163501238)
NOTER_PAGE: (34 . 0.2246077621800165)
New types of entitlements—some legislatively decreed and others judicially invented—have mushroomed around the edges of existing entitlement schemes, blurring their borders and extending their reach.
NOTER_PAGE: (34 . 0.3352601156069364)
powerful new “law of look and feel” for the outputs of industrial designers.
NOTER_PAGE: (35 . 0.07018992568125516)
reinforced and expanded trade secrecy protections
NOTER_PAGE: (35 . 0.10239471511147812)
The regulatory disclosures required to bring certain types of biomed- ical and biotechnology innovations to market work at cross purposes to strategies based on secrecy.
NOTER_PAGE: (35 . 0.3393889347646573)
unable to marshal substantial empirical evidence
NOTER_PAGE: (35 . 0.5871180842279108)

this strikes me as untrue, I'm sure I've seen some such research. probably while looking at TRIPS?

opponents of intangible entitlements’ expan- sion and proliferation have been unable to disrupt the powerful syllogism linking propertization with increased progress.
NOTER_PAGE: (35 . 0.7208918249380677)

Labor, Land, and Money Reimagined

NOTER_PAGE: (36 . 0.0726672171758877)
data and algorithms have proved powerfully resistant to formal propertization.
NOTER_PAGE: (36 . 0.15772089182493806)
movement to an informational economy is reconstructing labor, land, and money as datafied inputs to new algorithmic modes of profit extraction. At the same time, data and algorithms have become the subjects of active appropriation strategies
NOTER_PAGE: (36 . 0.24029727497935588)
NOTER_PAGE: (36 . 0.342691990090834)
NOTER_PAGE: (36 . 0.5053674649050371)

Money without Investment

NOTER_PAGE: (36 . 0.6284062758051197)
the idea of money has grown increasingly notional and has become increasingly detached from the real-world activities that it was designed to enable.
NOTER_PAGE: (36 . 0.7052023121387283)
Because many cashless payment systems operate outside the traditional banking system and its associated overlay of in- surance and fraud-protection rules, however, they expose consumers who now take those protections for granted to a variety of hidden risks.
NOTER_PAGE: (39 . 0.2526837324525186)
Cashless payment systems, however, also undermine the flexibility, anonymity, and capacity for informality that are hallmarks of cash economies,
NOTER_PAGE: (39 . 0.35177539223781995)

echoes of What Privacy is For

Understood simply as a new and more efficient way to authenticate transactions and move money across borders, blockchain also seems more likely to reinforce the dominance of finance capital than to disrupt it.
NOTER_PAGE: (39 . 0.6011560693641618)
an important theme running through the new language of financialization, and a common denominator driving all of the interme- diation strategies discussed previously, is privileged access to flows of data about trades and transactions.
NOTER_PAGE: (40 . 0.6705202312138728)

Labor without Employment

NOTER_PAGE: (41 . 0.07431874483897605)

Gig Economy

the Taylorist reconfiguration of the factory floor necessitated a parallel reconfiguration and informationalization of management,
NOTER_PAGE: (41 . 0.42857142857142855)
Workforce needs are more variable but also amenable to data-driven forecasting, and the communication challenges that formerly would have prevented on-demand labor scheduling have been all but eliminated.
NOTER_PAGE: (41 . 0.7489677952105698)
TaskRabbit and Mechanical Turk for temporary office work, Uber and Lyft for transportation, Airbnb for lodging, and so on. These entities call themselves information businesses rather than, for example, temporary employment agencies or transportation businesses,
NOTER_PAGE: (42 . 0.26837324525185796)
Their true business, they argue, is disintermediation
NOTER_PAGE: (42 . 0.3534269199009083)
People have needs for sta- bility and support that the system of wage labor for employers and its associated regulatory overlay addressed—never fully or perfectly, but at least deliberately and systematically.
NOTER_PAGE: (44 . 0.08340214698596202)
The extension of gig-economy ventures into developing countries has begun to exert extreme downward pressure on the earnings of user-workers located in developed countries.
NOTER_PAGE: (44 . 0.28323699421965315)

Land without Presence

NOTER_PAGE: (45 . 0.07184145334434351)
One strategy involved the resale of mortgage obligations and was conceived as a device for connecting individual borrowers with the deeper pockets and more diverse risk portfolios of participants in nationwide capital markets.” Ultimately, however, that strategy did much more than simply increase access; it fundamentally transformed the way that ownership of real property is un- derstood and valued.
NOTER_PAGE: (45 . 0.17671345995045415)
uring the 1990s and 2000s, secondary market demand came to dominate the mortgage lending landscape.
NOTER_PAGE: (45 . 0.5103220478943022)
assume, then that the ordinary rules of contract and real property law simply provided the neutral background
NOTER_PAGE: (46 . 0.0685383980181668)
ractices of mortgage resale and securitiza- tion that today are regarded as routine would not have been possible without prior acceptance of the idea of owning debt obligations as assets.
NOTER_PAGE: (46 . 0.15524360033030551)
although the justifications advanced for drafting uniform negotiability rules emphasized a need to facilitate business-to-business transactions, the new rules were used principally to facilitate trade in consumer obligations.
NOTER_PAGE: (46 . 0.3575557390586292)
the underwriters who concocted the securities came to view the transaction costs imposed by local real property recording offices as a drag on financial innovation.
NOTER_PAGE: (46 . 0.5383980181668042)
In fact, the MERS system and its participants did not maintain good internal records of member bank trades.
NOTER_PAGE: (47 . 0.0685383980181668)
The most visible reforms were prospective, raising standards for future mortgage lending—and thereby improving inputs to future financialization.
NOTER_PAGE: (47 . 0.43600330305532614)
self-interested, privatized institutional innovation in the form of the MERS system catalyzed both a massive redistribution of land-based wealth to financial institutions and their well-heeled clients and a massive privatization of resources that formerly had flowed to the public sector
NOTER_PAGE: (48 . 0.21800165152766307)

From Markets to Platforms

NOTER_PAGE: (48 . 0.3666391412056152)
In the emerging informational economy, the locus for those activities is the platform, a site of encounter where interactions are materially and algorithmically intermediated.
NOTER_PAGE: (48 . 0.5028901734104047)
teasing out the connections between platform logics and the emergent design of informa- tional property institutions.
NOTER_PAGE: (48 . 0.6705202312138728)

Prologue: Access and Legibility

NOTER_PAGE: (49 . 0.15854665565648224)
The intertwined functions that platforms provide— intermediation that provides would-be counterparties with access to one another and techniques for rendering users legible to those seeking to market goods and services to them—have evolved to become the core organizational logic of con- temporary informational capitalism.
NOTER_PAGE: (49 . 0.23369116432700246)
NOTER_PAGE: (50 . 0.42031379025598675)
legibility became the essential function for an intermediary to provide to advertisers
NOTER_PAGE: (51 . 0.20313790255986786)

How Platforms Shape Economic Exchange

NOTER_PAGE: (53 . 0.24525185796862095)
The platform economy rewrites all parts of that story, reshaping the conditions of entry, the scope for disruption, and the sources and manifestations of economic power. Platforms do not simply enter markets, they replace (and rematerialize) them.
NOTER_PAGE: (53 . 0.6044591246903386)
Because of the platform environment's operational secrecy, however, purchasers of these services cannot easily monitor the quality of what they have purchased. More generally, platform users cannot easily determine whether platform firms are engaging in other, un- disclosed varieties of preferential placement.
NOTER_PAGE: (54 . 0.4384805945499587)
The tools for effecting legibility constructed by giant information businesses such as Google, Apple, and Facebook have become global platform-based “superstructures,” subsuming and rematerializing not only markets but also and more broadly information-gathering and social interaction.'®® At the same time, however, modeling and understanding the economic, social, and informational dy- namics of the platform environment has become extraordinarily difficult.
NOTER_PAGE: (55 . 0.14946325350949627)

Points of Access, Points of Control

NOTER_PAGE: (55 . 0.3129644921552436)
NOTER_PAGE: (55 . 0.4880264244426094)
Platforms use contracts systematically to facilitate and pro- tect their own legibility function, extracting transparency from users but shielding basic operational knowledge from third-party vendors, users, and advertisers alike.
NOTER_PAGE: (55 . 0.5706028075970272)
Boilerplate agreements are contractual in form but mandatory in operation,
NOTER_PAGE: (55 . 0.7068538398018166)
NOTER_PAGE: (55 . 0.7382328654004954)
The combination of scale, asserted contractual control, and technical control enacts enclosure of both data and algorithmic logics as an inexorable reality
NOTER_PAGE: (56 . 0.34929810074318746)
Facebook offers advertisers placement precisely targeted to the inferred needs and desires of its billions of users but never direct access to the data or algorithms themselves.
NOTER_PAGE: (56 . 0.5028901734104047)
traditional intellectual property rights play helpful but only secondary roles in the process of de facto propertization,
NOTER_PAGE: (56 . 0.671345995045417)

2. The Biopolitical Public Domain

NOTER_PAGE: (59 . 0.14616019818331957)

emergence of the platform as the core organizational logic of the political economy of informational capitalism.

NOTER_PAGE: (59 . 0.31048720066061103)

origins of the presumptive entitlement that platforms and other infor- mation businesses assert to appropriate and use data flows extracted from people.

NOTER_PAGE: (59 . 0.4104046242774566)
NOTER_PAGE: (59 . 0.47729149463253506)

Contemporary practices of personal data extraction and processing constitute a new type of public domain, which I will call the biopolitical public domain: a source of raw materials that are there for the taking and that are framed as inputs to particular types of productive activity

NOTER_PAGE: (59 . 0.6969446738232865)

public domain made up of those materials is biopolitical —rather than, say, personal or informational—because the productive activities that it frames as desirable are activities that involve the description, processing, and management of populations, with consequences that are productive, distributive, and epistemological.

NOTER_PAGE: (60 . 0.08505367464905036)

construct of a public domain both designates particular types of resources as available and suggests particular ways of putting them to work.

NOTER_PAGE: (60 . 0.20231213872832368)

constitutes personal data as available and potentially valuable:

NOTER_PAGE: (60 . 0.3203963666391412)

constitutes the personal data harvested within networked information environments as raw.

NOTER_PAGE: (60 . 0.3707679603633361)

Logics of Abundance and Extraction

NOTER_PAGE: (60 . 0.6581337737407101)
The process of constructing a public domain begins with an act of imagination that doubles as an assertion of power.
NOTER_PAGE: (60 . 0.6919900908340214)
NOTER_PAGE: (61 . 0.2510322047894302)
the idea of a public domain thus both emphasizes and assumes two conditions. The first is abundance.
NOTER_PAGE: (61 . 0.3707679603633361)
The second condition that the idea of a public domain presumes is the absence of prior claims to the resource
NOTER_PAGE: (61 . 0.5747316267547481)
their traditions of occupancy and use were not understood as ownership claims
NOTER_PAGE: (61 . 0.6061106523534269)
intellectual property regimes traditionally have taken a dismissive stance toward those claiming interests in folk art and traditional knowledge.
NOTER_PAGE: (61 . 0.6218001651527663)
constitute the ever-expanding universe of personal data as a terra nullius for enterprising data developers,
NOTER_PAGE: (62 . 0.3707679603633361)
all the world is America again, and doubly so: the information resources extracted from populations worldwide flow into the databanks of the new information capitalists, who then use those resources to devise new profit-making strategies.
NOTER_PAGE: (62 . 0.5722543352601156)
far-reaching reorganizations of sociotechnical activity to facilitate harvesting personal data “in the wild” and to mark such data, once collected, as owned.
NOTER_PAGE: (63 . 0.06936416184971098)

Prologue: Fair Credit Reporting and Walled Gardens

NOTER_PAGE: (63 . 0.12716763005780346)
NOTER_PAGE: (63 . 0.2931461601981833)

Digital Breadcrumbs

NOTER_PAGE: (65 . 0.07101568951279934)
The IETF working group had identified the privacy issues raised by cookies very early on, but efforts to write a uniform level of heightened user control into the standard met with pushback. Technology companies preferred a more minimal standard that would afford greater flexibility in implementation, and members of the rapidly growing online advertising industry sought to preserve the possibility of a promising new business model.
NOTER_PAGE: (66 . 0.1180842279108175)
“Big Data,” was a fast-evolving group of techniques for converting voluminous, heterogeneous flows of physical, transactional, and behavioral information about people (or about anything else) into a particular, highly data-intensive type of knowledge.”
NOTER_PAGE: (67 . 0.32049180327868854)
restricting the use of so-called spyware failed repeatedly. Merchants and communications providers that deployed cookies for what they saw as legitimate purposes balked at definitional language extending labels such as “spyware” and “cybertrespass” to their own activities.
NOTER_PAGE: (67 . 0.42295081967213116)
Technology and information businesses urged Congress to move cautiously in order not to foreclose innovative market responses.
NOTER_PAGE: (67 . 0.519672131147541)
NOTER_PAGE: (67 . 0.6573770491803279)

The Sensing Net

NOTER_PAGE: (68 . 0.30655737704918035)
NOTER_PAGE: (68 . 0.33524590163934426)
text messages, internet searches, social networking updates, personalized news and en- tertainment feeds, and interactions with dedicated apps for traffic, transit, shopping, investment and personal finance, fitness, and much more.
NOTER_PAGE: (68 . 0.6057377049180328)
Transit passes and highway toll transponders record daily travels; smart home thermostats, alarm systems, and building access cards create digital traces of comings and goings; special-purpose “wearables” collect and upload biometric data
NOTER_PAGE: (69 . 0.18278688524590164)
configure the world of networked digital artifacts in ways that make enrollment seamless and near-automatic.
NOTER_PAGE: (69 . 0.4901639344262295)
important details about the kinds of behavioral data that the sensing net extracts simply are not disclosed to users at all.
NOTER_PAGE: (69 . 0.5680327868852459)
NOTER_PAGE: (69 . 0.7221311475409836)
In the contemporary networked marketplace, consent flows from status, not conduct, and attaches at the moment of marketplace entry. Under those circumstances, the lawyerly emphasis on such things as disclosure, privacy dashboards, and competition over terms becomes a form of Kabuki theater that distracts both users and regulators from what is really going on.
NOTER_PAGE: (70 . 0.0680327868852459)
work both to generate large quantities of data and to make public domain status the default condition for the data that are generated.
NOTER_PAGE: (70 . 0.1721311475409836)
NOTER_PAGE: (70 . 0.28442622950819674)

The Postcolonial Two-Step

NOTER_PAGE: (70 . 0.39344262295081966)
the postcolonial two-step: initial extensions of surveillance via a two-pronged strategy of policing and development, followed by a step back as the data harvests are consolidated and absorbed.
NOTER_PAGE: (70 . 0.6049180327868853)

Secrecy as Enclosure

NOTER_PAGE: (73 . 0.12622950819672132)
frustrates the most basic efforts to understand how the internet search, social networking, and consumer finance industries sort and categorize individual consumers.
NOTER_PAGE: (73 . 0.17049180327868851)
In 2014, a Senate committee seeking to discover information about industry structure and contracting practices found itself effectively stonewalled
NOTER_PAGE: (73 . 0.23688524590163934)
vague and general responses and claiming inability to locate requested documents.
NOTER_PAGE: (73 . 0.4024590163934426)
Realizing the profit potential of commercial surveillance activity requires practices that mark data flows with indicia of ownership.
NOTER_PAGE: (73 . 0.4516393442622951)
“digital enclosure” to denote the pervasive informational exposure that occurs within commercial surveillance environments and the consequent loss of control over self-articulation.
NOTER_PAGE: (73 . 0.6688524590163935)
al- though intellectual property theory places “facts” permanently in the public domain, intellectual property practice traditionally has recognized a need for gap-filling pro- tection in certain industries, and has looked to trade secrecy and contract law to fulfill that need.
NOTER_PAGE: (74 . 0.10163934426229508)
difference between public domain and commons as resource governance strategies.
NOTER_PAGE: (74 . 0.26885245901639343)

From Raw to Cooked: A Political Economy of Patterns and Predictions

NOTER_PAGE: (74 . 0.6622950819672131)

Data Cultivars

NOTER_PAGE: (75 . 0.3622950819672131)
frame the data harvested from individual users of networked information and communications technologies as raw streams of observation that are parsed, enhanced, and systematized through their own productive labor.
NOTER_PAGE: (75 . 0.40327868852459015)
Scholars who study information systems argue that the “raw data” framing is not, and never could be, entirely accurate. Inevitably, data collection activities are structured by basic judgments about what to collect, what units of measurement to use, and what formats and metadata will be used
NOTER_PAGE: (75 . 0.5540983606557377)
equally inaccurate to say that the data collected for processing just happen to be there. The flexible and adaptive techniques used within contemporary surveillance environments are—and are designed to be—productive of particular types of infor- mation.
NOTER_PAGE: (76 . 0.22131147540983606)
Techniques for participatory data extraction are intended to cultivate habits of self-identification in a very particular way.
NOTER_PAGE: (76 . 0.7057377049180328)
power becoming ontological: power expressed not through hegemonic control of meaning but rather through techniques for making the crowd known to itself.
NOTER_PAGE: (76 . 0.7418032786885246)
collection of personal data on an industrial scale inevi- tably adopts an active, curatorial stance regarding the items to be gathered. Strains of information are selected and cultivated precisely for their durability and com- mercial value within a set of information processing operations. The data are both raw and cultivated, both real and highly artificial.
NOTER_PAGE: (77 . 0.2540983606557377)

Data Refineries

NOTER_PAGE: (77 . 0.36065573770491804)
sites for large-scale, automated processing of data flows extracted from people function as information-age refineries, converting those flows into the forms best suited for exploitation on an industrial scale.
NOTER_PAGE: (77 . 0.5049180327868853)
make human behaviors and revealed preferences calculable, predictable, and profitable in aggregate.
NOTER_PAGE: (78 . 0.3368852459016393)
Data doubles are, in other words, biopolitical in character: they are designed to enable the statistical construction, management of, and trade in populations.
NOTER_PAGE: (78 . 0.48770491803278687)
in the era of ascendant neoliberal governmentality, it is data refineries’ very privateness that gives their outputs normative and epistemological authority.
NOTER_PAGE: (78 . 0.7065573770491803)
operate to conceal the extent of our dependence on monoculture and to en- trench that monoculture in ways that make addressing its external effects on human and environmental health extremely difhicult.
NOTER_PAGE: (79 . 0.28688524590163933)

Data Markets

NOTER_PAGE: (79 . 0.3909836065573771)
question of what might come to qualify as a good or service and that of how transactions might be made intelligible as exchanges.
NOTER_PAGE: (79 . 0.489344262295082)
subject matter traded in markets must be conceived as a “calculable good”:
NOTER_PAGE: (79 . 0.671311475409836)
distributed valuation of calculable goods.
NOTER_PAGE: (80 . 0.15327868852459017)
commonly understood institutional struc- ture within which exchanges can occur.
NOTER_PAGE: (80 . 0.23934426229508196)
ublic-facing rhet- oric about personal data harvesting and processing is most usefully understood in an analogous way, as an example of marketing-speak
NOTER_PAGE: (80 . 0.6868852459016394)
the platform as the core organizational logic of informational capitalism.
NOTER_PAGE: (81 . 0.4204918032786885)

Consuming Consumers

NOTER_PAGE: (82 . 0.06967213114754098)
The data refinery is only secondarily an apparatus for producing knowledge; it is principally an apparatus for producing wealth.
NOTER_PAGE: (82 . 0.17459016393442622)
The overriding goal of data refineries and data markets is not understanding but rather predictability in pursuit of profit.
NOTER_PAGE: (82 . 0.2778688524590164)
NOTER_PAGE: (82 . 0.6155737704918033)
The Moore court, however, did not hold that human tissue could not be the subject of any proprietary claims; rather, it contrasted Moore’s claim to that of the research scientists who had labored to develop the patentable byproduct.
NOTER_PAGE: (83 . 0.23278688524590163)
the court’s famous anti-commodification opinion articulated a powerful logic of productive appropriation
NOTER_PAGE: (83 . 0.319672131147541)

The Power of Appropriative Privilege

NOTER_PAGE: (84 . 0.07049180327868852)
subordinates considerations of human well-being and human self-determination to the priorities and values of powerful economic actors.
NOTER_PAGE: (84 . 0.4262295081967213)
alienates consumers from their own data as an economic resource and from their own preferences and reservation prices as potentially equalizing factors in economic transactions. The emerging system of data-driven predictive profiling is designed to strip away opportunities for bargaining and arbitrage, producing a set of wholly nontransparent exchange institutions that reconfigure demand to match supply.
NOTER_PAGE: (84 . 0.4565573770491803)
Reimagining consumer markets as sites of unilateral technosocial sorting undermines both their utility as markets and their legitimacy as decentralized governance processes.
NOTER_PAGE: (84 . 0.6262295081967213)

3. The Information Laboratory

NOTER_PAGE: (86 . 0.14754098360655737)

Amplifying Collective Unreason

NOTER_PAGE: (97 . 0.15655737704918032)
What has changed is that percentages of respondents reporting strongly negative feelings about those with opposing views have skyrocketed.*® That result stands in jarring contradiction to the utopianism of the early internet pioneers, who assumed that expanded access to information online would usher in a new era of cosmopolitanism and enlightened tolerance.
NOTER_PAGE: (98 . 0.3360655737704918)

Can't Touch This: The Unbearable Lightness of Intermediation

NOTER_PAGE: (100 . 0.47950819672131145)
narratives that make unaccountability for certain types of information harms seem logical, inevi- table, and right.
NOTER_PAGE: (100 . 0.5672131147540984)
surveillance-innovation complex within which advances in information processing are privileged for their own sake and regulatory oversight is systematically marginalized.
NOTER_PAGE: (100 . 0.6508196721311476)
disregard of the fact that the networked dig- ital information environment is neither neutral nor self-regulating,
NOTER_PAGE: (101 . 0.1819672131147541)
intertwined logics of innovative and ex- pressive immunity underwrite broad regimes of de jure and de facto insulation from accountability for internet intermediaries and other information businesses.
NOTER_PAGE: (101 . 0.36885245901639346)

Innovation Jumps the Shark

NOTER_PAGE: (101 . 0.47540983606557374)
position innovation and protective regulation as intrac- tably opposed.
NOTER_PAGE: (101 . 0.5737704918032787)
in- novation as an autonomous and inevitably beneficial process that is the natural re- sult of human liberty.
NOTER_PAGE: (102 . 0.2540983606557377)
regulatory regimes have long endorsed the precautionary principle, which dictates caution in the face of as-yet-unknown and potentially significant risks. Importantly, rather than stifling “innovation,” the precautionary approach is widely recognized as creating incentive effects
NOTER_PAGE: (103 . 0.06967213114754098)
faith in the “technological sub- lime” is a powerful motivator, reinforcing virtuous narratives about automated, data-driven surveillance and, for some, informing the confident expectation of a “singularity” waiting in our soon-to-be-realized future
NOTER_PAGE: (103 . 0.5557377049180328)

From Persuasion to Experimentation

NOTER_PAGE: (104 . 0.6622950819672131)

The Most Important Law

NOTER_PAGE: (108 . 0.27295081967213114)

Identity and Authentication in the Cloud

NOTER_PAGE: (112 . 0.2442622950819672)

The Culture of Capture

NOTER_PAGE: (114 . 0.6893442622950819)
“deep capture,” or capture on the level of ideology.'"* The intertwined frames of the information marketplace and the information laboratory have attained the status of ground truths,
NOTER_PAGE: (115 . 0.13442622950819672)

Law and the Construction of Information Power, Revisited

NOTER_PAGE: (117 . 0.5008196721311475)
The communicative spaces produced by platform-based, massively intermediated information infrastructures are not neutral spaces. They are spaces optimized for eliciting automatic, instinctual reactions and for engendering, amplifying, and exploiting cascade-based diffusion, polarization, and relativization. Public dis- course in a democratic society is, and should be, contentious and unruly, but thereis also a difference between bending and breaking.
NOTER_PAGE: (118 . 0.23524590163934425)

4. Open Networks and Closed Circuits

NOTER_PAGE: (119 . 0.14672131147540984)

true sovereignty consists in the power to say when the excep- tion exists.'

NOTER_PAGE: (119 . 0.6286885245901639)

some actions are lawlike in form but not in substance; they manifest the bare force of law stripped of the features that give the rule of law legitimacy.

NOTER_PAGE: (120 . 0.07131147540983607)

In the networked, massively intermediated information environment, the themes of exception and bare force of law also take on a new kind of meaning. Sovereignty consists in the power to say what information will flow

NOTER_PAGE: (120 . 0.1680327868852459)

lacunae within which absolute authority over information flow is both unaccountable and unquestioned.

NOTER_PAGE: (120 . 0.5032786885245901)

Dangerous Knowledge

NOTER_PAGE: (122 . 0.07049180327868852)
expert training in human rights advocacy could work to legitimize dangerous or- ganizations."” By traditional First Amendment standards, the argument was laugh- able; rhetorical battles over legitimacy are exactly the sorts of contests that belong in the realm of persuasion. The majority accepted it uncritically
NOTER_PAGE: (125 . 0.2180327868852459)
As domains of ex- pertise far removed from violence and lawlessness were recast as inextricably entwined with threats to the body politic, government practices that the courts of an earlier era would have recognized instantly as overbroad and politically suspect came to seem both apolitical and existentially justified.
NOTER_PAGE: (125 . 0.5368852459016393)

Other People’s Property

NOTER_PAGE: (126 . 0.06885245901639345)

State Secrets and State Secrecy

NOTER_PAGE: (128 . 0.1762295081967213)

Struggles over Facilitation and Control

NOTER_PAGE: (131 . 0.6549180327868852)

Finding and Paying for Contraband

NOTER_PAGE: (133 . 0.2081967213114754)
Thirty years ago, the principal enforcement tool was the civil infringement lawsuit. Criminal enforcement was relatively rare, and capabilities for technical enforcement were virtually nonexistent.*® Today, all that has changed.
NOTER_PAGE: (133 . 0.26967213114754096)

Circumventing Digital Barriers

NOTER_PAGE: (136 . 0.5098360655737705)
NOTER_PAGE: (137 . 0.17131147540983607)
fore- close unauthorized experimentation and innovation of all sorts.
NOTER_PAGE: (137 . 0.6213114754098361)
NOTER_PAGE: (138 . 0.2721311475409836)

Keeping Unauthorized Secrets

NOTER_PAGE: (139 . 0.13934426229508196)

Information Power and the Reconstruction of Law (and Order)

NOTER_PAGE: (147 . 0.46229508196721314)
the “new normal” in the platform-based, massively intermediated infor- mation economy is a condition in which fiat-based prohibitions on information flow are both increasingly routine and increasingly inscrutable.
NOTER_PAGE: (148 . 0.0680327868852459)
platform businesses enjoy increasing autonomy both to define the terms of their own compliance with mandates promulgated by state actors and to create and refine their own operational arrangements.
NOTER_PAGE: (148 . 0.3016393442622951)

II. PATTERNS OF INSTITUTIONAL CHANGE

NOTER_PAGE: (150 . 0.19983484723369116)

in institutional processes structured by procedural rules, the “haves” tend to come out ahead because, as repeat players with disposable resources to spare, they can play for rules in addition to results.!

NOTER_PAGE: (150 . 0.699421965317919)

5. The End(s) of Judicial Process

NOTER_PAGE: (154 . 0.14781172584640792)

the judicial system now seems to function principally to funnel disputes toward settlement.

NOTER_PAGE: (154 . 0.5483071841453344)

movement to informational capitalism has confronted the judicial system with two large and interrelated problems: a prolifer- ation of asserted harms that are intangible, collective, and highly informationalized; and an unmanageably large and ever-increasing number of claimants and interests.

NOTER_PAGE: (155 . 0.18637724550898205)

Managerialism is not simply an orientation but rather a flourishing discipline that has been called “the first neo-liberal science.”®

NOTER_PAGE: (155 . 0.5868263473053893)

management is the practice of deploying informational techniques to reshape organizations along competitively efficient lines; manageri- alism refers to the ideological framework that both posits such reshaping as desir- able and prescribes how it may best be achieved.

NOTER_PAGE: (155 . 0.687125748502994)

Administration

Some kinds of claims—most notably those for recognition and enforcement of intellectual property rights and similar proprietary interests—are afforded extensive and creative process, while others——most notably those for rec- ognition and vindication of information privacy, data protection, consumer, and worker claims-—are afforded only minimal or notional process.

NOTER_PAGE: (156 . 0.6541916167664671)
NOTER_PAGE: (157 . 0.14670658682634732)
would-be plaintiff must establish “injury in fact,”
NOTER_PAGE: (157 . 0.2312874251497006)
Confronted with a variety of situations involving complex, in- formationally mediated activities and correspondingly complex harms, the judicial system erected jurisdictional bulwarks against certain kinds of claims.
NOTER_PAGE: (157 . 0.43413173652694614)
propositions about harm, imminence, causal connection, and redressability rest on tightly constructed syllogisms that verge on circularity
NOTER_PAGE: (157 . 0.5179640718562875)
courts function principally to discipline deviations from marketplace norms rather than to correct more sys- tematic marketplace excesses.
NOTER_PAGE: (157 . 0.719311377245509)

Concreteness and the Problem of Intangibiiity

NOTER_PAGE: (158 . 0.2732035928143713)
Information privacy claims, they conclude, are really no more than generalized claims about the perceived un- fairness of economic and technological processes that people have not yet learned to accept.’
NOTER_PAGE: (158 . 0.4476047904191617)
One certainly could do at least as well (if not better) at valuing and compensating privacy injury.
NOTER_PAGE: (158 . 0.720059880239521)
both particularity and concreteness are so- cially constructed attributes.
NOTER_PAGE: (160 . 0.2687125748502994)

Imminence and the Problem of Risk

NOTER_PAGE: (160 . 0.5134730538922156)
courts have been consistently more receptive to risk-based reasoning about injury to dig- ital property interests.
NOTER_PAGE: (161 . 0.721556886227545)
Media coverage of data breaches also tends to point fingers at partic- ular culprits—the data custodian, its purportedly ham-fisted employees, and/or the nameless hackers that perpetrated the theft—rather than at the background condition of widespread, “ordinary” data harvesting and processing.
NOTER_PAGE: (162 . 0.4041916167664671)
many instances of payment fraud and identity theft do not stem from mass data breaches. Rather, they are the foreseeable results of design choices that privilege convenience and speed over data integrity and security.
NOTER_PAGE: (162 . 0.48877245508982037)
framing the data breach or the exposure toa chemical with a known risk profile as the exception warranting emergency response has enabled courts to ignore the extent to which background norms and design practices work to enshrine vulnerability as a marketplace norm.
NOTER_PAGE: (162 . 0.5531437125748503)

Traceability and the Problem of Causation

NOTER_PAGE: (162 . 0.6923652694610779)
NOTER_PAGE: (164 . 0.22005988023952097)
ever more intense political and ideological pushback against the very idea of broadly distributed liability
NOTER_PAGE: (164 . 0.36976047904191617)

Alone/Together: The Evolving Institutional Forms of Mass Justice

NOTER_PAGE: (165 . 0.34206586826347307)

Outsourced Production: Boilerplate and Beyond

NOTER_PAGE: (166 . 0.3944610778443114)
procedural devices that are designed to remove cer- tain kinds of disputes and ancillary knowledge production issues from the judicial system and assign responsibility for managing them to other actors.
NOTER_PAGE: (166 . 0.4176646706586827)
courts have become increasingly willing to enforce boilerplate clauses that constrain access to judicial process.
NOTER_PAGE: (166 . 0.718562874251497)
NOTER_PAGE: (167 . 0.25299401197604793)
As a practical matter, boilerplate waivers effectively instantiate private regulation
NOTER_PAGE: (167 . 0.38922155688622756)
NOTER_PAGE: (167 . 0.437125748502994)
The lens of managerialism, however, suggests a complementary perspective that situates boilerplate waivers of judicial process within the contemporary turn to outsourcing in the interest of lean and nimble production.
NOTER_PAGE: (167 . 0.5014970059880239)
rely on market-based shareholder action as the principal disciplinary mechanism.
NOTER_PAGE: (168 . 0.10104790419161677)
Once a particular kind of dispute has been outsourced, any larger policy issues that such disputes implicate may seem irrelevant, extraneous, or simply above the pay grade of the managerial employees to whom oversight is assigned,
NOTER_PAGE: (168 . 0.4041916167664671)
For the vast majority of consumers who become involved in disputes with providers of goods and services, the first and last stop is the provider’s internal process
NOTER_PAGE: (168 . 0.5538922155688623)
situate the systematic decentering of litigation for certain categories of disputes within the neo-Polanyian framework of institutional change
NOTER_PAGE: (170 . 0.48727544910179643)

Flexible Production: Aggregate Litigation Reconsidered

NOTER_PAGE: (170 . 0.6833832335329342)
aggregation and management of claims for asserted large-scale harm.
NOTER_PAGE: (170 . 0.7110778443113773)
The courts and Congress have systematically restricted access to class action procedures, and those procedures also have proved insufficiently adaptable to new kinds of claims for networked, intangible harm.
NOTER_PAGE: (171 . 0.23727544910179643)
Class complaints asserting broader, structural theories of civil wrong- doing not specifically delineated by statute face an uphill battle to both certification and admission of statistical evidence.
NOTER_PAGE: (171 . 0.437125748502994)
platform defendants in particular have developed a suite of powerful strategies for avoiding or drastically limiting both class certification and the scope of available remedies.
NOTER_PAGE: (172 . 0.10179640718562875)
NOTER_PAGE: (172 . 0.690119760479042)
NOTER_PAGE: (173 . 0.4880066170388751)
In practice, however, the flexible production of compensation and oversight has played out toward quite different ends, evolving in ways that have systematically minimized the likelihood of meaningful structural reform of market and public institutions.
NOTER_PAGE: (175 . 0.07196029776674938)

Modular Production: Intellectual Property Experimentalism (and Its Limits)

NOTER_PAGE: (175 . 0.2555831265508685)
In suits against platform firms, distributors of circumvention technologies, and other new information intermediaries, joinder of plaintiffs that together repre- sent entire industries has become routine. The result is effectively class litigation as to the copyrights involved, but without the restrictions that the requirements for class certification would impose.™
NOTER_PAGE: (176 . 0.1513647642679901)

Reimagining Dispute Resolution for the Era of Networked Harms and Large Numbers

NOTER_PAGE: (178 . 0.6401985111662531)

The Regulatory State in the Information Age

NOTER_PAGE: (181 . 0.1513647642679901)

Seeing Like a (Regulatory) State

NOTER_PAGE: (184 . 0.19520264681555005)

From Market Power to Platform Power

NOTER_PAGE: (185 . 0.06865177832919768)

Networks, Standards, and Transnational Governance Institutions

NOTER_PAGE: (213 . 0.14392059553349876)

Dominance as Hegemony: The Problem of Unchecked Authority

NOTER_PAGE: (230 . 0.11910669975186104)
the connection between market dominance and policy dominance tends to be indirect. In the era of copper wires and common carriage requirements, telephone carriers could not filter out undesirable or un- lawful conversations. The standards governing such matters as the layout of a type- writer keyboard or the arrangement of prongs on an appliance plug are thoroughly agnostc as to their users’ political beliefs and policy commitments. Many contemporary disagreements over technology policy arise precisely be- cause the emergence of networked information and communications technologies has set protocol and policy on converging paths.
NOTER_PAGE: (230 . 0.587262200165426)
NOTER_PAGE: (232 . 0.3763440860215054)

Network Power and Moral Hazard: The Problem of the Authoritarian End Run

NOTER_PAGE: (236 . 0.06947890818858561)

Extreme Multistakeholderism: The Problem of Public Accountability

NOTER_PAGE: (239 . 0.6393713813068652)

Technocracy and Its Discontents: The Problem of Publicly Available Law

NOTER_PAGE: (243 . 0.06368899917287014)
reliance on technical vernaculars produces both some obvious entry barriers and some less obvious obstacles to broadly democratic policymaking.
NOTER_PAGE: (244 . 0.10421836228287841)

Standards, Hubs, and Platforms: The Problem of Private Sovereignty

NOTER_PAGE: (245 . 0.3746898263027295)

Designing Institutional Forms for Rule of Law 2.0

NOTER_PAGE: (248 . 0.3763440860215054)

The Future(s) of Fundamental Rights

NOTER_PAGE: (249 . 0.1455748552522746)