Show Less
You do not have access to this content

Code Wars

10 Years of P2P Software Litigation

Rebecca Giblin

With reference to US, UK, Canadian and Australian secondary liability regimes, this insightful book develops a compelling new theory to explain why a decade of ostensibly successful litigation failed to reduce the number, variety or availability of P2P file sharing applications – and highlights ways the law might need to change if it is to have any meaningful effect in future.
Show Summary Details
This content is available to you


Rebecca Giblin


“21st Century Copyright Law in the Digital Domain Symposium Transcript” (2006) 13 Mich Telecomm Tech L Rev 247 <> at 30 January 2007.
Adams, Charles W, “A Brief History of Indirect Liability for Patent Infringement” (2006) 22 Santa Clara Computer & High Tech LJ 369.
Adar, Eytan and Huberman, Bernardo A, “Free Riding on Gnutella” (2000) 5(10) First Monday <> at 4 May 2005.
Alderman, John, Sonic Boom: Napster, P2P and the Future of Music (Fourth Estate, London, 2002).
Apathy, Paul, “Napster and New Zealand: Authorisation under the Copyright Act 1994” (2002) 33 Victoria U Wellington L Rev 287.
Asscher, Lodewijk, “‘Code’ as Law” in Dommering, E and Asscher, L (eds.), Coding Regulation (TMC Asser Press, The Hague, 2006).
Austin, Graeme W, “Importing Kazaa – Exporting Grokster” (2006) 22 Santa Clara Computer & High Technology Journal 577.
Baggs, Simon, “The UK view” (2005) (153) Copyright World 11.
Bartholomew, Mark and Tehranian, John, “The Secret Life of Legal Doctrine: The Divergent Evolution of Secondary Liability in Trademark and Copyright Law” (2006) 21 Berkeley Tech LJ 1363.
Beizer, Boris, “Software is Different” (2000) 10 Annals of Software Engineering 293.
Benkler, Yochai, “Coase’s Penguin, or, Linux and The Nature of the Firm” (2002) 112 Yale LJ 369.
Bhattacharjee, Sudip, et al, “Impact of legal threats on online music sharing activity: an analysis of music industry legal actions” (2006) 49 JL & Econ 91.
Biegel, Stuart, Beyond our Control? Confronting the limits of our legal system in the age of cyberspace (The MIT Press, Cambridge, 2001).
Birchall, Sydney, “A doctrine under pressure: the need for rationalisation of the doctrine of authorisation of infringement of copyright in Australia” (2004) 15 AIPJ 227.
Bowrey, Kathy and Rimmer, Matthew, “Rip, Mix, Burn: The Politics of Peer to Peer” (2005) 7(8) First Monday <> at 24 May 2007.
Boyle, James, “Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors” (1997) 66 U Cin L Rev 177.
Burgunder, Lee B, “Reflections on Napster: The Ninth Circuit Takes a Walk on the Wild Side” (2002) 39 AMBLJ 683.
Carroll, Michael W, “Disruptive Technology and Common Law Lawmaking: A Brief Analysis of A&M Records Inc v Napster Inc” (2002) 9 Vill Sports & Ent LJ 5.
Choi, Bryan H, “The Grokster Dead-end” (2006) 19 Harv JL & Tech 393.
Coats, William Sloan, Weinstein, Mark R and Zimmerman, Erik R, “Preand Post-Grokster Copyright Infringement Liability for Secondary and Tertiary Parties” (2005) 842 PLI/Pat 221.
Davis, Alan M, “Fifteen Principles of Software Engineering” (1994) 111(6) IEEE Software 94.
de Beer, Jeremy and Clemmer, Christopher D, “Global Trends in Online Copyright Enforcement: A Non-Neutral Role for Network Intermediaries?” (2009) 49 Jurimetrics Journal 375.
Depoorter, Ben and Vanneste, Sven, “Norms and Enforcement: the Case Against Copyright Litigation” (2005) 84 Or L Rev 1127.
de Zwart, Melissa, “Seriously Entertaining: The Panel and the future of fair dealing” (2003) 8(1) Media & Arts Law Review 1.
de Zwart, Melissa, Copyright VS Contract: The Role of Fair Dealing in the Digital Age (Faculty of Law, Monash University, 2005).
Docker, Lionel, “The ghost of Moorhouse” (2002) 7 Media & Arts Law Review 113.
Dogan, Stacey L, “Is Napster a VCR? The implications of Sony for Napster and other internet technologies” (2001) 52 Hastings LJ 939.
Dogan, Stacey L, “Code Versus the Common Law” (2003) 2 J Telecomm & High Tech L 73.
Dogan, Stacey L, “Sony, Fair Use, and File Sharing” (2005) 55 Case W Res 971.
Dommering, Egbert and Asscher, Lodewijk, Coding Regulation (TMC Asser Press, The Hague, 2006).
Dratler, Jay, “Common-sense (federal) common law adrift in a statutory sea, or why Grokster was a unanimous decision” (2006) 22 Santa Clara Computer & High Tech LJ 413.
Dreyfuss, Rochelle C and Ginsburg, Jane C, “Symposium on Constructing International Intellectual Property Law: The Role of National Courts: Draft Convention on Jurisdiction and Recognition of Judgments in Intellectual Property Matters” (2002) 77 Chi-Kent L Rev 1065.
Fagin, Matthew, Pasquale, Frank and Weatherall, Kim, “Beyond Napster: Using Antitrust Law to Advance and Enhance Online Music Distribution” (2002) 8 BU J Sci & Tech L 451.
Feder, Jesse, “Is Betamax Obsolete? Sony Corp of America v Universal City Studios Inc in the Age of Napster” (2004) 37 Creighton L Rev 859.
Feller, Joseph, Fitzgerald, Brian and Raymond, Eric S, Understanding Open Source Software Development (Addison-Wesley Professional, 2001).
Fisher, William W, Promises to keep: technology, law, and the future of entertainment (Stanford University Press, Stanford, 2004).
Fitzgerald, Brian, “Copyright Liability of Universities in the Networked Environment: The Issue of Peer to Peer (P2P) File Sharing” in Wissler, R (ed) Innovation in Arts, Media and Design: Fresh Challenges for the Tertiary Sector (Post Pressed, Flaxton, Qld, 2004).
Foo, Pam, “The liability of content providers for authorisation of copyright infringement in the cases of Cooper and Sharman” (2006) (64) Computers & Law 13.
“Forgotten Pioneer (20 Years of Hardware)” (2003) 21(3) PC World 91.
Ganley, Paul, “Surviving Grokster: Innovation and the Future of Peer-to-Peer” (2006) 28 (1) EIPR 2006 15.
Garnett, Kevin, Davies, Gillian and Harbottle, Gwilym, Copinger and Skone James on Copyright (15th edn., Sweet & Maxwell, London, 2005).
Gelski, RA, “Authorising Breaches of Copyright” (1976) 4 Business Law Review 192.
Gervais, Daniel, “Collective Management of Copyright: Theory and Practice in the Digital Age” in Daniel Gervais (ed.), Collective Management of Copyright and Related Rights (Wolters Kluwer, 2010).
Gervais, Daniel J, “The Price of Social Norms: Towards a Liability Regime for File-Sharing” (2004) 12 Intell Prop L 39.
Giblin, Rebecca, “Rewinding Sony: An Inducement Theory of Secondary Liability” (2005) 27(11) European Intellectual Property Review 428.
Giblin, Rebecca, “Sometimes it’s fair game to shoot the messenger, court decision shows”, The Age (Melbourne), 13 September 2005, 29.
Giblin, Rebecca and Davison, Mark, “Kazaa goes the way of Grokster? Authorisation of copyright infringement via peer-to-peer networks in Australia” (2006) 17(1) AIPJ 53–76.
Giblin, Rebecca, “Australia to become ‘nerve centre’ for P2P litigation?” (2006) 7(5) Computer Review International 156.
Giblin, Rebecca, “Kazaa Pays $151m”, The Age, 15 August 2006, 3.
Giblin, Rebecca, “On Sony, StreamCast and Smoking Guns” (2007) 29(6) European Intellectual Property Review 215–26.
Giblin, Rebecca, “A Bit Liable? A Guide to Navigating the US Secondary Liability Patchwork” (2008) 25(1) Santa Clara Computer & High Tech Law Journal 7.
Giblin, Rebecca, “The Uncertainties, Baby: Hidden Perils of Australia’s Authorisation Law” (2009) Australian Intellectual Property Journal 148.
Gilmore, Robert A, “Peer-to-peer: Copyright Jurisprudence in the New File-Sharing World, the Post Grokster Landscape of Indirect Copyright Infringement and the Digital Millennium Copyright Act” 5 Fl Coastal LJ 85.
Ginsburg, Jane C, “Four Reasons and a Paradox: The Manifest Superiority of Copyright over Sui Generis Protection of Computer Software” (1994) 94 Colum L Rev 2559.
Ginsburg, Jane C, “Putting Cars on the ‘Information Superhighway’: Authors, Exploiters, and Copyright in Cyberspace” (1995) 95 Colum L Rev 1466.
Ginsburg, Jane, “Extraterritoriality and Multiterritoriality in Copyright Infringement” (1997) 37 VAJIL 587.
Ginsburg, Jane C, “Copyright Use and Excuse on the Internet” (2000) 24 Colum-VLA JL & Arts 1.
Ginsburg, Jane C, “How Copyright Got a Bad Name for Itself” (2002) 26 Columbia Journal of Law and the Arts 61.
Ginsburg, Jane C, “Separating the Sony Sheep from the Grokster Goats: Reckoning the Future Business Plans of Copyright-Dependent Technology Entrepreneurs” (2008) 50 Arizona Law Review 577.
Ginsburg, Jane C and Ricketson, Sam, “Inducers and Authorisers: A Comparison of the US Supreme Court’s Grokster Decision and the Australian Federal Court’s KaZaa Ruling” (2006) 11(1) Media and Arts Law Review 1.
Greenfeld, Karl Taro, “Disabling the System” (1999) 4(4) Time Magazine 26.
Greubel, William, “A Comedy of Errors: Defining ‘Component’ in a Global Information Technology Market – Accounting for Innovation by Penalizing the Innovators” (2006) 24 J Marshall J Computer & Info L 507.
Groennings, Kristina, “Costs and Benefits of the Recording Industry’s Litigation against Individuals” (2005) 20 Berkeley Tech LJ 571.
Grossman, Craig, “The Evolutionary Drift of Vicarious Liability and Contributory Infringement: From Interstitial Gap Filler to Arbiter of the Content Wars” (2005) 58 SMU L Rev 357.
Hartmanis, Juris, “Turing Award Lecture: On Computational Complexity and the Nature of Computer Science” (1994) 37(10) Communications of the ACM 37.
Hays, Thomas, “The Evolution and Decentralisation of Secondary Liability for Infringements of Copyright-Protected Works: Part 1” (2006) 28(12) European Intellectual Property Review 617.
Holbrook, Timothy R, “The Intent Element of Induced Infringement” (2006) 22 Santa Clara Computer & High Tech LJ 399.
Honigsberg, Peter Jan, “The Evolution and Revolution of Napster” (2002) 36 USF L Rev 473.
Hughes, Justin, “On the logic of suing one’s customers and the dilemma of infringement-based business models” (2005) 22 Cardozo Arts & Ent LJ 725.
Izal, M, et al, “Dissecting BitTorrent: Five Months in a Torrent’s Lifetime” (2004) (April) Proc Passive & Active Measurement 2004 <> at 20 September 2006.
Johnson, David R and Post, David, “Law and Borders: The Rise of Law in Cyberspace” (1996) 48 Stan L Rev 1367.
Kan, Gene, “Gnutella” in Oram, A (ed.) Peer-to-Peer: Harnessing the Power of Disruptive Technologies (O’Reilly, Sebastopol, 2001).
Katsh, M Ethan, “Cybertime, Cyberspace and Cyberlaw” (1995) Journal of Online Law Art 1.
Katsh, M Ethan, Law in a Digital World (Oxford University Press, New York, 1995).
Katsh, M Ethan, “Software Worlds and the First Amendment: Virtual Doorkeepers in Cyberspace” 1996 University of Chicago Legal Forum 335.
Keating, Gregory C, “The Theory of Enterprise Liability and Common Law Strict Liability” (2001) 54 Vanderbilt Law Review 1285.
Kesan, Jay P and Shah, Rajiv C, “Deconstructing Code” (2003–2004) 6 Yale J L & Tech 277.
Kesan, Jay P and Shah, Rajiv C, “Shaping Code” (2005) 18 Harv J Law & Tech 319.
Klar, LN, Tort Law (Carswell, Toronto, 1996).
Klein, Alec, “Going Napster One Better; Aimster Says Its File-Sharing Software Skirts Legal Quagmire”, Washington Post, 25 February 2001, <> at 29 September 2006.
Kraakman, Reinier H, “Gatekeepers: The Anatomy of a Third-Party Enforcement Strategy” (1986) 2(1) Journal of Law, Economics & Organization 53.
Ku, Raymond Shih Ray, “The Creative Destruction of Copyright: Napster and the New Economics of Digital Technology” (2002) 69 U Chi L Rev 263.
Laddie, Hugh, Prescott, Peter and Vitoria, Mary, The Modern Law of Copyright (Butterworths, London, 1980).
Laddie, Hugh, Prescott, Peter and Vitoria, Mary, The Modern Law of Copyright and Designs (2nd edn., Butterworths, London, 1995).
Laddie, Hugh, et al, The Modern Law of Copyright and Designs (3rd edn., Butterworths, London, 2000).
Lardner, James, Fast forward: Hollywood, the Japanese, and the onslaught of the VCR (Norton, New York, 1987).
Lee, Andrew J, “MGM Studios Inc v Grokster Ltd & In re Aimster Litigation: A Study of Secondary Copyright Liability in the Peer-to-Peer Context” (2005) 20 Berkeley Tech LJ 485.
Lee, Ellen, “Founder of BitTorrent unlocks the secrets of online file sharing”, San Francisco Chronicle (San Francisco), 6 August 2006, <> at 28 August 2006.
Lemley, Mark A and Reese, R Anthony, “Reducing Digital Copyright Infringement Without Restricting Innovation” (2004) 56 Stan L Rev 1345.
Lemley, Mark A and Reese, R Anthony, “A Quick and Inexpensive System for Resolving Peer-to-peer Copyright Disputes” (2005) 23 Cardozo Arts & Ent LJ 1.
Lemley, Mark A, “Inducing Patent Infringement” (2005) 39 UC Davis L Rev 225.
Lessig, Lawrence, “Reading the Constitution in Cyberspace” (1996) 45 Emory LJ 869.
Lessig, Lawrence, “The Zones of Cyberspace” (1996) 48 Stan L Rev 1403.
Lessig, Lawrence, “The Law of the Horse: What Cyberlaw Might Teach” (1999) 113 Harvard Law Review 501.
Lessig, Lawrence, “The Limits in Open Code: Regulatory Standards and the Future of the Net” (1999) 14 Berkeley Tech LJ 759.
Lessig, Lawrence, Code and other laws of cyberspace (Basic Books, New York, 1999).
Levy, Steven, Hackers: Heroes of the Computer Revolution (Dell Publishing, New York, 1994).
Lewis, Jeffrey, “The Yellow Submarine Steers Clear of US Copyright Law: The Ninth Circuit Re-examines the Doctrine of Contributory Infringement” (1996) 18 Loyola LA International & Comparative Law Journal 371.
Lichtman, Doug and Posner, Eric, “Holding Internet Service Providers Accountable” (2006) 14 Supreme Court Economic Review 221.
Lichtman, Douglas and Landes, William, “Indirect Liability for Copyright Infringement: An Economic Perspective” (2003) 16 Harv J Law & Tech 395.
Lindsay, David, “Internet intermediary liability: a comparative analysis in the context of the Digital Agenda reforms” (2006) 1&2 Copyright Reporter 70–86.
Lipton, Jacqueline D, “Solving the Digital Piracy Puzzle: Disaggregating Fair Use from the DMCA’s Anti-Device Provisions” (2005) 19 Harv J Law & Tech 111.
Lipton, Jacqueline D, “IP’s Problem Child: Shifting the Paradigms for Software Protection” (2006) 58 Hastings Law Journal 205.
Litman, Jessica, Digital Copyright (Prometheus Books, Amherst, 2001).
Litman, Jessica, “Sharing and Stealing” (2004) 27 Hastings Comm & Ent LJ 1.
Litman, Jessica, “The Sony Paradox” (2005) 55 Case W Res L Rev 917.
Litman, Jessica, “The Story of Sony v Universal Studios: Mary Poppins Meets the Boston Strangler” in Ginsburg, J C and Dreyfuss, R C (eds.), Intellectual Property Stories (Foundation Press, 2005).
Litman, Jessica, “The Copyright Revision Act of 2026” (2009) 13 Marquette Intellectual Property Review 249.
McBride, Sarah and Smith, Ethan, “Music Industry to Abandon Mass Suits”, Wall Street Journal (New York), 19 December 2008, B1.
McKeown, John S, Fox on Canadian Law of Copyright and Industrial Designs (3rd edn., Carswell, Ontario, 2000).
Menell, Peter S, “Envisioning Copyright Law’s Digital Future” (2002/2003) 46 NYL Sch L Rev 63.
Menell, Peter S, “Indirect Copyright Liability and Technological Innovation” (2009) 32 Columbia Journal of Law & the Arts 375.
Menell, Peter S and Nimmer, David, “Legal Realism in Action: Indirect copyright liability’s continuing tort framework and Sony’s de facto demise” (2007) 55 UCLA Law Review 143.
Menell, Peter S and Nimmer, David, “Unwinding Sony” (2007) 95 California Law Review 941.
Menn, Joseph, All the rave: the rise and fall of Shawn Fanning’s Napster (Crown Business, New York, 2003).
Miles, Elizabeth, “Note, In re Aimster & MGM, Inc v Grokster Ltd, Peer-to-Peer and the Sony Doctrine” (2004) 19 Berkeley Tech LJ 21.
Miller, Cynthia, “Do you Grok? Substantial Certainty in Contributory Copyright Infringement” (2006) 2 Seton Hall Circuit Rev 591.
Minahan, Simon, “Sharman and Cooper: tearing at the fabric of s 112E?” (2005) 8(8) Internet Law Bulletin 108.
Minahan, Simon, “Power to prevent and authorisation of copyright infringement: Cooper and Sharman (again!)” (2006) 18(9) Australian Intellectual Property Law Bulletin 133.
Mitchell, William J, City of Bits (The MIT Press, Cambridge, 1995).
Moody, Glyn, Rebel Code: the inside story of Linus and the open source revolution (Perseus Books Group, Cambridge, 2001).
Moor, James H, “What is Computer Ethics?” (1985) 16(4) Metaphilosophy 266.
Opderbeck, David W, “Peer-to-Peer Networks, Technological Evolution, and Intellectual Property Reverse Private Attorney General Litigation” (2005) 20 Berkeley Tech LJ 1685.
Oppenheimer, Max Stul, “Yours for Keeps: MGM v Grokster” (2005) 23 J Marshall J Computer & Info L 209.
Oram, Andy, Peer-to-Peer: Harnessing the Power of Disruptive Technologies (O’Reilly, Sebastopol, 2001).
Owen, David G, Products Liability Law (West, St Paul, 2005).
Parloff, Roger, “The Real War Over Piracy – From Betamax to Kazaa a legal battle is raging over the “Magna Carta of the technology age.” (13 October 2003) Fortune < (subscription only)> at 9 March 2006.
Pessach, Guy, “An International-Comparative Perspective on Peer-to-Peer File-Sharing and Third Party Liability in Copyright Law: Framing the Past, Present, and Next Generations’ Questions” (2007) 40(87) Vand J Transnat’l L.
Phillips, Jeremy, “Authorising Copyright Infringements” (1980) 2 Journal of Business Law 109.
Piasentin, Robert C, “Unlawful? Innovative? Unstoppable? A Comparative Analysis of the Potential Legal Liability Facing P2P End-Users in the United States, United Kingdom and Canada” (2006) 14 International Journal of Law & Information Technology 195.
Picker, Randal C, “Copyright as Entry Policy: The Case of Digital Distribution” (2002) 47 Antitrust Bulletin 423.
Picker, Randal C, “Rewinding Sony: The Evolving Product, Phoning Home and the Duty of Ongoing Design” (2005) 55 Case W Res L Rev 749.
Plotkin, Robert, “Computer Programming and the Automation of Invention: A Case for Software Patent Reform” 2003 UCLA JL & Tech 7.
Post, David G, Bridy, Annemarie and Sandefur, Timothy, “‘Nice Questions’ Unanswered: Grokster, Sony’s Staple Article of Commerce Doctrine, and the Deferred Verdict on Internet File Sharing” (2004–2005) 2005 Cato Sup Ct Rev 235.
Pouwelse, J, et al, “A Measurement Study of the BitTorrent Peer-to-Peer File-Sharing System” (2004) Technical Report PDS-2004-007, Delft University of Technology, The Netherlands, April 2004. <> at 20 September 2006.
Reese, R Anthony, “The Temporal Dynamics of ‘Capable of Substantial Non-infringing Uses’” (2006) 13 Mich Telecomm Tech L Rev 197.
Reidenberg, Joel R, “Lex Informatica: The formulation of information policy rules through technology” (1998) 76 Tex L Rev 553.
Rietjens, Bob, “Give and Ye Shall Receive! The Copyright Implications of BitTorrent” (2005) 2:3 SCRIPT-ed 327 <> at 24 November 2006.
Rimmer, Matthew, “Hail to the Thief: A Tribute to Kazaa” (2005) 2(1) University of Ottawa Law & Technology Journal 173.
Roth, Daniel, “Torrential Reign” (2005) Fortune < (subscription only)> at 30 June 2006.
Sag, Matthew, “Piracy: Twelve Year-Olds, Grandmothers, and other good targets for the recording industry” (2006) 4 Nw J Tech & Intell Prop 133.
Samuelson, Pamela, “Contu Revisited: The Case against Copyright Protection for Computer Programs in Machine-readable Form” 1984 Duke Law Journal 663.
Samuelson, Pamela, “Legally speaking: What’s at stake in MGM v Grokster?” (2004) 47(2) Communications of the ACM 15.
Samuelson, Pamela, “The Generativity of Sony v Universal: The Intellectual Property Legacy of Justice Stevens” (2006) 74 Fordham Law Review 1831.
Samuelson, Pamela, “Three Reactions to MGM v Grokster” (2006) 13 Mich Telecomm Tech L Rev 177 <> at 1 February 2006.
Schultz, Jason, “The False Origins of the Induce Act” (2005) 32 N Ky L Rev 527.
Schultz, Mark F, “Fear and Norms and Rock & Roll: What Jambands Can Teach Us About Persuading People to Obey Copyright Law” (2006) 21 Berkeley Tech LJ 651.
Scott, Mike, “Safe Harbors under the Digital Millennium Copyright Act” (2005–2006) 9 NYU J Legis & Pub Policy 99.
Sherman, Brad and Bently, Lionel, The Making of Modern Intellectual Property Law – The British Experience, 1760–1911 (Cambridge University Press, Cambridge, 1999).
Shirky, Clay, “Listening to Napster” in Oram, A (ed.) Peer-to-Peer: Harnessing the Power of Disruptive Technologies (O’Reilly, 2001).
Solum, Lawrence B and Chung, Minn, “The Layers Principle: Internet Architecture and the Law” (2004) 79 Notre Dame L Rev 815.
Steckley, Craig, “MGM v Grokster: A Disincentive for Technological Responsibility” (2005) 7 Tul J Tech & Intell Prop 299.
Strahilevitz, Lior Jacob, “Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Swapping Networks” (2003) 89 Virginia Law Review 505.
Strowel, Alain “The ‘Graduated Response’ in France: Is it the Good Reply to Online Copyright Infringements?” in Stamatoudi, Irene A (ed.) Copyright Enforcement and the Internet (Kluwer Law International, Alphen aan den Rijn, 2010).
Stuckey, Jennifer E, “Liability for Authorizing Infringement of Copyright” (1984) 7 University of New South Wales Law Journal 77.
Swinson, John, “Copyright or Patent or Both: An Algorithmic Approach to Computer Software Protection” (1991) 5 Harv J Law & Tech 145.
Vaver, David, Copyright Law (Irwin Law, Toronto, 2000).
Vincent, Charles B, “BitTorrent, Grokster, and why Entertainment and Internet Lawyers need to Prepare for the Fair Use Argument for Downloading TV Shows” (2007) 10(11) Journal of Internet Law 1.
Wagner, R Polk, “On Software Regulation” (2005) 78 S Cal L Rev 457.
Watt, Richard, Copyright and Economic Theory (Edward Elgar, Cheltenham, 2000).
Weizenbaum, Joseph, Computer Power and Human Reason (WH Freeman and Company, San Francisco, 1976).
Wright, Charles S, “Actual Versus Legal Control: Reading Vicarious Liability for Copyright Infringement into the Digital Millennium Copyright Act of 1998” (2003) 75 Wash L Rev 1005.
Wu, Tim, “Application-Centered Internet Analysis” (1999) 85 Va L Rev 1163.
Wu, Tim, “When Code Isn’t Law” (2003) 89 Virginia Law Review 679.
Wu, Tim, “The Copyright Paradox” 2005 Supreme Court Review 229.
Wu, Tim, The Master Switch (Knopf, New York, 2010).
Yen, Alfred C, “Internet Service Provider Liability for Subscriber Copyright Infringement, Enterprise Liability, and the First Amendment” (2000) 88 Geo LJ 1833.
Yen, Alfred C, “Sony, Tort Doctrines, and the Puzzle of Peer-To-Peer” (2005) 55 Case Western Reserve Law Review 815.
Yen, Alfred C, “Third-Party Copyright Liability after Grokster” (2005) 91 Minnesota Law Review 184.
Yu, Peter K, “The Escalating Copyright Wars” (2004) 32 Hofstra Law Review 907.
Zimmerman, Diane Leenheer, “Daddy, are we there yet? Lost in Grokster-land” (2005–2006) 9 NYU Journal of Legislation and Public Policy 75.
Zittrain, Jonathan, “A History of Online Gatekeeping” (2006) 19 Harv J Law & Tec 253.
Zittrain, Jonathan, “The Generative Internet” (2006) 119 Harvard Law Review 1974.

Other sources

Internet resources

“About Etree Org” Etree Org, <>, (27 November 2004) accessed at 29 August 2006.
Alderson Reporting Company, “Transcript of Oral Argument in the Supreme Court of the United States of America in the matter of Metro-Goldwyn-Mayer Studios Inc v Grokster, 29 March 2005”, <>, accessed at 11 April 2005.
Anderson, Nate, “MPAA head wants deeper relationship (read: content filtering) with ISPs” Ars Technica, <>, (19 September 2007) accessed at 1 December 2010.
Anderson, Nate, “Pirate Bay ISP hit with German injunction; must stop hosting” Ars Technica, <>, (13 May 2010) accessed at 8 November 2010.
Anderson, Nate, “RIAA graduated response plan: Q&A with Cary Sherman” Ars Technica, <>, (21 December 2008) accessed at 1 December 2010.
Anonymous, “The BitTorrent Bible”, <>, (30 January 2005) accessed at 29 August 2006.
“Anti-Piracy Group Stuns the World with Torrent Site Massacre” Torrentfreak, <>, (15 July 2010) accessed at 8 November 2010.
“Ants P2P” Sourceforge, <>, accessed at 15 November 2010.
“Ars Technica Forgets How Torrents work, Cites Faulty Study” Politics and P2P, <>, (23 July 2010) accessed at 18 October 2010.
“Audio & Multimedia MPEG Audio Layer-3 - History” Fraunhofer Institut Integrierte Schaltungen, <>, accessed at 25 February 2005.
Baker, Luke, “Music piracy Web site closed after UK, Dutch raids” Reuters, <>, (23 October 2007) accessed at 5 November 2010.
Bangeman, Eric, “P2P responsible for as much as 90 percent of all ‘Net traffic” Ars Technica, <>, (3 September 2007) accessed at 6 September 2007.
Bangeman, Eric, “P2P traffic shifts away from music, towards movies” Ars Technica, <>, (6 July 2007) accessed at 18 November 2010.
Baset, Salman A and Schulzrinne, Henning, “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol” Cornell University Library arXiv, <>, (15 September 2004) accessed at 6 February 2007.
Becker, Gary, “Grokster and the Scope of Judicial Power-BECKER” The Posner-Becker Blog, <>, (3 July 2005) accessed at 8 February 2007.
“BitTorrent client” Wikipedia, <>, (21 October 2007) accessed at 9 November 2010.
“BitTorrent Goes Trackerless: Publishing with BitTorrent gets easier!” BitTorrent Inc, <>, accessed at 19 September 2006.
“BitTorrent Open Source License” BitTorrent, <>, accessed at 19 October 2010.
“BitTorrent Protocol Specification v1.0”, <>, (13 September 2006) accessed at 20 September 2006.
Borland, John, “AOL Instant Messenger gets Napsterized”, CNet News. com, 9 August 2000, <> accessed at 13 July 2010.
Borland, John, “Napster offers recording industry $1 billion” CNet News. com, <>, (20 February 2001) accessed at 30 March 2005.
Borland, John and Mariano, Gwendolyn, “Looking for the next Napster” CNet, <>, (5 July 2001) accessed at 18 May 2005.
Borland, John, “Rocky financial road awaits file swappers” CNet News. com, <>, (21 September 2001) accessed at 19 May 2005.
Borland, John, “Morpheus looks to Gnutella for help” CNet, <>, (27 February 2002) accessed at 26 October 2006.
Borland, John, “Roxio closes Napster asset buy” CNet, <>, (27 November 2002) accessed at 5 May 2005.
Borland, John, “Free vs. fee: Underground still thrives” CNet, <>, (30 May 2003) accessed at 25 January 2006.
Borland, John, “Database “upgrades” keep Napster down” CNet, <>, accessed at 15 October 2007.
Boudreau, John, “Illegal file sharing showing no letup” Seattle Times, <>, (3 July 2006) accessed at 7 September 2007.
Bowes, Peter, “Warner to start movie downloads” BBC News, <>, (9 May 2006) accessed at 29 August 2006.
Bowman, John, “The Pirate Bay” CBC News, <>, (9 June 2006) accessed at 7 November 2010.
Bridis, Ted, “‘Kazaa’ makers settle piracy lawsuits” Seattle Post Intelligencer, <>, (28 July 2006) accessed at 1 August 2006.
Burger, James M, et al, “Grokster Roundtable” Wall Street Journal, <,SB111876448710759221,00.html>, (28 June 2005) accessed at 29 June 2005.
Buskirk, Eliot Van, “Survey Says Most Share Files without Fear of RIAA Lawsuits” Wired, <>, (24 April 2007) accessed at 10 October 2007.
Bylund, Anders, “RIAA defendant dies, heirs given 60 days to grieve before depositions”, Ars Technica, <>, (12 August 2006), accessed at 8 November 2010.
Clarke, Ian, et al, “Freenet: A Distributed Anonymous Information Storage and Retrieval System”, <>, accessed at 14 April 2005.
Cohen, Bram, “Incentives Build Robustness in BitTorrent”, <>, (22 May 2003) accessed at 4 August 2006.
Cohen, Bram, “Mark Cuban says BitTorrent is doomed, DOOMED!” Livejournal, <>, (31 January 2007) accessed at 8 February 2007.
“Company Overview”, <>, accessed at 24 October 2007.
“Complaint for Damages and Injunctive Relief for Copyright Infringement” Electronic Frontier Foundation, <>, accessed at 26 October 2006.
Crawford, Krysten, “Feds bite BitTorrent” CNN, <>, (26 May 2005) accessed at 9 November 2010.
Daly, Steven, “Pirates of the Multiplex” Vanity Fair, <>, (March 2007) accessed at 24 February 2007.
“Download site Suprnova closes amid Hollywood crackdown” New Zealand Herald, <>, (22 December 2004), accessed at 5 November 2010.
Eclipse, “A&M Records Inc v Napster Inc – Transcript of Proceedings in United States District Court for the Northern District of California, 11 July 2001.” FindLaw, <>, accessed at 30 March 2005.
Emery, Daniel, “Court ruling forces Mininova to end illegal torrents” BBC News, <>, (26 November 2009) accessed at 16 November 2010.
Ernesto, “Facebook uses BitTorrent, and they love it” Torrentfreak, <>, (25 June 2010) accessed at 8 November 2010.
Ernesto, “The World’s 5 Largest Public BitTorrent Trackers” Torrentfreak, <>, (14 June 2010) accessed at 9 November 2010.
“FAQ”, VODO, <>, accessed at 11 November 2010.
Felten, Edward, “BitTorrent Search” Freedom to Tinker, <>, (26 May 2005) accessed at 26 November 2006.
Felten, Edward, “BitTorrent: The Next Main Event” Freedom to Tinker, <>, (28 June 2005) accessed at 30 May 2006.
Felten, Edward, “Entertainment Industry Pretending to Have Won Grokster Case” Freedom to Tinker, <>, (3 August 2005) accessed at 4 August 2005.
Felten, Edward, “Business Model as Evidence of Intent” Freedom to Tinker, <>, accessed at 6 February 2007.
“File-Swap Site Folds for Good” Wired News, <,1412,66099,00.html>, (20 December 2004) accessed at 24 February 2007.
“For Developers”, <>, (2006) accessed at 24 November 2006.
“FreeNet’s Ian Clarke Answers Privacy Questions” Slashdot, <>, (10 April 2000) accessed at 19 September 2010.
“Frequently Asked Questions: BitTorrent Distribution” Blizzard Entertainment, <>, accessed at 19 September 2006.
Gadea, Larry “Murder: Fast datacenter code deploys using BitTorrent” Twitter Engineering, <>, (15 July 2010) accessed at 8 November 2010.
Gohring, Nancy, “eDonkey, Record Industry Reach a Deal” PC World, <,127126-page,1-c,peertopeer/article.html>, (13 September 2006) accessed at 3 October 2006.
“Google Chrome Terms of Service” Google, <>, accessed at 15 February 2011.
Graham, Jefferson, “BitTorrent gets $8.75M from venture-capital firm” USA TODAY, <>, (26 September 2005) accessed at 5 January 2007.
Grimmelmann, James, “The LawMeme Reader’s Guide to Ernie Miller’s Guide to the INDUCE Act” Law Meme, <>, (15 July 2004) accessed at 23 January 2007.
Gross, Grant, “Despite Lawsuits, P-to-P Use Still Growing” PC World, <,138138-c,onlineentertainment/article.html>, (5 October 2007) accessed at 10 October 2007.
“GTK-GNUTELLA” Sourceforge, <>, accessed at 15 November 2010.
“Heroes – Run!”, <!/episode/924072/summary.html?om_act=convert&om_clk=episodessh&tag=episodes;title;1>, accessed at 15 February 2007.
“History of 2003”, The Pirate Bay, <>, accessed at 9 November 2010.
Hof, Rob, “Larry Lessig: Grokster Decision Will Chill Innovation” BusinessWeek Online: The Tech Beat, <>, (28 June 2005) last accessed at 2 February 2011.
“How to set up your own BitTorrent website (Part I – Intro/Config)” FileShareFreak, <>, (22 February 2008) last accessed at 9 November 2010.
Hu, Jim, “Controversial Winamp creator resigns from AOL” CNet News. com, <>, (26 January 2004) accessed at 31 March 2005.
“In Praise of P2P” The Economist, < (subscription required)>, (2 December 2004) accessed at 1 July 2005.
Jardin, Xeni, “Hollywood Wants BitTorrent Dead” Wired, <>, (14 December 2004) accessed at 5 November 2010.
Jardin, Xeni, “P2P App’s Aim: Defend Free Speech” Wired, <>, (29 October 2002) accessed at 19 September 2010.
Kapor, Mitchell and Barlow, John Perry, “Across the Electronic Frontier” Electronic Frontier Foundation, <>, (10 July 1990) accessed at 3 September 2007.
Knopper, Steve, “RIAA’s Gaze Turns from Users to ISPs in Piracy Fight” Rolling Stone, <>, (19 December 2008) accessed at 1 December 2010.
Koning, Jasper, “Dutch court cracks down on Kazaa” CNet News, <;26n>, (29 November, 2001) accessed at 25 September 2010.
Kravets, David, “ACTA Backs Away from 3 Strikes” Wired, <>, (21 April 2010) accessed at 1 December 2010.
Kravets, David, “Pirate Bay Retires World’s Largest BitTorrent Tracker”, Wired, <>, (17 November 2009) accessed at 7 November 2010.
Kuptz, Jerome, “Independence Array: Gnutella, Unstoppable by Design” Wired Magazine, <>, (October 2000) accessed at 15 April 2005.
Kushner, David, “The World’s Most Dangerous Geek” Rolling Stone, <>, (13 January 2004) accessed at 22 March 2005.
“Legal threats against The Pirate Bay” The Pirate Bay, <>, accessed at 24 February 2007.
Leiner, Barry M et al, “A Brief History of the Internet” Internet Society, <>, accessed at 7 March 2005.
LeMay, Renai, “Ballarat’s BitTorrent study ‘horribly wrong’: TorrentFreak” PC World, <>, (26 July 2010) accessed at 18 October 2010.
Liang, Jian, Kumar, Rakesh and Ross, Keith W, “Understanding KaZaA”, <>, accessed at 25 January 2007.
Lohmann, Fred von, “MGM v Grokster: More Bad News for Innovators” Electronic Frontier Foundation, <>, (28 September 2006) accessed at 12 October 2006.
Lohmann, Fred von, “What Peer-to-Peer Developers Need to Know about Copyright Law” Electronic Frontier Foundation, <>, (January 2006) accessed at 12 November 2010.
McMillan, Robert, “Sony rootkit settlement with states reaches $5.75M”, <>, (21 December 2006) accessed at 8 July 2009.
Mennecke, Thomas, “BitTorrent Addresses Closed Source Issues” Slyck, <>, (8 August 2007) accessed at 31 October 2007.
“MGM v Grokster” Electronic Frontier Foundation, <>, last accessed on 9 November 2010.
Miller, Ernest, “Some Notes on Grokster” The Importance Of., <>, (27 June 2005) accessed at 17 January 2007.
Mugrabi, Sunshine, “BitTorrent Hooks Big Studios” Red Herring, <>, (29 November 2006) accessed at 4 January 2007.
“Music file-sharer ‘Oink’ cleared of fraud” BBC, <>, (15 January 2010) accessed at 5 November 2010.
“MUTE Simple, Anonymous File Sharing” Sourceforge, <>, accessed at 15 November 2010.
“Napster: Stealing or Sharing?” CNN, <>, accessed at 19 December 2005.
Norton, Quinn, “Secrets of the Pirate Bay” Wired News, <,71543-0.html>, (16 August 2006) accessed at 24 February 2007.
“Online News Hour – Forum: Copyright Conundrum” Public Broadcasting Service, <>, (June 2003) accessed at 8 March 2005.
Ou, George, “BitTorrent buys uTorrent, reaction mixed” ZDnet, <>, (7 December 2006) accessed at 9 July 2007.
“P-to-P goes Hollywood” InfoWorld, <>, (1 January 2007) accessed at 8 January 2007.
“P2P Survey 2006” ipoque, <>, accessed at 16 November 2010.
Patry, William, “Grokster Remand Opinion” The Patry Copyright Blog, <>, (28 September 2006) accessed at 13 October 2006.
Paul, Ryan, “BitTorrent’s closed protocol: fact or fiction? (updated)” Ars Technica, <>, (10 August 2007) accessed at 23 October 2007.
“Peer Exchange” Vuze, <>, (12 May 2010) accessed at 9 November 2010.
Perens, Bruce, “Free Software Leaders Stand Together” <>, accessed at 19 February 2007.
Peterson, Kim, “BitTorrent file-sharing program floods the Web” Seattle Times, <>, (10 January 2005) accessed at 3 July 2005.
Picker, Randal C, “Rewinding Sony: Third-Party Copyright Liability After Grokster” <>, accessed at 16 January 2007.
Poulsen, Kevin, “Next for BitTorrent: Search” Wired News, <,67596-0.html>, (23 May 2006) accessed at 13 December 2006.
“Press Release: Music Industry Announces Grokster Settlement” Recording Industry Association of America, <>, (7 November 2005) accessed at 3 October 2006.
“Programming Assignment 4” University of Notre Dame – Computer Science and Engineering, <>, accessed at 25 February 2007.
“Programming Assignment 5” University of Notre Dame – Computer Science and Engineering, <>, accessed at 25 February 2007.
“Record industry, Kazaa settle music case” The Age, <>, (27 July 2006) accessed at 11 October 2010.
“RIAA v The People: Four years later” Electronic Frontier Foundation, <>, (29 August 2007) accessed at 7 September 2007.
Ricknäs, Mikael, “Pirate Party flops in Swedish Parliament elections” CIO, <>, (20 September 2010) accessed at 8 November 2010.
Ricknäs, Mikael, “The Pirate Bay moves to counter Swedish wiretapping law” Computerworld, <>, (24 June 2008) accessed at 8 November 2010.
Rosenblatt, Bill, “Induce Act Dead for This Year” DRM Watch, <>, (14 October 2004) accessed at 23 January 2007.
“S. 3804: Combating Online Infringement and Counterfeits Act” Govtrack – a civic project to track Congress, <>, accessed at 1 December 2010.
Sandoval, Greg, “BitTorrent receives $20 million in financing” CNet, <>, (30 November 2006) accessed at 5 January 2007.
Schiesel, Seth, “File Sharing’s New Face” The New York Times, <>, (12 February 2004) accessed at 24 November 2006.
Scribd, <>, (3 November 2010) last accessed at 28 January 2011.
Shankland, Stephen, “Google quietly updates Chrome”, ZDNet, <>, (9 September 2008) accessed at 15 February 2011.
Shirky, Clay, “What is P2P. And what isn’t.” O’Reilly P2P, <>, (24 November 2000) accessed at 5 September 2007.
Slater, Derek, “Grokster, Intent and Cert” A Copyfighter’s Musings, <>, (22 August 2004) accessed at 25 January 2007.
“Software” Oxford English Dictionary, <>, accessed at 10 September 2007.
“Software Map: BitTorrent project results” Source Forge, <>, accessed at 24 October 2007.
“Software Map: file sharing project results” Source Forge, <>, accessed at 24 October 2007.
Source Forge, <[]=trove:251&fq[]=trove:622>, accessed at 25 November 2011.
“Standard Message Architecture” Gnutella Developer Forum, <>, (14 April 2005) accessed at 4 May 2005.
Strahilevitz, Lior, “Is Grokster Erasing “Capable” from Sony?” Picker MobBlog, <>, (27 June 2005) accessed at 17 January 2007.
Strahilevitz, Lior, “Grokster: Congress and the Courts” Picker MobBlog, <>, (27 June 2005) accessed at 22 January 2007.
Swartz, Oscar, “The Pirate Bay Guilty; Jail for File-Sharing Foursome” Wired, <>, (17 April 2009) accessed at 8 November 2010.
“The Free Network Project” Freenet, <>, (2 August 2005) accessed at 4 August 2005.
“The Secure Digital Music Initiative” Secure Digital Music Initiative, <>, accessed at 4 April 2005.
Truelove, Kelly, “Gnutella: Alive, Well, and Changing Fast” O’Reilly Networks, <>, (25 January 2001) accessed at 4 May 2005.
“Victory or defeat?”, <>, (12 February 2001) accessed at 24 August 2006.
Weatherall, Kimberlee, “Justice Wilcox is a brave judge: some initial comments on the Kazaa judgment” Weatherall’s Law, <>, (5 September 2005) accessed at 24 May 2007.
Weekly, David, “The Online MP3 Book” <>, accessed at 25 February 2005.
Welte, Jim, “Bearshare, RIAA settle for $30M”, <>, (4 May 2006) accessed at 17 October 2006.
“Worlds most resiliant [sic] tracking” The Pirate Bay, <>, (17 November 2009) accessed at 9 November 2010.
Wu, Tim, “A Supreme Court Conversation – The Miss Manners School of Jurisprudence” Slate, <>, (28 June 2005) accessed at 15 February 2007.

Looseleaf services

M Bender, Nimmer on copyright.
Butterworths, Copyright and Designs / James Lahore, Warwick A Rothnie.
LBC Information Services, The law of intellectual property: copyright, designs & confidential information / Staniforth Ricketson and Christopher Creswell.
Little, Brown & Co, Paul Goldstein, Copyright.


Discussion Paper: Copyright Reform and the Digital Agenda, (1997), <,_and_digital_and_online_ip/copyright_reform_and_the_digital_agenda/copyright_reform_and_the_digital_agenda_-_discussion_paper> at 1 May 2006.
Internet Commerce Security Laboratory, “Investigation into the extent of infringing content on BitTorrent networks” Australian Federation Against Copyright Theft, <>, (April 2010) accessed at 18 October 2010.
Dr Mark Motivans, Intellectual Property Theft, 2002, Bureau of Justice Statistics <> at 11 November 2005.
Lindsay, David, Copyright Infringement via the Internet: The Liability of Intermediaries, University of Melbourne.

Conference papers

Leibowitz, Nathaniel, Ripeanu, Matei and Wierzbicki, Adam, “Deconstructing the Kazaa Network” (Paper presented at the Third IEEE Workshop on Internet Applications, 23–24 June 2003).
Wang, Yingxu, “Keynote Lecture: On the Informatics Laws of Software” (Paper presented at the Proceedings of the First IEEE International Conference on Cognitive Informatics.