Some of us, yes. Bear in mind, we are dealing with real value here; the value of intellectual property is theoretical and not relevant to the torrentors themselves.
It seems to me that what matters for a security model is not whether the "legitimate" participants ascribe value to their activities (all value being a matter of perception, in my very humble opinion), it's whether their opponents do, and given the existence of (technologically sophisticated) agents interested disrupting filesharing networks, one would say that the analogy between torrent trackers and pools is not entirely off-base due to apparent existence of (relatively) technologically sophisticated opponents who would find disrupting the respective services to be a source of benefit (financial or otherwise)
Anyways, I find the fact that an apparently notable (though sadly unquantified) number of pool-ops are running on outgoing-only is verily interesting and worth keeping in mind.