{"id":37,"date":"2008-04-23T02:09:20","date_gmt":"2008-04-23T09:09:20","guid":{"rendered":"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/23\/top-ten-things-lawyers-should-know-about-internet-research-7\/"},"modified":"2017-08-21T11:16:29","modified_gmt":"2017-08-21T18:16:29","slug":"top-ten-things-lawyers-should-know-about-internet-research-7","status":"publish","type":"post","link":"https:\/\/blog.caida.org\/best_available_data\/2008\/04\/23\/top-ten-things-lawyers-should-know-about-internet-research-7\/","title":{"rendered":"top ten things lawyers should know about the Internet: #7"},"content":{"rendered":"<p><em>[Jump to a Top Ten item:  <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/16\/top-ten-things-lawyers-should-know-about-internet-research-1\/\">#1<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/17\/top-ten-things-lawyers-should-know-about-internet-research-2\/\">#2<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/18\/top-ten-things-lawyers-should-know-about-internet-research-3\/\">#3<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/19\/top-ten-things-lawyers-should-know-about-internet-research-4\/\">#4<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/20\/top-ten-things-lawyers-should-know-about-internet-research-5\/\">#5<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/21\/top-ten-things-lawyers-should-know-about-internet-research-6\/\">#6<\/a>   #7   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/05\/10\/top-ten-things-lawyers-should-know-about-internet-research-8\/\">#8<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/06\/27\/top-ten-things-lawyers-should-know-about-internet-research-9\/\">#9<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/08\/02\/top-ten-things-lawyers-should-know-about-internet-research-10\/\">#10<\/a>]<\/em><\/p>\n<p><strong> #7: The traditional mode of getting data from public infrastructures to inform policymaking &#8212; regulating its collection &#8212; is a quixotic path, since the <a href=\"http:\/\/www.amazon.com\/Bureaucracy-Government-Agencies-Basic-Classics\/dp\/0465007856\/ref=pd_bbs_sr_1?ie=UTF8&#038;s=books&#038;qid=1208922974&#038;sr=8-1\">government regulatory agencies<\/a> have as much <a href=\"http:\/\/www.publicknowledge.org\/node\/1529\"> reason to be reluctant<\/a> as <a href=\"http:\/\/www.dslreports.com\/shownews\/If-Comcast-Shares-Broadband-Deployment-Data-The-Terrorists-Win-92408\">providers<\/a> regarding disclosure of how the Internet is engineered, used, and financed.<\/strong><\/p>\n<p><!--more--><\/p>\n<p>For every other critical infrastructure in society we have devoted a government agency to its stewardship.  The Internet was designed for a <a href=\"http:\/\/www.packet.cc\/files\/toward-coop-net.html\">cooperative<\/a> rather than competitive policy architecture, so its designers did not consider regulatory aspects. But as a communications infrastructure serving the public, most regulatory aspects of Internet fall under the jurisdiction of the agency who regulates the <a href=\"http:\/\/www.youtube.com\/watch?v=f99PcP0aFNE\"> tubes<\/a> it typically runs atop: in the United States that means the FCC.  Unfortunately, the FCC is not completely <a href=\"http:\/\/www.rcrnews.com\/apps\/pbcs.dll\/article?AID=\/20080321\/SUB\/669906587\/1005\/allnews\">up to speed<\/a> on the Internet, and does not even approve of how it is <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/03\/30\/measuring-broadband-penetration\/\">measuring broadband penetration<\/a>.  The FCC has no empirical basis in fact nor apparent <a href=\"http:\/\/arstechnica.com\/news.ars\/post\/20080318-comcast-fcc-lacks-any-authority-to-act-on-p2p-blocking.html\">authority<\/a> in a conversation about traffic, structure, pricing, or vulnerabilities on the network since it has no access to data from Internet infrastructure beyond what providers volunteer to provide.  And yet <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/18\/top-ten-things-lawyers-should-know-about-internet-research-3\/\">little data<\/a> is needed to reveal that the Internet&#8217;s underlying network architecture, implementation, and usage is fundamentally inconsistent with almost every aspect of our current communications and media policy architecture.  The Internet sheds deep skepticism on current legal frameworks for copyright, wiretapping, and privacy, as well as transforms or destroys dozens of industries that hold great economic and political power today.<\/p>\n<p>The national security components of Internet regulation, from <a href=\"http:\/\/www.news.com\/8301-10784_3-9882031-7.html\">wiretapping<\/a>  to <a href=\"http:\/\/www.gao.gov\/key_issues\/disaster_management\/issue_summary\">disaster recovery<\/a> to <a href=\"http:\/\/www.news.com\/Help-still-wanted-Cybersecurity-czar\/2100-7348_3-6094055.html\"> unstable <\/a><a href=\"http:\/\/www.securityfocus.com\/news\/11194\">leadership<\/a> <a href=\"http:\/\/www.informationweek.com\"> lamenting its budgetary and policy handicaps<\/a>, inspire <a href=\"http:\/\/www.news.com\/8301-10784_3-9807450-7.html\">concern<\/a> than hope.  That over 1% of observed web pages are <a href=\"http:\/\/www.usenix.org\/events\/nsdi08\/tech\/full_papers\/reis\/reis_html\/index.html\">modified in flight without our knowledge<\/a> is <a href=\"http:\/\/www.fourmilab.ch\/documents\/digital-imprimatur\/\">no source of comfort<\/a> either.<\/p>\n<p>Hence it should be no surprise if solutions to measurement, like other <a href=\"http:\/\/www.caida.org\/publications\/presentations\/2005\/topproblemsnet\/\">persistent problems of the Internet<\/a>, require engaging deeply with economics, ownership and trust issues.  Alas, Internet economics research is one of the few fields <a href=\"http:\/\/blog.caida.org\/best_available_data\/2007\/10\/07\/internet-infrastructure-economics-top-ten-things-i-have-learned-so-far\/\">worse off<\/a> than Internet traffic or topology research with regard to the ability to validate any models or assumptions. (If you think tcpdump and traceroute are replete with measurement error, you should try analyzing the economics of network infrastructure companies.  And if you think packet header and internal topology data is hard to get, you should try to get financial numbers from the same companies broken out by service offered so you could see how the <a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2008\/04\/22\/AR2008042202921.html\"> economics are actually evolving<\/a>.)<\/p>\n<p>Unfortunately (again) understanding the economics of the system is not where spare private or public sector capital is going. In the 1990&#8217;s the telecoms spent their capital <a href=\"http:\/\/findarticles.com\/p\/articles\/mi_m0PJR\/is_26_1\/ai_110308267\"> suing each other<\/a> and <a href=\"http:\/\/www.law.indiana.edu\"> the government<\/a> over <a href=\"http:\/\/www.cybertelecom.org\/notes\/telecomact.htm\">laws so vaguely written<\/a> as to <a href=\"http:\/\/www.fcc.gov\/telecom.html\">defy consistent interpretation<\/a>, much less measurable enforcement, across any <a href=\"http:\/\/www.cybertelecom.org\/broadband\/\">two constituencies<\/a> in the ecosystem. This decade we are spending our capital <a href=\"http:\/\/www.eff.org\/nsa\">suing the telecoms<\/a> for not suing the government after 9\/11 when the <a href=\"http:\/\/en.wikipedia.org\/wiki\/NSA_warrantless_surveillance_controversy\">government asked them to break laws<\/a> that are <a href=\"http:\/\/en.wikipedia.org\/wiki\/Foreign_Intelligence_Surveillance_Act_of_1978\">just as outdated as the copyright laws<\/a>.  <a href=\"http:\/\/www.jeffersonhour.org\/\">Thomas Jefferson<\/a> would no doubt <a href=\"http:\/\/makochemedia.com\/files\/Show%20672%20Constitutional%20Convention.mp3\">recommend rewriting all of it from scratch<\/a>. Unfortunately the timing is bleak: these developments are occurring at a time when <a href=\"http:\/\/www.baller.com\/pdfs\/baller-lide_8Steps_NatBBStrategy.pdf\">sustaining Internet growth<\/a> (which, no, we still <a href=\"http:\/\/www.potaroo.net\/ispcol\/2008-04\/ipv6.html\"> do not have good ways to measure<\/a>..) will require extraordinary investment of <a href=\"http:\/\/www.circleid.com\/posts\/84136_caida_arin_ipv6_survey\/\"> capital, as well as realignment of incentives<\/a> to promote cooperation among competitive players.   Where does that capital and incentive to cooperate come from?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[Jump to a Top Ten item: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10] #7: The traditional mode of getting data from public infrastructures to inform policymaking &#8212; regulating its collection &#8212; is a quixotic path, since the government regulatory agencies have as much reason to be reluctant as providers regarding disclosure of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,5,12,10,11,19,18],"tags":[],"coauthors":[26],"_links":{"self":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/37"}],"collection":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":9,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/37\/revisions"}],"predecessor-version":[{"id":4142,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/37\/revisions\/4142"}],"wp:attachment":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/media?parent=37"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/categories?post=37"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/tags?post=37"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/coauthors?post=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}