{"id":39,"date":"2008-06-27T08:40:09","date_gmt":"2008-06-27T15:40:09","guid":{"rendered":"http:\/\/blog.caida.org\/best_available_data\/2008\/06\/27\/top-ten-things-lawyers-should-know-about-internet-research-9\/"},"modified":"2017-08-21T15:27:03","modified_gmt":"2017-08-21T22:27:03","slug":"top-ten-things-lawyers-should-know-about-internet-research-9","status":"publish","type":"post","link":"https:\/\/blog.caida.org\/best_available_data\/2008\/06\/27\/top-ten-things-lawyers-should-know-about-internet-research-9\/","title":{"rendered":"top ten things lawyers should know about the Internet: #9"},"content":{"rendered":"<p><em>[Jump to a Top Ten item:  <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/16\/top-ten-things-lawyers-should-know-about-internet-research-1\/\">#1<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/17\/top-ten-things-lawyers-should-know-about-internet-research-2\/\">#2<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/18\/top-ten-things-lawyers-should-know-about-internet-research-3\/\">#3<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/19\/top-ten-things-lawyers-should-know-about-internet-research-4\/\">#4<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/20\/top-ten-things-lawyers-should-know-about-internet-research-5\/\">#5<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/21\/top-ten-things-lawyers-should-know-about-internet-research-6\/\">#6<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/23\/top-ten-things-lawyers-should-know-about-internet-research-7\/\">#7<\/a>   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/05\/10\/top-ten-things-lawyers-should-know-about-internet-research-8\/\">#8<\/a>   #9   <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/08\/02\/top-ten-things-lawyers-should-know-about-internet-research-10\/\">#10<\/a>]<\/em><\/p>\n<p><strong>#9: The news is not all bad: there is a reason everyone   wants to be connected to all the world&#8217;s knowledge &#8212; as well as each   other &#8212; besides its status as the most powerful complex system ever   created by man. The Internet&#8217;s <a href=\"http:\/\/www.amazon.com\/Wealth-Networks-Production-Transforms-Markets\/dp\/0300125771\/ref=pd_bbs_sr_1?ie=UTF8&#038;s=books&#038;qid=1210398774&#038;sr=8-1\">practical   promise<\/a> for individual freedom, democratic engagement, and   economic empowerment, is also unparalleled.         This promise is sufficient inspiration for an open, technically         literate conversation about how to invest in technologies         and policies to support articulated social objectives.  <\/strong><\/p>\n<p><!--more--><\/p>\n<ol type=\"a\">\n<li>David Clark&#8217;s conclusion that the federally funded network         research community&#8217;s &#8220;real         accomplishment was not in computing but in connecting people&#8221;        captures a century of thought. Although the openness of the         architecture is the root of its many vulnerabilities, it was also         the aspect that allowed enough self-organizing momentum to grow the         network as <a href=\"http:\/\/www.nic.funet.fi\/index\/FUNET\/history\/internet\/en\/kasvu.html#nimet\">fast         as it did<\/a>. The results are <a href=\"http:\/\/www.uoregon.edu\/~joe\/missing-half\/missing-half.pdf\">noisy<\/a>,         the <a href=\"http:\/\/www.isoc.org\/internet\/history\/\">journey messy<\/a>,         the <a href=\"http:\/\/blog.caida.org\/best_available_data\/2007\/07\/\">future         uncertain<\/a>, the <a href=\"http:\/\/www.fourmilab.ch\/documents\/digital-imprimatur\/\">most         pessimistic scenarios<\/a> ominous. But the positive effects are also         incalculable, particularly the potential for an unprecedented         <a href=\"http:\/\/www.benkler.org\/WhitePaper.pdf\">increase in         individual freedom<\/a>, the often deemphasized, yet primary, social         objective of both democracy and markets.<\/li>\n<li>The <a href=\"http:\/\/en.wikipedia.org\/wiki\/P2P_file_sharing\">p2p         file-sharing<\/a> phenomenon, and more recently the <a href=\"http:\/\/en.wikipedia.org\/wiki\/List_of_video_sharing_websites\">user-generated         video sharing<\/a> phenomenon, are finally shedding some light on the         inconvenient truth: we have not yet demonstrated a sustainable         competitive model for moving raw bits around. Not that we excel         at competitive models for moving things around over large distances         to almost anywhere.  Witness railroads, water, electricty,         highways, postal service, telephony.  Soon, airlines.         The economics clearly need some <a href=\"http:\/\/www.caida.org\/publications\/presentations\/2007\/critimeas2007-09\/\">sunlight<\/a>. And the         <a href=\"http:\/\/www.circleid.com\/posts\/86201_cisco_p2p_flat_in_north_america\/\">p2p<\/a>         <a href=\"http:\/\/arstechnica.com\/news.ars\/post\/20080623-sandvine-close-to-half-of-all-bandwidth-sucked-up-by-p2p.html\">debate<\/a>         <a href=\"http:\/\/news.bbc.co.uk\/1\/hi\/technology\/7059881.stm\">will<\/a>         <a href=\"http:\/\/www.unc.edu\/~cigar\/papers\/JPE%2031618%20FileSharing%202006-12-12.pdf\">require<\/a> <a href=\"http:\/\/dmca.cs.washington.edu\/uwcse_dmca_tr.pdf\">some<\/a>.<\/li>\n<li>As with most infrastructure issues, the U.S. federal government is <a href=\"http:\/\/isen.com\/blog\/2005\/05\/whatever-happened-to-bush-broadband.html\">slow to respond<\/a> regarding a <a href=\"https:\/\/www.baller.com\/2008\/10\/a-national-broadband-strategy-make-no-small-plans\/\">national broadband strategy.<\/a> But the USG is investing resources and regulatory attention to help foster global Internet growth, including: encouraging <a href=\"http:\/\/www.arin.net\/meetings\/minutes\/ARIN_XXI\/PDF\/monday\/IPv6_Survey_KC.pdf\">IPv6 deployment<\/a> to mitigate the coming address space crunch; <a href=\"http:\/\/en.wikipedia.org\/wiki\/DNSSEC#DNSSEC_Deployment_Initiative\"> improving<\/a> the <a href=\"http:\/\/www.cybertelecom.org\/dns\/security.htm\"> security of the naming system<\/a> with <a href=\"http:\/\/www.ietf.org\/rfc\/rfc4033.txt\">community-developed standards<\/a> for <a href=\"http:\/\/en.wikipedia.org\/wiki\/DNSSEC\">authenticated DNS<\/a> responses;  and, in partnership with industry and academia, developing a <a href=\"http:\/\/www.nitrd.gov\/pubs\/2008supplement\/08-Supp-Web\/TOC%20Pages\/08supp-CSIA.pdf\">roadmap<\/a> for federal research and development in cybersecurity and information assurance.  (Yes, the emphasis is on security and sustainability issues, but that&#8217;s where federal investment is today.)<\/li>\n<li>With infrastructure, progressive movement tends to begin at the state and <a href=\"http:\/\/www.muniwireless.com\/\">local<\/a> levels as <a href=\"http:\/\/www.burlingtontelecom.com\/\">governments<\/a> <a href=\"http:\/\/www.reuters.com\/article\/technologyNews\/idUSN1737601520080617\">experiment    with<\/a> <a href=\"http:\/\/www.saschameinrath.com\/2008\/mar\/12\/more_thoughts_philly_three_months_after_philadelphia_story\">alternative<\/a> <a href=\"http:\/\/www.nytimes.com\/idg\/IDG_852573C4006938800025742E006429B9.html?ref=t\">ownership models<\/a> for provisioning Internet infrastructure via public-private partnerships.  Local experimentation is critical, and eye-opening: after a decade of pay-per-minute hotspots, airports are realizing that free (as in beer) <a href=\"http:\/\/www.jaunted.com\/maps\/Airport-WiFi-Map\">wifi access<\/a> appeals to visitors and residents.<\/li>\n<li>The OECD now considers the Internet <a href=\"http:\/\/www.oecd.org\/document\/18\/0,3343,en_2649_37441_40862162_1_1_1_37441,00.html\">relevant to its mission<\/a>, and is issuing balanced recommendations based on its best available data, which they forcefully admit is problematic. In their recent <a href=\"http:\/\/www.oecd.org\/site\/0,3407,en_21571361_38415463_1_1_1_1_1,00.html\">ministerial meeting<\/a> on the future of the Internet, they committed to &#8220;improving statistical indicators to measure access and use of the Internet..in order to provide more reliable data and analysis.&#8221; Only in the U.S. do policymakers <a href=\"http:\/\/www.wetmachine.com\/item\/1228\">believe that OECD rankings arelying<\/a>.<\/li>\n<li>There are many <a href=\"http:\/\/balkin.blogspot.com\/2008\/06\/key-questions-about-new-fisa-bill.html\"> educated<\/a> people speaking out on the topic of <a href=\"http:\/\/www.wetmachine.com\/item\/1172\">informing policy based on what we know<\/a>, and <a href=\"http:\/\/www.wetmachine.com\/\/item\/1180\">reserving judgment<\/a> elsewhere. (<a href=\"http:\/\/blog.caida.org\/best_available_data\/recommended-feeds\/\">Recommended thinkers<\/a>.) There are <a href=\"http:\/\/www.amazon.com\/Evolution-Networks-Biological-Internet-Physics\/dp\/0198515901\/ref=sr_1_2?ie=UTF8&#038;s=books&#038;qid=1210401544&#038;sr=8-2\">evolutionary lessons and insights<\/a> to glean from other networked fields facing similar problems, e.g., <a href=\"http:\/\/pubs.acs.org\/email\/cen\/html\/100807150541.html\">semantic web in big pharma<\/a> and  <a href=\"http:\/\/arxiv.org\/abs\/0709.0303\">efficient routing<\/a>  as well as lessons to draw from ideas we have tried that have not worked yet, such as <a href=\"http:\/\/datcat.org\/\">public catalogs<\/a> or <a href=\"http:\/\/dipzoom.cwru.edu\/\">open commerce in network data<\/a>. There&#8217;s plenty of work to do, but there&#8217;s no shortage of qualified people.<\/li>\n<li>Authors and journalists have <a href=\"http:\/\/www.amazon.com\/Where-Wizards-Stay-Up-Late\/dp\/0684832674\/ref=sr_1_1?ie=UTF8&#038;s=books&#038;qid=1210397577&#038;sr=1-1\">captured<\/a> and <a href=\"http:\/\/www.amazon.com\/What-Dormouse-Said-Counterculture-Personal\/dp\/0143036769\/ref=pd_bbs_sr_2?ie=UTF8&#038;s=books&#038;qid=1210397634&#038;sr=1-2\">interpreted history<\/a>, and academic researchers have done their share of <a href=\"http:\/\/internethistoryarchive.org\/\">capturing<\/a> and <a href=\"http:\/\/itc.conversationsnetwork.org\/shows\/detail3365.html\">interpreting <\/a>the <a href=\"http:\/\/www.dtc.umn.edu\/~odlyzko\/doc\/history.communications0.abst\">history of communications<\/a> and its implications for the Internet. There is detailed understanding of the history of many aspects of the Internet, including how pieces of the co-evolving complex systems of technology, economics, and regulation fit together.<\/li>\n<li>Relatively few government-funded researchers, <a href=\"http:\/\/en.wikipedia.org\/wiki\/Licklider\">led by<\/a> U.S. federal agency ARPA, supported by <a href=\"http:\/\/www.cybertelecom.org\/ci\/\">strong regulatory protection for innovation<\/a> built the Internet in an amazingly short time relative to the history of communications. Within twenty years the new ecosystem <a href=\"http:\/\/techliberation.com\/2005\/09\/28\/economist-how-the-internet-killed-the-phone-business\/\">fatally threatened<\/a> the old. The obvious response by the incumbent carriers was to manipulate the regulatory architecture away from the line-sharing that made innovations such as the Internet possible. No surprise there, these same  <a href=\"http:\/\/www.cybertelecom.org\/notes\/att.htm\">carriers<\/a> <a href=\"http:\/\/www.cybertelecom.org\/ci\/cpe.htm\">fought<\/a> innovation last <a href=\"http:\/\/www.cybertelecom.org\/notes\/att_antitrust.htm#div\">century<\/a> too, including <a href=\"http:\/\/www.cybertelecom.org\/ci\/index.htm\">the Internet<\/a>.  Regulating protection of innovation at the edge is neither new nor somehow obviated by the technological developments of the Internet.  On the contrary, the technological ability to innovate at the edge of the Internet is easy to remove in the middle by a network owner. So as with the rest of history of telecom, and as with other social goals such as universal access, it will largely be a matter of pointing legislatures to <a href=\"http:\/\/www.oecd.org\/document\/54\/0,3343,en_2649_33703_38690102_1_1_1_1,00.html\">results achieved<\/a> from <a href=\"http:\/\/www.itif.org\/index.php?id=142\">other policies<\/a>.<\/li>\n<blockquote><p><em>         But, important as these problems are, they were not the main point. The main point of the book is to see these human constructions as systems, not as collections of individuals or representatives of ideologies.  From our opening accident with the coffeepot and job interview through the exotics of space, weapons, and microbiology, the theme has been that it is the way the parts fit together, interact, that is important.  The dangerous accidents liein the system, not in the components.  The nature of the transformation process eludes the capacities of any human system we can tolerate in the case of nuclear power and weapons; the air transport system works well &#8212; diverse interests and technological changes support one another; we may worry much about the DNA system with its unregulated reward structure, less about chemical plants; and though the processes are less difficult and dangerous in mining and marine transport, we find the system of each is an unfortunate concatenation of diverse interests at cross-purposes.  These systems are human constructions, whether designed by engineers and corporate presidents, or the result of unplanned, unwitting, crescive, slowly evolving human attempts to cope.  Either way they are very resistant to change.  Private privileges and profits make the planned constructions resistant to change; layers upon layers of accommodations and bargains that go by the name of tradition make the unplanned ones unyielding. But they are human constructions, and humans can destruct them or reconstruct them.  The catastrophes send us warning signals.  This book has attempted to decode these signals: abandon this, it is beyond your capabilities; redesign this, regardless of short-run costs; regulate this, regardless of the imperfections of regulation.  But like the operators of TMI (three-mile island) who could not conceive of the worst &#8212; and thus could not see the disasters facting them &#8212; we have misread these signals too often, reinterpreting them to fit our preconceptions.  Better training alone will not solve the problem, or promise that it won&#8217;t happen again.  Worse yet, we may accept the preconception that military superiority and private profits are worth the risks.  This book&#8217;s decoding asserts that the problems are not with individual motives, individual errors, or even political idologies.  The signals come from systems, technological, and economic.  They are systems that elites have constructed, and thus can be changed or abandoned.<\/em><br \/>\n<em>&#8212;<strong>Normal Accidents<\/strong>, Charles Perrow, 1999<\/em><\/p><\/blockquote>\n<hr \/>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>[Jump to a Top Ten item: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10] #9: The news is not all bad: there is a reason everyone wants to be connected to all the world&#8217;s knowledge &#8212; as well as each other &#8212; besides its status as the most powerful complex system ever created [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,15,11,8,19,18,9],"tags":[],"coauthors":[26],"_links":{"self":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/39"}],"collection":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/comments?post=39"}],"version-history":[{"count":10,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/39\/revisions"}],"predecessor-version":[{"id":4184,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/39\/revisions\/4184"}],"wp:attachment":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/media?parent=39"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/categories?post=39"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/tags?post=39"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/coauthors?post=39"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}