{"id":40,"date":"2008-08-02T08:52:45","date_gmt":"2008-08-02T15:52:45","guid":{"rendered":"http:\/\/blog.caida.org\/best_available_data\/2008\/08\/02\/top-ten-things-lawyers-should-know-about-internet-research-10\/"},"modified":"2017-08-21T15:31:17","modified_gmt":"2017-08-21T22:31:17","slug":"top-ten-things-lawyers-should-know-about-internet-research-10","status":"publish","type":"post","link":"https:\/\/blog.caida.org\/best_available_data\/2008\/08\/02\/top-ten-things-lawyers-should-know-about-internet-research-10\/","title":{"rendered":"top ten things lawyers should know about the Internet: #10"},"content":{"rendered":"<p><em>[Jump to a Top Ten item:  <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/16\/top-ten-things-lawyers-should-know-about-internet-research-1\/\">#1<\/a> <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/17\/top-ten-things-lawyers-should-know-about-internet-research-2\/\">#2<\/a> <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/18\/top-ten-things-lawyers-should-know-about-internet-research-3\/\">#3<\/a> <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/19\/top-ten-things-lawyers-should-know-about-internet-research-4\/\">#4<\/a> <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/20\/top-ten-things-lawyers-should-know-about-internet-research-5\/\">#5<\/a> <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/21\/top-ten-things-lawyers-should-know-about-internet-research-6\/\">#6<\/a> <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/23\/top-ten-things-lawyers-should-know-about-internet-research-7\/\">#7<\/a> <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/05\/10\/top-ten-things-lawyers-should-know-about-internet-research-8\/\">#8<\/a> <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/06\/27\/top-ten-things-lawyers-should-know-about-internet-research-9\/\">#9<\/a> #10]<br \/>\n<\/em><em>[Originally written as a series of blog entries, this document was later converted to a booklet\/pamphlet, see\u00a0 &#8220;<a href=\"http:\/\/www.caida.org\/publications\/papers\/2008\/lawyers_top_ten\/lawyers_top_ten.pdf\">Top Ten Things Lawyers Should Know About the Internet<\/a>&#8220;]<\/em><\/p>\n<p><strong> #10:  Moreover, even in the dim light of the underattended interdisciplinary research into the network, the available data implies clear directions for solutions, all of which cross policy-technology boundaries.<\/strong><\/p>\n<p><!--more--><\/p>\n<p><!-- Sometimes the links matter more than the nodes.   --><\/p>\n<ol type=\"a\">\n<li>We can learn from our mistakes. The false assumption that competing members of a profit-maximizing ecosystem will cooperate toward architectural innovations not in their short-term interest is remarkably consistent across failed attempts to <a href=\"http:\/\/www.ietf.org\/rfc\/rfc3869.txt\">solve<\/a> major <a href=\"http:\/\/www.caida.org\/publications\/presentations\/2005\/topproblemsnet\/\"> problems of the Internet<\/a> (e.g., <a href=\"http:\/\/en.wikipedia.org\/wiki\/Asynchronous_Transfer_Mode#Successes_and_failures_of_ATM_technology\">ATM<\/a>, <a href=\"http:\/\/en.wikipedia.org\/wiki\/IP_Multicast#History_and_milestones\">multicast<\/a>, <a href=\"http:\/\/www.cs.purdue.edu\/homes\/ninghui\/readings\/TruSe_fall04\/td-5ugj33.pdf\">routing security<\/a>, <a href=\"http:\/\/www.ntia.doc.gov\/ntiahome\/ntiageneral\/ipv6\/draft\/draftchap4.htm\">IPv6<\/a>, <a href=\"http:\/\/en.wikipedia.org\/wiki\/DNSSEC\">DNSSEC<\/a>, <a href=\"http:\/\/www.ietf.org\/rfc\/rfc5160.txt\">QOS<\/a>). Engineers have made valiant efforts to provide architectural solutions to security and scalability problems, providing vivid illustrations of how the <a href=\"http:\/\/www.cs.cmu.edu\/afs\/cs\/usr\/wing\/www\/publications\/Wing06.pdf\"> computational thinking<\/a> approach, embracing modularization and separation of issues, can fail to account for how tightly linked the technology, economic, and social dimensions of the problems are. As the Internet becomes the substrate underlying our professional, personal and political lives, we must recognize the links within and across its four biggest problems:  (1) the fundamentally <a href=\"http:\/\/www.oecd.org\/document\/59\/0,3343,en_2649_34223_40830139_1_1_1_1,00.html?rssChId=34223\">insecure<\/a> <a href=\"http:\/\/www.oecd.org\/dataoecd\/53\/17\/40722462.pdf\">software<\/a> <a href=\"http:\/\/www.isc.sans.org\/submissions.html\">ecosystem<\/a>, (2) <a href=\"http:\/\/www.wireless-safety.org\/\"> the <\/a><a href=\"http:\/\/www.ietf.org\/proceedings\/06nov\/slides\/RRG-3.pdf\">fundamentally<\/a> <a href=\"http:\/\/www.caida.org\/publications\/papers\/2007\/compact_routing\/compact_routing.pdf\">unscalable<\/a> <a href=\"http:\/\/www.potaroo.net\/ispcol\/2007-06\/dampbgp.html\">routing<\/a> and <a href=\"http:\/\/www.ietf.org\/rfc\/rfc4984.txt\"> addressing architecture<\/a>, (3) the <a href=\"http:\/\/www.networkworld.com\/columnists\/2008\/061708-bradner.html?fsrc=rss-bradner\">fundamentally<\/a> <a href=\"http:\/\/www.isen.com\/blog\/2007\/05\/making-network-neutrality-sustainable.html\">unsustainable<\/a> <a href=\"http:\/\/www.caida.org\/publications\/papers\/2007\/ieeecon\/\"> economic <\/a> <a href=\"http:\/\/www.newnetworks.com\/broadbandscandals.htm\"> architecture<\/a>, and (4) a <a href=\"http:\/\/www.prism.gatech.edu\/~hk28\/ICANN_Rule-of-Law.pdf\"> stewardship<\/a> model <a href=\"http:\/\/www.icann.org\/general\/lynn-reform-proposal-24feb02.htm\"> broken<\/a> along so many <a href=\"http:\/\/www.amazon.com\/Broadband-Problem-Anatomy-Failure-Dilemma\/dp\/0815706448\/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1208885081&amp;sr=1-1\">dimensions<\/a> that solving, or even <a href=\"http:\/\/www.caida.org\/publications\/presentations\/2005\/topproblemsnet\/\"> studying<\/a>, the first three <a href=\"http:\/\/www.caida.org\/research\/id-consumption\/census-map\/\"> problems<\/a> is no one&#8217;s responsibility. Expecting the private sector to navigate these dimensions (security, scalability, sustainability, and stewardship) while subject to relentless pressure to minimize costs is a recipe for failure; even public-private partnerships are not <a href=\"http:\/\/www.publicknowledge.org\/node\/1675\"> free of<\/a> these <a href=\"http:\/\/www.muniwireless.com\/2008\/01\/17\/the-connectkentucky-model-a-limited-step-in-the-right-direction\/\">pressures<\/a>. Furthermore, since all four dimensions transcend the jurisdiction of any sovereign government, we also cannot expect any solution that emphasizes national boundaries.<\/li>\n<li>While competing in the middle prohibits architectural innovation, cooperating at the edge seems to be a common ingredient of the most successful innovations on the Internet, including the web and search engines, VOIP, Linux, Wikipedia, Ebay, the blogosphere and other social networks. Ubiquitous connectivity is transforming economic conditions, supporting collaborations among individuals that achieve <a href=\"http:\/\/benkler.org\/SharingNicely.html\">more efficient<\/a> means of production and consumption than either government programs or competitive markets have achieved.  This transformation leaves some incongruity about the <a href=\"http:\/\/blog.caida.org\/best_available_data\/2007\/10\/07\/internet-infrastructure-economics-top-ten-things-i-have-learned-so-far\/\"> current economic architecture<\/a> for the Internet, which has a deeply embedded preference for markets and <a href=\"http:\/\/www.ibiblio.org\/nii\/NII-Accomplishments.html\"> private sector control<\/a> of <a href=\"http:\/\/www.wetmachine.com\/totsf\/item\/789\"> communications infrastructure<\/a> as well as  <a href=\"http:\/\/www.uspto.gov\/web\/offices\/com\/doc\/ipnii\">information<\/a>. The extremely dynamic and unpredictable structure, usage, and growth of the Internet  does not reduce the <a href=\"http:\/\/www.amazon.com\/Understanding-Regulation-Theory-Strategy-Practice\/dp\/0198774389\/ref=pd_bbs_sr_1?ie=UTF8&amp;s=books&amp;qid=1216059256&amp;sr=8-1\"> necessity of regulation<\/a> to well-functioning markets; on the contrary, its elusive nature is what makes<a href=\"http:\/\/www.sunlightfoundation.com\"> transparent<\/a> and <a href=\"http:\/\/www.davidbrin.com\"> accountable<\/a> <a href=\"http:\/\/www.fsf.org\/licensing\/licenses\/gpl.html\">experimentation<\/a> so necessary.<\/li>\n<li>What we believe about the infrastructure influences our technology and policy decisions. The current barriers to data access leave us without any mechanism to verify claims or weed out false beliefs about the infrastructure, including the increasing suspicion that the majority of Internet traffic represents illegal activity. Copyright infringement, only one example, may be so rampant as to be economically unviable to prevent, but without an <a href=\"http:\/\/www.amazon.com\/Objectivity-Lorraine-Daston\/dp\/1890951781\/ref=pd_bbs_sr_1?ie=UTF8&amp;s=books&amp;qid=1217378442&amp;sr=8-1\">objective<\/a> look at how the network is used, we are subject to vain attempts to <a href=\"http:\/\/www.whoishostingthis.com\/resources\/ip-cases\/\">criminalize typical network usage<\/a> rather than updating the laws to accomplish <a href=\"http:\/\/questioncopyright.org\/\">their intended purpose<\/a> in light of technological developments.  Ironically, traffic measurement undertaken by law enforcement for <a href=\"http:\/\/www.law.cornell.edu\/uscode\/html\/uscode50\/usc_sup_01_50_10_36.html\">national security purposes<\/a> and  <a href=\"http:\/\/blog.caida.org\/best_available_data\/2007\/08\/26\/what-we-cant-measure-on-the-internet-reprisal\/\">attempted<\/a> by scientific researchers is also arguably illegal under current anachronistic legislation. Again, our choice is to cripple socially important goals &#8212; law enforcement and <a href=\"ftp:\/\/ftp.ee.lbl.gov\/papers\/wsc97.ps\">scientific Internet research<\/a> &#8212; or <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1113014\">update<\/a> the <a href=\"http:\/\/www.law.cornell.edu\/uscode\/html\/uscode18\/usc_sec_18_00002511----000-.html\">relevant<\/a> <a href=\"http:\/\/www.law.cornell.edu\/uscode\/html\/uscode18\/usc_sec_18_00002701----000-.html\">communications<\/a> <a href=\"http:\/\/www.fcw.com\/online\/news\/153289-1.html\">privacy<\/a> (<a href=\"http:\/\/en.wikipedia.org\/wiki\/ECPA\">ECPA<\/a>) legislation.<\/li>\n<li>Public investment in knowledge production, including science and medical research, gains enormously from universal connectivity, offering distribution of resulting products to all taxpayers at zero marginal cost. The same reasoning reduces the justification for strong intellectual property systems, since they require expensive technology to prevent networks from doing what networks do naturally: share data. It is thus in interest of taxpayers for governments to promote and sometimes <a href=\"http:\/\/wireless.fcc.gov\/outreach\/index.htm?job=broadband_home\">directly fund<\/a> universal deployment of network infrastructure. More generally, government needs to prevent monopoly control over <a href=\"http:\/\/www.law.berkeley.edu\/journals\/btlj\/articles\/vol13\/Soma\/html\/reader.html\">essential resources<\/a>, mandate collection of <a href=\"http:\/\/ijoc.org\/ojs\/index.php\/ijoc\/article\/download\/160\/86\">traffic reports from ISPs<\/a> to validate their claims, be a better role model for operational security, and coordinate the development of a roadmap for Internet security similar to that of the <a href=\"http:\/\/www.controlsystemsroadmap.net\/\">energy sector<\/a> (DHS is working on this last one).<\/li>\n<li>Scientific researchers are in a difficult position, trying to do <a href=\"http:\/\/blog.caida.org\/best_available_data\/2007\/08\/26\/what-we-cant-measure-on-the-internet-reprisal\/\">science without data<\/a>, but they are in a position to make progress, with the help of a few good legal experts.   They (we) could propose a list of the most important Internet research questions\/problems to investigate, such as the ongoing <a href=\"https:\/\/www.educause.edu\/ir\/library\/pdf\/CSD4577.pdf\">discrepancies<\/a> between <a href=\"http:\/\/blog.caida.org\/best_available_data\/2008\/04\/20\/top-ten-things-lawyers-should-know-about-internet-research-5\/\">supposedly scientific studies<\/a>, and suggest what data is needed to investigate them. The academic community could even use <a href=\"http:\/\/arstechnica.com\/articles\/culture\/future-internet.ars\">existing assets <\/a> such as <a href=\"http:\/\/www.internet2.edu\">their own underutilized backbone<\/a> to mitigate the data dearth, by <a href=\"http:\/\/www.caida.org\/projects\/commons\">incenting measurement data out of cooperating networks in exchange for network bandwidth<\/a>. In the process they could help local communities  experiment with and measure performance, cost, and efficiency of alternative network ownership models.  Internet2 should also work with researchers and their <a href=\"http:\/\/www.usenix.org\/events\/upsec08\/tech\/full_papers\/garfinkel\/garfinkel_html\/\">institutional review boards<\/a> (IRBs) at member universities to assist researchers in developing <a href=\"http:\/\/www.ics.forth.gr\/~antonat\/nda08.html\">privacy-respecting<\/a> network analysis technologies and data handling policies, so that the organization can share more data from its research backbone with scientific researchers.<\/li>\n<li>The FCC is not exempt from the facts either &#8212; the agency should be pursuing <a href=\"http:\/\/www.brookings.edu\/papers\/2008\/07_wireless_weiser.aspx\"> empirically grounded validation<\/a> of the claimed efficiency  of its own policies, even if it requires trading  <a href=\"http:\/\/www.wetmachine.com\/item\/1029\">temporary  spectrum unlicensing<\/a> as an experiment to gather realistic baseline data on wireless network behavior to policymakers. The academic community could even help design such a network, geared toward public safety objectives and supporting scientific research balanced carefully against individual privacy. Such a trade seems less extreme an idea in light of the failure of the D-block auction, and the FCC admission that economic conditions make it a <a href=\"http:\/\/www.reuters.com\/article\/technologyNews\/idUSN1555479420080115\"> bad time to try to auction it now.<\/a> Reforming our policy for this spectrum could achieve <a href=\"http:\/\/www.circleid.com\/posts\/832812_models_wireless_spectrum\/\"> efficiency<\/a>, <a href=\"http:\/\/arstechnica.com\/news.ars\/post\/20080624-report-us-must-have-universal-gigabit-broadband-by-2015.html\">access<\/a>, public safety, and network science objectives  at least cost to taxpayers.\n<ol><em> <\/em><\/p>\n<blockquote><p><em>We can have facts without thinking but we cannot have thinking without facts. <\/em><em> &#8212; John Dewey<\/em><\/p><\/blockquote>\n<\/ol>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>[Jump to a Top Ten item: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10] [Originally written as a series of blog entries, this document was later converted to a booklet\/pamphlet, see\u00a0 &#8220;Top Ten Things Lawyers Should Know About the Internet&#8220;] #10: Moreover, even in the dim light of the underattended interdisciplinary research into [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,12,11,19,18],"tags":[],"coauthors":[26],"_links":{"self":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/40"}],"collection":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/comments?post=40"}],"version-history":[{"count":13,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/40\/revisions"}],"predecessor-version":[{"id":4185,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/40\/revisions\/4185"}],"wp:attachment":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/media?parent=40"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/categories?post=40"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/tags?post=40"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/coauthors?post=40"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}