Monday, June 30, 2003


Governance

Professor Charles Nesson

4:10 pm

 

 

Asked some of the bloggers to come down and join at the table – Aaron Swartz, David Hornik, Zack Rosen, Frank Field, Lisa Rein – are there

 

N: Internet had certain mob quality about it.  Initial proposition that the net had an “unregulatable” quality to it…

 

There is a question that is underneath all that we are talking about that is big and fun to talk about.  So, we put this panel together on the subject of digital democracy.

 

The net as we imagine it is potentially accessible to everyone.  Search engines make it possible to find anything [yeah right].  The means of production are actually in our hands (if we have a brain to use it).  We can find a message that someone else is projecting.

 

So, the question is “what’s real, what’s not”

 

ID for me the attributes of the net that lead us to think that it has this democratic capacity.

 

Field: Has speech makes it heard.

Lisa: Joe blow’s web page is as equal as IBM

Aaron – everyone is connected to each other.

Hornik: low cost, low barrier to entry

Zack: got to put stuff in to get stuff out.  Users are participants.

Colin: public is not passive participant.  We create the story.

 

How much of these qualities has to do with architecture?

 

Lisa: QOS issues – my packet has as much right to travel as any other.  Makes me worry of protocols that discriminate.

 

Is any of the Internet law?

 

Colin: Laws made prevention against discriminating on phone lines… so enabled access

Hornik: Law doesn’t come into play until you succeed.  Once they take hold, you consider the legal implications.

 

You might say this is true of content as well as process.

 

Zack: It’s not just law, it is norms. 

 

Do you actually feel there is a democratic air of the internet?

 

Yes….

 

Q: How is it democratic if 90% use IE6 and producers of tools is limited

 

Field: barrier is learning curve.  If you wanna do this you gotta learn something about how the net works.  There is definitely a question of when technology becomes a barrier.

 

Q: commercial sites developed that can’t be seen because of platform protocol differences.

 

Lisa: blatant anti-competitive activity creates this.  But designers must be aware of this – it is their responsible.  Consumer education is a really big part of this.

 

People create their own barriers : net is a reflection of people creating barriers.

 

Colin: Internet is great opportunity – but you must influence TV…

 

N: Stay with access at this moment – clearly the planet is not on the internet.  I want Zittrain to focus on Tier 2. How does it work when packet sent to Africa.  Who pays?

 

Z:  At some point an African ISP has to connect to the cloud.  The negotiation can take form of “Hello Tier I ISP – we want to hook up – wouldn’t your folks want to connect to us?  Tier I: no… You are too short to peer with me.  I will not peer with you. Tier II: Ok, I’ll pay you or a non-african tier I ISP a fee (which I must pass on to my subscribers). 

 

Audience: Internet seems to have forgotten the third world – for instance, lots of India has not seen Internet.

 

N:Has the aspiration been compromised?

 

[Ah, the discussion is now devolving to semantics – is it freedom or democracy? Does It matter?]

 

Terry Fisher: It is helpful to persue definition of democracy – my offer is democracy has three primary meanings with inter

            1) political democracy – most people think of it that way – we are governed by laws we ourselves make –

                        a) elected officials govern

                        b) frequent fair elections

                        c) universal adult suffrage

                        d) everyone can stand for election

                        e) freedom of expression, sources of information and association

                        [these are values]

            Internet can fuel these values….

2) economic democracy

                        a)work place participation

                        b) Marxist idea of meaningful work

                        c)

3) Symbiotic democracy – popular participation in meaning of culture

 

What would you point to as evidence of internet role in democracy.

 

Colin: www.Moveon.org

 

N: There was a day leading up to Iraq where people protested by scheduling phone calls, fax calls, and web hits to lock Washington down… a distributed denial of service attack.

 

[but this discussion fails to acknowledge that majority doesn’t get their info from the net]

 

Zack: Internet is a tool with qualities that have aspects of democracy built into it…  [hmm.. Zack is working for Dean]  But there isn’t a way of organizing the 120,000 people that want to work for the campaign…

 

Wants to prove you don’t need control for campaign if you have tools to do it for you.  Autonomous campaign;  They won’t control the network – but allow the nodes through RSS to be cross-linked. [my father-in-law will find this interesting]

 

Also planning syndication bubbles… One user at the bottom of the system can enter something that will bubble up to the top…

 

Audience: have to handle web ideas carefully.  Have to increase diversity of public sphere. 

 

 

David, tell us of your blog.

 

David: Well, started Ventureblog – to discuss process, items of interest in economy, trying to make the info clearer within the perspective of the venture capital industry.  Went to WSJ conference – Mossberg – Gates,et al were there.  Telling story of on background requirement of conference ground rules.  But, bloggers, who didn’t know the ground rules, including David, blogged on ventureblog what was said.  Then journalists who couldn’t report the primary source, pointed to David’s blog as a source.  The story of bloggers breaking news becaming the story itself. 

 

Explain what you mean by blogs?

 

Diary that is self-referential – you point to source, other people point to you.  You get to publish your own website.  It is not hugely expensive.  And, there is a powerlog relationship as blogs refer to you and you eventually become more main stream….

 

Aaron, do you see this blogging phenom growing into something that is democratic?

 

A: Yeah, it enables conversation – whatever.

 

N: Are we talking of alternative journalism?

 

D: In theory.  The blogs that are important becomes news creators while those smaller may find stories that are reported through the larger blogs. 

 

Aaron: blogs focused on field may replace traditional journalism – eliminates journalist as middle person.

 

Audience : in the information age the goal is to create content.  Google bought blogger…

 

Audience Mike MGuire: make the argument that blogging is the antithesis of democracy and antithesis of journalism.  How do you verify that source.

 

Lisa: How do you know conventional media is verifiable?

 

Frank: The interesting thing that you find among the media is that they do have interests and what they say are affected by that…   You can tell when a blogger is affected by his agenda.

 

David: this point is important aspect of internet.  There is reputation system on the internet.  Ebay does not exist without reputation system. 

 

[This is devolving into discussion of blogging as tools]

 

David: Internet is incredible tool to distribute to diverse audiences. 

 

Frank: Whether this same set of tools can be used to cloud folk’s minds… 

 

Terry Fisher: related the value deTocqueville noted in engaging in public debate.  Blogging facilitates the participation in the debate.  A side of the debate is represented by Sunstein (Cass) – that a subgroup is fragmenting meaning of group participation that the multiplication of channels on the internet will create peculiar and smaller groups of interest (well, that is how real world works).

 

Lessig: need to pay attention to difference of engaging in argument by writing about it – and listening to multiple views.  Serving on juries is important to citizenship because they had to engage in deliberation with other citizens to arrive at an opinion [ does it not say much of our society when you consider all those that try to avoid jury duty].  People who participate in juries become more engaged citizens.  This links to Dean campaign story – it will be a story between participating members of a campaign and recipient members of campaign.  It is far different to have someone participating than to have someone receiving emails.  Could be it is just as powerful to have conversations going on in 100,000 small groups – we don’t have to hear or participate in such groups for it to be effective…

 

Steve: but newspapers are more representative of the community whereas blogs are narrow [boy this ignores mass media ownership of papers and the fact that papers in 18th and 19th centuries were highly partisan in nature]

 

Ray London: pops up with a lot of stats talking about conglomerates owning mass media.  Blogs offer alternatives.

comment [] 8:44:29 PM    

Porn and Jurisdiction

2:00

 

(An interactive exercise – Zittrain is typing – Lessig is asking the questions which Z is trying to answer – a very lively exchange to explore the problem)

 

Question is “How do we solve pornography problem”

 

  • What’s the problem (kinda reminds me of who is on first)
    • Harmful material on line
      • 1. Get rid of the porn
        • assume we know it when we see it
        • (Zittrain) isn’t this a problem with US constitution
        • Michigan v Butler says you can’t sacrifice all porn just to protect the kids (can’t burn the house to roast the pig)
        • So, this won’t work
      • 2. Get rid of it just for kids – put it out of reach
        • So, you want a technology to make it inaccessible?
        • Zittrain: Yeah, can’t see the porn without and ID – thus we roast the pig and save the house.
        • Lessig: So, I need to give my credit card to pornographers
        • Z: So what’s your problem?
        • L: Oh, use credit card as form of id?
        • Z:  Well, you aren’t responsible if they abuse it – only for first $50….
        • L: Sounds onerous I have to give a credit card number to id myself as an adult.
        • Burden rests on consumer to show ID
      • 3. Legal requirement on websites to mark contact as harmful. So burden really rests on website to use a technology to id the kid using the browser – so people are carding websites – course, mom would give the kid the password and the tool is useless
        • So, market provides relevant data
        • Parents must manage
        • Burden is simple: producers simply check box as harmful to minors
        • SO, how do you know what is and is not harmful to minors. To be safe, I may label everything as harmful.
        • L: But that is evident in real world … too
        • L: 38 states already required such…
      • 4. Z: No govt intervention except for subsidies… Let the market do it… why let the government interfere?  Rating services can be created – parents will learn to trust the best ones…
        • L: Christian coalition has rated the internet for me.  Anti-defamation league Hatefilter (v 2.0) site.  Everybody is creating a rating system.
        • Z: let a thousand flowers bloom!
        • L: But what kind of things are the filtering?
        • Z: I don’t know I can’t see the list.  NetNanny doesn’t tell you what it filters.
        • L: where is content advisor (IE) getting its information to rate the net (ICRA – they created the ADL Hatefilter)
        • But, ICRA lets you apply for the label – which is embedded in the html code. 
        • But, 4 has consequence of banning more speech than #3.
      • But, how do we know it works?

 

 

Comments on CIPA decision:

 

A modified # 4 as government contends funding based on doing what legislation requires.  Sup Ct is not so sensitive to coercion of funding… as Court is increasingly willing to let government intervene to place tech’s on net to filter porn.

 

On to Jurisdiction

 

Discusses Yahoo-France case and difficulty of courts imposing will against other country’s companies….

 

Discusses Quova to discover geographic location of internet participants.  When France decided the case, they asked experts if Yahoo could filter the French (i.e. roast the frog legs without burning down the vineyard)… [I am convinced that the only lawyers that enjoy their work are the ones that enjoy playing with analogies and syllogisms!] 

 

L: so, in this world, each country could see the internet differently.

 

Seems like it is technically easier for local jurisdictions to filter to their own tastes….  What is upon us is no conflict of laws…  But, the statement is still in flux … but may be true in 2-3 years.

 

Bottom line: The Internet is not going to be this anarchic space it once was.

 

comment [] 6:10:16 PM    

Code and the law

 

Lessig  June 30, 2003

(missed first 5 mins while the techies tried to get my machine connected)

11:15

 

·        What Things (4 modalities) regulate

o       Ex ante rule – know in advance – enforced if you break the rule (that’s the way law works)

o       Norms – (e.g. social norm – cig smokers in CA are treated with disdain)

o       Market – if you work for 4 hours you have enough money to buy lunch (quid pro quo)

·        If I sing, you pay me not to – qui pro quo to regulate my not singing

·        Gasoline at $2.5/g imposes a restraint on your driving

o       Architecture – the way the world is constrains your behavior

·        Put windows where nothing can be seen to keep bored people form not paying attention to lectures

§         Wireless connections allow people to not pay attention as well (hmm… mine is still not working, guess that is a good thing)

  • Laws affect things that regulate – that is how we manage the above four things
    • Can be used to help modify
      • Ex: regulating smoking
      • Ads run to stigmatize smokers
      • Regulate qty of nicotine in nicotine delivery device (govt term for “cigarette”)
    • Govt all the time is thinking about the tradeoff of these types of regulators
  • Architecture as regulator
    • Ex: govt using architecture as regulator
      • Napolean III – regulated boulevards to control flow of people
      • Robert Moses – desired that people be segregated
        • But, desire inconsistent with constitution
        • So, he used roads – roads with low bridges prevented buses from traveling – so that people that relied upon buses couldn’t get there. (wow, what a form of racial/economic discrimination)
        • This type of regulation goes largely unnoticed. These regulations are invisible
      • Americans with Disability Act
        • Basically – buildings no longer may present barriers
  • These 4 modalities of regulation – must consider how they interact – government is always thinking how to use these 4 together

 

Q – There is a point where you can’t architect against social norms (or acceptance which is it?) – at some point there is a time when architecture can’t stand in way of natural forces

A – let’s put this two ways.  Law of nature – speed of light for example – can’t architect against those (definite constraint).  Perhaps humans have constraints but don’t assume too much of laws of nature of human behavior.  So within those constraints there is much we can do.

Q – Your argument laid out primacy of law over other three – but within those three there is some affect – are you arguing primacy of law here?

A – no, within context, any is on top.  But, law is the one place where it seems appropriate that you self-consciously understand what you are trying to affect.  The one place where it is appropriate where you can remake the world is law. (That is where you architect social structure).  Law has that role in the context of democratic legitimacy.  [JDF1] 

 

Q – Libertarian’s use government for coercion without acknowledging that is what they are doing

A – (Stupid name for a chapter – what libertarians don’t get) – Governments use it.  To defend a claim that libertarians should worry about these regulators. Mills wrote about restraints imposed by social norms.  He worries there is too much intolerance of deviant ideas that will ultimately kill society.  The diversity of regulators is recognized by different parts of the world differently.  E.g. Americans like to think they don’t worry about norms – but they do.

 

Back to the lecture

 

What is Cyberspace  - it is a particular architecture of a particular design which has consequences.

 

For example – TCP/IP

 

Government can’t know who you are, what you are doing or what you are doing (i.e. the internet gives you relative anonymity) thus they can’t regulate you.

 

The web forgets who you are – business don’t like that.  So, they want to fix this bug to identify you (e.g. bots, cookies, etc) – Libertarians like it…  hence the conflict of what business/government want the net for and what the original designers want the net to be.

 

e.g. no porn to kids

  • Court has said it is permissible to restrict porn from kids
  • In real space, the law can have an affect because there is a fundamental feature of the architecture of real space because it is hard to hide that you are a kid in real space (a 12 year old has a tough time disguising himself as an adult).  Age is relatively self-authenticating in real space.  And, since most kids don’t have money – so what porn dealer wants to give it to kids? (market reg)
  • This real space architectural restriction is not perfect – but it can work
  • But, in cyberspace – age is not relatively self-authenticating.  On the internet no one knows if you are a dog, much less a 12 year old dog (hmm… 84 in human terms)
  • The same rule – “can’t give porn to kids” – becomes almost impossible to enforce

 

When the market tries to regulate by making sure you pay

  • In real space it is possible to id person taking your goods and therefore charge them money
  • In cyberspace – hmmm

 

The mistake of “is-ism”

  • You look at the way the Internet is at a certain time and assume that is the way it is always going to be. 

 

How do you solve the problem of “un-regulability”?

  • Change the code
  • Change the architecture
    • Cookies…. Deposits data on your hard disk so web server knows who you are (as of 15 mins ago) hah – maybe your kid is sitting there instead.  Represents a little tiny change in architecture of the net with regards to possibility of now understanding who you are…
      • Most people have no clue how much their behavior is tracked as a result of this change
    • Sniffing technology – they look to see what is in the packet of data and can track traffic based on what is there
      • Lessig used morpheus to put his lectures up on the net
        • But Stanford IT said his server was illegally sharing content because morpheus was detected… never mind the activity was perfectly legitimate.
    • IP addresses can be mapped if you try hard enough…maps show where…so users can begin to discriminate on geography
  • Thus the anonymous ability of the net is now “relatively identified” (another candidate for TYNTK).
  • Change the code and you change the environment to something that is regulatable.

 

The problem is that “IT” can happen – as Internet is increasingly regulatable – you need to worry about

 

Q – About cookie technology – does not invade privacy does not trespass – IS the cookie a violation of any rule or law?

A – In the US – No.  No rules saying you can’t mark the computer (hmm… you can tell your browser to not accept cookies – therefore there is implied consent).  If the unintended consequence is that pervasive technologies like this can track you then you may be concerned about consequence of such trivial technology and the regulations that allow or do not deter them.

 

Doubleclick is a good example of a company that has come to terms with how to live within the Internet world.  So, they adopted aggressive internet privacy policy explicitly stating what they do and that they do not violate rules…

 

Q – What is the answer re: Gilmor and Barlow –

A – they understand it – are not naïve  Are very much aware that govt can muck it up.

 

One obvious point – these modalities create certain constraints

They interact – less of one can mean more of another

 

For ex: Spam

 

Initially, law rejected as Internet was meant to be without censorship – and the community norm (small and homogenous) respects the rules.  No one wanted to be flamed.

 

Enter American OnLine – millions join the community – some who don’t know the norms or could care less – so the norm that regulated content on the net disappears.

 

Thus, spam gets an entry.

 

Enter vigilantes

           

Ah, we go out there and try to use technologies to control spam.  And that technology tries to block email from servers that seemingly don’t respect the rules.  Of course, there is some judgement as to what is good spam versus bad spam.  And, there is disagreement as to that distinction.  (gave story of arms race that broke out when HP blocked MIT and MIT started blocking HP…)  The problem of differences in policy between two different users is still an issue. (Vigilantes are trying to do good – but the technology they try to implement does not necessarily achieve the objective but does decrease the ability of Internet to be a free speech medium.)

 

The point is that architecture as a response can do more harm to a free speech value than…

 

A Law

 

So, it comes in and regulates in some way – taking care of problem of spam – therefore the need for architecture to regulate spam is removed. This bit of law can remove need of private law wherease absence of law can increase need for private law (e.g. architecture)…

 

1)      Code is law – Mitch Kapor said architecture is politics.

2)      Code is plastic – can be changed as values change

3)      No law can beget bad code (read absence of law=no law)

4)      Good law can avoid bad code (maybe)

 

Q – noticed deterioration of rule of law in US – I don’t see that primacy with clarity you do.  We have problem of moving away from respect of public law – in so many different power centers – are you going to address that?

 

A – I am enormously pessimistic of power of law in this country.  It is in fact perverting important fundamental values [hmm… reminds me of BusinessWeek article on the dissonance evident between law good for business and conservative views of law].

 

Q – some vigilantes could take over – by “black-holing” you [note story of Cherokee County and vendor that launched fed and state investigation of consultant that discovered non-compliance in service provider’s routers]

 

A – When people think they don’t have to defend their actions – then the private action should give way to government regulation.

 

Q – looking at American law and how it affects the market and architecture – especially how it relates to influencing other states.

 

A – architecture of Internet has exported values of free speech better than any other activity this country has ever undertaken. 

 

Barbara – a lot of vigilantism actually blocks entire region – like China – because so much spam originates there.

 

Lessig – should that trouble us?

 

 

 

 

 


 [JDF1]Ok, this lecture is convincing me to buy his book.  The model he uses flows nicely

 

comment [] 6:09:43 PM    

Wentworth is bloggin at copyfight comment [] 6:07:44 PM    

Video blogging ILAW

Lisa Rein is video blogging.

comment [] 5:16:20 PM    

Blog, blog everwhere a blog.

Just visited some of the other bloggers noting this conference, then took a look at the NECC blogs being written.  This evening, I will do some meshing -- as I see things picked up that I missed.

 

comment [] 5:00:50 PM    

ILAW blogging

I am not going to even try to do what Donna Wentworth and others are accomplishing --- so, take my notes as they are.  But, Donna does leave a list of accomplished bloggers:

Later: I've got some excellent company. Among the weblog writers in attendance: J.D. Lasica, Frank Field and Aaron Swartz. Wendy Seltzer and Alex Macgillivray, meanwhile, are serving this year as guest lecturers--along with Former FCC Chariman Reed Hundt, Intel Director Emeritus Les Vadasz, Cisco General Counsel Mark Chandler, EFF Senior Staff Attorney Fred von Lohmann, and Creative Commons Executive Director (and former Berkman-ite) Glenn Brown.

 

comment [] 4:47:59 PM    

The Debate on what government would look like if...

I had this very same discussion with multiple persons last week...

Eliminating the scarcity in deep political thinking.

Jock Gill has been talking about government as something produced rather than consumed by its citizens. It's an important distinction. Britt expands on the concept and adds this:

We can't count on government, which seems to have devolved into a partisan pit of paralyzed pedantry, focused on neoconservative initiatives and progressive reactions. But, if the government were to suddenly transform itself into a citizen-centric governance model, how would that model be expressed? Through a series of web apps, whether for citizen input or IRS forms.

And this:

For the last 20 months, our government has not allowed us to make a difference. On 9/12/01, most Americans woke up yearning to contribute. We donated blood but the blood banks ran out of room before most of us could contribute. We tried to drive to New York to help pick through the rubble, but were turned back at the bridges and tunnels. Instead, we got an ad from our president encouraging us to be loyal consumers and get on airplanes and fly anywhere but to New York! "Keep moving folks, there's nothing to see here. We don't need your help."

If my premise is correct, this snub will be looked back on as one of the great political blunders in history. If it is revealed as a blunder, it will be because one candidate with enough common sense, charisma and speaking ability set up a web application and a related web log that linked to the web logs of people who still had not been permitted to make a difference.

The 44th president of the United States will be elected by a bottom-up, citizen-led production. That president will, literally, be owned by citizens, whose resources trump companies. If we put ourselves in the place of that 44th president, what kind of government will we fashion.

Probably a web app.

Even if you don' t like Britt's (or Howard Dean's) politics, and even if you like the present president (who often pronounces the latter word as if it were the former), you gotta give Britt points for thinking here. The best political analyses of our time, on all sides, seems to be coming from abundant sources other than the usual producers.

[The Doc Searls Weblog]
comment [] 4:43:23 PM    

Jon Zittrain – ilaw Stanford 2003-06-30

Internet Technologies and why they matter

9:00 am

 

Why tech matters

  • Code is a form of regulation (Larry’s idea) – can enable or stop someone from doing something
    • Subtle – don’t notice being regulated
      • Krispy Kreme – opening in Mass – police officers regulated traffic flow (by law)
      • Guard rails steering you in queue (by code – subtle)
    • Little resistance from the herd.
      • We cannot civilly resist
    • Plastic
      • (can be changed)
  • Some current questions
    • Why is it so hard to trace people on the net?
    • Why is video streaming such a pain?
    • Why are we so vulnerable to viruses and hacks?
  • Moves to discussion of IETF (Internet Engineering Task Force)
    • Hourglass architecture – Seven layer network model
    • Frees network from politics of medium, distribution, file standards, etc
    • [JDF1] Each layer can change without upsetting the past
  • W3C
    • HTML discussion
      • How protocol “renders” a document to be presented on any screen using standards compliant browser.
      • Tim Berners Lee is head of this consortium
      • Zittrain does not think there is much room left for HTML to grow as number of stakeholders has grown so large.
      • Course, any mfg company is free to vary the standard – (e.g. MS embedded icons as part of the std)
    • Gnutella community
      • Two guys in a back room wrote this (AOL story) – peer-to-peer file sharing
      • Internet meant as a distributed network – shows graphs of broadcast vs telephone vs internet (tradition one to many, subnodes and all connected type graphs) (Read Linked or Nexus for fuller discussion)
  • Simplicity is goal
    • Network should be dumb – smart networks are not efficient
    • Ability to grow and adapt to changing requirements is key
  • Few Centralize functions
    • Internet assigned numbers authority – is an example of where someone had to regulate IP number assignments
      • Explains how you are assigned IP numbers from dial up, dsl, others      
  • How does data travel the Internet?
    • Source – cloud – destination (he provided the artwork – in deference to his work, I won’t try to reproduce)
    • Described US postal service analogy and why network designers thought packet transport was the way to go…[JDF2] 
    • Course – you can’t complain to a central source if delivery is slow (i.e. packet loss).  But, that’s the nature of the net (see Weinberger – Small Things loosely coupled)
    • Now, he explains why video streaming doesn’t work so well with all those “hops” in the way.
    • Goes into brief discussion why managing IP addresses, given out willy nilly, can lead to IP routing table overload
      • Ooh – someone says the IP number problem is a myth.  (Barbara Roseman - ICANN) --  V4 address space at rate of current outlay will last approximately 20 years.  (Zittrain is picking at her)
    • Ah, offers up example of distributed computing – “SETI@home” – [remember the guy from DTAE who got fired over installing this???]
    • An example of a fraudulent spam message (trying to get his AOL password) – the address shown in the email has a hyperlink – and the hyperlink is different than the named link – [geez – 98% won’t get that – what a problem and a definite candidate for TYNTK ((things you need to know))][JDF3] 
    • Shows demo from Traceroute – to show where mail travels – and how hard it is to trace the mail to its original source
    • Wasn’t designed to trace – after all, who would be so devious to send destructive packets? (a little innocence amongst the designers)
    • There is MAPS – Mail Abuse Prevention System (keeps track of bad servers)
      • They can “blackhole” a portion or complete segments of the internet
      • Q- How do you know where your mail is coming from?
        • MAPS offers real time checking service (for a small fee of course)
      • Zittrain is describing these services to point out the technical issues that exist as we try to regulate the problems (boy, sure could use a primer for legislators)
    • IBM 0 1992 - You cannot build a corporate network out of TCP/IP
  • What’s missing from the internet?
    • QOS
    • Accounting and traffic management
      • BGP is one protocol designed to handle this
    • Encryption and security
      • Either designers were naïve – or, (man, consider DARPA funded this) – it was decided that encryption is an application – you won’t have a dumb (simple) network – if it is built in.
    • authentication

 

[Question – how much US portion of Internet costs – and who is paying for it?]

Answer: Don’t know, how do you even approach accounting for the cost. 

Q – Try equipment cost –

A – part of the fuzziness is that such a decentralized network defies definition.  Industry people are concerned about cost of building the Internet out to each house.

Graham Freeman – no answer – he has a van that can be a point as a wireless relay on the Internet (a temporary hub).

Q – what happens in the clouds?

A – there is a vision of clouds within the clouds – but there are only a handful of tier I providers.  If they are shut down – then there could be a problem.  Getting Tier I to agree to something like sniffing out P2P packets could prove devastating to P2P.  But, that ain’t gonna happen.

Q – Do packets take a direct route and only circuitous routes if prevented or is it random

A – rougly the network maps roughly to geography.  AOL dial-up is direct (fed ex) connecting to Dulles.  But Internet is a bit more random. 

Q – Is there some intelligence in the network?

A – routers either advertise a route or they don’t (hmm… there are some cost calculations here)

A - Barbara Roseman (ICANN – formerly Global Crossing) – some interior networks do more precise routing control.

Q – Lauren Smith – Can you say more about physical lines and where they are located.

A – Because of Natl Sec requirements, I can’t say (joke) – different media dictates different routes, connections, locations

(CAIDA.org – cool graphs mapping the internet)

Q – Lisa Raine – On Lisa Raine’s radar – question about jurisdiction –

A -  SeaLand is more of a destination than a direction.

 

Brief discussion of a “there goes the neighborhood” attitude – and efforts to build I2 – instead of managing Internet.

 

Q – Turkish Internet traffic affected by collapse of fiber in sea damaged by Algerian quake.  Turkey suffered because of this bottleneck.

 

  • Now he wants to run through basics of encryption –
    • Three easy steps
      • Something we want to encrypt (hello)
      • Says encryption of 5 key letters – is impossible to break (doh – that is true with any limited use of a code scheme – gotta have patterns to break codes) But, key has to be same length as encrypted data to be “uncrackable”
      • Oh, dencrypt
    • Public key encryption
      • Find a one-way function
        • Make sure it is hard to find its reverse
        • Ex: multiply fast – factor slow
        • Generate two related keys for one-person’s use
        • Declare one key “public” and the other one “private”
          • Lessig has his public key available on his site.
    • Digital Signatures
      • Talks of PGP signatures – personal to very thing encrypted
  • Why so many viruses (are so common?)?
    • PC meant to run anything – (a rather compliant beast)
    • Means you can invent things like gnutella – PC is gonna run it…
    • And, it also means it will run a virus.
    • The main purpose in life of a typical virus is to replicate itself (not so many are concerned with destroying your drive)
    • Why there are so many viruses without payloads I am not so sure
    • Used to be that you had machines with OS from MS, WP from WP, spreadsheet from Lotus, etc.  (He uses an analogy of a rutebega from one farmer not agreeing with corn from another)  - now you have a lot of stuff coming from one source

 


 [JDF1]Zittrain knows his tech stuff well for an attorney/professor

 

 [JDF2]He certainly knows how to reduce examples to simplistic, graphic forms.  Imagine counting mailboxes as hops and we helped to deliver our own mail… hmm… if free why not?

[JDF3]If  Zittrain is this entertaining for every lecture – boy, lawschool would be a hoot!

comment [] 2:45:54 PM    

Blog attendee notes

  Hmm.. Tracy Mitrano from Cornell is here...

comment [] 12:41:14 PM    

Dis-connected

Hmm... I am here but my network connection is not working - course if you read this, the connection is working - a conundrun indeed. Course the techie sneered at my Wintel machine - oh well, I am in Rome.

Met Donna Wentworh, I see Larry Lessig.  It is almost like meeting celebrities that you have spent way too myc time reading about.

Ran into a gentleman (Ray London, Human Studies Center, Irvine) who has been to two other Internet Law Conferences.  Says they are great.  I am looking forward to it.

comment [] 11:59:50 AM    

Blogging from ILAW...

Donna Wentworth will be blogging the conference.

comment [] 10:16:45 AM    

Blogging projects

The folks from Georgia are in Seattle this week attending NECC.  For the first time, the group will use blogs to record their experiences and hopefully carry forward any conversations they may start.  Edublogger Anne Davis has been in Seattle for the past couple of days and has posted here and here.  Watch here for participant entries.

comment [] 9:26:07 AM    

Libel protection for bloggers.

This will hold only if not abused.

Bloggers Gain Libel Protection. An appeals court decides small-time online publishers can't be held responsible for libel if they just republish information. The ruling is a victory for free speech advocates and bloggers. By Xeni Jardin. [Wired News]

comment [] 9:20:39 AM    

Open Government and Technology

Kudos to the Savannah Police Department for allowing the public to "self-service" their need for information on crime.  If more governments would just "push" the information out there, we would be better off.

And, the Governor's Task Force on Telecommunications and Technology finally releases the report that has been ready since April.  I'll have anlysis later.  I'd be interested in any comments you may have. [Note: I've tried uploading the pdf file but keep getting an error. Is 2 megs too big?]

comment [] 9:12:09 AM    

Political Ideas Tool

U.S. of E.. Lance Knobel, whom I've had the pleasure meeting in person, had a chat with british minister of parliment Tom Watson, who has a 'real' weblog. Fascinating to read how this politician uses his log. Watson: "It's not a campaign tool. It's a political ideas tool." I'm excited about this attitude in [european] politics. Weblogs are exactly the tool needed as the United States of Europe are forming right under our noses and before our eyes. There's even a draft constitution just waiting for comments, praise, attacks, flames and above all: discussion... [Adam Curry: Adam Curry's Weblog]

comment [] 1:13:25 AM    

Tech Biz Blogs

Had a good talk with my friend Mike Adkinson, publisher of Techlinks in Atlanta.  He is very interested in blogs following our discussion.  So, this bit from Doc Searls is appropriate.  Mike, if you read this, also check out Dan Gillmor's blog in Silicon Valley.

More stuff.

Griff in TwinCities.com: Biz Blogging Breaks Out. Bonus Link: Griff's Affirmation Bullshit Generator, which tips its hat to Dack's Web Economy Bullshit Generator. Dack's new thing Rational Enquirer. All happening locally there in The Cities.

[The Doc Searls Weblog]
comment [] 1:04:10 AM    

Internet Law

Well, just arrived in Palo Alto for the Internet Law Program 2003 sponsored by the Berkman Center and the Stanford Center for Internet and Society.  Am looking forward to meeting Lessig and others that I have read much of...

 

comment [] 12:48:35 AM    


Technorati Profile