You are on page 1of 1

0465039146-RM

12/5/06

12:31 AM

Page 351

notes to chapter four

351

know that has happened. In that sense, it is much the way it was. Audio Tape: Interview with
Greg Jackson (1/9/06) (on file with author).
5. See Helen Nissenbaum, Values in the Design of Computer Systems, Computers and
Society (March 1998): 38.
6. As network adminstrator Greg Jackson described to me, while certain ports (including
the wireless network) require that the user initially register the machine, there is no ongoing
effort to verify the identity of the user. And, more importantly, there are still a significant number of ports which remain essentially unregulated. That doesnt mean that usage, however,
isnt regulated. As Jackson described,
But the truth is, if we can identify a particular peer-to-peer network that is doing
huge movie sharing, we will assign it a lower priority so it simply moves slower and
doesnt interfere with other people. So, we do a lot of packet shaping of that sort.
Almost never does that extend to actually blocking particular sites, for example,
although there are a few cases where we have had to do that just because . . .
According to Jackson, it is now Columbia that earns the reputation as the free-est network.
Columbia . . . really doesnt ever try to monitor at all who gets on the wired network on campus. They just dont bother with that. Their policy is that they protect applications, not the network.
Audio Tape: Interview with Greg Jackson (1/9/06) (on file with author).
7. For an extremely readable description, see Peter Loshin, TCP/IP Clearly Explained (San
Francisco: Morgan Kaufmann, 1997), 1523; see also Craig Hunt, TCP/IP Network Administration, 2d ed. (Sebastopol, Cal.: OReilly and Associates, 1998), 822; Trust in Cyberspace, edited
by Fred B. Schneider (Washington, D.C.: National Academy Press, 1999), 2936.
8. Peter Steiner, cartoon, New Yorker, July 5, 1993, 61.
9. In some contexts we call a network architecture that solves some of these imperfectionsthat builds in these elements of controlan intranet. Intranets are the fastest-growing
portion of the Internet today. They are a strange hybrid of two traditions in network computingthe open system of the Internet, based on TCP/IP, and the control-based capability of traditional proprietary networks layered onto the Internet. Intranets mix values from each to
produce a network that is interoperable but gives its controller more control over access than
anyone would have over the Internet. My argument in this book is that an internet with control is what our Internet is becoming.

CHAPTER FOUR

1. TelecomWorldWire, Compuserve Moves for Porn Techno Fix, January 11, 1995.
2. See Ed Krol, The Whole Internet: Users Guide and Catalogue (Sebastopol, Cal.: OReilly
and Associates, 1992), 2325; Loshin, TCP/IP Clearly Explained, 383; Hunt, TCP/IP, 122; see
also Ben M. Segal, A Short History of Internet Protocols at CERN, available at link #12.
3. See Jerome H. Saltzer et al., End-to-End Arguments in System Design, in Integrated
Broadband Networks, edited by Amit Bhargava (Norwood, Mass.: Artech House, 1991), 3041.
4. Shawn C. Helms, Translating Privacy Values with Technology, Boston University Journal of Science and Technology Law 7 (2001): 288, 296.
5. For a description of HTTP Protocols as they were used in the early 1990s, see link #13.
6. For an extraordinarily clear explication of the point, see Dick HardtEtech 2006:
Who Is the Dick on My Site? (2006), available at link #14.

You might also like