Studying Online Newsgroups Danyel Fisher and Christopher Lueg

Total Page:16

File Type:pdf, Size:1020Kb

Studying Online Newsgroups Danyel Fisher and Christopher Lueg Appendix Studying Online Newsgroups Danyel Fisher and Christopher Lueg This program posts news to thousands of machines throughout the entire civi­ lized world. Your message will cost the net hundreds ifnot thousands ofdollars to send everywhere. Please be sure you know what you are doing. Are you absolutely sure that you want to do this? [yIn] Warning message displayed by original "nn" newsgroup program before posting A.1 Introduction Several of the chapters in this volume have discussed studying online newsgroups. The raw data they tap into is commonly available; however, it can be quite a chal­ lenge to mine that data for useful information. This appendix is meant to serve two purposes. First, it is a basic introduction to the day-to-day structure of Usenet. It emphasises the threading structure of messages, and how those threads relate to news groups; it discusses the hierarchy of group names, and how those hierarchies are formed; and it discusses the life and death of newsgroups. It is meant as a general continuation of Pfaffenberger's chapter (this volume); it also draws on some ofthe information presented by Smith (this volume). Second, it is a technical introduction to dealing with Usenet data. For many pro­ jects, it is easy enough to track some current messages from Google's "Groups" archive, or to count the number of posters at Netscan (Smith, this volume); however, to actually look at the content ofmessages still requires downloading and reading them all. This section briefly discusses some of the tools that can be useful in downloading and reading Usenet groups. It assumes some knowledge of pro­ gramming - currently, to the best of our knowledge, there are no public domain tools for Usenet analysis - but may be of some use as a list of starting points. Many of these facts may also be applicable to other online newsgroups and dis­ cussion boards; Usenet, as the granddaddy ofso many ofthem, has been an impor­ tant social shaper of the norms and understandings of these groups. A.2 Posting to Usenet Usenet is a distributed bulletin board: messages posted to one machine are sent around the world and readable on any other machine. Because ofthe Usenet prop­ agation mechanism (discussed in section A.3), there is no definite order in which 254 From Usenet to Co Webs messages will arrive; however, almost all messages make it through. There are no central controls on who can post a message; rather, the system is open to all. Instead, site administrators have the ability to interrupt or drop messages. This makes for a somewhat anarchic system; messages flow constantly from all over the world. But there is a way to organize to the messages. Each message is placed within one of more 'newsgroups;' software clients are designed to aid in reading those groups. A user might choose to read only the newest messages in comp.lang.python, for example, or rec.cooking.recipes. The former, by its name, is for discussion of the computer language Python; the latter is for exchange of recipes. A.3 Usenet Propagation Usenet is interesting partially in that it acts in a way fairly unlike other online sources. It is a fully decentralized system; there is no central authority of the Usenet system. Email messages, for example, are routed and then sent directly: my message to you goes through the smallest number of servers it can, Usenet mes­ sages, in contrast, are propagated indirectly from machine to machine. Using a pro­ tocol known as NNTP, each sites subscribes to one or more "feeds" from other sites. Each site, therefore, can only receive the messages that are sent on by the sites around them. There is no canonical central core of Usenet; rather, each site has a partial control of what is seen by those sites downstream from it. The impact of this is lessened slightly because each site can subscribe to feeds from several dif­ ferent sources. One of the implications of this is that it becomes important to know who is upstream of a site: because Usenet propagation is decided on a site-by-site basis, the messages that are visible from one site might be different than those from another; some upstream sites choose not to carry certain types of messages. For example, Figure A.I shows two headers of messages arriving at the University of California at Irvine Paths are read backwards, and are separated by"!" marks. The first message has wound its way from Indiana to the University of Illinois, to Oregon, to Cal State Long Beach. The second was posted at Google.com, has passed through Syracuse university, San Diego State, and Cal State Long Beach before reaching Irvine. In Figure A.2 we see the reverse - one author of this piece sent a message to a newsgroup to be checked by the other. The message originated at UC Irvine; it travelled a rather tortuous path to Switzerland, where it was read. In the meantime, it had passed through San Diego State and Oregon before going to Syracuse. This one spent more time at non-academic sites - the international networks icl.net and mediaways.net carried it - before sending it, at last, to the Swiss university. news.service.uci.edu!csulb.edu!canoe.uoregon.edu !Iogbridge.uoregon.edu!vixen.cso.uiuc.edu!news.indiana.edu!ahabig news.service.uci.edu!csulb.edu!newshub.sdsu.edu !news-spur1.maxwell.syr.edu!news.maxwell.syr.edu!feeder.qis.net !sn-xit-02!supernews.com!postnews1.google.com!not-for-mail Figure A.I Paths of messages to California. Appendix 255 news.ifi.unizh.ch!news-zh.switch.ch!feedme.news.mediaways.net !newsfeed.icl.net!news.maxwell.syr.edu!logbridge.uoregon.edu !ihnp4.ucsd.edu!news.service.uci.edu!not-for-mail Figure A.2 The path of a message from California to Switzerland. Each of those servers had its own policy for which messages to pass on, and how often. Each of them cares about a different selection of newsgroups. With a web this tangled, it becomes clear why different sites can see a different selection. This also means that there is no canonical view of Usenet: the sites that Netscan sees on the Microsoft campus, and the order they arrive, may be quite different from the messages arriving at Google's headquarters in Palo Alto. More confusingly, there are many different types of software meant to help handle administer Usenet traffic. Usenet traffic has always been extensive, and it has grown even more in the last few years. Unfortunately, much of that growth has been in spam - undesirable, off-topic advertisements - so a number of sites have started to carefully constrain which messages they pass on. There is no longer such a thing as an unconstrained Usenet feed of all groups. A.4 The Birth and Death of Newsgroups Pfaffenberger (this volume) gives a good overview of how groups are created. In classic Usenet fashion, there are three or four distinct methods. One of them is voting. To keep the hierarchy ofimportant topics well-organized, there are specific conditions under which a new group can be added to the "big 8" hierarchy. Essentially, a new group requires a period of discussion and comments, followed by a period of online voting. Current members involved in the parent group are expected to vote on whether a new group would serve a distinct population, and whether the additional complexity in the hierarchy would be worth the additional specificity. (For example, a regular country music listener might vote against a new country music group because he wants to minimize the number of groups he checks daily for new messages, or might vote for it in order to ensure he has a com­ munity of dedicated fans to tap into.) Email votes for and against are counted, and ifover half of the votes come out in favour, then the group is instituted. The voting is done, to some extent, on the honour system: although votes are kept and pub­ lished by email address, there is no way to ensure that some addresses are not mul­ tiply maintained. Still, the system often works out to be a fair one, with the exception of some notable abuses. One notable explosion was the notorious rec.music.white-power vote. When members of the newsgroup rec.music became irritated at certain political attitudes in their group, some members started a campaign to split off their own special interest. Unfortunately, word got out the net. Well-meaning net users, wanting to strike a blow against white separatists, sent in thousands of malformed "no" votes. The exhausted moderator eventually declared the election a failure, and rec.music.white-power was not created. 256 From Usenet to Co Webs However, those parties did find other places to create their group. As Pfaffenberger explains, there are other hierarchies, not subject to votes. One, the alt groups, are collectively known as the alternet. Groups there are created informally, based on discussions in the group alt.config. Because anyone can create an alt group fairly easily, the propagation ofthose groups is much less standardized. It is impos­ sible to keep up with the tens of thousands of groups that are created and destroyed constantly. Within the groups, many alt messages are not distributed very far, are filtered rapidly by destination sites, or are kept in a spool of far fewer messages than messages in the 'big 8: There are many joke groups ­ alt.Swedish.chef.bork.bork.bork is named after a humorous character on a children's television show, and alt.fan.star-trek.sexy.bald.captain is a fan group for Patrick Stewart's role in the 1980s Star Trek: The Next Generation TV show.
Recommended publications
  • Lesson 1 Key-Terms Meanings: Internet Connectivity Principles
    Lesson 1 Key-Terms Meanings: Internet Connectivity Principles Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 1 Publs.: McGraw-Hill Education Header Words • Header words are placed as per the actions required at succeeding stages during communication from Application layer • Each header word at a layer consists of one or more header fields • The header fields specify the actions as per the protocol used Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 2 Publs.: McGraw-Hill Education Header fields • Fields specify a set of parameters encoded in a header • Parameters and their encoding as per the protocol used at that layer • For example, fourth word header field for 32-bit Source IP address in network layer using IP Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 3 Publs.: McGraw-Hill Education Protocol Header Field Example • Header field means bits in a header word placed at appropriate bit place, for example, place between bit 0 and bit 31 when a word has 32-bits. • First word fields b31-b16 for IP packet length in bytes, b15-b4 Service type and precedence and b3-b0 for IP version • Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 4 Publs.: McGraw-Hill Education IP Header • Header fields consist of parameters and their encodings which are as per the IP protocol • An internet layer protocol at a source or destination in TCP/IP suite of protocols Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 5 Publs.: McGraw-Hill Education TCP Header • Header fields consist of parameters and their encoding which are as
    [Show full text]
  • The Freedom of Speech at Risk in Cyberspace: Obscenity Doctrine and a Frightened University's Censorship of Sex on the Internet
    NOTES THE FREEDOM OF SPEECH AT RISK IN CYBERSPACE: OBSCENITY DOCTRINE AND A FRIGHTENED UNIVERSITY'S CENSORSHIP OF SEX ON THE INTERNET JEFFREY E. FAUCETrE INTRODUcTION On November 8, 1994, Carnegie Mellon University (CMU) removed' a small handful of topics from among the thousands of Usenet newsgroups2 subscribed to by the university computer sys- tem and available on the Internet' .because they contained en- coded sexually explicit images Under the new policy announced by Erwin Steinberg, university vice provost for education, none of the university's 9,000 computers would list the approximately forty newsgroups.5 The newsgroups that were censored are all known as "binaries,"6 and they contain, among other things, encoded imag- 1. Despite the University's restriction on the sexually explicit newsgioups, techno- logically adept students can circumvent the policy by accessing the groups through other file servers. However, for the purposes of this Note, the efforts of these enterprising students are not important when compared with the symbolic effect of the censorship. 2. These newsgroups are "bulletin board-style discussion groups" that can be read from, responded to, and downloaded to an individual's computer. See David Landis, Ex- ploring the Online Universe, USA TODAY, Oct. 7, 1993, at 4D. The Usenet newsgroups are available worldwide via Internet. See id. 3. The Internet is the most commonly known "wide area network" (WAN). It "evolved from networks established by the Department of Defense and the National Science Foundation. [The] Internet connects various government, university, and corporate entities, spans 137 nations, and has at least fifteen million users." Eric Schlachter, Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differ- ences in Computer Bulletin Board Functions, 16 HASTINGS COMM.
    [Show full text]
  • Memetic Proliferation and Fan Participation in the Simpsons
    THE UNIVERSITY OF HULL Craptacular Science and the Worst Audience Ever: Memetic Proliferation and Fan Participation in The Simpsons being a Thesis submitted for the Degree of PhD Film Studies in the University of Hull by Jemma Diane Gilboy, BFA, BA (Hons) (University of Regina), MScRes (University of Edinburgh) April 2016 Craptacular Science and the Worst Audience Ever: Memetic Proliferation and Fan Participation in The Simpsons by Jemma D. Gilboy University of Hull 201108684 Abstract (Thesis Summary) The objective of this thesis is to establish meme theory as an analytical paradigm within the fields of screen and fan studies. Meme theory is an emerging framework founded upon the broad concept of a “meme”, a unit of culture that, if successful, proliferates among a given group of people. Created as a cultural analogue to genetics, memetics has developed into a cultural theory and, as the concept of memes is increasingly applied to online behaviours and activities, its relevance to the area of media studies materialises. The landscapes of media production and spectatorship are in constant fluctuation in response to rapid technological progress. The internet provides global citizens with unprecedented access to media texts (and their producers), information, and other individuals and collectives who share similar knowledge and interests. The unprecedented speed with (and extent to) which information and media content spread among individuals and communities warrants the consideration of a modern analytical paradigm that can accommodate and keep up with developments. Meme theory fills this gap as it is compatible with existing frameworks and offers researchers a new perspective on the factors driving the popularity and spread (or lack of popular engagement with) a given media text and its audience.
    [Show full text]
  • Nonprofit Security Grant Program Threat Incident Report
    Nonprofit Security Grant Program Threat Incident Report: January 2019 to Present November 15, 2020 (Updated 02/22/2021) Prepared By: Rob Goldberg, Senior Director, Legislative Affairs [email protected] The following is a compilation of recent threat incidents, at home or abroad, targeting Jews and Jewish institutions (and other faith-based organization) that have been reported in the public record. When completing the Threat section of the IJ (Part III. Risk): ▪ First Choice: Describe specific terror (or violent homegrown extremist) incidents, threats, hate crimes, and/or related vandalism, trespass, intimidation, or destruction of property that have targeted its property, membership, or personnel. This may also include a specific event or circumstance that impacted an affiliate or member of the organization’s system or network. ▪ Second Choice: Report on known incidents/threats that have occurred in the community and/or State where the organization is located. ▪ Third Choice: Reference the public record regarding incidents/threats against similar or like institutions at home or abroad. Since there is limited working space in the IJ, the sub-applicant should be selective in choosing appropriate examples to incorporate into the response: events that are most recent, geographically proximate, and closely related to their type or circumstance of their organization or are of such magnitude or breadth that they create a significant existential threat to the Jewish community at large. I. Overview of Recent Federal Risk Assessments of National Significance Summary The following assessments underscore the persistent threat of lethal violence and hate crimes against the Jewish community and other faith- and community-based institutions in the United States.
    [Show full text]
  • Newscache – a High Performance Cache Implementation for Usenet News 
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the USENIX Annual Technical Conference Monterey, California, USA, June 6-11, 1999 NewsCache – A High Performance Cache Implementation for Usenet News _ _ _ Thomas Gschwind and Manfred Hauswirth Technische Universität Wien © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org NewsCache – A High Performance Cache Implementation for Usenet News Thomas Gschwind Manfred Hauswirth g ftom,M.Hauswirth @infosys.tuwien.ac.at Distributed Systems Group Technische Universitat¨ Wien Argentinierstraße 8/E1841 A-1040 Wien, Austria, Europe Abstract and thus provided to its clients are defined by the news server’s administrator. Usenet News is reaching its limits as current traffic strains the available infrastructure. News data volume The world-wide set of cooperating news servers makes increases steadily and competition with other Internet up the distribution infrastructure of the News system. services has intensified. Consequently bandwidth re- Articles are distributed among news servers using the quirements are often beyond that provided by typical Network News Transfer Protocol (NNTP) which is de- links and the processing power needed exceeds a sin- fined in RFC977 [2]. In recent years several exten- gle system’s capabilities.
    [Show full text]
  • Fortran Resources 1
    Fortran Resources 1 Ian D Chivers Jane Sleightholme May 7, 2021 1The original basis for this document was Mike Metcalf’s Fortran Information File. The next input came from people on comp-fortran-90. Details of how to subscribe or browse this list can be found in this document. If you have any corrections, additions, suggestions etc to make please contact us and we will endeavor to include your comments in later versions. Thanks to all the people who have contributed. Revision history The most recent version can be found at https://www.fortranplus.co.uk/fortran-information/ and the files section of the comp-fortran-90 list. https://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=comp-fortran-90 • May 2021. Major update to the Intel entry. Also changes to the editors and IDE section, the graphics section, and the parallel programming section. • October 2020. Added an entry for Nvidia to the compiler section. Nvidia has integrated the PGI compiler suite into their NVIDIA HPC SDK product. Nvidia are also contributing to the LLVM Flang project. Updated the ’Additional Compiler Information’ entry in the compiler section. The Polyhedron benchmarks discuss automatic parallelisation. The fortranplus entry covers the diagnostic capability of the Cray, gfortran, Intel, Nag, Oracle and Nvidia compilers. Updated one entry and removed three others from the software tools section. Added ’Fortran Discourse’ to the e-lists section. We have also made changes to the Latex style sheet. • September 2020. Added a computer arithmetic and IEEE formats section. • June 2020. Updated the compiler entry with details of standard conformance.
    [Show full text]
  • ED381174.Pdf
    DOCUMENT RESUME ED 381 174 IR 055 469 AUTHOR Klatt, Edward C.; And Others TITLE Windows to the World: Utah Library Network Internet Training Manual. INSTITUTION Utah State Library, Salt Lake City. PUB DATE Mar 95 NOTE 136p. AVAILABLE FROMWorld Wide Web at http://www.state.lib.ut.us/internet.htm (available electronically) or Utah State Library Division, 2150 S. 3rd W., Suite 16, Salt Lake City, UT 84115-2579 ($10; quantity price, $5). PUB TYPE Guides Non-Classroom Use (055) EDRS PRICE MF01/PC06 Plus Postage. DESCRIPTORS Access to Information; *Computer Networks; Computer Software; Electronic Mail; *information Networks; *Information Systems; *Librarians; Online Catalogs; Professional Training; Telecommunications IDENTIFIERS *Internet; Utah ABSTRACT This guide reviews the basic principles of Internet exploration for the novice user, describing various functions and utilizing "onscreen" displays. The introduction explains what the Internet is, and provides historical information. The introduction is followed by a listing of Internet hardware and software (freeware and shareware), both lists including information fo: PC-compatibles and Macintosh computers. Users are introduced to and instructed in the use of the following Internet systems and services: EWAN telnet; OPACS (Online Public Access Catalogs); CARL (Colorado Alliance of Research Libraries; FirstSearch; UMI (University Microfilm Inc.); Deseret News; Pegasus E-Mail; Listservs; WinVN Newsreader; Viewers; Netscape; Mosaic; Gopher; Archie; and FTP (File Transfer Protocol). Over 100 computer screen reproductions help to illustrate the instruction. Contains 16 references and a form for ordering additional copies of this guide are provided. (MAS) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document.
    [Show full text]
  • Against Cyberanarchy"
    AGAINST "AGAINST CYBERANARCHY" By David G. Posit TABLE OF CONTENTS I. IN TRO DUCTION .....................................................................................................1365 II. UNEXCEPTIONALISM IN CYBERSPACE ................................................................... 1366 III. SETTLED PRINCIPLES ............................................................................................ 1371 IV . FUNCTIONAL IDENTITY ......................................................................................... 1373 V . SC A LE ...................................................................................................................1376 V I. E FFEC TS ................................................................................................................ 138 1 V II. CON SEN T ..............................................................................................................1384 V III. CONCLUDING THOUGHTS .....................................................................................1386 I. INTRODUCTION It makes me indignant when I hear a work Blamed not because it's crude or graceless but Only because it's new... Had the Greeks hated the new the way we do, Whatever would have been able to grow to be old?' Professor Jack Goldsmith's Against Cyberanarchy2 has become one of the most influential articles in the cyberspace law canon. The position he sets forth-what I call "Unexceptionalism"-rests on two main premises. The first is that activity in cyberspace is "functionally identical to
    [Show full text]
  • Usenet News HOWTO
    Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6
    [Show full text]
  • Eszter Babarczy: Community Based Trust on the Internet
    PTE BTK Nyelvtudományi Doktori Iskola Kommunikáció Doktori Program Babarczy Eszter: Community Based Trust on the Internet Doktori értekezés Témavezető: Horányi Özséb egyetemi tanár 2011. 1 Community-based trust on the internet Tartalom Introduction .................................................................................................................................................. 3 II. A very brief history of the internet ........................................................................................................... 9 Early Days ............................................................................................................................................... 11 Mainstream internet .............................................................................................................................. 12 The internet of social software .............................................................................................................. 15 III Early trust related problems and solutions ............................................................................................ 20 Trading .................................................................................................................................................... 20 Risks of and trust in content ....................................................................................................................... 22 UGC and its discontents: Wikipedia ......................................................................................................
    [Show full text]
  • Cisco Unified Border Element H.323-To-SIP Internetworking Configuration Guide, Cisco IOS Release 12.4T Iii
    Cisco Unified Border Element H.323-to- SIP Internetworking Configuration Guide, Cisco IOS Release 12.4T Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]