Shannon’s idealized restriction to a sender and receiver presupposes, in effect, that the sender has already found the needle in the haystack that would be valued by the receiver. Finding the needle, detecting the pattern that can be exploited, is backstage, not part of the model, and so is the receiver’s task of finding an appropriate use for what is received, even though this research and development is what “pays for” all information transmission.

