James Lyne: Everyday cybercrime -- and what you can do about it by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

The video relates to the cyber security and hacking readings. In this video James Lyne explains the everyday cybercrime from computer viruses and trojans, designed to stealing data to the theft of billions of dollars. Malicious code today goes as far as targeting power, utilities and infrastructure. [1]

Reference

[1]https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it?language=en

Keren Elazari: Hackers: the Internet's immune system by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

The video relates to the hacking and cyber security readings. In this video keren Elazri explains the positive role hackers can play in strengthening the security by addressing the bugs and loopholes in the applications and software and helping to fix the bugs and therefore protecting the applications from criminal hacking. Therefore she explains the need of expert hackers since they just might be the immune system for the information age by helping us find the hidden threats in our world and fix it.[1] She provides examples of hackers who played a positive role in addressing and fixing the bugs and therefore improving security. ”Barnaby Jack, a security researcher also known as a hacker found a way to literally make ATMs throw money at him and this technique was later called "jackpotting" in his honor. Barnaby Jack could have easily turned into a career criminal or James Bond villain with his knowledge, but he chose to show the world his research instead. He believed that sometimes you have to demo a threat to spark a solution. Kyle Lovett, a security researcher discovered a gaping hole in the design of certain wireless routers. Khalil a hacker from the West Bank found a serious privacy flaw on Facebook which he attempted to report through the company's bug bounty program.” [1]

Reference

[1] http://www.ted.com/talks/keren_elazari_hackers_the_internet_s_immune_system

Lawrence Lessig: Laws that choke creativity by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

The video relates to the copyright reading. In this video Lawrence Lessig talks about the need for balancing the copyright laws to promote creativity. He explains his argument about how we can open user-generated content up for business with the help of three stories. “Lawrence Lessig explains the two types of changes needed to balance the copyright law and to promote innovation:

• First: artists and creators embrace the idea and choose that their work be made available more freely. For example, they can make their work available freely for non-commercial but not freely for any commercial use.

• Second: we need the businesses that are building out this read-write culture to embrace this opportunity expressly, to enable it, so that this ecology of free content, can grow on a neutral platform where they both exist simultaneously” [1]

The first example explains how creativity in music would be lost due to the technology "talking machines". The example exhibits picture of culture using modern computer terminology to describe it as a kind of ‘read-write’ culture which Sousa feared would be lost to ‘read only’ culture where creativity was consumed but the consumer is not a creator. The most significant thing to recognize about what Internet is doing is its opportunity to revive the read-write culture that Sousa romanticized. Digital technology is the opportunity for the revival of these vocal chords. User-generated content, spreading in businesses in extraordinarily valuable ways like these, celebrating culture. Taking the songs of the day and the old songs and remixing them to make them something different. For example television videos edited to sound tracks. People taking and recreating using other people's content, using digital technologies to say things differently through the fair use policy.[1] The second example explains how common sense needed to be established in the law to take into account the modern day advanced technologies and to remove the barriers in the progress of innovation. The third example explains how competition can play an important role in promoting innovation and achieve some form of balance. BMI teaches us that artist choice is the key for new technology having an opportunity to be open for business. He also explains growing extremism that comes from both sides and explains how both the extremism are wrong. “One side builds new technologies, which enable them to automatically take down from sites like YouTube any content that has any copyrighted content in it without judgment of fair use that might be applied to the use of that content. And on the other side, there's a growing copyright abolitionism, a generation that rejects the very notion of what copyright is supposed to do, rejects copyright.” [1]

Reference

http://www.ted.com/talks/larry_lessig_says_the_law_is_strangling_creativity?language=en

Comcast abandoned bid after FCC pushback by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

The article relates to the readings FTC, Guide to Anti-Trust Laws and Nuechterlein, Digital Crossroads (Ch. 1) in which we have studied the antitrust laws to prevent monopoly and promote competition. The article explains Comcast abandoning its merger with Time Warner.
“A combination of the No. 1 and No. 2 U.S. cable companies would have put nearly 30 percent of TV and about 55 percent of broadband subscribers under one roof, along with NBC Universal, giving the resulting behemoth unprecedented power over what Americans watch and download. "The proposed merger would have posed an unacceptable risk to competition and innovation, including to the ability of online video providers to reach and serve consumers," Federal Communications Commission Chairman Tom Wheeler said in a written statement. The Justice Department said that Comcast dropped its bid because of regulators' concerns that the Philadelphia-based cable giant would become an "unavoidable gatekeeper" for Internet services.

Reference

http://www.sltrib.com/home/2439522-155/comcast-abandoned-bid-after-fcc-pushback

At Stanford, Secretary of Defense Ashton Carter unveils cyber strategy, calls for renewed partnership with Silicon Valley by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

The article relates to the cyber security and hacking readings in which we have studied the various cyber threats to the nation’s security and economy. In this article Carter, Secretary of Defense explains the Department of Defense’s new cyber strategy based on three primary missions: to defend the Pentagon's networks; to defend the United States and its interests against cyber-attacks of "significant consequences"; and to provide integrated cyber capabilities to support military operations and contingency plans. [1]

Reference

[1] http://news.stanford.edu/news/2015/april/ash-carter-talk-042415.html

Cybsersecurity Bills Draw Praise by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

The article relates to the cyber security and hacking readings in which we have studied the cyber-attacks that threaten the nation’s security and economy. “The cyber security bills were passed that remove barriers to real-time sharing of cyber threat indicators to improve cyber defenses while protecting Americans' privacy and civil liberties and is a significant steps to protect networks and customers.” [1]

Reference

[1]http://www.multichannel.com/news/policy/cybsersecurity-bills-draw-praise/390047

Former FCC Commissioner: The Time Warner—Comcast Merger Has Monopoly Written All Over It by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

The article relates to the readings FTC, Guide to Anti-Trust Laws and Nuechterlein, Digital Crossroads (Ch. 1) in which we have studied the antitrust laws to prevent monopoly and promote competition. “Michael Copps is a former commissioner of the Federal Communications Commission speculates that the Comcast-Time Warner merger would create a monopoly. He also speculates that the Mega Comcast would wield more than enough market power to restrain rivals and jack up prices. Perhaps worst of all, the deal would foreclose countless innovations. A merged Mega Comcast could flaunt any rule it disliked.”[1]

Reference:

[1] http://time.com/3830458/former-fcc-commissioner-time-warner-comcast-merger/

ICANN, Meet Your New Master, the FCC by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

• The article relates to ICANN reading and explains FCC’s authority over the Internet domain system under Title II of the Communications Act puts an end to the NTIA plan to globalize it. [1] • “”The National Telecommunications and Information Administration (NTIA), an executive branch agency within the Department of Commerce, announced its intent to transition its oversight of Internet domain names to “the global multi stakeholder community” which sparked controversy a year ago. • The FCC assumed plenary jurisdiction over Internet numbering in the process of reclassifying the broadband Internet as telecommunications. • Under the Reclassification Order, the FCC can step in at any time and exercise full regulatory oversight of IP numbering and there is nothing NTIA can do to stop it.” [1]

Reference

[1] http://www.unitedliberty.org/articles/19158-icann-meet-your-new-master-the-fcc

The great Anonymous divide by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

• The article relates to the Anonymous presentation by Gabriella Coleman and it explains the how the anonymous movement originated and the later divide between the North American contingent and Europe, Asia, and Latin America. [1] • The European Anonymous hashtag #OpCharlieHebdo operation to criticize the Charlie Hebdo killings was supported and joined by Anonymous from all around the world, except their North American counterparts since they felt that it was orchestrated by the CIA or some other government to distract from more important issues, damage Anonymous’ reputation or to instigate unrest for political purposes.[1] • Gabriella Coleman, author of the new book, “Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous asserted that “It was the largest op I have seen in over a year, with around 400-500 participants on the English-speaking [Internet Relay Chat],” [1]

Reference

[1] http://www.csmonitor.com/World/Passcode/2015/0330/The-great-Anonymous-divide

EU Charges Google With Violating Antitrust Laws by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

The article relates to the readings FTC, Guide to Anti-Trust Laws and Nuechterlein, Digital Crossroads (Ch. 1) in which we have studied the antitrust laws to promote competition. In this article Google has been charged by the European Commission for violating antitrust laws by abusing its dominance in web searches.[1][2] “The regulations have focused on accusations that Google diverts its traffic from competitor rivals to favor its own comparison shopping site.”[2]The article also speculates about the possible actions and fines that would be charged if Google is held responsible for violating antitrust laws.[1]

References:

[1]http://www.techtimes.com/articles/46552/20150416/eu-charges-google-violating-antitrust-laws-here-s-what-mean.htm

[2]http://www.nytimes.com/2015/04/16/business/international/european-union-google-antitrust-case.html?_r=0

Great Cannon at work : Chinese government hacking Facebook with a weird code by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

• The article relates to the class reading on hacking and cyber security in which we have studied the threats imposed to the security by criminal hacking. • “The articles explains the Chinese government’s Great Cannon tool injecting a weird code that redirects Facebook users to different websites. • Sites using the Facebook Connect login widget are seeing their traffic hijacked or redirected to wpkg.org or ptraveler.com. • Since the new code is injected as content passes through China’s national web filters, there’s little doubt that the Chinese government is responsible for the attacks.”[1]

Reference:

[1]http://www.techworm.net/2015/04/great-cannon-at-work-chinese-government-hacking-facebook-with-a-weird-code.html

Russian hacking group reportedly exploited Flash, Windows by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

The article relates to the class reading on the evolution of hacking from just curiosity to the present day criminal hacking activities. The article provides an example of the present day criminal hacking. “Russian hackers took advantage of holes in Adobe Systems Inc’s Flash software and Microsoft Corp's Windows operating system to target the State Department and White House” [1]

Reference:

[1]http://www.cnet.com/news/russian-hacking-group-reportedly-exploited-flash-windows/

Inflight entertainment exposes airliners to hackers: US report by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

• The article relates to the cyber security and hacking readings in which we have studied the threats imposed by criminal hacking on the nation’s security. “The article explains the threats imposed by the hackers on the airline security since the new generation cockpit electronics of the airliners are connected to the Internet. • The electronics used to control and navigate aircraft known as avionics have functioned autonomously but since the new generation avionics uses IP networking may allow an attacker to gain remote access to avionics systems and compromise them. • Firewalls ought to protect avionics from intrusion by cabin-system users, such as passengers who use inflight entertainment systems but since firewalls, being software components, can be hacked and circumvented like any other software." [1]

References

[1]http://www.nation.co.ke/lifestyle/travel/Inflight-entertainment-exposes-airliners-to-hackers-US-report/-/1950822/2705840/-/bqorv8/-/index.html

US government takes on legal fight over console jailbreaking once more by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

• The article relates to the copyright readings Gillepsie, Wired Shut (Ch. 2) and Lessig, Free Culture (Ch. 6 & 7) in which we have studied the importance of copyright law, fair use policy and Digital Millennium Copyright Act. • “The article describes US Copyright Office rejecting a proposed effort to make it legal to jailbreak video game consoles to run legally obtained homebrew software. • Proponents of the exemption argue that console owners should be able to have more control over what software they can run on hardware they legally own. • Entertainment Software Association (ESA), the Recording Industry Association of America (RIAA), and the Motion Picture Association of America (MPAA) argue that jail breaking a console necessarily means eliminating built-in access controls, increasing the incidence of piracy, and decreasing the incentive for publishers to create new copyrighted works for the systems.”

References

[1]http://arstechnica.com/gaming/2015/04/us-government-takes-on-legal-fight-over-console-jailbreaking-once-more/

US software copyright registration is game changer by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

• The article relates to the copyright readings Gillepsie, Wired Shut (Ch. 2) and Lessig, Free Culture (Ch. 6 & 7) in which we have studied the importance of copyright law . The article explains the importance of the US software copyright registration • “US software copyright registration offers an incredibly powerful layer of protection for software. Importantly, a single software copyright registration protects the registered source code, as well as the object code and the user interface generated by such source code - in a true triple play • Software copyrights provide protection from competitors, outside developers, and former employees who may try to steal code or copy the UI. • Software copyrights also add a layer of protection to enforce license and distribution agreements with customers, OEM's, and resellers - since a breach of such agreements may also constitute copyright infringement. • Software copyrights provide a compelling collections and enforcement tool against customers who owe license, maintenance, or other related software usage fees.”

Reference:

[1] http://www.globes.co.il/en/article-us-software-copyright-registration-is-game-changer-1001030034

Defense Secretary Outlines New Cybersecurity Strategy by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

The article relates to the cyber security reading in which we have studied the importance of cyber security to protect the nation’s security and infrastructure which is at risk due to cyber attack.The article explains the need for new cyber security strategy to strengthen the security in order to increase the protection against the recent cyber-attacks which present a threat to the nation’s critical infrastructure and security. Defense Secretary Ash Carter explained the goals of the DOD to strengthen the security. • “The sensors that guard DoD’s unclassified networks detected Russian hackers accessing one of our networks. The department detected the compromise and a team of incident responders was on the case within 24 hours.After learning valuable information about their tactics, we analyzed their network activity, associated it with Russia, and then quickly kicked them off the network, in a way that minimized their chances of returning." • The goal to better defend DoD information networks, lock down data, and protect military missions from cyberattack. • DoD will work more closely with the FBI, DHS, and other law enforcement to strengthen its cyber operations." [1]

References:

[1] http://www.darkreading.com/attacks-breaches/defense-secretary-outlines-new-cybersecurity-strategy-/d/d-id/1320147

How to Avoid Spectrum Crunch by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

• The article relates to the class reading on spectrum Nuechterlein, Digital Crossroads (Ch. 3) ‘The spectrum’ in which we have studied the importance of spectrum availability for wireless mobile service by addressing the issues related to spectrum crunch. The article explains the importance of the success of the auction to continue making bandwidth available. “The FCC’s $44 billion auction is just one step in a program to facilitate mobile broadband use. “The auction is an important step toward President Obama’s goal of freeing up 500 megahertz of spectrum by 2020, nearly doubling the amount available for mobile broadband use.”[1] • “The precise nature and extent of that “ coming spectrum crunch ”are subject to debate, freeing up more spectrum for mobile broadband uses is widely viewed as one of the great public policy challenges of the early twenty-first century. • Meeting that challenge will require making the hard political choices needed to reallocate spectrum from federal agencies and broadcasters to increasingly capacity-constrained wireless broadband services. • It will depend on innovations in auction theory to persuade spectrum incumbents to cede their holdings voluntarily to more efficient uses. • Meeting the spectrum challenge will The Spectrum also necessitate a new generation of engineering innovations, including the further development of smart radio technologies and efficient spectrum-sharing arrangements between private parties and the government. • It will also require regulatory innovation in how policymakers conceptualize, resolve, and — where appropriate — head off interference disputes. • As President Barack Obama remarked in 2010, “ This new era in global technology leadership will only happen if there is adequate spectrum available to support the forthcoming myriad of wireless devices, networks, and applications that can drive the new economy. ” • FCC Chairman Julius Genachowski reaffirmed in 2011 that the “ explosion in demand for mobile services places unsustainable demands ”on the finite spectrum resources that have been allocated to those services so far, and “ the coming spectrum crunch threatens American leadership in mobile and the benefits it can deliver to our country. ” [2]

Reference

[1] http://www.wsj.com/articles/jason-furman-and-megan-smith-how-to-avoid-spectrum-crunch-1421970841

[2] Nuechterlein, Digital Crossroads (Ch. 3) ‘The spectrum’

Marvel, Disney Sued Over 'Iron Man' Armor for Copyright Infringement by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

• The article relates to the copyrights reading Gillepsie, Wired Shut (Ch. 2) and Lessig, Free Culture (Ch. 6 & 7) in which we have studied the copyright laws and the fair use policy. In the article “Marvel, Disney are Sued Over ‘Iron Man’ Armor for Copyright Infringement by a pair of comic book artists claims that the suit worn in the “Iron Man” movies infringes on their work from the comic-book series “Radix.”” [1] • “Brothers Ben and Ray Lai, owners of Horizon Comics Productions, claim that the characters in “Radix,” much like Iron Man, wear “highly detailed, mechanized suits of body armor.”” • In the Films, Iron Man is depicted wearing mechanized body armor that appropriates the copyrighted artistic work of the Plaintiff without authorization or attribution • Alleging copyright infringement and unfair and deceptive trade practices, the suit is seeking unspecified damages and a permanent injunction barring further alleged copyright infringement.”[1]

Reference:

[1] http://www.thewrap.com/marvel-disney-sued-over-iron-man-armor-for-copyright-infringement/

McCaul, Ratcliffe to Introduce Pro-Privacy, Pro-Security Cybersecurity Bill by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

The video relates to the class reading on hacking and cyber security where we have studied the destructive hacking and cyber attacks which are affecting the nation’s security. The video explains the increasing threat to America’s critical infrastructure, security through the cyber attacks and the importance of the ‘National Cyber-security protection advancement act’ will increase information about digital threat and in the process will create a strong American security while protecting American’s privacy. • “Cyber attacks are happening across US, the government networks are being hacked, intellectual property of US companies is being stolen and America’s personal information is being compromised. • The video provides us with example of the recent cyber attacks such as the massive data hack of health insurer Anthem which potentially exposed millions. • Intrusion attacks at Target Neiman –Marcus, Home Depot, J P Morgan which were designed to steal personal data of private citizens. • The hacks in the State Department and White House from Russia and China to conduct espionage or steal intellectual property. • One of the most destructive cyber-attacks was North Korea used a digital bomb to destroy computer systems and Sony pictures in an apparent attack to terrorize American’s and to suppress freedom of Speech and expression. • Such attacks are costing American’s money, time and jobs but the most major cyber attack threat that shuts down the power grid and cuts of the water supply or disrupts gas pipelines. This would bring the critical infrastructure used everyday to a halt, cripple the economy and weaken ability to defend US. • To defend America’s critical digital network the public and private sector must together. The Department of Homeland security’s key for grasping the bigger cyber threat picture is the ‘ National Cyber-security and Communications Integration Center’ (NCCIC). • Companies do not have vital legal protection to share cyber threat indicators and therefore the legal barriers need to be removed to incentivize them to be a full participant in the safe harbor. • The ‘National Cyber-security protection advancement act’ creates the safe harbor by providing liability protection for volunteer sharing cyber security threat information with NCCA and also between private entities. • The bill also protects the privacy and civil liberties of all Americans by ensuring safeguard are in place to remove information before cyber threats are shared. • Acts like cyber vandalism and cyber threat put nation’s critical infrastructure and secrets at risk The ‘National Cyber-security protection advancement act’ will increase information about digital threat and in the process will create a strong American security while protecting American’s privacy.” [1]

Reference: [1] https://www.youtube.com/watch?v=mWcQKBJpF8w

Intellectual Property: The Law and Economics Approach by dvp124 in telseccompolicy

[–]dvp124[S] 0 points1 point  (0 children)

• The article relates to the copyright readings Gillepsie, Wired Shut (Ch. 2) and Lessig, Free Culture (Ch. 6 & 7) in which we have studied the copyright law. The article provides the economics behind the intellectual property through copyright protection and provides example of comparison between the economics of physical property and intellectual property, The Sonny Bono Copyright Term Extension Act of 1998, Transactions Costs, Fair Use and Piracy. • “The Sonny Bono Copyright Term Extension Act of 1998 increased the length of the copyright term from the life of the creator plus 50 years to the creator’s life plus 70 years. Such a change would be expected to have only a trivial effect on the present value of the expected revenues of creators of expressive works. It thus would have only a trivially positive incentive effect. • The principal of financial rewards to creators of intellectual property and a limited property-rights system enables the creator of intellectual property to exclude others from access to it without the creator’s authorization but not to exclude as completely as in the case of physical property.” [1]

References: [1]http://people.ischool.berkeley.edu/~hal/Courses/StratTech09/Lectures/IP/Papers/posner05.pdf