Tuesday, November 22, 2011

copyright in the new digital era

To hear my podcast, please go here:

http://misam.podbean.com/2011/11/

Thank you,

Michael Isam

Thursday, November 17, 2011

Online Privacy

Online Privacy

“A 20-year-old woman stalked through the Internet and killed. Thousands of e-commerce customers watching as their credit card numbers are sold online for $1 apiece. Internet chat rooms where identities are bought, sold and traded like options on the Chicago Board of Trade. These are the horror stories dredged up by privacy advocates who say the Net’s threat to personal privacy can’t be dismissed as mere paranoia. And, they say, we’ve only seen the tip of the iceberg.” So says Bob Sullivan writing for MSNBC1

The internet began so sweetly, so innocently. Sending an “e-mail” to a friend or colleague half a world away. Trading recipes in amongst the corporate communications, or buried in the DNA sequencing paperwork. So tame.

Even when the internet first began, without pictures, all was text and still the world was sublime and childlike. Then came HTM, in caps as it was born shouting, not only in text, but also in pictures.

Then the marketing types discovered it and they wanted to know how many times the site was “hit”. “If we can show the prospective advertiser we have more people walking into his virtual store that come into his brick and mortar, we will be on the gravy train ride” was the thought in Marketerville.

At first everyone was so enamored of this new baby, even with the load voice, that they blindly followed wherever the data stream led.

Then came the boy who told us “The Emperor has no clothes.” Only instead of the Emperor being naked, it was us, the users, being striped of our clothing, one piece at a time. That boy was the Electronic Frontier Foundation (EFF).

Showing us how our once perceived privacy was now in the hands of marketing people all over the world and that our every move could be, I say “Could be” tracked. Did we worry? Not really. As long as we stayed away from the porn sites, we were safe. Au contraire.

Today, according to EFF, “New technologies are radically advancing our freedoms but they are also enabling unparalleled invasions of privacy.”2

Cell phones are electronic bracelets of sorts allowing our locations to be tracked with ease.

Web searches about sensitive medical information might seem secret, but any company wielding a subpoena can have your data. Kiss your medical coverage good bye.

And, thanks to the accuracy of Homeland Security and other law enforcement agencies, boarding a plane could cause you to be turned away or worse, arrested simply based on erroneous data.

“But in my own castle and off the net, I’m safe, right?” Not necessarily so. Cable television has come to quite a little tattle-tale. What you watch as well as when you watch it can now be more accurately monitored by that little box than with the Nielsen ratings.

Still not convinced? Toddle over to https://ssd.eff.org/ and check out the “Surveillance Self Defense kit. It’s an eye opener.


Bibliography

  1. http://www.msnbc.msn.com/id/3078835/t/online-privacy-fears-are-real/

2. https://www.eff.org/issues/privacy

Thursday, November 10, 2011

Conflict in the Digital Age

Conflict in the Digital Age

As a veteran, I think back to times when the enemy was easily recognized. Sometimes by headgear, others by uniform, but mostly by position. “The enemy is over there” soldiers would say as the pointed to some spot or general locale.

Today, it is not so easy as we fight two fronts, the war on the citizens and the war on our governments.

In the early days of cyber-crime, the enemy was like us, just another faceless name as we read a missal from joesmith7642@aol.com inviting us to look at thei great site!

Then came the dreaded “What the hell is happening to my computer? Why can’t I get away from this page?” And the dreaded “Oh Crap!” as the system would not boot up and the message that track zero was not to be found displayed prominently in the middle of the monitor screen.

Luckily, many of us have become more astute in detecting something that is “not quite right” with an email from a friend(?). Many are just scams for all our money, but others are extremely malicious, and in the overall scheme of things, we are under attack from our own governments, sworn to protect us.

Cyber war has no blood and guts, no coffins to be unloaded, no real generals. Government and corporate America, have departments dedicated to communication security, but when it comes right down to it, there are only two. Two hackers sitting with their computers, slugging it out, toe to toe (metaphorically speaking) to find out just how good the other person is and how well they know their software and hardware.

According to the most recent report (October 2011) from SECURELIST website1,
Monthly Malware Statistics: October 2011
October in figures
The following statistics were compiled in October using data collected from computers running Kaspersky Lab products:
161,003,697 network attacks were blocked;
72,207,273 web-borne infections were prevented;
205,822,404 malicious programs were detected and neutralized on user computers;
80,900,079 heuristic verdicts were registered.

SECURELIST is an interesting website to be sure. However, there is more than just statistics to consider. Consider the following bullets on their page:

The cybercriminals’ new bag of tricks
Duqu – the new Stuxnet

The month’s top story was the detection of the Duqu Trojan and its apparent connection with Stuxnet, the first well-known example of a cyber-weapon. Experts at Hungary’s Crysys research lab found numerous similarities in the coding of Duqu and Stuxnet. These striking parallels suggest that they were both written by the same group of people, or that the Stuxnet source code was used. Despite many rumors to the contrary, the Stuxnet code has not been made publically available.

Attacks on individual users
Bundestrojan: permissible limits
This section describes one of the newest war, German police against Joe and Jane Citizen.

A major scandal erupted in Germany in October following the discovery of a backdoor used by the German police to intercept voice traffic and messages from suspects’ computers. There was an outcry not only because five federal states confirmed the use of the Trojan but also because the country’s federal laws only allow law enforcement agencies to intercept suspects’ Skype traffic, while the Trojan was capable of spying on many other types of programs.


Mobile threats: Android leads the way
Statistics
October also saw some major incidents in the world of mobile threats. According to our statistics, the total number of malicious programs for Android has now outstripped that for Java 2 Micro Edition (it had already done so with regards to Symbian by mid-summer). Over the last two years malware for J2ME has been the most prevalent among mobile threats. We’ve written several times about the reasons for this, so won’t go into the details here. However, this dramatic growth suggests that virus writers are likely to concentrate on Android malware – at least for the foreseeable future.

By the close of the month we had detected 1,916 malicious programs for Android belonging to 92 malware families. 1,610 variations from 60 families were detected for J2ME.
This last bullet hit very close to home as I have an Android and I use it extensively for web browsing, and email.

I recently went into my carrier’s place of business because I had a problem I could not undo. The sales person, a sweet young thing, in early twenties, buxom and almost dressed, told me that I “did not need this virus checker on my phone, as the system does it’s own. Luckily, being a somewhat older male and for the most part, not intimidated either by voice or by bodily parts, I informed her that I had been using computers longer than she had been on the earth and I’ll keep it on there.” As of the end of October, the total number of mobile threats detected stood at 4,053 variations from 289 families and 46.9 percent hit Android, 40 percent for J2ME and the rest scattered over Symbian, Windows Mobile and others

On the war against our government front, an article by Kendra Srivastava, dated Mon November 07, 2011 at 5:11 pm on the website Mobiledia2 discusses the plans of the Pentagon to “stress the importance of offensive tactics in the emerging realm of cyber-attacks, as they struggle to set guidelines for online warfare.”

In its first-ever symposium, according to Srivastava ,the Defense Advanced Research Projects Agency, or DARPA, discussed how the U.S. military can better protect itself from foreign-backed hackers.

Putting the problem in perspective, DARPA's director, Regina Dugan, said “the agency will work to develop offensive cyber capabilities as well as maintaining defensive lines as modern warfare will demand cyber and kinetic, bullets, bombs and troops, defenses.”

“No one has yet said exactly what the term "offensive" may mean in cyberspace. But the U.S. government and computer experts will likely continue to discuss the complicated matter for some time as they outline a comprehensive strategy” writes Srivastava.

So, as a veteran with a 2-oak-leaf-cluster GCM, Good Conduct Medal, why should I be concerned about my government and the [ab]use of cyberspace?

Because today, everyone is a suspect, even me.



Bibliography

1. http://www.securelist.com/en/analysis/204792200/Monthly_Malware_Statistics_October_2011


2. http://www.mobiledia.com/news/115529.html

Tuesday, October 25, 2011

Blog Post 2 - Capitalism online

Capitalism online is a very broad subject and I will concentrate on the plans to capture sales tax from businesses who sell online.

If, in a perfect world, internet sales were to be collected, the National Conference of State Legislatures estimates a possible cash flow of $23 billion a year. Cash-strapped states across the country are looking for ways to tax online sales. The National Conference of State Legislatures estimates all states that levy sales taxes are losing $23 billion a year on Internet sales.

The latest(1)to announce a run toward taxing online sales is Indiana State Senator Luke Kenley, R-Noblesville, who said this week he is attempting to convince his fellow state lawmakers to apply the state sales tax to online retailers. While ogling a possible $400 million annual income, Kenley speaks of leveling the playing field for the brick and mortar business of the state saddled with a 7 percent sales tax.

Business passes the tax along to the consumer. This one fact makes online retailers very desirable, especially in today’s economy. The tax, 7 cents on the dollar, does not sound like much but when the price goes to $1000 dollars, the tax skyrockets to $70.

Kenley is quick to state that on a state level, it will probably never happen and that is why he is pushing his colleagues to get the national leadership from Indiana to introduce legislation requiring.

Indiana is not alone on this issue. An October 21, 2011, Associated Press article by Gary Fineout, posted on the Bloomberg Businessweek website, indicates that taxing online sales is one the legislative priorities the Florida Chamber of Commerce. The Chamber announced the plan to introduce legislation through the Florida House on October 20, 1011. When asked about the legislation, State Senate President Mike Haritopoulos said he would not support taxing online retailers unless there is an equal reduction in other taxes.

"I think we have made a pretty firm statement that we will not be increasing taxes," said the Merritt Island Republican. Even if the legislation were to pass, Gov. Rick Scott would not approve it.

To add further complication, by 2010, six states have passed legislation attempting to broaden the definition of physical presence. Nine more states are currently attempting the same, with California among the states recently passing such legislation. However, implementation is delayed in order to give more time for traditional and online retailers to lobby for a national standard. When adding to this the 1992 decision of the U.S. Supreme Court which ruled a physical presence must be established be fore a company can be made to collect sales tax collecting online sales tax is yet far in the future.

According to a census Estimated Quarterly U.S. Retail Sales2: Total and E-commerce report, the adjusted 2nd quarter 2011 figures show 2nd quarter sales(in millions of dollars) of 1,041,726 total with e-commerce comprising 4.6 percent of total or 47,515. This is a 3 percent increase over the prior quarter and 17.6 percent over the same period last year.


Bibliography

1. http://www.businessweek.com/ap/financialnews/D9QFKNR80.htm

2. http://www.census.gov/retail/mrts/www/data/excel/11q2table1.xls

Thursday, September 22, 2011

cyberactivsm- first blog post

http://internetactivism.wordpress.com/2010/08/17/introduction-to-cyberactivsm/


Synopsis

Cyberactivism is power in a network society, calculated by how many networks a network is really conected with and taken out to the nth degeree of connectivity. In today's society, information is power and the more directed that information, the more powerful and important that information becomes andif left unchecked, goes to the higher bidder, for good or not.











Cyber activism has taken over our email in-boxes with everything from "Join my Facebook page" to "click here for great sex." (Hint: Don't or you will more than likely get really screwed by a trojan, and I don't mean a horse or a warrior.)

On the good side there are many wonders and life altering choices.

Some users, like myself, have become very choosy on which lists I join and how long I stay a member.

Why have I become so choosy? I have two forums I run and I will not allow any of my posts to go off topic. My blogs are veteran focused. What is happening at the Department of Veteran Affairs, good and not so good, what pieces of legislation coming up need to have the attention of veterans.
Specific political postings are NOYT allowed. If the poster wants to be involved, there are hundreds to join, so go there. I do not allow VA Bashing either. This is a site where you can go to stay informed and not be on the VA site to get the "What I want you to hear" line.

I have several constant posters, Kevin Secor of the VA, National Association of Uniformed Services-NAUS, Military Officers Association of America-MOAA, Army of the United States-AUSA, Florida National Guard, The Retires Bulletin to list a few. By the time my posting is completd in a 24 hour period, information from my forum reaches just over 300,000 people.

The last national election showed the power of cyberactivism when thousands of people joined causes, posted and donated record amounts of cash. It also showed the seedier side of cyberactivism, when using it for evil to post almost truths and this time, attempt to ruin human beings names and reputations. It had to come to this, as the normal sequence of growth, just like a child.

first post

we be postin!