SMAD 470 Q4
Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Ways of seeing things on newsfeed
Random Potential from Network Exposed Selected
The Guardian article: "What happened when I confronted my Troll" Lindy West
a blogger or writer that wrote about feminism and bitchy things that make people uncomfortable A Troll made an account on Twitter as her dead father Now she feels pitty for trolls after she posted how hurtful it was and he emailed her an apology
Video: "Enemy of the State?" Krotoski's paradox of the web
We applaud it for giving us power and a voice, but it can be used for good and evil The more info we put out, the more vulnerable we are for evil to be done
Digitized Lives ch 4: "Is Everybody Equal Online?" subject position
Where social structures beyond yourself place you in the world Some elements can change over time
Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Potential from Network
You see the average percentage of cross-cutting articles posted by a persons friends The steepest reduction
Vanity Fair article Mafiaboy
a 15 year old French Canadian who launch DDoS attacks on companies like Yahoo, Amazon, eBay, Dell, CNN, etc. and lost them billions of dollars because of it
Article: Pew Research Center "The future of well-being in tech" Concerns over harms (more harmed than helped)
digital deficits digital addiction digital distrust digital duress digital dangers
Video: "Homo Interneticus?" Facebook's Success
easy to make an account and therefore the volume of people online is the success
Video: "Homo Interneticus?" Unintended consequences of the printing press
every copy is the same with no variation (this is both good and bad) anyone could create info
Vanity Fair article & "Inside the Dark Web" article Dark Net/Web
exists within the deep web and lies beneath the surface net Whistle-blowers, criminals, and political dissidents are people that like to have access Tor.
Video: "Homo Interneticus?" Expectations of the Korean Children (Korean National Information Society)
expects children to be more intelligent and understand the importance of communication and information lead in math and science learning because interacting online from a young age can be beneficial
Time Magazine Article: "How Trolls are Ruining the Internet" The online disinhibition effect
factors like anonymity, invisibility, a lack of authority, and not communicating in real time strip away the mores society spent millennia building
Video: BBC "Inside the Dark Web" the "Boom Industry"
financial crime credit card fraud, giving away account numbers, etc.
Video: "How Hackers Changed the World" Anonymous why did Anonymous decide to wear masks and conceal their identity?
for safety, worried they would be stalked or their families and friends would be in danger "none of us are as strong as all of us" -- they are one voice
Video: Troll Hunters Why troll with porn?
gets attention claims nothing would make him stop because it is "freedom of speech"
TEDxBrussels: "Mikko Hypponen: Three types of online attacks" Nation States
governments do the attacking Ex: Germany and Iran
Video: "How Hackers Changed the World" Anonymous Hacker culture and hactivism
hacking originated at MIT as a humorous, funny thing; like pranks hacktivism: a cult of the dead cow coined it; original principle was for freedom and expression; resistance of authority; a software that all countries could access and talk where governments could not see it
Vanity Fair article Hired guns
had to be on the "right" side had to be serious about network security
Digitized Lives ch 4: "Is Everybody Equal Online?" Stereotypes re-emerging
hate groups, biotechnology (Ancestry online)
John Oliver's Encryption video Oliver's view on weakening Encryption
he agrees with Apple; weakening Encryption would end up doing more harm than good
Vanity Fair article Event Logs
lines on a screen showing summaries of each new task given to a computer network; a time stamp and a green or red dot to indicate success or failure
Video: Troll Hunters Louise's troll
posted rape threats - they tracked him down and stake out his house - he didn't care and wouldn't own up to actions, said it was for fun - was completely caught off guard and couldn't defend himself
Video: "Enemy of the State?" packet switching and the original problem with computer networks
problem: how to join networks up packet switching: allows for huge data to be sent fast along multiple routes
Vanity Fair article Botnets
"Robot" + "Network" Illicit networks of infected computers, known as zombies or nodes Appear to function normally but are secretly controlled by hackers and can be used in combination to produce enormous computing power -- can be millions of infected computers
Vanity Fair article & "Inside the Dark Web" article Surface Net/Web
"anything you can find through Google" is publicly found for all we interact with it daily uses Spiders
Future Crimes "Connected, Dependent, and Vulnerable" Malware
"malicious" and "software" all seeks to damage, disrupt, steal from, or inflict illegitimate or unauthorized action on a data system
NY Times Article: "When the Internet Thinks It Knows You" Relevance
**According to Facebook virtually the sole criterion that determines what users see It is the most personally relevant news
Fast Company Article: "Why Online Harassment is Still Ruining Lives"
- Online Harassment goes unchecked the majority of the time - Local law enforcement doesn't always know how to enforce online harassment laws - Startups don't think about online harassment until it is too late - Tech companies have no liability for harassment on their platforms - There are no easy technical solutions to this problem - Women and minorities are underrepresented at big tech companies and among lawmakers
Video: Troll Hunters How does the online world and "real world" intersect in trolling?
- cyber bullies are usually anonymous - everything you do online leaves a trail of breadcrumbs - model: online hate leads to fear of being in public - how would the trolls feel if people knew what they were saying online? - trolls blur the line between online & reality - no idea about abuse and its effects
Video: Troll Hunters Privacy and anonymity online applied to trolling abuse
- depends if the trolling is illegal - it is difficult for authorities to track them down - people know how to cover their tracks - troll claimed he is not anonymous because of shame, he thinks of it just as an alternative identity
Video: Troll Hunters how do investigators track down trolls?
- trolls give away information in comments that could lead to a location - bring together different sources - photos posted give locations - facial recognition
Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" 2 concerns of the Filter Bubble
1. Algorithm would help folks surround themselves with media that supports what they already believe 2. algorithms will tend to down-rank the kind of media that is most necessary in a democracy (news and info about most important social topics)
TEDxBrussels: "Mikko Hypponen: Three types of online attacks" 3 types of online attackers
1. Online Criminals 2. Hacktivists 3. Nation States
Video: "Enemy of the State?" Freedom of speech in 20th century & what has changed
20th century: it was not acceptable and you were not able to say whatever you wanted in public the digital communication system changed that; it opened a platform to say whatever; the most democratic platform there has been
Video: "How Hackers Changed the World" Anonymous 4chan, /b/ board, & Memes
4chan: website to upload photos anonymously; separated as boards with specific topics /b/ board: a board where anything goes, showed what would happen with total freedom; photos of things that could not be unseen memes: a meme is an idea; every meme probably originated on 4chan and it is a place to watch them grow
Video: BBC "Inside the Dark Web" Silk Road and paying
A plug-in on a browser to buy whatever; "a dinner buffet of narcotics and drugs" Buying is done through Escrow where the silk road holds the money until the buyer says their drugs were delivered
TEDxBrussels: "Mikko Hypponen: Three types of online attacks" DigiNotar
A service that governments can use to make HTTPS certificates insecure People died from these attacks Ex: Iran activists would use gmail and the government could then see all their emails
TEDGlobal: "Misha Glenny" Anonymous
A sophisticated group of hackers They say they are doing a service by showing us how bad companies are at securing our info They are ideologically and politically driven, not money driven
Video: "How Hackers Changed the World" Anonymous Aaron Barr & HBGary
Aaron Barr said he was monitoring Anonymous' databases and identified the leaders (which he hadn't done) So, Anonymous hacked him and saw that he was trying to send false documents to Wikileaks to discredit them Aaron Barr defended this by saying it was just a brainstorming idea, but he had written documents out and a proposal
TEDGlobal: "Misha Glenny" Characters in hacking and what they have in common
All learned hacking skills at a young age and did not know anything different; they learned these skills before they developed a moral compass All mastered skills in math and science All lacked social skills and showed signs of Aspergers and social disorders
Video: "Homo Interneticus?" "As We May Think"
An article about real time updating and shows how we think with association now rather than linear thinking This is relevant in how we hyperlink everything online now The problem: How do we think effectively in a constant associative brain
Digitized Lives ch 4: "Is Everybody Equal Online?" offline gender issues migrating into digital technologies
Anonymity in cyberspace Stereotypes thrive online Women are typically the target of cyberstalking, trolling, etc. There are now networks and online organizations that seeking a solution (Cyberfeminism)
Video: BBC "Inside the Dark Web" Troels Oerting's and Applebaum's views on anonymity
Anonymity is a threat to society because it hides criminals and allows them to continue committing crimes -- there is no risk with anonymity so crime is almost encouraged Anonymity is a reflection of human society without surveillance or risk
Video: "How Hackers Changed the World" Anonymous Church of Scientology
Anonymous began to mock them and Scientology got a copyright which turned into a legal battle it was the first time Anonymous posted a video and came out as a group and movement **Internet Activism was born thousands of people met world wide to protest the Church of Scientology
Video: "How Hackers Changed the World" Anonymous The paradox of Anonymous
Anonymous valued and wanted free exchange of information, but they stopped the flow of it when they did DDoS attacks, shut down journalist's blogs, etc.
Time Magazine Article: "How Trolls are Ruining the Internet" Trolling
Anything from pranks to harassment to violent threats It is a political fight
Videos: BBC Bitcoins & Cryptocurrency video Bitcoin blocks/blockchains & mining
Blocks track transactions Blockchains are a string of transactions that are added every 10 minutes Mining: solving the transaction problems for money
TEDGlobal: "Misha Glenny" CarderPlanet and Carder RedBrigade
CarderPlanet: cybercriminals would go to exchange info and malware such as credit card info; "A supermarket for cybercriminals" Innovative because it had a mediator between vendor and purchaser that would verify if the info was legit and if the cards worked Carder RedBrigade: he would go on "Sprees" in NY taking out thousands of dollars per week with different credit cards
Video: "How Hackers Changed the World" Anonymous Chaotic actor
Chaotic actor: good or evil; doing damage or helping
Video: BBC "Inside the Dark Web" Who was responsible for the leak of confidential US government material in 2010?
Chelsey Manning revealed info regarding wars in Iraq and Afghanistan
Coleman "Hacker, Hoaxer, Whistleblower, Spy" Anonymous
DDoS campaigns A foundation committed to the maintenance of anonymity and free flow of info Did it for the Lolz A radical political act, social order based on monitoring, iconography of masks and headless suits
Video: Troll Hunters How do trolls defend their actions and how compelling are their explanations?
Defense: - see what reaction they could get - thought it was just a joke - under the influence of alcohol or things - did not know it was illegal - attention addiction
Video: "Enemy of the State?" DDos Attacks
Distributed Denial of Service attacks They flood a site with requests until access is denied and the business is ruined Targets large corporations and banks mostly we don't usually know who is behind attacks or where they come from (although we assume it is from another country)
Video: "How Hackers Changed the World" Anonymous cyberactivists and Egypt -- Arab Spring revolution
Egypt shut down the internet and then cyber-activists would send Encryption and certificates; would tweet for people that couldn't to make sure it was known what was going on
Video: "How Hackers Changed the World" Anonymous What happened to members of Anonymous after the PayPal DDoS attack?
FBI members searched members of Anonymous; they got search warrants and busted down doors and invaded homes
Video: BBC "Inside the Dark Web" David Chaum's fear and what he realized about surveillance
Fear: the threats the networks would pose Patterns of communication on internet was disguised so it is harder to survey Surveillance: who and when we talk is just as important as what we are saying Anonymity is only relative to a group of people
Digitized Lives ch 4: "Is Everybody Equal Online?" Ways to think of digitial culture as genders
Gender imbalances in the ICT workforce Gendering of the design of ICT Forms of gender harassment and discrimination in online environments Representations of gender in online media and digital games The use of cyberspaces and digital devices in pursuit of gender equality
Video: "How Hackers Changed the World" Anonymous what happened with Habbo Hotel in 2000s
Habbo Hotel: a video game for kids, Anonymous created a specific person they all were in the game and created symbols to offend people Anonymous' goal at the time was to offend people; the media treated Anonymous like they were ruining people's lives but they really just wanted to get LOLZ
Digitized Lives ch 4: "Is Everybody Equal Online?" 2 Main technical elements enabling digital culture impacts the access of people with disablities
Hardware that is difficult or impossible to use Software and applications with limited functionality or certain physical and cognitive conditions
Video: "How Hackers Changed the World" Anonymous Brian Mettenbrink
He was arrested by FBI He sent the 2nd most threats to scientology and was given 1 year in prison with supervised release after He said his punishment was lopsided but he would do it again because he stood up for what he believed in and had no intention of hurting anyone
TEDGlobal: "Misha Glenny" Glenny's idea of what to do with hackers
Hire them Use their skills to benefit us Penetration Hacking (when a company hires them to hack their sites to see if they can)
Video: Matt Honan's experience with Hackers
His phone powered down randomly and then it asked him to register his phone and said iCloud password was wrong Google account was deleted and they were tweeting from his account Attacker's reason: they liked his Twitter handle and wanted it, plus they were showing Apple's loop holes Matt did not have a 2nd authentification method set up for Google All a tech support person needs to verify a person at Apple is: Apple ID, last 4 digits of a credit card number, and a billing address
Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Caveats of the study
Ideological tagging mechanism doesn't mean what it looks like it It is hard to average something that is constantly changing and different for everyone This only measures the 9% of Facebook users who report their political affiliation It is really hard to separate "individual choice" and the workings of the algorithm In my humble opinion, this is a good science, but because it is by Facebook scientists, it is not reproducible
Digitized Lives ch 4: "Is Everybody Equal Online?" Race
It is skin deep visible skin color, facial features It is a socially constructed category
Video: BBC "Inside the Dark Web" Julia Angwin's discovery and the use of Wifi locations
Julia Angwin discovered surveillance and monitoring of users is always going on, through invisible trackers and selling info *our deepest secrets and profiles are shared through browsing habits and we are not really anonymous Wifi locations are tracked and do a better job than GPS sources
Video: "How Hackers Changed the World" Anonymous LulzSec & Journalists
LulzSec: a group from Anonymous that carried on operations and made trouble; they were attacking in a way that Anonymous was not meant for *Steven Levy is more worried about the next generations hacking approaches and the hacks we don't hear about (like government funded ones) Journalists were getting attacked for things they were saying if it didn't agree with Anonymous' views; Anonymous would shut down their sites and criticize them Hacktivism became nasty and vicious
Video: BBC "Inside the Dark Web" Cryptography's purpose
Makes sure users are secure and their info is safe Keeps internet resilient Changes surveillance's value
Video: BBC "Inside the Dark Web" Metadata & the dystopian scenario
Metadata: info about who is sending data, from where, about what; determining our lives Dystopian Scenario: every part of your life can be analyzed; health, money, etc.; all about power
Video: BBC "Inside the Dark Web" Eugene Kaspersky's view on Anonymity
Online Passports Privacy has disappeared online anyways so we should just be transparent
Digitized Lives ch 4: "Is Everybody Equal Online?" Attitudes toward individuals with disabilities
Pity Heroic Appreciation Invisibility/Avoidance Annoyance/Impatience
Future Crimes "Connected, Dependent, and Vulnerable" Positive aspects and downsides of the technological evolution
Positive: - medical science - per capita income tripled - high-quality education is more accessible - connectivity Downsides: - everything is dependent on computers - we plug more info about our daily lives into the web every day
Video: "How Hackers Changed the World" Anonymous Telecomix
Telecomix tried to keep the internet running; would tweet for people if they couldn't
NY Times Article: "When the Internet Thinks It Knows You" Gatekeepers before the Internet
The people that controlled the flow of info An elite class of editors, producers and media moguls who decided what people would see and hear about the world
Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" The Filter Bubbly Theory
The personalized universe of the information that makes it into our feed Facebook newsfeed algorithm in particular will tend to amplify news that your political compadres favor **whatever the popular belief is amongst your friends
Video: "Enemy of the State?" Cyberbalkanization
The web allows users to filter their views based on what they read and it just reinforces their extremist views A bunch of portable homelands coming together The opposite of Berner Lee's vision of openness and libertarianism
NY Times Article: "When Algorithms Discriminate" Algorithms result from
They are a series of instructions written by programmers Result from a reflection of people's attitudes and behaviors Machine learning algorithms evolve based on what people do online It is impossible for a human to oversee every decision an algorithm makes
Digitized Lives ch 4: "Is Everybody Equal Online?" Individuals with disabilities on digital technologies
They tend to be pushed to the margins and made invisible, but they are actually online twice as much than people without disabilities
Video: BBC "Inside the Dark Web" Tor and Paul Syverson
Tor is like an onion; it sends information concealed in multiple layers so when they message gets to its final destination the final layer reveals the message but still hides the user
Video: "Enemy of the State?" PayPal
Tried to re-draw global lines of currency People had more control over their money than they have ever had before This connects anyone and there are no restrictions based on geography Creator: Peter Thiel
Coleman "Hacker, Hoaxer, Whistleblower, Spy" Trolling and Trolls
Trolling: an activity that seeks to ruin the reputations of individuals and reveal embarrassing personal info Trolls: try to upset people by spreading this content and igniting arguments
Video: BBC "Inside the Dark Web" The paradox regarding US government, anonymity, Tor, Iran, and China
Using Tor for anonymity is supported and understood but when people say things publicly they get arrested
Video: "How Hackers Changed the World" Anonymous Values expressed by cyber activists and the questions raised
Values: freedom of expression and free flow of info, citizens should have control Questions: what does privacy actually look like? what is the motive behind all of this and does it matter if it is good or evil? would they do it again?
Future Crimes "Connected, Dependent, and Vulnerable" Types of Malware
Viruses Worms Trojans
"Inside the Dark Web" article GNUnet
a free software, volunteer project to create secure peer-to-peer networking keeps anonymity but unlike Tor, it does not require the underlying architect of the internet function (TCP/IP) Relies on central authorities (ICANN) goal: to build, engineer, deploy a network where the technology reflects what a broad number of people can get behind
Vanity Fair article Obsec
a grand master of the dark art of hacking could break into almost any secure network without setting off any alarms He was kicked out of multiple schools for hacking; could hack into China's databases; got arrested at 18 and then got out and used his power for good as a penetration tester and then a hired gun; then was involved with the Ransomware attack on the Company
Wired Magazine article: "When will the internet be safe for Women?" Gamergate
a host of threats targeted at women specifically
Video: "How Hackers Changed the World" Anonymous Anonymous and Wikileaks (2010)
a new political wing was established in 2010 Wikileaks wanted to liberate the truth; PayPal and Mastercard pulled their donations to wikileaks and Anonymous did a DDos because they were mad about it
Wired Magazine article: "When will the internet be safe for Women?" Cybercrime Enforcement Training Assistance Act
a proposal that would provide federal grant money to local law enforcement for the prevention, enforcement, and prosecution of online crimes against individuals right now law enforcement doesn't have training for online crimes and FBI and Department of Justice said they are not responsible for online harassment
Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Random
a random sample would be that liberals see 45% conservative stuff and conservatives would see 40% liberal stuff
The Guardian article: "What happened when I confronted my Troll" Lindy West's description of trolling
a recreational abuse, usually anonymous and intended to waste the subjects time or frighten them into silence it is usually towards women, and women of color, trans, disabilities, fat, sex, etc. Trolls are usually white men in male-dominated communities
"Inside the Dark Web" article Silk Road
a service like eBay on the dark web, offering users to give reputations to each other
"Inside the Dark Web" article Cloudmark
a spam filter on email, social networks, mobile devices, etc. familiar with the ways criminal groups move money online The more nodes you have control over, the more traffic can be traced
Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Algorithm
a theory of how part of the would should work, expressed in math or code the more we are able to interrogate how they work and what effects they have, the more we are able to shape our own info destinies
Vanity Fair article A Zero-day exploit
aka a backdoor a piece of software that takes advantage of a vulnerability that is known to a small group of aggressors and generally not to the defenders
John Oliver's Encryption video Clipper chip
allowed the government to access phones if needed like giving a key to a trusted neighbor it did not work
Video: "Enemy of the State?" wikileaks
allows people to anonymously leak info about big companies and government agencies; it is shown dark and secretive when courts tried to shut it down people were just more interested in the case and more exposure came out of it
"Inside the Dark Web" article Tor.
an anonymous network on the dark web no inward facing links, so spiders cannot access can be used to access sites on the surface web but can also be assigned hidden ones Tor. nodes are simple websites and every website can have a vulnerability
Vanity Fair article Root Shell
an illicit admin, hacker could do what he or she pleased -- using a computer to attack another and another and another computer most famous case: Kevin Mitnick
Video: "Enemy of the State?" Austin Heap
developed a secure way for Iranian activists to load sites the government had blocked without the government knowing it was secure and encrypted
Time Magazine Article: "How Trolls are Ruining the Internet" Swatting
calling in an emergency to a victim's house so the SWAT team busts in
Future Crimes "Connected, Dependent, and Vulnerable" Worms
cause damage as stand-alone software and do not require a host to replicate themselves
Video: "How Hackers Changed the World" Anonymous What does history teach us about civil change?
change doesn't come with flowers and rainbows
Video: "Homo Interneticus?" Generation Web
children only know life online their life is centered around computers and being online
Video: "Enemy of the State?" Ai WeiWei
citizen blogger in China who posted names of the school children killed in the earthquake it is inspired thousands of volunteers to go to the schools that were impacted; government did not like this
Video: "Enemy of the State?" Internet Commentators
citizens who wrote about government politics and put policies of the government in favor they get paid 15 cents they are supposed to guide opinions in a specific direction citizens are aware of when it is a commentator who wrote it, aware of the cat/mouse game
Digitized Lives ch 4: "Is Everybody Equal Online?" Socialization/Identity factors (subject position factors)
class gender race sexual identity age language education level religion geographic location
NY Times Article: "When the Internet Thinks It Knows You" New Gatekeepers
code
TEDxBrussels: "Mikko Hypponen: Three types of online attacks" What happens with a color laser printer
color laser printers print with yellow dots in a pattern which is unique to you and your printer; a way of tracking or tracing back a page to you
Video: "Homo Interneticus?" Most inventions now
come from collaboration and connections **idea of the public sphere Most inventions are found in urban areas were there are a lot of different kinds of people; just like the web
Video: BBC "Inside the Dark Web" Who analyzes the information
computers and algorithms machines can look at everything as a big picture and find trends that humans can't
Article: Pew Research Center "The future of well-being in tech" Benefits of digital life (more helped than harmed)
connection commerce, government, and society crucial intelligence contentment continuation toward quality
Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Hard News
content about politics and the economy only 7% of content people click on is hard news
Future Crimes "Connected, Dependent, and Vulnerable" Brain Virus
created in 1986 and intended to make sure pirating of the software was not done ironic: they included a warning on their floppy disk of the virus and gave their address and phone number
Video: "Enemy of the State?" "ultimate example" of unintended consequences
how Twitter threatened a regime Twitter was used to form protests in Iran and to let the world know what was happening in Iran **new communication structures did not cause the uprising in Iran, but it gave them the tools
Video: "Homo Interneticus?" Hedgehog v. Fox
how we think -- associatively v. linearly Hedgehog: passive and stays on one page, very linear Fox: jumps around clicking on new links and doesn't sit still, very associative (more generation web)
Future Crimes "Connected, Dependent, and Vulnerable" Viruses
insert a copy of themselves into another program
Digitized Lives ch 4: "Is Everybody Equal Online?" the web
is being used to promote and deepen inequalities
Video: "Enemy of the State?" How is Web "shaking up world politics"
it can be captured by eye witnesses in real time & be replayed, it is unmediated
Vanity Fair article Deep web
it cannot be access through ordinary search engines
Video: BBC "Inside the Dark Web" Tor does what for its users? and who uses it around the world?
it gives each person the ability to read and speak freely without getting data used against them later Around the world people in the Middle East, China, Iran, and anywhere the internet is limited or controlled uses it; people in the western world use it to whistleblow
Digitized Lives ch 4: "Is Everybody Equal Online?" Social invisibility
it is NOT the solution
Video: "Enemy of the State?" "Portable Homeland"
it is a dispersed community where beliefs are reinforced; different worlds linking the same goal as if they live in the same place this is the flip-side of Thiel's vision; it narrows identity and community; turns community against the world
John Oliver's Encryption video Encryption
it is crucial to our lives today as passwords are used for everything
Video: BBC "Inside the Dark Web" Problems with using encryption & how the market can help
it is difficult to encrypt content in a user-friendly way Market will help: It will allow people to express their wants and needs for privacy Numbers can work in their favor Limits of privacy can be set within the market
Video: "Homo Interneticus?" Korea
it is most wired place digitally enhanced 10x quicker download speed Young kids are getting addicted because they start at a young age with the internet shows us what US will look like
Video: "How Hackers Changed the World" Anonymous How does Stanley Cohen compare Anonymous' online activities to real world civil rights protests?
it is no different than standing on a street corner chanting or doing a sit in at a school they both want the same goal and outcome, they are just different vehicles
TEDxBrussels: "Mikko Hypponen: Three types of online attacks" Hypponen's argument with privacy
it is not a question of privacy and security it IS a question of freedom and control
Coleman "Hacker, Hoaxer, Whistleblower, Spy" Surveillance
it is really a highly effective form of social control Knowledge of always being watched changes our behavior The inability to associate secretly means there is no longer any possibility for free association
Video: "Homo Interneticus?" Clay Shirky and Stephen Fry react to the centrality of Facebook
it is third largest population in the world feels like they would have done the same thing if technology was around for them at that age, but also think there is something dangerous and unnecessary about it
"Inside the Dark Web" article If the web went dark
it would be free from state-sponsored censorship it would be secure by design the passive gathering of person data for profit would vanish
Video: BBC "Inside the Dark Web" Dread Pirate Roberts
leader of Silk Road FBI found him after going undercover on the Silk Road site, and took him and the site down But only temporarily because Silk Road is back up and running
Vanity Fair article Sleeper call
lying in wait as an asset to be used as a last resort (like a nuclear weapon)
Video: "Homo Interneticus?" Obama campaign
more involvement in politics with new media social media was used more to communicate beliefs, create and promote content supporters could do it their way
Digitized Lives ch 4: "Is Everybody Equal Online?" Ways to overcome cultural biases
most effective: to bring greater gender, class, and race diversity to the design or digital devices and processes 2nd most effective: to extend the cultural competencies of those from the default subject position through various kinds of training
Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Soft news
news about social things like the Kardashians
Future Crimes "Connected, Dependent, and Vulnerable" Trojans
often look like legitimate pieces of software and are activated when a user is tricked into loading and executing the files on a targeted system create "back doors" for hackers to stay present in other softwares and deceive users to open or click on certain applications Ex: Germany used these on their citizen criminals
Video: "Enemy of the State?" Twitter's driving principle
openness & the free flow of info
Digitized Lives ch 4: "Is Everybody Equal Online?" Disabilities are an issue of social and political matters, not technical
our culture defines "normal" Disability is not a fact, it is the attitude our culture set up "people with disabilities" v. "disabled people"
Vanity Fair article Penetration tester
performs security audits and hacking into corporation's networks to explore weaknesses; they send recommendations on how to fix back doors
Video: "How Hackers Changed the World" Anonymous What happened in February 2008
protests world wide against Scientology 10,000+ people Significance: Anonymous found their culture and their group; there was a real chance to meet people like them as well as end Anonymity amongst one another
Article: Pew Research Center "The future of well-being in tech" Invention ideas to ease problems (potential remedies)
re-image systems reinvent tech regulate redesign media literacy recalibrate expectations fated to fail
Digitized Lives ch 4: "Is Everybody Equal Online?" Default Subject position or Default Identity
refers to the process by which straight, white, middle-class, Euro-American male culture assumptions and values were built into the hardware and software unintentionally Usually these settings remain invisible and don't get changed because they have to be intentionally changed ex: wikipedia under-represents women; more than half of the web is available in English
Video: "Homo Interneticus?" Andrew Keen's response to distractions
says students are unwilling to think; we can no long concentrate
Wired Magazine article: "When will the internet be safe for Women?" Clark's Swatting Hoax Act of 2015
she introduced this bill to prohibit the false reporting of emergency situations then someone swatted her
Video: "Homo Interneticus?" Dunbar Number
shows that we can only have a certain number of friendship at a time Facebook actually proves this Dunbar number to be too high because we only interact with a small number of our friends
NY Times Article: "When Algorithms Discriminate" Algorithms are NOT objective
software is not free of human influence Algorithms are written and maintained by people and machines learning algorithms adjust what they do based on people's behavior It is possible that algorithms reinforce human prejudices
Future Crimes "Connected, Dependent, and Vulnerable" zero-day attacks
takes advantage of previously unknown vulnerabilities in a computer application that developers and staff have not had time to address; if they are looking for something specific they will not question something that does not look like that item Ex: bonnie & clyde robbing a bank
Video: BBC "Inside the Dark Web" GCHQ Bude
tapping wires and analyzing everything that comes across them Weak spot of the cable is every 50 miles where the signal gets weak and is repeated GCHQ is not transparent or held accountable for their actions which is worry some because we don't know their intentions Wire tapping was found out by a whistle-blower
NY Times Article: "When the Internet Thinks It Knows You" Blogging
technology undermining the gatekeepers
John Oliver's Encryption video Encryption: Apple and the government
the FBI cannot access the a terrorists phone so they want apple to create a code that is like a "master key" the problem: a code for one will open all and nobody wants that; what stops them from asking them to do it for another and another and another
"Inside the Dark Web" article Bitcoins
the currency of the dark web it is a peer-to-peer digital currency that uses cryptographic exchanges to verify transactions (no governments or banks)
Digitized Lives ch 4: "Is Everybody Equal Online?" E-Racialization
the digitization of race ex: avatars, characters in a game, racial discourse among users of the web, defined portals, exaggeration of physical features, cyber-ghettos on social emdia
Video: "Enemy of the State?" consequences of decentralization and oppenness
the internet and web is resilient to being turned down quickly
Coleman "Hacker, Hoaxer, Whistleblower, Spy" Doxxing
the leaking of private information; a grey area because some of this could be found on publicly accessible websites anyways ex: SS #, banking #
Time Magazine Article: "How Trolls are Ruining the Internet" Trolls
the monsters who hide in darkness and threaten people internet trolls do it for the laughs (lulz) the enjoy illuminating guilibity they feed on attention
Video: BBC "Inside the Dark Web" Connection between data and control
the more data out there means you are being controlled more and are less free data is all about control if people feel like or know they are being watched, they will act differently or not say certain things
Video: "Homo Interneticus?" Network Effect
the more people connected means the more value their is to everyone on it it is self-sustaining aka more nodes=more value
Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Exposed
the percentage that they actually saw (includes the algorithm)
Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Selected
the percentage they actually clicked on
Digitized Lives ch 4: "Is Everybody Equal Online?" Racialization
the process of creating racial categories New media has the ability to change racism, but it tends to reinforce the stereotypes
"Inside the Dark Web" article The good of the Dark Web
the weight of human rights has been lifted and there is a right to freedom of opinion and expression as well as the right to seek and receive info Tor is supporting the basic human right It is a security researchers job to clean the dark web up
Future Crimes "Connected, Dependent, and Vulnerable" Hacking then v. now
then: for laughs and to show that they can hack now: for money, information, and power
Video: BBC "Inside the Dark Web" Crocker's discovery about internet
there were vulnerability to generic domains and their names at the heart of the upgrade is complex cryptography
Future Crimes "Connected, Dependent, and Vulnerable" Physical Borders
they are less clear in an online world; there are not really any borders country hopping: it is a strength of the internet that we can be anywhere, but also a way for people with ill intentions to take advantage of
Video: "How Hackers Changed the World" Anonymous what happened with Anonymous in 2006-2007
they became more organized and not just posting things anymore Hal Turner (a Neo-Nazi radio host): Anonymous would call into his radio station to harass him, but he wouldn't back down. He would give it right back to them. Anonymous would send him things he had to pay for and therefore they destroyed his ability to pay for his radio station, so he was out of the media and the public
Video: "Enemy of the State?" Chinese government, the web, and the Great Firewall
they cannot turn off the web because businesses and universities live off their ability to connect with the western countries "Great Firewall": to censor the web; block western sites that are critical of their politics biggest challenge is the inward citizens that are talking (Earthquake came from citizen sources)
TEDxBrussels: "Mikko Hypponen: Three types of online attacks" Hactivists
they do it for their own pleasure and political reasons Protests and civil action
TEDxBrussels: "Mikko Hypponen: Three types of online attacks" Online Criminals
they do it to make money, and they make millions usually do it from the back end, illegally
Video: "Homo Interneticus?" Benefits of the web
they want more info to understand connections of everyone from every where real time global brain, aka collaboration gives us all a voice and levels society
Video: Troll Hunters What motivates trolls and what types of threats do they make?
they want to create chaos (usually racist, sexist, and trying to provoke a response) threats include: rape, racist threats, and death threats
Video: "How Hackers Changed the World" Anonymous how Anonymous members recognized each other
through symbols and phrases that only Anonymous members would know
Video: BBC "Inside the Dark Web" The Internet of Things
to make IOT useful, the inhabitants of homes and users intimate details have to be revealed ex: when people are home, when they start or end their day, etc. Movement of the home is now documented and stored
Video: "How Hackers Changed the World" Anonymous The point of trolling
to make people angry and for humor; to teach people that take the internet too seriously a lesson
Video: "Enemy of the State?" Web's tools & Community
tools: routes around censorship and connections for solidarity; a group to come together Community: allows people to be in a community that are not geographically closed and can decide at any time to be a part of it
Video: "Homo Interneticus?" Downsides of the web
tracking spin our ideas government can spy and manipulate our desire to profit overrides our imagination mirrors society in both good and evil
Video: Troll Hunters Model's troll
unashamed impossible to track down
Video: "Enemy of the State?" Redundancy
uninterruptible data supplies; they all link to different servers so they cannot take down the internet
Video: BBC "Inside the Dark Web" Tor and Wikileaks
used for whistleblowing and submitting anonymously to Wikileaks from Tor
"Inside the Dark Web" article Spiders
used in the surface web (Google) automated programs that follow all links on a webpage, building a complete picture of the surface web
Video: Troll Hunters Advice given to victims of trolling
usually things like "toughen up" "if you can't handle it, get off" "its just words" you never know who is behind the screen and how serious they are there are real consequences young, emotional people are vulnerable and at risk of suicide
Video: BBC "Inside the Dark Web" Bitcoin
virtual money; does not use any banks or institutions; anonymously moving money; every computer is monitoring so manipulated transactions cannot carry through controversy: it is hard to trace where it comes from, like cash
TEDxBrussels: "Mikko Hypponen: Three types of online attacks" The majority of crimes
we are more likely to encounter a crime online than in we are in the "real world"
Video: "Homo Interneticus?" information loop
we can constantly replace and predict future based on information; we are always getting info Facebook used Newsfeed for the info loop
Video: "Homo Interneticus?" Marshall McLuhan and judging new media
we judge new media based on old media we judge the content rather than the network, production, and meaning The role of the user in viral culture is to be engaged and power the story
Video: BBC "Inside the Dark Web" Tim Berners-Lee's comments on privacy, transparency, and technology
we need to have technology that respects privacy and transparency
"Inside the Dark Web" article laws
we need to write laws to reflect our ethics - codes are now laws
"Inside the Dark Web" article Hidden Service
websites that can only be accessed from within Tor sometimes used to provide illegal merchandise and services because locations are difficult to ascertain Nobody knows who operates these sites
Video: "Enemy of the State?" Internet protocols and censorship
when a site is blocked, hardware tries to find another way around it and get to the site