Monday, September 20, 2010

Week 9 - Tutorial Activity

The essay topic i have chosen is the effects of citizen journalism, its advantages and disadvantages and the increase due to mobile phone technology. This topic is very relevant to me as i am completing a Bach of Communication majoring in Journalism. Without researching i can already begin to assume some of the positive and negative effects citizen journalism has on mass media and in turn society.

Firstly, i would assume that the positive aspects is the ability to view true images from those involved in the extraordinary event or close by when it occurred. News crews often take sometime to get to events or situations to report and get footage. In addition, a first account from an everyday citizen is worth more in reliability and emotion, than anything a news reporter could conjure.

However, the negative effects of Citizen journalism would have to be the question of whether the information, images or video is actually the real deal, with so many available ways to alter and convert content, citizen journalism requires critical research into its reliability. furthermore, the internet provides anyone with the ability to distribute their story firsthand without the filter process resulting in misleading information flooding mass media.

There are many pro's and con's and i think this topic will enlighten me and create a more through vision of journalism in the 21st century as a result of mobile communications.

Week 9 - lecture response

William Gibson is ridiculously amazing and crazy at the same time. His accomplishments as a writer in genre he literally created himself is very cool. While I'm still finding it hard to grasp the cyberpunk concept and would prefer not to dwell in possible computer vs human conflict of the future, i still appreciate the genre. It is quite cool that william Gibson predicted such things like the rise of reality television and that he established the concept in which gave rise to video game and internet growth .

William Gibson's short novel ' burning chrome' was not my style of literature however i did enjoy the images william drew and his ability to make that world so real, and frighteningly enough so possible. a significant moment moment for me while reading the short novel was realising that william coined the phrase 'cyberspace' in this story... in 1982!!! While the wording was a bit technical i still manage to comprehend the story and enjoy it for the masterpiece it was.

Monday, September 13, 2010

Week 8 - Tutorial

CyberPunk

The 1995 movie "Hackers" deals with the theme of Ubiquitous Access to Information. A Number of teens compete in hacking systems until, they hack a system thats get them in trouble with the government.





Keystroke battles: Are young hackers the future of warfare?

By CHARLIE REED

Stars and Stripes

Published: August 20, 2010

YOKOTA AIR BASE, Japan — Self-taught hackers like 18-year-old Michael Coppola are positioned to become the most sought-after recruits in the U.S. military since the activation of U.S. Cyber Command in May.

Coppola caught the eye of military officials last year during Netwars, one of several national cyber challenges — some funded by the Defense Department — aimed at finding and nurturing young cyber security talent needed across the public and private sectors.

Rather than earning points, he broke into the scoring system through Twitter and helped himself, exploiting a flaw Netwars’ creators had missed.

“I sort of circumvented the entire competition,” said the Connecticut teen, who was then asked to quit playing and instead help run the game. “They said, ‘You’ve made your point; now give everyone else a chance.’

Coppola’s digital checkmate demonstrated a combination of creativity and technical sophistication that is the hallmark of a gifted hacker.

Young peoples ability today, was explored in “Hackers”, a 1995 film, which depicts youth positioning in a cyber-orientated world. The young adults in the movie compete with each other by hacking into different systems until such time they hack into a government agency. The teenager characters simply ‘hack’ for the fun of it without bad intentions. It seems in today’s society young adults with these abilities are being put to good use.

As CYBERCOM assumes authority of the digital battlefront, the military is embracing the hacker community in its pursuit of people to help secure the DOD’s 15,000 networks and potentially exploit weaknesses in outside networks.

A hacker is a term synonymous with criminals and those with bad intentions; however, today the term refers to the hackers with good intentions and the same abilities. The hackers who have in the past been involved in illegal activities will not pass clearance for military service, but rather be redirected to contractors within unclassified fields.

Once synonymous with criminals and anarchists, the term hacker now also refers to the good guys in cyberspace, those who have the same skills the bad guys do, only different intentions.

Hackers who have engaged in illegal activities would be unable to qualify for the security clearances required for military service, or even government employment, said Col. Sebastian Convertino, commander of the 318th Information Operations Group at Lackland Air Force Base, Texas, which develops hardware and software for CYBERCOM.

“But we don’t just write them off,” he said. “We direct them toward contractors or other places where they can work in unclassified fields.”

But how can we be sure these hackers who have unlawful intentions won’t make it into government employment. With computer tech students with such tremendous ability in short supply, a ‘bad hacker’ may indeed ‘hack’ their way into governmental employment.

But with hackers and other cyber security experts in short supply, some senior officials contend that the military must fundamentally change its structured buttoned-down culture in order to attract them.

“One of our greatest challenges will be successfully recruiting, training and retaining our cyber cadre to ensure that we can sustain our ability to operate effectively in cyberspace for the long term,” CYBERCOM commander Gen. Keith Alexander said in a June speech at the Center for Strategic and International Studies. Alexander also heads the National Security Agency, which shares a campus with CYBERCOM at Fort Meade, Md.

Short supply

The center, a Washington think tank, released a report in July detailing the manpower shortage and contending it is among the weakest points of the U.S. cybersecurity strategy. The report included an oft-cited statistic attributed to Jim Gosler, founding director of the CIA’s Clandestine Information Technology Office and an NSA visiting scientist.

“There are about 1,000 security people in the U.S. who have the specialized security skills to operate effectively in cyberspace,” Gosler said in 2008. “We need 10,000 to 30,000.”

Computer threats against the United States are growing in frequency and sophistication, as is an awareness of the potentially crippling effect a successful attack could have on such a technology-dependent society.

While Defense Department systems are probed by unauthorized users some 6 million times a day, Alexander said, the targets of cyber attacks vary as much as the sources behind them — from foreign governments fishing for state secrets to criminal rings targeting corporations for financial gain to terrorist organizations looking to wreak havoc by attacking critical infrastructure such as the power grid.

So between other government agencies, public and private regulatory bodies and corporate America, which is as vehemently concerned with protecting trade secrets as the Pentagon is with safeguarding national security, the military faces stiff competition for cybersecurity talent.

“Red teaming” skills — detecting network vulnerabilities by simulating what the “bad guys” would do — are particularly rare and coveted by employers, explained Jim Lewis, co-author of the CSIS report and director of the think tank’s Technology and Public Policy Program.

That kind of expertise — displayed by Coppola in Netwars — also is needed by the military for offensive cyberoperations, Lewis said.

An additional issue of military recruitment of hackers is the possibility that these kids will get bored, as the governmental tasks may prove uninteresting in due time, and then the question lies as to what will these young hackers embark on to fulfill their interest? Such is the problem with Copula, who believes a military position comes with a loss of freedom and won’t foster a creative environment.

Coppola rebuffed overtures from recruiters, citing the loss of personal freedom that comes with serving in the military and his impression that the military command structure would not foster the creative environment he desires.

“I want to work as a private citizen,” said Coppola, who starts college this fall at Northeastern University in Boston.

His dream job, he said, would be working at Google, a high-profile company known for nurturing imagination in a relaxed work environment.

Culture

Coppola’s attitude is not uncommon among hackers, whose mindset generally runs counter to that of the military doctrine, said Lt. Col. Gregory Conti, director of a cybersecurity research center at West Point.

Building an effective cyber force with these types of individuals requires fundamental changes to the military culture, Conti said.

Leaders must recognize and embrace the value of technological expertise not only on the frontlines of cyberspace but also on the physical battlefield, Conti said.

“The good news is that the culture is still malleable,” he said.

But if the tech-savvy soldier is not embraced by his combat-hardened brethren, there is a risk CYBERCOM will be marginalized instead of growing into an elite corps of hacker warriors, Conti said.

“Ultimately you want to create an environment that’s so cool, so bad ass, they don’t want to leave,” Conti said. “We can do that.”

The military will never be able to compete with the higher salaries offered in the private sector, but it could adopt practices, such as Google’s policy allowing workers to spend 20 percent of their time solving problems of their own choosing, Conti said.

But what of this time allocated to personal use permit? With the available technological resources of the military for their personal endeavors, it’s possible their personal free time could be detrimental to our country. Imagine a government announcement that the confidential military files have been hacked internally. Especially when the recruited hackers are found and considered by past mischievous encounters as Convertino explains.

A second lieutenant in the Army stationed at Fort Meade, for example, would make roughly $52,000 including subsidies for housing and food, but as a civilian could earn between $70,000 and $80,000 as a cyber security specialist with advanced skills, according to the SANS Institute, a nonprofit cyber security training and research outfit in Bethesda, Md.

But Convertino, the Lackland commander, contends finding hackers to join the military is “actually not that hard.” He disagrees with the assertion that the military ethos contradicts the creative problem-solving skills honed by hackers.

“Wars in particular are the mother of invention,” said Convertino, who parlayed his own hacking skill into a military career. “Soldiers, sailors, airmen and Marines have always been innovative.”

In 1983, during his senior year of high school, Convertino landed in the principal’s office for a class project that essentially allowed him to eavesdrop on the school’s phones. He said that as he waited for his licks, a military recruiter on campus that day told him that what school officials considered trouble, the military considered valuable.

“At a company, you’re working to make money. But (in the military) we say that we serve a higher purpose, which has a certain charismatic appeal,” he said. “There also an excitement that comes with counterterrorism operations and the wars in Iraq and Afghanistan,” he said. But just what kind of Cyber-Warriors will be recruited if nuisance is a winning criteria?

Convertino and Conti, however, do agree that the services must adjust their personnel systems to reflect career paths so cyberwarriors can be assured challenging assignments and promotion opportunities, as well as consider bonuses commonly used to attract and retain troops with special skills that are in demand.

The Air Force unveiled such a system in May. Convertino helped develop the Air Force’s new “cyber operator” career field.

Before that, airmen from the intelligence and communications field filled the cyber ranks but risked hurting their careers when they would forgo promotions to stay in the field, he said.

Week 8 - Lecture Response

This whole cyberpunk idea is freaking me out a little. While to begin with this concept seems completely make-believe, science fiction and the type of thing a C grade movie thrives off. Yet when i start to actually think about technology and its presence today, and hear recently that we have almost doubled the amount of internet users in Australia since last December, i realise these crazy concepts of technology taking over and the human race living in some sort of poverty stricken or desert of wires, is not all that impossible. The possible combination of a low life and high tech world completely scares me and i believe most people, once they understood just how rapidly tech-growth is occurring, they would freak too.

However for the time being i still control my mac, and my iphone and television still require the use of my finger pushing a button. The Cyberpunk is something to think about and be concerned with but until such time it becomes reality, i'll just enjoy the low-budget movies and novels. :)

Monday, September 6, 2010

Week 7 - Tutorial Activity

Q1. What is creative commons and how could this licensing framework be relevant to your own experience at university?It is an Organisation that provides Media, video, music and image content that is free to use and without licensing restrictions. It would be very useful at uni when i require this type of content for assessment and don't want to be concerned that my work maybe pulled done for licensing reasons.
Q2. find 3 examples from Creative Commons.







Q.3. Find an academic article which discusses creative commons using a database or online journal. Provide a link and a summary of the article.
Pitfalls of open licensing: An analysis of creative commons licensing.
Zachary Katz.
- This article studies the negative implications that Creative commons will have on our cultural environment and the ways it will change the production and distribution of future creative works.


Q4. Have a look at Portable Apps (a pc based application) – provide a brief description of what it is and how you think this is useful
A portable app is portable software one would carry around on a USB or ipod etc. When the portable device is plugged into a computer, the software and files can then be accessed and do not leave traces of files behind when the portable device is ejected.
This would be really easy as it would allow access to all your calendars, email, internet bookmarks, media and documents without the hassle of carrying around a laptop. This is fantastic for university students or business people etc.

Danica

Week 7 - Lecture response

Wow, this lecture was boring.
I guess I just don't put to much thought into the programs i use.
I kind of knew that free software was available but i didn't think it was legal.
So i always just spent heaps of money paying for Microsoft office and norton etc.
I don't like the idea of using other programs and software, maybe because I'm not familiar with it or anything but it kinda seems like the home-brand version of cornflakes.
I realise people would probably shout at me for saying that, but i think it;s just cause I've never had any reason to buy free software, and i would be way to scared to try and find it on the net without thinking my computer would get overloaded with viruses and such.
If i were given an opportunity to use a free program or software and got used to it, i think my opinion would definitely change.

In regards to free content like videos, images and music, I think it is awesome that some creators are happy to provide their work for others to use or change for their own purposes. I don't think creators should be pressured into this however, it's fair that their work is THEIR work and the internet is a place to others to see it and purchase it or whatever, but if they don't want it used then it shouldn't be.

I have professional pictures up on the internet and i would not like anybody from anywhere in the world to be able to manipulate them or use them without paying for the rights to do so. I think if the creator is happy for it to be shared that is awesome otherwise, respect their wishes.

danica

In regards to this weeks assigned homework, i won't be downloading and using free software anytime soon. this may be very close-minded of me but to be honest i don't want to risk accidentally downloading some virus or something and stuffing up my mac. I am happy to pay for my programs as i don't require any need to alter them, i use them for what they are and i know how to use them. Microsoft and Apple do just fine by me :)