Home
Random
Recent changes
Special pages
Community portal
Preferences
About Commons
Disclaimers
Commons
Search
User menu
Talk
Contributions
Create account
Log in
Editing
Security
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
Ok, this is really too big a topic for one article, but we gotta start somewhere. Hopefully we can split it up and sort it out in DA FUCHA. The debate surrounding cyber security is a fierce one, growing ever fiercer as this internet beast develops. On the one hand, the threat of cyber war and cyber terrorism is a real and urgent issue. It's led to new legislation (and amendments to older laws like the notorious FISA from 1978) giving government the power to monitor and record internet activity, as well as use it as evidence in prosecution. OH GOOD WE'RE SAFE. ... . On the other hand, this surveillance is unconstitutional and an invasion of privacy. There are huge potential consequences, short-term and long-term, of giving the government too much power in cyberspace. (I kind of think of the internet as a little fetus right now. For one, Ted Stevens' "series of tubes" image works for both in my head, umbilical cords and shit. But also, the internet is in the gestation phase. It's developing rapidly, but still incredibly vulnerable to external forces that can cause long-lasting birth defects... ya know?) A few clicks into the website for the [[Electronic Frontier Foundation]] that [[user:Isaac| Isaac]] posted recently brought me to [https://ssd.eff.org/foreign this quote] about why we should be thinking about cyber security and all that comes with it: "All of the government surveillance tactics and standards discussed in previous sections relate to law enforcement investigations β that is, investigations for the purpose of gathering evidence for criminal prosecution. However, the government also engages in surveillance in order to combat foreign threats to national security. When it comes to foreign spies and terrorists, the government uses essentially the same tools β searches, wiretaps, pen/traps, subpoenas β but operates under much lower legal standards and in much greater secrecy. It's important that you understand these foreign intelligence surveillance authorities such as the government's access to records using National Security Letters and its wiretapping powers under the Foreign Intelligence Surveillance Act (FISA) so that you can evaluate the risk of such surveillance to you or your organization and defend against it." SECRECY. Surprised? Alright, now I'm going to think a little more about how to organize this. - [[user:armstron2| Anna]] == Cyber Attack == Richard Clarke, national security expert who worked in the Reagan, Bush 1 & 2, and Clinton administrations, recently wrote a book called ''CYBER WAR: The Next Threat To National Security and What To Do About It''. In it, he describes acts of cyber terrorism that have occurred, how they were executed, and how governments and the media responded. He focuses on weaknesses specific to the Unites States. As a man whose career is based on developing and implementing national security tactics, he is a strong proponent of certain types of internet surveillance. Yet he acknowledges the issues inherent in that, and uses this book to analyze and discuss the best way to address US cyber security in the face of scary, misunderstood [http://www.npr.org/templates/story/story.php?storyId=126097038 '''CYBER WAR'''] lotso other stuff == Cyber Surveillance == The FBI used surveillance softward called Carnivore to monitor internet usage. They later changed the name to DCS1000 because Carnivore sounds really creepy. (Not hugely relevant or current, but interesting). lotso lotso other stuff == Protections Against Surveillance == We can link to your page on [[encryption]] here, [[user:gordonbr| Brad]]? and also, there's lotso other stuff
Summary:
Please note that all contributions to Commons may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Commons:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)