cyber

Shane Harris, @ War

An Opte Project visualization of routing paths through a portion of the Internet. (http://creativecommons.org/licenses/by/2.5) via Wikimedia Commons.

With the constant media attention to the alleged Russian involvement in the last American election, there is perhaps more media attention to the issue of cyber-warfare than ever before. In this context, Shane Harris’ book, @ War: the Rise of the Military-Internet Complex is provides a sweeping overview of how the U.S. government and its corporate allies have sought to respond and use cyber tools for espionage and war.

Harris has a background as a journalist, and he has extensively interviewed people in both the U.S. federal government and industry. His work provides a deep understanding of how these actors view cyber-conflict. The book is particularly good at showing how corporations are intricately connected the armed forces in cyber-warfare: “Without the cooperation of the companies, the United States couldn’t fight cyber wars. In that respect, the new military-Internet complex is the same as the industrial one before it” (Harris, p. xxiii).

At the same time, this book views this issue through an American lens, and at times has an unreflective view of technology’s role in war. Ever since the Vietnam War, the United States has relied on technology to win wars, while not similarly prioritizing cultural, strategic and historical awareness. One can see this issue in the opening section of the book, which examines U.S. efforts to use cyber-espionage to target ISIS in Iraq, in what he describes as a triumph: “Indeed, cyber warfare -the combination of spying and attack- was instrumental to the American victory in Iraq in 2007, in ways that have never been fully explained or appreciated” (Harris, p. xxii). Even though his description of U.S. operations in Iraq is fascinating, this part of the work has not aged well, and confronts the reader with technology’s limitations more than its capabilities. …

Lines of Light: a book review

Dan Nott’s brilliant graphic novel

Lines of Light is a graphic novel by Dan Nott, which examines the “history and geography of the internet.” I was fortunate enough to meet the author at the Massachusetts Independent Comic Expo, which was held at Lesley University. This quarter I am teaching two courses on related topics (Digital Globalization as well as CyberWar and Espionage), so I was curious to view this work. This graphic novel is exceptional not only because it is visually engaging, but also because it takes a completely unexpected view of something that we all assume we understand. With his clear, concise prose to describe a physical world that we all rely upon, this book is filled with unexpected facts and insights.

One of the approaches that Nott takes is too look at how we use metaphors to talk about the internet, which can sometimes be misleading. The book starts with Senator Ted Stephens at the net neutrality hearing of 2006, where he tried too use a failed metaphor to describe the internet. From this moment, the work moves to consider more broadly how we all talk about the internet, and how accurate that language may be. While it might be easy to mock Senator Stephens, most of us also wrestle to describe something so abstract. Nott’s brilliance is being able to take these metaphors and place them into both a historical and a physical context, which is grounded by the detailed maps and imagery of the infrastructure that supports the internet. …

Developing an online program: tips for administrators

How does a university put classes, programs, and degrees online? What are the key points that administrators should know? Three years ago I wrote a successful internal grant to create an online track in International and Global Studies at PSU. Since then my colleagues and I have successfully moved core classes online, and we have many students completing their degree virtually. I do all of my teaching online now, and I’m the lead adviser for our online track in my department. Although I have a deep interest in pedagogy, particularly Universal Design and the negotiated syllabus, that’s not what I want to explore today. Instead, I want to talk about an administrator’s perspective (having been a dean and a department chair) regarding how to put programs or degrees online, based on this experience. Here are my top tips: …

The Great Firewall of China

Card in a Shenzhen hotel, which explains to guests what are the internet restrictions. Photo by Shawn Smallman

In the summer of 2017 I traveled in Hong Kong and Macau, and visited Shenzhen. During my time in Hong Kong I was able to use the internet, and relied on Google Maps to find street markets when I became lost. Of course I’d heard about the Great Firewall of China, which is also called the “Golden Shield Project” within the country. I hadn’t, however, quite realized how comprehensive it was until I checked into my hotel in Shenzhen and saw this card.

I apologize for the poor lighting in these images. I’ve taken pictures of both the front and back of the card. As you can see, the hotel explains that many websites are blocked and that “foreign VPN connections are unstable in China.” The latter is certainly true, as the Chinese government began a concerted effort to block all Virtual Private Networks (VPNs) about two weeks before I arrived in August 2017. A VPN is one of the best security tools that anyone can use on the internet. About two years ago my work Google Account was hacked. This meant that the hacker had access to not only my email, but also Google Docs, and all the work sites that contained my personal information. Ever since that time, I have used VPNs on public wifi (coffee shops, airports, etc.) to make it more difficult for a hacker to discover sensitive information. In Hong Kong my VPN worked without any difficulty. In Shenzhen, I did not even try, as such networks are completely unstable, if they function at all. …

Cyberwar

Mack DeGeurin has an interesting article in NY Magazine on cyberwar titled “U.S. Silently Enters a New Age of Cyberwarfare.” As DeGuerin notes, the first kinetic use of cyberwarfare (kinetic being a term used to describe the physical destruction or harm of an item or person) was the United States and Israel’s use of Stuxnet, a sophisticated piece of malware intended to damage the centrifuges that Iran was using to enrich uranium. Since that time, cyberwar has expanded. Still, the fundamental problems remains the same, amongst which is the possibility of blowback, sometimes with the same tools that the attacker originally developed. …

Russian Hackers

I believe that in a 100 years people will believe that digital globalization was as an important a trend in the twenty-first century as financial, political and economic globalization. Cyberwarfare, artificial intelligence, cyber-currencies, the sharing economy, drones and robotics are fundamentally reshaping our world. In this context, hackers have become not only a security threat but also part of pop culture. But how do hacker’s themselves think about their culture and their activities? You can learn more by watching the BBC program, “The Hackers of Siberia,” which focuses on the “SiBears” of Siberia.

Shawn Smallman, 2018

Digital Nomads

An Opte Project visualization of routing paths through a portion of the Internet. (http://creativecommons.org/licenses/by/2.5) via Wikimedia Commons.

One thing that I have noticed teaching entirely online is that some of my students are digital nomads, which are sometimes also called digital wanderers. These are people who live their lives and careers in multiple countries, typically while self-employed. I believe that two different phenomenon served to drive this trend. First, the financial crisis of 2008 was followed by a boom that left out many younger workers, who faced student debts, jobs with poor wages and pensions, as well as rising real estate costs. At the same time, improvements in software and digital connectivity made it increasingly easy to work from outside the country. People realized that they could live well in Thailand, and make their living online doing everything from building websites to data entry in health care. As my department has created an online track, there are always a few of these students in my classes, and they bring an interesting perspective when they discuss global issues. These people build their entire lives outside of a particular place or nation.

It’s not always easy to be a Digital Nomad. One needs to deal with visas, health care, local regulations, taxes and broadband access. For that reason, one great resource is Nomad List, which is a website that allows people to search for the best city in the world for them to work. One can search cities using headings such as clean air, near a beach, nightlife, female safe, and fast internet. Of course when you do a search for cities and city icons come up, they always prominently display the typical broadband speed. Once you click on the city’s icon, a plethora of rankings appear. Right now, it looks like it’s hard to beat Budapest, Hungary and Chiang Mai, Thailand. But who knew that Richmond, Virginia would also score so high?

Aveiro, Portugal. By Gabriel González from Pontevedra, España (Aveiro – Portugal) [CC BY-SA 2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia Commons
Anyone who truly wishes to be a Digital Nomad should also investigate the subreddit r/digitalnomad. The discussions may bring a touch of reality to the romance. I do sometimes wonder if the barriers to becoming a digital nomad haven’t increased over the last five years. How many people can really make a living marketing items on Amazon, or working as a web designer?

If you are intrigued by the idea the website Nomadic Notes might be helpful. The Remote Year site is getting attention for its idea of bringing people together in 12 difference cities for one year. Mike Elgin has an article titled The Digital Nomad’s Guide To Working From Anywhere On Earth, which has some practical tips. Lastly, travel blogger Aileen Adalid has a blog post titled The Ultimate Guide on how to become a digital nomad, which is well done. If nothing else, it might be fun to fantasize about life in Portugal or Cambodia for a while. Aveiro anyone?

Are you you interested in teaching about all things digital? Check out my syllabus for an online class on Digital Globalization.

Shawn Smallman, 2017

The Campus Politics of Online Teaching

A few years ago I moved my teaching entirely online. One of the joys of online teaching is that it allows faculty to better know our students. In a conventional classroom, I would come to know the four or five students who spoke the most. In my online class every student must do two detailed discussion posts a week. There is always someone in the class who finishes their first lengthy post by saying, “I don’t normally talk in class, so this is unusual for me to say so much . . . ” Teaching online also allows for greater creativity, and has enabled me to rethink my pedagogy. Over the last two years I have become inspired by the principles of the negotiated syllabus, in which students choose their content in the course. In my classes students take increasing responsibility for the content as the course progresses. For example, in my Global Drug Trade course this quarter every student creates a 12-15 page research paper, which they share with their peers in the final week of the class. This is the only content in the course for this week. At the same time that my course is based upon a negotiated syllabus, the entire content of the class is shaped around the principle of Universal Design, which fosters the learning of diverse groups, such as people for whom English is a second language, and those with different learning needs. I teach at a public university that has historically has an access mission, and I believe that teaching online enables me to continue to serve those students who would otherwise have difficulty completing their degree. As such, online education reflects our core institutional values. …

Can you trust Wikileaks?

“Gun camera footage of the airstrike of 12 July 2007 in Baghdad, showing the slaying of Namir Noor-Eldeen and a dozen other civilians by an US helicopter.” Public domain, via Wikimedia Commons at http://bit.ly/2mu3JGf

During the last U.S. presidential election campaign Wikileaks drew extensive news coverage, as it released data from the Democratic National Committee shortly before the election took place. In March Wikileaks released a massive amount of data regarding CIA’s espionage capabilities. But how does Wikileaks fact-check its data? Can you trust that what it posts is real and not a hoax? If you’ve ever wondered about this, then you might want to listen the BBC World Service podcast, the Inquiry, which has an episode titled “Can you believe what you read on Wikileaks?” You can also find the episode on Stitcher here. What’s fascinating about this podcast is that the journalist interviewed disillusioned members of Wikileaks itself. The bottom line is that the data released to date has been very reliable. At the same time, Assange has nearly total control over what is released, and so his agenda determines Wikileak’s decisions.

There has recently been a great deal of discussion regarding whether Wikileaks has released information obtained from the Russian state. Assange has denied this. Still, it’s also perfectly possible that the Russian state may be running a false-flag operation -an idea as old as espionage itself- in order to pass on information to Wikileaks. More important, however, is the fact that Wikileaks is very much defined by the decisions of a single individual. The podcast discusses Assange’s history, motivations and relationships, to try put Wikileaks into context as a political actor.

Shawn Smallman

Digital Surveillance and Privacy

081203-N-2147L-390
NORFOLK, Va. (Dec. 3, 2008) Sailors on the watch-floor of the Navy Cyber Defense Operations Command monitor, analyze, detect and defensively respond to unauthorized activity within U.S. Navy information systems and computer networks. (U.S. Navy photo by Mass Communications Specialist 1st Class Corey Lewis/Released) via Wikimedia Commons.

I am currently teaching an online class on Digital Globalization, and we have just finished the section of the course that deals with surveillance and privacy. For a recent discussion question I asked students if they were more concerned about surveillance by the government or by corporations. Last year, my students were much more worried about how corporations tracked their activities. This year, however, many of my students say that they are not overly worried about both, but they are also ambivalent. After students say that they they think that they live relatively boring lives, so that the government would have no interest in their activities, they’ll often point to one event or issue that concerns them. What I realized after reading their posts was that I may have asked the wrong question. It’s not that students are worried about their online activities being tracked. Instead, they are much more concerned about the Internet of Things, and how a hacker might use the camera in their security system to observe them, or a device with a microphone to record their conversations. They worry less about who might be watching their internet searches, than the possibility that their devices might record their speech or images.

One of my students also shared an article on Bloomberg with me, “Microsoft Allowed to Sue U.S. Government Over E-mail Surveillance,” by Kartikay Mehrotra. At issue was whether Microsoft had the right to tell people when the government may have accessed their emails. …

Privacy & Cookies: This site uses cookies. See our Privacy Policy for details. By continuing to use this website, you agree to their use. If you do not consent, click here to opt out of Google Analytics.