cyber

The Danger to you of Bitcoin

One of the great mysteries of the 21st century is the identity of Satoshi Nakamoto, the creator of Bitcoin. While his creation of the blockchain and a new cryptocurrency was an immense achievement, Bitcoin itself is only one of a diverse array of emerging currencies. Still, when I taught my Digital Globalization course last winter, I learned from my students that in my city (Portland, Oregon) there was an ATM at the local mall (Pioneer Place) where you could convert Bitcoins to cash, bars where you could buy your drinks in Bitcoin, and even apartments were you could use it to pay your rent. The reason for this rapid adoption has been the many promises that Bitcoin makes. Need to send money? There is no need for Western Union. Are you concerned about the security of banks? Bitcoin and other cryptocurrencies are not a fiat currency (created by a sovereign government) and hence beyond the reach of the Federal Reserve or the banks. …

Wikileaks needs to make a moral case

After a military faction recently sought to overthrow the Turkish government by a coup, Turkey’s President Erdogan launched a massive and extreme purge of the nation’s military, academia, and judiciary. Tens of thousands of people have lost their jobs, or been arrested. The government even created a separate cemetery for dead coup plotters. While the United States and European governments had condemned the coup, they were deeply disturbed by the extremism of Erdogan’s response. For European governments, the question was particularly difficult because they had relied on a deal with Turkey to end the flood of Middle Eastern migrants to Europe. The country is currently under a three month state of emergency. Amnesty International has denounced the climate of fear endured by journalists. The International Studies Association has denounced the attack on academic freedom in Turkey. …

ISIS and encryption

One of my favorite podcasts is Reply All, which covers cyber issues in a creative and clever manner. The hosts recently had an interview (“Decoders,” episode #62) with New York Times’ journalist Rukmini Callimachi, as well as Runa Sandvik, the director of bureau security at this newspaper. In essence, Callimachi discovered a new means that ISIS had adopted to communicate, called Truecrypt. Messages are written in this code, then uploaded to files on a website. For all their sophistication and technical knowledge, however, ISIS also proved to be vulnerable to basic errors, such as failing to check the location of the server by examining its web address. …

Syllabus for an online course on Digital Globalization

This winter quarter I taught a fully-online class on Digital Globalization, which I greatly enjoyed. I believe that Digital Globalization is a form of globalization that is every bit as powerful as economic, political and cultural globalization. Of course, it is also inextricably linked to all these other forms of globalization. It’s strange, therefore, that has remained largely invisible in the literature in the field.

One point that struck me from the class is that the media gives a great deal of attention to the question of surveillance by governments, but my students are every bit as concerned about surveillance by corporations such as Facebook. I had also assumed that my students would be digital natives. Many of them, however, felt a great digital gap between themselves and younger siblings, who spend a great deal of time on social media, such as Instagram and Snapchat. They appreciated the chance to learn about topics such as Bitcoin that they had heard about in the media, but knew little about. From my students, I learned that there was a Bitcoin ATM in Portland, as well as bars and apartment buildings that accepted Bitcoin.

A few notes about the syllabus that follows. The majority of the content, including almost all of the videos, were obtained from my library’s Streaming Video and Music database. For this reason, I haven’t included the links here, because they would only work for people with accounts at my university. As you can see, I’m also beginning to use modules for online courses. In this particular case, I began with two weeks focusing on the individual (social media, the generation gap, music and art); two weeks focusing on institutions and the economy (Uber, Airbnb, the sharing economy, Bitcoin, 3D printers); and two weeks focused on the nation-state level (surveillance, privacy, encryption). For the fourth module of the course, students do three weeks of independent study on of the topics that they’ve explored in the class, to answer a key question. The goal of this module is to develop learner agency.

The final week of the course content students share a digital artifact, which is typically a Google Slideshow. I’ve done this in previous online classes, and it’s always very popular with the students, who take a great deal of pride in their work. I like the assignment because it in a sense it creates a co-constructed syllabus, in which students are responsible for their own learning. Lastly, for multiple reasons I did not allow students to do any research for this course on the Dark Web; that is, they could not research in areas of the Web that they could only access via a TOR, ITP or Freenet browser.

Shawn Smallman, 2016 …

Cypherpunks’ strange fight for freedom

Cypherpunks: Freedom and the Future of the Internet is a short, engaging and provocative look at surveillance and freedom on the internet. The book records a series of discussions between Assange and his co-authors (Jacob Applebaum, Andy Muller-Maguhn and Jeremie Zimmerman) on March 20, 2012 (while he was under house arrest in the UK), which was later edited for readability and coherence (p. 6). As a result, the reader feels as though they are eavesdropping on particularly interesting conversation in a pub, but a conversation by people who have great expertise in their fields. A front sheet on the book provides the essential context for this conversation: “What is a Cypherpunk? Cypherpunks advocate for the use of cryptography and similar methods as a away to achieve societal and political change. Founded in the early 1990s, the movement has been most active during the 1990s `cryptowars’ and following the 2011 internet spring.” The book reads as an introduction as much to the political philosophy of this group as it does to the technical issues involved in modern encryption debates. …

The Magic of Number Stations

Waterfall display for "The Buzzer", radio station UVB-76 on 4625 KHz. The lower sideband is clearly suppressed. Uploaded to Wikipedia Commons on 28 June 2010 by Janm67
“Waterfall display for “The Buzzer”, radio station UVB-76 on 4625 KHz. The lower sideband is clearly suppressed.” Uploaded to Wikipedia Commons on 28 June 2010 by Janm67 with a GNU Free Documentation License.

One of the world’s enduring mysteries is the nature of number stations, which are shortwave radio stations that broadcast random lists of numbers, morse code, or strange bursts of sound, such as the odd beeps on Russian station UVB-76. Nobody knows what the purpose of the number stations is for certain, but we do know that they have been broadcasting for decades, that the transmitters have an immense amount of power, and that stations broadcast in languages that range from Bulgarian to Chinese. These facts probably mean that only nation states would have the resources to operate these communication systems. The most likely explanation is that these sites are tools for global espionage networks. It may be difficult to believe, but even in this internet age the most secure way to transmit one way messages may be through shortwave radio, which can’t be traced to the listener. The messages are almost certainly transmitted using one time pads, a probably unbreakable form of encryption. …

The Lights in the Tunnel

Ford’s book, The Lights in the Tunnel, is a bleak look at the future of global economies given an accelerating pace of automation. The book’s key idea is both clear and frightening: “The central thesis of this book is that, as technology accelerates, machine automation may ultimately penetrate the economy to the extent that wages no longer provide the bulk of consumers with adequate discretionary income and confidence in the future” (237). As a result, Ford suggests, governments will have to plan for radical rethink of the free market. …

Security, fear and Stuxnet

Roman Poroshyn’s brief book (156 pages) provides an excellent overview of Stuxnet within the larger context of cyber-warfare and espionage in the Middle East. Unlike another book on the same topic, Kim Zetter’s Countdown to Zero, it is not based on extensive interviews, nor does it focus in as great a depth upon the process through which the virus was investigated by global cyber security firms. Instead, with Stuxnet: the true story of Hunt and Evolution, Poroshyn tries to place Stuxnet into a broader context of espionage and cyber-warfare directed against not only Iran, but also other institutions in the Middle East, such as the Lebanese banking system. The book is an engaging read (despite the awkward wording of its subtitle), and Poroshyn shares a number of intriguing insights, of which the most interesting was that Stuxnet’s creators ultimately may have allowed it to be revealed to the world as an act of psychological warfare (33-35, 154-155). One of Poroshyn’s other arguments is that Stuxnet is only one chapter in a much longer struggle, which is convincing given his detailed analysis of successive software tools (Flame, Gauss, Narilam, and perhaps Stars) that Israel and the United States likely used against Iran and other regional actors.

One of the book’s strengths is its ability to convey the intelligence of the software design behind this particular cyberweapon. For example, Stuxnet entered into the Iranian nuclear enrichment network through USB sticks, because the network was air-gapped (lacked an internet connection) to the outside world. The level of deceit entailed is chilling: “After the third infection the original Stuxnet worm commits suicide. It deletes itself from the USB stick without leaving a trace” (18). Perhaps most impressive was the fact that it used the very tools for securing machines to infect them: “The perfect match for all of Stuxnet’s requirements is a computer scan process, generated by antivirus software. Stuxnet injects its clone into a variety of processes generated by anti-virus programs from BitDefender, Kaspersky, McAfee, Symantec, and many others” (19). The program was so effective that it briefly shut down the entire Iranian enrichment program (22). Of course, the Iranians ultimately were able to return to significant production. What is impressive, however, was that it achieved this goals which would have been difficult to achieve even with a conventional airstrike against such a hardened site as the Iranian enrichment facility. It also had dangerous implications: “Russia, which is involved in the reconstruction of the Iranian nuclear reactor in Busher, immediately accused Stuxnet of problems associated with the reactor’s reconstruction, and blamed Stuxnet for all delays” (37). There seems to be little evidence for this allegation, but once the attack is made, other actors may also view themselves as being threatened (or that the attack represents a convenient excuse).

There is reason to believe, as Poroshyn suggests, that there are other versions of this particular weapon in existence, only biding their time to be unleashed (53). This book is currently in its third edition. It will be interesting to learn what has happened when the fourth edition is released.

If you are interested in cyber-warfare you might want to read my review of the novel Ghost Fleet.

Shawn Smallman, 2016

Humans need not apply: the Robot revolution

This quarter I am teaching an online class on Digital Globalization, and this week we are talking about the economy: Uber, AirBnB, 3-D printers, etc. The discussion has focused a great deal on how the sharing economy has impacted students’ communities, particularly AirBnB’s impact on housing. In general, most students are optimistic about the future of the sharing economy, and don’t want government to heavily regulate emerging technologies. Still, the students do have some particular concerns. One student recommended a video called Humans need not apply, which talks about how robots are impacting the labor market. This 15 minute video concisely and thoughtfully details the danger robotics and technology pose for white collar employment. As the video points out, even the Stock Market is now heavily run by “bots.” The action of the market is now largely out of direct human control. Now other markets -in particular the legal industry- are changing, as discovery and other tasks are being automated. Could bots eventually take over the role of doctors for diagnosis or drug prescription? My favorite point in the video (spoiler alert) is when the speaker points out that the background music for the video was created by a robot. Overall, the video is deeply pessimistic, as its key argument is that new jobs will not replace those that are lost. My question is, if this trend is truly happening, why is unemployment in the United States currently around 5%? Shouldn’t we already see some signs of this happening? One of the commentators of the video was struck by how thoughtful the comments were, and asked if this could possibly be Youtube? I think that this comment speaks to the video’s strengths.

Another student in the class pointed to an article in the Atlantic titled “A world without work.” It’s also worth your time, to think about the long term trends that may be at least as important as recent news about the Chinese stock market.

Shawn Smallman, 2016

“Mirrors of Racism” campaign in Brazil

In Brazil a female news presenter was the target of racist comments online after the show posted her picture to Facebook. In response, people posted these comments on billboards near the authors’ houses, without giving their names. This brief video shows the billboards and interviews people about their reaction to these comments. Although the people speak in Portuguese, the video is subtitled in English. The slogan at the bottom of the billboards says “Virtual Racism: the consequences are real.” At a time when racial justice is a pressing issue in the United States, it’s interesting to examine how people in another nation are addressing racist speech. The video also raises the issue of how people adopt new personas online, because they perceive that different standards of speech apply, and they can act with impunity.

To see my own book on military terror in Brazil, please click here.

Shawn Smallman, 2016

Privacy & Cookies: This site uses cookies. See our Privacy Policy for details. By continuing to use this website, you agree to their use. If you do not consent, click here to opt out of Google Analytics.