031114
Library book
Part one
How It All Works
Whats all this "cyberstuff" anyway
The great Cyber Wall of China
The new cyber arms race
See if you have william gibsons neuromancer on ebook (first mention of the term Cyberspace)
In 1972, Ray Tomlinson of BBN wrote the first "killer app" of the internet: Email (also the @ symbol)
In 1989,Al Gore invented (actually sped up privatization of ) the Internet.
1990 Berners-Lee invents HTTP and the URL and the World Wide Web.
1993 the Mosiac Web browser which would go on to become Netscape Navigator and be mercilessly crushed by the evil one from Redmond. I have fond memories from the internet of this time. Singer says porn drove the early internet (as it drives all new media). Our computer sat in the corner of the living room pretty much untouched by me until we connected it to the internet and I found out there were nekked ladies on there. From that moment on I was sold. I was present for it all; from the birth of Yahoo, AOL and sticky portals to the blaring days of tacky banner ads and the Browser Wars. The internet in its infancy was a great place to be.
FOM Alessandor Acquisti and guessing SSN#'s. Easy to guess if you know birthdate and birth city.
On the Internet nobody knows you're a dog. 1993 New Yorker Peter Steiner.
We strive to maintain the classic CIA of Cybersecurity: Confidentiality, Integrity, and Availability.
The feared "cyber pearl harbor" or "cyber 911" is more a question of when more than if. And we got the ball rolling and set a precedent with Stuxnet. Cyber chickens roosting anyone?
Book David Khan The Codebreakers
Pg 66 prt two Why It Matters
72 I missed this one; 2008 Cornficker virus exploited Mi rosoft Wimdows and made botnets. This was the "holy grail" of botnets some 7 million strong. To this day they still dont know the "who or the how" of that one.
77 The 1989 WANKER virus left Midnight Oli lyrics on NASA computers. "You talk of peace for all and then prepare.for.war"
79 Angry "script kiddies" wil "dox" you.
80 Always we mention computers and the Arab Spring. But I prefer what Evgeny Morozov has to say on this subject in "To Save Everything Click Here." And also in "The Net Delusion."
MOVIE- see V For Vendetta
84 Here's a ready made book story. A hacktivist group messes with a Mexican drug cartel The Mexicans kidnap one of the ha kefs and the group must use all of its best skills to thwart ,(I hardly ever use the word thwart really) the bad guys and save their friend. And they meet money mules at night cashing in fake ATM cards as part of a "black hat" organization.
You and me going "phishing" in the dark.
87 "typosquating" yes hate those guys.
91 Idea for new tv show Law and Order Computer Victims Unit.
91 "clutching a computer cassette." Really PW? A computer cassette? What was he hacking on a Tandy TRS - 80?
102 Mind your "Geo-tags" Your photos tell where you are.
108 Edwin Snowden will tell you if you use TOR (The Onion Router) thats a paddlin. The NSA like that nosy friend who just has to know, will monitor you. You can download a while browser with TOR built in. Annonymity at last. But if you do the NSA will be watching you.
Check out books by David Rothkopf.
139 "95 percent of the soffware used in China is pirated."
Hey Bill you must be proud; A billion Chinese on Windows. How many copies ya sell? One, the bastards.
151 David has the advantage. The Insurgents used a 25 dollar program called Skygrabber, which college kids use to pull down the satellite feeds of streamed movies to outsmart our billion dollar drone recon system. They watched the drones watching themselves.
155 Marine four star GeneralJames Cartwright who lead the American cyber initiative turned out to be the one who leaked Stuxnet to the press. His theory is if they dont know whats there then they wont be afraid.
159 America opened up a Pandora's box by launching Stuxnet. Unlike a bomb that explodes and is gone, these cyberweapons leave behind detailed explanations of how to make more exacerbating proliferation.
No comments:
Post a Comment