exploring the internet 91.113-001 instructor: michael krolak

36
Exploring the Internet 91.113-001 Instructor: Michael Krolak

Post on 21-Dec-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Exploring the Internet

91.113-001Instructor: Michael Krolak

Page 2: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Tonight

• Roll Call

• In the News

• Blog Reading

• Class Announcements

• Internet and Identity

• Create an on-line resume

• Assignments

Page 3: Exploring the Internet 91.113-001 Instructor: Michael Krolak

In the News . . .

US surgeons are to interview a shortlist of patients hoping to be the first to receive a face transplant. Doctors in the US have already carried out the procedure on bodies donated for medical research.

Now the Cleveland Clinic team will choose a patient whose face is disfigured to receive a "new" face from a dead donor.

The chance it will work is around 50% and experts have expressed safety and ethical concerns about the procedure.

Page 4: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Blog Reading of the Week

“THIS WEEKS TOPIC, VANNEVAR BUSH. MY CURIOSITY WAS TO MUCH FOR ME REGARDING THIS MAN SO I FOUND HIS ARTICLE "AS WE MAY THINK". AFTER READING HIS ARTICLE I REALIZED HOW RELEVANT EVERYTHING HE SAID WAS IN TERMS OF THE ONGOING PROGRESS OF TECHNOLOGY EVEN IN TODAY'S SCOPE. HE HAD A VAST UNDRESTANDING OF THE NEED TO KEEP SCIENTIST ALWAYS LOOKING FORWARD AND CHANGING THEIR FOCUS. " IT IS THE PHYSICISTS WHO HAVE BEEN THROWN MOST VIOLENTLY OFF STRIDE, WHO HAVE LEFT ACADEMIC PURSUITS FOR THE MAKING OF STRANGE DESTRUCTIVE GADGETS.........NOW AS PEACE APPROACHES, ONE ASKS WHERE WILL THEY FIND OBJECTIVES WORTHY OF THEIR BEST". HE TALKS ABOUT THE BIOLOGISTS THAT HAVE GIVEN PEOPLE ,"A PROGRSSIVE FREEDOM FROM DISEASE AND AN INCREASED SPAN OF LIFE". HE REALIZED THAT COMMUNICATION WAS ONE OF THE MOST IMPORTANT TOOLS TO ULTILZE AS WELL AS THE KEEPING OF DATA SO THAT IT MAY HELP IN THE FUTURE. READING THIS ARTICLE REMINDED ME OF GEAORGE ORWELL'S BOOK 1984 THAT HE WROTE IN 1949. ALTHOUGH HIS PREDICTIONS WERE SOMEWHAT UNREALISTIC THERE WAS A SIMILAR VISION REGARDING THE FUTURE. HE WAS INTERESTED IN THE FACT THAT ,"THE WORLD HAS ARRIVED AT AN AGE OF CHEAP COMPLEX DEVICES OF GREAT REALIABILITY, AND SOMETHING IS BOUND TO COME OF IT". BOY WAS HE RIGHT! HE ALSO WAS VISIONARY IN HIS UNDERSTANDING OF THE USE OF PHOTOGRAPHY. HE KNEW THAT SOMEDAY SOMEONE WOULD SPEED UP THE PROCESS OF PICTURE TAKING. "OFTEN IT WOULD BE ADVANTAGEOUS TO BE ABLE TO SNAP THE CAMERA AND TO LOOK AT THE PICTURE IMMEDIATELY". WHO WOULD HAVE KNOWN THAT POLAROID WOULD MASTER THAT! WHAT REALLY COMES OUT IN THIS ARTICLE IS THE FACT THAT THE WORLD OF TECHNOLOGY NEEDS VISIONARIES, WILLING TO GO BEYOND THE BOX AND CREATE. THE CONCEPT OF THE INTERNET WAS VANNEVAR'S HENCE HE WAS CALLED AN "INTERNET PIONEER". HAT'S OFF TO ALL THE VISIONARIES OF THE WORLD! “

Page 5: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Follow up from the last class

Page 6: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Feedback on Blogs

• Keep up with your blogs! Minimum 2 blogs per week.

• Keep the entries of the blog relevant to the class.

Page 7: Exploring the Internet 91.113-001 Instructor: Michael Krolak

What is Identity?

i·den·ti·ty ( -d n t -t )n. The set of behavioral or personal characteristics by which an individual is recognizable as a member of a group. The distinct personality of an individual regarded as a persisting entity; individuality.

Source: The American Heritage® Stedman's Medical DictionaryCopyright © 2002, 2001, 1995 by Houghton Mifflin Company. Published by Houghton Mifflin Company.

Page 8: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Who are You?

Page 9: Exploring the Internet 91.113-001 Instructor: Michael Krolak

How do we identify people?

Social

Characteristics• Intellect• Personality• Religion• Attractive• Sexuality• Class• Wealth• Culture

PhysicalCharacteristics

• Age• Gender• Skin tone• Weight• Height• Hair Color• Eye Color

AcquiredCharacteristics

• Name• Occupation• Social Security #• Username• Credit Card #• Email address• Phone Number• Web Site

Page 10: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Rudyard Kipling’s Kim (1901)

• 1901, Kipling writes “Kim”, a story of an Irish orphan raised in the slums of Lahore, India. He assumes the identity of a Hindi, a Muslim, and a British colonizer.

• Religious transformation

Page 11: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Pygmalion

• 1914, George Bernard Shaw writes a play called “Pygmalion: A Romance in Five Acts”

• Upper class linguist transforms lower class flowergirl into a lady.

• Class transformation

Page 13: Exploring the Internet 91.113-001 Instructor: Michael Krolak

The Secret Life of Walter Mitty (1941)

James Thurber writes a story about an uxorious man who fantasizes about being a

• Navy Commander

• Doctor

• A Killer

• An Army Captain

Page 14: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Ferdinand Waldo Demara Jr. (1944)

• Born in Lawrence, MA.• Impersonated

– Royal Canadian Navy Doctor– Zoology Ph.D.– Law student– Cancer researcher– Hospital priest– Deputy sheriff– Teacher– Civil engineer– Assistant prison warden– Doctor of applied psychology,– Benedictine and Trappist monk– Child-care expert and– Editor

• Faked his own suicide • Occupational Transformation

Page 15: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Society of Creative Anachronism

• Founded in 1966, SCA reenacts Medieval festivals and battles.

Page 16: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Black Like Me (1959)

• John Griffin took medication and used a sun lamp to disguise himself as a black man in the Deep South.

• Racial Transformation

Page 17: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Frank Abagnale Jr. (1948 - )

Impersonated a • Pan-AM airline pilot• Pediatrician• Harvard Law School

Graduate• Sociology Instructor at

Brigham Young University

• Occupational Transformation

Frank Abagnale Jr., 16, impersonating a pilot

Page 18: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Cindy Sherman (1954 - )

• "Under this mask, another mask. I will never finish lifting up all these faces."

• Photos of herself that are not self-portaits.

• Complete Transformation

Page 19: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Zelig (1983)

• Woody Allen directs a film called Zelig. The main character, Leonard Zelig, can assume the characteristics of those around him.

• Complete Transformation

Page 20: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Mark Whitacre (1995)

• Executive at ADM• Informant for the FBI• ADM was part of an international conspiracy to fix the

prices of food throughout the world.

Page 21: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Infinite Jest (1997)

• David Foster Wallace outlines a “history of videophony”.

• Users become self conscious of their face during conversations.

• They start wearing masks of themselves made up.

• Then they begin to wear masks that improve their features

• Users start wearing masks of attractive people.

• Users eventually place a black cap over the camera and use the videophone as a telephone.

Page 22: Exploring the Internet 91.113-001 Instructor: Michael Krolak

What are MUDs

A MUD is a multi-user fantasy world where users assume an identity such as a warrior or a mage and chat with other users, explore monster infested areas, solve puzzles, take part in quests and many other activities.

“In the MUDs, virtual characters converse with each other, exchange gestures, express emotions, win and lose virtual money, and rise and fall in social status. A virtual character can also die. Some die of "natural" causes (a player decides to close them down), or they can have their virtual lives snuffed out. “

Source: http://www.wired.com/wired/archive//4.01/turkle.html?pg=4&topic=

Page 23: Exploring the Internet 91.113-001 Instructor: Michael Krolak

MUDs and Identity

“As players participate, they become authors not only of text but of themselves, constructing new selves through social interaction. Since one participates in MUDs by sending text to a computer that houses the MUD's program and database, MUD selves are constituted in interaction with the machine. Take it away and the MUD selves cease to exist: "Part of me, a very important part of me, only exists inside PernMUD," says one player. Several players joke that they are like "the electrodes in the computer," trying to express the degree to which they feel part of its space. “

Source: http://www.wired.com/wired/archive//4.01/turkle.html?pg=4&topic=

Page 24: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Law Enforcement

• To fight CyberCrime, The FBI has two thrirteen year old girls give lessons on tweenage slang and interests.

• FBI agents and local law enforcement impersonate young children online to trap pedophiles.

Page 25: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Protecting Identity

• Hiibel vs. Nevada

• Larry Hiibel was arrested and convicted of a misdemeanor after he told a deputy that he didn't have to give out his name or show an ID.

Page 26: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Protecting Identity (cont.)

• Gilmore v. Ashcroft

• Gilmore is a libertarian and a multimillionaire

• July 4, 2002 tried to board two planes without showing ID.

Page 27: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Identity Theft

“But he that filches from me my good name

Robs me of that which not enriches him

And makes me poor indeed."  - Shakespeare, Othello, Act III. Scene III.

Page 28: Exploring the Internet 91.113-001 Instructor: Michael Krolak

What is Identity Theft?

• A Federal crime where someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.

• In 2004, almost 250,000 claims of Identity Theft within the US alone (1:1000)

• More than $500 million in reported losses

Source: http://www.consumer.gov/sentinel/pubs/Top10Fraud2004.pdf

Page 29: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Tiger Woods

“A man who used Tiger Woods' identity to steal $17,000 worth of goods was sentenced to 200 years-to-life in prison.

Anthony Lemar Taylor was convicted of falsely obtaining a driver's license using the name Eldrick T. Woods, Woods' Social Security number and his birth date.

Though he looks nothing like golf's best player, the 30-year-old Taylor then used the false identification and credit cards to buy a 70-inch TV, stereos and a used luxury car between August 1998 and August 1999.

Judge Michael Virga gave Taylor the maximum sentence under California's three-strikes law Friday.”

Page 30: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Identity Theft by Age

0

5

10

15

20

25

30

% of Claims

Under18

18-29 30-39 40-49 50-59 60+

Claims by Age in 2004

Souce: http://www.consumer.gov/sentinel/pubs/Top10Fraud2004.pdf

Page 31: Exploring the Internet 91.113-001 Instructor: Michael Krolak

What is Phishing?

phishing (also known as carding and spoofing)n.

1. The act of attempting to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business with a real need for such information in a seemingly official electronic notification or message (most often an email, or an instant message).

Source: http://en.wikipedia.org/wiki/Phishing

Page 32: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Phishing Example

Register for eBay Dear valued customer Need Help?

We regret to inform you that your eBay account could be suspended if you don't re-update your account information. To resolve this problems please click here and re-enter your account information. If your problems could not be resolved your account will be suspended for a period of 3-4 days, after this period your account will be terminated.

For the User Agreement, Section 9, we may immediately issue a warning, temporarily suspend, indefinitely suspend or terminate your membership and refuse to provide our services to you if we believe that your actions may cause financial loss or legal liability for you, our users or us. We may also take these actions if we are unable to verify or authenticate any information you provide to us.

Due to the suspension of this account, please be advised you are prohibited from using eBay in any way. This includes the registering of a new account. Please note that this suspension does not relieve you of your agreed-upon obligation to pay any fees you may owe to eBay.

Regards, Safeharbor Department eBay, Inc The eBay team.

This is an automatic message. Please do not reply.

From: eBay Billing Department <[email protected]> To: [email protected]: Important Notification

Source: http://en.wikipedia.org/wiki/Phishing

Page 33: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Methods to Steal an Identity

• TCP Spoofing

• DNS Spoofing

• Typo Squatting (e.g. www.goolge.com)

Page 34: Exploring the Internet 91.113-001 Instructor: Michael Krolak

What is Pharming?

Pharming is the exploitation of a vulnerability in the DNS server software that allows a hacker to acquire the Domain Name for a site, and to redirect traffic from that website to another web site. DNS servers are the machines responsible for resolving internet names into their real addresses - the "signposts" of the internet.

Page 35: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Protecting Your Identity

• Never enter personal information (Acquired Characteristics) into a web site that uses only http (as opposed to https)

• Never send acquired characteristics (except your name) through the email.

• Unless you encrypt your email, expect that anyone can read it.• Always pay close attention to the spelling of the URL (web

address) when paying for anything on line.• Do not respond to unsolicited emails.• Shred all snail mail that contains personal information (especially

credit card offers!!)• Expect that once you throw something away, you are legally giving

it to the public.• Use only one credit card for online purchases• Keep your browsers up to date. Install security patches when they

are released.

Page 36: Exploring the Internet 91.113-001 Instructor: Michael Krolak

Take-Aways

• Identity

• Acquired Characteristics

• MUDs

• Identity Theft

• Phishing

• Pharming

• http vs. https