Friday, June 7, 2013

Fair Use - Flexible Fair Use for Technology in Australia (Team 6)

Just recent, June 5th, the Australian Law Reform Commission (ALRC) posted a paper outlining changes to Australian copyright law that would replace the existing “copyright exceptions” section with a broader, more flexible, American-style Fair Use clause (zdnet article). Seeing as right now the number of countries with a Fair Use policy can be counted on one hand (Wikipedia Fair Use) this could be a good step forward for other nations.

The ALRC proposal includes several different categories for Fair Use to be judged on: “Research or study; criticism or review; parody or satire; reporting news; non-consumptive (such as caching); private and domestic; quotation; education; and public administration.” Under their current laws, cable providers offering the ability to watch any show streamed from the cloud to your television is technically against the copyright of the show holders. This new Fair Use policy would allow Australian law to better reflect the technological world we live in.

And if that wasn’t promising enough, the ALRC is taking in Australian citizens opinions in account before they make their final proposal to the rest of the government. Hopefully this law reform will go through and we can move towards a future with more friendly copyright systems for all nations.

Wednesday, June 5, 2013

Questionable, Ridiculous, and Just Plain Silly EULAs

Following up on my previous post describing what a EULA is and how they work, let's look at some EULAs of some more well-known pieces of software or hardware that you may be using. Some of the terms and conditions of the EULA will surprise you.

I waive my moral rights to EA
Here's another EULA from EA. Basically, EA owns whatever you create and produce on the software. You also waive your moral rights to EA. Also note both the license grant and waiver is still in effect even if you terminate the EULA.

Sony, EA, Steam – No Class Action Lawsuits
The latest revisions of the EULA for the Sony, Electronic Arts, Steam, Microsoft, and a multitude of other prominent software vendors now contain a clause that specifically prohibits the user from engaging in class action lawsuits. Below is an excerpt from the Sony EULA that users must accept to use a PlayStation console.
ANY DISPUTE RESOLUTION PROCEEDINGS, WHETHER IN ARBITRATION OR COURT, WILL BE CONDUCTED ONLY ON AN INDIVIDUAL BASIS AND NOT IN A CLASS OR REPRESENTATIVE ACTION OR AS A NAMED OR UNNAMED MEMBER IN A CLASS, CONSOLIDATED, REPRESENTATIVE OR PRIVATE ATTORNEY GENERAL LEGAL ACTION.

These clauses typically mean if you have any grievances against the company, you give up the right to a lawsuit and must go through an arbitration process that is outside of the courtroom. Unfortunately arbitration payouts are usually much smaller and the playing field is unbalanced towards large companies who have well compensated lawyers.

What do you mean I can't use iTunes to create nuclear weapons?
The iTunes EULA below pretty much explains itself. Guess my evil plan to take over the world has been thwarted.

Read the EULA, get a prize
Since everyone knows that people don’t read EULAs, one software manufacturer actually included a statement within the EULA that stated that a “Special consideration which may include financial compensation” will be given to users who read the EULA. Someone did eventually claim the $1000 prize, four months later.

Perhaps one way to get people to read EULAs would be to include prizes for reading through the document. Unfortunately, most manufacturers don’t want you to read through EULA since that would mean they would be unable to hide controversial clauses in them.

Read a 57 page EULA to watch Sleeping Beauty
Even kids aren't exempt from reading EULAs. The image below is of a 57 page EULA that appears when you insert the disc for Sleeping Beauty. This is an interesting case since movies traditionally did not have EULAs. However with any Blu Ray discs now containing interactive content and downloadable content, EULAs are cropping up. In this case, the EULA appeared since the disc was trying to update content which meant having to accept the EULA.


After reading through these examples, do you now feel the urge to read through EULAs before clicking Accept? Feel free to comment below if you have any additional examples of EULAs like the ones I posted.


Here is the URL to the blog that I started on Blogger regarding Gender issues in Computer Science
http://www.blogger.com/blogger.g?blogID=3279597936089152609#allposts/src=dashboard

Tuesday, June 4, 2013

Team 11, Post 4, Hacktivism: Anonymous for Victims of Assault and Bullying


Team 11, Post 4, Hacktivism: Anonymous for Victims of Assault and Bullying




Introduction

Recently there have been several instances of the hacktivist group Anonymous focusing their attention on cases involving victims of sexual assault and bullying. Two of the three cases discussed in this post resulted in the victim committing suicide. The first case involves a teenage girl named Amanda Todd, who was victimized by a pedophile, resulting in incessant bullying by classmates and lead to her suicide. The second case concerns Rehtaeh Parsons, a teenage girl was allegedly gang-raped by four boys at a party, also resulting in bullying from her classmates and ended in her suicide. Finally, the third case is of a 16-year-old girl from Ohio, who was drugged and raped by two boys, Trent Mays and Ma'Lik Richmond, in public resulting in videotape and photographs of the repeated assaults.

What does this have to do with hacktivism? At first glance, not much; however, it turns out these cases sparked the interest of Anonymous. The group took it upon themselves to, in some cases, locate the parties responsible for the events that took place and expose evidence to the authorities for justice to be served.

Amanda Todd

Amanda's nightmare began when she was 12-years-old, vulnerable and naïve to an older man online. He convinced her to flash him and then about a year later, tried to blackmail her with the picture he took with his webcam. The man threatened if she did not put on a show for him he would send the picture he took of her to all her friends. She refused him and called his bluff, but he was not bluffing. This led to many years of torment from her classmates, who began calling her a porn star and voted her homecoming queen as a joke. Amanda was the butt of every joke and to this 15-year-old girl, it was the end of the world. Amanda posted a video before she took her life, in an effort to tell her story. (Szalavitz)

Anonymous posted a video in response to this tragic event, claiming they had identified the man who was blackmailing Amanda Todd. Anonymous revealed the name and address of the man on Pastebin.com (Sieczkowski). Apparently, Anonymous did not choose to get involved until nude autopsy photos were leaked online (Sieczkowski). The group sent and email to a Canada's CTV News, stating, “We generally don’t like to deal with police first hand but were compelled to put our skills to good use protecting kids. (Sieczkowski)”

Rehtaeh Parsons: #OpJustice4Rehtaeh

Rehtaeh Parsons a 17-year-old girl from Nova Scotia committed suicide on April 7, 2013. Rehtaeh had been mercilessly bullied by school mates following her allegedly being raped by 4 boys at a party. One of the assailants took a picture during the rape and passed it around their school. The photo went viral on social media sites and resulted in her being harrassed, receiving text messages from peers asking her to have sex with them too and calling her names (Harkinson).

The assault transpired 2 years prior to her suicide and resulted in her going from a straight A student to a high school drop out, due to depression and anxiety (Harkinson). Rehtaeh's case for the assault was dropped by authorities due to a lack of evidence.

Following Rehtaeh's suicide, Anonymous stepped in to do some digging of their own. They claimed to have identified the rapists in 2 hours, using the photo that was taken during the assault (Harkinson). Anonymous threatened to release the names to the public if the police department did not reopen the case and get Rehtaeh's family justice, claiming that if they could uncover this much information in a couple of hours, surely they could find more if they tried (Harkinson). However, Rehtaeh's family asked Anonymous not to release their names, worrying for their safety, stating their daughter would not want that (CBC). Anonymous agreed to respect their wishes but warned that others were interested in justice too, and may not keep the boys identities secret.

The Friday following her death and two days after the video announcing their demands for the reopening of Rehtaeh's case, the police department did just that. The PD claims that the reopening had nothing to do with the information obtained from Anonymous (Bogart). Maybe the evidence did not come from Anonymous that sparked the investigation, but it is a fair assessment that their interest and public outcry for justice got things moving again.

Steubenville, OH Rape Case #OpRollRedRoll

Two members of the Steubenville High School football team, found a extremely intoxicated 15-year-old girl at a party and decided to carry her around from party to party, urinating on her and raping her repeatedly. Many people in the community witnessed this happening to the incoherent girl and instead of reporting it to authorities or stopping the guys, some joined in, taking pictures and laughing and others just did not say anything at all. The following day news spread throughout the small town of Steubenville swiftly. The two main assailants involved were charged with the rape, but Anonymous stepped in because they felt like the town was not taking the crime seriously enough and the authorities were corrupt (Marcotte).

Anonymous involving themselves in this case resulted in national media attention. Everyone heard about the rape of a girl by members of the football team in the sleepy town of Ohio. Without Anonymous, would the case have received the same attention? Probably not. Once Anonymous took this on as something they wanted justice for, things moved pretty quickly. The group hacked into the “rollredroll.com,” the high schools athletics page, posting incriminating tweets and information regarding individuals they believed were assisting in covering up details of this crime. According to Amanda Marcotte's article in Slate Magazine, “Anonymous has been vital in getting out at least some of the evidence of the assault to the media.”

In March, the group posted a video, called ExpectPeace, commending the Sheriff of Steubenville. They initially were not a fan of him, but said that he spoke with them during the demonstrations and protests they conducted in the town and offered them his full support in the cause.

Conclusion

These particular cases are not typical, until recently, of Anonymous, but are definitely in the same realm of their corporate hacktivism operations. The group proclaims they are committed to justice being served and when corrupt agencies attempt to cover up details or take advantage of the 99-percent, they will be there, ready to expose the truth. Anonymous taking interest in this type of crime against humanity, the issues of rape and cyberbullying, has the potential to help stop these things from happening. Unfortunately, the approach is not the best, and has skirted the lines of a violation of privacy for some people that happen to fall under the umbrella of direct or inadvertant involvement in these crimes. Anonymous, also, falsely accused a man for cyber-stalking and blackmailing Amanda Todd. The man was already detained at the time for sexual assault of another minor, so they did not feel to bad about that mistake.

Many call them vigilante's, they do not agree with that label. A representative of the group said, “We do not approve of vigilante justice as the media claims. That would mean we approve of violent actions against these rapists at the hands of an unruly mob. What we want is justice. And That's your job. So do it." (Caufield)


Works Cited

Caulfield, Philip. "Group claiming to be Anonymous threatens to unmask boys accused of raping Canadian girl who died after suicide attempt   - NY Daily News." Daily News America - Breaking national news, video, and photos - Homepage - NY Daily News. N.p., 11 Apr. 2013. Web. 5 June 2013. <http://www.nydailynews.com/news/world/anonymous-threatens-unmask- boys-accused-raping-canadian-girl-article-1.1313547#ixzz2VJnBrHcm>.

CBC News. "'Anonymous' won't release names of Rehtaeh Parsons suspects - Nova Scotia - CBC News." CBC.ca - Canadian News Sports Entertainment Kids Docs Radio TV. N.p., 12 Apr. 2013. Web. 5 June 2013.

Harkinson, Josh. "Exclusive: Meet the Woman Who Kicked Off Anonymous' Anti-Rape Operations | Mother Jones." Mother Jones | Smart, Fearless Journalism. N.p., 13 May 2013. Web. 4 June 2013.

Marcotte, Amanda. "Steubenville, Ohio rape: Anonymous gets involved, and the case gets even more complicated.." Politics, Business, Technology, and the Arts - Slate Magazine. N.p., 3 Jan. 2013. Web. 5 June 2013. <http://www.slate.com/blogs/xx_factor/2013/01/03/steubenville_ohio_rape_anonymous_gets_involved_and_the_case_gets_even_more.html>

Red, Christian, and Teri Thompson. "Steubenville rape case: Victim hopes one day to forgive Trent Mays & Ma’Lik Richmond, who were found guilty in rape of 16-year-old by Ohio judge." NYDailyNews.com/U.S. N.p., 17 Mar. 2013. Web. 3 June 2012. <https://www.nydailynews.com/news/national/steubenville-high-school-football-players-found-guilty-rape-16-year-old-judge-article-1.1291087>.

Sieczkowski, Cavan. "Amanda Todd's Alleged Bully Named By Anonymous After Teen's Tragic Suicide." Breaking News and Opinion on The Huffington Post. N.p., 16 Oct. 2012. Web. 4 June 2013.

Szalavitz, Maia. "Amanda Todd's Suicide: Internet and Psychological Toll of Bullying | TIME.com." Health & Family | A healthy balance of the mind, body and spirit | TIME.com. N.p., 16 Oct. 2012. Web. 4 June 2013.

The Future of Offshoring from the U.S. Consumer Standpoint



            Over the course of the quarter we have seen U.S. companies offshore to other countries, other countries offshore to the U.S., as well as strategies states used to attract foreign investment. Phew, so much information! Now it is time to put everything together in terms of where offshoring is headed for the future. A little clue given earlier was that offshoring is no longer restricted to the U.S. approaching developing nations. Some countries are approaching America because companies are beginning to search beyond just costs (Ellis). While costs are crucial to a business remaining lucrative, there are other very important incentives that will automatically cover the cost portion such as global exposure in order to gain investors.
        Another important future trend I see is the popularity of producing within the United States. In addition to avoiding the negative stigma offshoring carries, producing internally is popularizing. While it is more expensive to produce in America, costs are lowering and a greater number of people are willing to pay more knowing that the good was made in the U.S. Additionally, I notice a growing trend in goods being more wholesome. What I mean is that consumers are looking for humane companies that do not test on animals for example, or choose to find more natural foods whose ingredients are easily recognizable, as well as making sure that goods are benefitting the U.S. people, which generally occurs from buying goods manufactured internally.
        I very well could be wrong about all these predictions, but when I observe people’s daily habits in conjunction with the negativity that offshoring receives, it is plausible.
        Offshoring has also had a delayed effect on consumers as whole, but the trends did not catch on until much later when people were expecting their goods to remain intact or functional.  Quality assurance has for the most part been the first thing to go for the sake of cost. Let me ask you, is it worth purchasing 10 cheap shirts that have all ripped apart or 2 more expensive shirts that have remained in tact for over five years? These are the kinds of questions consumers are asking! Having had numerous complaints, refunds, and poor reviews, companies are looking to bring their brand back home due to insufficient quality An example of such a move is Sleek Audio, a provider of high end headphones. This company worked with China for quite some time for the sake of reducing costs. Unfortunately there were so many quality issues that the CEO and his son had to make numerous trips just to alleviate these problems (Koerner 2011). They ended up spending more while on striving to save money. It completely defeats itself!
        I understand that this is just one example and there are probably more companies offshoring than not, however according to a survey distributed between 2010 and 2011 by MFG.com, 19% of participating businesses disclosed that they moved some or all of their company back home (Koerner 2011).
        Lastly, since China is an offshoring hotspot, we are seeing rising trends in China’s wages gradually. Wages are still drastically cheaper than wages in the states, however the numbers are steadily growing, so the justification of cheaper labor may not hold up in a few years.
        In sum, offshoring has its ups and downs, but at the end of the day, it lies in the hands of the consumers. While businessmen can cut costs and produce cheaper, if they hold up, consumers will keep buying that company’s goods. If quality suffers as a result of offshoring, consumers’ willingness to buy decreases. I cannot fully say one party wins or loses, but what I can assure is that there are some serious changes happening in the living standard of the American people, so keep your eyes out for what happens in regards to offshoring!

Works Cited

Monday, June 3, 2013

Reporting Live...Anonymous may have a news site soon!



This just in, Anonymous wants to bring you the latest breaking news! Apparently, Anonymous wants to host a web site in more of a formal reporting-the-news form. They have been working towards this for the past couple of months. The amount of support is pretty impressive and having a news site to report out of would be great. I am however, wondering how long they’ll be able to keep it up before the government starts breathing down their neck, especially if they release stories in which the government considers to be “private” or “sensitive” information. Regardless many people have vocally and monetarily support this idea. Anonymous “raised $54,000 for the purpose of launching a site that would take the group’s nascent newsgathering efforts beyond Twitter and Tumblr” (Gillette).
What’s unknown is why Anonymous doesn’t use or rely on Facebook to gather information or spread their message. “Among other things, the site will aggregate news from various indie news sources. It will also integrate information from Twitter while largely shunning Facebook (FB)” (Gillette). Perhaps Anonymous feels as if Facebook is unreliable. For whatever reason, Anonymous states that they will accumulate data from multiple sources, clearly one of which will not be Facebook, and substantiate these into one steady stream, their news site.
What I like most about the idea of this site is that it will be informative and educational, without various users chiming in and arguing via the comment section. Your Anon News officially stated “there will be no comments section” (Gillette). People will be able to submit stories while the web site will filter out these submissions based on “quality, authenticity, and relevance” (Gillette). I like this because it still gives the common user a place to contribute and be a part of the online Anonymous community while restricting any potential rants and ravings via the comments section.
I’d like to digress for a quick second and give my opinion on the use of a comments section and why I whole-heartedly applaud Anonymous for not putting them into their news site. I often find a lot of the times, that news stories on different websites are interesting and legitimate, only to read the ignorant and obnoxious comments by users. In my mind, I know the hosts of these sites aren’t responsible for these comments, but it still ruins the content of the main articles. On the other hand, and not to completely contradict myself, I understand the comments section gives people access to discuss, ask questions, elaborate, and so on but more often than not the comments don’t add any content to the articles and usually end with some kind of argument which may or may not even be related to the original story in the first place.
Overall, I think the idea of the website sounds wonderful. The goal is to actually report real news that has more of a global and ethical impact. Anonymous wants to report stories such as “Why isn’t CNN-Turk airing footage of [] massive protests” instead of stories about “Kardashian[‘s] [exploding] butt implants” (Gillette). This is a breath of fresh air of real journalism that has more or less begun to elude mainstream in light of more popular, but not necessarily more informational, stories. I can’t wait until Anonymous’ news site is up and running.


Works Cited:

Gillette, Felix. "Anonymous Prepares to Enter the News Business." BusinessWeek, 3 June 2013. Web. 3 June 2013. <http://www.businessweek.com/articles/2013-06-03/anonymous-prepares-to-enter-the-news-business#r=rss>.

Saturday, June 1, 2013

Summary of Work: Open Source and Net Neutrality

My last post was the finale of my opinions on my research - but I wanted to give a summary of all the research I have done and give links too all the blogs that I wrote.

Top sources relating to public policy for Net Neutrality:
http://www.cbc.ca/news/canada/story/2005/07/24/telus-sites050724.html
This article was an example of why Net Neutrality needs to be addressed by the people. The company TELUS cut access to a pro union website. This is an example of a lack of Net Neutrality, and the company TELUS trying to have more control than, in my opinion, they should.

http://money.cnn.com/2010/11/30/technology/netflix_level3_comcast_traffic/index.htm
This article was an example of why Net Neutrality needs to be addressed from a business standpoint. Since the company who was providing services for Netflix was using lots of bandwidth, Comcast wants to charge them extra.

http://www.theverge.com/2012/9/18/3351626/att-facetime-block-fcc-complaint-net-neutrality
AT&T was not allow users to use face time if they did not pay for minutes. (essentially a business descision because they didn't want users to just use data plans, they wanted them to pay for minutes/texting and data).

Top sources relating to public policy for Open Source:
http://www.fsf.org/
As a whole, the Free Software Foundation is a good source for understanding some of the public policy surrounding Open Source. It was one of the first places me and my team looked to.

http://opensource.org/
Another broad example, the Open Source Initiative is a good source of getting your feet wet with the public polices in open source.

http://www.whitehouse.gov/omb/Circulars_a130_a130trans4
A direct example of a public policy relating to Open Source. This are far and few between when it comes to the US, but they are more popular in the EU. But as a research group, we were focused primarily on the US. The bill was against Acumulo, which was talked about in our presentation, it essentially bars the Department of Defense from using accumulo-commitees'

List of my blogs:
Open Source:
http://css411uwb.blogspot.com/2013/05/open-source.html
http://css411uwb.blogspot.com/2013/05/open-source_18.html
Net Neutrality:
http://css411uwb.blogspot.com/2013/05/open-source.html
http://css411uwb.blogspot.com/2013/05/deep-packet-inspection_9.html
http://css411uwb.blogspot.com/2013/05/public-policy-in-open-source-and-net.html

These were my main inspirations for my blogs - even though the majority of my blog was focused on strictly my opinion of the policies and some of the issues relating to Open Source and Net Neutrality.

Cheers,
Brandon



Friday, May 31, 2013

Topic 2, Post 3: Hacktivism in 1999 and early 2000's


Topic 2, Post 3: Hacktivism in 1999 and early 2000's

Introduction

This article addresses the cDc once more as it evolves into several other facets of hacktivism. It explores the birth of a new group spawned from the cDc, but considered separate, Hacktivismo. Hacktivismo was created as a “special-ops” group to fight nations inflicting censorship and internet oppression on their people. The group was committed to “digitally correct” hacktivist actions. They created several software projects geared towards helping all people to be able to communicate without government officials monitoring them and allowed for the transfer of data they may not be able to view online, in an encrypted form, allowing news and information to flow freely to all. Finally, Peekabooty is discussed. This project initialized under Hacktivismo, but was taken over by a now former member to complete development.

Cult of the Dead Cow (cDc)

Topic 2, Post 2, featured information regarding the Cult of the Dead Cow (cDc) and their role in early hacktivism. The cDc continues to have an impact regarding this subject and, as time has gone on, have more clearly defined what they stand for: anti-censorship on the internet. In this section, notable projects launched by cDc in late 1999 through the early 2000's will be discussed.

Hacktivismo

In late 1999, the cDc announced the launch of a new group they were forming in an effort to eliminate internet censorship, Hacktivismo. The purpose of Hacktivismo was to come up with new ways to eradicate internet censorship(Garman). The stance they take is the belief that privacy and information access is a human right and any attempts to minimize either should be stopped (Hacktivismo). Their mission statement is as follows:
“To conduct and publish scientific research in the areas of information technology, communications and electronic media; and, to assist (where possible) non-governmental organizations, social justice groups and human rights entities in the use of advanced information technologies for the furtherance of their works. We also intend to have fun doing this. Turn it up. Way up. (Hacktivismo)”
There are many opinions on the cDc and Hacktivismo regarding the types of projects they are responsible for and what types of hackers they are: white, gray, or black; however, the clearly state they are not in anyway “black hat” hackers, they merely create software and involve themselves in projects meant to protect our rights.

The founders of Hacktivismo created a document entitled “The Hacktivismo Declaration,” that further explains what they stand for beyond their mission statement. They wrote it in response to the growing number of corporations and governments attempting to censor the web. It directly quotes basic international human rights as defined by Article 19 of the Universal Declaration of Human Rights (UDHR) and Article 19 of the International Covenant on Civil and Political Rights (ICCPR), offering several examples how, internationally, there are many in violation.

The Projects

Following the creation of “The Hacktivismo Declaration,” the group focused their efforts on developing software to fight cyber censorship. Many countries, including China and Singapore, limit the types of sites they can browse or news sources they can view. Hacktivismo's goal became to help fight such censorship by constructing open-source programs called Camera/Shy, Six/Four, and ScatterChat.

Firstly, Hacktivismo created a steganographic toolkit program called Camera/Shy, releasing the first version in July of 2002. Digital steganography is a method used to hide information from third party's on the internet, typically, within images or sound byte files. The goal of Camera/Shy is to automatically scan for such hidden information and reveal it to the user (Hacktivismo); however, it also allowed the user to embed encrypted messages into a gif format and share with others, undetected (BBC). Some features of the software include a user-friendly Internet-Explorer interface, built-in automatic clearing of cache and history, and an executable file – no need to install the program onto your computer.

Secondly, the group developed the Six/Four System, “a virtual private network aimed at subverting national firewalls.”(Jordan, 109) The system is designed to tunnel information, permitting anonymous and secure access to material that is publicly located on the internet obtainable to anyone (Tuttle). Six/Four is named after June 4th, the date of an attack on peaceful demonstrators in Tiananmen Square by the Chinese army, killing thousands of citizens (Tuttle). The creation of this software was comprised in memory of those unarmed protesters, primarily students, killed in that demonstration (Tuttle). Six/Four permits users to establish their own, private network, only visible to its members. The network is invisible to all firewalls and filtering systems administrations utilize to obstruct entry to areas of the web they deem unfit (BBC).

Thirdly, ScatterChat, launched 2006, is instant messaging software that provides complete encryption over Tor, a network of virtual tunnels that allows for greater security over the internet (Infoshop). Similar to previously discussed Hacktivismo projects, ScatterChat is designed for the hacktivist or protester forced to communicate through servers that could be infiltrated by oppressive governments. It is also geared towards individuals residing in countries where their government has chosen to spy on its occupants for better security.

Peekabooty

The first version of Peekabooty was released to the public in July of 2002. It started as a project for Hacktivismo, but the need for the projects completion was so important that Paul Baranowski, known as “Drunken Master,” quit his job to work on it full-time (COW). The purpose for the software, as in all of the projects originating through Hacktivismo, was to aid in the fight against censorship and government oppression.

Hacktivismo came across and article written regarding China and the internet and posted it to their webpage. The article exposed US corporations conspiring with the Chinese government, installing censoring and surveillance devices into the Chinese networks that connect to the internet (Jordan). It also revealed that Cisco met the demands of the Chinese government by building special technology to block and monitor anyone who accessed the internet in that country (Jordan). It also exposed that Yahoo! allowed censorship of chat rooms and obstructed searches for certain keywords. The release of this article is likely the push Baranowski needed to make this project a priority.

Peekabooty has a few key components that make its launch important in the fight against internet censorship. It uses a distributed network, rapidly circulating messages, handled by different connections that cross, making this network really hard to shut down (Jordan). It also uses stenography to conceal its messages via secure socket layer protocols (SSL). SSL encrypts the data in order to hide it and validates the server it is being sent to (Jordan). Peekabooty also uses anonymous connections to prevent anyone from mapping its origination.

Peekabooty has some societal impacts, however, as good as it is for those being monitored for no other reason than government power, there is potential for it to be used by some we may wish did not have access to such privacy tools. It was released as open-source, so everyone has access to it, actual criminals and terrorists too. An article featured in Businessweek stated, “While criminals might use Peek-a-Booty to evade detection, the skirting of censorship that it promises could be far more valuable to the U.S. and its allies.(BloomsbergBusinessweek)” I think this is true, we have more power as a nation by empowering those who are victims of oppression.

Conclusion

The early 2000s were quite huge for hacktivist growth. The topics covered in this article do not come close to touching on all the groups that formed during this time period, but the impact the chain of groups that started with the cDc had on our country has been substantial. Not all agree with what they do or the software and systems they have created to fight censorship, but from my research, they have at least been consistent in what they stand for. They do not wish to reek havoc on the world, but to uphold human rights as the technologies have evolved. They believe in open-source and they believe that information and data, not personal and private data, but data nonetheless, should be available to all. They also believe, even when the message is not something you agree with it should not be hidden.

Of course, not everyone agrees with that assessment. The government worries about confidental and classified information being exposed by hacktivists and rightfully so, since it has. But the cDc and Hacktivismo do not seem to be interested in that. Every hacktivist group differs in their mission, but Hacktivismo's seems pure. In the Hacktivismo Declaration, they mention “ the importance to fight against human rights abuses with respect to reasonable access to information on the Internet” and pleads to other hackers to fight information rights violations (Hacktivismo). In this declaration, they also directly address the need to have some limitations on expression, explicity stating their not condoning release of classified information, accessing personal information, engaging child pornographic activities, etc (Hacktivismo).



Works Cited

"BBC NEWS | Science/Nature | Hackers target web censorship." BBC News - Home. N.p., 15 July 2002. Web. 30 May 2013. <http://news.bbc.co.uk/2/hi/science/nature/2129390.stm>.

BloomsbergBusinessweek. "Skirting the Great Firewall of China - Businessweek." Businessweek - Business News, Stock market & Financial Advice. N.p., 22 July 2002. Web. 1 June 2013. <http://www.businessweek.com/stories/2002-07-22/skirting-the-great-firewall-of-china>.

COW, CULT OF THE DEAD. "CULT OF THE DEAD COW: "PEEKABOOTY UPDATE" by Oxblood Ruffin." CULT OF THE DEAD COW. N.p., 7 Feb. 2002. Web. 1 June 2013. <http://w3.cultdeadcow.com/cms/2002/02/peekabooty-upda.html>.

Frontline. "Roundtable - China And The Internet | China In The Red | FRONTLINE | PBS." PBS: Public Broadcasting Service. N.p., n.d. Web. 1 June 2013. <http://www.pbs.org/wgbh/pages/frontline/shows/red/roundtable/internet.html>.

Garman, Tabetha. "We Are Legion Civil Disobedience in the Cyber Age." The Honors Conference Anthology of the Northeast State Community College Honors Program presented April 20, 2012.

"Hacking Group Plays Peekabooty with Censorship." Network Security. 2001.5 (2001): 2-3. Print.

"Hacktivismo: Board of Advisors." Hacktivismo: News. N.p., n.d. Web. 29 May 2013. <http://www.hacktivismo.com/about/index.php>.

Infoshop News. " Hacktivismo launches ScatterChat - Infoshop News." Infoshop News - Anarchist and libertarian news, opinion and analysis. N.p., 23 July 2006. Web. 31 May 2013. <http://news.infoshop.org/article.php?story=20060723131509395&query=scatterchat>.

Jordan, Tim, and Paul A. Taylor. Hacktivism and cyberwars: rebels with a cause?. London: Routledge, 2004. Print.

Tuttle, Harry . "Hacktivismo releases Six/Four - Infoshop News." Infoshop News - Anarchist and libertarian news, opinion and analysis. N.p., 18 Mar. 2003. Web. 30 May 2013. <http://news.infoshop.org/article.php?story=03/03/18/2660472>.

Zittrain, Jonathan, and Benjamin Edelman. "Empirical Analysis of Internet Filtering in China." Berkman Center. N.p., n.d. Web. 1 June 2013. <http://cyber.law.harvard.edu/filtering/china/>.

Tuesday, May 28, 2013

Offshoring and the IT Industry


            As I am sure you know, there are certain jobs that are the first to offshore. These tend to be the more unskilled jobs: factories, call centers, or menial office duties. It would be unimaginable to offshore skilled, in-demand jobs right? Well, I found a pattern of offshoring in the one industry I personally thought to be untouchable—information technology and computer programming.
            I always imagined that technology allowed offshoring to occur. For example, businesses could use technology to monitor offshored plants. Since technology is more of a skilled sector, I pictured that the unskilled jobs would be moved to create room for the skilled work. I never imagined technology to actually be created overseas. With the IT and programming jobs that have been offshored, this is exactly what is happening, but at a much more optimistic rate.
            Recently, the Hackett Group released a report indicating offshoring patterns in the IT industry. Just in 2009, over 330,000 jobs belonging to billion dollar American and European industries went offshore. Fortunately that number reduced to 113,000 in 2011 and the Hackett Group report predicts this number to decrease by nearly 50% by 2016 (Reisinger 2012). So we are seeing that the trend in offshoring IT jobs is decreasing, which is great, but I am still shocked that this job was being offshored to begin with! Thibodeau suggests that this trend will decrease in the next 10 years simply because companies will run out of offshore-friendly jobs (Thibodeau 2012). So a word of encouragement to all you IT students, the odds of finding a job are not completely against you! Hooray!
            As a college student, when I look at trends in offshoring, it makes me realize the importance in what students choose as a career path. People always say to look for the major that brings in the most money, but I am entertaining the thought that students look not for jobs with a large pay grade, but rather jobs that are not “offshorable”. Unfortunately fewer and fewer jobs are becoming immune to this trend, but as we saw with the Hackett Group Report, not all jobs are going to be leaving. There will be a point where firms run out of jobs to offshore. As true as this may be, this is a difficult to imagine given how rapidly the world is moving as a result of technology. Regardless, I look forward to seeing what happens to the job market here in America when that time approaches. For more information on the Hackett Group and a downloadable copy of their report, click here.:

Works Cited
Reisinger, D. (2012, April 10). “IT offshoring set to increase in near future before leveling off”. IT Management. Retrieved from: http://www.cioinsight.com/c/a/IT-Management/IT-Offshoring-Set-to-Increase-in-Near-Future-Before-Levelling-Off-459504/


Thibodeau, P. (2012, March 21).“Offshoring shrinks number of IT jobs, study says”. Computer World. Retrieved from: http://www.computerworld.com/s/article/9225376/Offshoring_shrinks_number_of_IT_jobs_study_says_

Monday, May 27, 2013

End User License Agreements


Everyone in this class has probably accepted an end user license agreement (EULAs) at least once in their life. They are those windows filled with legal text that pop up when you install new software. In order to actually use the software, you need to click an “I Agree” button. Sometimes, you don’t even need to click a button since using the software means you’ve implicitly “agreed” to whatever terms were specified. However, does anybody actually read all of the terms and conditions set forth in a EULA? Very few people have due to the length of such documents as well as the indecipherable legal language that is often used. The question you might be asking now is why should I care what is in the EULA?

To answer that question we need to look at how software is distributed and used. When you purchase software whether digitally or physically, you are purchasing a license to use that software. This means what you are buying is the right to use that software; you do not actually own the software. However, granting a license to use software requires certain terms and conditions to be outlined which is the primary intent of a EULA. This is why nearly every piece of software you install will contain a EULA. Along with software, similar legal statements are found when using services such as websites and online tools. These are known as Terms of Use which are slightly different but are just as confusing and full of legalese as their cousin the EULA.

Do you read EULAs?

Now that we know what a EULA is, let’s take a look at some of the issues that have been cropping up over them. While the purpose of a EULA is primarily to define what a licensor can do with a copy of software, many companies have used EULAs to add additional terms and conditions that are often harmful to consumers in terms of privacy. The long legal text makes it easy to obfuscate certain terms and conditions that one would normally not agree to. In addition, while EULAs are theoretically a contract between each individual user and the manufacture of that software, in reality there is no room to negotiate the terms of the contract leaving consumers with a “take it or leave it” attitude towards software.
They mean the same thing to most people.
So what are some of the more ridiculous terms that you probably have agreed to in a EULA? According to the Electronic Frontier Foundation (EFF), here are some of the things to watch out for in a EULA.

Do not criticize this product
Basically, you waive your rights to criticize the product, complain about the product, or publicly disclose negative opinions about the product. Some EULAs take it urther and prohibit benchmarking the product or performing any sort of analysis that may reveal potential flaws in the software.

You give the company the right to be monitored
Many EULAs contain provisions that give the company the right to perform actions that can be considered an invasion of privacy. This can be things from snooping on what software you are running to remotely installing third party software.

You cannot reverse engineer the product
Although US copyright law allows for reverse engineering of products under a fair use clause, many EULAs prohibit reverse engineering the software.

Don't use this software with other software that may affect its performance
This clause is often included in EULAs in the context of preventing users from analyzing the software's performance or to prevent the circumvention of certain parts of the software such as advertising.

"By signing this contract, you also agree to every change in future versions of it.
Oh yes, and EULAs are subject to change without notice."

They can change the terms you "agreed" to without having to notify you. So what you agree to today may be invalid tomorrow. It might even be worse.

Now that you know what an end user license agreement is and how they work, what are your thoughts on EULAs? Do you read EULAs before agreeing to the terms? Are there things that concern you in an EULA? Feel free to comment below!

References
Image sources
xkcd, cc-nc license
GNOME project
EFF


Saturday, May 25, 2013

Public Policy in Open Source and Net Neutrality

The Necessity of Public Policy: 
In my prior four blogs, I have talked about the research I have done regarding Open Source and Net Neutrality. My intention with these blogs was to set up a framework for how I view these topics. From that framework, I would like to explain the policies that exist relating to Open Source and since you know how I feel about the subjects my objections or approval of policies should be clearer.

Public Policy in Open Source: 
For Open Source, the biggest form of public policy is not necessarily governmental regulation or control, but rather a collective of like minded individuals who work towards a common goal. What this practically looks like is: Open Source Initiative - an organization who creates and propagates Open Source ideals and sets standards for what true Open source products must look like.

One of the interesting concepts that is “somewhat” in the works is the political party that pushes for Open Government. In my opinion, this has little relation to the success of Open Source but it is a pretty interesting concept to have in mind.

For public policy that is specifically related to Open Source, there isn’t much - but there is discussion of if there should be. Like I mentioned in my first Open Source blog, there are companies that have heavily invested into Open Source companies as a way of creating competition and propagating free solutions to product areas where their competitors are located. One of my examples was IBM and Linux as it relates to Microsoft. The discussion is centered around whether or not doing something like this is perfectly fine to do, or if the government needs to intervene. This example has very obvious economical repercussion so by no definition is it a light or “simple” discussion.

My thought is that it’s perfectly fine - companies, by definition of being successful, should be able to provide a more innovative and genuinely better product than any Open Source commune could. If the company can’t - they shouldn’t be allowed to complain about other companies investing in other companies who are more successful than them, even if they are Open Source.

Public Policy in Net Neutrality: 
My team has already presented on Net Neutrality, so in answering the question of public policy - most of my motivation is coming from the questions which we were unable to answer during the presentation. Most of the questions were very interesting and in general stemmed from a business perspective. One of the questions was the economical relationship to Net Neutrality - the question looked something like, “Does open source limit the free market by telling retailers what they must do?”

My answer to this question is also one of the answers to one of my teams challenge questions. but is as follows:

I think it's very obvious that Net Neutrality affects the economy. One of the points in our presentation was that large Internet Service Providers are looking to do things against the main principles of Net Neutrality as a way of monetary gain (limit access speeds of customers who pay less, charge companies extra for faster connection speeds, ad injection etc) From this information alone, we can make the assumption that Net Neutrality has an effect on the economy.

Furthermore, there are a variety of ways to look at the economy - the more conservative you go, people will say the free market dictates the economy and we need to keep the market as liberated from regulation and outside sources as much as possible. The more liberal you go, people will say the opposite and that regulation and outside sources can propagate economic growth.

By nature of the issue, regarding Net Neutrality, there is no "good" answer to "does it limit the free market?" beside the obvious answer of yes. Net Neutrality is an idea - much like a philosophical opinion (for example free will) the word itself is not representative of a single distinct opinion, but rather represents a set of idealogical standpoints. In saying this, I am not intending to sidestep the question - but the answer is simply yes; Net Neutrality does affect the free market. The repercussions to enacting Net Neutrality are very multifaceted. If you force ISP's to enact Net Neutrality principles, by definition you have started government regulation of the internet (not a very good thing). If you don't force ISP's to enact Net Neutrality principles, you allow corporations to limit independent news sites, monitor internet traffic and potentially lose any sense of privacy when accessing the internet. So the answer is, in my opinion, very little to do with the monetary issues of the economy and more to do with content and regulation. I think the economy stand point is something that ISP's would like people to argue over, and ignore the concepts relating to content and regulation.

Someone commented towards the end of the presentation about how ISP's could have been doing this(limiting access and speeds) for a long time, and they haven't which in essence shows we don't need to be too concerned. Personally, I hold this opinion as well - but I think it is good to discuss and consider the ramifications of adding some more public policy to this area.

Conclusion of my blogging cycle: 
This is my last blog post - it’s been a lot of fun researching Open Source and Net Neutrality! I hope I have been able to share a lot of my research, I have done so much that it’s hard to condense everything I have learned into a simple blog post. I have enjoyed being able to share my experiences with you all.

Cheers,
Brandon

Team 11, Topic 2, Post 2: Hacking and Hacktivism in the 90's


Introduction

With technology on the rise, the 90's produced many types of hacking and hacktivist groups. During this decade, hacking was not solely based on the curiosity of tech-savvy individuals hungry for the knowledge of how a system functioned, rather, it marked the beginning of defining hacking categorically. The emerging hacking groups described themselves as hacker's, cracker's, and hacktivist's. Some took it a step further, classifying the types of hacking they participated in by using he terms white, grey, and black hats, using color representation as a way of describing the purity of their intentions. The rapid growth of these underground groups made society and the government very uneasy.

This article discusses some of the more influential hacking groups that emerged in the 90's. The focus is primarily on hacktivist groups that used cyberspace as their platform for protest and hacking groups that exposed security holes in systems for non-malicious purposes.

Cult of the Dead Cow (cDc) – the 90's

The Cult of the Dead Cow (cDc) hacking group joined in the mid 80's, however, they did not get media attention until the early to mid nineties. cDc started as a text-files group over a bulletin board-based system called Fidonet, discussing technology plans and day-to-day events (Jordan). As technology advanced, they began hacking together and became known as a hacking group, developing later into a hacktivist group (Jordan). They became popular because of the tools they used but largely because of their willingness to discuss their views with the public (Jordan). The group is committed to “digitally correct hacktivism,” and continues to exemplify that in the stand they take against other hacktivist groups that they believe are in violation of these principles (Jordan).

The Cult of the Dead Cow, they coined the phrase “hacktivism,” and the intended use was to “refer to to the development and use of technology to foster human rights and the open exchange of information (Delio).” The cDc believes in the freedom of information and the freedom to communicate (McCaughey). They were the first underground hacker group to own a Usenet newsgroup in 1995, the alt.fan.cult-dead-cow, which they used for their attempt to achieve “global domination through media saturation (Chiesa).”

cDc vs. the Church of Scientology

It was cDc's strong belief in the elimination of censorship that sparked the “war” they declared on the Church of Scientology in 1995. The Church of Scientology attempted to remove alt.religion.scientology from Usenet, claiming copyright infringement (Poor). The cDc did not react well to the request for removal because they believed it was a form of censorship on the internet and that was the precisely what the cDc is against. In response, the cDc issued a statement to the Church of Scientology, proclaiming war (Poor). Once the statement was released by the cDc, the Usenet group, alt.religion.scientology, became extremely popular due to the publicity, people just wanted to know what was there that made the Church of Scientology want it to be removed. The request to remove alt.religion.scientology was ignored and considered a huge defeat for Scientology.

cDc creates Back Orifice

The cDc also grabbed attention in 1998 when they released the first version of a program called Back Orifice (BO) (Jordan). BO, at first glance, does not seem like a program meant to represent a hacktivist message, but according to the cDc, that was its intention.

BO is an “illicit remote-administration tool for Windows-based networks. (Jordan)” It is available online to the public and has a graphical-user-interface, so even a novice can use it. BO works similarly to a trojan horse, attaching itself to another file or imported to the target computer, it runs and installs itself, and finally, deletes the executable file it created following installation (Jordan). The person who installed the trojan horse has total access to the targeted computer, allowing file extraction, program running, and keystroke recording (Jordan).

The cDc had, largely, two reason for creating the software: to force Microsoft and the user's of their operating systems to address the security issues and to inform the user's that the capabilities BO gives the average person are the capabilities Microsoft already has with anyone using their operating systems (Jordan). Politically, the intended message being delivered by the cDc are concerns of security of access and privacy of information (Jordan). The idea was not to suggest that Microsoft was doing any of the spying in their power, but to publicize the situation through the release of BO.

The Haunting of GeoCities and Jim Townsend 1994

In 1994, came the birth of the start-up GeoCities. They offered one megabyte of computer storage space for anyone that wanted to run a website within any of the “neighborhoods” within GeoCities (McCaughey). Anyone who built a website in one of the neighborhoods was called a “homesteader,” and attracting them was essential to the business model, because the more people building GeoCities space, the more valuable the business became (McCaughey). Initially GeoCities did not require user's to give up space for advertising on or around their web pages, instead they counted on the homesteaders to create an alluring site and neighborhood and GeoCities would include an unoffensive amount of advertisements (McCaughey). The ads, however, kept increasing and began to include pop-ups and other forms of aggressive advertisements, driving users away from the “free” service (McCaughey).

In 1999, Yahoo! purchased GeoCities, changing the structure of the service almost entirely. Instead of the user having a free web site to use for their business or otherwise, Yahoo! changed the terms of service to state that they owned whatever content was on any homestead and could do with it whatever they pleased (McCaughey).

In response to this, the user's began to protest the changes. Jim Townsend, a user and contract software developer, created a website called “cometo/boycottyahoo,” which rallied all the user's that wanted to protest the changes in terms. Since so many of the users were computer savvy, within hours of launching the protest site, people began posting banner ads and graphics to help the cause. Townsend was careful to encourage streamlining the ads to address the intellectual property issues at hand. Suddenly, these banner ads overtook GeoCities pages and became known as “The Haunting of GeoCities,” receiving a lot of public attention in the news. In just 3 days, Jim Townsend's page received over one million hits.

By July 6th, one week after the Haunting began, Yahoo! adjusted their terms of service, ending the boycott. This was only 9 days after they began requiring their users to sign the terms of service revision (McCaughey).

Milw0rm 1998

A group of teenage boys from the UK, US, and New Zealand, hacked into the Bhabha Atomic Research Centre (BARC), a nuclear research facility located in India. The facility had nuclear tests planned that were to occur on May 11th – 13th of 1998 and in protest, the boys broke into the BARC system and claimed to have stolen emails and the data from the tests as well as destroyed two of the eight servers data (Mehta). BARC officials denied the events occurred but the public was already nervous about the possibility, wondering if they could adequately handle the responsibility of nuclear weapons if they allowed their system to get hacked (Mehta).

After the repeated denial of the lost data, the boys of Milw0rm began releasing some of the information they stole from BARC online and showing it individuals that admit to seeing the documents. In addition to the data stolen, the group also replaced their homepage with a mushroom cloud and the words: “If a nuclear war does start, you will be the first to scream...." (Mehta).

The boys were never prosecuted in for the take over of the BARC system. According to this article, India believes the US did know about the attack on their nuclear facility and most likely possessed the information obtained by the hackers. The US denies having had any knowledge of the protest/hack occurring.

Electronic Disturbance Theater (EDT)

The Electronic Disturbance Theater is a group of artists and activists that practice what they call “electronic civil disobedience.” Electronic civil disobedience uses tactics from civil disobedience, a group of people blocking space with their bodies to prevent entry, but instead of occupying physical space, they use the internet to create a block virtually. The EDT achieves one of the first forms of electronic civil disobedience by creating FloodNet, also known as the Swarm, combining political action, theory, and artform (Jordan). (McCaughey)

The first major project of the EDT was supporting the Zapatistas rebels in Chiapas, Mexico. The goal was for the Zapatista Army of National Liberation's voices to be heard by the Mexican Government. EDT targeted websites of authorities that appeared to be in support of the repression of the Zapatista uprising (Jordan). They hacked into the Mexican government website in April of 1998 and left messages for the officials and they overloaded their pages by sending enough requests to slow the site down or crash it completely (Jordan).

In June of 1998, EDT attempted to strike the Mexican government with FloodNet again unsuccessfully. They were prepared for the attack and administered one to counter. Once the Mexican government system detected FloodNet it activated a javascript attack that would open webpages on the computer that initialized the attack until the computer crashed, terminating FloodNet.

Electronic Frontier Foundation (EFF)

With technology and hacker communities on the rise, so did the criminal cases and unwarranted surveillance against the confirmed and perceived hacking groups. Three men in the industry recognized the need for the protection of civil liberties. The Electronic Frontier Foundation was founded in 1990 by John Perry Barlow, Mitch Kapor, and John Gilmore. When they announced the forming of the organization, they also informed the public they would be represented Steven Jackson Games and many other bulletin board service users against the United States Secret Service. (Electronic)

The Secret Service orchestrated sequence of raids against recipients of a classified document, copied illegally, and distributed that outlined the way 911 Emergency System works. Steven Jackson Games was one of the raids, confiscating most of the tools and equipment needed for him to continue his business. The Secret Service never found the document and Steven Jackson was innocent and returned his computers, however, he and his staff discovered that electronic messages they had sent to each other had been deleted. Jackson's business was just about bankrupt and he felt his freedom of speech and privacy rights had been violated. (Electronic)

The Jackson case was important in the development of legal frameworks regarding the internet. Following this case, e-mails were regarded with as much privacy as telephone calls and requires a warrant before seizing them. (Electronic)

Conclusion

The 90's brought many changes in the development of hacking and hacktivism, evident in the evolving execution and public policy. During this decade, the preliminary laws, primarily put in place in the 80's, were updated to include more protection for government agencies and businesses. For example, the Counterfeit Access Device and Computer Fraud and Abuse Act of 1986 would no longer suffice to combat the growing security threats and was updated twice. New laws, such as, the Communications Decency Act of 1996 and the National Information Infrastructure Protection Act of 1996, were also added to legislation.

The Counterfeit Access Device and Computer Fraud and Abuse Act (CFAA) was amended in 1994 and 1996. The amendment in 1996 included “non public” to the terms to cover systems that allow the public to access certain parts but not all areas (Computer). More specifically, even though a person is authorized to enter a system they are not authorized to do anything criminal. The lines had already been clearly defined regarding government agencies and their personnel, but now a policy was in place for other agencies.

The National Information Infrastructure Protection Act was an enacted as, somewhat, and extension of the CFAA, providing federal criminal liability if a person was in violation of entering a system, unauthorized, and causing damages. The act contains several major sections outlining the offenses specifically. The first section criminalizes unauthorized access of electronic files of classified government information. The second section forbids taking electronic information from financial, government, or private agencies used in interstate business. The third section abjures the purposeful and unlawful access of private computers in the US government. Finally, the fourth section prohibits the entry of protected computers without permission and with mal intent, unless the person can prove the damages were less then $5,000. (National)

The government wasn't the only organization defining rights in cyberspace, the EFF's co-founder John Perry Barlow wrote a piece that articulates hacktivism in 1996 entitled, “The Declaration of the Independence of Cyberspace.” Barlow's manifesto is written to our government, letting them know they are not welcome to govern cyberspace, that the internet is government free and no one invited them to join us (Electronic). It also seems to be speaking directly to the passing of the Communications Decency Act, which passed the same year, meant to limit the people's freedom of speech if it was deemed indecent, by saying: “In the United States, you have today created a law, the Telecommunications Reform Act, which repudiates your own Constitution and insults the dreams of Jefferson, Washington, Mill, Madison, DeToqueville, and Brandeis. These dreams must now be born anew in us...” (Electronic).

As time moves on and we explore the 21st century, many more developments regarding hacktivism and public policy will be discussed. Stay tuned...


Works Cited
Chiesa, Raoul, Stefania Ducci, and Silvio Ciappi. Profiling hackers: the science of criminal profiling as applied to the world of hacking. Boca Raton: Auerbach Publications, 2009. Print.

"Communications Decency Act of 1996." EPIC - Electronic Privacy Information Center. EPIC, n.d. Web. 25 May 2013. <http://epic.org/free_speech/cda/cda.html>.

"Computer Fraud and Abuse Act Summary | US Internet Laws." Cyber Law | Defamation Lawyer | Technology Lawyer | Kelly Warner. Kelly/Warner, n.d. Web. 25 May 2013. <http://www.aaronkellylaw.com/computer-fraud-and-abuse-act-us-summary/>.

Delio, Michelle. "Hacktivism and How It Got Here ." wired.com . N.p., 14 July 2004. Web. 21 May 2013. <http://www.wired.com/techbiz/it/news/2004/07/64193?currentPage=all>.

"Electronic Frontier Foundation." Electronic Frontier Foundation: Defending Your Rights In the Digital World. Electronic Frontier Foundation, n.d. Web. 24 May 2013. <https://www.eff.org/>.

Jordan, Tim, and Paul A. Taylor. Hacktivism and cyberwars: rebels with a cause?. London: Routledge, 2004. Print.

McCaughey, Martha, and Michael D. Ayers. Cyberactivism: online activism in theory and practice. New York: Routledge, 2003. Print.

Mehta, Abhay. "Milworm Bites BARC." outlookindia.com, more than just the news magazine from India. N.p., 22 June 1998. Web. 24 May 2013. <http://www.outlookindia.com/article.aspx?205741>.

"National Information Infrastructure Protection Act Act (NIIPA) of (1996) - Computer, Access, Security, and Government ." Free Encyclopedia of Ecommerce . N.p., n.d. Web. 25 May 2013. <http://ecommerce.hostip.info/pages/769/National-Information-Infrastructure-Protection-Act-NIIPA-1996.html>.

"Poor Mojo Newswire: 1995: Cult of the Dead Cow vs. Scientology." Poor Mojo's Almanac(k). N.p., n.d. Web. 23 May 2013. <http://www.poormojo.org/pmjadaily/archives/020713.php>.