Security and Technology, Copyright Copyleft, Privacy, Hackers, URIICA, Censorship, History, Books, Curriculum, Tools
CENSORSHIP
*HOW to DISABLE YOUR BLOCKING SOFTWARE
ACCESS: SURF ANNONYMOUSLY
Governments who determine that they must control what people can
see in order to attempt to control what they think censor what
people can find on the internet.
SAUDI ARABIA & CHINA CENSOR COUNTRY
EGYPT CENSORS COUNTRY
2/1/11
Yesterday there were 2903 Egyptian networks, originated from 52
ISP's. Transit was provided via 45 unique isp's. Today at 2am UTC,
the numbers look quite different, there were only 327 Egyptian
networks left on the Internet. These were originated 26 by ISP's.
So 88% of the Egyptian networks is unreachable!88 percent of
Egypt's networks have been cut off.
This list of 243 networks
Egyptian routes/prefixes that are still being routed
FILTERING SOFTWARE
Educators universally indicated that the use of filtering was to
protect the school -- from liability and bad press -- not to
protect kids.
Bypassing School Filters Kids and adults figure out ways around
the filter.
Many lists for open proxies are available on the internet
.
Using such a proxy, you can circumnavigate filtering and other
security measures. You can also disguise your own whereabouts on
the net, and depending on the way the proxy works, you can have an
undetectable web presence. Of course, a network administrator
could block the use of proxies; but every layer you add to your
protection just becomes another challenge to the determined
student.To Block a single machine via your HOSTS file (on a
Windows network WinXP computer:
a Locate the HOSTS file in C:/WINDOWS/system32/drivers/etc/
b) Add to the bottom of the file the following lines
127.0.0.1 roboproxy.com
127.0.0.1 proxyninja.com
127.0.0.1 ninjaproxy.com
This tells your computer that the websites are all located on your
local machine, and any connections to those websites will
subsequently fail.
Law can get all the providers
to give up the information which allowed
BUSH TO SPY ON THE U.S. PUBLIC
Mark Klein
released a statement with details about what he saw and did at
AT&T. AT&T Forwards ALL Internet Traffic Into NSA using
Narus software
. Their main products identify and block or bill for VoIP phone
calls made through the equipment of traditional telecom providers.
They have customers for this system in the Mideast, Asia, and
South America. They just signed a deal with Shanghai Telecom Co
this week 4/06.Tthis is how it is done.
Point, Click ... Eavesdrop : How the FBI Wiretap Net Operates
'It's a "comprehensive wiretap system that intercepts wire-line
phones, cellular phones, SMS and push-to-talk systems," says
Steven Bellovin, a Columbia University computer science professor
and longtime surveillance expert.
FIGHT CENSORSHIP
Source: New York Times (Circuits-D13) 6/18/98
Author: Michael Pollak Banned Books Online offers links to the
texts of 30 different books and plays that have been -- or are
currently -- banned in the United States. The site was created by
John Mark Ockerbloom, who recently received a doctorate in
computer science at Carnegie Mellon Univ.in Pittsburgh. The Banned
Books site also is linked to a variety of other anti-censorship
resources. Censorship endangers democracy, said Dr. Ockerbloom.
"It really narrows the range of discussion in the interest of
whoever's in power," he said. In regards to his own work, he said,
"what I'm hoping the effect will be is a lot more kids will go out
and read 'Huckleberry Finn.'"
Encryption - Digital Rights Management, Cyberlibertarians, and Code Breakers
"To announce that there must be no criticism of the president, or that we are to stand by the president right or wrong, is not only unpatriotic and servile, but is morally treasonable to the American public."
" During times of universal deceit, telling the truth becomes a revolutionary act."
" If ye love wealth better than liberty, the tranquility of servitude better than the animating contest of freedom, go home from us in peace. We ask not your counsels or arms. Crouch down and lick the hands which feed you. May your chains set lightly upon you, and may posterity forget that ye were our countrymen."
CHINA 1989-2017 Censorship Continues
China now demands everyone online uses their legal name and cannot post otherwise. They have more than 10,000 people hired to watch the net and everyone posts. You are not allowed to post anything critical of the people's party and may get arrested if you do.
China to require PCs with software to block sites .
20th Anniversary of Tiananmen Square Massacre
American Companies affected by China Censorship
ARTICLE The Georgia-based company apparently sold its NetSpective M-Class application filter to the Chinese government with the explicit purpose of blocking SKYPE Internet calls, a move that the company says shows the "significant opportunities for Verso's products in the Chinese market." Verso Technologies, of Atlanta, Georgia , hopes to soon win a contract to block Chinese Internet users from using eBay's Skype VoIP. Yahoo , Cisco and Microsoft also selling cesorshp software in China.
2006 "China Welcomes Back Wikipedia"
For about a year China has blocked citizens from viewing
Wikipedia, lest they read unflattering entries on the Tiananmen
Square Massacre or the Tibetan freedom movement. But the nation
has reversed course: It now allows Web surfers to visit the
Chinese-language version of the encyclopedia, at least for the
time being. Government officials haven't said why they stopped
blocking the site. But groups that support open access to the Web
are praising
Wikipedia: Unlike companies like Microsoft, Yahoo, and Google,
the open-source encyclopedia refused to alter any of its
content to appease Chinese censors, reports the BBC News.
China steps up surveillance, targeting mobile phone messaging
July 2, 2004 http://www.securityfocus.com/news/9045
China's Xinhua News Agency has announced government plans to
surveil SMS (short message service) message exchanges over cell
phones for pornographic, obscene, and fraudulent content, while
Reporters Without Borders
argues that the new measure will also aim at political dissent.
China already scans e-mail and chat sessions for subversive
content, and blocks a number of foreign websites, but has had
difficulty keeping up with newer technologies, such as SMS.
The Xinhua report did not specifically mention political dissent,
but noted that the new surveillance, to be implemented by Venus
Info Tech, would target violent text messages as well as those
that could "harm economic interests". So far, eleven companies
have been penalized for such illegal operations as prostitution as
a result of the surveillance. Mobile companies are expected to
implement the filters from Venus as "self-discipline".
4/06 China to regulate Internet Email Services
"On these regards, in order to regulate Internet Email Services
and safeguard the legal rights of the end users, Ministry of
Information Industry (MII) of P. R. China enacted the first
national anti-Spam regulation on March 30th, 2006, which is hereby
formulated in accordance with related national laws on
telecommunications and
Internet.
According to the Regulation, any organization or individual is not
allowed to provide Internet Email Services within the territory of
the P. R. China if it does not receive the License for value-added
telecommunication services, or not fulfill the registration
procedures for non-profit Internet information services. "
Amnesty says two Chinese Internet users were executed
http://www.theinquirer.net/?article=6422
US firms "colluding" in State clamp down claim
By Mike Magee: 11/26 02,
HUMAN RIGHTS ORGANISATION Amnesty International issued a warning
today on
its Web site that
Internet users in mainland China could be killed by the State
for expressing their opinion online.
Thirty three people were named as "prisoners of conscience" today,
for apparently doing little more than expressing their opinions
online.
Two "subversives" have already died in custody,
it claimed. And
the statement
, which it released today,
A
also warns that overseas companies were colluding in a crack down
we
first reported
last August.
One paragraph states: "Foreign companies, including Websense and
Sun Microsystems, Cisco Systems, Nortel Networks, Microsoft have
reportedly provided important technology which helps the Chinese
authorities censor the Internet. Nortel Networks along with some
other international firms are reported to be providing China with
the technology which will help it shift from filtering content at
the international gateway level to filtering content of individual
computers, in homes, Internet cafes, universities and businesses."
The report asked China - avowedly a police state - to release
anyone detained or jailed for using the Internet to express their
views or to share information. American companies are helping
China track down people that the government wants to detain for
"online subversion".IIt has designated 33 people detained for
using the Internet as "prisoners of conscience". Two people have
already died in custody, the report said. AI says that anyone
surfing the Internet in China could be at risk of "arbitrary
detention and imprisonment". There are around 60 million Internet
users in mainland China, with the numbers rising steadily.
VIETNAM Seeks To Monitor Customers At Internet Cafes
http://www.cnn.com/2002/TECH/Internet/06/26/vietnam.internet.ap/index.html
State-controlled media reported on Wednesday that Communist
Vietnam plans to monitor customers at Internet cafes. The
government is seeking to prevent Internet users from accessing
politically and morally objectionable websites. As Vietnam opens
up economic links to the outside world, the government is trying
to gain more control over access to foreign information and are
also worried about the spreat of "reactionary" documents. Internet
service providers in Vietnam are responsible for filtering
"undesirable" websites, but the law has been largely unenforcable.
Local authorities have now been orderd by prime minister Phan Van
Khai to inspect and assess all Internet cafes and report back to
the government by July 7, 2002.
Royal Thai Police Department Big Brother Watch Dog
CAUTIOUS KABUL DABBLES WITH NET
2/2/02 Author: Julia Scheeres
http://www.wired.com/News/culture/0,1284,54285,00.html
The first Internet café in Afghanistan opened this week.
Although the café marks a techno-cultural step for the country,
the effects of having an Internet café are not likely to affect
the local population for some time to come. The café, located in
Kabul's Intercontinental Hotel, is used mostly by hotel guests,
including foreign journalists and wealthy Afghan émigrés. Few
Afghanis can afford $5 an hour for Internet surfing when their
average salary is about $1 a day. Additionally, the café owners,
Afghan Wireless Communication Company, censor content. "We're very
sensitive to both the culture and religious aspects of the
environment we're working in," said director Gavin Jeffrey. "We
installed the blocking program on our own initiative; there's not
legal framework requiring us to do it." Afghan Wireless also
provides mobile phone services in the country and is currently the
only reliable telecommunication system in the Afghanistan. Afghan
Wireless is a joint venture of U.S.-based Telephone Systems and
the Afghan Ministry of Communications.
Turkey Mulls Strict Net Bill
http://www.wired.com/News/politics/0,1283,52477,00.html
A media bill to go before the Turkish parliament Tuesday could
cripple the Internet industry, harm the nation's struggling
economy and hobble free speech on the Web, observers say. The bill
would expand already stringent regulations on all forms of media
and would require websites to submit two hard copies of pages to
be posted on the Internet to a government agency for prior
approval.
John Gilmore Entrepreneur
gnu @ toad.com, gnu@eff.org, PGP key gnu @ cygnus.com
My current project
is to secure 5% of the Internet traffic against passive
wiretapping.
If we get 5% this year, we can secure 20% next year, against both
active and passive attacks; and 80% two years out. The whole
Internet will have been secured. Want to help? Encryption Policy
HISTORY
Maurice Wilkes discovers debugging, 1949 -- The Real Problem in
Security is:
Neither software developers (working for vendors) nor merchants
understand the principles of good software design (for security,
for usability, for reliability). However, in their defense
"software design" is taught neither in design schools, nor in
computer science departments. Those interested in this subject
might visit the The association for Software Design a non-profit
organization dedicated to elevating the status of software design
as a profession. As soon as we started programming, we found to
our surprise that it wasn't as easy to get programs right as we
had thought. Debugging had to be discovered. I can remember the
exact instant when I realized that a large part of my life from
then on was going to be spent in finding mistakes in my own
programs.
The Ware Report
In the late 60s ARPA and then DSB sponsored a committee to write
a doc on security controls. The report became very famous and
often referred to as "the Ware Report"
Have a look to see how thoroughly the committee understood the
issue in those days; especially have a look at Appendix II
SEE also the preface which explains why the original documents
was classified; many people have commented on this.
Security Controls for Computer Systems
. Classified for 9 years, it was declassified and republished by
RAND in 1979 [R-609-1].
From: Jim Warren
Sat, 13 May 2000
Subject:
1999 patent issued for using barcode tattoos for human
identification.
Aside from the comparison of this patent to the numbers tatooed on
prisoners in Hitler's death-camps during World War II more than
half a century ago, and its comparison to the barcode scanning
systems that have been in use for decades to identify everything
from cans of soup to patient tags used in some hospitals and
medical records -- one wonders what kindergarden child working in
the US Patent and Trademark Office concluded that this was a
non-obvious and novel "discovery" worthy of a patent?!
The US PTO is obviously in need of some adult supervision! ===
United States Patent 5,878,155 Heeter Mar. 2, 1999
Method for verifying human identity during electronic sale
transactions
http://patents.uspto.gov/cgi-bin/ifetch4?ENG+PATBIB-ALL+0+967198+0+7+25907+OF+1+1+1+PN/5878155
Abstract -- A method is presented for facilitating sales
transactions by electronic media. A bar code or a design is
tattooed on an individual. Before the sales transaction can be
consummated, the tattoo is scanned with a scanner. Characteristics
about the scanned tattoo are compared to characteristics about
other tattoos stored on a computer database in order to verify the
identity of the buyer. Once verified, the seller may be authorized
to debit the buyer's electronic bank account in order to
consummate the transaction. The seller's electronic bank account
may be similarly updated.
Robots.txt
File:
Is this a Spider crawling through your site? Or, is this someone
stealing your information.
Don't use a robots.txt file
If used incorrectly, they can greatly harm your website
visibility.
- What Is a Robots.txt File : the basics
- About the Robots <META> Tag : control the robots
- How to Create and Configure Your Robots.txt File : intro
- Robots.txt Interactive Examples
- What Is the SEO stuff for Robots.txt
- A Deeper Look at Robots.txt : including pattern matching
- Robots.txt Specifications : What Google does with it
- Robots Exclusion Protocol : What Bing does with it.
- How to Stop Search Engines From Indexing Specific Posts and Pages in WordPress
- How to Block and Destroy SEO with 5K+ Directives : a case study on how one website destroyed its visibility due to an over-complicated robots.txt file.
- Robots.txt Disallow: 20 Years of Mistakes To Avoid : good advice about what not to do with your robots.txt file.
- McAnerin's Robot Control Code Generation Tool robots.txt generator
- SEO Book Tools : simple tools for creating and checking robots.txt files.
- Robots Database : a list of over 300 robots and details about each.
- Google Robots.txt Tester : what is Google doing with your site?
- Block Google from accessing your content
- Help Google crawl the right content
- Ask Google to recrawl and reindex your URL
BOOKS
Andrew Leonard has written a popular social history of bots
.
Bots, the Origin of New Species is not an scholarly book, but it
is an academic and a well-researched one, with an eight-page
bibliography, a glossary, and an index.
"Databanks in a Free Society" compiled by Alan F. Westin, Project Director, Computer Science and Engineering Board of the National Academy of Sciences, 1973 "Function creep is a primary rule of databases and identifiers," said Barry Steinhardt, associate director of the American Civil Liberties Union, citing how the Social Security number, originally meant for old-age benefits, has become a universal identifier for financial and other transactions. "History teaches us that even if protections are incorporated in the first place, they don't stay in place for long." Driver's Privacy Protection Act; Intelli- Check drivers license-scanning equipment can give your name, height, weight, age, eye color, birth date, driver's license ID number and expiration date for the purpose of age verification. On the AAMVA web site shows the barcode specification allows for encoding an alias, organ donor status, and undefined "medical indicator/codes".