Cyberattack Capabilities

Total Page:16

File Type:pdf, Size:1020Kb

Cyberattack Capabilities Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of CYBerattacK CapaBILITIes William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Editors Committee on Offensive Information Warfare Computer Science and Telecommunications Board Division on Engineering and Physical Sciences THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, DC 20001 NOTICE: The project that is the subject of this report was approved by the Gov- erning Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engi- neering, and the Institute of Medicine. The members of the committee responsible for the report were chosen for their special competences and with regard for appropriate balance. Support for this project was provided by the MacArthur Foundation under award number 04-80965-000-GSS, the Microsoft Corporation under an unnumbered award, and the NRC Presidents’ Committee under an unnumbered award. Any opinions, findings, conclusions, or recommendations expressed in this pub- lication are those of the authors and do not necessarily reflect the views of the organizations that provided support for the project. International Standard Book Number-13: 978-0-309-13850-5 International Standard Book Number-10: 0-309-13850-7 Library of Congress Control Number: 2009930416 Additional copies of this report are available from: The National Academies Press 500 Fifth Street, N.W., Lockbox 285 Washington, DC 20055 (800) 624-6242 (202) 334-3313 (in the Washington metropolitan area) Internet: http://www.nap.edu Copyright 2009 by the National Academy of Sciences. All rights reserved. Printed in the United States of America The National Academy of Sciences is a private, nonprofit, self-perpetuating society of distinguished scholars engaged in scientific and engineering research, dedicated to the furtherance of science and technology and to their use for the general welfare. Upon the authority of the charter granted to it by the Congress in 1863, the Academy has a mandate that requires it to advise the federal govern- ment on scientific and technical matters. Dr. Ralph J. Cicerone is president of the National Academy of Sciences. The National Academy of Engineering was established in 1964, under the char- ter of the National Academy of Sciences, as a parallel organization of outstand- ing engineers. It is autonomous in its administration and in the selection of its members, sharing with the National Academy of Sciences the responsibility for advising the federal government. The National Academy of Engineering also sponsors engineering programs aimed at meeting national needs, encourages education and research, and recognizes the superior achievements of engineers. Dr. Charles M. Vest is president of the National Academy of Engineering. The Institute of Medicine was established in 1970 by the National Academy of Sciences to secure the services of eminent members of appropriate professions in the examination of policy matters pertaining to the health of the public. The Institute acts under the responsibility given to the National Academy of Sciences by its congressional charter to be an adviser to the federal government and, upon its own initiative, to identify issues of medical care, research, and education. Dr. Harvey V. Fineberg is president of the Institute of Medicine. The National Research Council was organized by the National Academy of Sciences in 1916 to associate the broad community of science and technology with the Academy’s purposes of furthering knowledge and advising the federal government. Functioning in accordance with general policies determined by the Academy, the Council has become the principal operating agency of both the National Academy of Sciences and the National Academy of Engineering in pro- viding services to the government, the public, and the scientific and engineering communities. The Council is administered jointly by both Academies and the Institute of Medicine. Dr. Ralph J. Cicerone and Dr. Charles M. Vest are chair and vice chair, respectively, of the National Research Council. www.national-academies.org Committee on OFFENSIVE INFORMATION WARFARE WILLIAM A. OWENS, AEA Holdings, Inc., Co-chair KENNETH W. DAM, University of Chicago, Co-chair THOMAS A. BERSON, Anagram Laboratories GERHARD CASPER, Stanford University DAVID D. CLARK, Massachusetts Institute of Technology RICHARD L. GARWIN, IBM Fellow Emeritus JACK L. GOLDSMITH III, Harvard Law School CARL G. O’BERRY, The Boeing Company JEROME H. SALTZER, Massachusetts Institute of Technology (retired) MARK SEIDEN, MSB Associates SARAH SEWALL, Harvard University WALTER B. SLOCOMBE, Caplin & Drysdale WILLIAM O. STUDEMAN, U.S. Navy (retired) MICHAEL A. VATIS, Steptoe & Johnson LLP Staff HERBERT S. LIN, Study Director KRISTEN BATCH, Associate Staff Officer (through August 2008) TED SCHMITT, Consultant JANICE SABUDA, Senior Project Assistant (through March 2008) ERIC WHITAKER, Senior Project Assistant COMPUTER SCIENCE AND TELECOMMUNICATIONS BOARD JOSEPH F. TRAUB, Columbia University, Chair PRITHVIRAJ BANERJEE, Hewlett Packard Company FREDERICK R. CHANG, University of Texas, Austin WILLIAM DALLY, Stanford University MARK E. DEAN, IBM Almaden Research Center DEBORAH L. ESTRIN, University of California, Los Angeles KEVIN C. KAHN, Intel Corporation JAMES KAJIYA, Microsoft Corporation RANDY H. KATZ, University of California, Berkeley JOHN E. KELLY III, IBM Research SARA KIESLER, Carnegie Mellon University JON KLEINBERG, Cornell University PETER LEE, Carnegie Mellon University TERESA H. MENG, Stanford University WILLIAM H. PRESS, University of Texas, Austin PRABHAKAR RAGHAVAN, Yahoo! Research DAVID E. SHAW, D.E. Shaw Research ALFRED Z. SPECTOR, Google, Inc. ROBERT F. SPROULL, Sun Microsystems, Inc. PETER SZOLOVITS, Massachusetts Institute of Technology ANDREW J. VITERBI, Viterbi Group, LLC PETER WEINBERGER, Google, Inc. JON EISENBERG, Director RENEE HAWKINS, Financial and Administrative Manager HERBERT S. LIN, Chief Scientist, CSTB LYNETTE I. MILLETT, Senior Program Officer NANCY GILLIS, Program Officer Enita A. williams, Associate Program Officer MORGAN R. MOTTO, Program Associate Shenae Bradley, Senior Program Assistant ERIC WHITAKER, Senior Program Assistant For more information on CSTB, see its website at http://www.cstb.org, write to CSTB, National Research Council, 500 Fifth Street, N.W., Wash- ington, DC 20001, call (202) 334-2605, or e-mail CSTB at [email protected]. i Preface Given the reality of a densely interconnected information society, much has been written about the possibility that adversaries of the United States such as terrorists or hostile nations might conduct very damag- ing cyberattacks against critical sectors of the U.S. economy and critical national infrastructure that depend on reliably functioning, secure com- puter systems and networks. For some years, the topic of cybersecurity has been an important part of the report portfolio of the National Research Council,1 and a great deal of national attention has been given, in public, to the problem of how to protect U.S. information technology systems and networks against such attacks—that is, how to defend these systems and networks in both military and non-military contexts.2 But, perhaps reflect- ing the common wisdom of the time, these efforts have focused almost exclusively on the cyberdefense side of the equation. The possibility that the United States might choose to engage in cyberattacks to serve its own national interests—in cyberdefense as well 1 An old but still quite relevant report on this topic is CSTB/National Research Council, Computers at Risk, National Academy Press, Washington, D.C., 1991; other relevant NRC reports include CSTB/NRC, Trust in Cyberspace, National Academy Press, Washington, D.C., 1999, and NRC, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007. 2 See, for example, National Research Council, Information Technology for Counter- terrorism, The National Academies Press, Washington, D.C., 2003; NRC, Cybersecurity Today and Tomorrow: Pay Now or Pay Later, The National Academies Press, Washington, D.C., 2002; and CSTB/NRC, Realizing the Potential of C4I: Fundamental Challenges, National Academy Press, Washington, D.C., 1998. ii iii PREFACE as in other areas—is rarely discussed in public. One recent public hint of U.S. government interest in the topic can be found in the still-classi- fied Comprehensive National Cybersecurity Initiative (CNCI), which was adopted as national policy in January 2008 as part of National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD-23). According to the director of national intelligence in February 2009, “The CNCI addresses current cybersecurity threats, anticipates future threats and technologies, and develops a framework for creating in partnership with the private sector an environment that no longer favors cyber intruders over defenders. The CNCI includes defen- sive, offensie [emphasis added], education, research and development, and counterintelligence elements.”3 Press reports indicated that the CNCI involves 12 components designed to protect computer networks and systems and to improve information technology processes and policies.4 These components included a program to reduce the number of connec- tions from federal agencies to external computer networks to 100 or fewer. The other 11 programs address intrusion detection; intrusion prevention; research and
Recommended publications
  • The Operational Aesthetic in the Performance of Professional Wrestling William P
    Louisiana State University LSU Digital Commons LSU Doctoral Dissertations Graduate School 2005 The operational aesthetic in the performance of professional wrestling William P. Lipscomb III Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_dissertations Part of the Communication Commons Recommended Citation Lipscomb III, William P., "The operational aesthetic in the performance of professional wrestling" (2005). LSU Doctoral Dissertations. 3825. https://digitalcommons.lsu.edu/gradschool_dissertations/3825 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Doctoral Dissertations by an authorized graduate school editor of LSU Digital Commons. For more information, please [email protected]. THE OPERATIONAL AESTHETIC IN THE PERFORMANCE OF PROFESSIONAL WRESTLING A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Doctor of Philosophy in The Department of Communication Studies by William P. Lipscomb III B.S., University of Southern Mississippi, 1990 B.S., University of Southern Mississippi, 1991 M.S., University of Southern Mississippi, 1993 May 2005 ©Copyright 2005 William P. Lipscomb III All rights reserved ii ACKNOWLEDGMENTS I am so thankful for the love and support of my entire family, especially my mom and dad. Both my parents were gifted educators, and without their wisdom, guidance, and encouragement none of this would have been possible. Special thanks to my brother John for all the positive vibes, and to Joy who was there for me during some very dark days.
    [Show full text]
  • A Double Horizon Defense Design for Robust Regulation of Malicious Traffic
    University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering August 2006 A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Ying Xu University of Pennsylvania, [email protected] Roch A. Guérin University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/ese_papers Recommended Citation Ying Xu and Roch A. Guérin, "A Double Horizon Defense Design for Robust Regulation of Malicious Traffic", . August 2006. Copyright 2006 IEEE. In Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/ese_papers/190 For more information, please contact [email protected]. A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Abstract Deploying defense mechanisms in routers holds promises for protecting infrastructure resources such as link bandwidth or router buffers against network Denial-of-Service (DoS) attacks. However, in spite of their efficacy against bruteforce flooding attacks, existing outer-basedr defenses often perform poorly when confronted to more sophisticated attack strategies.
    [Show full text]
  • Speeding up Correlation Search for Binary Data
    Speeding up Correlation Search for Binary Data Lian Duan and W. Nick Street [email protected] Management Sciences Department The University of Iowa Abstract Finding the most interesting correlations in a collection of items is essential for problems in many commercial, medical, and scientific domains. Much previous re- search focuses on finding correlated pairs instead of correlated itemsets in which all items are correlated with each other. Though some existing methods find correlated itemsets of any size, they suffer from both efficiency and effectiveness problems in large datasets. In our previous paper [10], we propose a fully-correlated itemset (FCI) framework to decouple the correlation measure from the need for efficient search. By wrapping the desired measure in our FCI framework, we take advantage of the desired measure’s superiority in evaluating itemsets, eliminate itemsets with irrelevant items, and achieve good computational performance. However, FCIs must start pruning from 2-itemsets unlike frequent itemsets which can start the pruning from 1-itemsets. When the number of items in a given dataset is large and the support of all the pairs cannot be loaded into the memory, the IO cost O(n2) for calculating correlation of all the pairs is very high. In addition, users usually need to try different correlation thresholds and the cost of processing the Apriori procedure each time for a different threshold is very high. Consequently, we propose two techniques to solve the efficiency problem in this paper. With respect to correlated pair search, we identify a 1-dimensional monotone prop- erty of the upper bound of any good correlation measure, and different 2-dimensional monotone properties for different types of correlation measures.
    [Show full text]
  • Here Is a Printable
    James Rosario is a film critic, punk rocker, librarian, and life-long wrestling mark. He grew up in Moorhead, Minnesota/Fargo, North Dakota going to as many punk shows as possible and trying to convince everyone he met to watch his Japanese Death Match and ECW tapes with him. He lives in Asheville, North Carolina with his wife and two kids where he writes his blog, The Daily Orca. His favorite wrestlers are “Nature Boy” Buddy Rogers, The Sheik, and Nick Bockwinkel. Art Fuentes lives in Orange County, Califonia and spends his days splashing ink behind the drawing board. One Punk’s Guide is a series of articles where Razorcake contributors share their love for a topic that is not traditionally considered punk. Previous Guides have explored everything from pinball, to African politics, to outlaw country music. Razorcake is a bi-monthly, Los Angeles-based fanzine that provides consistent coverage of do-it-yourself punk culture. We believe in positive, progressive, community-friendly DIY punk, and are the only bona fide 501(c)(3) non-profit music magazine in America. We do our part. One Punk’s Guide to Professional Wrestling originally appeared in Razorcake #101, released in December 2017/January 2018. Illustrations by Art Fuentes. Original layout by Todd Taylor. Zine design by Marcos Siref. Printing courtesy of Razorcake Press, Razorcake.org ONE PUNK’S GUIDE TO PROFESSIONAL WRESTLING ’ve been watching and following professional wrestling for as long as I can remember. I grew up watching WWF (World Wrestling IFederation) Saturday mornings in my hometown of Moorhead, Minn.
    [Show full text]
  • Narrative Change in Professional Wrestling: Audience Address and Creative Authority in the Era of Smart Fans
    Georgia State University ScholarWorks @ Georgia State University Communication Dissertations Department of Communication 1-6-2017 Narrative Change in Professional Wrestling: Audience Address and Creative Authority in the Era of Smart Fans Christian Norman Follow this and additional works at: https://scholarworks.gsu.edu/communication_diss Recommended Citation Norman, Christian, "Narrative Change in Professional Wrestling: Audience Address and Creative Authority in the Era of Smart Fans." Dissertation, Georgia State University, 2017. https://scholarworks.gsu.edu/communication_diss/77 This Dissertation is brought to you for free and open access by the Department of Communication at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Communication Dissertations by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. NARRATIVE CHANGE IN PROFESSIONAL WRESTLING: AUDIENCE ADDRESS AND CREATIVE AUTHORITY IN THE ERA OF SMART FANS by CHRISTIAN NORMAN Under the Direction of Nathan Atkinson, PhD ABSTRACT This dissertation project provides a methodological contribution to the field of critical rhetoric by positioning narrative theory as a powerful yet underutilized tool for examining the power dynamic between producer and consumer in a participatory media context. Drawing on theories of author and audience from rhetorical narratology, this study shows how producers of media texts provide rhetorical cues to audiences that allow them to reassert their power in the form of creative authority vis-à-vis consumers. The genre of professional wrestling serves as an ideal text for examining such power dynamics, as WWE has adapted to changing fan participatory behaviors throughout its sixty-year history. Focusing on pivotal moments in which WWE altered its narrative address to its audience in order to reassert its control over the production process, this study demonstrates the utility of narrative theory for understanding how creative authority shows power at work in media texts.
    [Show full text]
  • Mining Web User Behaviors to Detect Application Layer Ddos Attacks
    JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 985 Mining Web User Behaviors to Detect Application Layer DDoS Attacks Chuibi Huang1 1Department of Automation, USTC Key laboratory of network communication system and control Hefei, China Email: [email protected] Jinlin Wang1, 2, Gang Wu1, Jun Chen2 2Institute of Acoustics, Chinese Academy of Sciences National Network New Media Engineering Research Center Beijing, China Email: {wangjl, chenj}@dsp.ac.cn Abstract— Distributed Denial of Service (DDoS) attacks than TCP or UDP-based attacks, requiring fewer network have caused continuous critical threats to the Internet connections to achieve their malicious purposes. The services. DDoS attacks are generally conducted at the MyDoom worm and the CyberSlam are all instances of network layer. Many DDoS attack detection methods are this type attack [2, 3]. focused on the IP and TCP layers. However, they are not suitable for detecting the application layer DDoS attacks. In The challenges of detecting the app-DDoS attacks can this paper, we propose a scheme based on web user be summarized as the following aspects: browsing behaviors to detect the application layer DDoS • The app-DDoS attacks make use of higher layer attacks (app-DDoS). A clustering method is applied to protocols such as HTTP to pass through most of extract the access features of the web objects. Based on the the current anomaly detection systems designed access features, an extended hidden semi-Markov model is for low layers. proposed to describe the browsing behaviors of web user. • Along with flooding, App-DDoS traces the The deviation from the entropy of the training data set average request rate of the legitimate user and uses fitting to the hidden semi-Markov model can be considered as the abnormality of the observed data set.
    [Show full text]
  • New Leads Heat up Cold Case Senior Sarah Szoka Decorates Her Advi- Sory’S Christmas Tree During Their Toys for Claybrook Missing
    Wrestlepalooza! ‘Patriot’ Teachers hashes out reveal their JC wrestlers dominate the mats at seasonal event truth on teenage marijuana identities SPORTS 16 IN-DEPTH 8 LIFESTYLE 4 The John Carroll School 703 E. Churchville Rd. Bel Air, MD 21014 theDecember 2010 patriotCheck out JCPATRIOT.COM for the latest news and updates Volume 46 Issue 3 Advisories focus on holiday outreach Photo by Jenny Hottle Photo by Kristin Marzullo New leads heat up cold case Senior Sarah Szoka decorates her advi- sory’s Christmas tree during their Toys for Claybrook missing. mystery of Claybrook’s death “really hits Jenny Hottle, Caroline Spath Tots collection. Advisories are working to On March 10, an off-duty police of- you forever.” Online Chief, Multimedia Editor support families this holiday season. ficer was walking his dog when he found While no signs of a struggle were re- Twenty-seven years after the unsolved Claybrook strangled. She was propped up portedly found at the scene of the body, Grace Kim murder of a JC student, recent news tips against a fence less than a mile from her investigators remain unsure as to whether Managing Editor and an ABC 2 News cold case segment home, in a field now known as the Trails Claybrook was killed onsite or placed there have brought attention to the case. at Gleneagles development, located behind later, according to Brad Helm, the Bel Air Advisories have hung their lights and Jennifer Claybrook, class of ’86, was a Maple View Drive in Bel Air. Police Department detective who is cur- even trimmed their trees.
    [Show full text]
  • Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
    THE NATIONAL ACADEMIES PRESS This PDF is available at http://nap.edu/12651 SHARE Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities DETAILS 390 pages | 6x9 | PAPERBACK ISBN 978-0-309-13850-5 | DOI 10.17226/12651 AUTHORS BUY THIS BOOK William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors; Committee on Offensive Information Warfare; National Research Council FIND RELATED TITLES Visit the National Academies Press at NAP.edu and login or register to get: – Access to free PDF downloads of thousands of scientific reports – 10% off the price of print titles – Email or social media notifications of new titles related to your interests – Special offers and discounts Distribution, posting, or copying of this PDF is strictly prohibited without written permission of the National Academies Press. (Request Permission) Unless otherwise indicated, all materials in this PDF are copyrighted by the National Academy of Sciences. Copyright © National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of CYBerattacK CapaBILITIes William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Editors Committee on Offensive Information Warfare Computer Science and Telecommunications Board Division on Engineering and Physical Sciences Copyright National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, DC 20001 NOTICE: The project that is the subject of this report was approved by the Gov- erning Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engi- neering, and the Institute of Medicine.
    [Show full text]
  • Report of the National Security Agency Texas Cryptologic Center
    UNCLASSIFIED/fFOR OFFIOb9tL UOE ONLY UNCLASSIFIED/JFOR OFFIGIAL UOE OPJL¥ UNCLASS.IFIED//FOR OFFICIAL USE OPJLY INSPECTOR GENERAL DEPARTMENT OF DEFENSE 400 ARMY NAVY DRIVE ARLINGTON, VIRGINIA 22202-2884 December 3, 2010 MEMORANDUM FOR COMMANDER, UNITED STATES PACIFIC COMMAND DIRECTOR, NAT.fONAL SECURJTY AGENCY/CHIEF CENTRAL SECURITYSERVICE COMMANDER, UNITED STATES ARMY CORP OF ENGINEERS SUBJECT: (U//fOUO) Report ofthe National Security Agency Texas Cryptologic Center Construction Project (Report No. I I -fNTEL-02). (U//fi'8H8) Background: This review was conducted as part of our audit of the National Security Agency (NSA) Cryptologic Center construction projects. This report focuses on the National Security Agency Texas (NSAT) construction project. We issued a report on the NSA Georgia Cryptologic Center military construction (MILCON) project on August 6, 2010. We do not intend to review the military construction ofthe NSA Hawaii Cryptologic Center due to competing resource requirements. We found no· significant issues with the NSA Georgia or Texas and the Hawaji MILCON is complete. (U/foFOUO) The existing NSAT building is located at the Medina Training. Annex of Lackland Air Force Base (AFB) in Northwest San Antonio, Texas. NSAT conducts Signals Intelligence and Computer Network Operations worldwide, in support of National and tactical decision-makers and customers/partners. NSAT applies geographic and functional expertise in exploiting targets operating in the Western Hemisphere and those posing a threat to Homeland Security. (UhTOUO' On January 31, 2005, Acting USD (AT&L) -.vrote to the Deputy Secretary of Defense stating that the United States Anny Corps ofEngineers (USACE), on behalfof NSA, proposed relocating from Lackland AFB to a commercial-leased facility in San Antonio, Texas.
    [Show full text]
  • Building Ambitious Us Subnational Climate Initiatives: Embracing Dignity and the Tradition of Civic Engagement
    BUILDING AMBITIOUS US SUBNATIONAL CLIMATE INITIATIVES: EMBRACING DIGNITY AND THE TRADITION OF CIVIC ENGAGEMENT A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Doctor of Liberal Studies By Cyd Slayton, M.F.A Georgetown University Washington, D.C. April 2018 Copyright 2018 by Cyd Slayton All Rights Reserved ii BUILDING AMBITIOUS US SUBNATIONAL CLIMATE INITIATIVES: EMBRACING DIGNITY AND THE TRADITION OF CIVIC ENGAGEMENT Cyd Slayton, M.F.A. DLS Chair: Thomas Kerch, Ph.D. ABSTRACT The human activity of emitting greenhouse gasses (GHGs) is contributing to the intensification of extreme weather, according to nearly all climate scientists. Already, atmospheric concentrations of the three most heat-trapping greenhouse gasses (GHGs)— carbon dioxide, methane, and nitrous oxide—are “unprecedented for at least 800,000 years.”1 As a result, heat waves, droughts, floods, cyclones, wildfires, and rising seas are more frequent and powerful. While the planet will survive the climate catastrophes, a destabilized atmosphere threatens all species, including our own. Over the past 25 years, total GHG emissions have continued to rise, despite international and bilateral climate treaties. Generally, the US has refused to ratify treaties that appear to impinge on national sovereignty, including the Kyoto Protocol with its “top 1 IPCC Working Groups I, II and III, Climate Change 2014: Synthesis Report , Contribution to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change, eds. R.K. Pachauri and L.A. Meyer (Geneva: IPCC, 2014), 4, accessed March 2, 2018, https://www.ipcc.ch/pdf/assessment- report/ar5/syr/AR5_SYR_FINAL_SPM.pdf.
    [Show full text]
  • AUGUST 2005 43 Your Defense Is Offensive STEVE MANZUIK EDITOR ;Login: Is the Official WORKPLACE Rik Farrow Magazine of the [email protected] USENIX Association
    A UGUST 2005 VOLUME 30 NUMBER 4 THE USENIX MAGAZINE OPINION Musings RIK FARROWS Conference Password Sniffing ABE SINGER SYSADMIN The Inevitability of Xen JON CROWCROFT, KEIR FRASER, STEVEN HAND, IAN PRATT, AND ANDREW WARFIELD Secure Automated File Transfer MARK MCCULLOUGH SAN vs. NAS for Oracle: A Tale of Two Protocols ADAM LEVIN Practical Perl ADAM TUROFF ISPadmin ROBERT HASKINS L AW Primer on Cybercrime Laws DANI EL L. APPELMAN SECURITY Forensics for System Administrators SEAN PEISERT Your Defense Is Offensive STEVE MANZUIK WORKPLACE Marketing after the Bubble EMILY W. SALUS AND PETER H. SALUS BOOK REVIEWS Book Reviews RIK FAROWS USENIX NOTES SAGE Update DAVID PARTER ...and much more CONFERENCES 2005 USENIX Annual Technical Conference 2nd Symposium on Networked Systems Design and Implementation (NSDI ’05) 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004) The Advanced Computing Systems Association Upcoming Events INTERNET MEASUREMENT CONFERENCE 2005 4TH USENIX CONFERENCE ON FILE AND (IMC ’05) STORAGE TECHNOLOGIES (FAST ’05) Sponsored by ACM SIGCOMM in cooperation with USENIX Sponsored by USENIX in cooperation with ACM SIGOPS, IEEE Mass Storage Systems Technical Committee (MSSTC), OCTOBER 19–21, 2005, NEW ORLEANS, LA, USA and IEEE TCOS http://www.usenix.org/imc05 DECEMBER 14–16, 2005, SAN FRANCISCO, CA, USA http://www.usenix.org/fast05 ACM/IFIP/USENIX 6TH INTERNATIONAL MIDDLEWARE CONFERENCE 3RD SYMPOSIUM ON NETWORKED SYSTEMS NOVEMBER 28–DECEMBER 2, 2005, GRENOBLE, FRANCE DESIGN AND IMPLEMENTATION (NSDI ’06) http://middleware05.objectweb.org
    [Show full text]
  • Funkhouser, C, Baldwin.S, Prehistoric Digital Poetry. Anarchaeologyof
    Prehistoric Digital Poetry MODERN AND CONTEMPORARY POETICS Series Editors Charles Bernstein Hank Lazer Series Advisory Board Maria Damon Rachel Blau DuPlessis Alan Golding Susan Howe Nathaniel Mackey Jerome McGann Harryette Mullen Aldon Nielsen Marjorie Perloff Joan Retallack Ron Silliman Lorenzo Thomas Jerry Ward Prehistoric Digital Poetry An Archaeology of Forms, 1959–1995 C. T. FUNKHOUSER THE UNIVERSITY OF ALABAMA PRESS Tuscaloosa Copyright © 2007 The University of Alabama Press Tuscaloosa, Alabama 35487-0380 All rights reserved Manufactured in the United States of America Typeface: Minion ∞ The paper on which this book is printed meets the minimum requirements of American National Standard for Information Sciences-Permanence of Paper for Printed Library Materials, ANSI Z39.48-1984. Library of Congress Cataloging-in-Publication Data Funkhouser, Chris. Prehistoric digital poetry : an archaeology of forms, 1959–1995 / C. T. Funkhouser. p. cm. — (Modern and contemporary poetics) Includes bibliographical references and index. ISBN-13: 978-0-8173-1562-7 (cloth : alk. paper) ISBN-10: 0-8173-1562-4 (cloth : alk. paper) ISBN-13: 978-0-8173-5422-0 (pbk. : alk. paper) ISBN-10: 0-8173-5422-0 (pbk. : alk. paper) 1. Computer poetry—History and criticism. 2. Computer poetry—Technique. 3. Interactive multimedia. 4. Hypertext systems. I. Title. PN1059.C6F86 2007 808.10285—dc22 2006037512 Portions of I-VI by John Cage have been reprinted by permission of Harvard University Press, Cambridge, Mass, pp. 1, 2, 5, 103, 435. Copyright © 1990 by the President and Fellows of Harvard College. To my comrades in the present and to cybernetic literary paleontologists of the mythic future “The poem is a machine,” said that famous man, and so I’m building one.
    [Show full text]