Testimony Before the US-China Economic and Security Review Commission
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Architect's Guide for Securing Network Equipment
JANUARY 2018 ARCHITECT’S GUIDE FOR SECURING NETWORK EQUIPMENT Trusted Computing Group 3855 SW 153rd Drive Tel (503) 619-0562 Fax (503) 644-6708 [email protected] www.trustedcomputinggroup.org Architect’s Guide for Security Network Equipment Copyright© 2018 Trusted Computing Group | All Rights Reserved ARCHITECT’S GUIDE FOR SECURING NETWORK EQUIPMENT As part of the critical infrastructure of an enterprise, network equipment (Side Bar 1) is subject to the same types of attacks and threats as PCs, servers and the network itself. THESE THREATS INCLUDE: UNAUTHORIZED DEVICES UNAUTHORIZED CODE FIRMWARE IMPLANTS THAT 1 THAT CAN GAIN ACCESS 2 THAT CAN INTERFERE 3 CAN RENDER ATTACKS TO NETWORKED DATA WITH SAFE OPERATION INVISIBLE AND UNREMOVABLE Preserving the integrity and security of network equipment is essential to maintaining customer privacy and network reliability. Trusted Computing solutions can be used to provide these requirements. This Architect’s Guide makes the case for addressing network security and provides some initial guidance from ongoing efforts in this area. AWARENESS PRIOR TO ACTION Experts in providing trust to all aspects of an It is important to distinguish network security enterprise have found that many designers are not provided by items such as firewalls, VPNs, MPLS concerned about protecting the low-level, embedded domains, access lists, intrusion detection, network portions of their infrastructure. For example, those access controls, Radius, DMZs and a host of other people who are interested specifically in network functions that prevent inappropriate access to security are extremely concerned about almost all networked resources, from Secure Network aspects that involve anti-viruses and software but Equipment. -
Technologically Mediated Artisanal Production Tamara Kneese University of San Francisco, [email protected]
The University of San Francisco USF Scholarship: a digital repository @ Gleeson Library | Geschke Center Media Studies College of Arts and Sciences 10-8-2014 Technologically Mediated Artisanal Production Tamara Kneese University of San Francisco, [email protected] Follow this and additional works at: https://repository.usfca.edu/ms Part of the Communication Technology and New Media Commons, and the Work, Economy and Organizations Commons Recommended Citation Kneese, Tamara, "Technologically Mediated Artisanal Production" (2014). Media Studies. 17. https://repository.usfca.edu/ms/17 This Article is brought to you for free and open access by the College of Arts and Sciences at USF Scholarship: a digital repository @ Gleeson Library | Geschke Center. It has been accepted for inclusion in Media Studies by an authorized administrator of USF Scholarship: a digital repository @ Gleeson Library | Geschke Center. For more information, please contact [email protected]. Technologically Mediated Artisanal Production by Tamara Kneese, Alex Rosenblat, and danah boyd Data & Society Working Paper, October 8, 2014 Prepared for: Future of Work Project supported by Open Society Foundations Brief Description As traditional mass manufacturing in the tech, textile, and auto industries has largely left the United States and relocated to the Global South, post-industrial forms of work have taken the place of this kind of labor. And yet, the disappearance of manufacturing jobs and the dire straits of formerly great Rust Belt cities like Detroit have led to a kind of nostalgia for both industrial and artisanal modes of production. Manufacturing still exists in the United States, but there is movement towards a new kind of labor process and product. -
Maker Culture and Minecraft: Implications for the Future of Learning
Educational Media International ISSN: 0952-3987 (Print) 1469-5790 (Online) Journal homepage: https://www.tandfonline.com/loi/remi20 Maker culture and Minecraft: implications for the future of learning Dodie J. Niemeyer & Hannah R. Gerber To cite this article: Dodie J. Niemeyer & Hannah R. Gerber (2015) Maker culture and Minecraft: implications for the future of learning, Educational Media International, 52:3, 216-226, DOI: 10.1080/09523987.2015.1075103 To link to this article: https://doi.org/10.1080/09523987.2015.1075103 Published online: 30 Oct 2015. Submit your article to this journal Article views: 1651 View related articles View Crossmark data Citing articles: 21 View citing articles Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=remi20 Educational Media International, 2015 Vol. 52, No. 3, 216–226, http://dx.doi.org/10.1080/09523987.2015.1075103 Maker culture and Minecraft: implications for the future of learning Dodie J. Niemeyer* and Hannah R. Gerber Department of Language, Literacy and Special Populations, Sam Houston State University, Huntsville, TX, USA Collaborative learning environments found with gaming communities can provide excellent structures to study the way that learners act within informal learning environments. For example, many of these gaming communities encour- age gamers to create videogames and virtual world walkthroughs and commen- taries. Walkthroughs and commentaries provide gamers information that helps them in game play. We refer to this process of walkthrough creation as digital maker culture. This study explored the phenomena of digital maker culture through a multiple case study design by examining five Minecraft walkthrough creators who created walkthrough repositories on YouTube. -
The Makings of China's Hackerspace Community
Forum communiTy + cuLTure Community + Culture features practitioner perspectives on designing technologies for and with communities. We highlight compelling projects and provocative points of view that speak to both community technology practice and the interaction design field as a whole. Christopher A. Le Dantec Created in China: The Makings of China’s Hackerspace Community Silvia Lindtner University of California, Irvine | [email protected] David Li XinCheJian | [email protected] Hackerspaces are shared studios In September 2010, China’s first that bring together people commit- hackerspace opened its doors ted to the free and open sharing of in Shanghai under the name software and hardware, as well as XinCheJian 新车间 (literal transla- ideas and knowledge. As of April tion: new workshop, or new factory). 2012, there are more than 500 active Only a year after the founding of hackerspaces in existence world- XinCheJian, the Shanghai govern- wide, making them a global phe- ment announced a call for proposals nomenon [1]. A typical studio will be to build 100 “innovation houses” equipped with tools that allow for (chuangxin wu 创新屋) to be sup- experimenting with the physical/ ported by government funding. digital boundary—laser cutters, 3-D Although the official document [4] printers, microcontroller kits, and described this initiative as part of so forth. Many hackerspaces also a larger effort to build a citywide host educational workshops where platform for supporting popular sci- these tools are used to teach others ence work and innovation, national about manipulating the physical and international media inter- environment through software, or preted this move as an endorse- vice versa. -
Maker Culture in CMU SCS Part II: 3D Printing Dave Touretzky November, 2013
Maker Culture in CMU SCS Part II: 3D Printing Dave Touretzky November, 2013 http://www.cs.cmu.edu/~dst/Maker 1 3D Printing vs. Laser Cutter X Slower X Less precise X More expensive X Limited materials X Support material may be required Complex 3D structures! 2 Low Cost 3D Printers • RepRap: 2005 onward – Adrian Bowyer, University of Bath (UK) – Goal: open source 3D printer that can replicate itself – 4 generations: Darwin, Mendel, Prusa Mendel, Huxley – Spawned many start-ups • Makerbot – Evolved from RepRap; initially was open source – Cupcake, Thing-o-Matic, Makerbot2, Replicator • Solidoodle ($500) • Cube • Many, many more… 3 Cube Components “Cube tube” Extruder Material cartridge Print pad USB port for flash drive Touch panel display and power button 4 2nd Generation Cube • Prints ABS (acrylonitrile butadiene styrene) or PLA (polylactic acid). • Faster than original cube. • Better precision (200 microns vs. 250 for original model.) • No heated bed: saves time. • Can print “hollow” or “solid” objects. • Same cost as the original: $1300. • Buy it at Staples, or at Cubify.com. 5 Inside the Cartridge • Chip in cartridge tracks how much material used. • No actual sensing. 6 Changing Cartridges • Takes several minutes for the extruder to heat. • Never yank filament out of the extruder! – Can damage the mechanism. – If a piece breaks off, the extruder will clog. – Once it heats up, the filament comes out easily. • Always reinstall the thumbscrew to protect the cartridge. 7 The Cube Extruder Heated section Image from cubifyfans.blogspot.com 8 Cutting the Filament A simple 45o cut will help to prevent jams in the extruder. -
Tech & Policy Initiative, Working Paper Series 2
Tech & Policy Initiative, Working Paper Series 2 It is with great pleasure that I invite you to read this second volume of Columbia SIPA’s Tech & Policy Initiative’s Working Paper Series. Building on the insights of the first volume, the second volume features working papers produced by SIPA-supported expert and next generation scholars who are engaging critical areas related to the impact of digital technology on society and institutions. The papers are multi-disciplinary and forward-looking, engaging complex subjects including the critical areas of Internet and data governance, the dynamics of cyber conflict and cyber sovereignty, how digital technology has impacted traditional economic sectors and business models, or other areas. This academic work was undertaken with vital support of the Carnegie Corporation of New York as part of SIPA’s Tech & Policy Initiative, an ambitious effort to explore the digital world and SIPA’s core fields of study. Since its inception, the Tech and Policy Initiative has sought to bridge the gap between policymakers, academics and practitioners in cybersecurity, internet governance and the digital economy through convening, research, training and other activities. The Tech & Policy Initiative draws on many disciplines and talented researchers within SIPA, in other parts of Columbia University, and outside entities to develop insights that will translate into better and more effective policies, and to inform government policies and private sector actions. This volume also includes papers prepared for SIPA’s 2017 Global Digital Futures Policy Forum, an annual conference that brought together more than 100 scholars, private sector leaders, legal experts, entrepreneurs, technologists, and others to discuss the challenges of internet fragmentation. -
Building a Maker Community Aroundan Open Hardware Platform
Building a Maker Community Around an Open Hardware Platform Fabio Morreale1, Giulio Moro1, Alan Chamberlain2, Steve Benford2, and Andrew P. McPherson1 1Centre for Digital Music, Queen Mary University of London, UK 2Mixed Reality Laboratory, The University of Nottingham, UK 1{f.morreale,g.moro,a.mcpherson}@qmul.ac.uk 2{alan.chamberlain,steve.benford}@nottingham.ac.uk ABSTRACT on shared interests or shared usage of particular technical tools This paper reflects on the dynamics and practices of building [8, 22]. a maker community around a new hardware platform. We ex- Most studies of maker communities have focused on estab- amine the factors promoting the successful uptake of a maker lished, stable communities [8, 24, 26, 28, 44, 46]. Compar- platform from two perspectives: first, we investigate the tech- atively little is known about how new maker communities nical and user experience considerations that users identify as emerge, partly because the identification of a group of people the most important. Second, we explore the specific activities as a “community” can only be done with any certainty in retro- that help attract a community and encourage sustained partici- spect. In particular, the process by which user groups develop pation. We present an inductive approach based on the case around new digital tools, and how design decisions influence study of Bela, an embedded platform for creating interactive the dynamics of the user community, merit further study. audio systems. The technical design and community building processes are detailed, culminating in a successful crowdfund- In this paper, we present a longitudinal study of the emergence ing campaign. -
Articles Other People's Papers
BAMBAUER.TOPRINTER (DO NOT DELETE) 11/25/2015 2:06 PM Articles Other People’s Papers Jane Bambauer* The third-party doctrine permits the government to collect consumer records without implicating the Fourth Amendment. The doctrine strains the reasoning of all possible conceptions of the Fourth Amendment and is destined for reform. So far, scholars and jurists have advanced proposals using a cramped analytical model that attempts to balance privacy and security. They fail to account for the filterability of data. Filtering can simultaneously expand law enforcement access to relevant information while reducing access to irrelevant information. Thus, existing proposals will distort criminal justice by denying police a resource that can cabin discretion, increase distributional fairness, and exculpate the wrongly accused. This Article offers the first comprehensive analysis of third-party data in police investigations by considering interests beyond privacy and security. First, it shows how existing proposals to require suspicion or a warrant will inadvertently conflict with other constitutional values, including equal protection, the First Amendment, and the due process rights of the innocent. Then, it offers surgical reforms that address the most problematic applications of the doctrine: suspect-driven data collection and bulk data collection. Well- designed reforms to the third-party doctrine will shut down the data collection practices that most seriously offend civil liberties without impeding valuable, liberty-enhancing innovations in -
CYBER! Andrea M
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Brigham Young University Law School BYU Law Review Volume 2017 | Issue 5 Article 6 July 2017 CYBER! Andrea M. Matwyshyn Follow this and additional works at: https://digitalcommons.law.byu.edu/lawreview Part of the Computer Law Commons, and the National Security Law Commons Recommended Citation Andrea M. Matwyshyn, CYBER!, 2017 BYU L. Rev. 1109 (2018). Available at: https://digitalcommons.law.byu.edu/lawreview/vol2017/iss5/6 This Article is brought to you for free and open access by the Brigham Young University Law Review at BYU Law Digital Commons. It has been accepted for inclusion in BYU Law Review by an authorized editor of BYU Law Digital Commons. For more information, please contact [email protected]. 3.MATWYSHYN_FIN.NO HEADERS.DOCX (DO NOT DELETE) 3/12/2018 10:45 AM CYBER! Andrea M. Matwyshyn∗ This Article challenges the basic assumptions of the emerging legal area of “cyber” or “cybersecurity.” It argues that the two dominant “cybersecurity” paradigms—information sharing and deterrence—fail to recognize that corporate information security and national “cybersecurity” concerns are inextricable. This problem of “reciprocal security vulnerability” means that in practice our current legal paradigms channel us in suboptimal directions. Drawing insights from the work of philosopher of science Michael Polanyi, this Article identifies three flaws that pervade the academic and policy analysis of security, exacerbating the problem of reciprocal security vulnerability—privacy conflation, incommensurability, and internet exceptionalism. It then offers a new paradigm—reciprocal security. Reciprocal security reframes information security law and policy as part of broader security policy, focusing on two key elements: security vigilance infrastructure and defense primacy. -
The Maker Movement in Education
The Maker Movement in Education Mary Rinehart, M.A.Ed. The Maker Movement in Education Have you ever made something? Have you ever shared your gift with another? Making and sharing is part of what makes us human. A makerspaces is a facility where people share resources and collaborate to build and innovate products. Makerspaces make tools available to people who want to design and create something new. The maker movement has allowed ideas to be turned into inventions by giving people access to the tools and collaborative space that they need to prototype a design. Before makerspaces were developed, an innovative idea could cost anywhere from $50,000- $300,000 to turn into a prototype. It had to be researched, designed, prototyped, and then it would be market tested. If the results were favorable, it had a chance at making it out of the gate as a new product. A beginning entrepreneur had few options but using his or her own funds or borrowing funding to make the project happen. Makerspaces have made it much more efficient to innovate. A new idea can now be researched, designed, prototyped, and market tested by the entrepreneur. A person no longer needs to The need for makerspaces has risen out of send something out to engineers to be 3 things: designed, and cut. An entrepreneur can do it 1. The need for qualified STEM themselves by taking classes at a makerspace professionals entering the workforce and filling in any gaps of knowledge online. If (US Dept. of Commerce expects 17% they have a worthy idea, they can pursue it growth in STEM fields between 2014- and see if people would be willing to purchase 2024) a product that they are interested in making 2. -
Innovation Through Experience Research Summary
Research Summary Innovation Through Experience Reshaping Learning Spaces for Makers, Hackers, and Coworkers Key Insights How do people become innovators? In today’s economy, it’s often a hands-on approach. A growing community of makers, • Universal access to the Internet and breakthroughs in hackers, and coworkers are creating an emerging culture of manufacturing have democratized innovation, creating “learning by doing” that is shifting how future workers learn a new driver for the economy. to innovate. • To thrive in this economy, people need opportunities As schools prepare the next generation to engage in this maker to tinker (make), deconstruct (hack), and network economy, they’re creating a new kind of learning space where (cowork). students can engage in a combination of hands-on processes • Academic institutions have an opportunity to prepare and networking to bring their ideas to life. To better understand the next generation of innovators by designating this shift, Herman Miller researchers leveraged insights from learning spaces for making, hacking, and coworking. prior Herman Miller research on the Future of Learning, toured • The most effective innovation spaces combine all three university campuses, and interviewed education and business activities in one centrally located site that’s thought leaders. approachable to everyone. Innovation Through Experience 1 Research Summary Map of participating sites WA. ME. MT. N.D. VT. OR. MN. N.H. WI. N.Y. ID. S.D. MA. CT. MI. WY. R.I. PA. IA. N.J. NE. NV. OH. MD IL. IN. DE. UT. W. CO. VA. DC. CA. VA. KS. MO. KY. N.C. TN. The SHED, University of CA, Berkeley Geek Group AZ. -
How Cloudflare's Architecture Can Scale to Stop the Largest Attacks
How Cloudflare’s Architecture can Scale to Stop the Largest Attacks 1 888 99 FLARE | [email protected] | www.cloudflare.com Executive Summary New Mirai-based IoT botnets are used to stage the largest ever cyber-attacks. In a recent attack against Dyn, huge patches of the Internet were affected with a large number of high profile sites experiencing service disruptions and outages. Traditional hardware based DDoS mitigation services based in a few scrubbing locations cannot scale to win in the arms race against distributed and essentially free botnets. Cloudflare believes that architecture matters and that the only solution against massively distributed botnets is a massively distributed network. Cloudflare has based its service on this architectural approach, and while there are limits to any service, so far Cloudflare has not been impacted by any IoT botnet attack. New Mirai-based IoT Botnets Pose a New Degree of Cyber-Attacks On 21 October 2016 a massive and sustained distributed Denial- of-Service (DDoS) attack impacted huge parts of the Internet, interrupting or bringing down high profile web sites and services, such as Airbnb, Amazon.com, BBC, CNN, Comcast, DirecTV, Fox Assuming a device is publicly News, Netflix, The New York Times, Paypal, Pinterest, Reddit, accessible, the chance of being Tumblr, Twitter, Verizon Communications, Visa, The Wall Street hacked is probably 100 percent. Journal, Yelp, Zillow and many others (a more comprehensive list The IPv4 address space just can be found at https://en.wikipedia.org/wiki/2016_Dyn_cyberattack). The direct target of the attack was Dyn, a DNS service provider, isn’t that big.