SRA111: Introduction to Security and Risk Analysis

Total Page:16

File Type:pdf, Size:1020Kb

SRA111: Introduction to Security and Risk Analysis SRA111: Introduction to Security and Risk Analysis Course Description SRA 111 is an introductory course with a broad focus, spanning primarily the areas of security, risk, and risk analysis. In addition to familiarizing the student with basic security terminology, it will also touch upon social and legal issues, risk analysis and mitigation, crime intelligence and forensics, and information warfare and assurance. This course will motivate students to understand the requirements for security in any government agency or business organization through the use of case studies. Included in this segment are cases related to cyberterrorism, bioterrorism, and critical infrastructure protection. Some concepts to be covered in the area of information security are: confidentiality, integrity, availability, and non- repudiation. Various methods of safeguarding these security concerns will be discussed, such as: single- and multi-factor authentication, encryption, digital signatures, prevention of denial of service attacks, and so forth. This course also covers social and legal issues related to security, in particular identity theft and social engineering. Topics in this section include identity theft, spam, spyware, and adware. This course also covers the basic principles and the approaches to risk analysis. Here students study vulnerability analysis, crime and intelligence analysis, forensics, techniques for risk assessment and risk mitigation. The course will prepare students for more in-depth courses such as SRA 211, SRA 221 and SRA 311. This course will incorporate collaborative and action-learning experiences wherever appropriate. Emphasis will be placed on developing and practicing writing and speaking skills through application of the concepts that define the course. Course Objectives Upon completion of the course, the student will: • Understand basic security concepts, terminology and possible solutions. • Develop an understanding of the social and legal issues of security and privacy. • Understand the basics of crime intelligence and forensics analysis. • Be able to apply risk analysis, evaluation and mitigation methods. • Understand information warfare and information assurance. • Have an awareness of current and future trends in information and cyber security. 1 Classes Information Section: 001 Class Time: MWF 11:00-11:50am Class Room: Frable 227 About the Instructor Instructor: Galen A. Grimes, Associate Professor of IST Office: Frable 213 Office Hours: See faculty website Phone/Fax: 412-675-9479 E-mail: [email protected] Web Site: http://www.personal.psu.edu/faculty/g/a/gag5/ 2 Course Materials • Security Awareness—Applying Practical Security in Your World, 4th Ed. Mark Ciampa Copyright © 2014 Course Technology ISBN-13: 978-1-111-64418-5 • Computer Forensics And Cyber Crime, An Introduction, 3rd Ed. Marjie Britz Copyright © 2013 Pearson/Prentice Hall ISBN-13: 978-0-13-267771-4 • Supplemental reading materials at the discretion of the instructor • The New York Times (newspaper) 3 Course Policies • (Any policies implemented by the instructor or campus). • Quizzes will be given throughout the semester, at a rate of approximately 1 per chapter. Quizzes will always cover the material covered since the last Quiz or Exam. The quizzes will be combinations of objective and/or short-answer questions. Makeup quizzes will not be given. Any class material missed by the student is the student's responsibility to acquire. • Students with disabilities. The Pennsylvania State University is committed to providing access to a quality education for all students. Penn State welcomes students with disabilities into the University's educational programs. If a student has a disability- related need for modifications or reasonable accommodations in this course, it is the responsibility of the student to first obtain a University accommodation letter confirming the disability and suggesting appropriate remedies. This letter should be obtained from the campus Disability Contact Liaison. The contact person at Penn State Greater Allegheny is Victoria Garwood (Frable 103, 412-675-9070, [email protected]). Students from other Penn State campuses can find their contact person at http://www.equity.psu.edu/ods/dcl.asp. It is encouraged that students request their accommodation needs early in the semester, and once identified, a reasonable accommodation will be implemented in a timely manner. Students may also access the web site for the Office of Disability Services at University Park for more information: http://www.equity.psu.edu/ods/. • PSU Statement on Academic Integrity. According to the University Advising Handbook: "Academic integrity is the pursuit of scholarly activity free from fraud and deception, and is the educational objective of this institution. Academic dishonesty includes, but is not limited to cheating, plagiarism, fabrication of information or citations, facilitating acts of academic dishonesty by others, unauthorized possession of examinations, submitting work of another person, or work previously used without informing the instructor, or tampering with the academic work of other students. Any violation of academic integrity will be thoroughly investigated, and where warranted, punitive action will be taken." Students should be aware that standards for documentation and intellectual contribution may depend on the course content and method of teaching, and should consult instructors for guidance. 4 Tentative Schedule Week Topics Readings Assignments/Tests 1 Introduction to Information Security— Wired Magazine: “Hackers Remotely Kill a Jeep on the Highway—With Me In It:”, July 21, 2015 http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ Reuters: Researcher says can hack GM OnStar app, open vehicle, start engine, July 30, 2015, http://www.reuters.com/article/2015/07/30/us-gm-hacking- idUSKCN0Q42FI20150730 NPR: All Tech Considered, “Major Flaw In Android Phones Would Let Hackers In With Just A Text”, July 27, 2015 http://www.npr.org/sections/alltechconsidered/2015/07/27/426613020/major- flaw-in-android-phones-would-let-hackers-in-with-just-a-text VIDEO: Bruce Schneier: The Security Mirage (21:05): [cc/t] http://www.ted.com/talks/bruce_schneier.html NPR/On Point, July 26, 2012, A Trade Show for Hackers—Black Hat Conference, http://onpoint.wbur.org/2012/07/26/hackers 2 ***Labor Day*** VIDEO: Nerds 2.0 Volume 1, “Networking the Nerds”, Part 1 [cc] Discussion Activity 1— Personal Security Risks VIDEO: Nerds 2.0 Volume 1, “Networking the Nerds”, Part 2 [cc] 3 Introduction to Security Chapter 1— Discussion Activity 2— Ciampa Malicious Code VIDEO: Mikko Hypponen—Fighting Viruses, Defending the Net (17:36): [cc/t] http://www.ted.com/talks/lang/eng/mikko_hypponen_fighting_viruses_defend ing_the_net.html [VIDEO-MikkoHypponen_2011g.mp4] NPR: Marketplace, How One Hack Got to Engineers with Security Clearance, Sept 10 2013, http://www.marketplace.org/topics/tech/how-one-hack-got- engineers-security-clearances 5 NPR: All Things Considered, Security Firm Hacks a Car With a Text— Chapter Review Questions— August 29, 2011 [cc/t], http://www.npr.org/2011/08/29/140042759/security- Chapter 1—Ciampa firm-hacks-a-car-with-a-text NPR: All Tech Considered, With Smarter Cars, The Doors Are Open To Hacking Dangers—July 30, 2013, http://www.npr.org/blogs/alltechconsidered/2013/07/30/206800198 /Smarter-Cars-Open-New-Doors-To-Smarter-Thieves 4 Introduction and Overview of Computer Forensics and Cybercrime Chapter 1— Discussion Activity 3— Britz Security Access Controls Discussion Questions—Chapter 1 (Britz) Discussion Questions 1-5, p.22 NPR: Morning Edition, Dear Apple: Good Luck Against The Quiz—Chapter 1 (Ciampa) Smartphone Black Market—Sept 16 2013, http://www.npr.org/blogs/alltechconsidered/2013/09/16/222125010/ dear-apple-good-luck-against-the-smartphone-black-market 5 Desktop Security Chapter 2— Discussion Activity 4— Ciampa Security Policy NPR: All Things Considered/All Tech Considered, Hunting for a Password That Only You Will Know [cc/t] http://www.npr.org/2011/07/25/138672758/hunting-for-a-password-that-only- you-will-know NPR: All Things Considered/All Tech Considered, How to Protect Yourself From Hacking [cc/t] http://www.npr.org/templates/rundowns/rundown.php?prgId=2&prgDate=7- 25-2011 60 Minutes: Cyber War, JUN 13 2010, Chapter Review Questions— http://www.cbsnews.com/video/watch/?id=6578069n&tag=mncol;lst;1 Chapter 2 (Ciampa) NPR: All Things Considered, Your PIN May Not be Uncrackable After All, [cc/t] Sept 20, 2012, http://www.npr.org/player/v2/mediaPlayer.html?action=1&t=1&islist=false&i d=161502081&m=161502066 6 www.passfault.com NPR, All Things Considered, The Most Secure Password in the World Might Be You, http://www.npr.org/blogs/alltechconsidered/2013/11/05/243060103/the-most- secure-password-in-the-world-might-be-you 6 Contemporary Computer Crime Chapter 4— Discussion Activity 5—Risk Britz Assessment Discussion Question—Chapter 4 (Britz) Discussion Question 1-5, p.111 NPR: Morning Edition, FEB 12, 2013, “In Cyberwar, Software Flaws Are A Hot Commodity”, http://www.npr.org/2013/02/12/171737191/in- cyberwar-software-flaws-are-a-hot-commodity NPR: Morning Edition, FEB 13, 2013, “Victims Of Cyberattacks Get Proactive Against Intruders”, http://www.npr.org/2013/02/13/171843046/victims-of-cyberattacks- now-going-on-offense-against-intruders NPR: The Diane Rehm Show, FEB 13, 2013, “The Growing Threat Of Cyber- Espionage”, http://thedianerehmshow.org/ Quiz—Chapter 2 (Ciampa) 7 Internet Security Chapter 3— Discussion Activity 6— Ciampa Encryption
Recommended publications
  • Constitutional Principles at Work in the Investigative-Journalism Genre
    Vanderbilt Journal of Entertainment & Technology Law Volume 15 Issue 1 Issue 1 - Fall 2012 Article 4 2012 To Catch a Lawsuit: Constitutional Principles at Work in the Investigative-Journalism Genre Michael F. Dearington Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Civil Rights and Discrimination Commons, and the First Amendment Commons Recommended Citation Michael F. Dearington, To Catch a Lawsuit: Constitutional Principles at Work in the Investigative- Journalism Genre, 15 Vanderbilt Journal of Entertainment and Technology Law 117 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol15/iss1/4 This Note is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. To Catch a Lawsuit: Constitutional Principles at Work in the Investigative-Journalism Genre ABSTRACT This Note examines two causes of action, civil rights violations under 42 U.S.C. § 1983 and IIED claims, in the context of lawsuits against investigative journalists. Examining two recent cases in particular, Tiwari v. NBC Universal, Inc. and Conradt v. NBC Universal, Inc., which arise out of NBC's conduct in its primetime series To Catch a Predator, this Note concludes that legal standards governing conduct by investigative journalists are currently unclear. Investigative journalists are not adequately on notice as to when they might be liable under § 1983 for violating a subject's civil rights. And district courts have failed to appreciate journalists'First Amendment rights when analyzing IIED claims.
    [Show full text]
  • H.R. 5319, the Deleting Online Predators Act of 2006
    H.R. 5319, THE DELETING ONLINE PREDATORS ACT OF 2006 HEARING BEFORE THE SUBCOMMITTEE ON TELECOMMUNICATIONS AND THE INTERNET OF THE COMMITTEE ON ENERGY AND COMMERCE HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION JULY 11, 2006 Serial No. 109-121 Printed for the use of the Committee on Energy and Commerce Available via the World Wide Web: http://www.access.gpo.gov/congress/house U.S. GOVERNMENT PRINTING OFFICE 30-410PDF WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 COMMITTEE ON ENERGY AND COMMERCE JOE BARTON, Texas, Chairman RALPH M. HALL, Texas JOHN D. DINGELL, Michigan MICHAEL BILIRAKIS, Florida Ranking Member Vice Chairman HENRY A. WAXMAN, California FRED UPTON, Michigan EDWARD J. MARKEY, Massachusetts CLIFF STEARNS, Florida RICK BOUCHER, Virginia PAUL E. GILLMOR, Ohio EDOLPHUS TOWNS, New York NATHAN DEAL, Georgia FRANK PALLONE, JR., New Jersey ED WHITFIELD, Kentucky SHERROD BROWN, Ohio CHARLIE NORWOOD, Georgia BART GORDON, Tennessee BARBARA CUBIN, Wyoming BOBBY L. RUSH, Illinois JOHN SHIMKUS, Illinois ANNA G. ESHOO, California HEATHER WILSON, New Mexico BART STUPAK, Michigan JOHN B. SHADEGG, Arizona ELIOT L. ENGEL, New York CHARLES W. “CHIP” PICKERING, Mississippi ALBERT R. WYNN, Maryland Vice Chairman GENE GREEN, Texas VITO FOSSELLA, New York TED STRICKLAND, Ohio ROY BLUNT, Missouri DIANA DEGETTE, Colorado STEVE BUYER, Indiana LOIS CAPPS, California GEORGE RADANOVICH, California MIKE DOYLE, Pennsylvania CHARLES F. BASS, New Hampshire TOM ALLEN, Maine JOSEPH R.
    [Show full text]
  • Media, Affect, and Queer Sociality
    Chapter One The Virtual Life of Sex in Public In this chapter, I examine various scenes of intimacy’s failure, juxtapos‑ ing recent mass mediated sex scandals with ethnographic research I conducted in Austin, Texas, a city famous both for its high technology aspirations and for its cruising culture. I speculate on the ways vari‑ ous discourses on sex in public and virtually mediated eroticism try to capture and frame different iterations of “sex in public” as failures: the inability to achieve idealized forms of erotic belonging is variously expressed as expectancy, deferral, lack, and as an inability to arrive, achieve, or actualize normative forms of belonging. Located in both specific places and larger circuits of public cul‑ ture, the chapter tracks the ways the practices and discourses that congeal around sex in public position it as a form of virtual intimacy, that is, as a diminished or pathological form of contact whether it happens between two people or many. Whether practiced by com‑ munities of men in Austin, Texas, by putatively straight Republican senators, or by the American “Everyman” of Dateline’s To Catch a Predator, the erotic or affective acts that jump into public consciousness as perversion, scandal, hypocrisy, and predation operate as both the limit of and the ground for normative models of relationality. That is, in these often‑spectacular public failures, the architecture and trajectory of heteronormative aspirations—the chase after and promise of a life realized in the image of the monogamous couple—are arrested and interrupted by those aspirations’ queer excesses. At the same time, these failures operate to police the possible forms intimacy might take; they 17 © 2013 State University of New York Press, Albany 18 / Virtual Intimacies are none‑too‑subtle reminders about what’s inside and what’s outside ideal relational forms (the couple, the family, the nation).
    [Show full text]
  • 17C13b388dbfbe401b6c19ae54
    Sex Panic and the Punitive State The publisher gratefully acknowledges the generous support of the General Endowment Fund of the University of California Press Foundation. Sex Panic and the Punitive State Roger N. Lancaster university of california press Berkeley • Los Angeles • London University of California Press, one of the most distin- guished university presses in the United States, enriches lives around the world by advancing scholarship in the humanities, social sciences, and natural sciences. Its activities are supported by the UC Press Foundation and by philanthropic contributions from individuals and institutions. For more information, visit www .ucpress .edu . University of California Press Berkeley and Los Angeles, California University of California Press, Ltd. London, En gland © 2011 by The Regents of the University of California Library of Congress Cataloging- in-Publication Data Lancaster, Roger N. Sex panic and the punitive state / Roger N. Lancaster. p. cm. Includes bibliographical references and index. isbn 978–0-520–25565–4 (cloth : alk. paper) isbn 978–0-520–26206–5 (pbk. : alk. paper) 1. Sex— United States. 2. Sexual ethics— United States. 3. Sex customs—United States. 4. United States— Social conditions— 20th century. I. Title. hq18u5l35 2011 306.70973'09045—dc22 2010020837 Manufactured in the United States of America 19 18 17 16 15 14 13 12 11 10 10 9 8 7 6 5 4 3 2 1 This book is printed on Cascades Enviro 100, a 100% post consumer waste, recycled, de- inked fi ber. FSC recycled certifi ed and pro cessed chlorine free. It is acid free, Ecologo certifi ed, and manufactured by BioGas energy.
    [Show full text]
  • Virtual Pedophilia
    VIRTUAL PEDOPHILIA SEX OFFENDER PROFILING AND GILLIAN HARKINS / U.S. SECURITY CULTURE VIRTUAL PEDOPHILIA VIRTUAL PEDOPHILIA SEX OFFENDER PROFILING AND U.S. SECURITY CULTURE Gillian Harkins Duke university Press Durham and London 2020 © 2020 Duke university Press All rights reserved Printed in the United States of America on acid- free paper ♾ Designed by Matthew Tauch Typeset in Minion Pro by Tseng Information Systems, Inc. Library of Congress Cataloging- in- Publication Data Names: Harkins, Gillian, author. Title: Virtual pedophilia : sex offender profiling and U.S. security culture / Gillian Harkins. Description: Durham : Duke University Press, 2020. | Includes bibliographical references and index. Identifiers: lccn 2019041100 (print) lccn 2019041101 (ebook) isbn 9781478006831 (hardcover) isbn 9781478008118 (paperback) isbn 9781478009153 (ebook) Subjects: lcsh: Pedophilia—Social aspects—United States. | Pedophilia in mass media—Social aspects—United States. | Online sexual predators—United States. | Computer crimes— Investigation—United States. | Mass media and crime—United States. | Sex offenders—United States. | Internet and children— Social aspects—United States. Classification: lcc hq72.u53 h355 2020 (print) | lcc hq72.u53 (ebook) | DDc 306.77—dc23 lc record available at https://lccn.loc.gov/2019041100 lc ebook record available at https://lccn.loc.gov/2019041101 Cover art: Marga van Oers, Jumping Fox. Courtesy of the artist and StoryTiles. CONTENTS vii AcknowleDgments INTRODUCTION 1 Virtual Pedophilia ONE 29 Monstrous Sexuality and Vile Sovereignty TWO 62 Profiling Virtuality and Pedophilic Data THREE 95 Informational Image and Procedural Tone FOUR 128 Capturing the Past and the Vitality of Crime FIVE 161 Capturing the Future and the Sexuality of Risk CONCLUSION 194 Exceptional Pedophilia and the Everyday Case 209 Notes 229 References 263 InDex ACKNOWLEDGMENTS This book has proven more educating than elucidating.
    [Show full text]
  • Judging Journalism: the Turn Toward Privacy and Judicial Regulation of the Press
    Judging Journalism: The Turn Toward Privacy and Judicial Regulation of the Press Amy Gajdat INTRODUCTION In 2006, Basil Marceaux of Soddy Daisy, Tennessee, filed a lawsuit asserting a "right to dictate what news was published or broadcast by local and national newspapers and television stations."' Marceaux had received some decidedly light-hearted press coverage in his successive campaigns for governor and senator, 2 and was apparently aggrieved that media outlets had declined to publish information he considered "newsworthy." 3 The Tennessee Copyright © 2009 California Law Review, Inc. California Law Review, Inc. (CLR) is a California nonprofit corporation. CLR and the authors are solely responsible for the content of their publications. t Assistant Professor of Journalism, Assistant Professor of Law, University of Illinois; Director, Program in Law and Journalism, University of Illinois College of Law. This paper was selected for presentation at the First Annual Privacy Law Scholars Conference inJune 2008. The paper also benefited from comments at the August 2008 Big Ten Untenured Conference at Indiana University Law School, at the Washington University School of Law Junior Faculty Roundtable in November 2007, and at the Law & Society Association's Censorious Languages, Public Discourses, and Political Speech in Constitutional Law Enforcement panel in Berlin. Special thanks to Danielle Citron, Scott Dodson, Steve Helle, Lee Levine, David Meyer, John Nowak, Larry Ribstein, Neil Richards, Kathy Strandburg, Eugene Volokh, Diane Zimmerman, and the editors of the CaliforniaLaw Review for helpful discussions and comments on earlier drafts. 1. Marceaux v. Painter, No. E2006-0144-COA-R3-CV, 2007 Tenn. App. LEXIS 334, at *2 (Ct.
    [Show full text]
  • Guidelines and Resources for INTERNET SAFETY in Schools
    Guidelines and Resources for Second EditionINTERNET SAFETY in Schools OCTOBER 2007 Guidelines and Resources Developed in Response to Chapter 52 – An Act to Amend and Reenact § 22.1-70.2 of the Code of Virginia, Relating to Internet Safety Instruction in Schools (HB58 – Approved March 7, 2006) Disclaimer This document provides links to Web sites created and maintained by other public and/or private organizations. The Virginia Department of Education provides links to these sites for information purposes only; the presence of a link is not an endorsement of the site. Although every reasonable effort is made to present current and accurate information, Internet content appears, disappears, and changes over time. Please let us know about existing external links that might be inappropriate. Guidelines and Resources for INTERNET SAFETY in Schools First Edition, September 2006 Second Edition, October 2007 Guidelines and Resources for Internet Safety in Schools State Board of Education Dr. Mark E. Emblidge, President Dr. Ella P. Ward, Vice President Dr. Thomas M. Brewster Isis M. Castro David L. Johnson Dr. Gary L. Jones Kelvin L. Moore Andrew J. Rotherham Eleanor B. Saslaw Virginia Department of Education Dr. Billy K. Cannaday, Jr. Superintendent of Public Instruction Division of Technology Lan Neugent Assistant Superintendent Office of Educational Technology Dr. Tammy McGraw Director Contents Acknowledgments . iv Foreword . v Introduction . 1 Legislation . 2 Issues School Divisions Must Address . 4 Integrating Internet Safety into Curriculum Content Instruction . 6 What Students Need to Know . 7 What Parents, Grandparents, and Caregivers Need to Know . 10 What Teachers, Instructional Technology Resource Teachers, Library Media Specialists, Counselors, and Resource Officers Need to Know .
    [Show full text]
  • 2016 September 14
    FLASH REPORT #1 2016 SEPTEMBER 14 NEW SEASON PREMIERES After a summer hiatus for many, switch was for RIGHT THIS MINUTE, punctuated by new concept test shows which is now part of the ABC O&O early and the RIO SUMMER OLYMPICS, the past afternoon line-up paired with WHO few weeks have seen many of the first-run WANTS TO BE A MILLIONAIRE (now talkers back on their sets again. Last week taped in Las Vegas). The newly titled heralded the return of the series in search CRIME WATCH DAILY added with CHRIS of a co-host, LIVE WITH KELLY, along HANSEN (TO CATCH A PREDATOR) and with DR OZ, STEVE HARVEY, WENDY Special Correspondent Elizabeth Smart. WILLIAMS and ELLEN on Tuesday. They As Billy Bush moves east for THE TODAY were joined by MAURY, JERRY and the SHOW, Natalie Morales goes west to other HARVEY at TMZ LIVE. This Monday anchor ACCESS HOLLYWOOD. was the new season premiere for the rest Unlike last fall, where special show of the remaining returnees. As alluded to premieres included ELLEN at Rockefeller earlier, it was a busy summer for testing, Center in New York; STEVE HARVEY especially on the FOX O&O’s with series hosting 150 women questioning 2,000 ranging from TOP 30, PAGE SIX TV and SO men; and lots of attention diverted to ME to JASON SHOW and THE PREACHERS. network late night when Stephen Colbert Test runs in daytime also looked at the took over the Ed Sullivan Theater; this viability of the libraries of KITCHEN September, special attention is likely to be NIGHTMARES and in August, DAYTIME focused on HARRY, the highest profiled DATELINE.
    [Show full text]
  • Virtual Parentalism
    Virtual Parentalism Joshua A.T. Fairfield* Abstract Parents, not laws, ultimately protect children both online and offline. If legislation places adults at legal risk because of the presence of children in virtual worlds, adults will exit those worlds, and children will be isolated into separate spaces. This will not improve safety for children. Instead, this Article suggests that Congress enact measures that encourage filtering technology and parental tools that will both protect children in virtual worlds, and protect free speech online. Table of Contents I. Introduction ................................................................................ 1216 II. Parentalism and Cyberbalkanization ........................................... 1218 A. Cyberbalkanization .............................................................. 1219 B. Speech and Child Protection Online .................................... 1224 C. The Effect of Isolation on Children ..................................... 1231 III. Filtering and Virtual Worlds ....................................................... 1233 A. Basic Chat Filtering ............................................................. 1234 B. Filtering Reality: Instancing and Quest-Phasing ................. 1234 C. Making Filtering Better ....................................................... 1237 D. Commerce, Anonymity, and Filtering ................................. 1239 IV. Necessary Law Enforcement in Virtual Worlds.......................... 1240 V. Conclusion .................................................................................
    [Show full text]
  • Obama Orders Rollback of Government Secrecy
    ISSN 0028-9485 March 2009 Vol. LVIII No. 2 www.ala.org/nif President Barack Obama’s first public act in office January 21 was to formalize strict new limits on lobbyists operating in his White House and peel back presidential decision- making to allow more public scrutiny. Another shift toward openness—Obama’s instruction to federal agencies to be more responsive to requests made under the Freedom of Information Act—was greeted with praise from government watchdogs. Obama made several moves aimed at creating what he called “a new standard of open- ness” about the behind-the-scenes machinations of his White House—and those before it. Chief among them was issuing an order requiring that the White House consult with the attorney general and White House counsel “any time the American people want to know something that I or a former president want to withhold.” “Information will not be withheld just because I say so,” Obama said while attending a ceremony in the Eisenhower Executive Office Building to swear in about two dozen of his most senior aides. “It will be withheld because a separate authority believes my request Obama orders is well grounded in the Constitution.” Obama revoked the executive order issued by President George W. Bush in November rollback of 2001, less than two months after the September 11 terrorist attacks, that allowed past government secrecy presidents to exert executive privilege to keep some of their White House papers private. A federal judge ruled parts of it invalid in 2007, while Obama’s order revoked it entirely.
    [Show full text]
  • Younghee Lee (Msa90) Is a Creative Force at Samsung \ a Comedy Writer Finds Success and Strikes out on His Own \ Medill Remembers Garry Marshall (Bsj56)
    YOUNGHEE LEE (MSA90) IS A CREATIVE FORCE AT SAMSUNG \ A COMEDY WRITER FINDS SUCCESS AND STRIKES OUT ON HIS OWN \ MEDILL REMEMBERS GARRY MARSHALL (BSJ56) FALL 2016 \ ISSUE 94 \ ALUMNI MAGAZINE CONTENTS \ 10 THE CREATIVE 16 THE MAN SEOUL BEHIND WHO BROUGHT SAMSUNG’S DALLAS THE MARKETING NEWS Samsung executive Byron Harris (MSJ72) is 22 NEW SCULPTURE Younghee Lee (MSA90) on enjoying retirement after cultivating a strong bond 40 years as Dallas MIXES MEDIA’S between the technology investigative reporter. PAST AND behemoth and its global consumers. PRESENT 18 VIEW FROM Medill is host to a piece by THE STANDS artist and journalist Lloyd 14 TALES FROM Schermer. Medill congratulates For the editor of the NEW ORLEANS Chicago Cubs fan magazine, alumna, Medill Professor A book about blogging sports journalism is the field 26 MEDILL after Hurricane Katrina of his dreams. reveals changes in the REMEMBERS of Practice and Northwestern medium and its impact GARRY on journalism. 20 HALF FULL MARSHALL University Trustee Christine Comedy writer Matt Bellassai (BSJ12) made a career out of (BSJ56) Brennan (BSJ80, MSJ81), recipient wine, whine and revise. of the 2016 Ann Miller Service Award from the Association of 5 MEDILL NEWS / 24 CLASS NOTES / 26 OBITUARIES / 30 KEEP READING ... Women in Sports Media Cover photo: Younghee Lee (MSA90) is pictured in the McCormick Foundation Center at Medill in Evanston on May 12, 2016 (photo by Jenna Braunstein). ISSUE 93 – CORRECTIONS Page 40: Royal Stewart, Jr. received his BSJ in 1956 and his MSJ in 1966. Medill faculty member Ernest Duplessis is a Medill and Kellogg graduate, 1996 and 2008, respectively.
    [Show full text]
  • The Terrorist and the Pedophile: Exploring the Emergence, Construction and Function of Criminal Figures in a Time of Structural Dissolution
    The Terrorist and the Pedophile: Exploring the Emergence, Construction and Function of Criminal Figures in a Time of Structural Dissolution A Division III By: Alison Bowen Fall 2010 - Spring 2011 Committee Chair: Peter Gilford, Ph.D., Professor of Clinical Psychology Committee Member: Vishnupad, Ph.D., Professor of South Asian Studies Hampshire College 2 I would like to thank my committee, Peter and Vishnupad, for your knowledge, guidance and friendship. I would also like to thank my family and friends, for your love and support. 3 Introduction 4 For the purpose this inquiry, I have chosen to discuss the criminal figures of the terrorist and the pedophile with respect to the putative societal threat their presences pose in current American society. Mainstream America – the government, the public and the media – presumes evil and dehumanizes these figures. In an attempt to offer an understanding alternative to that of the mainstream, I have decided to deconstruct the figures of the terrorist and the pedophile and characterize their positionalities within American society. By positionality I mean how these figures are situated in relation to other social structures such as institutions, ideology, practices, knowledge and history. In Chapter 1, I discuss the case of John Walker Lindh – the 20‐year‐old, White, American Muslim‐convert who the US military captured in Afghanistan while he was fighting with the Taliban shortly after 9/11– as a vehicle for a larger discussion on the figure of the terrorist with respect to the current United States War On Terror. I argue that the construction of the figure of the terrorist and the US War On Terror creates a site of moral positionality – and thus communal anchorage – for America as a whole.
    [Show full text]