Categories
Cyberinfrastructure Education Globalization Network

Zoom out (wider)

Zoom video conferencing has no role on a college campus. The pandemic, as noted previously pushed many colleges to deploy a video conferencing solution under a less than workable timeframe.

Fair to suggest no risk assessment was completed. Some colleges hold a campus-wide license agreement while smaller schools have more limited host deployments.

Colleges need only review their mission and organizational goals to confirm a change from Zoom is needed. Many colleges have adopted strong mission and vision language to promote student learning and inclusiveness.

Truly accepting your College’s mission, vision and language is essential to understanding why Zoom violates their lives. Many do not seem to care or understand the true security and privacy vulnerabilities.

My initial post just scratched the surface. The cool factor juicing up your background image may in fact be more important than security and privacy of students.

Yea, its a videoconferencing app and during a pandemic — how bad can it be?

Enter hate groups

In addition to the racist Zoombombing at California State University Long Beach in late March, hate groups have begun hacking Zoom meetings.

As widely reported Jewish groups, teachers and families are being Zoombombed by white supremacists. The Verge reported White supremacists are targeting Jewish groups on Zoom

University of Colorado Bolder:
An online biology lecture was hijacked and anti-semitic messages were displayed. One professor is Jewish. A news article by Colorado public radio addressed this source: a student enrolled in the class posted the lecture’s Zoom ID number to reddit, an American social news aggregation, web content rating, and discussion website. Hate groups then entered the Zoom meeting.

University of Washington:
Students, instructors face threats and hateful speech as Zoom meetings get ‘bombed’

Binghampton University:
Racist interruptions affect Zoom classes at BU

Arizona State University and The University of Southern California:
‘Zoombombing’ Attacks Disrupt Classes Online Zoom classes were disrupted by individuals spewing racist, misogynistic or vulgar content.

University of Texas:
Virtual meeting of black UT students interrupted with racist slurs, students say

Just imagine a racist zoombombing during your next online class, campus event, Dean’s meeting, or public art performance. And the damage to your College brand becomes front and center in a social media world.

Categories
Cyberinfrastructure Education Globalization Network

Zoom out

How quickly the ground shifted on Zoom. Since March 30th the video conferencing app has been exposed by gaping security and privacy vulnerabilities. The impact on higher education is immense and must be addressed swiftly.

Zoom’s security and privacy vulnerabilities are deal breakers for higher education. Why? The online journal Inside Higher Ed shared shocking news: Dissertation Defense on Zoom Interrupted by Racist Attack. Yes, the ’N word’ was zoombombed at Cal State Long Beach during a dissertation defense. Educause links to multiple zoombombing articles.

Stunningly, multiple campus zoombombings quickly followed prompting the FBI to issue this warning: Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic addressing concerns across higher education. Yet, The Chronicle of Higher Education returns NO articles about Zoombombing.

These two events instantly change any campus conversation that all is well using Zoom. A Zoom cool factor was going viral just as Coronavirus closed down all higher education colleges. Students can sway easily via online trends.

Look at Zoom’s March 18th Collection of your Personal Data privacy statement:

Zoom gathers and sells to data brokers very personal information of your students and colleagues. Add the orange hi-lighted scraping of your campus network data and asset information.

Remember when an app is free many times you become the product. Zoom (NASDAQ) has been operating for nine years.

I know what you are thinking — how did this happened?
Many colleges had no idea Zoom was reckless with the data security and privacy of our students. Prior to coronavirus Zoom had about 12 million users. By late March this jumped to over 100 million. Instant capacity issues.

Categories
Design Education Globalization Innovation Reading Technology

Latest read: The Numerati

This is not a book about Dan Brown’s character, Robert Langdon and his fight against the Illuminati in Angels & Demons.  This is The Numerati, a slight spin on very advanced mathematics and high performance computing, the future of shopping, medicine, safety, sex, voting and yes …. even work.
the numeratiThe Numerati is a great read regarding the impact of advanced analytics across the board.  I was impressed with mathematicians Baker interviews and the surprising number who eventually work for IBM or the NSA.  Baker has written a book about how the best mathematicians are changing the way we live by processing amazingly vast amounts of data and simply detecting patterns.  The data comes via mouse-clicks, cell phone calls and credit card purchases just to name a few.

It sounds simple.  On the surface with today’s high performance computing and powerful consumer technologies.  But Baker shows how mathematicians are working to draw upon extremely high levels of computational power to deliver products and solutions that will dramatically impact our lives.

At the same time some of the projects mentioned seems more ‘wonderland’ in design. Yet consider the amount of data created by the Large Hadron Collider for example, the emerging world of Big Science is just starting to take off.

Chapters tackle different subjects (mentioned above) and as others. Many have indicated the shopping chapter is the best of the book. It was very enjoyable to read.  Some of the ideas and inventions about health were interesting, some ideas a bit hard to wrap around your brain – like the ability of a floor tile to detect if your elderly father has a change in an existing medical condition.  Another example, how a computer can analyze a sequence of video (over time) and determine in your are prone to suffering Parkinson’s disease.

Categories
Design Education Globalization Innovation Internet2 Network OLPC OpenSource Reading Rich media Smartphone Technology

Latest read: The Future of the Internet

Jonathan Zittrain, Professor of Law at Harvard Law School, and faculty co-director of the Berkman Center for Internet & Society at Harvard University wrote The Future of the Internet–And How to Stop It. This book is very interesting for all the wrong reasons. BTW: The cover is not an actual photo rather a Photoshop’d image. However the image clearly represents his message.

The Future of the Internet

Zittrain documents that existing, closed, controlled systems are damaging the internet an if continued, he writes will negatively impact our future access and interaction.  I enjoyed reading the book and dedicated blog established by Zittrain to keep his conversations moving forward.

The book is about Generativity impacting the internet.  Ultimately his argument is to place generativity at the core of all open technologies that tap into the internet.

Zittrain begins Part I in the book with a tbit of historical reflection: The Battle of the Boxes, Battle of the Networks and CyberSecurity.  He followed on the impact of legal lessons learned from Wikipedia.  There are plenty of examples how open, generativity systems make the internet better.  Here are a couple of examples Zittrain addressed that do not:

Law enforcement agencies have used network devices to manually turn on OnStar (the in-vehicle security, communications, and diagnostics system from GM) to record and monitor conversations of unknowing passengers.  OnStar is installed in over 50 models of GM cars alone.

The FBI requested from a judge the ability to turn on the microphone of a unsuspecting cell phone owner allowing law enforcement to tap, track and record conversations.

Think about that for a moment. Ever take a picture with your digital camera or cell phone?  Millions of people do this everyday and upload content to photo-sharing websites like Flickr.  Can you imagine taking a series of photographs — only to later realize the camera (via remote commands) copied all your photos without your knowledge.  Zittrain addresses how your personal content can be affected by a judge in Texas while you live … say in Ohio.  Don’t believe it? Read Chapter 5: Tethered Appliances, Software as Service and Perfect Enforcement” to see how a judge in Marshall Texas did just that — regarding a copyright case involving TiVo.

Categories
Design Education Globalization Network OpenSource Technology

Chinese cyberattacks on US Government

This does not leave me sleeping well at night.  It should bother you:

“When the US Department of Defense is the target of no fewer than 128 information infrastructure attacks per minute from China, and we discover that while DoD is almost universally using off-the-shelf Microsoft Windows systems while China is engaged in working toward 100% military deployment of security hardened FreeBSD, it becomes clear that there’s definitely something wrong with US information security policy.”

Source: TechRepublic

The amount of cyber attacks from foreign countries is pretty amazing.  K12 School Districts are not amune from foreign attacks either.

Tags: China, network, The Great Firewall of China, globalization, national security, Microsoft Windows, Censorship, education, technology, trends