Categories
Education Innovation Reading Technology

Latest Read: Crypto

Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age by Steven Levy. He is the former chief technology correspondent for Newsweek. Today he is an editor at Wired, and author of eight books. Crypto, won the Frankfurt E-book Award for the best non-fiction book of 2001.

Crypto: How the Code Rebels Beat the Government - Saving Privacy in the Digital Age by Steven Levy

If you’ve ever made an e-commerce purchase with your credit card, then you have used cryptography.

Steven guides the reader into learning about the history of cryptography. This book begins with Whitfield Diffie. He authored initial developments of cryptographic keys. He was then joined by Martin Hellman in 1976.

From this point, Steven reveals how Ron Rivest, Adi Shamir, and Leonard Adleman, teaching at MIT also furthered cryptography research. Their development led to the formation of their company, RSA.

The National Security Agency (NSA) certainly interpreted these cryptography developments as a threat and began working to thwart their developments.

Categories
Education Globalization Reading Technology

Latest Read: An Ugly Truth

An Ugly Truth: Inside Facebook’s Battle for Domination by Sheera Frenkel and Cecilia Kang. Sheera is a prize-winning technology reporter based in San Francisco. Cecilia covers technology and regulation.

An Ugly Truth: Inside Facebook’s Battle for Domination by Sheera Frenkel and Cecilia Kang

This story of Facebook’s corruption and lack of a moral compass cannot not be any more clearer than this book. In addition, this is a story of greed, control, egos of company leaders. At first glance you may think this is simply not possible.

In contrast, the authors are tapping into current and former employees. All paint a rather horrific picture of Facebooks’ single focus: profits.

Above all, documents and interviews reveal how company wide lack of action weakened American democracy. Furthermore, ignoring the genocide of Rohingya peoples across Myanmar paints a rather shocking picture of Facebook as a company.

A key point certainly overlooked is how Facebook ‘arrived’ at the beginning of the internet’s gilded age. Therefore, no rules applied, just profits whatever the cost. Profit is certainly the only focus for Mark Zuckerberg. On the other hand, attempting to derail his profit focus results with aggressive and sometimes illegal tactics.

Chapter 7: Company over Country

An acknowledgment by Facebook’s security team that Russian spies hacked user accounts of GOP politicians certainly was not a surprise. Yet, the Russians hacked accounts of children from those GOP candidates. This also was certainly very shocking. Accordingly, all this activity was culminating in an internal report to company leadership:

Hence, Facebook did nothing. No notice to American intelligence services. Ultimately Facebook engineers held a rather unique eye on all user interactions.

Categories
Education Google Innovation Reading Technology

Latest Read: Data and Goliath

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier. He is a fellow at the Berkman Klein Center for Internet & Society at Harvard University, lecturer in Public Policy at the Harvard Kennedy School, and board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Bruce is moreover, writing a book about surveillance. He is addressing the who and why, how it works, and the business models. This is certainly a complicated issue. Most importantly, your privacy is very important.

Above all, we live in a surveillance state today. Bruce is sharing enormous amounts of resources revealing how vast amounts our personal data are harvested. In addition, Facebook is the greatest abuser, with Google’s Gmail not far behind.

One of the important lessons is that much of this has become voluntary. We want free services (email, cloud storage) or cheap hardware mobile phones and big, smart TVs, so we actually permit corporate surveillance within our living rooms.

In addition, this reminds me of lessons from The Age of Surveillance Capitalism by Shoshana Zuboff. Companies promise cheaper services and convenience to justify their surveillance technology, while local, state and federal governments make a promise of protection and physical security.

Apps are tracking us all day long

We certainly all understand by now that cellular carriers track everywhere you travel. Facebook records your location each time you open their app on your phone. In addition, Google Maps and their Waze traffic app records your GPS data, and even your credit card purchases.

Categories
Artificial Intelligence Education Innovation Reading Technology TED

Latest Read: Hello World

Hello World: Being Human in the Age of Algorithms by Hannah Fry, Today Hannah is a senior lecturer at University College London’s Centre for Advanced Spatial Analysis.

Hello World Being Human in the Age of Algorithms by Hannah Fry

Generally speaking, Hannah has written a wonderful book addressing algorithms and artificial intelligence. Society has certainly fallen behind the moral implications of algorithms and Hannah speaks truth to power.

Above all, do not let the idea of learning about algorithms, artificial intelligence, or machine learning intimate you. Hannah explains all of these terms with easy to understand examples. This is why her book is popular and well regarded.

I really appreciate how Hannah is addressing algorithm technology across the following chapters: Power, Data, Justice, Medicine, Cars, and Crime. However, I will save her best lesson for last.

Machines that see

So, Hannah reveals artificial intelligence allows a computer to identify dogs. Once a computer has identify over one million dog photos, artificial intelligence can identify dogs like an expert.

Yet, when applying this to breast cancer diagnosis the magic of machine learning can truly shine. Feed a computer millions images of breast cancer tissue images and a local doctor at a small community hospital in remote Iowa can tap into machine learning to help diagnose with a better degree of accuracy once only for a doctor with 20 years of breast cancer diagnosis at Memorial Sloan Kettering Cancer Center in New York City.

Categories
Cyberinfrastructure Education Globalization Network

Zoom out (wider)

Zoom video conferencing has no role on a college campus. The pandemic, as noted previously pushed many colleges to deploy a video conferencing solution under a less than workable timeframe.

Fair to suggest no risk assessment was completed. Some colleges hold a campus-wide license agreement while smaller schools have more limited host deployments.

Colleges need only review their mission and organizational goals to confirm a change from Zoom is needed. Many colleges have adopted strong mission and vision language to promote student learning and inclusiveness.

Truly accepting your College’s mission, vision and language is essential to understanding why Zoom violates their lives. Many do not seem to care or understand the true security and privacy vulnerabilities.

My initial post just scratched the surface. The cool factor juicing up your background image may in fact be more important than security and privacy of students.

Yea, its a videoconferencing app and during a pandemic — how bad can it be?

Enter hate groups

In addition to the racist Zoombombing at California State University Long Beach in late March, hate groups have begun hacking Zoom meetings.

As widely reported Jewish groups, teachers and families are being Zoombombed by white supremacists. The Verge reported White supremacists are targeting Jewish groups on Zoom

University of Colorado Bolder:
An online biology lecture was hijacked and anti-semitic messages were displayed. One professor is Jewish. A news article by Colorado public radio addressed this source: a student enrolled in the class posted the lecture’s Zoom ID number to reddit, an American social news aggregation, web content rating, and discussion website. Hate groups then entered the Zoom meeting.

University of Washington:
Students, instructors face threats and hateful speech as Zoom meetings get ‘bombed’

Binghampton University:
Racist interruptions affect Zoom classes at BU

Arizona State University and The University of Southern California:
‘Zoombombing’ Attacks Disrupt Classes Online Zoom classes were disrupted by individuals spewing racist, misogynistic or vulgar content.

University of Texas:
Virtual meeting of black UT students interrupted with racist slurs, students say

Just imagine a racist zoombombing during your next online class, campus event, Dean’s meeting, or public art performance. And the damage to your College brand becomes front and center in a social media world.