Categories
Week Eight

Security

When it comes to security, specifically online security, then I would say that I am pretty cautious about the information I allow online or store in my laptop. I’ve saved passwords on my Apple laptop via Chrome and Safari for the six years since I’ve had my own personal MacBook, but I feel confident about storing my passwords here because one needs my laptop password to access any other information on here. However, I have become more cautious over the years about my online information as I’ve witnessed others struggle with hacking or scamming.

One thing mentioned in the video lectures from this weeks module was to always install software updates on our computers when available. Of course Apple makes it pretty quick and easy to update our laptops, but I typically find myself clicking the “remind me later” option instead of “update now” or “update tonight” options because I just don’t want to wait 10 minutes to go through that process. After learning that software updates are protective of our online activities from Dan Gillmor, I will definitely be taking that simple step of added security from here on out.

One thing I’ve always been cautious about when it comes to laptops in general is the camera. After watching Abduction released in 2011, I’ve always had a slightly uncomfortable feeling with the fact that other people can gain access to my MacBook’s front facing camera whenever they please. In the movie, the front facing camera’s green light appears in the middle of an important conversation and is not noticed by the main characters until its too late and the private information had been openly discussed. Of course in order to access that computer’s particular camera a link had to be clicked first, but one can never know which link is attached or interfered with by a hacker. I’ve only seen my front facing camera turn green one time without having done it purposefully, but I quickly covered the camera with my finger and restarted my laptop to get whoever was on the other end out of my bedroom.

Its easier to access metadata than it is a front facing camera on a specific laptop connected to a specific wireless router, but all personal information is important and users should feel safe communicating with others online when needed. According to ProPublica, there are possible programs that encrypt all messages so that the data being shared is safe until in the hands of the one receiver. However, it is not possible to completely hide yourself from mass surveillance even if one is taking precautions when downloading items from the internet and sharing data via online systems. As technology continues to advance so will hackers’ ability to access information that is not theirs. It is going to be an ongoing battle that only time will be able to tell. Until then, I plan to continue to store my passwords safely in my hard drive’s memory,  update software installations when possible, and keep track of all credit card transactions that show up in my bank statements. I’ve witnessed hackers inside of a Starbucks on multiple occasions as well, so remaining cautious about which wireless systems to connect to will always be a priority of mine as well.

Coding via CC Search
Categories
students

How I Was Robbed by the Internet and Why Security Matters

There’s no better way to start a Monday morning that having your card declined for coffee – A $3 coffee following a payday Friday, might I add. I hadn’t had any problems buying groceries on Saturday or cat food last evening which meant I definitely had money 12 hours ago, so what was going on?

Not thinking too much about it, I went on my way to work and made a mental note to check my bank account when I got there. I thought maybe my card had some kind of fraud block on it, or that one of my transfers didn’t go through the way I thought it had. What I didn’t think was that when I logged into my bank account I would be staring at not even a zero, but a balance of over -$100.

After calling my bank and shedding some pretty embarrassing tears I was finally redirected to the real culprit, which was PayPal. Not my PayPal account, but my boyfriend’s PayPal account – A PayPal account that had both of our banking informations in it, and a PayPal that had cleared out his checking as well, making us double broke. Without my name on the account I had no authorization over what was happening with my money whatsoever, PayPal couldn’t give me any information on where my money had gone or how to get it back.

When we were finally able to get more information, it turned out that our Nintendo account (which was linked to our PayPal account) had been hacked into and used to buy close to one thousand dollars worth of Fortnite currency. Do you know how humiliating it is to get robbed by Fortnite? At least it brought some humor to the unfortunate situation. It took 1 big fight, 10 long days, and 100 angry tears for us to get our money back but eventually it was settled, and yet it still left me feeling really violated.

Before this experience, which took place just a couple weeks ago, internet security was something I thought was only a concern to those who have something to hide. Having all of my money taken from me and then not having the right to figure out why or by whom really woke me up in terms of how I should be protecting what it is I trust the internet with. From this week’s module one of my favorite statements was that the internet is essentially the Wild West, because really it is.

We trust the internet because everyone around us does, and we are often more lax on security than we should be because we see our friends or peers using very basic protection measures online and having no issues. Before this week’s readings I really didn’t fully grasp just how easy it is for anyone to access anything we have done on our computers. From photos and videos to personal work files and search histories, if someone wants to gain access to these things it is simple and a good password isn’t going to protect you.

Reading the article about encryption in particular was incredibly interesting to me, because it made me realize that it is a step that any average person can take to better secure their online data and activity. It also made me realize that by giving so much of our information to online platforms we are essentially creating the opportunity for someone to gain access to everything about ourselves – Our address, phone number, social security number, all of our banking information, what we did yesterday, what we are interested in and so forth.

In the past, I haven’t given my internet security much thought other than privatizing my social media accounts so other users can only view my information if I am friends with them. What I’ve failed to realize, is that if someone wants my information bad enough no long password of “friends only” setting is going to prevent them from getting it, and that is the scary reality. If someone wants to clean out my bank accounts it’s not difficult, because I’ve essentially given them all the information they need to do so.

Moving forward, I plan to try and use the internet as if everyone is watching. While it may sound like a paranoid approach it really isn’t far off from reality. I also plan on continuing my research into the importance of encryption, and following the steps given on how to encrypt your information in the article linked above. I also plan to implement the tips given in this article, and I will start immediately by being extra conscious about the information I share via email since that is something I have not given thought to before.

In addition to these steps, I plan on getting a password manager and minimizing the amount of transactions I do online. While keeping my money and the internet completely separate would be ideal, in today’s reality it is just not a possibility. Having a secure password manager would allow me to have a variety of passwords without having to be worried about remembering them all, or someone having access to them all. Minimizing my online transactions and the sites that I trust with my banking information will also decrease my chances of ever having my money cleaned out again.

While I would definitely say this class gave me a little paranoia when it comes to my online security, I am thankful for it. I believe that everyone needs to be a little more paranoid when it comes to what they are sharing online and what their children are sharing online. One of my biggest take aways from it all, was that people need to be informed about what happens to whatever it is they decide to put into their computer and how it can be used for and against them.

One of my biggest fears leaving this class is that our internet users are getting younger and younger, and children may feel the impacts of things they shared online while underaged in their adult lives. Essentially, the internet really is the wild west – And we need to tread carefully, looking around corners and watching our own backs, because no one else is doing it for us.

Categories
students

Security

I had always been somewhat aware of my information being taken and sold. I have been hacked a few times too, so I knew there were dangers when it comes to anything on the internet.

I’ve never really done anything to protect myself from any of this kind of stuff. I never touched my privacy settings, rarely changed my passwords, things like that. This weeks reading really opened my eyes. I learned a lot in terms of how to protect myself online as well as what it is exactly that I’m protecting myself from.

I definitely agree with Microsoft CEO Satya Nadella when he says “we will regret sacrificing privacy for national security.” Everyone wants privacy and security, and we deserve that. We should not have to sacrifice that. Sure, there will be exceptions to that, but overall we should not have to sacrifice privacy just to be safe.

I often joke that I cannot say certain things online or over text, because I do not want to be spied on by the government. However, I’m not actually joking. We should not have to make sure every single word we ever post online is safe to use. I came across this article during our reading, and some of the words on the list are ridiculous.

We are not just sacrificing privacy for national security, we’re sacrificing so much more. We cannot say or do things that we want, or the government is right there behind us.

I know I will definitely be making some changes to the way I use the internet, and how I protect myself. One of the first things I will be doing is changing my password to everything, my particularly my emails.

This list also has some good advice that I will be following. Some of those I already have, like anti-virus software, and having a secure phone pin. However things like using a VPN and a password manager are things I am going to look into using.

I have always been a little wary of using password managers, because isn’t that just giving someone an incredibly easy way of getting all my passwords? But our reading from this week  gave me a better insight to password managers as well as good ones to use.

The New York Times also put out a good list of ways to not leave traces on the internet. They mentioned ProtonMail, which I have seen a few times and it is something I am looking in to. Changing my email just seems like such a hassle, so we’ll see how that one goes.

I will also start to use DuckDuckGo rather than Google, because what I’ve learned the most from this weeks reading is that Google is seriously tracking us, in every way possible.

Overall, I just want to be able to enjoy my time online. I do not want to worry about who is tracking me, or getting my information. All of these tips and changes will help me feel safer and better about using the internet.

Categories
students

Learning to Feel Secure with Security

If I’ve gained anything from this final module, it is that I have not been taking my security seriously when it comes to being online.
I’m the first to “x” out of my software protection update notification and I have been known to use the same variation of password for all my accounts. I suppose it’s the idea of, “Well, it hasn’t happened to me yet, so I’m sure I’m fine!”
Reading through just some of the treats in our learning materials, such as my data being sold by the browser extensions and surveillance capitalism as just a few examples.
I found the article that helped me clean up my act the most in terms of security was the Lifehacker article, “Top 10 Security Basics Everyone Should Follow.”
Some of the more obvious tips were along the lines of, “Never use public Wifi without a VPN” or “Use a passcode on your phone that’s more complex than a 4 digit pin”
I will say, the tip that I didn’t even realize was changing the basic settings on your Wifi router box and changing the router’s administrator login. This is defiantly something I did after reading about it.

Tor is also something that I have looked into after reviewing these module’s learning materials. Usually, I would use Incognito mode as an avenue to keep what I was looking up private but to have an entire browser system that runs like that is defiantly intriguing. However, It is scary that some people’s purposes for having such browsers would be for reasons like child pornography or even worse.

As stated in both the lecture and the Lifehacker article about Tor, if the NSA wants to find you, they will. Or at least be able to tell that you are using an encrypted service like Tor.

In conclusion, my final thoughts for this module, if it could be wrapped up in one word, it would be insecure. (No pun intended.) Before this final module, I was sure that nothing I would read could convince me to reactivate my security membership. Like many things I’ve learned in this course, I feel that I was let in on a dirty little secret about the internet that I wasn’t supposed to. I am happy to share that I have activated my software protection once again, as well as changing the basic setting on the wifi box not only at my apartment complex but at my aunts as well. I feel like my approach to security and safety on the internet has gone from laissez-faire to “Better safe than sorry.”

Categories
Week Eight

Why do I need different passwords?

I am that person. The person that cyber security folks warn you about…I have similar passwords for many websites becasue I am lazy and I can remember them. While I know better, partially becasue of this class but mostly becasue my husband has been nagging me for the better part of ten years, I still have not corrected the problem.

So many options but isn’t one good one the best???

Why?

I loved this article that for a moment made me feel slightly better about my password problem. However this week’s content and my husband’s nagging were still on my mind. This info is pretty much negated by the following fact: most of my passwords are now remembered on my devices and are inserted with face id, so I really have no excuse.

But Really Why?

Sure he looks cool, but don’t be the folks with the ads for RayBans for $19.99 on their social media do not.

If for no other reason, I do not want to be that person who is hacked and has one of those embarrassing ads posted on their social media page. Or have an email blast to their entire contact list asking for help to get home from another country becasue my wallet was taken, I have seen both and been a little embarrassed for the impacted party. I also know that these hacks will evolve and will only get worse.

What I will reasonable do

I already feel like I’m a like I have a good start. I update my devices and software pretty religiously. Well, after my husband tells me and then reminds me or after he does the updates himself, they are done.

In only 3 days we move across the country.

We are also only a mere 72 hours away from a large moving van showing up at the house ready to move us from New Jersey to Texas. This is important to this conversation becasue it requires that I do a lot of online housekeeping that I try to avoid. I will have to log into everything to change addresses and update payment addresses.  So this is the perfect time to diversify my passwords. I believe that this class has shown me that it is important and a simple step that I can no longer ignore.

The future.

While my current security needs based on my personal and professional life are pretty basic, this certainly may change in the future as I look to change my career after graduation. I know I am not alone in poor password choices based on this article. I do not want to be one of the many who put my company at risk so I I believe I can also reasonable commit to better security practices in the future.

Categories
students

Media Law: Having our cake and eating it too

Media Law: Having our cake and eating it too

Photo source: Pexel

I am approaching the final blog assignments of my Digital Media Literacy course, and for the first time, challenged in finding my words. I probably need more time to process this week’s learning materials; to look at the world with this new information before I can really develop my views. And I will, but here are some of my thoughts about media law and what we have learned this week.

Media law, plus those who create and use it, has tough questions to answer. How do we use the access technology gives us to make the world a better or safer place? Who gets to decide if our means justify our ends? Who should be protected? Governments? Populations? Individuals? Women? Men? Computer literate? Computer illiterate? Corporations? And at whose expense? Who gets to balance the scales when these worlds collide? And how far can they go? Where do we draw the line as consumers?

I appreciated when Cory Doctorow said, “We don’t know how to make a back door that only good guys can go through.” There’s definitely a need for backdoors, but backdoors create problems. It’s almost too big to solve, like the whole chicken and egg conundrum.

My husband recalls news that the FBI issued a subpoena to Google for a list of all of the people in a certain area at the time of a murder. They found the murderer because of the information provided by Google, but they violated a lot of innocent people’s privacy to obtain that information.

I searched for this story, but could not confirm it. But this is a perfect example of how things get fuzzy very quickly with media law. Was this right or wrong and how far can the authorities peer into our lives through technology? I also wonder, why it was okay to call on Google to solve this particular crime. Certainly, the FBI can’t run to Google to solve all of their murder cases. So, why this one?

Here’s another example: Amazon handed over Echo data to the FBI in a murder case. The company challenged the subpoena at first but later released it with the defendant’s permission.

This may be an odd but fitting story. My husband and I disagree about donating blood. I think people should donate blood to banks whenever they can, but my husband thinks that blood banks use at least some of the blood irresponsibly – perhaps for research or to feed vampires. Blood donation is ethically wrong in our belief system, but both of us would accept blood from the hospital to save ourselves or our children.

People might get a little uncomfortable with the amount of access agencies have to their lives through media, but they’d probably use it to solve their own problems in a heartbeat.

All that said, I still have to figure out what all this means. For now, this knowledge is not changing how I use technology, but I certainly have a lot to think about.

Categories
Week Seven

Extra Credit

My solution for the “grandmother problem” was to have open and honest discourse about the importance of halting the spread of misinformation. I still stand by that, and I still believe that it’s important to engage the people we are able to change and disengage those who will never change their minds.

I ran into the latter. I say ran into, but it was really just another conversation that just so happened to occur in a group chat between a group of my friends. This didn’t occur this week but actually when President Trump’s impeachment trial ended and the result was that he would not be removed from office. I try to keep a pretty diverse-thinking network of friends. One of my friends, in particular, falls pretty far to the right on the political spectrum. He isn’t committing hate crimes or politicking for White Lives Matter, but he is the type of person who was happy to see President Trump acquitted because “it showed the libs” among other things.

He also mentioned that President Trump was on trial for racism and “hurting feelings.” While this conversation was only happening in a small group chat, I sort of took it upon myself to steer him in the right direction as best I could. I explained to him that the president was not on trial for hurting anyone’s feelings and gave a brief summary of why he truly was on trial. It didn’t really result result in any positive change. His main takeaway was that “the Dems lost,” which is par for the course when it comes to most political conversations I have with this group of friends.

I have both liberal and conservative political viewpoints, but I thought, objectively, it was important to let him know that President Trump wasn’t on trial for hurting feelings and that he wasn’t acquitted because the Dems got owned. I’d love to try this with someone who is more open to having their mind changed. In fact, I’d love to have this tried on me. If I ever come to a group chat with information that is verifiably incorrect, I hope I get corrected. I believe that day will come, and I think I’m well-prepared to handle it gracefully and look deeper into the issue.

Categories
Week Seven

How the Law Affects My Use of Media

I think we’d be absolutely crazy if the law didn’t affect the way we see the media. It’s a huge part of how the media goes about doing its job, which is probably the scariest part of the media’s job being to hold those in power accountable for their actions.

I’m absolutely concerned about all of the issues we’ve looked at, and I thought Mediactive did a pretty good job of laying out all of the issues and  each way the law affects the media. I actually had a lot of these ideas introduced to me in JMC 402, Media Law here at the Walter Cronkite School, so I was actually pretty familiar with things like  copyright and defamation.

I think the book pushed my understanding a bit further and gave examples that I felt suited my everyday life slightly more. I’d say that I’m most concerned with defamation. I don’t want to do it to anybody, and I don’t want anybody to do it to me. I’d have to think that the best way to avoid defaming somebody is to make sure that everything you publish is entirely true. If the plaintiff has to prove falsity, I, as a journalist or any other sort of media creator, have to be completely sure that I am not damaging their reputation with falsehood. I also think that the best way to avoid being defamed is to be open. If I’m the first one to admit my mistakes and stay open, honest, and as Mediactive puts it, honorable, I don’t see any way that I could be defamed. I’m sure I’ve made mistakes punishable by Internet death, or cancellation, but I’d like to think I’ve grown from those.

Next, I’m still very concerned about net neutrality. I think that net neutrality would give Internet companies so much say in what we consume, and I don’t think that makes for a healthy media landscape. If we begin to put that power  in the hands of internet service providers, we’re giving them the exclusive right to determine what is easily seen on the internet and what isn’t, which is dangerous for obvious reasons.

I’m third most concerned about censorship, but less concerned about censorship from government. In my experience on the internet, censorship by the people is much more of a problem than censorship by the government, and I think it goes back, once again, to this idea of cancellation we have. We LOVE cancelling, and we’ll cancel anyone who disagrees with us. I’m thoroughly concerned about that to go along with some concerns I see from our government. News broke that Russia would be censoring the new Pixar film “Onward” and its depiction of a lesbian character. This type of censorship would terrify me because it’s regressive at best. Luckily, we haven’t reached that point quite yet in our government, but it’s always a possibility.

Finally, I’m not overly concerned with copyright. I think I’ve been well-prepared to conquer any tasks involving copyright. In fact, we recently had a lesson in fair use in JMC 460, and though the rules aren’t exactly cut-and-dry, it absolutely let me know that I need to remain on my toes for any possible infringements not covered by fair use.

Categories
students

Editting Wikipedia MCO 425 Blog Module 7

One of the most fascinating and at the same time scary aspects of the internet is that anyone can add an contribute content to it. Well, the same lies true for the ever so popular online encyclopedia Wikipedia. Not to be alarmed, Wikipedia has set in place the proper measures to ensure that the contributed content meets the standards of the site.

Wikipedia has online training in place to give contributors and editors the tools the need to ensure accurate insightful content is added to their site.  Through a course of tutorials you can stand confident in your approach to editing and creating. As Wikipedia states, the main thing is to just dive in and “be bold.”

In searching for an article to edit and contribute to, I wanted to stay true to my semester long blogging topic of sports betting. Wikipedia indeed had a page for sports betting that, in my opinion, could have used some contributions. Having my article selected, it was time to begin the editing process.

I started my contribution process by highlighting the edits that I wished to make into the articles “talk page”.

This was my first declaration to the talk page that I intended to reference the existing mention of political election betting with a reference to an article from OddsShark as the previous statement was not referenced. Under the “Sports Betting” section the section ends with discussing previous betting scandals referencing proven cheating ex NBA official Tim Donaghy. I added that proponents of legalization argue that with legalization the chances of future betting scandals are actually minimized due to the fact that regulated sports books and a thriving free market are the biggest watchdogs of foul play, citing an article from USA Today.

Next, under the “Type of Bets” section of the article I proposed to add Team Totals to the existing Totals (Over/Under) section. I also requested to add Player Propositions as a wager type under the existing Proposition Bets section. Under the existing In Play Betting heading, I proposed to add the synonym Live Betting. All of these “type of bets” were referenced with respective articles from OddsShark that describe the bet option.

I waited a full day to hear back from any other Wiki editors with no luck. In hindsight I wish I would have heeded the modules instructions to start the talk group process early to allow ample time for responses. Never the less, twenty four hours later no fellow editors had chimed in and I began my edits.

Getting into the edits, it really was a simple process as Wikipedia said it would be. The platform they have set up is extremely user friendly and the interface provides direction and suggestions for best practices such as including a recap of your edits for other contributors to asses. The best approach to becoming a successful editor is to start with the provided training. Also, editors should take advantage of the talk pages and reach out to other more experienced wiki editors as the platform does a great job of facilitating peer editing.

Once my edits were published, I had a sense of pride for contributing to this article. Sure it’s sports betting, just how important is this wiki article. Well, to me it is, and contributing to it was rewarding. The legalization of sports betting has only recently been available to every state as of May 2018. Since this is such a new market, I believe that early contributions to this article are a great base or framework as I can only see this article evolving more and more alongside the evolving sports betting market.

Overall, this was a very satisfying project. Initially watching the wiki tutorials, it seemed kind of corny when they were indicating that when you contribute you are helping to shape the site and even the world. Presently I can definitely relate with this sentiment. After finishing my edits, I concluded that I will most likely continue to contribute to Wikipedia. The essential skills and core concepts of contributing to wiki does not only add to the platform but actually helps us as students in our pursuit to become more and more digitally literate.

Francisco Healy

 

 

 

 

 

Categories
students

Law and Media

I remember the first high school I attended had changed the required reading during my sophomore year. So instead of reading the regular classical novels or plays, we got to read books like World War Z. This was the coolest thing in the world for a 15-year-old. I didn’t have to read another Shakespearean play, I got to read a book about the zombie apocalypse. Then we started reading a book called Little Brother by Cory Doctorow. We ended up not being able to finish it because a parent complained about a sex scene in the book, but before that, I devoured it. Little Brother is the story of Marcus, who gets caught in the wrong place at the worst time. In the middle of a terrorist attack, Marcus is taken away by the Department of Homeland Security and ordered to unlock his phone. He refuses and is tortured before being eventually released. He then decides that he’s going to use his knowledge of technology and the internet to hit back at the people who wrongfully imprisoned and tortured him.

When I first read the book I was blown away by the idea that the government would go to such lengths to unlock a cell phone. When I was reading the learning materials for this week, I was reminded that the government will do quite a bit to unlock a cell phone. I am consistently reminded that the government and many private entities want as much information about me as they can. This, by itself, is very concerning. I don’t want the government to be able to unlock my phone with an electronic skeleton key. Even if I didn’t do anything wrong. It’s like not wanting someone to go into your bedroom without your knowledge. Even if nothing was touched, it’s still an invasion of your privacy that can make you shudder.

Privacy is incredibly important and hard to keep track of when websites are pulling all kinds of data from your browser’s cookies. Some of the information that we store online is supposed to be private. However, time and time again we see that the information we thought was stored away in a secret vault, far from private eyes, can easily become public. Even googling your own name will bring up a lot more information than what most are willing to let on.

I was able to find my own address and every other address I ever remember living on with that quick Google search. And there’s no way to remove this information here in the United States. If I had a stalker, they could easily find out where I live, where my family members are, and other ways to contact me within minutes.

As there isn’t any way to remove this data from online I will continuously be monitoring what information I share with websites, how those sites use that information, and how to take that information back. I don’t want to be some kind of recluse who doesn’t have any information about themselves available online. But I also don’t want just anyone to be able to find out where I live with a few taps of their keyboard.

css.php