Feeds:
Posts
Comments

Posts Tagged ‘computer’

Not completely computer illiterate, installing a Mac, retaining the PC, adding an airport connector for wireless, and keeping things intact sucks.  Trying to keep our sanity and Internet connection at the same time. 

Feeling like the $1000’s of dollars were for a lump of  i-coal. 

Stupid yellow flashing light on the airport.  Shit and piss on apple for saying how easy it is to connect.  It is not!  Liar, liar.

Until resolved b well.

Advertisements

Read Full Post »

internet

The SEC and Department of Homeland Security are saying we need a web backup plan in the event the H1N1 Swine Flu Pandemic forces people to stay in their homes to use computers even more than usual for work or play.

Homeland Security Department accused the GAO of having unrealistic expectations of how the Internet could be managed if millions began to telework from home at the same time as bored or sick schoolchildren were playing online, sucking up valuable bandwidth….Private Internet providers might need government authorization to block popular websites, it said, or to reduce residential transmission speeds to make way for commerce.  http://www.reuters.com/article/newsOne/idUSN2620750120091026?pageNumber=1&virtualBrandChannel=0

Are politician looking craft new ways to get more control on the last free media frontier we have? We believe it is essential that the Internet remain unrestricted with an open platform. 365 days a year, 24/7.  President Obama on the other hand has not been quiet about pushing for Internet legislation.

The government wants to make sure everyone has access to the Internet and have set aside $7.2 billion in stimulus dollars for construction.http://www.examiner.com/x-10317-San-Diego-County-Political-Buzz-Examiner~y2009m10d21-Net-Neutrality-enforcement-may-reach-into-your-computer Again with the stimulus dollars.  Private investment and the private sector is what has spurned it’s growth.  As we have been witness to banks and car companies who accept bailout funds, they also accept government control and regulations. 

Last week the FCC begin consideration of the rules that would protect and promote open broadband pipes to the Internet. Over the next several months, an official rule making proceeding will take place, along with public workshops and technical advisory discussions, allowing everyone to provide feedback before the Commission adopts a final set of rules.  The proposed rules can be found here as a pdf http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-09-93A1.pdf  We found it interesting that on p. 97  the document quotes Thomas Jefferson, “The course of history shows that as the government grows, liberty decreases.”

Google CEO Eric Schmidt and Verizon Wireless CEO Lowell McAdam showed in a joint blog post that stakeholders can work together with mutual respect to find common ground, even as we acknowledge and defend important policy differences.  http://googlepublicpolicy.blogspot.com/2009/10/finding-common-ground-on-open-internet.html

One significant issue, is that the government apparently uses the same Internet protocols and the same operating systems as the private sector, making cyber security a universal problem as opposed to a governmental problem.  Hackers may find a greater payload in targeting critical infrastructure such as power grids, financial or communication networks or air traffic control systems than in attacking the CIA or the Pentagon.  An attack by an adversary nation, much less a cyber extortionist or terrorist, is not so far-fetched. http://www.latimes.com/news/opinion/commentary/la-oe-zirin14-2009oct14,0,603775.story 

 internet2usamap2

The federally funded Next Generation Internet (NGI) project (http://www.ngi.gov/) exists parallel to and complementary with Internet2, http://www.internet2.edu/ We have trouble believing that America’s nuclear weapons arsenal operate on the standard net. Internet2 is not available to the general public, even though our taxpayer dollars support it.  More about that here https://ahrcanum.wordpress.com/2009/07/15/internet-censorship-shocking-treatment-of-taxpayer/ The speed of information-sharing network on Internet2 is now 100 Gbit!

Thomas has the draft of the Rockefeller Cybersecurity Act S 773 here,  http://thomas.loc.gov/cgi-bin/query/z?c111:S.773.  It  gives the president powers to “declare a cybersecurity emergency” and shut down or limit Internet traffic in any “critical” information network “in the interest of national security.”  More of our previous thoughts here https://ahrcanum.wordpress.com/2009/08/29/obama-internet-controcybersecurity/

The proposed rules claim that Cisco’s built Internet routers have over 28.1 million lines of code- does anyone realistically foresee the government being able to regulated something so large?  Are attacks of the Swine Flu more common than cyber security breaches?  We we do know that the nation has done a pretty miserable job coordinating it’s response to past emergencies as evidenced by Hurricane Katrina, the financial bailouts, and now the H1N1 Swine Flu Pandemic.  If big brother takes over the Internet, the last bastion of freedom of speech in what is left of our democracy, could be gone.

photo props to Bikes Over Baghdad http://bkachinsky.transworld.net/,

 flag tounge

Open wide, say ahhh and check out these posts on the A/H1N1 Swine Flu from Ahrcanum, where the conspiracy spreads as fast as the virus itself.  https://ahrcanum.wordpress.com/swine-flu-report/

Subscribe Now for free in the top right margin.

Read Full Post »

With more change you can believe in; President Obama and his administration has taken over banks, insurance companies, portions of the automobile industry and continues to set his eyes on controlling the private sector of the Internet. 

Back in April 09,”Senator John D. (Jay) Rockefeller IV, Chairman of the Senate Committee on Commerce, Science, and Transportation and Senator Olympia Snowe (R-ME) today announced the introduction of comprehensive cybersecurity legislation to address our nation’s vulnerability to cyber crime, global cyber espionage, and cyber attacks that could potentially cripple the United States’ critical infrastructure.http://commerce.senate.gov/public/index.cfm?FuseAction=PressReleases.Detail&PressRelease_id=bb7223ef-1d78-4de4-b1d5-4cf54fc38662

The first draft, pdf http://cdt.org/security/CYBERSEC4.pdf has apparently gone through some revisions, but continues to give the president powers to “declare a cybersecurity emergency” and shut down or limit Internet traffic in any “critical” information network “in the interest of national security.”  The new working draft of the Rockefeller/Cybersecurity Act / S.773  can be found here http://thomas.loc.gov/cgi-bin/bdquery/z?d111:s.00773:

I wonder what the definition of a critical information network or a cybersecurity emergency is?  Would Obama decide that too many blogs or news stories that are in disagreement with his policies requires a shut down?

The bill does not define a critical information network or a cybersecurity emergency. That definition would be left to the president.

The bill also gives the Secretary of Commerce “access to all relevant data concerning [critical] networks without regard to any provision of law, regulation, rule, or policy restricting such access.”  Translated, this the government can monitor or access any data on private or public networks without regard to privacy laws.  How special that our Constitutional Harvard Law Graduate of a President continues to erode our Constitution and freedom of speech.  What about Constitutional protection against searches without cause?

Granted, cybersecurity threats are real and we need to protect the nation’s critical infrastructure.  A little law from the 1980’s- The Electronic Communications Privacy Act (ECPA)  requires law enforcement seek a warrant before tapping in to data transmissions between computers.  To whom does Obama answer? The Internet Security Czar?  ROLF. 

In conspiracy land, Obama could make use of Rep. Linda T. Sanchez bill http://thomas.loc.gov/cgi-bin/query/z?c111:H.R.1966 pending that says, “`Sec. 881. Cyberbullying. (a) Whoever transmits in interstate or foreign commerce any communication, with the intent to coerce, intimidate, harass, or cause substantial emotional distress to a person, using electronic means to support severe, repeated, and hostile behavior, shall be fined under this title or imprisoned” ……. I am having emotional distress at the possibility of government restricting information!  Is the White House distressed because people disagree with the Health Insurance reform bill? 

With the coming of Internet 2, 3, 4, 5 etc we are already restricted. The federally funded Next Generation Internet (NGI) project (http://www.ngi.gov/) exists parallel to and complementary with Internet2 that is filled with bits of information that the common Internet user does not have access to even though our tax dollars fund it. I’m no expert, but wouldn’t it make sense to take critical networks to another level?

Melissa Hathaway, the White House’s last acting cybersecurity czar jumped ship after her recommendations were made. She, ” figured out that what the government can do to secure cyberspace is … nothing. Neither the computer networks nor human organizations cited in the official definition of cyberspace in Hathaway’s report were designed for top-down regulation. Federal oversight works for airports, but not for the Internet. In cyberspace, the best thing the government can do is what Hathaway just did: get out of the way.  http://venturebeat.com/2009/08/04/cybersecurity-czar-has-the-right-idea-give-up-on-centralized-security/

From the White House earlier this month,”we’re asking for your help. If you get an email or see something on the web about health insurance reform that seems fishy, send it to flag@whitehouse.gov. sourced at http://www.whitehouse.gov/blog/Facts-Are-Stubborn-Things/.  The Privacy Act of 1974 courtesy of  Nixon’s Watergate scandal prohibits any federal agency from maintaining records on individuals exercising their right to free speech but there is also a statute that requires the White House to retain all communications that it receives. More on this at https://ahrcanum.wordpress.com/2009/08/08/white-house-fishy-information-legal-in-cyberwar/

The conundrum boils down to one more thing the government seeks to control.  At least the premise of the Fairness Doctrine for the time being is on the shelf. 

 From the folks at CBS NEWS http://www.cbsnews.com/blogs/2009/08/28/taking_liberties/entry5270834.shtml who talked to Jena Longo, deputy communications director for the Senate Commerce committee, on the phone. She sent me e-mail with this statement:

The President of the United States has always had the Constitutional authority, and duty, to protect the American people and direct the national response to any emergency that threatens the security and safety of the United States. The Rockefeller-Snowe Cybersecurity bill makes it clear that the President’s authority includes securing our national cyber infrastructure from attack. The section of the bill that addresses this issue, applies specifically to the national response to a severe attack or natural disaster. This particular legislative language is based on longstanding statutory authorities for wartime use of communications networks. To be very clear, the Rockefeller-Snowe bill will not empower a “government shut down or takeover of the internet” and any suggestion otherwise is misleading and false. The purpose of this language is to clarify how the President directs the public-private response (emphasis mine) to a crisis, secure our economy and safeguard our financial networks, protect the American people, their privacy and civil liberties, and coordinate the government’s response.

“Free speech goes right to the very heart of what it is I talk about all the time – blogging. I believe that bloggers form an army of citizen reporters. Not all bloggers get it right. Some of them are downright nuts. But, in a country with free speech, that is par for the course.” says http://www.davidrisley.com/2009/08/28/free-speech-infringement/ and I agree wholeheartedly.

I said it before,” What’s a good defense, if you don’t have a good offense like Big Brother collecting personal data?” Now having the potential to just shut it all down as the President deems, dooms us to another step up the socialism ladder.   Pulling the plug on grandpa and the Internet in the same presidency redefines liberty and tyranny.

Read Full Post »

keyboard

Never mind protecting our electric grids, air traffic control systems, water supply systems from cyber attack.  Big Brother, President Obama and the White House blog  is concentrating on monitoring the right to free speech in the blogosphere…

There is a lot of disinformation about health insurance reform out there, spanning from control of personal finances to end of life care.  These rumors often travel just below the surface via chain emails or through casual conversation.  Since we can’t keep track of all of them here at the White House, we’re asking for your help. If you get an email or see something on the web about health insurance reform that seems fishy, send it to flag@whitehouse.gov. sourced at http://www.whitehouse.gov/blog/Facts-Are-Stubborn-Things/

So is it legal?  The Privacy Act of 1974 courtesy of  Nixon’s Watergate scandal prohibits any federal agency from maintaining records on individuals exercising their right to free speech.

“The White House is in bit of a conundrum because of this privacy statute that prohibits the White House from collecting data and storing it on people who disagree with it,” Judge Andrew Napolitano, a FOX News analyst, said Friday.  “There’s also a statute that requires the White House to retain all communications that it receives. It can’t try to rewrite history by pretending it didn’t receive anything,” he said.

Ah, lest we not forget that America is under a Public Health Emergency thanks to H1N1 Swine Flu, which opens another can of worms that could erode private citizens rights. 

The threat and potential for mandatory mass inoculations and martial law would certainly give the Administration latitude to collect whatever information it deems necessary in the interest of national security. 

The advent of Internet attacks — especially those suspected of being directed by nations, not hackers — has given rise to a new term inside the Pentagon and the National Security Agency: “hybrid warfare.” http://www.nytimes.com/2009/04/28/us/28cyber.html?pagewanted=2&_r=1&ref=technology

Is cyberwar and hybrid warfare covered by the War Powers Act? 

Believe you me it is not just the government who wants to know if you are in disagreement or have something of value stored on your computer, “The experts are sure of only one thing: whenever information is vulnerable and has significant monetary or intelligence value, it is only a matter of time until someone tries to steal it.” http://www.scientificamerican.com/article.cfm?id=hackers-can-steal-from-reflections

“In the 1960s American military scientists began studying the radio waves given off by computer monitors and launched a program, code-named “Tempest,” to develop shielding techniques that are used to this day in sensitive government and banking computer systems…..Similarly, commonplace radio surveillance equipment can pick up keystrokes as they are typed on a keyboard in a different room”

What’s a good defense, if you don’t have a good offense like Big Brother collecting personal data? 

When you die, and having duly paid your death tax, your personal data will live in infamy- whether you like it or not and whether it is legal or not. 

related post https://ahrcanum.wordpress.com/2009/08/05/white-house-informant-report-fishy-things-on-health-care/

Read Full Post »