Thursday, November 18, 2010

Blog Post 4: Privacy

As more and more people move their lives into the digital space of the Internet, the issue of privacy online edges itself further into the spotlight. Privacy can no longer be achieved with a high fence, drawn blinds and an unlisted phone number. Now, any number of holes in a variety of online resources that nearly every individual utilizes could compromise their privacy. But the holes aren’t only in the seemingly secure information people enter into ecommerce websites or through registrations for services, an individual’s privacy can also be compromised with the information they willingly solicit through the most popular activities for Internet users today: social networking. We live in interesting times, where the concern of maintaining privacy is being willingly lowered in favor of personalized content and greater connectivity with our peers. Individuals online are walking a delicate tightrope between openness in their online interaction and having their identity compromised, used as just another commodity to buy and sell.

Right now, your privacy is being chipped away in small chinks and sold back to you in the form of advertisements. This practice has been pioneered by search engine providers like Google to search through your browsing history or the contents of a page and then present advertisements from its database of advertisers that best fit your interests. Information about your browsing is also gleaned from cookies left by many websites and can be extracted and sold to marketing firms and agencies. This practice may sound questionable, but it is entirely legal and, in more extreme circumstances, can be enforced through an end user agreement that an individual must agree to before they’re able to progress onto the service. Now, all this gives business an incredible edge, as they’re able to target and capitalize on your interests as never before. However, privacy advocates are justifiably concerned that this sale of your personal information violates your expectation to privacy and, in response, have taken the issue to Washington. Earlier this month, the New York Times reported that commerce and trade commission officials were at odds on how to solve the privacy problem on the internet. While trade commissioners wanted something akin to a “do not call” listing for internet sites, where you could universally check a box that would drop you from the cookie radar, commerce officials want the industry to self-regulate. Why the disparity? Because, tracking your movement and interests, selling your information, and targeting you with an ad for a product you’re more likely to buy is good for business.

Hacking into a secure database and stealing your records or installing a program that usurps control over your computer or leaks out your private information is the devil you know. The devil you don’t know is social networking. Social networking has become one of the biggest concern for privacy experts and the biggest darling for those who wish to move real social interactions online. Facebook has become the largest target for privacy advocates, as joining their network almost seems like a requirement for interacting in many real world social situations. The service’s notoriously bad reputation for protecting privacy has not kept it from expanding its influence to challenge even search engines like Google for control over your information. Google and Facebook are now locked in a battle for control of your information, leading Tom Krazit of Cnet News to warn us that “if you really want to control your data, don’t put it on the Internet.” () While Facebook wants more openness when it comes to your data, Google simply wants to catalog and track it and both have the same goal: to sell your information to marketing firms and other businesses that compile the data to create more detailed ways to sell you things. The rise of social networking has provided a wealth of sensitive information that people have solicited voluntarily, allowing unprecedented access to information that would otherwise take a detailed poll or an actual relationship with a person to uncover.

We used to protect our information behind walls, but the Internet is quickly turning those walls into glass. Online transactions, the digitizing of records both public and private, and social networks have all worked to put us out in the open. The government is slowly reacting to the concerns of individuals throughout the United States, and recently the idea of forming a committee to serve as an Internet watchdog to police the network for violations of privacy as well as other infractions has taken shape. Enforcement of such a policy is still a long way off, so in the meantime, we’re all either stuck taking Krazit’s advice or simply becoming more cautious in our privacy settings. Your best defense, in the case of privacy, is to know exactly what you agree to online and your biggest enemy is yourself.

Thursday, November 11, 2010

Blog Post 3: Cyberwarfare

It’s common knowledge that information is power. Those who have understood this count amongst history’s greatest leaders, but in the digital age, information is abundant and access to it is both limitless and instantaneous. The threat of information being stolen or manipulated has spawned a new type of conflict: cyberwar. Cyberwar is a battle to both control information and to manipulate the vast network of computers that makes our modern world run. In many ways, cyberwar is more serious and effective than open combat because now, with our increased reliance on computer systems, the possibility to bring down an entire country without firing a shot is a very real possibility.

The possibilities of cyberwarfare were seen in the private sector as early as the 1980’s, when civilian hackers would infiltrate supposedly secure systems to pilfer information. The phenomenon was popularized by the entertainment industry, but recently the instances of countries becoming involved in organized espionage and network disruption has increased. In 2009, the US admitted that the nation’s power grid could be compromised by cyber terrorists looking to disrupt the country’s infrastructure. It was thought then that Russian or Chinese spies could infiltrate the system to disrupt a country without causing an international incident. China, in fact, is one of several countries who have made intensive efforts to develop a cyber army for that express purpose and has been addressed as a possible threat by a 2010 Annual Department of Defense report.

The threats to security are grave indeed: logic bombs that can disrupt mechanical operations, the theft or tampering of secure information, and the disruption of satellites or even the internet network itself ranks among some of the most dire concerns. What sounds like science fiction has been happening since the 1980’s, and in the 2000’s has been rapidly gaining momentum. Major world powers have not turned a blind eye to this trend, and nearly every developed nation now has a department devoted to protecting their respective systems from attacks. The United States is only slightly different in that its division mainly protects government and military assets, leaving the commercial systems to develop their own measures of security. The United States has also struggled with introducing a fail-safe “kill switch” for the Internet that would essentially give the President emergency control over the United State’s telecommunications network. The difficulty in this proposal is the obvious issues of having a privatized system given over to government control.

Ultimately, this will be a field of combat that will continue to grow as our reliance on computer networks increases. Instead of a cold war arms race, we now face an intellectual arms race in which computer experts must be trained in the ins and outs of cyber warfare. At the moment, countries like Iran, China and Russia have some of the largest forces when it comes to cyberwarfare. Israel has learned from conflicts with Russian hackers that have been hired in various conflicts to disrupt Israel’s systems about how to combat these threats. Also, Europe has recently initiated a cross-European cyber war simulation in order to formulate a better strategy to combat a possible electronic assault. The number of conflicts from 2000 up has continued to escalate, and concern has risen amongst superpowers, proving that this new arena will be a much bigger component in both terrorism and international conflict.

Tuesday, October 19, 2010

Monday, June 15, 2009

Tools of the Trade, Revisited.


Entering this course I had a lot of practice in writing formal educational papers, but very little knowledge in writing for a mass audience. Adjusting was difficult, AP style being the worst of it, but in the end I appreciate the grasp I have on making my writing more accessible.

I began with an interest in web based journalism, and that interest hasn’t diminished. I’ve learned throughout the course that nothing’s quite as easy as it seems and that there’s a fine art to whittling down 500 words into 50, divided into 3 bullet-points. Writing on the web is still appealing, however, and I was happy to learn that many of the same concepts I learned in newspaper writing could be carried over to the web field.

Writing for broadcast and public relations were less interesting to me, but still vital. It’s nice to have a solid base to work with in case I need to expand my horizons and adapt to my job. Skills like these will lend to easy adaptation; a must in the current landscape of professional mass communication. With the internet challenging the thought and structure of mass media, it’s nice to be well versed in all forms of communications writing.

Ultimately I feel as though not only my writing has been made stronger as a whole, but also my ability to decipher and present information in its most accessible and efficient form. With so much information bombarding even the most casual browser, the ability to boil down complex stories into informative and engaging segments will be crucial to my career as a professional journalist. I have COM 210 to thank for this newfound ability.

Sunday, June 14, 2009

The Anheuser-Busch Clydesdale Horse team trots into the Ceder Point Amusement Park June 12th

Sandusky, OH – The World-Famous Anheuser-Busch Clydesdale team will be at the Cedar Point Amusement Park and Resort in Sandusky Ohio for one day only, Friday June 12. Cleveland Browns Quarterback, Brady Quinn, will join the horse team that has delighted millions around the world as they parade through the park at 2 p.m. that day. Before and after the parade they will be on display at the famous Wicked Twister coaster ride from 1:30 to 2 p.m. and again from 2:30 till 3 p.m.

The first team of Clydesdale horses was given to August Busch Sr. by his son, August Busch Jr. to celebrate the end of prohibition and the legal sale of beer in St. Louis. Since then they have become symbols of American heritage itself and a full team of 8 horses will be pulling a painstakingly maintained vintage beer wagon, similar to the wagon first presented to the Senior Busch, throughout the day. These magnificent animals are six feet tall at the shoulder and weigh a staggering 1800 to 2300 pounds. Their tack and harness alone weighs 130 pounds, and to keep up with their size and levels of activity, one Clydesdale eats as much as 20 to 25 quarts of feed per day along with 50 to 60 pounds of hay and 30 gallons of water.

Five teams of Clydesdale horses travel to just 300 cities a year in addition to being present at major sporting events like the Superbowl, so don’t miss a chance to see them for yourself in person at the Ceder Point Amusement Park in Sandusky, Ohio!

Anheuser-Busch produces two of the best selling international beers, Budweiser and Bud Light, and operates 12 company breweries throughout the United States.

Media Contact:

Steven Strait

Anheuser-Busch

FOR IMMEDIATE RELEASE


Thursday, June 4, 2009

Newscast Script

good morning, i’m steve strait along with michael isam bringing you the 11 am edition of com210 “eye on the news” for wednesday, june 3rd 2009.

in World news:

North Korea has announced more missile tests, ratcheting the tension levels of its neighbors even higher. In response to these launches, the united states has released a report that shows the country to be prepared to defend itself against intercontinental missiles launched from north korea. Army general Patrick O’reilly is confident that, based on the data the army recently gathered through tests of the system, the coast of the u.s. is safe from the worst of missile attack.

Here at home:

Former vice president Dick Cheney surprised many of his fellows in the GOP by announcing he was tolerant of Gay Marriage saying: “If that’s what people in the state want, that’s fine by me.” Cheney is making a media circuit with his daughter, discussing their collaboration on his new memoir. On the tour he’s discussed his stance on issues ranging from Barack Obama’s competence to Saddam’s involvement in 9/11, but his commentary on the gay marriage controversy is sure to draw the most attention from fellow republicans. His stance also puts him to the left of current president Barack Obama who recently signed a declaration for Gay, Lesbian, Bi-Sexual and Transgender month that endorses civil unions over traditional marriages.

In the Entertainment world:

it’s summer and that means it’s time for the electronic entertainment exposition, or e3 for short. recently microsoft wowed audiences by unveiling project natal. natal is a motion capture system that allows you to control your games through natural motion without a controller. the system is billed as a revolution, and has received funding and support from visionary director steven speilburg. the date that natal will launch is still under wraps however, but i’m sure many of us can’t wait to not get our hands on it.