Saturday, April 16, 2011

Cyber Warfare Today


     Cyber attacks are becoming a more prevalent type of warfare engaged in by many entities against another.  Though identifying the source of the attacks can sometimes be subjective due to the lack of technology to do so, there seems to always be a suspicion as to where the attacks came from and what the motive was.  The Russian denial-of-service attack on the country of Estonia in 2007 made headline news as an act of war.  The cyber attacks on Georgia in 2008 during their war with Russia were speculated to be Russian driven.  Lastly, when the U.S. State Department computers of the East Asia Bureau were compromised during 2006, fingers pointed to China.  “The Pentagon warned earlier this year that China’s army is emphasizing hacking as an offensive weapon.  It cited Chinese military exercises in 2005 that included hacking primarily in first strikes against enemy networks.” (Griffin, 2007).  All of these three attacks have one thing in common:  they all used the same silent weapon; cyber-terrorism.
      Estonia is touted to be one of the most connected countries in the world.  The wireless communities and government of this country were rendered helpless in a denial of service attack, due to their extreme internet dependence.  It is a way of life, completing most things via a handheld or laptop, from banking to parliamentary elections.  The attack affected state and commercial websites, most of which were run primarily online.  Foreign and defense ministries, newspapers and banks were specific targets hit.  The denial of service attack in 2007 said to be instrumented by Russia, affected ordinary citizens as well as government officials.  The rippling effect was felt by a large segment of the population and caused chaos and confusion.  “Officials have blocked access to the servers from outside Estonia, to prevent them from being attacked.”  (Lagorio, 2006).   The  attacks  were said to  begin after a Soviet  memorial  statue in  Tallin  was
removed.  The defense ministry says that some of the cyber attacks came from Russian hosted servers.  Of course, Russia is not cooperating or commenting on these events.
     The cyber-attacks during the 2008 South Ossetia war between Georgia and Russia coupled themselves with the bloody shooting battle taking place.  The Georgian government stands firmly with their accusation of Russia for disabling Websites, including the Ministry of Foreign Affairs.  This attack which encompasses massive requests for data is called a distributed denial of service attack. “These attacks appear to be controlled from a server based at a telecommunications firm.” (Markoff, 2008).  Since cyber attacks cost very little, they have taken their place in modern warfare.  Georgia was vulnerable due to its dependence on Russia and Turkey for global internet connections.  The United States is backing a fiber-optic network link under the Black Sea, due to happen in September.  Hopefully this will solve their future issues in this area.
      The computers that were compromised in the East Asia Bureau in 2006 came as a big surprise as nothing was missing.  Even though nothing was physically taken, the damage from these hacks occurred from information theft.  This large-scale intrusion that targeted the offices communicating with China and North Korea, involved the theft of sensitive U.S. information and passwords.  Officials reported that the unclassified systems were affected while the classified areas were uncompromised.  The Defense department noticed similar computer problems last summer, and considers Chinese hackers to be the culprits in that incident, as well as the above noted.  “After the State Department break-ins, many employees were instructed to change their passwords.  The department also temporarily disabled a technology known as secure sockets layer, used to transmit encrypted information over the Internet.” (Davis, 2007).  Identifying this vulnerable area will prevent hackers from transmitting stolen data, covertly from a victim’s network.  Also of note is:  “Many diplomats were unable to access their online bank accounts using government computers.” (Lagorio, 2011).  The problem is said to be fixed, but it was noted exactly how this was done.
    Since hacking is now being viewed as an offensive weapon, this type of cyber terrorism may be a permanent occurrence to be expected by all those connected globally.  “Given that most parts of the world now have access to the Internet, almost any country can fall victim to some form of cyber terrorism or information warfare.” (Taylor, 2011)  Since identifying the sources of these attacks still remains problematic, it will mostly likely grow in the near future.  Furthermore, since the Pentagon is already warning that China’s army is emphasizing hacking as an offensive weapon, the evidence of this type of warfare is proven.  Unfortunately, it appears that the silent weapon of cyber-terrorism is here to stay.  

References
Davis, J., (2007) Wired Website, Hackers take down the most wired country in europe, retrieved   February 13, 2011 from http://www.wired.com/politics/security/magazine/15-   09/ff_estonia?currentPage=all
 Griffin, J., (2007) Fox News Website (2007) Pentagon source says china hacked defense computers, retrieved February 12, 2011 from          http://www.foxnews.com/story/0,2933,295640,00.html
Lagorio, C., (2006) CBS News Website, State department computers hacked, retrieved on            February 14, 2011 from    http://www.cbsnews.com/storeis/2006/07/11/national/main1794152.shtml?CMP=ILC-      SearchStories
Markoff, J., (2009) New York Times Website, Georigia takes a beating in the cyber war with        russia, retrieved February 11, 2011 from http://bits.blogs.nytimes.com/2008/08/11
Taylor R. W., Fritsch E., Liederbach J., & Holt T. (2010). Digital crime and digital terrorism         (2nd ed.) New Jersey: Prentice Hall.

Monday, April 11, 2011

Houdini Corkscrew - How to use it!

The Houdini Corkscrew - It's use made easy

     The corkscrew in its traditional form has been around for many years.  Anyone who drinks wine will need to somehow remove the cork from a bottle.  Though there are a couple of new versions for cork removal, little has changed to facilitate this process over the decades.  That is, until the invention of Houdini, “the corkscrew that works like magic.”
     The mechanism choice for an objective description came out of the necessity for use.  My Houdini Corkscrew has been unused, in a drawer for the better part of a decade.  Even though it is intended to make the removal of a cork easier, the package remained unopened.  Of great benefit is that it expels the cork from the corkscrew in one motion, as opposed to the arduous task of hand turning the cork out of the spiral.  The complicated look of it is baffling without providing any clues about where to begin, and I think that is why no one had ever made an attempt of any kind.  We simply did not read the directions, nor figure out what to do.  Instructions are absolutely necessary for this device, until becoming accustomed to the way that it functions.  If you were, or are confused; do not feel alone.  There are people that have felt the necessity to post directions for its use on the internet.  Indeed, it looks complicated with its odd “rabbit ears” and a very strange yet sleek, black and chrome design.  Do not let it gather dust any more, as help is here.
     First, make sure that the metal wrapping has been removed from the cork.  There is a nice little device that has been provided, with two blades for removing this metal wrapping.  Simply position the round part over the top of the cork and give it a turn.  It will cut a perfect little slice through the metal, removing it instantly.  Make sure to remove this metal first, as trying to put the corkscrew through the metal could ruin the integrity of the protective coating that is intended to prevent rust, and could damage the device.  Also, take off any wax that may appear on some corks.  After the cork is completely clean, grasp the rabbit ears firmly in one hand and raise the lever which will position the corkscrew on top of the cork.  Now, close both of the rabbit ears until they surround the neck of the bottle.  Next, lower the lever, which brings the corkscrew up and removes the cork from the bottle.   Finally, raise the top handle, and the cork is magically ejected from the corkscrew.
     This device, though complicated at first, is the fastest way to remove a cork from the bottle.  It also instantly ejects the cork from the spiral once done which is fun and amazing.  Furthermore, it works on all size bottles, comes with the cutter for removing cork metal, a spare spiral piece and a five year warranty.  It retails for $21 at retail and online stores.  Pollen Design and Metrokane of New York are the designers and inventors of this product, and further investigation shows that they have an entire line of wine and other accessories available worldwide. 
Patent number:  D441,265,D442,045  Made in China, Universal Product Code: 022578028033
References
D. Pitow, Houdini Corkscrew Instructions. Retrieved from: eHow website on October 20, 2010, http://www.ehow.com/way_5623128_houdini-corkscrew-instructions.html


Blogging for Beginners ~ Things to consider when creating a blog

Blog Elements    
     Creating a blog requires a good combination of many elements; with purpose, content, design and audience being the main components.  Purpose can range from self expression to political statements, with many other topics in between, but there needs to be some type of motivation that fuels the post, otherwise little interest will be created.  This interest is tantamount, as ultimately a blogs main purpose revolves around the focus of attracting readers through its content.  These elements are the main focus and work together with an overall design that draws in readers, and hopefully calls them to action, adding depth and meaning, which translates into not only a memorable blog, but one that people want to follow.  Of course, intended audience can be comprised of only a small cross section of readers, while other blogs are intended to appeal to a much broader audience.  One blog may have a scope that is vast, while another goes stagnant, and there lies the important focus of a blog and its components.
     Purpose is the answer to the question of why someone would create a blog.  Often a blog is an assignment for a class, but some blogs are intended to deliver a message of one kind or another.  People search the web for answers to questions and the internet offers a wealth of information posted by bloggers and experts.  Often, the distinction between the two is blurred, so it is important to verify information and look at the source and references.  Just because it appears on the internet does not mean that it is true.  Bloggers are filled with intention, and their vehicle is their post, coupled with content choice.
      The most important component of a blog may be content.  Though there are quite a few celebrity cites that seem to have a good following, not everyone is interested in this information.  Some people are looking for current events, while others are interested in directions, or how to information for project completion.  Providing interesting opening lines and titles that draw the reader in, coupled with an absence of grammatical errors shows professionalism in a blog, helping hold viewers.  Receiving comments and offering responses, helps involve readers and make them feel wanted and appreciated, which can increase followers.  Whatever the interest of the reader is, involving them and providing content that is interesting and current can make or break a blog. 
     Next, the audience can vary from post to post, but a blog needs focus on who the intended reader is.  There should be some kind of uniformity for the intended reader and what may be of interest to them.  Writing for an audience and the intention behind that will help with the actual information and how it is provided.  Knowing who the reader is and how they will be written for is a function of knowing the audience.
     Importantly, design will draw in readers or send them away.  The content could be great, but if the design is too busy or distracting, the reader may exit the site.  Structure of a blog is like the foundation of a building, and needs to be built with balance, while including clarity, details and functionality. I recommend choosing the left alignment. This will make your picture move to the left of the page, with the text flowing to its right.” (Piechnic, 2011).Typestyle that is clear and easy to read is very important as the sizing and color of headlines and captions.  You can design logos and custom headers at cooltext.com.  This is a great site to add interest in a unique way that you won’t find on every other blog.  The overall layout of a blog needs to be organized and simple, avoiding confusion and colors that clash.  Black backgrounds are hard on the eyes and should be avoided at all cost.  One word of caution goes out concerning widgets and gadgets:  Too many of these can create confusion and make a blog look junky.  It is important to choose them wisely without over doing it.  Darren Rowse of Blog Design says that: “Remarkablity is the   difference between a good blog and a great one.”  (Rowse, 2008).  Furthermore, soothing colors that blend well coupled with serene designs, with a few gadgets to create interest, will keep the visitor there and reading; the main intention of a blog.    
     Finally, a blog is an ongoing work in progress, always evolving to improve and create interest.  Most blogs will change over time as their authors make advances in content and design creation.  Since there are so many layouts, designs, gadgets and widgets, transformation is a combination of effort and time, and the product that results can be a site of great dimension.  Blogs are like art, a wonderful creation that can be something beautiful to not only read, but to behold.
References
Piechnic, D., (2011), How to set up a blog, Website Set Up Guide, retrieved April 9, 2011 from             http://websitesetupguide.com/basic/blog wordpress.htm?gclid=CLbc3eSRlagCFWUbQgodYgeBCg
Rowse, D., (2008), How to craft a blog post, ProBlogger website, retrieved April 9, 2011 from             http://www.problogger.net/archives/2008/08/12/how-to-craft-a-blog-post-10-crucial-points-to-pause/                       

Tuesday, April 5, 2011

How Virtual Worlds Can Influence Intercultural Communications

Can Virtual Worlds Really Improve Intercultural Relations?

     Virtual worlds can create new channels of communication between cultures that may not have the opportunity to interact otherwise.  This type of online gaming venue is the vehicle that enables interaction between anyone who chooses to play at that particular time.  Because participating in these online worlds is open to anyone without restrictions, no one is excluded.  The anonymous nature of the avatar levels the playing field, while existing in a nonthreatening environment.  Messages presented in this arena may be more easily accepted, as well as help influence the ability to conceptualize the concept(s) presented. 
     Poems and songs can be used to communicate ideas in this fantasy world and can be more effective than those presented in more serious situations.  Somehow, a serious topic can be turned into a whimsical vision, while getting the point across without threatening anyone.  There seems to be a feeling of safeness in the anonymous nature that portraying oneself as an avatar creates.  This may positively affect receptiveness, and understanding as well.    
     Since many people have negative views of the Islamic culture, and view Muslims poorly, the unsupported nature of these thoughts needs to be addressed.  Stereotyping and bias has been perpetuated due to a few extremists who have tainted the overall image of these people.  Terrorists are being linked to Islam unfairly, and it is difficult to change people’s general attitudes toward the Islamic culture.  Virtual worlds and avatars can improve these cultural relations, because they reach many people and offer the information by communicating in ways that give people a chance to change their minds.  Quite possibly, the virtual world is a less harsh environment that may help eliminate racial bias by replacing it with understanding, compassion and empathy, all while offering entertainment.
     Though the virtual world has some limitations for improving intercultural relations, such as not encompassing those who do not play; its benefits far outweigh the drawbacks.  One thought is: Since these worlds revolve around fantasy, it may be difficult to present controversial topics in this arena. In my opinion, anything that improves global relations by offering a dissemination of information, while quashing stereotypical behavior, and creating more avenues to open one’s mind, is a good thing.  The very thought that anyone can participate in these avatar driven, virtual worlds opens up intercultural communications.  Virtual worlds simply did not exist ten years ago, and though they were intended to be a form of entertainment, the benefit of enhancing communication between cultures was not a consideration in their creation.  No one could have predicted the sphere of influence that these games can achieve globally.  Considering groups that are often involved in conflicts offers examples for contemplation and improvement.
     “Muslims represent a growing social and political force that questions some of the west’s dominant cultural patterns, particularly the following:  The relationship between God and humankind, the role of morality in human affairs, the role of technology and modernization, and the nature of progress.” (Jandt, 2010).  For example:  Islam does not tolerate greedy and selfish capitalism, which is dominant in the U.S., creating ongoing tension.  Understanding these and other cultural differences, offers a chance at better interactions overall.
     “I believe that diversity, like democracy, is a process, not an outcome.  It is something that people should participate in, as they participate in a democratic society.  Only together will we make good on the promise of a diverse democracy.” (Wu, 2007).      
     With more interaction of cultures comes tolerance and understanding, even if it happens in a virtual world.  Knowledge creates flexibility, patience and an open mind to view things differently. In contrast, lack of information and communication can create racial bias and stereotyping.  Propaganda can make people view things in a one dimensional fashion if they do not have any other information for comparison.  The more people know and interact peacefully the better off global relations will be, while improving intercultural communications worldwide.
References ~
Fischer, A., (2004). With a foot in each culture, Wu, F., Howard University professor fights           racial stereotyping, retrieved January 17, 2010 from http://www.loc.gov/lov/licib/0405- asian.html
Jandt,  Fred, (2010). An Introduction to Intercultural Communication (6th ed.). Thousand Oaks,    CA: SAGE Publications, Inc.