Friday, January 30, 2015

Thursday, January 29, 2015

The Costs of Cyber Crime

Cyber crime is one of the fastest growing criminal activities, and one of its most costliest. Today, we are going to look at the escalating financial harm caused by cyber crime, including the categories of theft and what countries suffer the most.

To begin, answer these three questions (take a guess!):

1. How much do officials estimate cyber crimes to cost worldwide?

2. What three countries report the greatest financial loss due to cyber crimes?

3. Name three types of economic cyber crime.

4. What country is believed to be the worst perpetrator of cyber economic espionage?



Articles

Estimated Cost of Cyber Crimes Worldwide

US Government Going After Hackers


Wednesday, January 28, 2015

Cyber crimes

In addition to cyber warfare, another 21st century concern is cyber crime. Millions of people have already been affected by stolen data including Social Security numbers, credit card information, and bank account information. This growing field of criminal behavior is difficult to trace and transcends national boundaries, making law enforcement difficult.


What happens when you swipe your card?




One of the more well publicized cyber crimes involved the theft of credit card data from Target. Read about it here: Target breach shows you can be a victim of cybercrime at a brick and mortar store.

Tuesday, January 27, 2015

Presidential Power & Cyber Military Power

As the US builds up its cyber military capabilities, there are several questions about its use. First, what limitations are there on presidential power and use of cyber attacks? Should the US use the cyber military for defensive or offensive attacks?

Broad Powers Seen for Obama in Cyber Attacks

The Dangers of Obama's Cyber War Power Grab

Pentagon Goes on the Offensive Against Cyberattacks

Read the above articles and come up with several discussion questions for each article.

Friday, January 23, 2015

Friday Forum: American Sniper--Hero or Killer?

The movie American Sniper was released last week to record breaking ticket sales and critical acclaim. However, this Oscar nominated film has also raised some controversy over its portrayal of Chris Kyle, credited with the most sniper kills in US military history, as an American hero. Critics contend that it glorifies killing and is equivalent to American war propaganda.






American Sniper: Was Chris Kyle really a hero?


Thursday, January 22, 2015

USCYBERCOM: The US Cyberspace Military






Army Cyber Protection Team


Assignment: Read the following article and answer the questions below.

First Strike: US Cyber Warriors Seize the Offensive

1. The Department of Defense has recently stated that cyberspace is the fifth domain, joining air, sea, land, and space. How is "cyber superiority" as critical in future conflicts as air superiority? What is the US military doing to achieve this advantage?

2. Explain what the zero-day market is. What is actually be sold? Who is competing to buy this information and why? What are some of the potential concerns?

3. Should private companies be legally allowed to strike back if information has been stolen or is it now a law enforcement or government responsibility? Explain your answer.

4. Has Stuxnet created a cyber arms race? Should there be an international treaty restricting the use of cyber weapons, similar to treaties on nuclear and chemical/biological weapons?

Tuesday, January 20, 2015

Cyber armies: Preparing for the next war?

Many experts believe that the next war will involve both conventional warfare and cyber warfare. Countries throughout the world are investing heavily in defensive and offensive capabilities. Today we are going to look several countries' cyber military capabilities.


Your task: Research your assigned country and find out as much as you can about their cyber military program. Prepare a briefing to present to the President of the United States.

Here are a few things you should try to find out:

  • Name of program
  • Size of program
  • Budget
  • When established
  • Level of organization/acknowledgement by the government
  • Recruitment/Training
  • Suspected or known operations
  • Defensive vs. Offensive
  • Threat assessment
  • Any other pertinent information
Countries: Iran, India, Russia, China, Israel, Syria, United Kingdom



Friday, January 16, 2015

What's Causing the Price of Gas to Drop?



Over the last several months, the price of gas has decreased dramatically. In many states (including Missouri), it is below $2 a gallon for the first time in several years. Today we'll take a look at the reasons for the drop in prices as well as the benefits.



Why oil prices keep falling--and throwing the world into turmoil

What the huge drop in gasoline prices means for America

Cheaper gas prices benefit some, hurt others

The unintended consequences of cheap oil

OPEC members feeling the pain of falling oil numbers

Questions:
1. List three reasons why oil prices (and gas prices as a result) continue to decline.
2. What businesses and industries are benefiting from this decrease in oil prices?
3. The decline in oil prices is not good news for everyone. Who is being negatively affected by the decrease?
4. What other negative consequences might we see from the drop in oil prices?
5. Should the US increase its gasoline tax?

Thursday, January 15, 2015

Bureau 121: The North Korean Cyber Army

As a result of the alleged hacking of the Sony Pictures computer systems, more attention has been paid to the North Korean cyber specialists, sometimes referred to as the Bureau 121. Many countries, including the United States, have invested heavily in training soldiers in cyber warfare, both for defensive and offensive purposes. North Korea has been expanding its cyber warfare program as tensions with South Korea and the United States continue.





Computer networks in South Korea are paralyzed in cyber attacks

In North Korea, hackers are a handpicked, pampered elite

North Korea doubles size of cyber army

Why cyber armies are a good investment for countries like North Korea


Wednesday, January 14, 2015

More Cybervandalism: The Hacking of Sony

Late last year, Sony Pictures' computers were hacked and countless files were stolen. This attack made major headlines and many people think the infiltration was retaliation for Sony's movie, The Interview.




Research and read about this act of cybervandalism and answer the following questions. Please record your answers on a google doc and share with me (kgates@liberty.k12.mo.us)

1. What kind of damage was caused by this hack? What did the hackers find or release?
2. Who is considered behind the attacks? What evidence, if any, is there to link them to the attacks?
3. How is the movie, The Interview, involved in all of this? Should Sony have stopped the release of the movie?
4. What is the US government's response to this act? Do you think it is appropriate?
5.  Do you think this cyber attack is a big deal? Why or why not?


The Sony Hack Explained

What Happened with the Sony Hack

Obama: Sony Attack was Cybervandalism, not an Act of War

US Slaps North Korea with New Sanctions

Sony insider--not North Korea--likely involved in the attack claim experts

North Korea: Show Us the Evidence

Tuesday, January 13, 2015

Centcom Social Media Hacked



CNN: CENTCOM Twitter account hacked, suspended

U.S. military social media accounts apparently hacked by Islamic State sympathizers

The real reason pro-ISIS hackers took over CENTCOM's Twitter


Assignment:
1) Find two other examples of "cybervandalism" by the Cyber Caliphate and summarize their actions.
2) On a scale of 1-10, how serious of a threat or how concerned should we be by these acts? Explain.


Monday, January 12, 2015

Stuxnet

Stuxnet is a computer worm that was discovered in 2010 and is considered to be the world's first real digital weapon. Targeting Iran's nuclear program and disrupting its centrifuges, this complex code is believed to be a joint operation between the United States and Israel.

60 Minutes: Stuxnet Computer Worm Opens Up New Era of Warfare

How did they crack the code and discover Stuxnet's intended target?




From Bullets to Megabytes

Why is Stuxnet so important?

Ralph Langner, the German computer security specialist credited with discovering Stuxnet, says it doesn't matter who created Duqu. The problem, he says, is that Stuxnet, in its bid to stop nuclear proliferation, may have sparked its own arms race.
"The first cyberwar weapon is comparable to the first nuclear weapon," he wrote in a blog post recently. "To build the first nuclear bomb, it took a genius like Oppenheimer and the resources of the Manhattan project. To copy the design, it requires just a bunch of engineers -- no genius needed.
(Source: http://www.cnn.com/2011/11/08/tech/iran-stuxnet/)
Discussion Questions:
1. Is Stuxnet an illegal act of cyber warfare?
2. Has Stuxnet created a cyber warfare arms race?
3. How could a similar virus be used against the United States?
4. Was the use of Stuxnet a good idea? Did its ability to slow down Iran's nuclear program outweigh the potential copying of the program by others?

Thursday, January 8, 2015

The Charlie Hibdo Attack





Charlie Hebdo, a French satirical newspaper, was attacked by terrorists on Wednesday, resulting in twelve deaths and a nationwide manhunt for the perpetrators. What caused such anger and violence toward a group of middle-aged cartoonists? The weekly newspaper is well-known for its mocking of political and religious figures and anti-establishment views. It particularly skewers extremists from all areas of life, but Muslim extremists have taken great offense at the newspaper's depictions of Islam in general, and specifically its portrayal of Mohammed.

Read the following articles for more information:

1) Charlie Hebdo Attack: What We Know So Far

2) This is not the first time that depictions of Mohammed have caused violence. Read this Washington Post article for more instances.

3) On of the journalists/cartoonists in the above mentioned article, has been in hiding for the past few years because of death threats against her.

4) 12 Powerful Political Cartoons Responding to the Charlie Hibdo Attack

5) Many see this attack as not just an attack on the Charlie Hibdo newspaper, but an attack on freedom of speech itself.


Discussion Questions:


  • Did Charlie Hibdo cross the line with its constant blasphemous depictions of Mohammed?
  • Would the reactions be the same if a pro-white supremacy magazine was attacked for its racist depictions of African Americans or Jews?
  • "I disapprove of what you say, but I will defend to the death your right to say it." Do you agree with this statement? Why or why not?
  • What impact does this terrorist attack and the recent efforts to stop the release of the Sony movie, "The Interview" have on the freedom of speech, freedom of the press, and censorship? Do you think it will cause journalists, cartoonists, and other artists to be more cautious in their treatment of certain subjects?

Defining Cyber warfare

Is cyber warfare an act of war? Espionage? Terrorism? How do we define cyber warfare? Does it make a difference if it is committed by a nation-state, a group, or an individual? Does it matter on what the actual goal of the act is?

Define cyber warfare. What should the consequences be for an act of cyber warfare?





Please read the following article:

When is a cyberattack an act of war?

What should the government response be in each of the following scenarios?

1. A cyberattack by a sovereign nation that takes down a city power grid.

2.  A virus disables an airplane control tower that results in two planes crashing and killing over 500 passengers. The virus is traced back to a computer server in Pakistan.

3. A group of computer hackers based in France steals millions of Americans' credit card information.

4. A cyberattack temporarily (15 minutes) disables our missile defense system. The attack is traced back to China. 

5. A cyberattack hits Wall Street causing chaos and results in over $100 billion in losses.

Wednesday, January 7, 2015

Thinking From a Different Perspective

One of the goals of this course is to help facilitate your ability to look at things from multiple perspectives and consider alternative solutions.

Sometimes what you see is not what other people see.

Old Woman or Young Woman?


Native American profile or Inuit?


Duck or Rabbit?


Man playing a saxophone or a woman's face?


Six cubes or seven cubes?


Sometimes the answer is not always obvious.







Sometimes what seems like an easy solution or obvious answer does not quite work out that way upon closer examination.









Sometimes we have to think carefully before we speak.


Sometimes we have to read carefully. Sometimes we have to read a passage multiple times to really understand it.

Sometimes the big picture changes when we really focus on a specific area.

Sometimes when we look at things from a different perspective we see things we didn't see before.

























How does thinking from a different perspective impact our study of different topics (i.e. Ferguson, the Middle East, etc.)?

Tuesday, January 6, 2015

Welcome!

Course Description: Contemporary Issues is a semester long class that will look at a variety of current day issues and problems. Throughout the course we will determine what topics to examine and approach each of these issues from multiple perspectives. We will be using many tools of social science inquiry including statistics, maps, original documents, political cartoons, and surveys. The use of technology will be heavily incorporated in this course. The goal of this course is not to tell you what to think, but to encourage you to think critically.

Course Outline: The course will be divided into five to six units of study, each lasting approximately 3 weeks. The first unit will be determined by the instructor. The next three or four units will be determined by the class, and the final unit will be a topic of your own personal choice that you will research and prepare a presentation on. A detailed list of potential unit topics will be provided.


Methodology: This course will be very reading intensive. Most readings will be online and will be completed either before class on your own time, or occasionally in-class time will be provided. Discussions are also integral to this course. Respectful, courteous, and substantive comments are expected. 

Grading & Assessments: Grades will be determined by homework assignments, reaction papers, post-assessments (tests), and participation. The standard grading system will be used.


Expectations: The main expectations for this course are to be respectful, participate, and be prepared. If you follow these three expectations, we should not have any problems.


Technology: As indicated, technology will be heavily incorporated into this course. Laptops will be used on a daily basis with readings, research, writing, collaboration, and creating. This will be a learning process for all of us. My goal is to have a virtually paperless class with all assignments, readings, projects, etc. delivered electronically. You will find most, if not all, information on this blog. Please make sure you are using technology in an appropriate manner and are on task. 


Please create a Contemporary Issues folder on your bookmarks bar to keep links, articles, this page, etc.


Your first assignment: 

Take three minutes and brainstorm possible broad topic areas (ex. military, health) you would like to learn more about through this course. Minimum of five.
In a group of 3-4 students, share and compare your answers.

Next, as a group, choose three of the broad topics and brainstorm possible subtopics to examine more closely in class (ex. Military/Use of drones, Health/Obesity)