The article "11 Illegal Things You Unknowingly Do on the Internet" presents itself as a guide to navigating the murky waters of online legality. However, upon closer examination, it becomes evident that the article may not be as informative or unbiased as it purports to be.
Firstly, it's important to note the context of the article—it's hosted on a website that sells a product claiming to solve all the issues it outlines. This inherent conflict of interest raises questions about the motives behind the article. Is it genuinely aimed at educating readers, or is it primarily a marketing ploy to promote the product?
Moreover, several listed activities aren't always illegal, contrary to the article's sensationalist title. For instance, using torrent services or sharing copyrighted images isn't inherently illegal. The legality depends on the specific circumstances, such as whether the torrented content is copyrighted or what license it is presented under, such as the Creative Commons license, and whether permission has been obtained for its use. Many leading Linux distributions offer their installation media as a torrent. It's misleading to categorize these actions as universally illegal without providing nuance.
Furthermore, the article's treatment of specific topics lacks depth and accuracy. For instance, it states that recording VoIP calls without consent is illegal, which is not entirely accurate. In single-consent states like Virginia, only one party must consent to the recording, making it legal under certain circumstances. Failing to provide such context undermines the credibility of the article.
Among the offenses outlined in the article, five stand out as particularly serious, regardless of the source's credibility. Firstly, collecting information about children without proper consent or safeguards is alarming due to the potential risks to their safety and privacy. Children are vulnerable online, and unauthorized data collection can expose them to various dangers, including exploitation and identity theft. Secondly, sharing the personal information of others without their consent violates their privacy and can have significant repercussions, ranging from harassment to identity theft. Thirdly, engaging in illegal searches, especially those related to criminal activities or exploitation, can have severe legal consequences and threaten public safety. Fourthly, using someone else's internet without permission constitutes theft and undermines the integrity of online networks. This offense violates property rights and compromises internet security and trust. Lastly, bullying and trolling represent severe ethical and societal issues that can have devastating effects on victims' mental health and well-being.
Cyberbullying has been linked to depression, anxiety, and even suicide, highlighting the urgent need to address and combat these harmful behaviors in online spaces. Each of these violations underscores the importance of responsible and ethical conduct online to ensure the safety and security of individuals and communities.
In conclusion, while the article may offer some valuable insights into online legality, its biased presentation, lack of nuance, and questionable motives detract from its overall credibility. Readers should approach such content skeptically and seek more comprehensive sources for information on internet law and safety.
The portrayal of the cybersecurity analyst role in the YouTube video also underscores the importance of social awareness in effectively detecting and mitigating cyber threats. Within threat detection, social awareness extends beyond technical expertise to encompass an understanding of human behavior and social engineering tactics employed by malicious actors. For instance, the mention of responding to phishing attacks highlights the need for analysts to recognize and analyze social engineering techniques used to manipulate individuals into divulging sensitive information. Additionally, the role may involve identifying patterns of suspicious behavior within the network, which requires a nuanced understanding of typical user interactions and deviations from normal behavior. Moreover, providing user awareness training and guidance underscores the role of cybersecurity analysts in fostering a culture of security awareness within organizations, where social dynamics play a crucial role in shaping individuals' attitudes and behaviors towards cybersecurity practices. Therefore, social awareness emerges as a fundamental aspect of the cybersecurity analyst's job, enabling them to effectively detect and mitigate threats by understanding the human element inherent in cyber attacks.
Rhys Ferris
In today's report, I delve into an enlightening article titled "Social Cybersecurity: An Emerging Science." This insightful piece explores the interdisciplinary nature of social cybersecurity, highlighting how researchers from various disciplines collaborate to develop tools and theories in this evolving field. Join me as we uncover the complexities of social network analysis, dynamic network analysis, and social media analytics in the realm of social cybersecurity. Let's unravel the mysteries of influence operations, disinformation campaigns, and the ever-changing landscape of digital manipulation.
Scoring a one on the Social Media Disorder Scale (SMD Scale), with my only 'yes' answer being "Often used social media to escape from negative feelings," sheds light on my relationship with social media over the past year. Reflecting on the items in the scale, I find them quite insightful in capturing various dimensions of social media usage that may indicate problematic behavior.
The item that resonated with me the most was using social media to escape negative feelings. While I can relate to occasionally turning to social media for distraction or entertainment during challenging moments, I haven't consistently relied on it as a coping mechanism. This suggests a healthy balance in managing negative emotions without solely depending on social media for relief.
Regarding the other items on the scale, I realize that while I may occasionally desire to spend more time on social media or experience mild dissatisfaction when unable to do so, these feelings don't significantly disrupt my daily life. I haven't encountered persistent conflicts or arguments stemming from my social media usage, nor have I neglected essential responsibilities or activities in favor of spending time online.
Considering why different social media usage patterns are found worldwide is intriguing. Cultural, societal, and individual factors likely play significant roles in shaping people's interactions with social media. For example, cultural norms around technology use, attitudes toward social interaction, and the availability of alternative forms of entertainment may influence how individuals engage with social media.
Additionally, socioeconomic factors, access to technology, and societal pressures may impact the prevalence of disordered social media usage in different regions. Understanding these variations can help tailor interventions and support systems to address the specific needs of diverse populations.
Overall, my score of 1 on the SMD Scale suggests a relatively healthy relationship with social media, characterized by occasional use for leisure and connection rather than as a primary means of coping or escapism. However, it's essential to remain mindful of how social media influences our lives and cultivate habits promoting balance and well-being.
Rhys Ferris
Star Trek: Discovery Space Probe Hacking:
Hollywood's depiction of a space probe using SQL injections to attack a Federation spaceship in Star Trek: Discovery is deemed unrealistic by the white hat hacker. Using outdated hacking techniques and questionable scenarios receives a low rating of one out of 10 for accuracy.
Mr. Robot's Capture the Flag (CTF) Scene:
Scenes from Mr. Robot featuring hacking competitions at DEF CON are praised for their accuracy. Incorporating real-world hacking challenges and scenarios earns a high rating of nine out of 10, with a minor deduction for dramatic pacing.
Oceans 8 Social Engineering:
Rihanna's character engages in spear-phishing, targeting an individual's interests. While the initial concept is deemed realistic, the portrayal of quickly gaining control of a webcam and breaking a complex password leads to a seven out of 10 rating.
Matrix Hacking Scene:
The Matrix's portrayal of Trinity using Nmap and exploiting an SSH vulnerability receives high praise for its timeliness and accuracy. Using real-world tools and vulnerabilities earns a 9.5 out of 10, with a slight deduction for the theatrical inclusion of gloves.
Girl with the Dragon Tattoo:
Lisbeth's reconnaissance and hardware analysis are commended for their realism. The use of a specialized device and photographic reconnaissance receives a perfect 10 out of 10 for accuracy.
The Social Network:
Mark Zuckerberg's creation of Facemash is analyzed for its realism in depicting the early days of hacking. The accurate representation of hacking processes and challenges earns a commendable nine out of 10.
Fast and Furious 8 Car Hacking:
The hacking of cars in Fast and Furious 8 is based on a real-world demonstration. While deemed realistic for the future, it receives a seven out of 10 for the simplicity portrayed in the movie.
Mission Impossible CIA Hack:
The depiction of hacking into the CIA's servers is critiqued for exaggeration and bogus IP addresses, leading to a six out of 10 rating.
Hackers Movie Ransomware:
The classic movie "Hackers" is praised for predicting the future concept of ransomware. While the portrayal of the Da Vinci virus is accurate, a slight deduction is made for the lack of code visibility, resulting in an eight out of 10 rating.
Conclusion:
Hollywood plays a significant role in shaping public perceptions of cybersecurity, often blurring the lines between fiction and reality. While some portrayals receive praise for accuracy, others highlight the need for a nuanced understanding of hacking in the digital age. As technology continues to sprint forward, the influence of media on our understanding of cybersecurity remains a dynamic and evolving phenomenon.
Journal 7
A bit of a comical journal entry for today: we evaluated, and then selected 3 pictures to "meme‑ify" that demonstrated human-centric cybersecurity.
Fake websites contribute to the proliferation of misinformation online, acting as purveyors of false or misleading content. These deceptive online platforms often present distorted information, sensationalized stories, or fabricated data, eroding the trust users place in online sources. While some fake websites may not engage in phishing directly, they can manipulate narratives, disseminating unreliable information that can have real-world consequences. This spread of misinformation not only jeopardizes the credibility of the digital space but also poses risks to public discourse, decision-making, and societal well-being. As users navigate the vast web of information, critical thinking, fact-checking, and a discerning eye are essential tools to combat the influence of these misleading online entities and foster a more informed online community.
In my search for fake websites, I actually found a teacher's thread about the ones they use to teach the subject. Knowing that they were fake going into it may have reduced some of the fun, but it did keep me safe. I’ll start with the best one: https://www.allaboutexplorers.com/ is a website about every explorer that lived… and more… This site appears well put together. However, it consists almost entirely of made-up information. It does help that the “About” section tells you as much, but few people actually read the About section of a web page. Another one was no longer online, but the Internet Archive (archive.org) held a copy from 2016: https://web.archive.org/web/20160309103943/https://www.weathergraphics.com/tim/fisher/ This one proposes that the Fisher Price Airplane toy was a real airplane in the 1970s, complete with pictures! Again, aside from the ridiculous, cartoonish pictures, the site looks almost believable. I would love to believe that no one would believe this, but I read in the previously mentioned thread that a teacher had a student give a presentation on animal hybrids, like a dog with an eagle head, because they had seen pictures on Facebook… and they were dead serious. Lastly, also only available thanks to the Internet Archive was this site that talked about the issues with the Velcro crop: https://web.archive.org/web/20160418194751/http://www.umbachconsulting.com/miscellany/velcro.htm.
Please excuse me as I bury my face in my hands… have a wonderful day.
Rhys Ferris
2/9/2024
In today's report, I review an article titled "Cyberattacks, cyber threats, and attitudes toward cybersecurity policies" by Snyder et al. (2021) and evaluate it from the standpoint of the social sciences.
I had to do a bit of research regarding the statistics involved, and I most enjoyed learning about mediating variables, which are variables that explain the relationship between independent and dependent variables.
Maslow's Hierarchy of Needs is a psychological theory proposed by Abraham Maslow in 1943. It is a widely accepted framework for understanding human motivation and the factors that drive behavior. According to Maslow, individuals seek to fulfill these needs sequentially, starting from the bottom of the pyramid and moving upward. As fully integrated as our lives are with technology these days, Maslow's Hierarchy could also be applied to technology. Personally, I interact with technology at a ridiculous level, from the phone in my pocket to my work desk where every item on the desk is designed to interface me with technology, from two screens angled perfectly at my face to the keyboard, mouse, webcam, and scanner, all designed to blur the borders of the real and digital worlds as seamlessly as possible.
At the physiological level, digital technology has evolved into a nearly indispensable requirement, with the loss of internet access or a phone inducing a palpable sense of anxiety and frustration. Looking next at the level of safety needs, cybersecurity plays a crucial role in meeting these requirements, offering a sense of security in the digital realm. Instances such as encountering viruses or hacking incidents evoke reactions akin to threats against personal safety. Social media has become a prominent platform for fulfilling the need for social belongingness, as the number of friends or followers influences one's sense of connection and community. Simultaneously, the digital landscape significantly impacts self-esteem, both positively and negatively, as social media interactions contribute to one's perception of worth and recognition. Self-actualization is challenging in the digital world. My first thought when considering self-actualization within the digital world is the movie "2047: Virtual Revolution," where people spend most of their time hooked into a virtual world. That's not a good idea, so instead, I offer using technology to achieve self-actualization, such as working in a job you love or remote work.
Reflecting on personal experiences with technology provides insights into how these digital interactions align with and reshape the traditional understanding of Maslow's Hierarchy of Needs, highlighting the nuanced ways technology has become intertwined with our fundamental human motivations.
Rhys Ferris