1 / 39

CyberCivics August 18, 2008

CyberCivics August 18, 2008. What is CyberCivics?. Study of contemporary social and political issues that grow out of computer-science related technologies Examples : Privacy of digital communications, electronic voting, data mining, digital surveillance, digital rights management, and more

lamar
Download Presentation

CyberCivics August 18, 2008

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CyberCivicsAugust 18, 2008

  2. What is CyberCivics? • Study of contemporary social and political issues that grow out of computer-science related technologies • Examples: Privacy of digital communications, electronic voting, data mining, digital surveillance, digital rights management, and more • Being an engaged citizen of the modern world requires an understanding of computing technologies

  3. Evaluate proposed uses of technology • Citizens must consider proposed uses of technology • Should we replace paper ballots with electronic voting systems? • Should we have a national identification card? Should it have an RFID tag? • Should public records be available online? • Should emails be admissible evidence in court? • Difficult to weigh the issues without understanding the technologies themselves, right?

  4. Watch for impact of technology on our rights • Citizens should know how technology impacts their traditional rights • Examples? • Do we have a right to sell our copy of a movie if we no longer want it? • Do we have a right to know when our files/emails are searched? If they are stored in our home? at our Internet service provider? • Do we have a right to understand/investigate the process through which our votes are counted?

  5. Shape our society for the better • Citizens need to advocate for regulations that control misuse of technology • Do we want a world where • Where companies track and sell private information about individuals? • Someone’s web browsing and media consumption habits are linked to their credit report? • Where people’s location is tracked at all times? • Technology easily enable these abuses • Do companies or the government have vested interest in preventing them?

  6. CyberCivics = Contemporary Issues + Hands-on Computer Science • Curricula that discusses contemporary issues and engages students in hands-on activities that help them better understand emerging technologies • Computer networking • Programming • Databases • Dual benefits • Be a more informed citizen • Gain skills that prepare them for high-tech careers

  7. Institute Overview • Day 1: Overview of CyberCivics, Network Security and Privacy • Day 2: Database Privacy • Day 3: RFID and Surveillance • Day 4: Electronic Voting • Day 5: Computer Science Careers, Lesson Planning and Tools Overview

  8. Activities • Network tracing and analysis • Wireless network configuration • Writing database queries • Writing simple computer programs • Analyzing a “hacked” computer program for vulnerabilities • Along the way • Discussions, readings, films, useful web sites, useful tools

  9. Deliverables • Each day, you take notes about what you think would work in your classroom • Turn in notes and 1 page comments days 2-5 • Write a “citizen’s response” • What will you take away personally as a citizen? • Day 5 • In teams write plan for lesson segment including a hands-on computer science activity • Give 10 minute demonstration of your lesson segment

  10. Two Activities to Highlight Two Pieces of CyberCivics • Headline search • Fake Email

  11. Headline search

  12. Headlines Veterans Administration Loses Data on 1.8 million -- Consumer Affairs, 2/13/07 Sony BMG Hacking into CD Buyers’ Computers -- FOX News, 11/3/05 Audit Finds Many Faults in Cleveland’s ’06 Voting -- NY Times, 4/20/07 Machines Record Votes Inaccurately in Tests -- Dayton Daily News, 3/20/07 Experts: Wi-Fi Eavesdropping Persists… -- Boston Globe, 8/7/07

  13. Fake Email

  14. Protocol • If two people are going to communicate, they must agree on a language • Protocol = language defining the expected order and meaning of messages they exchange. • Hi …Hi…Got the time?….two oclock SUCCESSFUL EXCHANGE • Hi…Don’t bother meXX ABORTED Allo…Hello..Quelle heuere a’til …..XX<blank stare> MISMATCH

  15. Layered Architectures • Human beings are able to handle lots of complexity in their language processing. • Ambiguously defined • Many interactions all at once • How do computers manage complex protocol processing? • Specify well defined protocols to enact. • Decompose complicated jobs into layers that each have a well defined task

  16. Layered Architectures • Break-up big job into smaller, more manageable jobs. • Different entity does each job

  17. Physical Mail CEO X Lunch? CEO Y Assistant X Assistant Y Schedule? Important Note? Secretary X Secretary Y Internal mail info Mailroom X Mailroom Y External mail info Post Office X Post Office Y

  18. Physical Mail CEO X CEO Y “Lunch?” Assistant X Assistant Y “Lunch?” Secretary X Secretary Y “Lunch?” Mailroom X Mailroom Y “Lunch?” Post office X Post office Y “Lunch?”

  19. Envelopes Exercise

  20. Layered Architectures • Break-up big job into smaller, more manageable jobs. • Different entity does each job

  21. Computer Networking user X English (?) user Y Web browser Web server HTTP TCP server TCP server TCP IP server IP IP server IEEE 802.3 standard ethernet driver/card ethernet driver/card electric signals

  22. Computer Networking user X, wants page user Y, posted page Get page Web browser Web server Get page TCP server TCP server Get page IP server IP server Get page ethernet driver/card ethernet driver/card Get page

  23. First Look At Wireshark • Capturing • Get a web page • Look At One Package • Look At One Conversation

  24. One more complication CEO A CEO B Assistant Assistant Secretary Secretary Post office Post office Mailroom Mailroom in out in out incoming outgoing

  25. Computer Networking Host A Host B Router R Router W HTTP HTTP TCP TCP IP IP IP IP ethernet link link ethernet ethernet ethernet

  26. Traceroute/tracert

  27. Graphical Traceroute (plus DNS information )

  28. Another Look At Wireshark • http vs https • Pop

  29. Trace Your Own • Rules for tracing • Answer questions • Discussion of privacy concerns

  30. Know your network neighborhood • Hubs vs Switchs • Do you trust the administrator?

  31. Wireless networks

  32. Outtakes

  33. Day 1: Overview and Networks • Overview of CyberCivics • Hands-on exercises with open source network protocol analysis software • Hands-on exercises illustrating the weaknesses of typical wireless network configurations • Network communication in the headlines

  34. Day 2: Database Privacy • Readings on data mining and privacy • Hands-on exercises writing simple database queries • Hands-on exercises with inference control and database privacy • Documentary: “No More Privacy, All About You” • Database privacy in the headlines

  35. Day 3: RFID and Surveillance • Readings on RFID, video surveillance, and REAL-ID • Hands-on exercises with RFID experiment kits • RFID and surveillance in the headlines • Documentary: “Hacking Democracy” (preparation for Day 4)

  36. Day 4: Electronic Voting • Readings on electronic voting • Hands-on exercises with Python programming • Hands-on exercise reading source code for electronic voting system and running mock election • Electronic voting in the headlines

  37. Day 5: CS Careers, Lesson Planning and Tools • Exploration of on-line Occupational Outlook Handbook • Hands-on exercises with CyberCivics tools and “kits” (virtual machines, LiveCDs) • Lesson planning activity and feedback

  38. Kits • Materials budget to provision “kits” that teachers can check out and use • Kits will include • CDs with virtual machine images and LiveCDs • Collections of readings (loose leaf for ease of copying) • Hardware such as wireless access points and RFID kits • Copies of relevant DVDs and books • On-line “kit” supplements will contain downloadable files, pointers to on-line resources including where to buy materials, etc.

More Related