Wednesday, February 27, 2008
Microsoft, the EU, and Free Market
Tuesday, February 26, 2008
Uprooting the Cuckoo's Egg
One possible solution that may have ended Cliff’s story soon would involve the creation a less centralized system for law enforcement. For instance, if the FBI refused to grant him a warrant, he could have a place, perhaps the courts, to appeal to in order to override the FBI’s decision. Without such a system, Cliff was helpless as he found himself stopped by a narrow bottleneck for which there was no alternative route. He simply could not progress unless the FBI were willing to help, no matter how many other organizations supported him. This approach has the disadvantage of complicating the law enforcement process.
Another solution to the warrant problem would be to authorize more than one agency to grant warrants, or to have more specialized internal departments in the FBI. The former, however, might make the process of earning a warrant too easy for other warrant clients, mainly the police. The FBI could delegate special cases such as cybercrime cases to internal FBI divisions that specialized in these areas, but this would require that the FBI already recognize the special case as important, and the very act of creating the internal division would demote the case’s status from “special” to “categorized and normal.” For Cliff, the FBI had not yet made such a recognition with regards to cybercrime or privacy breaches in general.
Finally, authorities could be authorized to perform monitoring and surveillance without the need of a warrant. This has been the path actually taken since Cliff’s story ended. While if such power existed with the authorities during the story, Cliff may have caught his criminal sooner, the increased power in the hands of law enforcement could lead to a significant loss of personal rights. For instance, what if Cliff’s information led law enforcement to the wrong conclusion and they began monitoring the wrong people? If, they had decided the criminal was likely to be at Berkeley, they might have wiretapped all internet usage at the Berkeley library fruitlessly and to the loss of privacy of all innocent students there.
Overall, I think that The Cuckoo’s Egg shows us that we still don’t have a good system for dealing with cybercrime. No safe balance has been discovered between personal rights and security measures, no government checks and balances system exists to help a citizen get a warrant when one is warranted, and there still is no organization a person can turn to for help when he or she is victimized by a cybercrime. Progress still needs to be made in order to enable the American citizen to be able to report hackers and help bring them to justice.
Monday, February 18, 2008
Reveal More.... Bugs!
Opponents of rapid exploit dissemination argue that publicizing flaws without fixes alerts hackers to these flaws faster than they would discover them on their own, but, especially with the case of open source software, hackers have free access to all codebase updates and can always easily search for exploits on their own. Also, Mozilla only provides access to detailed exploit information to a smaller circle of privileged users, so that information on how to exploit a flaw is not as easily obtained as general knowledge about it. Finally, software users themselves, aware of the exploit, can take precautions as necessary, potentially even turning off or discontinuing use of vulnerable software until a fix is found. Other advanced users can even actively contribute to solving a problem by submitting patches themselves. Overall, the benefits of a mostly transparent process of security bug publication outweigh the associated risks and provide the best protection to the public at large.
Wednesday, February 6, 2008
One Repository for One Family Tree
In the past years I have viewed the large quantities of genealogical data spread among multiple disparate sources with disapproval, and felt intimidated in beginning my own family history project. This problem seems to have arisen because the first software-based technologies for family history work were invented before the advent of the Internet. For instance, the church used to periodically distribute CDs containing their most up-to-date information to each ward and branch. Later the creation of PAF and the GEDCOM file format encouraged each person to maintain their own personal databases of family history, and as the Internet matured a host of different web sites have popped into existence with their own individual purposes, scopes, and information formats.
However, If we are to map the single family tree of human history from Adam to the present, we need to have one major repository for all genealogical data that is easy to use, explore, and contribute to. I believe the church has been tackling this problem for a while, and I hope that their new family history web service fulfills this requirement. If this new service succeeds in enabling most users to quickly comprehend accurately the current state of genealogical research in their families and know where they must begin to add to this body of knowledge, then it will become the greatest contribution so far in speeding along the work of redeeming the dead.