Commercial Cyber Espionage and Barriers to Digital Trade in China

Amazon Price: $17.95 (as of January 27, 2020 14:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This hearing will examine China's use of standards, regulation, and censorship as a market-entry barrier. It will also examine China's use of cyber espionage to gather information for commercial purposes, including turning over U.S. intellectual property to competing Chinese state-owned enterprises. Expert witnesses will address the breach of the OPM and related hacking of federal agencies. At the hearing, the Commissioners received testimony from the following witnesses: Samm Sacks, China Analyst, Eurasia Group; Matthew Schruers, Vice President for Law & Policy, Computer & Communications Industry Association; Paul M. Tiao, Partner, Hunton & Williams; Dennis F. Poindexter, author of The Chinese Information War, Espionage, Cyberwar, Communications Control and Related Threats to United States Interests; and Jen Weedon, Manager, Threat Intelligence and Strategic Analysis, FireEye and Mandiant, Inc.

Usenet & The Future of Anonymity

Rating: 
Amazon Price: $6.99 (as of January 26, 2020 23:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Usenet. The term conjures up images of archaic bulletin boards from the 1980s & 1990s in which jacking in meant astronomical charges every month. No longer. Ignore those who say "Don't talk about Usenet". No longer can you afford to leave your IP address out there for the world to see. You want privacy & anonymity? Come to Usenet. This book will teach you how. – Superior to P2P & Forums in every conceivable way where intelligent discussion is concerned – Immune from lawsuits – Ignored by Law Enforcement–because their p2p tracking systems don't work with Usenet! – The BEST newsgroups for discussion, mp3s/games/HD material – Learn why anonymity will decrease with peer-to-peer systems (as it always has) but increase with Usenet – Why Usenet is a free-for-all and ratio-free (unlike peer-to-peer systems) – Everything you need to know to set up a Usenet account and leech to your heart's content – Tor, PGP, Remailers/Mixmaster, SSL, Truecrypt and the like all have their place in Usenet. Learn about them here! – Which Vpn and Usenet companies might rat you out, and which won't Questions: Why should one use Usenet and not BitTorrent? – Enhanced discussions, both moderated and unmoderated, are prevalent in hundreds of thousands of different newsgroups. Usenet is where the -intelligent- users go to engage in logical discussions, and it is still the bastion of free speech and the most bang-for-your-buck where text and binary groups are concerned. What about lawsuits? – There has never been a lawsuit regarding Usenet use. The record and movie industries target torrenters for a reason: ignorance of the way those systems work. Usenet is an entirely different beast. Coupled with Tor, remailers and/or a vpn, Usenet is a fortress against Big Brother and shady law enforcement types, as well as all of the greedy lawyers who work for the millionaires in the entertainment industry. Anonymity on Usenet? – Yes it is possible to be anonymous on Usenet. Tools like Tor, Vpns, Remailers & Mixmaster provide this, however they are not necessary in every instance. It primarily depends on what you wish to accomplish, and which groups you're participating in. I go into detail about this in the book. Excerpt: Chapter 3: Usenet Anonymity "In this chapter, we’ll discuss ways you can add security (not to be confused with privacy) to your Usenet connection, so that you can participate in discussion groups without fear of persecution. These methods often lend themselves to situations where you may lose your Usenet account if you say the wrong things to the wrong people. Usenet companies are big business now, and unlike twelve years ago, will now think nothing of terminating your account of they get enough complaints. Simply being unpopular and taking a stand against the status quo in certain newsgroups can get your Usenet account banned (i.e. alt.privacy). However, with true anonymity, you can rest assured you will not be persecuted for speaking out against a tyrannical government, or a company that you work for (which has happened many times by disgruntled employees on Facebook). It should be stated at the outset that using Tor for Usenet binary downloads will actually strain the Tor network, just as it does with torrents. And to boot, whenever you use torrents, the torrent software actually sends your IP address to the recipient. It does so anonymously, in the same way a post office worker will deliver you your mail. Needless to say this defeats the purpose of using torrents. This problem is not with the Tor code, but rather the way that applications like BitLord and BitTorrent are designed. The torrent applications themselves need to be coded to allow anonymity. It is better to use Freenet with the Frost addon for p2p-like trading if you wish to remain anonymous. Tor is much more efficient at textual discussions, but the easiest method to do this anonymously is by use of remailers…"

The Expanding Cyber Threat

Amazon Price: $18.95 (as of January 26, 2020 19:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Reports of cyber criminals, “hacktivists” and nation-states accessing sensitive information and disrupting services in both the public and private domains have risen steadily, heightening concerns over the adequacy of cybersecurity measures. Cybersecurity related concerns range from spearfishing attempts and spam, to malware, to illegal or illicit activity on the dark net. More and more cases of successful cyber-attacks are being reported. Financial information, medical records, any and all personal data maintained on computer systems by individuals or by organizations large and small are vulnerable. Mobile, wireless technology presents new opportunities for cyber-attacks. As more devices communicate with one another, from security systems to thermostats, the “Internet of Things” presents a growing target. Social media sites and advertisements also present opportunities for cybersecurity breaches.

Consent of the Networked: The Worldwide Struggle For Internet Freedom

Rating: 
Amazon Price: $11.99 (as of January 27, 2020 03:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Internet was going to liberate us, but in truth it has not. For every story about the web’s empowering role in events such as the Arab Spring, there are many more about the quiet corrosion of civil liberties by companies and governments using the same digital technologies we have come to depend upon.

Sudden changes in Facebook’s features and privacy settings have exposed identities of protestors to police in Egypt and Iran. Apple removes politically controversial apps at the behest of governments as well as for its own commercial reasons. Dozens of Western companies sell surveillance technology to dictatorships around the world. Google struggles with censorship demands from governments in a range of countries—many of them democracies—as well as mounting public concern over the vast quantities of information it collects about its users.
Continue reading “Consent of the Networked: The Worldwide Struggle For Internet Freedom”

Building Internet Firewalls

Rating: 
Amazon Price: $38.39 (as of January 26, 2020 23:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks–and the need to protect both business and personal data–have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.
Continue reading “Building Internet Firewalls”