Thursday, March 30, 2017

Entry 8: Encryption Technology

Terrorist Attacks and Technology 

In light of the recent terrorist attacks in London when Khalid Masood, a 52-year-old Briton, drove a car into pedestrians, killing three of them, and then fatally stabbed a police officer, British government officials are planning to meet with representatives of American technology companies to demand that they do more to help in the fight against terrorism and online hate speech. This is the latest move in a widening global push against encryption technology that blocks access to the private messages of criminal and innocent users alike. Amber Rudd, Britain’s home secretary, said that the country’s intelligence agencies should have access to encrypted messages sent through WhatsApp, an instant-messaging service owned by Facebook.

Neil Basu, a deputy assistant commissioner for the Metropolitan Police Service, stated that Mr. Masood’s communications on the day of the attack remained of high interest, and he asked London residents to come forward with any information they had on his activities or state of mind. A key statement from Mr. Basu is that, “I know when, where and how Masood committed his atrocities, but now I need to know why. Most importantly, so do the victims and families.” It is only having access to the encrypted communication that the London Police force will be able to gain these answers. 

While law makers and regulators in Europe and around the world now want Silicon Valley companies to do more to tackle potential threats, such tech companies and digital rights advocates have said such efforts would infringe on human rights because providing the authorities with access to such messaging services would require weakening their overall levels of encryption. Recently, a German government minister, Heiko Maas, said that he would propose new legislation that could fine tech companies around $50 million if they failed to stop hate speech being spread on digital platforms like Facebook, Twitter and Google’s YouTube.



What is Encryption?

 The tech companies in question say they cannot hand over such information because internet messages are sent through so-called end-to-end encryption. This technology scrambles messages to make them indecipherable to anyone but their intended recipient. It also makes messages unreadable when they pass through an app’s server, meaning companies do not have the ability to provide the information to law enforcement even if they wanted to.



Encryption is used to protect data both while it is being sent across a network, data in transit, and stored, such as on a hard drive, smartphone or flash drive, data at rest. The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. Modern encryption algorithms play a vital role in the security assurance of IT systems and communications as they can provide not only confidentiality, but also authentication, integrity, and non-repudiation. 

Data which is referred to as plaintext, is encrypted using an encryption algorithm and an encryption key. This process generates a ciphertext that can only be viewed in its original form if decrypted with the correct key. Decryption is simply the inverse of encryption, following the same steps but reversing the order in which the keys are applied. 



Friday, March 24, 2017

Entry 7: Cybersecurity

What is cybersecurity?

Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. As Americans become more reliant on modern technology, we also become more vulnerable to cyberattacks such as corporate security breaches, spear phishing, and social media fraud. Law enforcement performs an essential role in achieving our nation’s cybersecurity objectives by investigating a wide range of cyber crimes, from theft and fraud to child exploitation, and apprehending and prosecuting those responsible. The Department of Homeland Security (DHS) works with other federal agencies to conduct high-impact criminal investigations to disrupt and defeat cyber criminals, prioritize the recruitment and training of technical experts, develop standardized methods, and broadly share cyber response best practices and tools.



Cybersecurity and Computer Science


Criminal investigators and network security experts with deep understanding of the technologies malicious actors are using and the specific vulnerabilities they are targeting work to effectively respond to and investigate cyber incidents. The mission of DHS’s Network Security Deployment (NSD) division is to improve cybersecurity to federal departments, agencies, and partners by developing the technologies and establishing the services needed to fulfill CS&C’s cybersecurity mission. NCPS is an integrated system-of-systems that delivers a range of capabilities, including intrusion detection, analytics, intrusion prevention, and information sharing. These capabilities provide a technological foundation that enables DHS to secure and defend the federal civilian government’s information technology infrastructure against advanced cyber threats.

One of DHS’s key technologies within the NCPS is EINSTEIN. EINSTEIN allows DHS to both detect cyber attacks targeting federal civilian government networks and actively prevent potential compromises. The EINSTEIN program also serves as a platform to aggregate federal civilian executive branch traffic so that DHS can implement new and advanced protections. In other words, by putting all federal government traffic through a few locations, DHS can easily add security tools to those locations.



References
https://www.dhs.gov/topic/cybersecurity
https://www.dhs.gov/topic/combating-cyber-crime
https://www.dhs.gov/cybersecurity-overview
https://www.dhs.gov/einstein


Friday, March 17, 2017

Entry 6: Grace Hopper

Who was Grace Hopper?

Grace Brewster Murray Hopper was an American computer scientist and admiral in the United States Navy. In 1944, she was one of the first programmers of the Harvard Mark I computer and invented the first compiler for a computer programming. The Harvard Mark I computer was a general purpose electromechanical computer that was used in the war effort during the last part of World War II. She received the Naval Ordnance Development Award for her pioneering applications programming success on the Mark I, Mark II, and Mark III computers.


Admiral Hopper conceptualized how a wider audience could benefit from the computer if there were tools that were both programmer and application-friendly. In pursuit of her vision she risked her career in 1949 to join the Eckert-Mauchly Computer Corporation to provide businesses with computers. Pursuing her belief that computer programs could be written in English, Admiral hopper moved forward with the development of the Business Oriented compiler for the UNIVAC computer, later known as FLOW-MATIC. Using FLOW-MATIC, Admiral Hopper and her staff were able to make the UNIVAC understand twenty statements in English. This compiler was a precursor for the Common Business Oriented Language, or COBOL, a widely adapted language that would be used around the world.

About COBAL

COBAL (Common Business Oriented Language) is a compiled English-like computer programming language designed for business use.  It was created as part of a US Department of Defense effort to create a portable programming language for data processing. COBOL has an English-like syntax, which was designed to be self-documenting and highly readable. However, it is verbose and uses over 300 reserved words. In contrast with modern, succinct syntax like y = x;, COBOL has a more English-like syntax (in this case, MOVE x TO y). COBOL code is split into four divisions (identification, environment, data and procedure) containing a rigid hierarchy of sections, paragraphs and sentences.



Under her direction, the Navy developed a set of programs and procedures for validating COBOL compilers. This concept of validation has had widespread impact on other programming languages and organizations; it eventually led to national and international standards and validation facilities for most programming languages.

Today the Grace Hopper Celebration of Women In Computing Conference is a technical conference that encourages women to become part of the world of computing, while the Association for Computing Machinery offers a Grace Murray Hopper Award.

References 
https://en.wikipedia.org/wiki/Grace_Hopper
http://www.biography.com/people/grace-hopper-21406809
http://www.cs.yale.edu/homes/tap/Files/hopper-story.html
https://en.wikipedia.org/wiki/COBOL#Syntax