[ECP] Educational CyberPlayGround® K-12 Newsletter

[ECP] Educational CyberPlayGround® K-12 Newsletter

[ECP] Educational CyberPlayGround® K-12 Newsletter
Reference Directory of K-12 public, private, and charter schools in all 50 states.
Find Teaching Resources for Music, Teachers, Internet, Technology, Literacy, Arts and Linguistics for students, teachers, parents, and policy makers.
Happy Reading for Today,
Continue reading “[ECP] Educational CyberPlayGround® K-12 Newsletter”

[ECP] Educational CyberPlayGround NetHappenings Mailing List

NetHappenings Mailing List copyright 1989

[ECP] Educational CyberPlayGround
NetHappenings Mailing List copyright 1989
Educational CyberPlayGround Blog:
*Link to the Educational CyberPlayGround
*Find your School in the ECP K-12 School Directory
Happy Reading for Today
Continue reading “[ECP] Educational CyberPlayGround NetHappenings Mailing List”

Sign Up to Receive the K12 Newsletter from the Educational CyberPlayGround

Sign Up to Receive the K12 Newsletter from the Educational CyberPlayGround
K12 News K12 Newsletter Cyberplayground K12 Newsletter Mailing List

Sign Up to Receive the K12 Newsletter from the Educational CyberPlayGround
K12 News K12 Newsletter Cyberplayground K12 Newsletter Mailing List
K12 Newsletters has been provided to the Internet community since April, 1998. This free mailing list published by Educational CyberPlayGround, is an independent resource on the Web for educators. The goal of K12 NEWSLETTERS is to combine in one place the best of the Internet’s various K12 newsletters that integrate technology into the classroom.

Terrorism, Money, the Internet, and ICANN

Terrorism, Money, the Internet, and ICANN
Sometimes it’s possible to be so closely involved with the details of
a problem that one misses the larger picture, the broad arc of events
that would help to better understand the processes in play.
At first glance, it would seem unlikely to draw connections between
the terrorist attacks of 9/11 and current Internet governance
controversies — including the behavior of ICANN, which the NTIA has
(for the moment) chosen not to recertify for key Internet functions.
And yet the connecting lines are clear enough.  Not conspiracies mind
you, but rather a confluence of events that have led to rampant
opportunism and the suppression of fundamental rights.
The direct effects of the 9/11 attacks on our culture are among the
most obvious.
After the attacks, quickly enacted laws led to broad use of secret
national security letter” demands for personal data, often aimed at
Internet services.  Millions of U.S. airline passengers are now
subjected to x-ray body scans that have been banned in Europe as
possible health risks.  And our various leaders have touted the
utility of torture and assassinations of U.S. citizens and others
without trial or other due process.
This is but the short list.  And it’s apolitical, too.  There’s scarce
evidence that there’s any significant light between the operational
stances of either political party in many of these regards in the long
Yes, the Obama administration has apparently stopped the worst torture
abuses championed by the previous president.  On the other hand, Obama
administration officials now claim the right to target individuals for
killing (especially by remote drones) without due process of any kind,
based solely on assertions by the executive branch.  Sometimes
innocent parties are also killed by these attacks, and viewed as
unfortunate but necessary “collateral damage.”
To be sure, governments of all stripes have conducted assassinations
throughout history, nearly always under the banner of “what’s good for
the country.”  The failed attempts to kill Fidel Castro are an open
secret.  We can be reasonably sure that there have been various other
targets over the years, some “successfully dispatched” — and some
While so much of all this is publicly framed (when mentioned at all)
in terms of national security, the pervasive distorting effects of
money on the process cannot be overestimated.
Almost exactly half a century ago, President and former General Dwight
D. Eisenhower coined the term “military-industrial complex” to
describe the influence of money over the military and associated
national security decision making.
All these decades later, those influences are stronger than ever, and
have now extended themselves directly into Internet affairs.
For example, the purchase and deployment of airport body scanners has
taken place on a massive scale with virtually no evidence of their
effectiveness nor safety, but clear indications that the enormous
amounts of money involved served to enrich not only manufacturers of
such devices, but some individuals associated with DHS as well.
An ongoing drumbeat for a government power grab over the Internet in
the name of “cybersecurity” is another case in point.  We see
government security interests (e.g. agencies whose portfolios are
basically to spy on communications to the greatest extent possible)
and the “Internet security industry,” together seeming to be creating
an unholy alliance aimed at turning the Internet into a combination
totally surveilled environment plus money printing machine for the
giant entertainment behemoths.
The extent to which these forces are willing to go is exemplified by a
classified (but safe to say, rigged) “power system cyberattack
demonstration” reportedly used recently to try scare members of
Congress into supporting aggressive cybersecurity legislation.  I say
“rigged” because virtually all such demonstrations are by definition
designed with a single outcome in mind, practical probabilities be
damned.  Anyone who has set up demos to try convince anyone about
pretty much anything knows how this works.  I’ve been there.  You may
have been there as well.  And while we can all agree that SCADA
control systems need major security improvements, it’s also true that
the current government cybersecurity push is replete with far more
expansive motives.
But the connections don’t stop there.  Once we’ve accepted the
post-9/11 concepts that “due process” and protection of innocents are
no longer a priority, it becomes enormously easier to understand much
else going on with the Internet today.  When trials and the Fourth
Amendment — including search warrants — are seen by authorities not
as protections, but as hindrances, the race to the bottom seems
The criminalization of copyright violations (which in the past have
generally been considered to be a civil matter) is a dramatic example.
The scope of enforcement efforts in this regard have become
breathtaking.  Domain names are seized and shut down by the U.S.
around the world — without trial — by leveraging the obsolete DNS
(Domain Name System) and ICANN complicity — often obliterating
innocent sites in the process.  Unfortunate collateral damage.
Major international file-sharing sites are shut down based on
copyright accusations, not trial determinations, cutting off vast
numbers of innocent users from their data without recourse, with
governments attempting to ridiculously invoke those sites’ terms of
service as an excuse.  Unfortunate collateral damage.
Fears of child porn are disingenuously exploited to mandate vast
personal activity data retention systems for governmental
retrospective analysis, often without even a formal search warrant
being required.  Unfortunate collateral damage.
Vast efforts are engaged to pass website and search engine censorship
and micromanagement legislation such as SOPA/PIPA — suppressed for
now but certain to reemerge in some form, designed to enrich
traditional content owners at the cost of trampling free speech across
the Net.  Unfortunate collateral damage.
Merely linking to sites that may contain copyrighted materials without
permission becomes criminalized, resulting in international criminal
extraditions that in the past would have been solely in the civil
court realm.  Accused copyright violators treated like mass murders.
Unfortunate collateral damage.
ICANN plows forward with their extortionist scheme to enrich the
anointed “gold rush domainer” domain-industrial complex with a
plethora of new top-level domains (gTLDs) — regardless of the massive
confusion and expenses this causes to the vast majority of the
Internet community — and appears poised to endorse further global
expansion of using the DNS as a “no trial necessary” copyright
enforcement and free speech suppression mechanism.  Unfortunate
collateral damage.
This is all our fault.  It is our responsibility.  We have permitted
the purveyors of fear and greed to corrupt our legal system and now
the Internet as well.  We are smiling and nodding blankly as they
forge the shackles binding us to their wills.
Responsible measures against terrorism are warranted.  Reasonable
enforcement actions to protect legitimate copyright concerns and help
prevent the exploitation of children are appropriate.
But we can no longer permit our entire world to be warped by those
parties who are themselves exploiting fears of terrorism, fears of
“cyberwar,” and outright copyright greed.
In the realm of the Internet at least, there are some obvious actions
we should be taking to stop the ongoing decay and set a course toward
a better future.
Government attempts to monitor and control the Internet in the name of
security must be heavily scrutinized and minimized, particularly
ongoing operational involvement (as opposed to research, development,
and specific incident responses) by DHS or NSA in these areas.
Government recommendations would be welcome — government dictates are
Attempts to use copyright and child exploitation concerns as excuses
for broad Internet control, monitoring, and censorship regimes should
be soundly rejected.  Not only will these be ineffective at actually
stopping the targeted behaviors, they will do vast damage to free
speech generally around the world.
The existing DNS system should be replaced over time by secure and
distributed addressing systems not subject to preemptive and
unilateral government attempts to treat them as blunderbuss weapons
and often internationally extralegal copyright enforcement mechanisms.
Criminalization of mere Internet linking should cease.  Search engines
must be assured autonomy of their search results.
ICANN’s current gTLD expansion plan should be halted.  A new,
purpose-built international organization (not an existing organization
with political baggage like the UN or ITU) should be created to
supplant and replace ICANN functionalities and responsibilities, with
an eye toward what’s best for the entire Internet community and the
broader global community at large.
That’s enough to get us started.
Not only in the wake of 9/11, but particularly since then, we have
allowed our legal and technical systems to be usurped and perverted by
forces allied against free speech and due process, in the name of
power, control, and greed.
And through our acquiescence in these travesties, we are increasingly
all becoming “unfortunate collateral damage” ourselves.
It’s time to say that enough is enough.
The rape of what made us great ends now.
Lauren Weinstein

Warner Robo-Takedowns

Boycott Warner Must Take Responsibility for Baseless Copyright Infringement Notices

EFF Calls Foul on Robo-Takedowns

Warner Must Take Responsibility for Baseless Copyright
Infringement Notices
San Francisco – The Electronic Frontier Foundation (EFF)
urged a federal judge Monday to reject arguments from
Warner Brothers Entertainment claiming that the company’s
automated scheme to send copyright infringement notices
absolves it of responsibility for the system’s major flaws.
In this case, Warner is accused of sending thousands of
takedown notices for content it did not own to a
cyber-locker site called Hotfile.  Hotfile asked for
damages under the Digital Millennium Copyright Act (DMCA),
which holds copyright users accountable if they send
takedown notices in bad faith.  However, Warner insists
that while it knew it was issuing some bad takedown
requests with its semi-automated system, the errors should
be excused by the court because a computer made the mistake
– not a human.  In an amicus brief filed Monday, EFF argues
that Warner cannot wash its hands of its responsibility for
the improper removal of content from Hotfile’s servers.
“Hotfile’s customers unfairly lost access to content
because of Warner’s bogus takedowns.  But under Warner’s
theory, any company could sidestep accountability for
abusing the DMCA by simply outsourcing the process to a
computer,” said EFF Intellectual Property Director Corynne
McSherry.  “In fact, the companies would have a perverse
incentive to dumb down the process, removing human review.
What Warner is doing here is a ploy to undermine the DMCA
provisions that protect Internet users from overbroad and
indiscriminate takedowns like the ones it issued.”
The publicly available facts in this case indicate that
Warner’s system only considered the title of the work – not
nearly enough information to base a good faith belief of
any copyright infringement.  Warner’s system took down
files with words in their titles like “The Box,” “The
Town,” and “Unknown,” apparently without checking to see if
the file was a Warner movie or a child’s book report or
something else.  EFF told the court Monday that Warner knew
this driftnet technique would inevitably cause a
substantial amount of lawful content to be removed from
“Cloud storage sites like Hotfile are becoming increasingly
important,” said EFF Staff Attorney Mitch Stoltz.  “But
improper takedowns like Warner’s undermine their
usefulness.  Companies must be held responsible when their
sloppy processes hurt other businesses and Internet users.”
For the full amicus brief:
For this release:
About EFF
The Electronic Frontier Foundation is the leading
organization protecting civil liberties in the digital
world. Founded in 1990, we defend free speech online, fight
illegal surveillance, promote the rights of digital
innovators, and work to ensure that the rights and freedoms
we enjoy are enhanced, rather than eroded, as our use of
technology grows. EFF is a member-supported organization.
Find out more at https://www.eff.org

$60.00 per month buys Rural HomeFusion wireless serivce

Verizon Wireless broadband service that’s designed for use in rural and remote homes that can’t get DSL or cable. The service, called HomeFusion, could also appeal to some households where DSL is the only fixed-line option, since it’s faster than most DSL services.
Continue reading “$60.00 per month buys Rural HomeFusion wireless serivce”

Peer-to-Peer Car Sharing Service Launches Nationally

Disrupting the Disruptors rent your own car that you’re not using.

Disrupting the Disruptors:

Peer-to-Peer Car Sharing Service Launches Nationally
By Leigh Beadon
Mar 6, 2012
One of the points we often try to make at Techdirt is that the effects of disruptive technologies are going to be felt far beyond the entertainment and publishing industries—they are not limited to the online world. The internet creates abundance of information, but it also creates a push towards decentralization in all things, and that’s one of the big ways it intersects with the physical: although you can’t download a car, you can create whole new systems for buying, selling, renting, reviewing and maintaining cars, and those systems will replace established but less-efficient ones.
Continue reading “Peer-to-Peer Car Sharing Service Launches Nationally”

Obama Administration: ACTA Is Binding & Don't Worry Your Pretty Little Heads About TPP

the claim that this does not need Senate ratification appears to be incorrect

Obama Administration: ACTA Is Binding & Don’t Worry Your Pretty Little Heads About TPP
By Mike Masnick
Mar 7, 2012
We’ve covered how Senator Wyden has been pressing the administration on ACTA and TPP concerning the process behind both agreements. The State Department has now responded by admitting that ACTA is, in fact, binding on the United States.
Under international law, the ACTA is a legally binding international agreement. By its terms, the ACTA enters into force when at least six parties have deposited instruments indicating their consent to be bound. Accordingly, once in force for the United States, the ACTA will impose obligations on the United States that are governed by international law. As in the case of other international agreements, it is possible that Congress could enact subsequent changes in U.S. law that are inconsistent with U.S. international obligations.
Continue reading “Obama Administration: ACTA Is Binding & Don't Worry Your Pretty Little Heads About TPP”

The Internet is running out of IPv4 addresses.

BITAG’s Large Scale NAT Report Published

(Mar. 7, 2012)
The Internet is running out of IPv4 addresses. A successor address format, IPv6, has been developed to support as many devices as can conceivably be connected to the Internet for the foreseeable future but the IPv6 transition will take several years to be completed. IPv4 and IPv6 will thus need to co-exist until the demand for IPv4 services diminishes.  Network operators are employing a variety of techniques to extend the life of IPv4 addressing given the specter of a long term IPv6 transition. Large Scale Network Address Translation (also known as “Large Scale NAT” or “LSN”) is one such technique.  LSN equipment allows a large number of IPv4-enabled end devices to share a single public IPv4 address. Network Address Translation (“NAT”) functionality has long existed in local/private networks to help network operators manage their network addresses using private address space but network operators now contemplate using it on a widespread basis.
Continue reading “The Internet is running out of IPv4 addresses.”