Congressman Repays Official ISP Bribes with Sweetheart Bill

Don't say you're surprised.  Ars Technica has the gory details:
US Rep. Bob Latta (R-OH) on Wednesday filed legislation that would prevent the Federal Communications Commission from attempting to regulate broadband Internet service as a public utility.
It probably won't surprise you that Internet service providers have enthusiastically given money to this congressman. As we reported in our May 16 story "Bankrolled by broadband donors, lawmakers lobby FCC on net neutrality," Latta received $51,000 from cable company interests in the two-year period ending December 2013.

The National Security Police State and Surveillance Society Makes Everyone Less Secure

This is a truism.  The attempt to make law enforcement's job easier makes everyone less secure. For example, requiring government sponsored back doors in your favorite operating system or router or cell phone, in order, say, to facilitate court ordered wiretapping, makes all such device vulnerable to anyone and everyone who has any interest or desire in compromising those devices for their own purposes.  A report from the Guardian exposes how "cyber-crime" laws are now actually criminalizing the work of security researchers!  Excerpt:
Some of the world’s best-known security researchers claim to have been threatened with indictment over their efforts to find vulnerabilities in internet infrastructure, amid fears American computer hacking laws are perversely making the web less safe to surf.

Many in the security industry have expressed grave concerns around the application of the US Computer Fraud and Abuse Act (CFAA), complaining law enforcement and lawyers have wielded it aggressively at anyone looking for vulnerabilities in the internet, criminalising work that’s largely benign.
They have also argued the law carries overly severe punishments, is too vague and does not consider context, only the action.
HD Moore, creator of the ethical hacking tool Metasploit and chief research officer of security consultancy Rapid7, told the Guardian he had been warned by US law enforcement last year over a scanning project called Critical.IO, which he started in 2012. The initiative sought to find widespread vulnerabilities using automated computer programs to uncover the weaknesses across the entire internet.

Facebook: A Company That Really Listens to Its Users

Many would probably like to believe it's good that more and more companies are listening to their users. But this is probably not what they had in mind. From the International Business Times:
On the same day that Facebook touted sweeping new efforts to protect users’ privacy, the company confirmed that it plans to save data captured by smartphone microphones, potentially enabling the social media giant to listen in on private conversations.  
In a press release issued Wednesday, Facebook announced a forthcoming app update in which a new feature uses the phone's microphone to capture sounds in the user's environment, then identifies the song, movie or television show the user is watching based on what it hears. Once the sound is ID'd, users have the option to share it as a visual component of their posts.
Though Facebook assured that "no sound is stored,” the company acknowledged to International Business Times that it does intend to archive the data gleaned.

Even the Corporate Media Are Coming Out Against the Comcast Merger

The New York Times editorial board has come out against the proposed Comcast/TimeWarner merger.  There are far too few companies with far too much power over the local, state and national media to which the people of this country are exposed.  It is time to bring real competition to the media markets, rather than continuing to allow well-connected corporations to hold the American public hostage to their narrow, self-serving political agendas. From the NYT:
There are good reasons the Justice Department and the Federal acquisition of Time Warner Cable. The merger will concentrate too much market power in the hands of one company, creating a telecommunications colossus the likes of which the country has not seen since 1984 when the government forced the breakup of the original AT&T telephone monopoly.
Communications Commission should block Comcast’s $45 billion
The combined company would provide cable-TV service to nearly 30 percent of American homes and high-speed Internet service to nearly 40 percent. Even without this merger and the proposed AT&T-DirecTV deal, the telecommunications industry has limited competition, especially in the critical market for high-speed Internet service, or broadband, where consumer choice usually means picking between the local cable or phone company.
By buying Time Warner Cable, Comcast would become a gatekeeper over what consumers watch, read and listen to. The company would have more power to compel Internet content companies like Netflix and Google, which owns YouTube, to pay Comcast for better access to its broadband network. Netflix, a dominant player in video streaming, has already signed such an agreement with the company. This could put start-ups and smaller companies without deep pockets at a competitive disadvantage.
There are also worries that a bigger Comcast would have more power to refuse to carry channels that compete with programming owned by NBC Universal, which it owns. Comcast executives say that they would not favor content the company controls at the expense of other media businesses . . .

Twitter Partners with Pakistani Speech Police

From the New York Times:
At least five times this month, a Pakistani bureaucrat who works from a colonial-era barracks in Karachi, just down the street from the former home of his country’s secularist founder, Mohammed Ali Jinnah, asked Twitter to shield his compatriots from exposure to accounts, tweets or searches of the social network that he described as “blasphemous” or “unethical.”
All five of those requests were honored by the company, meaning that Twitter users in Pakistan can no longer see the content that so disturbed the bureaucrat, Abdul Batin of the Pakistan Telecommunications Authority . . .

Congress Pretends to Curb Illegal and Unconstitutional Wiretapping Program

The Democratic and Republican parties are among the greatest threats to the people and Constitution of the United States.  From Wired:

The U.S. House of Representatives has passed a bill that would end the NSA’s mass collection of Americans’ phone records. Unfortunately, it may not end the NSA’s mass collection of Americans’ phone records.
The House voted 303 to 121 Thursday in favor of the USA Freedom Act, broad legislation aimed at reforming the NSA’s surveillance powers exposed by Edward Snowden. The central provision of the bill, which now moves on to debate in the Senate, is intended to limit what the intelligence community calls “bulk” collection–the indiscriminate vacuuming of citizen’s phone and internet records. But privacy advocates and civil libertarians say last-minute changes to the legislation supported by the White House added ambiguous language that could essentially give the NSA a broad loophole through which it can continue its massive domestic data collection.

Survey: Comcast, Time Warner the Most Hated Companies in the United States

From BGR:
The only consumer survey that matters has found that among all businesses across every industry, Comcast and Time Warner Cable are the two most hated companies in America. The American Customer Satisfaction Index, which is put out quarterly by the University of Michigan’s Ross School of Business and is considered the most comprehensive customer satisfaction survey in the United States, has just come out with a new survey showing once again that Comcast and TWC have the lowest customer satisfaction ratings of any ISPs in the United States. And that’s not even the worst news for the two companies in the latest survey.

We asked ACSI to provide us with customer satisfaction scores for every company in every industry that they cover and it turns out that Comcast and TWC have the lowest customer satisfaction ratings of any of them.
In fact, Comcast and TWC’s Internet service businesses were the only two businesses in the United States to score below a 60 on the ACSI’s 100-point scale. What’s most amazing is that both Comcast and TWC have even lower customer satisfaction ratings than United Airlines, which has a notoriously bad reputation in an industry that, due in part to government security requirements, is known for delivering a miserable experience.

The Criminal Justice System Is Aptly Named

Because it is indeed criminal.  From the Guardian, an op-ed by Ladar Levison, who chose to shut down his secure encrypted email service rather than bend over for the feds. Excerpt:
The largest technological question we raised in our appeal (which the courts refused to consider) was what constitutes a "search", i.e., whether law enforcement can demand the encryption keys of a business and use those keys to inspect the private communications of every customer, even when the court has only authorized them to access information belonging to specific targets.

The problem here is technological: until any communication has been decrypted and the contents parsed, it is currently impossible for a surveillance device to determine which network connections belong to any given suspect. The government argued that, since the "inspection" of the data was to be carried out by a machine, they were exempt from the normal search-and-seizure protections of the Fourth Amendment.

More importantly for my case, the prosecution also argued that my users had no expectation of privacy, even though the service I provided – encryption – is designed for users' privacy.

If my experience serves any purpose, it is to illustrate what most already know: courts must not be allowed to consider matters of great importance under the shroud of secrecy, lest we find ourselves summarily deprived of meaningful due process. If we allow our government to continue operating in secret, it is only a matter of time before you or a loved one find yourself in a position like I did – standing in a secret courtroom, alone, and without any of the meaningful protections that were always supposed to be the people's defense against an abuse of the state's power.

How the NSA Compromises Hardware

From Ars Technica:
A document included in the trove of National Security Agency files released with Glenn Greenwald’s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers, and other network gear being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they’re delivered.
These Trojan horse systems were described by an NSA manager as being “some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.”
The document, a June 2010 internal newsletter article by the chief of the NSA’s Access and Target Development department (S3261) includes photos . . . of NSA employees opening the shipping box for a Cisco router and installing beacon firmware with a “load station” designed specifically for the task.
Today, the CEO of Cisco has written a letter to President Obama against these sleazy practices, which make everyone less safe.  From the CBC:
Cisco Systems Inc's chief executive officer has written a letter to U.S. President Barack Obama urging him to curtail government surveillance after evidence circulated showing the U.S. National Security Agency had intercepted Cisco equipment, a company spokesman said on Sunday.​
In a letter dated May 15, John Chambers, chief executive officer and chairman of the networking equipment giant, warned of an erosion of confidence in the U.S. technology industry and called for new "standards of conduct" in how the NSA conducts its surveillance.

Local Police Deploy Secret Military Grade Electronic Warfare Devices Against Citizenry

Cities and counties around the country continue to use funds from DHS to further militarize local police and ramp up the Democratic and Republican parties' ongoing war on basic constitutional rights and liberties. In the present case, police won't even reveal the nature of the electronic warfare devices being deployed against the people. From the Pontiac Tribune:
‘HailStorm’ is a new device obtained by the Oakland County [MI] Sheriff with monies from a U.S. Homeland Security Grant and so far, there isn’t much information available on what exactly it can and cannot do.  There were no questions asked when Oakland County commissioners unanimously approved the use of this cellphone tracking device previously used by the US military in Iraq.
Undersheriff Michael McCabe told The Detroit News that the federal Homeland Security Act bars him from discussing the Hailstorm device.
Many privacy advocates are questioning why one of the safest counties in Michigan needs the very powerful, super-secretive military device called ‘Hailstorm’. The Detroit News sought basic information about Hailstorm and the county denied their Freedom of Information Act request.
The Oakland County Sheriff’s Office, located here in Pontiac, is the only police department in the state of Michigan(that we know of?) currently using the military technology. If you think this is an invasion of privacy, you are not alone.

FCC Caves to Corporate Masters of the Democratic and Republican Parties

Anyone who expected a group of Democrats and Republicans to do anything other than continue to carry water for their corporate overlords on this issue, as with all other issues, seriously needs to have their head examined. From the Washington Post:
The Federal Communications Commission on Thursday voted in favor of advancing a proposal that could dramatically reshape the way consumers experience the Internet, opening the possibility of Internet service providers charging Web sites for higher-quality delivery of their content to American consumers.
The plan, approved in a three-to-two vote along party lines, could unleash a new economy on the Web where an Internet service provider such as Verizon would charge a Web site such as Netflix for the guarantee of flawless video streaming.
The proposal is not a final rule, but the vote on Thursday is a significant step forward on a controversial idea that has invited fierce opposition from consumer advocates, Silicon Valley heavyweights, and Democratic lawmakers. The FCC will now open the proposal to a total 120 days of public comment. Final rules, aimed for the end of the year, could be rewritten after the agency reviews the public comments.
Again, supporting the Democratic or Republican parties in any way, shape or form is effectively tantamount to declaring oneself in active opposition to the most basic interests, rights and liberties of the people of the United States. 

Unintended Consequences of the Snowden Leak

In the aftermath of the Snowden NSA leak last year, supporters of the National Security Police State and Surveillance Society in the Republican and Democratic parties quickly ran to the media arguing that the leak represented a grave threat to national security because it would potentially reveal sensitive intelligence sources and methods.  It is now being reported by the WSJ that, in response to the Snowden leaks, Al Qaeda have changed up their crypto protocols and rolled their own encryption software.  And the uninformed  responses from the professional hysterics in the media and blogosphere are not hard to find.  Take some guy named Bob Cesca at the Daily Banter, for example. He writes:
So this is just peachy. I’ve always been very, very cautious to not over-emphasize the general scope of the terrorist threat, but this has more to do with stupidly and recklessly helping the ones that are out there, and it appears as if Snowden & Company have done precisely that.
What this reveals is that Bob Cesca doesn't know the first thing about the basic tenets of cryptography. One of the first things anyone learns when doing the most rudimentary study of cryptography and cryptanalysis is that "home-brewed," closed source  cryptographic software is essentially broken by definition, since by definition it cannot be subjected to rigorous review.  This makes it easier to break.  So, ironically, by switching up their crypto, Al Qaeda are likely providing new attack vectors for intelligence agencies the world over.  And this is in fact the view of at least one actual expert in cryptography, Bruce Schneier, as opposed to the uninformed reactions of professional political whiners.  He writes:
The Web intelligence company Recorded Future is reporting -- picked up by the Wall Street Journal -- that al Qaeda is using new encryption software in the wake of the Snowden stories. I've been fielding press queries, asking me how this will adversely affect US intelligence efforts.
I think the reverse is true. I think this will help US intelligence efforts. Cryptography is hard, and the odds that a home-brew encryption product is better than a well-studied open-source tool is slight. Last fall, Matt Blaze said to me that he thought that the Snowden documents will usher in a new dark age of cryptography, as people abandon good algorithms and software for snake oil of their own devising. My guess is that this an example of that.

Issue Complexity and Corporate Conflicts of Interest Lead to Media Silence on Net Neutrality

From Esquire:
The FCC is holding a chat on Twitter today about its new “Net Neutrality rules” proposed by Chairman Tom Wheeler. We implore you to let them hear it. The hashtag to do so is #FCCNetNeutrality, and the chat starts at 2 p.m.
Here’s why it’s a big deal: FCC Commissioner and former telecom lobbyist Tom Wheeler proposed rules two weeks ago that would permit for a “Fast Lane” for those willing to pay for it on the web, relegating the rest of Internet traffic to a slow lane unless a toll is paid to an Internet service provider. That means, yes, Netflix might slow down if Comcast is at odds with the company. But it also means companies like Netflix, in the future, might not be allowed to created — because the toll to start and maintain an Internet business early on would be too heavy.
The new rules have been met with radio silence on television, likely because of the complexity of the issue and because, as David Carr points out, parent companies of cable nets like CNN (TimeWarner) and MSNBC (Comcast) have a rooting interest in keeping the big cable/Internet bundle in place. [Emphasis added.]
This might pass for an artist's rendition of our mainstream press corpse at work, except for the fact that the monkey would eventually come up with the complete works of Shakespeare if given enough time:

Ancient Game Continues to Confound Modern Computing

Wired has a lengthy article on the ancient game of Go and how it continues to confound modern programmers.  Excerpt:
In 1994, machines took the checkers crown, when a program called Chinook beat the top human. Then, three years later, they topped the chess world, IBM’s Deep Blue supercomputer besting world champion Garry Kasparov. Now, computers match or surpass top humans in a wide variety of games: Othello, Scrabble, backgammon, poker, even Jeopardy. But not Go. It’s the one classic game where wetware still dominates hardware. 
But when computers lose at go, at least they don't go completely insane! Here's an infamous old pic of a Go game gone wrong:

 
If you're interested in learning more about Go, definitely head over to Sensei's Library, which is one of the best resources for the game on the web.

Online Learning: A Bachelor's Level Computer Science Program Curriculum (Updated - Dec 2020)

Introduction
[Update: See also the follow-up post to this piece, An Intensive Bachelor's Level Computer Science Curriculum Program.]

A few months back we took an in-depth look at MIT’s free online Introduction to Computer Science course, and laid out a self-study time table to complete the class within four months, along with a companion post providing learning benchmarks to chart your progress. In the present article, I'll step back and take a much more broad look at com-sci course offerings available for free on the internet, in order to answer a deceptively straightforward question: is it possible to complete the equivalent of a college bachelor’s degree in computer science through college and university courses that are freely available online? And if so, how does one do so?

The former question is more difficult to answer than it may at first appear. There are, of course, tons of resources relating to computer science and engineering, computer programming, software engineering, etc. that can easily be found online with a few simple searches. However, despite this fact, it is very unlikely that you would find a free, basic computer science curriculum offered in one complete package from any given academic source. The reason for this is fairly obvious. Why pay $50,000 a year to go to Harvard, for example, if you could take all the exact same courses online for free?

Yet, this does not mean that all the necessary elements for such a curriculum are not freely accessible. Indeed, today there are undoubtedly more such resources available at the click of a button than any person could get through even in an entire lifetime of study.  The problem is that organizing a series of random lecture courses you find on the internet into a coherent curriculum is actually rather difficult, especially when those courses are offered by different institutions for different reasons and for considerably different programs of study, and so on. Indeed, colleges themselves require massive advisory bureaucracies to help students navigate their way through complicated degree requirements, even though those programs already form a coherent curriculum and course of study. But, still, it’s not impossible to do it yourself, with a little bit of help perhaps.

The present article will therefore attempt to sketch out a generic bachelor’s level curriculum in computer science on the basis of program requirements distilled from a number of different computer science departments at top universities from around the country.  I will then provide links to a set of specific college and university courses that are freely available online which, if taken together, would satisfy the requirements of our generic computer science curriculum.

A Hypothetical Curriculum
So, what are the requirements of our hypothetical computer science program?  Despite overarching similarities, there are actually many differences between courses of study offered at different colleges and universities, especially in computer science.  Some programs are more geared toward electrical engineering and robotics, others toward software development and programming, or toward computer architecture and hardware design, or mathematics and cryptography, or networking and applications, and on and on.  Our curriculum will attempt to integrate courses that would be common to all such programs, while also providing a selection of electives that could function as an introduction to those various concentrations. 

There are essentially four major parts to any bachelor’s level course of study, in any given field: pre-requisites, core requirements, concentration requirements and electives. 

Pre-requisites are what you need to know before you even begin. For many courses of study, there are no pre-requisites, and no specialized prior knowledge is required or presumed on the part of the student, since the introductory core requirements themselves provide students with the requisite knowledge and skills. 

Core requirements are courses that anyone in a given field is required to take, no matter what their specialization or specific areas of interest within the field may be.  These sorts of classes provide a general base-level knowledge of the field that can then be built upon in the study of more advanced and specialized topics.

Concentration requirements are classes that are required as part of a given concentration, focus or specialization within an overall curriculum.  For example, all students who major in computer science at a given university may be required to take two general introductory courses in the field, but students who decide to concentrate on cryptography may be required to take more math classes, while students interested in electrical engineering may take required courses on robotics, while others interested in software development may be required to study programming methodologies and so on.

Finally, electives are courses within the overall curriculum that individuals may decide to take at will, in accordance with their own particular interests.  Some people may prefer to take electives which reenforce sub-fields related to their concentration, while others may elect to sign on for courses that may only be tangentially related to their concentration.

Our hypothetical curriculum will simplify this model. We will assume no prerequisites are necessary other than an interest in learning the material and a basic high school education.  Our curriculum will also not offer any concentration tracks in the traditional sense, as that would require specialized resources that are not within the scope of our current domain.  Instead, our planned curriculum shall provide for introductory courses, general core requirements, and a choice of electives that may also serve as a basis for further concentration studies.

Basic Requirements
A quick survey of curricular requirements for programs in computer science at a number of the country’s top colleges and universities reveals a wide spectrum of possibilities for our proposed curriculum, from a ten course minor in computer science to a twenty-five course intensive major in the field along with an interdisciplinary concentration. (See, for example, MIT, Carnegie Mellon, Berkeley, Stanford and Columbia, or the comp-sci page for a college or university near you.) 

Our proposed curriculum will attempt to stake out a space between those two poles, and aim for a program that consists of about 15 courses: 3 introductory classes, 7 core classes and 5 electives. The required topics and themes of a generic computer science degree program are fairly easy to distill from the comparison: introduction to the field, data structures, algorithms, programming languages, operating systems, networking, data communications, systems engineering, software development, and so on.  Our program will consist of university or college level courses from around the world that cover our basic requirements and are freely available in full online.

Note: I have, unfortunately, not watched every single video from all of the courses below.  However, I have completed three of them in full, viewed a handful lectures from a number of the other courses, and spot checked the videos from the rest for quality. 


Introductory Courses 

Intro to Computer Science, pick two of three:
Basic mathematics, pick one of two:

Core Courses 

Data Structures and Algorithms, pick one of two:
Operating Systems:
Programming Languages and Methodologies:
Computer Architecture:
Networking:
Data Communications:
Cryptography and Security:

Electives

Web Development:
Data Structures:
Systems:
Programming Languages:
Security:
Cryptography:
App Development:
Artificial Intelligence:
Graphics:
Math:
Leave any suggestions for improvements or additions in the comments!

UPDATE: There has been a ton of great feedback on this post, with suggestions for additions, critiques of the overall form, identification of "glaring holes" and more.  Thanks everyone!  However, rather than address them one by one in the comments, or include them all into an update of some sort, I think I may just begin work on a new version of the piece which provides a more intensive track of study and tries to incorporate as many of those suggestions as possible, assuming that examples of such courses are available for free in full online from a college or university.  So be sure to check back in future!

UPDATE II:  See also the companion post to this piece, An Intensive Bachelor's Level Computer Science Curriculum Program.

Duck-Duck-Go Unveils Redesign

From the DuckDuckGo Blog:
Over the past year, as our userbase and community have grown substantially, we've heard great feedback from new and long-term users. Now, we'd like to show you how we've incorporated your feedback with a reimagined and redesigned DuckDuckGo:

https://next.duckduckgo.com/

This next version of DuckDuckGo focuses on smarter answers and a more refined look. We've also added many new features you've been requesting like images, auto-suggest, places and more. Of course, your privacy is protected as well!

White House and Congress Seek to Provide Further Immunity to Telecoms for Participation in Unconstitutional Wiretapping Programs

According to recent reports, the Democrats and Republicans in the White House and Congress are, once again, crafting legislation to provide immunity to telecommunications corporations that conspire with government agencies to undermine the Constitutional rights of US citizens.  If this story sounds familiar, that's because it is. The White House and Congress did the same thing back in 2008 to protect companies that were facilitating the government's illegal and unconstitutional warrantless wiretapping programs. Now the degenerates in the Democratic and Republican parties are seeking to do the same for companies that conspire with the NSA to undermine the security of all our persons, houses, papers and effects.  From The Guardian:
The White House has asked legislators crafting competing reforms of the National Security Agency to provide legal immunity for telecommunications firms that provide the government with customer data, the Guardian has learned.

In a statement of principles privately delivered to lawmakers some weeks ago to guide surveillance reforms, the White House said it wanted legislation protecting “any person who complies in good faith with an order to produce records” from legal liability for complying with court orders for phone records to the government once the NSA no longer collects the data in bulk.

Toward the Meshnet

From Wired:
Compared to the “normal” internet — which is based on a few centralized access points or internet service providers (ISPs) — mesh networks have many benefits, from architectural to political. Yet they haven’t really taken off, even though they have been around for some time. I believe it’s time to reconsider their potential, and make mesh networking a reality. Not just because of its obvious benefits, but also because it provides an internet-native model for building community and governance.
But first, the basics: An ad hoc network infrastructure that can be set up by anyone, mesh networks wirelessly connect computers and devices directly to each other without passing through any central authority or centralized organization (like a phone company or an ISP). They can automatically reconfigure themselves according to the availability and proximity of bandwidth, storage, and so on; this is what makes them resistant to disaster and other interference. Dynamic connections between nodes enable packets to use multiple routes to travel through the network, which makes these networks more robust.
Compared to more centralized network architectures, the only way to shut down a mesh network is to shut down every single node in the network.
That’s the vital feature, and what makes it stronger in some ways than the regular internet.

You Can Run, But You Can't Hide from the Big Data Snoops

An expecting mother and sociologist reports on her attempt to hide her pregnancy from the data mining corporations that increasingly have greater and greater access to more and more of the details of all our lives.  From TIME:
This week, the President is expected to release a report on big data, the result of a 90-day study that brought together experts and the public to weigh in on the opportunities and pitfalls of the collection and use of personal information in government, academia, and industry. Many people say that the solution to this discomforting level of personal data collection is simple: if you don’t like it, just opt out. But as my experience shows, it’s not as simple as that. And it may leave you feeling like a criminal. . . . .
No one should have to act like a criminal just to have some privacy from marketers and tech giants. But the data-driven path we are currently on, paved with heartwarming rhetoric of openness, sharing and connectivity, actually undermines civic values, and circumvents checks and balances. The President’s report can’t come soon enough. When it comes to our personal data, we need better choices than either “leave if you don’t like it” or no choice at all. It’s time for a frank public discussion about how to make personal information privacy not just a series of check boxes but a basic human right, both online and off.
An infographic from ZDNET: