Ian Hodgson & Rosa Lee Mid -Term

Ian Hodgson & Rosa Lee

“Cyberpoling”

Mid – Term

Topics & Perspective’s

Professor Adriane Wortzel

Due Tuesday 03/20/2013

Internet Search Engine Keywords:

  • Cyberpol = internet policing agency (Virtual authority) Commissioned by the IWIC
  • Cyber poling = The act of patrolling the internet
  • Cybertute = internet constitution (virtual freedoms)
  • Cyber law = laws governing the ****USAGE**** of the internet
  • Cyber net = Internet virtual jail
  • Cyber crime = The act of violating or committing a virtual infraction of cyber law on the internet
  • World Bill Of Rights = a clearly written list of freedoms expressed and granted to the users of the internet protected and authoritated by Cyber law
  • IWIC = International World internet Committee
  • DVIU = Department of Virtual Internet Usage
  • VL = Virtual License
  • IJPS = Internet Jurisdiction Positioning System
  • IZ = Internet zoning
  • Grid = the mapping technology used for tracking and identification of users on the net.
  • CCC = Central Control Center whose primary mandate is to use the available technologies in programming, processing, and code locking to oversee the security of the net.

We now live in a society where information and communication is more expensive than the value of a dollar.  With the dramatic increase in cyber-crime, identity theft is among the most prevalent next to copy write theft.  Then of course globally the world is affected by the war on terror.  So much so the war not only exists in a physical realm.  It’s also in a virtual realm.  These terrorist don’t even have to leave the comfort of their caves in order to recruit, manipulate, organize, and dispatch there dangerous activities due to the internet and lack thereof of its security.  Also the internet has provided a safe haven for black market activates and distribution.  The business community struggles to cope with their loss in revenue which eventually lead’s to unemployment.  By imposing structure for the internet we ensure a safer environment for it free usage.  The internet was not intended to create a new path for crime to thrive, but to increase communication and travel of information.  An analogy in comparison of the internet is the referencing of it usage and capabilities as the information super highway.  There are laws governing roads, highways and by ways, so why cant we treat the internet the same?  It will forever remain free its just in order to use it identification is required.

Conceptually the structure and or framework for organizing the Internet are derived from a virtual form of our modern day DMV.  Its premise will be focused on securing identification for its users known as a virtual license.  A virtual license will consist of not only a workstation IP address but also a personal identification code issued by DVIU (Department of Virtual Internet Usage).  This will not only ensure whose committing cyber crime (the act of violating or committing a virtual infraction of cyber law on the internet) but also their location at the time of violation.  Cyberpole is an organization commissioned by the IWIC to in short authority/ police the Internet and it’s associated cyberspace environments.  Cyberpole it self is governed by the IWIC (International World Internet committee).  The IWIC like the United Nations is a collaboration of world governments, which has set up a Cybertute ( internet constitution) and Cyber law (laws by which governs the Internet and its surrounding cyberspace. Conviction of cyber crimes warrant confinement to Cyber net (Internet virtual jail), and or revocation VL.

In order for the assignment of internet jurisdiction positioning system (IJPS) to be placed on the internet (Net) Its first broken down into zone quadrants in identification of the continents by XYZ axis.  Then for mapping purposes its color coded so that whom ever virtually travels to that region the color code attaches to their trip route like when you travel internationally each country stamps your passport.  The same will be in effect of what the passport gives international travel, will coincide with the color code.  Another important factor will be the identifying of business or personal travel to that region.  So a Class ID will be assigned at the point of registration to the DVIU whether to have access to virtual travel for business or personal use.   The assignment will benefit the specific country by the requisition of taxes once its understood that the individual was there on business not personnel use.  In addition only the country visited may request taxes for business use not the country of origin.  This will alleviate double dipping at the expense of the traveler.  The creation of a grid structure will define not only distinct paths for jurisdiction on travel but allows for each country to act as its own control tower and assumes responsibility for how the internet is being used in their country.  Another benefit to the world is this will create new jobs in order to monitor it, thus a new economical base for that region.

Zone Quadrant                                   Zone ID number             Class ID

  •    Blue = North America                     NA-5013                              *B or P
  •    Red = Europe                                    EU-2306                              *B or P
  •    Yellow = Africa                                 AF-1945                               *B or P
  •    Orange = Asia                                   AS-3864                              *B or P
  •    Green = South America                   SA-4210                              *B or P
  •    Grey = Antarctica                              AN-6653                             *B or P
  •    Purple = Australia                             AU-7981                             *B or P

gridmap

As discussed the individual user will be assigned a VL as permissions and identification to use the internet.  The way in which we would track user information is through the VL, history (acts as a foot print of travel).  One may acquire a VL for business, or personal, or both at the same time.  By the use of CPU rendering (alpha numerical calculation) and processing we will be able to pinpoint in real time when, where, and why for internet usage. Currently there is no structure identification system, nor structured accountability system on the net like this for doing business.   As discussed in the link presented below:

http://www.loc.gov/rr/business/ecommerce/

Thus we’ve created a system of democratic checks and balances devoid of violating an individuals right to surf (travel) the net. The creation of a Virtual constitution is there for necessary to ensure a users right to free surf.  This also shows a need for a system of virtual laws (Cyberlaws) to be set up to ensure a users freedoms, safety, and accountability is obeyed.

http://www.nap.edu/netsafekids/pp_li_il.html

http://www.enotes.com/internet-reference/internet-regulation

http://www.ncsl.org/issues-research/telecom/state-laws-related-to-internet-privacy.aspx

Interestingly enough the laws that are currently in effect for the governance of the net are subsequently not followed by everyone in the world community.  for  example the article below specifically speaks on this dividence and need for a world commune for the safety of our net users. They reference Europe not abiding by internet laws established by the US.  It also shows the need for the cooperation of the business community as well as other entities in order to ensure these freedoms are met.  The idea of free trade vs. fair trade comes into play when deducing the effects of governance on the the internet from the side of the business community.

http://agc-blog.agc.gov.my/agc-blog/?p=1216

In communist Peoples Republic of China they’ve imposed new regulations for identification of internet users.  They’re now requiring for internet users and providers to input there real names / identities instead of alias’s.  The new enactment will address the business community protection of commercial secrets, making it harder.  As well as websites that are viewed by communist china to be politically sensitive.  Their aim is to target internet companies to be accountable and assume more responsibility in their content and the handling of it.  The cell phone industry is the focus of these new regulations and are required to report violators back to the authorities.  As a result of these forced regulations  china has exposed a series of sexual and financial scandals that have led to the resignations or dismissals of at least 10 local officials. Thus proving the benefit and need for policing the internet.

http://www.nytimes.com/2012/12/29/world/asia/china-toughens-restrictions-on-internet-use.html?ref=internetcensorship&_r=1&

 

In attempts to prove why we should govern the net a group of students wrote a paper breaking down laws and concept for internet usage.  Knowingly classifying contributory internet groups / community and their usage by underling laws of governance to ensure free trade.

http://www.research.rutgers.edu/~ungurean/papers/communities.pdf

It has become more and more evident for the complete governance of the internet to work we will need a world consciousness united in the benefits for its purpose.  This must include but not limited to the commitment from the world business community and other entities.  This is also the reason to doubt the governance of net the will come to fruition.  Our world leaders have made it a point to stay divided either for the benefit of religious, economic, political, or trade sovereignty.  Clearly the benefits for governing the net out ways the negative impact for change in the way our society conducts itself.  We would embark on a social revolution questioning if we’re imposing censorship over freedom.  In some parts of the world where government controls everything this view of censorship would actually be welcomed were as in the US it would be deemed as the end of democracy as we know it.  The US for many years has made its mission to spread the concept of democracy around the world.  There are even some world leader that may call the US bully’s for trying to impose their political agenda on them.  By implementing Cyberpol a new world consciousness will not only emerge but will be lead by a new sociology-economic movement.

The new economy that will be developed by cyberpoling will allow those countries who once didn’t benefit from the net to implement a new revenue in the form of taxation.  It used to be for a country to show strength through its ability to export goods without being dependent on import. This socio-economic revolution can be compared to the industrial revolution of the late 1800’s, early 1900’s through out the world. This also puts a dent on the black market trade of the world especially in those third world country dependent on its illegal activities.  Another aspect of the social impact would have is the breaking down of terrorist organization.  Its well known the war on terror dependent on communications.  By disturbing their ability to communicate and organize we (the world community) effectively diminish their ability and power.

http://www.loc.gov/teachers/classroommaterials/primarysourcesets/industrial-revolution/pdf/teacher_guide.pdf

http://americanhistory.about.com/od/industrialrev/a/indrevoverview.htm

Time line

Point forward the establishment of a fully functioning constitution (Cybertute) will be created under the notion of a World Bill Of Rights a clearly written list of freedoms expressed and granted to the users of the internet protected and authoritated by Cyber law.  Of course this will be modeled after our own constitution and bill of rights but now with interest of a world consciousness and not with the specific agenda of spreading democracy.  Then the defining of Cyber laws to protect and govern the users freedoms when cyberpoling.  The establishment of zonal jurisdiction by the IJPS to define not only restrictions for that IV but for the creation of the Grid which is the mapping technology used for tracking and identification of users on the net.  To Organize the grid we’ll be using and alpha numerical algorithm system in identification of the zones and users to and fro the zone.  The mapping of travel restrictions to be imposed.  The creation of a central repository (Cyber net) to isolate and restrict virtual id’s in conveyance of the cyber laws.  All of this will be done by a Central Control Center (CCC) whose primary mandate is to use the available technologies in programming, processing, and code locking to oversee the security of the net.

Deliverable’ s

  • The creation of a constitution that consist of all known laws currently applied to internet.  The addition of new laws comparable to our current constitution, but tailored to govern the virtual environment of the internet.
  • The creation of a users Bill of Rights.  It will be a detailed understanding of the responsibilities to the user.
  • The creation of cyber laws.  This will be a detail mock up of laws governing the internet and its zone differentiations.  These laws were created by the IWIC for cyber pole to enforce
  • The creation of internet protocol. This will be a systematic framework for cyber pole in enforcing cyber law.

Tangible’s

  • In order to create the repository we will use python in blender physics engine as a means to maintaining, and isolating user identification profiles.  In programming terms there will only be one way in and one way out.
  • We will also use blender to create a 3d version of the grid to display access and zone jurisdiction.
  • Creation of zones and tracking grids.
  • Research behind how signals travel through cyberspace then attach an alpha character to act as a bug.  This is the intent behind our tracking initiatives.
  • Creation of User id’s with a requested Google API characters.  In addition to the API, a id character from the DVIU.  Also the assignment of a user pin.  A zone character would be placed on your user id.  This will act as a passport for international surfing.
  • Depending on your specific license your id may require a tax id number for the ability to use the net for eCommerce.

Journal Entry I

for Wish List Project

The major resistance of governing the internet seems to be the freedom of usage but at what cost to society do we allow these freedoms when in a sense our way of life is affected and or threaten enemies home and abroad.  Many analyst think by governing the internet you diminish the very reason for its conceptualization.  Also by governing it there’s the promotion of censorship.  I argue that their needs to be more accountability and responsibility for users of the internet.  A student paper at Rutger University explained in detail why it should not be governed, but by my impression, as usual money is the real motivator behind businesses rallying for the dismissal of the topic.

http://www.salon.com/2012/12/05/conference_takes_up_how_to_govern_the_internet/

http://video.foxnews.com/v/2001189166001/governing-the-internet/

http://www.research.rutgers.edu/~ungurean/papers/communities.pdf

Invention Journal Entry I

Posted on March 5, 2013 by babyxface / Rosa Lee

In temps to combat piracy on the internet, internet carriers Verizon, Time Warner, At&t, Comcast etc. are trying to enforce what there calling a six – strike – program to discourage illegal client usage of the internet. The program consist of ISP address monitoring.

  • The first two infractions will warrant an email notification informing clients of the infraction.  A coupled with the email will be an informational attachment on copy write laws.
  • The third and forth violations warrants a splash screen where you have to follow the steps and acknowledge your illegal trading or you wont be able to continue using the internet.
  • The fifth and sixth offense warrants an email and splash page with a 14 day suspension of service.

For the internet providers to now want to truant their clients usage is a direction result of pressure from the business community for the loss in revenue suffered from their clients activities.  The real question is it legal for your service provider to monitor your usage on a free entity?  For example if your rent a car and rob a bank with it can the rental car company sue you for misuse of their property.

http://www.dslreports.com/shownews/Time-Warner-Cable-Gives-Us-Their-Six-Strike-Details-122103

http://www.ibtimes.com/how-six-strike-program-works-time-warner-comcast-att-other-isps-working-together-combat-online

http://arstechnica.com/tech-policy/2011/07/major-isps-agree-to-six-strikes-copyright-enforcement-plan/

Journal Entry II

Mid Term Entry

One of my primary goals was to show the need for cooperation from our world governments alongside the business community and other entities (social media outlets) in order for this project to work.   Its definitely possible once you display how the good out ways the bad, and as a matter of fact it has already happened with the social media revolution.  Face book is a prime example of how the world social structure has changed through the adaptation of social communication in real time.  So much so even our political leaders are campaigning through the social media arena  From marketing advertisements to political campaigning social media has embeded values in world operations.  Even at home when hurricane sandy hit people where rushing to gain internet access were ever they could.  everyday citizens are now real time reporters documenting crime all the way down to police brutality by the use of cell phones.

This revolution of technology and social structure justifies the need for more control on the net.  The proof of governments starting to either create laws or impose restrictions on internet providers and or its users displays the current trends and road leading down the path of a fully governed body for the net  It also shows proof of acknowledgment by the government conforming and confirming the social change / revolution.  This leads to the organization of the net and the reason for me creating a constitution, bill of rights, laws to fully govern the net.  once this set up we can then focus on the grid structure, jurisdiction, patrolling, and conviction of violators of the net.

Rosa Lee Journal Entry II

In researching the necessity for my project, I discovered that countries are already starting to implement their own forms of restrictions for internet usage. Case in point in the U.S. internet providers ( time warner, comcast, etc) has attempted to regulate the internet by imposing a 6 strike rule for downloading, copying writing, and pirating materials. The current  laws in the U.S. pertain to internet usage only address copy right laws and or sexual solicitation. This move by the internet company/business community show that the corporation from the internet providers can work and showing the change in social structure has to occur due to monitory loss. The U.S. is governed democratically and unfortunately other countries feel that they are imposing their political ideologically on them but are still effected by the social revolution. Case in point communist china. Although they don’t support democracy, they still suffer from the same consequences of miss usage of the internet. So much so they impose their own restrictions toward internet providers and users to provide identification and accountability of the internet providers and users. This has benefited them for it has uncovered several scandals with officials that have been involved with sexual crimes and misconduct. Therefore the need for regulation of the internet is global and our plan to create a grid structure for regulating internet will be approved by the world community because of the social revolution occurring because of the misusage of the internet.

 

 

This entry was posted in Assignments, Ian Hodgson, Midterm Papers, Rosa Lee. Bookmark the permalink.

2 Responses to Ian Hodgson & Rosa Lee Mid -Term

  1. https://www.torproject.org/
    http://en.wikipedia.org/wiki/Bitcoin
    http://en.wikipedia.org/wiki/Freenet
    http://en.wikipedia.org/wiki/RSA_%28algorithm%29
    http://en.wikipedia.org/wiki/Silk_Road_%28marketplace%29
    http://en.wikipedia.org/wiki/BitTorrent
    encryption and privacy related issues, technologies that work against identification systems that currently exist today

    http://en.wikipedia.org/wiki/MAC_spoofing

    How to Spoof your MAC Address in Mac OS X


    how to fake MAC addresses

    http://www.schneier.com/
    Bruce Schneier’s website on privacy and security issues. His books on encryption technology are particularly good.

Leave a Reply to Damon Loren Baker Cancel reply

Your email address will not be published. Required fields are marked *