.

Activity 1

Aaron Swartz was a computer prodigy who sadly committed suicide earlier this year. Find out the story behind why he was being targeted by the FBI. Explain it in a paragraph.

In United States of America v. Aaron SwartzAaron Swartz, an American computer programmer, writer, political organizer and Internet activist, was prosecuted for many violations of the Computer Fraud and Abuse Act (CFAA), after downloading a great many academic journal articles over the MIT computer network from a source for which he had an account as a Harvard research fellow. Facing trial and the possibility of imprisonment, Swartz committed suicide, and the case was consequently dismissed.[1][2][3]

https://en.wikipedia.org/wiki/United_States_v._Swartz



Activity 2

Listed below are some computer criminals.

1. Kevin Poulson

Kevin Lee Poulsen (born November 30, 1965) is an American former black hat hacker and a current digital securityjournalist

His most notorious hack was a takeover of all of the telephone lines for Los Angeles radio station KIIS-FM, guaranteeing that he would be the 102nd caller and win the prize of a Porsche 944 S2.[2][3]

When the Federal Bureau of Investigation started pursuing Poulsen, he went underground as a fugitive. When he was featured on NBC's Unsolved Mysteries, the show's 1-800 telephone lines mysteriously crashed.[2][4]

He was arrested, and sentenced to five years in a federal penitentiary, as well as banned from using computers or the internet for 3 years after his release. He was the first American to be released from prison with a court sentence that banned him from using computers and the internet after his prison sentence; although Chris Lamprecht was sentenced first with an internet ban on May 5, 1995, Poulsen was released from prison before Lamprecht and began serving his ban sentence earliest. (Poulsen's parole officer later allowed him to use the internet in 2004, with certain monitoring restrictions)[5]

https://en.wikipedia.org/wiki/Kevin_Poulsen

http://www.nndb.com/people/453/000022387/

2. Robert Tappan Morris

Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known[3] for creating the Morris Worm in 1988, considered the first computer worm on the Internet,[4] and later for companies he has founded.[citation needed]

Morris was prosecuted for releasing the worm, and became the first person convicted under the then-new Computer Fraud and Abuse Act.[2][5] He went on to co-found the online store Viaweb, one of the first web-based applications, and later the funding firm Y Combinator—both with Paul Graham.

He later joined the faculty in the department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, where he received tenure in 2006.[6]

https://en.wikipedia.org/wiki/Robert_Tappan_Morris

http://www.businessinsider.com.au/why-robert-morris-didnt-go-to-jail-2013-1

3. Kevin Mitnick

Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes.[7]

Mitnick's pursuit, arrest, trial, and sentence along with the associated journalism, books and films were all controversial.[8][9]

He now runs a security firm named Mitnick Security Consulting, LLC that helps test a company's security strengths, weaknesses, and potential loopholes. He is also the Chief Hacking Officer of the security awareness training company KnowBe4, as well as an active advisory board member at Zimperium,[10] a firm that develops a mobile intrusion prevention system.[11]

https://en.wikipedia.org/wiki/Kevin_Mitnick

4. Julian Assange

Julian Paul Assange (born 3 July 1971) is an Australian computer programmer, publisher and journalist. He is editor-in-chief of WikiLeaks, an organisation which he founded in 2006. Subject to extradition to Sweden where he is wanted for questioning over an allegation of rape,[1] he was granted political asylum by Ecuador in August 2012. He has remained inEcuador's London embassy and, as of February 2016, he is unable to leave without expectation of arrest.

In February 2016 a UN panel issued a non-binding legal opinion that Assange had been subject to arbitrary detention and should be allowed to walk free and be given compensation.[2][3] The findings were rejected by UK and Swedish prosecutors,[4] as well as UK Secretary of State for Foreign and Commonwealth Affairs, Philip Hammond.[5]

https://en.wikipedia.org/wiki/Julian_Assange

5. Jonathan James

Jonathan Joseph James (December 12, 1983 – May 18, 2008) was an American hacker who was the first juvenile incarcerated for cybercrime in the United States.[1]The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died on May 18, 2008, of a self-inflicted gunshot wound.[2][3]

Between August 23, 1999, and October 27, 1999, James committed a series of intrusions into various systems, including those of BellSouth and the Miami-Dade school system.[4] What brought him to the attention of federal authorities, however, was his intrusion into the computers of the Defense Threat Reduction Agency, a division of the United States Department of Defense, the primary function of which is to analyze potential threats to the United States of America, both at home and abroad. James later admitted to authorities that he had installed an unauthorized backdoor in a computer server in DullesVirginia, which he used to install a sniffer that allowed him to intercept over three thousand messages passing to and from DTRA employees, along with numerous usernames and passwords of other DTRA employees, including at least 10 on official military computers.[1]

It was later revealed that the precise software obtained was the International Space Station's source code controlling critical life-sustaining elements. According to NASA, "the software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space."[5] This intrusion, when detected, caused NASA to shut down its computers for three weeks that July, costing $41,000 to check and fix its systems.[6]

https://en.wikipedia.org/wiki/Jonathan_James

Find out about 2 of them.

Describe what they did, and identify the issues as they relate to the HSC IPT Course, and specifically Communications.

Explain it in a paragraph for each.


Activity 3

Choose one of the below trends in computer communication and write an explanation of it 

including at least one positive and one negative effect it has created.

  • * blogs
  • * wikis
  • * Facebook (Social Media)
  • * RSS feeds
  • * podcasts
  • * online radio, TV and video on demand
  • * 3/4/5G technologies for mobile communications

Activity 4
Describe and Discuss implications of as many of the newly recent and emerging trends in communications 

There are loads to consider....
  • Chatbots. With the growth of social media, consumers have become more concerned with getting more authentic communication from brands and with reviewing businesses and products. ...
  • Artificial personal assistants. ...
  • Hyper-personalized experiences. ...
  • Blockchain. ...
  • Virtual reality.

1. THz Spectrum Heats Up Talk of 6G

Last year we discussed the promise of huge swaths of bandwidth in the frequency frontier that ranges between 100 GHz and 1 THz, along with a blend of new possibilities waiting up there, not only in terms of bit rates, but of high-resolution positioning and imaging as well. Having published a post devoted to this issue just weeks ago, we continue to expect that this topic will become one of the big ones of 2020 and we moved it up to pole position in the list. But we recognize that this will be a process and that it will take time (and research!). The first step in this process is, in fact, the deployment of mmWave 5G components, and the ongoing trials are providing an unprecedented wealth of data on how signals propagate at these frequencies, especially outdoors. In many cases, the non-line-of-sight coverage is proving to be more robust than anticipated thanks to reflections, which is welcome news, not only for 5G itself, but further for the prospects of what lies beyond. Let’s see where we are a year from now…

2 . AI Reaches the Boonies with Federated Learning

Our prediction last year was that AI would start to roll down the hype curve, but we were wrong. Last year was the year of edge computing for everything and the hot topic of 2019, Machine Learning, was not immune to this influence. Much good work was done towards an understanding of how machine learning could be distributed to reduce the latency of inference as well as reducing the bandwidth of data moving back to the cloud for training. In addition, some folks have proposed that federated learning can occur with only encrypted data moving to the cloud so that we can learn even when we don’t know what it is we are learning! So with 2019 being the year of training at the edge of the network, we expect that 2020 will see federated learning move solidly into the handset.

3. Meta-materials, Meta-surfaces, Meta-resonators, Meta-anything

A theme that has quietly but manifestly moved into a rather central position in the discussions on the evolution of wireless communications is that of meta-materials. Broadly speaking, a metamaterial is an artificially structured material that allows controlling and influencing the flow of electromagnetic waves (or possibly of other types of waves). Metamaterials are typically arranged in repeating patterns, at scales smaller than the wavelength of the waves they seek to mold, and their properties emanate precisely from these patterns. Efforts are underway to design antennas based on meta-materials, say for massive MIMO, that could incorporate some of the signal processing functionalities directly on the antenna structures, and antennas based on meta-resonators that could be more compact and broadband than regular antennas. An even more intriguing development is that of intelligent reflecting surfaces, which could be deployed in strategic locations and reflect signals on a dynamically adjustable fashion. Taking the idea to the limit, think off a world where multipath propagation was a controllable phenomenon rather than an imposition from nature. It’s too soon to tell whether these meta-surfaces can be a transformational development, or merely an anecdotal re-incarnation of good old relays. Only time and research will tell.

4. The Cellphone is Dead. All Hail IoT!

This was our prediction last year and we are calling it. OK, maybe the cell phone isn’t exactly dead but the Financial Times ran an article in October with the headline “Apple’s wearables and services drive revenue as iPhone sags”, so if not dead it is showing its old age. Certainly 2019 was the year of IoT more than it was the foldable screen (Though that was also pretty cool) and we expect that IoT will be a hot topic for 2020, especially in the areas of Factory 4.0, V2X and enterprise. In 2019 the 3GPP standards process was all over trying to define use cases for these new, and potentially massive, applications. Note that in these cases the IoT isn’t the slave to a phone but an ecosystem all by itself with some very unique requirements that are now driving URLLC. Expect to hear a lot more as this starts to roll out in big manufacturers like Mercedes, Bosch and Foxconn.

5. Cellular is Dead. All Hail IT!

OK, we just said that to attract your attention. But 2019 was the year of IT insurgency into traditional cellular operator arenas, and we would like to point out that we did call 2019 the year of IT convergence. We expect this to continue. In particular, we expect that Edge compute will continue to be a hot topic and that the impact of ORAN’s attempts to commoditize the RAN will become clearer in 2020. After all of the hype of 2019 we are tempted to predict that 2020 will be a year of adjusting for reality in the IT convergence at the network edge.

6. The Year the Telecom World Cracked

Are we touching a third rail here? 2019 was the year that the Global ecosystem that telecoms had sat on top of for decades started to crack and governments got into the telecom regulation business in a way that we haven’t see in a long time, if ever. You know what we are talking about. This process will continue into 2020 and, needless to say, there will be winners and losers. Your humble editorial board will stick to the technology side of this and stay away from the politics and business side. But it is hard to imagine this is not a hot topic in 2020 for technology.

7. Come Fly with Me, and My Network

Driven by an emerging use of flying platforms such as unmanned aerial vehicles (UAVs), drones and unmanned balloons in future network applications and the challenges that the 6G networks exhibit, last year we noticed loads of research and development activities that demonstrate the evolution of the flying platforms as a novel architectural enabler for radio access network (RAN) and their integration with the future cellular access and backhaul/fronthaul networks. It seems that these platforms could be used as potential way to offer high data rate, high reliability and ultra-low latency access and backhaul/fronthaul to future wireless networks. Such large scale and flexibly deployable platforms and frameworks may guarantee the global information and communication requirements in future smart and resilient cities and solve the ubiquitous connectivity problems in many challenging network environments, e.g., coverage or capacity enhancements for remote or sparsely populated areas, social gathering and disaster affected scenarios, etc and responding to United Nation’s sustainable development goals and societal challenges.

8. Massive MIMO Implementation Becomes a Career Plan

Yet again typing “massive MIMO implementation” into IEEE explore once again reveals that the rise in paper density has pretty much rooflined since 2017 at around 100 papers a year. We promise not to mention it again.


9. Everyone is Slicing and Virtualizing

Globecom in December was awash with papers on RAN slicing and we expect this trend will continue to ramp for a while because the availability of open source frameworks and data is now allowing universities to finally apply some of that theory in a meaningful way. Some folk believe that this will be a trend that will fundamentally alter the landscape of the telecoms industry. Some of us older folk remember CloudRAN and NFV and get a similar feeling about this time around. But either way we will call 2020 as the year that everyone got comfortable with slicing anything that moves in the telecom network



Comments