security

What infrastructure is needed for positively disruptive technology?

Cosponsored by Disruptive Technologists

and the New York Chapter of the Federal Communications Bar Association

Infrastructure in this sense could be physical (fiber in the ground) – or open source software, legal/policy, etc. – more broadly any type of support structure.

This will be the beginning of ongoing initiatives to address the issues raised and follow with hackathons afterwards. A major component will be the development of standards and protocols for new Net-connected technologies with consideration of the social and ethical issues as machines become intelligent. We’ll also explore innovative funding methods for these projects using digital currencies.

David Solomonoff, President, Internet Society of New York

November 11, 2014

Brooklyn Law School

Fell Hall, 205 State Street, Brooklyn, New York

10:00 am to 8:00 pm

Admission: $20.00

Students with valid ID admitted free of charge

RSVP here

Zephyr Teachout, New York gubernatorial candidate, organizer, educator, and scholar

Teachout is a constitutional and property law professor at Fordham Law School. She is a deeply experienced leader in the fights for economic and political equality and against concentration of wealth and control in the hands of the few. She is one of the leading legal experts on corruption.

Timothy Karr, Senior Director of Strategy, Free Press

Timothy builds on Free Press’ grassroots and policy work to promote universal access to open networks and protect free speech everywhere. Before joining Free Press, Tim served as executive director of MediaChannel.org and as vice president of Globalvision New Media. He has also worked extensively as an editor, reporter and photojournalist for the Associated Press, Time, Inc., the New York Times and Australia Consolidated Press. Tim critiques, analyzes and reports on media and media policy for the Huffington Post.

Serene Han, Ideas Engineer, Google

Technological initiatives to help people confront threats in the face of conflict, instability, and repression

Dave Burstein, publisher, DSL Prime:

Wireless Engineers predict 50x improvement in capacity; How do we make it so?

Spectrum should be WiFi and less licensed. WiFi wiil do more and more, becoming increasingly crowded. Mobile carriers, using existing spectrum, can increase their capacity using MIMO and more with little or no increase in capex. Logical policy: All newly available spectrum go to WiFi/unlicensed.

Bob Frankston, Ambient Connectivity – merging wired and wireless telecom infrastructures

Co-creator with Dan Bricklin of the VisiCalc spreadsheet program and the co-founder of Software Arts, the company that developed it. In recent years, Frankston has been an outspoken advocate for reducing the role of telecommunications companies in the evolution of the internet, particularly with respect to broadband and mobile communications. (remote)

Sander Rabin:  Neurosecurity, National Security and Cognitive Liberty

Sander Rabin, a physician-attorney, is the executive director of The Center for Transhuman Jurisprudence, a not-for-profit organization whose mission is education in human enhancement and the development of policies and model rules of law for human enhancement that protect our rights to our minds, bodies and genomes, while minimizing human enhancement’s potential for divisiveness and harm.

Nate Heasley, Executive Director, Goodnik

Goodnik has developed a labor-backed digital currency for information workers to share resources with non-profits and for-profit companies with a social mission.

Nate has been working as a manager of and consultant to  non-profit and technology related companies for 20 years. Nate also founded GrassrootsCamp, an organization that provides free training seminars to non-profit organizations and social entrepreneurs. It is from that experience that Goodnik started as a way to broaden the impact of those events and ideas from that community. Nate holds a BA from St. John’s College in Annapolis, MD and a J.D. from Fordham University School of Law where he was a Crowley Fellow in International Human Rights and a Stein Scholar for Public Interest Law and Ethics.

Jim Dutcher, CIO, State University of New York, Cobleskill

How broadband is transforming rural America and what is needed now

Panel: Bitcoin and related cryptocurrency-related technologies

• Margaux Avedison, Moderator. Co-founder of EvotionMedia, a “Crypto-Media” production and finance entity. She is on the advisory board of the Bitcoin Shop and organized the first Bitcoin Education Day on Capitol Hill as an Advisor for the Chamber of Digital Commerce.She also consults for banks, individuals, large corporations and venture capitalists on Bitcoin and Blockchain 2.0 technology.  She is an early entrepreneur in the digital currency space and relaunched the first American Bitcoin Exchange, Tradehill, in 2012.

• Erik Anderson, Chairman, WC3 web payments group. Lead/Senior Software Engineer for much of Bloomberg’s Charting, Technical Analysis, Trading Strategies, Data Science, Interactive Data Visualization, Backtesting and Technical Analysis Screening, Core Graphics Infrastructure, math/Quants Developer, Financial Services

• Attorney Jeffrey Alberts, Partner in Pryor Cashman’s Litigation Group. Head of the firm’s White Collar Defense and Investigations Practice. Jeffrey’s practice focuses on government investigations and prosecutions and related regulatory proceedings, asset forfeiture and money laundering litigation, victims’ rights representation, and complex civil litigation. Jeffrey is an experienced trial lawyer who has served as lead counsel in numerous trials, including civil and criminal federal jury trials, state jury trials, and state and federal bench trials. Jeffrey has represented clients in disputes involving virtual currency. He also has been quoted by the media concerning criminal prosecutions of virtual currency service providers and government seizures of bitcoins. Immediately prior to joining the firm in 2013, Jeffrey spent six years as an Assistant United States Attorney in the Criminal Division of the U.S. Attorney’s Office for the Southern District of New York, where he investigated and prosecuted a wide variety of white collar criminal offenses, including money laundering, securities fraud, bank fraud, mail and wire fraud, and bankruptcy fraud.

• Adam Krellenstein, Co-founder Counterparty. Lead developer of counterpartyd; chief architect of the Counterparty Protocol. Counterparty is a free and open platform that puts powerful financial tools in the hands of everyone with an Internet connection. By harnessing the power of the Bitcoin network, Counterparty creates a robust and secure marketplace directly on the Bitcoin blockchain, extending Bitcoin’s functionality from a peer-to-peer payment network into a full fledged peer-to-peer financial platform.

  • Patrick Deegan CTO, ID3 Chief Architect. ID3 is developing a new social ecosystem of trusted, self-healing digital institutions. This endeavor seeks to address the severe structural limitations of existing institutions by empowering individuals to assert greater control over their data, online identities and authentication.

Panel: Hear Me, Touch Me, See Me, Feel Me: Moving Natural User Interface (NUI) to the Mainstream

This panel discussion will explore the world of NUI and what it will take to move today’s emerging NUI technologies (voice recognition, Kinect, haptics, facial recognition, etc.) into widespread adoption and make them accessible to all.

  • Deb Benkler, Moderator. Co-founder of NUI Central – NY, the largest NUI group on earth and is known as NYC’s leading NUI evangelist. She is a practitioner of lean and logical UX focusing on best practices in the broader context of CX (customer experience). In 2012, she won a User Experience Award for her work on the Maryland Transit Administration Interactive Maintenance Kiosk, which incorporated facial recognition.
  • Ken Lonyai Co-founder of NUI Central and is known as the other NYC leading NUI evangelist. He’s a 15+ year veteran of user centered interactive project development including some of the industry’s most unique experiential systems. His skills span the on-line world and nearly every realm of human/computer interface used by brands and retailers – mobile, interactive kiosks, experiential displays, etc. He is a User Experience Award winner.
  • David Melville is a Research Staff Member at IBM. He has worked in the area of semi-conductor fabrication and nano-technology, exploring meta-materials and techniques for optimizing illumination and patterning masks for photo-lithography processors before making a jump to developing visualization and interactivity solutions for smart-grid projects. Most recently, he has been exploring what it means to interact with learning systems and working to establish a new era of computing experience.
  • Sean Montgomery is head of hardware at Ringly, the first fashion ring to manage your mobile device. He’s an engineer, professor, and new-media artist in New York City. While finishing his Ph.D. in neuroscience, Sean began to consider the fact that from the perspective of a neuron inside the human brain, both a cold winter day and the embrace of a loved one feels like a sequence of electrical impulses. Sean co-founded SENSORSTAR Labs, an agile R&D consulting group in New York City.
  • Tanya Kraljic is a Principal Designer for Nuance’s mobility division. Her work focuses on the strategy and design of speech experiences in mobile, wearable, in-home, and other emerging technologies. Prior to joining Nuance in 2010, Tanya earned a PhD in cognitive psychology, with an emphasis on adaptation in interactive spoken dialog.

Tuesday 3/26/2013 ISOC-NY Event: “It’s the Web, Tim, but not as we know it”

island-colorOn Tuesday March 26 2013, at Thoughtworks NYC office, the Internet Society’s New York Chapter (ISOC-NY) will present “It’s the Web, Tim, but not as we know it” in which guest Michiel de Jong will explain unhosted, an open source solution for privacy and security in the cloud. The event is public, wheelchair accessible, and free.

The web started out as a platform for static documents. It then evolved into a platform for hosted software, that runs “in the cloud”, outside the user’s control. But html5 technology allows for a new option: “unhosted web apps”. Like documents, unhosted web apps are served as static content, which makes them cheap to publish. But like hosted software, they can have all the interactive functionality of a software application. In this new paradigm, the web is used to deliver the source code of the application, rather than delivering its user interface. Two years ago Michiel de Jong quit his day job as a scalability engineer, to work on free technology in exchange for donations. He now lives as a digital nomad and will be giving this talk remotely. This is a followup to the 2012 ISOC-NY/NYTECH event “New Techniques for Protecting Cloud Data and Security

What: “It’s the Web, Tim, but not as we know it
Where: Thoughtworks, 99 Madison Ave, 15th Floor (between West 29th and 30th Streets), New York NY 10016
When: Tuesday March 26 2013 6.30pm EDT
Webcast: will be recorded
Register: Either via our meetup page, or direct RSVP to David Solomonoff at president@isoc-ny.org
Continue reading

Internet Society tutorial on managing your identity online.

© iStockphoto / Internet Society

Every time we log onto the web we access (and add to) our own personal digital footprint that’s interconnected with plug-ins, links, and massive caches of personal data that follows us around.

Learn About Your Digital Identity

While none of us can control everything that’s known about us online, there are steps we can take to better understand our online identities and be empowered to share what we want, when we want.

The Internet Society developed three interactive tutorials to help educate and inform anyone who would like to find out more.

Each lasts about 5 minutes and will give a great foundation when it comes to making informed choices about our unique online identities.

Watch The Tutorials

Tutorial 1: Online Identity – An Overview

Watch Module 1

This tutorial will explain some of the key differences between your online and “real life” identity, recognize the nature of digital identities, and understand the difference between online identity and personal privacy. Watch the tutorial now.

Tutorial 2: Protecting Your Privacy

Moduel 3

This tutorial will explain the key concerns related to online identity and privacy, recognize what kind of user information is collected and why, identify the ways of controlling the privacy of your online identity. Watch the tutorial now..

Tutorial 3: Protecting Your Identity

This tutorial will explain the challenges in protecting online identities and help you recognize the ways you can protect your online identity. Watch the tutorial now.

Continue reading

FREE EVENT: Mitigating DDoS Attacks: Best Practices for an Evolving Threat Landscape – NYC 12/5

Mitigating DDoS Attacks 12/5/2012The Internet Society’s New York Chapter (ISOC-NY) and the New York Technology Council (NYTECH) will join the Public Interest Registry (PIR) in presenting a midday symposium “Mitigating DDoS Attacks: Best Practices for an Evolving Threat Landscape” in New York City on December 5 2012. Participating organizations include Afilias, Google, Neustar, M3AAWG, Symantec, EFF, and De Natris Consult. As a public service PIR are generously covering the $99 fee for all attendees – thus registration is free!   The event will be webcast live via the Internet Society Chapters Livestream Channel.

Distributed Denial of Service (DDoS) attacks are an all-too-common reality in today’s Internet landscape and are an escalating global problem.  Whether a DDoS attack is motivated by criminal intent, like cyber extortion, or is executed as an extreme form of free expression, the resulting service interruptions can have wide-ranging effects.  This program will address the motives behind and targets of DDoS attacks.  It will also explore the various ways attacks are carried out, as well as mitigation techniques and the risks of “unintended consequences.”  The goal is to foster a discussion and provide a platform for developing a framework of best practices to mitigate DDoS attacks.

WhatMitigating DDoS Attacks: Best Practices for an Evolving Threat Landscape
When: Wednesday December 5 2012 1000-1300 EST | 1500-1800 UTC
Where: AMA Executive Conference Center, 1601 Broadway, 8th Floor, New York, NY 10019
Program: http://www.pir.org/why/security/ddos
Webcast: http://www.livestream.com/internetsocietychapters
Registerhttp://www.regonline.com/Register/Checkin.aspx?EventId=1108367 ***
Twitter: #DDoS

*** Registration is not required for the webcast, just for in person attendance. Space is limited, please do not register unless you truly intend to come. ***
Continue reading

ISOC-NY Event – Jan 5: New Techniques for Protecting Cloud Data and Security

ISOC-NY & NY Tech. CouncilThe New York Technology Council and Internet Society New York Chapter (ISOC-NY) on Jan 5 2012 will present a joint event “New Techniques for Protecting Cloud Data and Security” – a review of new research, including techniques for data encryption and management, that promises to make the cloud a safer place.

The event is free. Please be sure to register at the link below.

What: New Techniques for Protecting Cloud Data and Security
When: Thursday January 5, 2012, 6pm-8pm
Where: Parsons Kellen Auditorium, 66 Fifth Avenue, NYC
Who: Free for ISOC-NY & NYTECH members. Free for non-members.
Register: https://www.nytech.org/new-cloud-encryption-techniques
Webcast: Will be taped for later viewing
Twitter: #cloud, #security, @ISOCNY, @nytechcouncil
Facebook: https://www.facebook.com/events/235852696483623/
Continue reading

NEW TECHNIQUE DEVELOPED TO IDENTIFY CHEATING IN ONLINE GAMES


NDSS 2010
WASHINGTON, D.C., USA and GENEVA, SWITZERLAND–2 February 2010–In a paper scheduled to be presented at the upcoming 17th Annual Network and Distributed System Security Symposium (NDSS 2010), Darrell Bethea, Robert Cochran, and Michael Reiter of the University of North Carolina, Chapel Hill describe a technique they have developed to identify cheating in the rapidly growing, multi-billion dollar industry of online gaming which includes titles such as World of Warcraft. The full paper will be published in the NDSS Proceedings.

Cheating through the use of non-sanctioned client software compromises the gaming experience for players and undermines the revenue of game developers and operators. The approach outlined in the paper to be presented at NDSS 2010 could help ensure the integrity of the online gaming experience by providing an automated, alternative approach to current, manually programmed methods of identifying game cheats. The described approach is server-based and does not increase the required bandwidth, often a critical expense for game operators.
Continue reading

Video of ICANN gTLD Implementation Consultation NYC

icann logoMembers of ISOC-NY attended ICANN’s gTLD Implementation Consultation session at the Millennium Hotel in NYC last Monday July 13.

ICANN’s Implementation Recommendation Team presented their report on how disputes over trademarks in the new domains be handled. There were also presentations on new developments in DNS security, and scaling the root server system. Attendee’s comments and questions, both oral and written, were solicited.

Some video is after the jump. More will be added. Also find links to related articles etc below.
Continue reading

Are Your Children Safe from Internet Dangers? – 3/26 – PS.199

state_of_ny_attorney_generalOn Thursday, March 26 Attorney General Andrew M. Cuomo and Council Member Gale A. Brewer Present: Are Your Children Safe from Internet Dangers? Learn How to Protect Your Kids from Sexual Predators and CyberCrimes, presented by: Investigator Ken Morgan

This presentation – Your Child’s D.I.G.I.T.A.L Life – will help you:
* Understand and supervise your children’s online life.
* Protect your children from online dangers – cyberbullying, identity theft, pornography and sexual predators.
* Prevent your children from becoming victims in real life.

WHEN: Thursday, March 26 at 7:30 PM
WHERE: Public School 199, 270 West 70th Street, New York, NY 10023.
FREE. ALL WELCOME.
Continue reading

FTC issues report on phishing

FTCThe Federal Trade Commission today released a staff report on a Roundtable Discussion on Phishing Education that it hosted in April. Approximately 60 experts from business, government, the technology sector, the consumer advocacy community, and academia met at the FTC to discuss strategies for outreach to consumers about avoiding phishing.

“Participants indicated that the best anti-phishing messages are behavioral rather than technical,” the report states. Evaluating whom to trust on the Internet can help prevent users from becoming victims.

Continue reading

ICANN accepting comments on PIR’s implementation of DNSSEC for .ORG

PIR logoThe Internet Corporation for Assigned Names and Numbers (ICANN) is opening a comment period on the Public Interest Registry’s (PIR) proposed implementation of DNS Security Extensions (DNSSEC) in .ORG. The Public Interest Registry (PIR) is a not-for-profit corporation created by the Internet Society (ISOC) and is a major source of funding.The Internet Society of New York is a Chapter of ISOC.

DNSSEC digitally signs DNS records but doesn’t encrypt DNS traffic. DNS responses are validated as legitimate and not hacked or tampered with. This ensures users don’t get sent to phishing sites when requesting a legitimate website. DNS security has increasingly become a concern, with DNS being prone to this type of attack, as well as being vulnerable to distributed denial-of-service (DDOS) attacks such as the one that temporarily crippled two of the Internet’s 13 DNS root servers last year. Continue reading

Microsoft launches ‘End to End Trust’ effort

MicrosoftIn an opening keynote address at the RSA conference in San Francisco today, Craig Mundie, chief research and strategy officer at Microsoft, called for broad discussions about the safety of the Internet in an initiative called “End to End Trust“.
Core to the concept is something called “a trusted stack,” where security is housed or rooted in the hardware, but each piece — the hardware, software, the data and even the people involved — can be authenticated if necessary.

Continue reading

Building a Safer Web: Web Tripwires and A New Browser Architecture (webcast)

Charlie ReisAs part of the Stanford EE Computer Systems Colloquium Charlie Reis of the University of Washington will today talk about the increasing practice of intermediaries messing with web content between server & client, and ways to proscribe such. He will also talk about browser security, focusing on the deficiencies of today’s web as an application platform.

The talk, which takes place from 4:15-5:30 PST will be webcast live and thereafter be available on demand. Continue reading