Keren Elazari Hackers: The Internet s Immune System



Similar documents
Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Peter Saul: Let's talk about dying

How accurate is it to say that the Black Power movements of the 1960s achieved nothing for Black Americans?

Did the Punishment Fit the Crime?

Viruses, Worms, and Trojan Horses

GET THINKING. Lesson: Get Thinking Museums. Teacher s notes. Procedure

Catch Me If You Can is a movie based on a true story about a man named

CyberbullyNOT Student Guide to Cyberbullying

Boston University Security Awareness. What you need to know to keep information safe and secure

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

English as a Second Language Podcast ESL Podcast 292 Business Insurance

Five Roles of Political Parties

Learning English podcasts from the Hellenic American Union. Level: Lower Intermediate Lesson: 2 Title: The History of Beer

Computer and Network Security

Freedom to speak up: whistleblowing policy for the NHS Draft for consultation

ONLINE SAFETY TEACHER S GUIDE:

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Why Your Business Needs a Website: Ten Reasons. Contact Us: Info@intensiveonlinemarketers.com

Understand What s Going On

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Intro to the Art of Computer Science

Protect Your Privacy Online

Quick Preview PROPERTY DAMAGE

Verbal boxing by Matt Bryer

Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise

Tips for Avoiding Bad Financial Advice

Rebellion Against Police Violence. Towards Community Defense, Dual Power and Revolution

Keep your English up to date 4. Teacher s pack Lesson plan and student worksheets with answers. Facebook

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Phrasal Verbs and collocations

Conflict Resolution / Behavior Management Notes - New

BBC Learning English Talk about English Business Language To Go Part 1 - Interviews

A Guide to Social Media Marketing for Contractors

EASY $65 PAYDAY FREE REPORT

Cybercrime: risks, penalties and prevention

THE LITTLE BIG BOOK OF BADNESS

We are the regulator: Our job is to check whether hospitals, care homes and care services are meeting essential standards.

How To Get A Law Passed In The United States

Why do we suffer? Because it is part of God s Plan. Suffering

Moscow subway cars to have CCTV

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Battles Leading up to the Alamo: Gonzales and Goliad. 1. Students will learn about the importance of two battles in propelling the Texas Revolution.

Topic 1 Lesson 1: Importance of network security

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Writing Thesis Defense Papers

Data Mining. Craig Chomsky, Marek Dvorak

What s the Cost of Spending and Saving?

INTEGRATED SKILLS TEACHER S NOTES

BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy

TeachingEnglish Lesson plans. Conversation Lesson News. Topic: News

Assessing Speaking Performance Level B2

Grand Canyon Council - Social Media Policy

Learning English with CBC Radio Living in Alberta. Social Media: How Kids Use the Internet

A Time to Tell Troop Meeting Guide

Internet basics 2.3 Protecting your computer

Character Traits. Teacher Talk

TeachingEnglish Lesson plans

BBC Learning English 6 Minute English Citizen Journalism

Games, gadgets, and other goods discount coupon: An ethics case

Conflict Management Styles Center for Student Leadership Resources

EECS 588: Computer and Network Security. Introduction

As the US debates privacy a Berlin start up surges with...

You could say that. You could be right. You may be right. You might be right.

The weekly passage discussed issues related to dog ownership. Here is some information that might be helpful to students less familiar the topic.

Top 2 grammar techniques, and ways to improve

the Speed of Thought

Guidance Notes for Safeguarding Children and Vulnerable Adults

SMALL BUSINESS PRESENTATION

Board Portal Security: How to keep one step ahead in an ever-evolving game

Evaluating the Perceptions of People towards Online Security

How Cell Phones Have Changed Our Lives

Data Protection Breach Reporting Procedure

Computer Crime. University of Victoria Department of Computer Science. SENG 401: Social and Professional Issues Computer Crime: Slide 1

Grade 5: Module 3A: Unit 2: Lesson 13 Developing an Opinion Based on the Textual Evidence:

Next Generation Tech-Talk. Cloud Based Business Collaboration with Cisco Spark

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/

The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Basic lesson time includes activity only. Introductory and Wrap-Up suggestions can be used

Transcription:

Keren Elazari Hackers: The Internet s Immune System For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think it's time we take a good look at how we choose to portray them, because if we keep expecting them to be the bad guys, how can they be the heroes too? The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing vulnerabilities, they push the Internet to become stronger and healthier, wielding their power to create a better world. Level Advanced Goals Cleft sentences & adding emphasis Themes Hacking & Hacktivism Technology Intro What do you know about hacking, or hacker culture? Are people who hack computer systems criminals? What about organizations like WikiLeaks that use hacking to promote the freedom of information? Are they good or bad? Have you (or has someone you know) ever had personal or financial information stolen over the Internet or through some other hack? What happened? How was it resolved? Comprehension 1. What does Elazari mean by the term full disclosure in regard to hacker culture and I.T. security? 2. How did a hacker named Khalil use full disclosure to improve Facebook s security practices? What happened afterwards? 3. Why does Elazari think it is valuable for large, conservative organisations to embrace hacker culture? a. What, according to her, would be the consequence of not doing so? 4. What is Elazari s opinion on hacktivist groups like Anonymous? Does she support or condemn them? 5. What did the group Telecomix do in Egypt? How did they do it? 6. What happened when the Syrian Electronic Army posted a fake tweet from the Associated Press? 7. Who is General Keith Alexander? What is the relationship between mass surveillance organizations like the NSA and the hacking community, according to Elazari?

Vocabulary 1. Fraud A. To make something known, to tell people about something. 2. Malware B. Internet Service Provider. 3. Flaw C. To start something, often a social movement, protest or revolution. 4. Vulnerability D. Criminal deception for financial profit. 5. To disclose E. A way of fixing a problem in a computer program or system, sometimes temporarily. 6. I.S.P. F. A weakness in a system that makes it easy to attack. 7. To spark G. Software intended to damage or disable computer systems. 8. Workaround H. A problem or fault in something. Useful idioms: To kill the switch: To turn something off or disable a system in an emergency. This took place in Egypt in January 2011, and as President Hosni Mubarak attempted a desperate move to quash the rising revolution on the streets of Cairo, he sent his personal troops down to Egypt's Internet service providers and had them physically kill the switch on the country's connection to the world overnight. Big guns: Powerful people or things. It was high season for low tech, which the government couldn't block, but when the Net went completely down, Telecomix brought in the big guns. They found European service providers that still had 20-year-old analog dial-up access infrastructure. They opened up 300 of those lines for Egyptians to use, serving slow but sweet Internet connection for Egyptians. Discussion: Complete the questions with the vocabulary above and then discuss them with your group/partner. 1. What do you think motivates some people to create harmful computer programs like and viruses? 2. Do you think that digital activism, or hacktivism, could a serious revolution or political movement, or it just contributes to existing ones? 3. Should hackers be given more freedom? Would this increase the risk of people committing or identity theft?

4. Do you know of any famous or in computer systems or other technology? How were the problems solved? 5. What kind of responsibilities do and other large digital communications companies have to their customers in regard to security? Is it actually the customer s responsibility? 6. Do you think that it is responsible for hackers to security flaws and vulnerabilities to the general public, as Kyle Lovett did? Should they not do so until there is a for people to use? Grammar Cleft sentences for emphasis We can add certain words or phrases to the beginning of a sentence in order to focus attention or to emphasize something. This is sometimes called a cleft sentence. Examples Pay attention to the italicized words or phrases and try to imitate the sentence stress. What kind of intonation or rhythm do you think is appropriate for each example? Think about the way you might use these structures to convince or persuade somebody. With what or all We need better security. I don t like that people have such freedom online. I just want to feel safe connected to the Internet. I only bought something on the Internet. What we need is better security. What I don t like is that people have such freedom online. All I want is to feel safe connected to the internet. All I did was buy something on the Internet. What happens is or what happened was They connect to your computer and can access your documents. Telecomix set up internet connections for the public in Egypt. What happens is (that) they connect to your computer and can access your documents. What happened was (that) Telecomix set up internet connections for the public in Egypt.

Beginning with it Telecomix used the internet to support people in Egypt and Syria. There was a protest last Friday. The hackers were prosecuted for accessing the system. It was Telecomix that used the internet to support people in Egypt and Syria. It was last Friday when there was a protest. It was accessing the system that the hackers were prosecuted for. Other examples The NSA spy on us for our own safety. I spoke to the security consultant. The reason the NSA spy on us is that it s for our own safety. The person (who/that) I spoke to was the security consultant. Practice Choose the correct word to fill the gaps in these sentences using the examples above as a guide. For example: What I really don t like about hackers is that they don t care about people s rights. 1. hackers want is for people to have freedom online. 2. we need is better legislation that protects hackers rights. 3. The I don t believe what people like Elazari say is that so many people hack computer systems for their own personal gain to steal money or personal information. 4. was groups like Anonymous that gave hackers a bad name. 5. All did was try to help people Rewrite the following sentences using some of the structures in the grammar section above in order to add emphasis. There may be multiple correct answers. 1. There was a press conference last month. 2. The government just want to control data relevant to national security. 3. I don t like the idea that people can just access private computer systems. 4. The NSA abused their power by spying on the general population. 5. I spoke to an expert about IT security last week.

Writing & Speaking Problems! List: 1. Students are given a set of problems (below) related to technology, hacking, hacktivism and hacker culture. 2. With their partner or group, they must come up with what they think is the perfect solution to each problem. Students are encouraged to use the grammar above to add emphasis to their writing and speaking. 3. Groups/partners then return to the class and discuss everybody s solutions and try to decide which is the best. NB: Students may require a primer on organizations and people like WikiLeaks, Edward Snowden and/or the N.S.A. if they are not familiar with the current controversy. 1. It is extremely dangerous for people like Edward Snowden to disclose information. They do so at great risk to their personal safety. 2. Organizations like WikiLeaks are important, but they endanger people s lives (for example, by revealing military information). 3. Technologies like Google Glass will give hackers the opportunity to invade our privacy like never before. Not just our personal data will be at risk, but also our homes, jobs and lives. 4. Groups like Anonymous and Telecomix have no political legitimacy and so they will never be taken seriously by the general public. 5. It is important for companies and governments to have freedom as well. Hacker groups limit or destroy that freedom when they attack corporate or government websites. Debate What we need are tougher laws on hacking and more severe punishments. Even though some hackers have good intentions, most of them are criminals and need to be stopped. Those who want to help should go through the correct process of joining I.T. security firms, not just breaking into whatever systems they want. Today we need hackers more than ever Huge, government surveillance organizations like the NSA are openly invading our privacy, and hacktivist groups are the people best able to stop them. More people should be encouraged to join these movements. Hacktivist groups like anonymous are a joke. They are just groups of teenagers sitting behind their keyboards not really doing anything. If these groups want to be anything more than irritating, then they need to actually start contributing to people s lives in some way.

Review Game Taboo card game available in activities download. Students must guess the word on the card, but their partner can only give clues without using the other key words listed below.