All content in this area was uploaded by Jonathan Zittrain on Dec 16, 2013
Content may be subject to copyright.
A preview of the PDF is not available
... In fact, much of the environment's resilience can be credited to loose affiliations of unchartered and even unpaid experts working together to forestall attacks or to minimize the potential for damage from them (Zittrain 2009). Thinking through ways to reinforce these natural defenses may be better over the long run than attempting to literally send in digital Marines (Zittrain 2010). ...
The architecture and offerings of the Internet developed without much steering by governments, much less operations by militaries. That made talk of “cyberwar” exaggerated, except in very limited instances. Today that is no longer true: States and their militaries see the value not only of controlling networks for surveillance or to deny access to adversaries, but also of subtle propaganda campaigns launched through a small number of wildly popular worldwide platforms such as Facebook and Twitter. This form of hybrid conflict – launched by states without state insignia, on privately built and publicly used services – offers a genuine challenge to those who steward the network and the private companies whose platforms are targeted. While interventions by one state may be tempered by defense by another state, there remain novel problems to solve when what users see and learn online is framed as organic and user-generated but in fact it is not.
We developed a mathematical model of a cows-to-consumers supply chain associated with a single milk-processing facility that is the victim of a deliberate release of botulinum toxin. Because centralized storage and processing lead to substantial dilution of the toxin, a minimum amount of toxin is required for the release to do damage. Irreducible uncertainties regarding the dose–response curve prevent us from quantifying the minimum effective release. However, if terrorists can obtain enough toxin, and this may well be possible, then rapid distribution and consumption result in several hundred thousand poisoned individuals if detection from early symptomatics is not timely. Timely and specific in-process testing has the potential to eliminate the threat of this scenario at a cost of <1 cent per gallon and should be pursued aggressively. Investigation of improving the toxin inactivation rate of heat pasteurization without sacrificing taste or nutrition is warranted.
• bioterrorism
• mathematical modeling
A Library as Big as the World, BUSINESSWEEK
Feb 2002
See Heather Green
See Heather Green, A Library as Big as the World, BUSINESSWEEK, Feb. 28, 2002,
http://www.businessweek.com/technology/content/feb2002/tc20020228_1080.htm.
Welcome-to-Google-the-new-capital-of-Kansas) (describing Topeka's effort to entice Google to select Topeka as the test market for its ultra-high-speed broadband by renaming the city " Google " for a month). 5. For a general overview of the development and governance of the Internet
Jan 2009
E G See
See, e.g., Posting of Matthew Shaer to Horizons, http://www.csmonitor.com/
Innovation/Horizons/2010/0302/Welcome-to-Google-the-new-capital-of-Kansas (Mar. 2,
2010) (describing Topeka's effort to entice Google to select Topeka as the test market for its
ultra-high-speed broadband by renaming the city " Google " for a month).
5. For a general overview of the development and governance of the Internet, see
DAVID G. POST, IN SEARCH OF JEFFERSON'S MOOSE: NOTES ON THE STATE OF CYBERSPACE
(2009).
[German Interior Minister Otto Schily] suggested that the German government itself might engage in denial-of-service attacks—in effect, hacking—to shut down some sites based in the United States
Jan 1998
553
Steve Kettmann
Nebraska Neo-Nazi Irks German Pol
Wired
Steve Kettmann, Nebraska Neo-Nazi Irks German Pol, WIRED, Jan. 10, 2002,
http://www.wired.com/politics/law/news/2002/01/49566 ( " [German Interior Minister Otto
Schily] suggested that the German government itself might engage in denial-of-service
attacks—in effect, hacking—to shut down some sites based in the United States. " ).
27. See generally Joel R. Reidenberg, Lex Informatica: The Formulation of Information
Policy Rules Through Technology, 76 TEX. L. REV. 553 (1998) (discussing rules created by
nongovernmental actors for digital networks).
Its icon is a tortoise, both because the tortoise lives so long and because it is so boring that no one notices it. LOCKSS, About Us
May 2010
Home Page
LOCKSS, Home Page, http://lockss.stanford.edu/lockss/Home (last visited Apr. 7,
2010). Its icon is a tortoise, both because the tortoise lives so long and because it is so
boring that no one notices it. LOCKSS, About Us, http://lockss.stanford.edu/lockss/
About_LOCKSS (last visited Apr. 7, 2010).
Jan 2009
David G Internet
I N Post
Search
Jefferson's Moose
For a general overview of the development and governance of the Internet, see
DAVID G. POST, IN SEARCH OF JEFFERSON'S MOOSE: NOTES ON THE STATE OF CYBERSPACE
(2009).
Its icon is a tortoise, both because the tortoise lives so long and because it is so boring that no one notices it
Apr 2010
Home Lockss
Page
LOCKSS, Home Page, http://lockss.stanford.edu/lockss/Home (last visited Apr. 7,
2010). Its icon is a tortoise, both because the tortoise lives so long and because it is so
boring that no one notices it. LOCKSS, About Us, http://lockss.stanford.edu/lockss/
About_LOCKSS (last visited Apr. 7, 2010).
See supra note 17 and accompanying text
Apr 2010
See supra note 17 and accompanying text.
30. Internet Archive, http://www.archive.org/ (last visited Apr. 7, 2010).