Transcripts For CSPAN3 American History TV 20240622

Card image cap



special favorite of the law comment in the validation of the public accommodations provision reaches less far than has been conventionally imagined. bradley is preserving the availability of the statement concept. he is preserving it in a context where the republican administrations are making headway and are using voting rights theory that he has already provided. he is saying, in this context where you are already using 16th amendment exemption in federal amendment law, i'm keeping the state neglect law available. he is the one that first made it available in 1874. it was the klan lawyers that attacked his theory before the court in 1876. this was his first chance since then to be articulated -- and re articulate it he does. it's vital to see that. newspapers see this. newspaper coverage sees this concept of the state neglect in civil rights cases. again, i give you an excerpt from the chicago tribune. lots of coverage of the supreme court cases in the reconstruction era. the tribune -- the black citizen deserves the same civil rights, they are calling about a political rights. the black citizen enjoys everywhere the same clinical and civil rights under the law that a white citizen enjoys. any person who interferes with these rights is subject to the same penalties as if he had interfered with the right of the white citizens. if there are state or local laws which decree otherwise or if there are state or local officers who refuse to extend to black citizens the protection they deserve, it is the function of the u.s. court to dispense rights. one year later we get the jumper of decision. -- we get the yarborough decision. i want to conclude by asking what follows from a racism when we make, or if we make assumptions about what follows necessarily from bradley's racism in civil rights cases. if we make 20th century a something that people who articulate racist views when it comes to public accommodation right are not going to support rights for black physical safety or black contracted property or black voting. if we make that assumption that contemporary assumption, it is an anachronistic assumption. we are going to miss the possibilities for protecting lack right -- black rights that were present in these state action cases. we do see the death of the reconstruction. the 1884 election was won by a democrat. grover cleveland wins. he stopped voting right enforcement. he stops it dead in its tracks. on last gasp of reconstruction we deal with the large election belt. republicans win in the election again in 1888, one more push for any elections bill. this fails by one vote. at this point, the republican party is turning over to other things. it is at this point that the republican party does, in fact, abandon blacks in the south. what happens in the wake of this is that the supreme court gives us the legal edifice for jim crow. it extends through the first decade of the 20th century. in some little-known cases, u.s. versus hodges in 1906, a critical case that dismantles the civil rights act of 1866. this is the one that bradley just spoke about providing this very robust theory. it is at this time that the 16th amendment exception is gone. reconstruction dies. it dies for many many reason. it dies, first and foremost, because of massive klan violence. there is massive violence and intimidation. there's also the economic panic of 1873, the great recession of the 1870's, there is grossly inadequate bureaucratic machinery. not nearly enough money. also obviously declining white commitment to black rights in the north. reconstruction dies for a host of reasons. but, a closed doctrine of state actor -- state action is not among those reasons. thank you very much. [applause] >> the civil war airs here every saturday at six clark and 10:00 p.m. eastern time. to watch more of our civil war programming anytime, visit our website c-span.org/history. you are watching american history tv. all weekend, every weekend on c-span3. >> you are watching american history tv. all weekend, every weekend on a c-span3. to mark the 60th anniversary of the capitol hill newspaper roll call c-span is featuring the paper's reporters to talk about how roll call featured news events of the last 60 years. >> when roll call went to press for the june 6 edition in 1968, they didn't yet know what would be the fate of bobby kennedy. they knew that he had been shot and had been rushed to a hospital in los angeles. but they went to press not knowing exactly what the outcome would be. and so the roll call editorial staff at the top -- at the time and the founder went ahead with a front-page editorial in which they addressed the broader issues of the day regarding violence particularly as it came related to guns, but also more generally. it was a topic of concern for roll call throughout the 1960's. in those days, the newspaper ran a regular series of editorial features and had an editorial column in each week's edition. one of the topics of concern for a lot of people in washington, both on capitol hill and elsewhere, was the more general violence of the era. that included the rights that were going on in the city. -- the riots that were going on in the city. when rfk was shot, it became an obvious time to return to that topic. as it was happening, it turned out that the next edition of rollcall would not be for another week. they had a situation where they do not actually have an opportunity to report the news of the funeral itself or of, in fact, bobby kennedy's death in print. when roll call went to print a week after bobby kennedy had been assassinated, roll call was back to its coverage of the way it is covered washington since its inception. that meant there were two lead stories on the subject related to the death of rfk. one of which was the speculation about whom would be appointed to fill out the unexpired term of his senate seat in new york. that was a situation where the newspaper correctly speculated that the best candidate on paper was charles caddell a congressman from upstate. viewers will know that he was the father of the current commissioner of the national football league, roger goodell. he didn't serve very long in the senate, but with the republican governor's appointee to fill out the seat after there had been some speculation that the mayor of new york city might have been appointed. the other story that roll call explored goes back to the newspaper's traditional focus on the capitol hill immunity. -- capitol hill community. and campus rights for those on the health. there were new security concerns obviously following the assassination of someone who had been a u.s. senator, running for president, but at the time a u.s. senator. there was both action taken to introduce legislation designed to make it a federal crime or to ensure that it was a federal crime, when a number of congress or executive range official was assassinated. that was not something that would need to be handled at the state level, but the federal government could indeed step in. the other thing that was a matter of concern was how exactly to contact the folks in the capitol police in the event of a security threat on the hill. roll call was locust, as we have throughout our history -- was focused, as we have throughout our history, on police matters and how members of congress could get a hold of law enforcement personnel on the hill. >> considered underrated by many first lady historians, caroline harrison was an accomplished artist and took up china painting. she carried that interest to the white house, establishing its china collection. she was interested in women's issues and help raise funds for johns hopkins university on the condition that it admit women. she was the first president general of the daughters of the american revolution until she died in the white house tuberculosis. caroline harrison, this sunday night at 8 p.m. eastern on c-span's original series. "first ladies: influence an image. examining the public and private lives of those who served as first lady." from martha washington to michelle obama. sundays at 8:00 p.m. eastern on american history tv on c-span3. each week, american history tv's reel america brings you archival films that helps tell the story of the 20th century. >> i have today ordered to vietnam the upper division, and certain other forces which will bring our fighting strength from 75,000 to 125,000 men almost immediately. additional forces will be needed later, and will be sent as requested. this will make it necessary to increase our active fighting forces by raising the monthly drop quota from 17,000 over a period of time to 35,000 a month. and forced to step up our campaign for voluntary investments. -- voluntary enlistments. >> talk about a timetable in connection to vietnam. you have repeated today that the u.s. will not be defeated, will not grow tired. donald johnson, national commander of the american legion, went to vietnam in the spring and laid a call on you. he told white house reporters that he could imagine the war going on for 5, 76, or 7 years. have you thought about the possibility, sir? and do you think the american people ought to think about that possibility? >> yes i think the american people ought to understand there is no quick solution to the problem that we face there. i would not want to prophesies, predict whether it is a matter of months or years or decades. i do not know if we have any active timetable on how long it will take to win a victory in world war i. i don't think anyone really knew it would be 4 years or 6 years to meet the success in world war ii. i do think our cause is just, and i do think our purpose is and our objectives are beyond any question. i do believe that america will stand united behind the manner that are there. -- behind the men that are there. as long as i'm president i plan to see that our forces are strong enough to protect our national interests. and are deployed and political negotiations are constantly attempting to find some solution that would substitute words for bombs. and as i have said sometimes, if anyone questions our good faith and asks us to meet them to try and reason this matter out, they will find us at the appointed place at the appointed time any proper chair. 00-- in the proper chair. >> coming up next on american history tv, u.s. army cyber command historian lawrence kaplan talks about the history of computers and the emergence of hackers and other computer abuses. beginning with the use of government computers mr. kaplan discusses steve jobs, students at m.i.t. who established the term hacker, and the onset of viruses that began in the 1980's. this 40 minute event was hosted by the military cyber protection association. >> this presentation weekly traces a key milestone in the history of computers and computer abuse including a variety of internal external to define computer abuses and hackers, which help lead the way to u.s. army cyber command as you continue to evolve as an ongoing cyber threat. i will go with a braver -- with an overview of cyber history before i move on to hacking. any act the electronic numerical integrator and computer was the first electronic general-purpose computer. it was developed by the u.s. army from 1943-1946, initially to calculate artillery firing tables for the army's ballistic research laboratory. a quiver form 5000 operations per second, and at 18,000, it took up 1000 feet of floor space and weight 30 times. population of firing table for a gun--- calculation of a firing people for a gun, which took staff two months, could be completed by any act by a day. the proliferation of computers through commercial, scientific, and military purposes spread in the 1950's with a number of firms entering the computer field. between 1954-1959, for example computers increased 700 -- 675%. ibm controlled about 70% of the global computer market. by 1977, computer sales reached $41 billion in continued to climb. even so, the high cost of computers remains the limiting factor on sales. in 1975, micro instrumentation telemetry systems introduced a mail order build it yourself 256 byte computer. it began the personal computer revolution. thousands of people bought the kit for $400, making it the first commercially successful home computer. it's a success led to the first computer store being opened that year. and the start of a number of computer clubs asian wife. -- computer clubs nationwide. they minute deleted data by flipping toggle switches. the following year, 1976, steve wozniak and steve jobs, both engineers in the homebrew computer club in silicon valley, california, built a homemade computer called the apple 1 that was more sophisticated than the altair could be hooked up to a color television and store its data on a external cassette tape . apple letter replaced those tapes with lobby desks. they sold 200 total units at 6'6" six dollars and-- to make the apple 2 as useful as possible the company encourage programmers to create applications for it. for example, the spreadsheet called busycalc made the apple practical tool for all kinds of people and businesses, not just hobbyists. the apple 2 soon became a leader in the growing personal computer market. by 1978, the proliferation of personal computers was turning america into a computerized society. in february, 1978, 2 chicago pc users reportedly established the nation's first electronic bulletin board, which allowed multiple computer users to share and exchange information. as the conceptual preserve -- precursor to an internet webpage, bulletin boards spread widely and were operated by disparate groups and individuals. anyone with a pc could set up an electronic bulletin board. in 1959, the department of defense -- 1969 arpa demonstrated the practicality of interconnected computer networks that initially allowed university researchers to communicate with each other. it later expanded to include government, industry, and major universities in the u.s. and europe. the number of networks gradually grew in the 1970's, increased significant as the personal computer revolution spread. for example, there were 61 arpanet computers in 1955, 2000 by the beginning of 1986, nearly 30,000 by the end of 1987, when arpanet became known as the internet and over 160,000 at the end of 1989. in 1989, timothy berners-lee, an english computer scientist working at the european council for nuclear research, successfully implanted the use of hypertext to facilitate sharing and updating information on the internet, earning him the distention of inventing the world wide web. the european council for nuclear research built the first website, which went online august 6, 1991. when commercial computers were first developed in the 1950's, people assumed it to be a benign environment. however, computer crime involved hand-in-hand with computer development. beginning in the early 1950's, unscrupulous insiders successfully began using computers for fraud and embezzlement. there are not many recorded cases of computer abuse from the 1950's and early 1960's. since companies. embarrassment and lost public confidence rarely reported computer abuses. a strain -- a trend that still exists. at a new york brokerage firm, someone siphoned off $250,000 from the company between 1951-1959. by the time it was uncovered, he had become a vice president. later, the spread of personal computers in the late 1970's coupled with the developed and spread of the internet fostered the spread of unscrupulous external abusers hackers who thought to gain unauthorized access to computer systems. the defense department became concerned with computer security in 1957 as resource sharing to peter systems spread to dod. that your, the defense science board recommended computer safeguards that would protect classified information and multi-access resource sharing computer systems. the task force report, published in february 1970, showed how corrupt insiders and despised could actively -- insiders and spies could actively steal or copy information. they succeeded in every attempt. dod soon established uniform policy for protecting classified information on's computer systems. one of the first computer abuse cases publicized in the u.s. army occurred in 1971 when of the army uncovered a sophisticated scam involving one of its computers south korea. a group of u.s. army personnel and south korean blackmailers, excuse me, black marketeers, use the computer to siphon off as much as achingly dollars of u.s. military supplies per year. as they sold the stolen items sometimes back to the u.s. army, they manipulated computer files to cover traces of the fraud. amid rising concerns of computer abuse, jerry and snyder attained national attention of the man's most famous computer criminal in 1972. the 21-year-old university of california computer engineering student was arrested for stealing about one quarter of a million dollars apartment from the telegraph company in california. by remotely accessing the companies computer with a touch phone and reselling the equipment to his los angeles telephone and telegraph company. a disgruntled employee of schneider's tournament, which led to his arrest for grand theft. -- turned him in. he only served 40 days of a three-month term in the county jail. hubert a computer security consulting firm, explaining to a reporter "it it took a lot of ingenuity to crack the pacific computer, and many large corporations are getting into computer systems. it opens up a whole new field to criminals.' in 1976, a government accountability office report identified 59 computer crimes over the previous two years -- 69 computer crimes that cost the government over $2 trillion in largest. -- in losses. -- $2 million. in december 1976, the washington post reported that 200,000 computers in the u.s., only 200 were rated secure by computer experts. the post added however "some computer experts aren't sure about machines at these agencies." that same month, the social security administration penetrated its own system and peculiar safeguards after top officials in the administration repeatedly assured congress and the privacy section commission that such a penetration was impossible. there was a precipitous rise in unauthorized access to federal computers by the late 1970's. for example, in 1978, the department of agriculture had more than 5400 on authorized users, mice its computer system. -- 6400 off on authorized users. -- unauthorized users. the history of computer users involved people like jerry schneider who used skills to smell -- skills to steal money. by that time, a new hacker emerged that engaged in malicious hacking/one of the first publicized cases is in january 1979, involved a 15-year-old los angeles high school student who disrupted the university of california computer system using a secondhand teletype terminal. he was arrested and charged with felony vandalism for disrupting the university's computer programs, among other charges. two years later december 1980, to chicago high school students were arrested after using a home computer to access and a shutdown depaul university's peter system. a los angeles times article warned "if if a high school printer can shut down a university system, think about what hackers can do." and yet you did working on computer crimes in 1980 noted that only one in 100 computer crimes were reported and that the probability of a computer criminal going to jail was 1 in 22,000. the term hacker reportedly originated in m.i.t. in the 1960's where it meant someone that knew anything there was to know about computers. by the early 1980's, the term described anyone that could invade else's computer. in 1983, this new breed of hackers began receiving widespread attention. first, a group of thrillseeking no walkie teenagers -- milwaukee teenagers known as the 404 broke into computer systems nationwide, including an unclassified government computer at los alamos national laboratory a nuclear weapons facility in new mexico. this was followed by the fictional film "war games" released in the summer of 1983 that popularized the high school hacker who broke into the north american air defense command computer system by telephone to run a nuclear or similar believing it to be a computer game and nearly started world war iii. the defense department first became concerned about possible soviet hacking into its systems after the milwaukee hacker group breached the lost almost computer system -- los alamos computer system and also breached arpanet trying to breach intelligence information as well as breaking into the gone and cia computers. by the end of 1983, he became very clear that personal computers introduced opportunities for unprecedented widespread hacker abuse/ in september, the new york times reported" the number of young people roaming without all the relation -- without authorization in some of the most sophisticated computer systems runs into the possible thousands according to computer experts.further, the number is going hand-in-hand with the growth of personal computers. these electronic expirations are no longer behind experts. the existence of electronic bulletin boards allows the nationwide exchange of information and have opened up pathways to amass universe of curious young people who often have a rudimentary knowledge of the field." in october 1983, the fbi launched a nationwide crackdown on the homes of 19 computer hackers in investigation of unauthorized intrusion of large commercial and defense department computers. no arrests were made, since there were no federal laws at the time against unauthorized intrusion into computers. the computer fraud and abuse act of 1986 became the first primary federal legislation aimed at curtailing computer crime. in november 1983, fred: university -- fred cohen developed the first computer virus in a controlled experience. within a few years, malicious hackers, mostly disgruntled employees at first began creating serious problems by spreading viruses to sabotage their company or organization's computer systems. in september 1988, donald a gina burleson was the first person to be convicted for sputtering a computer progress. -- for spreading a computer virus. he planted a computer virus in his former employers system 2 days after he was fired, which wiped out 168,000 records. november 1988, robert d morris junior a cornell science graduate student only the first large-scale malware attack on computer systems and raised public awareness about the vulnerability of computers and the internet to such attacks. it was a malevolent computer worm self reporting program that did not destroy data, but temporarily disabled about 10% of the internet, or about 6000 computers at the time. morris'goal was the -- was b egign. an error in his program caused it to replicate have control. the dod developed a 24 hour response team at carnegie mellon in november 1988 in the wake of the morris worm incident. the purpose is to be a central repository of information about network vulnerabilities and issue warnings over the internet about software that hackers could exploit. the vulnerability of defense department computers to foreign intrusion was highlighted during this time when a west german computer science student with a legend ties to the soviet kgb breached 30 dod unclassified computer networks out of 450 attempts from 1986-1988 searching for data on strategic defense initiative's, missile-defense programs, and other sensitive matters. july 1989, a report was issued on computer sold 30 that highlighted -- compete at security that highlighted security on a virus attack. the private sector and the dod experienced widespread vulnerability when a bulgarian virus called dark avenger infected many of dod's 400,000 personal computers. the u.s. army first developed an offensive cyber operation capability using viruses in 1990, when the u.s. army center for signals worker had been trying to develop malicious software concepts to use against an adversary. the challenge was how to get the virus into an adversary's command and control system. the first publicized foreign hacker threat to national security began emerging in 1989. in march 1989, three west german hackers were arrested after selling western military passwords and computer codes to a soviet kgb agent. about a year later in 1990, and australian hacker was arrested for breaking into the leavenworth lavatory in california, a nuclear research facility also shutting down a nasser computer network in norfolk, virginia. -- a nasa computer network. in 1991, a group of dutch teenagers who were later arrested, hacked into defense department computers and got access to sensitive information related to the persian gulf war operations. meanwhile, another group of dutch hackers contacted the iraqi embassy in paris and offered to disrupt the network handling just ask messages between the u.s. and saudi arabia for $1 million, but the iraqis turned them down. in 1994, the defense department examined the vulnerability of its networks to hackers. that year, hackers from the defense information systems agency, or disa made about 12,000 attempt to gain entry into various dod computers and were successful 80% of the time. in 96% of the time, their intrusions were undetected. that year, there were 255 gnome hacker attacks in dod networks. 00-- known hacker attacks. in may 1996, a gao report on defense department computer security warned that hackers posed a serious threat security in the wake of an estimated 250,000 computer attacks on dod computers in 1995. in which 65% of the time, the attacks were successful, and the number of attacks doubled each year. the report added "the potential for catastrophic image is great. organized for an nationals, or terrorist, could use warfare techniques to interrupt operations by harming command-and-control systems, the public switched network, and other systems or networks that event relies on. defense has taken action to address this growing problem but faces significant challenges in controlling unauthorized access to computer systems. currently defense is attending to react to successful attacks as it learns of them, but it has no uniform policy for assessing risk, protecting its system, responding to incidents, or assessing damage." january 1997, a defense science board pelling warning of an electronic pearl harbor recommended the dod seek legal authority to repel and pursuit offensive action to those who tried to hack into its compete or systems. since current laws do not allow counterattacks against computer hackers. in june, 1997, the dod conducted its first large-scale test to work with other government branches in responding to a cyber attack on the national information infrastructure. an exercise that involves teams from the national security agency equipped with off-the-shelf computers, demonstrating they could interrupt major military command and interrupt power and emergency phone service in several u.s. cities. the exercise revealed that dod and the government were unprepared to respond to such cyberattacks. in february 1998, the pentagon underwent the most organized systematic attack on its unclassified computer system to date. over the course of three and a half weeks, a group of american and is really teenage hackers -- and american and israeli teenage hackers broke into systems. debbie dispense secretary -- defense secretary ward bill clinton that it might be the start of a cyber where that cyber war perhaps by iraq. after the first week of attacks dod leaders to the unprecedented step to mobilize a special crisis cell on the joint staff under operation solar rssunrise to deal with the intrusion. in the wake of cyber vulnerabilities i exercise eligible receivers dod created-- dod created joint task force computer network defense under u.s. base command in december 1998 to serve as a focal point to defend dod computer networks. with added missions including offensive cyber operations in april 2001, the organization became the joint task force for computer network operations. october 2002, the disses management of us-based command the organization was realigned under u.s. strategic command. march 1999, during the nato air campaign over kosovo, the defense department launched limited cyberattacks against serbian computer networks. later over the summer, u.s. intelligence community reportedly mounted hypertext on foreign bank account of yugoslav president and other serbian leaders to bring their assets and alter their bank records. china outraged over the may 7 1999 bombing of chinese embassy in belgrade by nato resorted to a series of cyberattacks against the west the attack the department of energy interior, and the national park service, and took down the white house site for three days. in october 1999, dod conducted a second cyber exercise called venus star to test lessons learned from eligible receiver. nsa hackers attacked power systems beating several -- feeding several military systems. the test showed that some improvement had occurred, but coronation between agencies -- coordination between u.s. agencies were poor and vulnerable to a cyber attack. in 2001-2002, gary mckinnon, an unemployed scottish computer system administrator with ad service syndrome hacked into hundreds of computers on u.s. military bases across the country, including two in the pentagon. he also hacked nasa computers. he was indicted november 2002 at the biggest hacker of military computers ever detected. and i emphasized ever detected. but he was never extradited because the bridge to permit in 2012 he would probably try to kill himself if extradited. in july 2002, george w. bush signed national security directive 16 to develop guidelines for cyber warfare to determine when and how the u.s. would launch cyberattacks against adversary computer networks. 2003 dod operation titnan rain responded to a widespread series of cyberattacks sign -- cyberattacks from chinese ip addresses and other agencies. incursions have reportedly going on for the previous three years. february 206, the department of homeland security conducted the most largest cyber security exercise ever held. called cyber storm. which uncovered critical problems in the government's elite to handle a large-scale cyber attack on critical infrastructure. more than 100 public and private agencies and corporations in more than 50 locations in five countries conducted exercise that disrupted energy transportation in the structure and targeted federal, state and international government with the intent of disrupting government operations and undermining public confidence. in june 2007, unknown foreign hackers broke into defense secretary unclassified e-mail account. as part of a larger series of attacks to assess and exploit the defense department networks. september 2007 when iran's -- excuse me. their union -- there you ring in enrichment-- they collaborated on a project called olympic games that infected computer systems with a virus. it reprogrammed the centerpieces to fail. -- it reprogrammed the centrifuges to fail. it was the first computer virus to go after industrial systems. the spread to systems in indonesia and elsewhere subsequently led to its discovery in october 2010. in 2008, the defense department received a wake-up call to the vulnerability of its computer systems when a foreign intelligence agency used a portable flash drive to infect computers in u.s. central command. the malware spread undetected across classified and unclassified computer systems in the most significant breach ever of defense department compare systems. dod's operation buckshot yankee countered the attack, which marked the turning point in u.s. cyber defense strategy. new security procedures were in place according-- in june 2009, defense secretary gates ordered the creation of u.s. cyber command which assumed the auction of u.s. tax court's operation and became a sub unified command of the u.s. command. there was a was a requirement for the services to report cyber command elements by october 2010, when u.s. cyber command reached full operational capability. in january 2010, army specialist bradley manning a disgruntled intelligence analyst in iraq, thought to be discharged through a gender decipherment disorder, downloaded more than 450,000.net, including state department cables about their operations in iraq and afghanistan and offered it to new york post newspapers, who were not interested. he then provided the material to wikileaks, which allowed whistleblowers to sensitive information online. manning was subsequently arrested, demoted to private first class, and in august 2013 sentenced to eight 35 year prison term. the army established cyber command to support u.s. cyber command on october 1, 2010. in march 2011, foreign hackers breach the defense permit computer system and stole 24,000 files,' one of the largest breaches ever on the defense department computers. in june 2013, edward snowden, an nsa contractor who grew increase really concerned about u.s. surveillance programs relaeased tens of thousands nsa and doctorates. -- documents. he fled to russia where he received temporary asylum. in 2014, russian hackers reach the state department unclassified computer system which allowed them to infiltrate the white house on classified to peter systems. in october 2014, the white house state permit uncovered the breaches, which included access to sensitive e-mail. in may 2014, the u.s. indicted 5 chinese people liberation army officers for cyber economic espionage against 6 american commercial targets. the indictments marked the first ever charges against known state actors for cyber espionage. in 2014, unknown hackers believed to be chinese compromised the personal information of over 4million current and federal employees in the office of single management. the intrusion was discovered april 2015 after opm begin to operate its agreement. -- began to upgrade its equipment. in early 2015, russian hackers in an unrelated attack to the state to permit an white house breaches, infiltrated the defense department unclassified computer network. in february, director of national intelligence told a senate hearing that "russian cyber threat is more severe than we have previously assessed." in january 2015, islamic state caliphate or isis hackers temporarily cover might u.s. central command social media twitter accounts, putting out a stream of tweets such the one depicted here as well as personal contact information of u.s. service members with threatening messages. in april 2015, a gao report on cyber security and air traffic control noted there were significant security control weaknesses that threaten the faa 's ability to operation the nations airspace systems. that month, united airline's chris roberts, a security researcher flying to syracuse, new york, claimed that through tweaking to have hacked into the in-flight entertainment system to a consul under his seat. -- through tweeting. 11 to monitor traffic through the cut computer-- the founder and chief technology officer of wone world labs began his investigation into cyber vulnerabilities in 2010. he claimed to have hacked into aircraft systems on more than a dozen previous flights by connecting his laptop into the aircraft entertainment network. he also claimed to have altered the aircraft's course on his most recent flight. more recently, on june 8 2015, the group calling itself the syrian electronic army comprised the u.s. army's website demanding the u.s. stopped training rebel fighters in syria. the army temporarily down the website after the hackers posted messages as the one depicted here. well, in retrospect, the history of computer abuse and hacking dates back to the first commercial computers in the 1950's. it took off with the start of the personal computer revolution in the nate 1970's. the increase in hacking eventually led to these that was meant army cyber command has not abated. today, the cyber threat continues to evolve to a variety of internal and external, domestic and foreign abusers and hackers. with that said, i conclude my presentation and take any questions. [applause] does anybody have a question? okay, 1.i will -- p1 point i will add that i did not say any presentation. in the 1960's, when computer crime started becoming recognized. as i said earlier, the first large-scale commercial computers have the market in 1951 was the eniac. crimes were going hand-in-hand. they weren't going public. it wasn't until the mid-1960's that the very first news reports about anyone doing a computer crime. in the mid-60's, people in the computer business said, wait a second what will we do about these people getting access to computers? there should be some kind of ethics or guidelines for people doing this. there was a big challenge, early on, you have people that were well-trained technically, but they didn't have any professional ethical or moral guidelines about accessing computers. that's took quite a while. for many of you in the audience, you know that we have courses were ethical computer hacking. that as a backdrop to all of this. getting the educational training goes hand-in-hand with the technology. you will create people that are ethical hackers and people that will not be abusers. they will be the foundation of our core people going after the abusers and unethical hackers. so again i want to thank you for your time. if anyone has any particular questions after the presentation, i will be here for a few minutes. thank you. [applause] >> you are watching american history tv. all weekend, every weekend on c-span3. to join the conversation, like us on facebook at c-span history. each week, american artifacts takes you to an historic site or museum. up next, we travel to silicon valley to learn about the history of computers. >> i am the president and ceo of the computer history museum in mountain view, california, right in the heart of silicon valley. the computer history museum is born out of a private collection that actually began almost 50 years ago by a man named ken olson, the founder of deck computers. a lot of people watching that might know that. he was a graduate student at m.i.t., worked in a very famous computer, which was an analog flight simulator. he collected the analog flight simulator, added it to other private collections. the first museum was born in boston in 1979 as a public institution. it moved to california in 1986. then we moved to this beautiful building in 2002. this is the world's largest collection. in part because we have been collecting for so long, much of what we have is one-of-a-kind. computing moves so rapidly that computing artifacts are lost very quickly. our collection could never be duplicated. we have more than 100,000 items in our collection. about 2% of it is on display here in our main permanent exhibit. the rest of it is archived in the museum storage here in california. the museum is privately funded. we have donors, both individual and corporate, all of the country, all over the world, really. about 85% of our funding comes from individuals. we joke that this building is our largest artifact. this building was the international marketing headquarters for a company named silicon graphics. a very famous company here in silicon valley in the 1990's. sgi won, among other things the oscar for computer animation for "jurassic park" in 1984. that was all done i high-powered silicon graphics workstation. 8 short years later, silicon graphics moved out of this building. he was in financial trouble after the bubble burst. our trustees, very smartly swooped in and bought the building. it was in that rare moment when real estate prices were low in silicon valley. we've been here for little over a decade. >> i am senior curator at the computer history museum. whereas the revolution exhibit here at the museum. revolution is a long term history of computing. in fact, we called the first 2000 years of computing. it begins in the days of the abacus and goes all the way up to the iphone. this is a replica of a census machine. this was designed in 1890 to view the census. the 1880's census took almost eight years to complete. the government knew it was in big trouble for the 1890 census, because it would run out of time before the 1900 census would be due. the way around this problem would be to automate or mechanize the problem. the way to solve this was to ask a bunch of questions, the usual questions that census takers ask, then punch the responses into small pieces of cardboard called punchcards. they got the idea from watching a train conductor punch out the physical characteristics of people. apparently train tickets had little sections that you would punch out if it was a male or female in the seat, maybe what their hair color was. he got the idea of categorizing information in the form of punched holes inside a card. the result of the competition by the u.s. census bureau bought these machines once the award was given. these punchcards could be fed into this machine under this little tray. when you close this handle on the tray, there was a call and a circuit that would be completed. a corresponding counter would move over one position. there were little pools of mercury under each one of these holes. when you put the card in and close this pressure, there was a hole in the card, it would touch the ball of mercury and make this counter move one position. at the end of the day, to tabulate all of your responses you just had to read the dials on the machine. he was a german american engineer who actually became quite wealthy. this invention was the origin for international business machines, or ibm. ibm bought most of his early patents. ibm's business for most of the 20th century was based on these punchcards. the way you got information into and out of the computer, even in the 1950's and 1960's, maybe up to the 1980's, was by using these mechanical cardboard cards by feeding thousands of them into the computer and want. -- computer at once. >> considered underrated by many first lady historians, caroline harrison was in a compass artist who took up china painting and terry to that interest to the white house. establishing its china collection. she was interested in women's issues and help raise funds for john hopkins university on the condition that it admits women. she was also the first president general of the daughters of the american revolution until she died in the white house from tuberculosis. caroline harrison, this sunday night at 8:00 p.m. eastern on c-span's original series. first ladies, examining the public and private lives of the women who filled the position of first lady and their influence on the presidency. from martha washington to michelle obama. on american history tv on c-span3. >> each week american history tv sits in on a lecture with one of the nation's college professors. you can watch at 8:00 anded a midnight. next u.s. air force academy professor mark wells talks about the roll of bombers and allied planes during world war ii. he also describes the progression in air technology. colonel wells argues that they

Related Keywords

Vietnam , Republic Of , Los Alamos , California , United States , Australia , Leavenworth , Washington , China , Kosovo , Syria , New Mexico , Russia , Belgrade , Serbia General , , Syracuse , New York , District Of Columbia , Netherlands , South Korea , Chicago , Illinois , Germany , Iran , Afghanistan , Depaul University , Boston , Massachusetts , Virginia , Indonesia , Iraq , Israel , Saudi Arabia , Norfolk , Bulgaria , Capitol Hill , Paris , Rhôalpes , France , Australian , America , Chinese , Russian , Iraqis , Bulgarian , West German , Iraqi , Soviet , Dutch , Syrian , Serbian , Israeli , South Korean , American , Caroline Harrison , Chris Roberts , Bradley Manning , Roger Goodell , Donald A Gina Burleson , Carnegie Mellon , Lawrence Kaplan , Los Angeles , Donald Johnson , Timothy Berners Lee , Steve Wozniak , Jerry Schneider , Edward Snowden , Michelle Obama , George W Bush , Gary Mckinnon , Ken Olson , Charles Caddell , Bobby Kennedy , Grover Cleveland ,

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.