{"id":1229,"date":"2016-06-21T18:58:40","date_gmt":"2016-06-22T01:58:40","guid":{"rendered":"http:\/\/mydiabeticsoul.com\/?p=1229"},"modified":"2016-06-21T18:58:40","modified_gmt":"2016-06-22T01:58:40","slug":"pros-cons-of-the-information-highway-legal-assistants-should-know","status":"publish","type":"post","link":"http:\/\/mydiabeticsoul.com\/?p=1229","title":{"rendered":"Pros &#038; Cons of the Information Highway: Legal Assistants Should Know"},"content":{"rendered":"<p><strong>December, 1994<\/strong><\/p>\n<p>&#8220;Let&#8217;s refresh our memories.\u00a0 The Net (Internet) began 25 years ago as a communications system set up by the [United States] Defense Department to link computers at universities with those at other defense research centers.\u00a0 This network deliberately had no central locations, so in case part of it got knocked out in a nuclear attack, the rest of the Net would continue to operate.\u00a0 Since then, the Net has expanded to include universities, corporations, and government agencies around the globe.\u00a0 Individuals get access to the Net through one of these organizations or via a third-party service provider.\u00a0 But with no central governing authority, users have been free to add computers and services to the Internet virtually at will &#8212; resulting in near anarchy today!<\/p>\n<p>&#8220;These days [1994], the Net is undergoing massive changes.\u00a0 Thousands of new users sign up each day, and more and more companies are doing business over the wires, leading to network traffic jams and debates over access restrictions and usage fees.\u00a0 As government and big business spar over the future of the much-hyped information highway, many fear that the anarchic freedom of the Net may be nearing its end!<\/p>\n<p>&#8220;And just the idea of <span style=\"text-decoration: underline;\">instantaneous<\/span> information being literally available at everyone&#8217;s fingertips, the <span style=\"text-decoration: underline;\">American<\/span> imagination has been captured.\u00a0 I would think that uncapitalistic democracies and other countries, in general, that have imaginations, cannot freely express them as America does.\u00a0 You know what I mean.\u00a0 The promise of a limitless electronic frontier &#8211; over 20 million users at this writing &#8211; is still growing faster than ever, creating mammoth electronic traffic jams on phone and computer networks.<\/p>\n<p>I. <strong>Secure Distributed Computing<\/strong><\/p>\n<p>&#8220;The advent of the global Internet has brought about a significant change in the way people communicate and do business.\u00a0 Yet as this global village expands, so does the number of less than honest citizens.\u00a0 Furthermore, much of the hardware and software that constitutes the Internet was designed with only the trustworthy user in mind.\u00a0 As a result, intruders can invade the privacy of network communications as well as read or alter stored information. 1<\/p>\n<p>A. <strong>Networks and Computer Security<\/strong><\/p>\n<p>&#8220;At the Massachusetts Institute of Technology, computer-system administrators have been coping with problems of security for more than 10 years.\u00a0 In 1983, in collaboration with IBM, the Digital Equipment Corporation undertook &#8220;Project Athena&#8221; to provide advanced computing power to students and faculty.\u00a0 Athena is based on the client-server model: users work stations (the clients) do most of the computing, but specialized machines on a campus-wide network handle file storage, printing and other needs.\u00a0 This model has since become a widely used paradigm for much of the Internet!<\/p>\n<p>&#8220;When users sit down at a terminal, for example, they &#8220;authenticate themselves&#8221; by typing an account name and password.\u00a0 Only the owner of a particular account, or case in speaking of the legal assistant, would and should know its password.\u00a0 So, the two in conjunction suffice to identify the user to the system.<\/p>\n<p>&#8220;It is important to know that the user assumes that s\/he is communicating with the intended computer.\u00a0 If the terminal is connected directly to a specific computer, the user knows that the terminal speaks for that system.\u00a0 When users dial a mainframe via modem, they trust the telephone company to connect the telephone call to the computer system that corresponds to the dialed number.<\/p>\n<p>&#8220;As long as a computer&#8217;s internal security is not sabotaged, the mutual trust between user and mainframe remains in force until the user logs out.\u00a0 The system assumes that all the keystrokes it receives have been typed on behalf of the user.\u00a0 And the user assumes that all information appearing on the screen comes from the appropriate computer system.<\/p>\n<p>&#8220;Now, let&#8217;s assume that employment of humans, especially college-graduating humans, will not be eliminated by this superhighway.\u00a0 &#8220;Estimates from state to state on the number of jobs that the superhighway projects and competition from local telecommunications companies will create are in the tens of thousands per state.\u00a0 Critics are quick to deflate the numbers to more modest proportions, but the expectation of new jobs within the telecommunications industry is never disputed. 2<\/p>\n<p>&#8220;Well now, I for one could dispute that phraseology, but that would constitute <span style=\"text-decoration: underline;\">another<\/span> research project!\u00a0 On the positive side, one employable aspect involves the placement of the fiber-optic network throughout the nation.<\/p>\n<p>&#8220;And with all these humans speeding on this Information SUPERhighway, it will be difficult to set any speed limits on it!\u00a0 The limits soon will be raised from the 14,400 and 28,800 bits per second speeds that most computers are using.\u00a0 For instance, AT&amp;T Paradyne, based in Largo, Florida, has introduced a new 33,600 bps (bits per second) modem.\u00a0 This speed can transmit about 42,000 words per minute.\u00a0 &#8220;The faster speed should help accelerate the transfer of medical images over the telephone, as well as improve desktop videoconferencing, mobile computing, [paralegal researching and indexing,] and interactive games.<\/p>\n<p>II. <strong>New Laws<\/strong><\/p>\n<p>&#8220;Now that software is available, creating international standards, new laws will become a major issue.\u00a0 Laws will have to be &#8220;revamped.&#8221;\u00a0 <em>There are a lot of issues relating to privacy, security, and liability associated with information that may be private or confidential.\u00a0 There are also a lot of regulations &#8212; legislational types of issues &#8212;\u00a0in terms of intellectual property rights for information that is made available electronically that can be copied and distributed very easily.<\/em><\/p>\n<p>&#8220;For example, <em>when there were no automobiles and people were only travelling at a peak speed of five or ten miles an hour, there were far less accidents, and now that we have automobiles, it&#8217;s changed our way of life.\u00a0 On the other hand, we have had to work out liability insurance and automobile inspections and driver testings and point systems, emergency vehicle laws, right of way&#8230;<\/em>.4<\/p>\n<p>&#8220;One Great disadvantage of this ever-increasing superhighway trend is the fact that users will be constantly accessible in their homes, cars, or just about anywhere they go via personal communicators (cellular phones).\u00a0 All in all, the United States Constitutional laws were not drawn up to protect the country&#8217;s citizenry from privacy break-ins in their computer systems, never mind their on-line information!<\/p>\n<p>&#8220;At this point, the important thing to consider is that the &#8216;highway&#8217; is still in the works.<\/p>\n<p>III. <strong>New Words<\/strong><\/p>\n<p>&#8220;On the perspective of disadvantages versus advantages, legal assistants as well as people in general, especially students, will need to know what the heck futuristic novices-to-experts are talking on-line about.<\/p>\n<p>&#8220;The following in a minor list of phrases that this researcher thought applicable for present review of the future:<\/p>\n<ol>\n<li>Active attackers &#8211; those who introduce false data into a network to corrupt its normal functions.<\/li>\n<li>Archie &#8211; a system that keeps track of files available for downloading on the network.<\/li>\n<li>Bliatherer &#8211; a user who takes three screens to say something when three words would suffice.<\/li>\n<li>Broadcast based &#8211; every one of the computers connected to a network cable has access to all the information that flows through that cable.<\/li>\n<li>Cyber-cad &#8211; the electronic equivalent of a lounge lizard, often seen prowling Usenet single groups.<\/li>\n<li>Cybernetic-watchdog &#8211; this namesake of the great three-headed dog that once stood guard at the entrance to the underworld is the hear of &#8220;<em>Athena&#8217;s<\/em>&#8221; security.<\/li>\n<li>eMail &#8211; provides access to regional and international mailing lists also known as listservs.<\/li>\n<li>Flame &#8211; to offend, insult, or otherwise bludgeon someone else electronically, usually in retaliation for real or imagined offenses.\u00a0 As in Flaming &#8211; the electronic equivalent of an old-fashioned village stoning, where the natives hurled insults and obscenities directly at your head.\u00a0 From time to time, flame wars still break out between rival tribes on the Net, consuming everything in their path.\u00a0 Getting caught in the middle of a flame war is like going to a weenie roast where you are the weenie!<\/li>\n<li>GNN &#8211; (global networks navigator) &#8211; part online newspaper, part hypertext almanac with connections to hundreds of sites on the Net.<\/li>\n<li>Gopher &#8211; a menu-based program that tunnels between different computer networks in search of information.<\/li>\n<li>Hackers &#8211; those who break into computers on the Internet by exploiting well known, yet often unrepaired, system vulnerabilities.<\/li>\n<li>Internet &#8211; an international inter connection of thousands of computers via ordinary telephone lines (also known as &#8220;the Net&#8221;); a complimentary information source; a research tool; a communication tool; provides cost-effective access to a number of substantive resources, including documents and databases.<\/li>\n<li>Kerberos &#8211; an authentication system which avoids sending readable passwords across network links.<\/li>\n<li>Key-Distribution center (KDC) &#8211; mediates all transactions by means of encrypted digital certificates we call &#8220;tickets.&#8221;<\/li>\n<li>Login name &#8211; a name by which a system knows a user.<\/li>\n<li>Lurker &#8211; someone who reads articles in Usenet groups without posting any.<\/li>\n<li>Lynx &#8211; a graphical interface used to view documents on the World Wide Web.<\/li>\n<li>Mosaic &#8211; see Lynx.<\/li>\n<li>Net-God &#8211; a long-time, revered, and usually omniscient Internet user.<\/li>\n<li>Netiquette &#8211; an informal set of rules for proper behavior on the Net, often ignored.<\/li>\n<li>Newbie &#8211; someone who is new to the Net; often preceded by the word &#8220;clueless.&#8221;<\/li>\n<li>News group &#8211; a discussion area that addresses a specific issue; are accessible via a news reader program that usually runs on the UNIX operating system; a person may ask or answer questions, post comments, or go on the rant.<\/li>\n<li>Passive attacks &#8211; simply listening to network traffic without disrupting its flow.<\/li>\n<li>PBX &#8211; Private Branch Exchange telephone systems, printers, copiers, and fax systems.<\/li>\n<li>Surfer &#8211; a Net dude\/dudette.<\/li>\n<li>Spamming &#8211; spraying out messages to every newsgroup or e-mail address, not unlike flinging canned meat into the blades of a rotating fan.<\/li>\n<li>Spewer &#8211; a network user who believes everything he of she types is of interest to everyone.<\/li>\n<li>Spoofing &#8211; false identity.<\/li>\n<li>Snail-mail &#8211; United States Postal Service.<\/li>\n<li>Telepathy &#8211; Microsoft Corporation&#8217;s series of specifications describing how devices and programs on individual PC&#8217;s interact with the PBX (see above).<\/li>\n<li>Telnet &#8211; a communications protocol that lets you control another computer from a distance.<\/li>\n<li>Unix &#8211; a complex, powerful operating system used extensively on networked machines, best avoided by Newbies; the Net&#8217;s common operating system.<\/li>\n<li>Usenet &#8211; a network featuring thousands of electronic conferences on a dizzying array of topics.<\/li>\n<li>Veronica &#8211; a program that tracks down information across different computer sites using keyword searches.<\/li>\n<li>WWW (World Wide Web) &#8211; a graphical, hypertext system used to navigate the Net.<\/li>\n<\/ol>\n<p>IV. <strong>The I-Way &#8220;Trend&#8221; vs. Virtual Reality<\/strong><\/p>\n<p>&#8220;Who&#8217;s going to pay for all this?&#8221;\u00a0 Geez, how many times in <span style=\"text-decoration: underline;\">my<\/span> lifetime have I heard<span style=\"text-decoration: underline;\"> that<\/span> question?<\/p>\n<p>&#8220;At this point in my research, I realize that people do not readily understand that they have to find a way to fund all this information.\u00a0 In an interactive environment, viewers can elect not to look at ads, which make them less effective as marketing tools and dulls their appeal as money-makers for the services that incorporate them.\u00a0 Basically, this thought pertains to the case of most magazine advertisements of which are funded by the selling of those advertisements.<\/p>\n<p>&#8220;In conclusion, the information superhighway is still a network of dirt roads.\u00a0 Road signs are few, and finding legal information you can use can be difficult.<\/p>\n<p>&#8220;Most of the law-related information online today is not very useful to the average consumer.\u00a0 Much of it is raw data &#8211; sort of like C-Span on cable television.<\/p>\n<p>&#8220;Don&#8217;t get discouraged!\u00a0 There are a lot of people online to chat with.\u00a0 With the millions of\u00a0people online nationwide, it is fairly easy to find thousands of people who share your interests and concerns.\u00a0\u00a0You can have public conversations and share advice, all without incurring long-distance charges.\u00a0 The result is similar to talk radio, except there is often no host, everybody gets a chance to be &#8216;on the air,&#8217; and everything said gets preserved in a log that can be read later.<\/p>\n<p>&#8220;All in all, the ease with which an intruder can perform illicit acts means that the network is not inside the security perimeter of the distributed computer environment.\u00a0 If the network is outside the perimeter, than one must somehow protect data packets as they carry information between workstations and servers.\u00a0 Every packet must be authenticated as it crosses the security perimeter represented by the network. 5<\/p>\n<p>&#8220;Questions to ask could be: Will computer companies be able to understand, much less meet, the diverse needs of consumers?\u00a0 Will these companies be big players in the convergence of digital technologies, from TV to telephones to PCs?<\/p>\n<p>&#8220;What&#8217;s really happening is that stuff is just formulating right now.\u00a0 A lot of things are going to have to shake out and settle down and you&#8217;re going to see alliances come and go.\u00a0 (I am excited about all that&#8217;s going on!)\u00a0 It&#8217;s really going to change the way we do a lot of things, but it&#8217;s going to take a little more time.\u00a0 Enter into this with caution, but extreme optimism.&#8221; 6<\/p>\n<p><strong>REFERENCE LIST<\/strong><\/p>\n<p><em>Computer Currents<\/em>, &#8220;Through the Internet with Gun and Camera&#8221; by Daniel Tynan, November 7, 1994, pp. 24 &#8211; 32.<\/p>\n<p><em>NOLO News<\/em>, &#8220;Law on the Information Superhighway&#8221; by Albin Renauer, Spring 1994, pp. 9 &amp; 14.<\/p>\n<p><em>PC Novice<\/em>, &#8220;The Information Interstate, Superhighway Or Superhype?&#8221;, by Tosca Moon Lee, September 1994, pp. 80 &#8211; 83.<\/p>\n<p><em>Scientific American<\/em>, &#8220;Secure Distributed Computing&#8221; by Jeffrey L. Schuller, November 1994, pp. 72 &#8211; 75.<\/p>\n<p><strong>******* That was 1994.\u00a0 Look at us now!!\u00a0 Just sayin&#8217;&#8230;.<\/strong><\/p>\n<p><strong>A. K. Buckroth<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>December, 1994 &#8220;Let&#8217;s refresh our memories.\u00a0 The Net (Internet) began 25 years ago as a communications system set up by the [United States] Defense Department to link computers at universities with those at other defense research centers.\u00a0 This network deliberately &hellip; <a class=\"more-link\" href=\"http:\/\/mydiabeticsoul.com\/?p=1229\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[171,207,172,173,174,175,206,176,178,168,179,180,181,147,169,209,182,183,177,184,185,186,187,188,189,170,190,191,192,193,167,198,195,196,197,194,199,200,208,201,202,203,205,204],"class_list":["post-1229","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-active-attackers","tag-albin-renauer","tag-archie","tag-bliatherer","tag-cyber-cad","tag-cybernetic-watchdog","tag-daniel-tynan","tag-email","tag-flame","tag-global-village","tag-gnn-global-networks-navigator","tag-gopher","tag-hackers","tag-internet","tag-internet-1994","tag-jeffrey-l-schuller","tag-kerberos","tag-key-distribution-center","tag-listservs","tag-login-name","tag-lurker","tag-lynx","tag-mosaic","tag-net-god","tag-netiquette","tag-new-words","tag-newbie","tag-news-group","tag-passive-attacks","tag-pbx","tag-project-athena","tag-snail-mail","tag-spamming","tag-spewer","tag-spoofing","tag-surfer","tag-telepathy","tag-telnet","tag-tosca-moon-lee","tag-unix","tag-usenet","tag-veronica","tag-virtual-reality","tag-world-wide-web"],"_links":{"self":[{"href":"http:\/\/mydiabeticsoul.com\/index.php?rest_route=\/wp\/v2\/posts\/1229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/mydiabeticsoul.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/mydiabeticsoul.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/mydiabeticsoul.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/mydiabeticsoul.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1229"}],"version-history":[{"count":6,"href":"http:\/\/mydiabeticsoul.com\/index.php?rest_route=\/wp\/v2\/posts\/1229\/revisions"}],"predecessor-version":[{"id":1241,"href":"http:\/\/mydiabeticsoul.com\/index.php?rest_route=\/wp\/v2\/posts\/1229\/revisions\/1241"}],"wp:attachment":[{"href":"http:\/\/mydiabeticsoul.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/mydiabeticsoul.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1229"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/mydiabeticsoul.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}