<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=utf-8">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <small>
      <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style></style> </small>
    <table class="backgroundTable" cellpadding="0" cellspacing="0"
      bgcolor="#ffffff" width="100%">
      <tbody>
        <tr>
          <td align="left" valign="top">
            <table cellpadding="0" cellspacing="0">
              <tbody>
                <tr>
                  <td style="border-top: 0px solid rgb(0, 0, 0);
                    border-bottom: 1px solid rgb(255, 255, 255);
                    background-color: rgb(255, 255, 255); text-align:
                    center;" align="center"><span style="font-size:
                      10px; color: rgb(96, 96, 96); line-height: 200%;
                      font-family: verdana; text-decoration: none;">Email
not
                      displaying correctly? <a
                        href="http://www.oplin.org/4cast/"
                        style="font-size: 10px; color: rgb(0, 0, 255);
                        line-height: 200%; font-family: verdana;
                        text-decoration: none;">View
                        it in your browser.</a></span></td>
                </tr>
                <tr>
                  <td style="border-top: 0px solid rgb(51, 51, 51);
                    border-bottom: 0px solid rgb(255, 255, 255);
                    background-color: rgb(255, 255, 255);">
                    <center><a href=""><img id="editableImg1"
                          src="cid:part2.06070406.01010902@oplin.org"
                          title="OPLIN" alt="OPLIN 4Cast" border="0"
                          align="middle"></a></center>
                  </td>
                </tr>
              </tbody>
            </table>
            <table style="width: 763px; height: 877px;" cellpadding="20"
              cellspacing="0" bgcolor="#ffffff">
              <tbody>
                <tr>
                  <td style="font-size: 12px; color: rgb(0, 0, 0);
                    line-height: 150%; font-family: trebuchet ms;"
background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg"
                    bgcolor="#ffffff" valign="top">
                    <p><!-- Make sure you modify the 4Cast title in this section -->
                      <span style="font-size: 20px; font-weight: bold;
                        color: rgb(0, 0, 0); font-family: arial;
                        line-height: 110%;">OPLIN 4cast #415: Encryption
                        by default</span><br>
                      <!-- Make sure you modify the date of the 4Cast in this section -->
                      <span style="font-size: 11px; font-weight: normal;
                        color: rgb(102, 102, 102); font-style: italic;
                        font-family: arial;">December 10th, 2014</span></p>
                    <!-- Begin copy of Web Source here  -->
                    <p style="text-align: justify;font-size: 16px;
                      font-family: arial; line-height: 110%;"><img
                        src="cid:part4.00070809.00030100@oplin.org"
                        alt="key" align="left" height="100" width="110">It
                      seems like every day brings news of another major
                      Internet hack, some so huge and cunning that they
                      are blamed on government-sponsored "armies" of
                      hackers. According to one <a
href="http://readwrite.com/2014/12/04/cybersecurity-corporate-networks-ransomware-cyberattack">recent
                        report</a>, 82% of U.S. companies were hit last
                      year by at least one online attack, and though
                      libraries may think nobody would bother to attack
                      them, they, too, are increasingly coming under
                      attack. And there is also almost daily news of
                      surveillance of Internet traffic (sometimes in
                      preparation for a hack). No doubt about it, the
                      Internet has become scary. Last month, to combat
                      this trend, the Internet Architecture Board (IAB)
                      recommended that most Internet traffic be
                      encrypted by default, rather than using encryption
                      only in special circumstances.
                    </p>
                    <div> </div>
                    <ul style="text-align: left;">
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
href="http://www.darkreading.com/perimeter/qanda-internet-encryption-as-the-new-normal/d/d-id/1317783?_mc=NWC_EDT_STUB">Q&A:
                          Internet encryption as the new normal</a>
                        (Dark Reading | Kelly Jackson Higgins) "The
                        Internet Architecture Board (IAB), which
                        oversees the Internet's architecture, protocols,
                        and standards efforts, officially called last
                        month for encryption to be deployed throughout
                        the protocol stack as a way to lock down the
                        privacy and security of information exchange. It
                        was a bold and important statement from the IAB,
                        and it likely will be the general blueprint for
                        new protocol efforts by the Internet Engineering
                        Task Force (IETF), which creates the protocol
                        specifications that run the Internet and devices
                        and systems connected to it."</li>
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
href="https://mailarchive.ietf.org/arch/msg/ietf-announce/ObCNmWcsFPNTIdMX5fmbuJoKFR8">IAB
                          statement on Internet confidentiality</a>
                        (IETF mail archive | Russ Housley) "The IAB
                        urges protocol designers to design for
                        confidential operation by default. We strongly
                        encourage developers to include encryption in
                        their implementations, and to make them
                        encrypted by default. We similarly encourage
                        network and service operators to deploy
                        encryption where it is not yet deployed, and we
                        urge firewall policy administrators to permit
                        encrypted traffic. We believe that each of these
                        changes will help restore the trust users must
                        have in the Internet."</li>
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
href="http://threatpost.com/iab-urges-designers-to-make-encryption-the-default/109404">IAB
                          urges designers to make encryption the default</a>
                        (Threatpost | Dennis Fisher) "The statement by
                        the IAB is a direct response to the events of
                        the last couple of years and the revelations by
                        <a
href="https://threatpost.com/edward-snowden-and-the-death-of-nuance/103902">Edward
                          Snowden</a> of the NSA's massive surveillance
                        on the Internet. Internet companies and
                        technology vendors have responded to the NSA
                        revelations by increasing their use of
                        encryption, especially on links between data
                        centers. But the Internet itself was not
                        designed with security in mind. Rather, openness
                        and interoperability were the main goals of the
                        network's designers. The IAB believes that
                        ubiquitous encryption can help address the
                        shortcomings of the original design and protect
                        users from attackers and surveillance."</li>
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
href="http://www.internetsociety.org/news/internet-society-commends-internet-architecture-board-recommendation-encryption-default">Internet
                          Society commends Internet Architecture Board
                          recommendation on encryption-by-default for
                          the Internet</a> (The Internet Society) "Like
                        the IAB, the ISOC Board of Trustees recognizes
                        that implementing this aspiration raises a
                        number of practical issues and technical
                        challenges. In addition to network management,
                        intrusion detection, and spam prevention, we
                        expect there will be economic and policy
                        challenges. As the organizational home for the
                        IETF, the Internet Society will take an active
                        role in facilitating and participating in the
                        conversations required to address these
                        challenges going forward."</li>
                    </ul>
                    <div style="text-align: left;"> </div>
                    <p style="text-align: left; font-size: 20px;
                      font-family: arial; line-height: 110%;"><small><strong><em>Articles
                            from <a href="http://ohioweblibrary.org">Ohio
                              Web Library</a>:</em></strong></small><br>
                    </p>
                    <div style="text-align: justify; font-size: 16px;
                      font-family: arial; line-height: 110%;">
                      <ul>
                        <li><a
href="http://web.a.ebscohost.com/pov/detail/detail?sid=67efe237-70f6-4884-8374-0a3ade55a699%40sessionmgr4001&vid=0&hid=4214&bdata=JnNpdGU9cG92LWxpdmU%3d#db=pwh&AN=96230932">Internet
                            governance overview.</a> (<em>Congressional
                            Digest</em>, June 2014, p2-5)</li>
                        <li><a
href="http://eds.b.ebscohost.com/ehost/detail/detail?sid=3bec8fc7-b0e1-41b4-b1f6-397d361094ab%40sessionmgr198&vid=0&hid=113&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=91736498">Future-proof
                            encryption.</a> (<em>Communications of the
                            ACM</em>, Nov. 2013, p12-14 | Gregory Mone)</li>
                        <li><a
href="http://eds.b.ebscohost.com/ehost/detail/detail?sid=e7d3edcd-8a1d-415b-bf1d-d84d5e3cb18a%40sessionmgr110&vid=0&hid=113&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=98040111">Export
                            controls for tech companies: The basics and
                            the pitfalls of U.S. encryption controls.</a>
                          (<em>Journal of Internet Law</em>, Sept. 2014,
                          p1-12 | John R. Shane and Lori E. Scheetz)</li>
                      </ul>
                    </div>
                    <div style="text-align: left;"> </div>
                    <!-- End paste of web source here --> </td>
                </tr>
                <tr>
                  <td style="" solid="" background-color:="" rgb(255,=""
                    255,="" 255);="" >=""
background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg"
                    valign="top" width="760"><span style="font-size:
                      10px; color: rgb(96, 96, 96); line-height: 100%;
                      font-family: verdana;">
                      <hr><!-- Begin standard subscription verbiage -->
                      <div style="text-align: justify;">The <strong><em>OPLIN
                            4cast</em></strong>
                        is a weekly compilation of
                        recent headlines, topics, and trends that could
                        impact public
                        libraries. You can subscribe to it in a variety
                        of ways, such as: <br>
                      </div>
                      <div style="text-align: left;"> </div>
                      <ul>
                        <li style="text-align: justify;"><strong>RSS
                            feed.</strong>
                          You
                          can receive the OPLIN 4cast
                          via RSS feed by subscribing to the following
                          URL:
                          <a class="moz-txt-link-freetext" href="http://www.oplin.org/4cast/index.php/?feed=rss2">http://www.oplin.org/4cast/index.php/?feed=rss2</a>.
                        </li>
                        <li style="text-align: justify;"><strong>Live
                            Bookmark.</strong>
                          If you're using the Firefox
                          web browser, you can go to the 4cast website
                          (<a class="moz-txt-link-freetext" href="http://www.oplin.org/4cast/">http://www.oplin.org/4cast/</a>) and click on the
                          orange "radio wave" icon
                          on the right side of the address bar. In
                          Internet Explorer 7, click on
                          the same icon to view or subscribe to the
                          4cast RSS feed. </li>
                        <li style="text-align: justify;"><strong>E-mail.</strong>
                          You
                          can have the OPLIN 4cast
                          delivered via e-mail (a'la OPLINlist and
                          OPLINtech) by subscribing to
                          the 4cast mailing list at
                          <a class="moz-txt-link-freetext" href="http://mail.oplin.org/mailman/listinfo/OPLIN4cast">http://mail.oplin.org/mailman/listinfo/OPLIN4cast</a>.
                        </li>
                      </ul>
                    </span> </td>
                </tr>
                <tr>
                  <td style="border-top: 0px solid rgb(255, 255, 255);
                    background-color: rgb(255, 255, 204);"
background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickfooter.jpg"
                    valign="top" width="760"> <br>
                  </td>
                </tr>
              </tbody>
            </table>
          </td>
        </tr>
      </tbody>
    </table>
    <small>
      <title>OPLIN 4Cast</title>
      <style>
 .headerTop { background-color:#FFFFFF; border-top:0px solid #000000; border-bottom:1px solid #FFFFFF; text-align:center; }
 .adminText { font-size:16px; color:#0000FF; line-height:200%; font-family:verdana; text-decoration:none; }
 .headerBar { background-color:#FFFFFF; border-top:0px solid #333333; border-bottom:0px solid #FFFFFF; }
 .title { font-size:20px; font-weight:bold; color:#000000; font-family:arial; line-height:110%; }
 .subTitle { font-size:11px; font-weight:normal; color:#000000; font-style:italic; font-family:arial; }
 .defaultText { font-size:12px; color:#000000; line-height:150%; font-family:trebuchet ms; }
 .footerRow { background-color:#FFFFCC; border-top:0px solid #FFFFFF; }
 .footerText { font-size:10px; color:#996600; line-height:100%; font-family:verdana; }
 a { color:#0000FF; color:#0000FF; color:#0000FF; }
  </style>
    </small>
  </body>
</html>