My muddiest point has to do with the ever-moving target of security. The fact that it is muddy, brings attention to it. The volume and diversity of the issue keeps it in the category of “muddy.”

The issue is as current as today’s newspaper. According to L’Express (2012, 11,20), the noted French info magazine, just yesterday the Élysée Palace announced that they have information pointing to a cyber attack by the United States. Facebook, the ubiquitous social network site was the tool used to carry out the attack against the administration of Nicolas Sarkozy during last year’s French elections. As it turns out, American agents reportedly sent friend requests to workers in the French President’s office. Once the target accepted the request, the target was directed to a false Élysée Palace log-on page, prompting them to surrender their username and password to the attacker. The attack was quick and simple. Users were slow to recognize that they had even given up critical security information.

This point is muddy because the means of Phishing and data theft have shifted and will continue to morph into more and more cleaver and veiled ways of getting us to give up the little bits of data that, when pulled together, make us victims.

Our students can fall prey just as easily.

As we introduce our students to more and more online resources and extend to them more easily accessible means of expression online, we need to be certain to help them understand the threats that are before them. Dr. Brown (2012) reminds us, again, that we need to take security very seriously.

As teachers, we have moral and legal obligations to limit the exposure of our students to anything that may harm them, either today or far into the future.

To do so, we need to change and adapt to meet the challenges that are just around the corner. We need to make sure our students do so as well.


Brown, D. (2012) Ask the expert .  Retrieved from

Haquet, C. & Paquette, E. (2012,11,20). Cyberguerre: comment les américains ont piraté l’élysée. L’Express. Retrieved from