Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [SOT] Censorship Through "Internet Terrorist" FUD

Hash: SHA1

Internet Terrorist: Does Such A Thing Really Exist?

,----[ Quote ]
| Recently, I have experienced an increase in organizations questioning how 
| real is the threat of Internet terrorism and what they can do to protect 
| themselves. As a former CISO, this was one of the last concerns that crossed 
| my mind, especially since it was a daily up-hill battle getting buy-in for 
| the most basic security controls and services. The notion of worrying about 
| the potential risk of terrorism against my organization seemed to be the 
| lowest priority given the choices at hand. Ironically, terrorism today seems 
| to be an emerging concern in the commercial world and many are actively 
| pursuing methods and technology to help combat the problem. As a result, I 
| began to research this trend to determine its drivers and potential 
| implications to information security as we know it today.          


The Continuing Cheapening of the Word "Terrorism"

,----[ Quote ]
| Illegally diverting water is terrorism:
|     South Australian Premier Mike Rann says the diversion of water from the 
|     Paroo River in Queensland is an act of terrorism during a water crisis. 
| Anonymously threatening people with messages on playing cards, like the Joker 
| in The Dark Knight, is terrorism... 


Reputation Attacks: A Little Known Internet Threat

,----[ Quote ]
| Reputation attacks target both individuals and companies, and their goal is 
| to ruin the victim’s reputation. While attack techniques are varied, the 
| consequences are often the same: a damaged reputation resulting in many cases 
| in financial loss. Attackers can use several methods to ruin a company’s 
| reputation. Until now, most common attacks have been based on distributed  
| denial of service (DDoS). The objective of these attack is to flood corporate 
| online services by means of millions of non legitimate requests from botnets. 
| In this way, business performance is affected, causing direct financial 
| losses and the corresponding damage to corporate image and reputation.       



And An i-Patriot Act

,----[ Quote ]
| Amazing revelations have emerged concerning already existing government plans
| to overhaul the way the internet functions in order to apply much greater
| restrictions and control over the web.
| Lawrence Lessig, a respected Law Professor from Stanford University told an
| audience at this years Fortune’s Brainstorm Tech conference in Half Moon Bay,
| California, that "There’s going to be an i-9/11 event" which will act as a
| catalyst for a radical reworking of the law pertaining to the internet.
| Lessig also revealed that he had learned, during a dinner with former
| government Counter Terrorism Czar Richard Clarke, that there is already in
| existence a cyber equivalent of the Patriot Act, an "i-Patriot Act" if you
| will, and that the Justice Department is waiting for a cyber terrorism event
| in order to implement its provisions.


Update on China/Tibet cyberattacks (and Russia/Georgia), and call for

,----[ Quote ]
| Also on this same day, I received an interesting update from Greg Walton, a
| SecDev Fellow at the Citizen Lab at the University of Toronto who also edits
| the Infowar Monitor.
| He's currently in Hong Kong doing pro bono work for the advocacy group Human
| Rights in China, briefing them on security issues and monitoring systems
| during a sensitive time -- the Olympics, recent unrest in Tibetan and Uighur
| regions, and other factors.


A Czar for the Digital Peasants

,----[ Quote ]
| One sure sign of a lack of political vision is a rise in the number of pieces
| of acronymic legislation. After September 11, the US Congress passed the
| euphoniously named “Uniting and Strengthening America by Providing
| Appropriate Tools Required to Intercept and Obstruct Terrorism Act” the
| initials of which spell out “USA – Patriot.” The Patriot Act is a pretty bad
| piece of legislation, but at least its drafters worked hard on the acronyms
| so that opponents could be labelled “anti-patriot” – a perfect level of
| analysis for Fox News. Admittedly, in this administration, having public
| officials torturing acronyms rather than detainees might be counted as a
| plus, but I still find the whole practice distasteful. I'd suggest that
| politicians vow to vote against any piece of legislation with its own
| normatively loaded acronym, no matter how otherwise appealing. It might make
| them focus a little more on the content.
| In any event, Congress has been at it again. The House just passed, and the
| Senate is considering, the Prioritizing Resources and Organization for
| Intellectual Property Act of 2008 – or “Pro-IP” Act. (If it passes, a version
| is sure to be urged on Europe as a matter of “harmonisation.”) Are you
| pro-intellectual property? Then surely you must be for this piece of
| legislation! The name says it all.

Version: GnuPG v1.4.9 (GNU/Linux)


[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index