Quotulatiousness

June 10, 2013

Edward Snowden is “one of America’s most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning”

Filed under: Government, Liberty, Media, USA — Tags: , , , , , — Nicholas @ 08:03

The identity of the NSA whistleblower is revealed by the Guardian:

The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell.

The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. “I have no intention of hiding who I am because I know I have done nothing wrong,” he said.

Snowden will go down in history as one of America’s most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning. He is responsible for handing over material from one of the world’s most secretive organisations — the NSA.

[. . .]

He does not fear the consequences of going public, he said, only that doing so will distract attention from the issues raised by his disclosures. “I know the media likes to personalise political debates, and I know the government will demonise me.”

Despite these fears, he remained hopeful his outing will not divert attention from the substance of his disclosures. “I really want the focus to be on these documents and the debate which I hope this will trigger among citizens around the globe about what kind of world we want to live in.” He added: “My sole motive is to inform the public as to that which is done in their name and that which is done against them.”

He has had “a very comfortable life” that included a salary of roughly $200,000, a girlfriend with whom he shared a home in Hawaii, a stable career, and a family he loves. “I’m willing to sacrifice all of that because I can’t in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they’re secretly building.”

June 9, 2013

QotD: Whistleblowers

Filed under: Government, Media, Quotations, USA — Tags: , , , , — Nicholas @ 09:36

The U.S. government is on a secrecy binge. It overclassifies more information than ever. And we learn, again and again, that our government regularly classifies things not because they need to be secret, but because their release would be embarrassing.

Knowing how the government spies on us is important. Not only because so much of it is illegal — or, to be as charitable as possible, based on novel interpretations of the law — but because we have a right to know. Democracy requires an informed citizenry in order to function properly, and transparency and accountability are essential parts of that. That means knowing what our government is doing to us, in our name. That means knowing that the government is operating within the constraints of the law. Otherwise, we’re living in a police state.

We need whistle-blowers.

Leaking information without getting caught is difficult. It’s almost impossible to maintain privacy in the Internet Age. The WikiLeaks platform seems to have been secure — Bradley Manning was caught not because of a technological flaw, but because someone he trusted betrayed him — but the U.S. government seems to have successfully destroyed it as a platform. None of the spin-offs have risen to become viable yet. The New Yorker recently unveiled its Strongbox platform for leaking material, which is still new but looks good. This link contains the best advice on how to leak information to the press via phone, email, or the post office. The National Whistleblowers Center has a page on national-security whistle-blowers and their rights.

Bruce Schneier, “What We Don’t Know About Spying on Citizens: Scarier Than What We Know”, The Atlantic, 2013-06-06

June 8, 2013

Don’t put too much faith in denials from Verizon and other companies…

Filed under: Business, Government, Law, Liberty, Technology — Tags: , , , , , — Nicholas @ 10:10

As Mic Wright points out, the companies named in the Prism leaks may not be acting as free agents:

Pastor Niemoller’s “First they came…” poem is over-quoted but with good reason. It is far too easy to be complacent. Addicted and reliant as many of us are on free web services, it’s more convenient to just accept the companies outright denials that they have been complicit with the NSA’s programme. But look closely at those statements and things become rather less clear, as Michael Arrington pointed out.

The tech industry’s denials have been carefully drafted and similarly worded. It is not unfeasible to imagine that those companies have turned over users’ personal information to the NSA in another fashion. Facebook founder and CEO Mark Zuckerberg’s statement was one of the strongest: “Facebook is not and has never been part of any program to give the US or any other government direct access to our servers. We have never received a blanket request or court order from any government agency asking for information…”

Zuckerberg’s words are reassuring until you consider that any company that receives an order under the Foreign Intelligence Surveillance Act Amendments Act — the legislation the Obama administration is using to justify the broad surveillance — is forbidden from disclosing they have received it or disclosing any information about it. It’s not surprising that no mea culpas have emerged from major tech firms or that Palantir — the big data surveillance company with the $5 billion valuation and CIA funding — denies any connection with the project. The NSA has been a Palantir client and one of the company’s co-founders, billionaire investor Peter Thiel, also sits on Facebook’s board.

Charles Stross talks about writing The Jennifer Morgue

Filed under: Books, Britain, Business, Media — Tags: , , , — Nicholas @ 09:07

If you haven’t yet read any of the “Laundry” books by Charles Stross, you really are missing out on a treat. The Jennifer Morgue was the second in the series and Charles has a blog post up about how the book came to be written:

All stories have several seeds. In the case of “The Jennifer Morgue”, the first seed was the surprising success of “The Atrocity Archives”. The novel my agent initially thought was unsaleable sold to Golden Gryphon, a small but respectable Lovecraftian publisher in the United States. It went gold, going into reprint and becoming their second-best selling title at the time. Then, to everyone’s surprise, the additional novella I wrote for the book (“The Concrete Jungle”) made the shortlist for the Hugo award in 2005. This was a stunning surprise. GG had only sold around 3000 copies of the book; the other novellas on the shortlist had all appeared in magazines or anthologies with four to ten times the number of copies sold! After some hurried email consultation, Gary and Marty at GG agreed to let me put the whole novella on the web, to make it more readily available to the Hugo voters. I don’t know if that’s what did the trick, or if there were additional home-mover effects from the Worldcon in 2005 being held in Glasgow (thus bringing more British voters in than normal) but at the end of August that year I became the dazed and surprised owner of a very shiny trophy.

(And the performance anxiety that had been haunting me for years—”I’m not a real writer, I’m just winging this”—went away for a while.)

But anyway. This success coincided with a French publisher making an offer for translation rights to “The Atrocity Archives”, which in turn got my agent’s attention. She proposed a sequel, and James Bond was so obvious that I don’t think I even considered any alternatives. It would have to be the Movie Bond franchise, for most people these days don’t grow up on the original Ian Fleming novels (the way I did); the humour would come from the incongruity of Bob Howard in James Bond’s shoes. We decided to auction the new book, along with paperback rights to “The Atrocity Archives”, and ended up cutting a deal whereby Golden Gryphon would publish “The Jennifer Morgue” in hardcover while Ace rolled “The Atrocity Archives” in trade paperback, and eventually in mass market. Which then left me pondering what to write … because every Bond movie (or novel) needs a Bond-sized plot device, doesn’t it?

By this time we were into late October 2005. One evening, we were eating a Chinese take-away in front of the TV, watching a documentary on the Discovery Channel about one of the most bizarre CIA projects to happen during the Cold War — Project Azorian (better, but mistakenly, known to the public as “Operation Jennifer”). Seriously, if you don’t know about it, go follow that link right now; it’s about how the CIA enlisted Howard Hughes to help them build a 63,000 ton fake deep-see mining ship, the Glomar Challenger, as cover for a deep-sea grapple that would descend 4,900 metres and raise the hull of a shipwrecked Soviet nuclear missile submarine, the K-129. (Project Azorian was so James Bond that the engineering crew working on the ship were cracking jokes about the bald guy stroking the white cat in his seat on the bridge. How post-modern can you go?)

June 7, 2013

Who is Glenn Greenwald?

Filed under: Government, Law, Liberty, USA — Tags: , , , , — Nicholas @ 08:14

The New York Times profiles Glenn Greenwald:

After writing intensely, even obsessively, for years about government surveillance and the prosecution of journalists, Glenn Greenwald has suddenly put himself directly at the intersection of those two issues, and perhaps in the cross hairs of federal prosecutors.

Late Wednesday, Mr. Greenwald, a lawyer and longtime blogger, published an article in the British newspaper The Guardian about the existence of a top-secret court order allowing the National Security Agency to monitor millions of telephone logs. The article, which included a link to the order, is expected to attract an investigation from the Justice Department, which has aggressively pursued leakers.

On Thursday night, he followed up with an article written with a Guardian reporter, Ewen MacAskill, that exposed an N.S.A. program, Prism, that has gathered information from the nation’s largest Internet companies going back nearly six years.

“The N.S.A. is kind of the crown jewel in government secrecy. I expect them to react even more extremely,” Mr. Greenwald said in a telephone interview. He said that he had been advised by lawyer friends that “he should be worried,” but he had decided that “what I am doing is exactly what the Constitution is about and I am not worried about it.”

June 1, 2013

QotD: Internet espionage

Filed under: China, Humour, Quotations, Technology — Tags: , , , — Nicholas @ 08:26

A new report says that the Chinese are hacking American computer networks at an alarming rate. This is hardly news. I’ve been including the phrase “早安,我抱歉有沒有在這封電子郵件中的商業秘密或加拿大色情。請停止殺害酷動物啄木鳥醫學。剛剛買了一些偉哥了” at the bottom of every e-mail for months (I put it just above where it says “Hello Mr. Holder!”). It means, according to Google translate: “Good Morning, I’m sorry there’s no trade secrets or Canadian porn in this e-mail. Please stop killing cool animals for pecker medicine. Just buy some Viagra already.”

What is new is the scope of the problem the report lays out. This is a thorny issue and I think the U.S. needs to be much, much more aggressive in combating it. Why it’s not a bigger issue for the WTO, for instance, is baffling to me. They are stealing our stuff, which strikes me as a bigger deal than taxing it at the border.

Explaining to the Chinese leadership that they shouldn’t be doing this because it’s wrong is like explaining to a dog licking its nethers that what he’s doing is bad manners: To the extent they understand at all, they couldn’t care less. They respect power. They understand when you put a price on bad behavior. So we need to put a price on Chinese hacking. It’s really that simple. The hard thing to figure out is how.

Jonah Goldberg, “Chiiiiiicoms in (Cyber) Spaaaaaaaaaaaace!”, The Goldberg File, 2013-05-31

May 9, 2013

The NSA’s guide to hacking Google searches

Filed under: Technology, USA — Tags: , , , , — Nicholas @ 10:34

Wired‘s Kim Zetter on how the NSA recommends its own analysts get the best intelligence use out of Google and other online tools:

There’s so much data available on the internet that even government cyberspies need a little help now and then to sift through it all. So to assist them, the National Security Agency produced a book to help its spies uncover intelligence hiding on the web.

The 643-page tome, called Untangling the Web: A Guide to Internet Research (.pdf), was just released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to process public records for activists and others.

The book was published by the Center for Digital Content of the National Security Agency, and is filled with advice for using search engines, the Internet Archive and other online tools. But the most interesting is the chapter titled “Google Hacking.”

[. . .]

Stealing intelligence on the internet that others don’t want you to have might not be illegal, but it does come with other risks, the authors note: “It is critical that you handle all Microsoft file types on the internet with extreme care. Never open a Microsoft file type on the internet. Instead, use one of the techniques described here,” they write in a footnote. The word “here” is hyperlinked, but since the document is a PDF the link is inaccessible. No word about the dangers that Adobe PDFs pose. But the version of the manual the NSA released was last updated in 2007, so let’s hope later versions cover it.

May 1, 2013

Google Glass may not be evil, but it will enable lots of less-than-ethical activities

Filed under: Media, Technology — Tags: , , , , , — Nicholas @ 09:10

Jason Perlow on the current capabilities of Google Glass and the easy to envision upgrades that will soon be possible:

Because Glass is an Android device, runs an ARM-based Linux kernel, and can run Android user space programs and custom libraries, any savvy developer can create code that modifies the default behavior in such a way that recording can occur with no display activity showing in the eye prism whatsoever.

And while the default video recording is 10 seconds, code could also be written that begins and stops recording for as long as needed with a custom gesture or head movement, or even innocuous custom voice commands like: “Boy, I’m tired” to begin, and “Boy, I need coffee” to end it.

You could write and side load an application that polls the camera and takes a still photo every 30 seconds, should you say … want to “case” and thoroughly photodocument a place of business prior to committing a crime, or even engage in corporate espionage. Or simply capture ambient audio from unsuspecting people around you.

[. . .]

Once you have root on a Glass headset, any number of custom software packages could be installed without Google being able to prevent one from doing things that would make your hair stand on end, such as on-the-fly image and audio processing.

This is the kind of stuff that until now, only major intelligence agencies could do with very expensive surveillance equipment. Just wait until Israeli and Eastern European startups, which are staffed with former intelligence personnel who have a huge wealth of knowledge in using this kind of technology, get a hold of this thing.

April 21, 2013

Documentary War for the Web includes final interview with Aaron Swartz

Filed under: Liberty, Media, Technology — Tags: , , , , , — Nicholas @ 08:51

CNET‘s Declan McCullagh talks about an upcoming documentary release:

From Aaron Swartz’s struggles with an antihacking law to Hollywood’s lobbying to a raft of surveillance proposals, the Internet and its users’ rights are under attack as never before, according to the creators of a forthcoming documentary film.

The film, titled War for the Web, traces the physical infrastructure of the Internet, from fat underwater cables to living room routers, as a way to explain the story of what’s behind the high-volume politicking over proposals like CISPA, Net neutrality, and the Stop Online Piracy Act.

“People talk about security, people talk about privacy, they talk about regional duopolies like they’re independent issues,” Cameron Brueckner, the film’s director, told CNET yesterday. “What is particularly striking is that these issues aren’t really independent issues…. They’re all interconnected.”

The filmmakers have finished 17 lengthy interviews — including what they say is the last extensive one that Swartz, the Internet activist, gave before committing suicide in January — that have yielded about 24 hours of raw footage. They plan to have a rough cut finished by the end of the year, and have launched a fundraising campaign on Indiegogo that ends May 1. (Here’s a three-minute trailer.)

Swartz, who was charged under the Computer Fraud and Abuse Act, faced a criminal trial that would have begun this month and the possibility of anywhere from years to over a decade in federal prison for alleged illegal downloads of academic journal articles. He told the filmmakers last year, in an interview that took place after his indictment, that the U.S. government posed a more serious cybersecurity threat than hackers:

    They cracked into other countries’ computers. They cracked into military installations. They have basically initiated cyberwar in a way that nobody is talking about because, you know, it’s not some kid in the basement somewhere — It’s President Obama. Because it’s distorted this way, because people talk about these fictional kids in the basement instead of government officials that have really been the problem, it ends up meaning that cybersecurity has been an excuse to do anything…

    Now, cybersecurity is important. I think the government should be finding these vulnerabilities and helping to fix them. But they’re doing the opposite of that. They’re finding the vulnerabilities and keeping them secret so they can abuse them. So if we do care about cybersecurity, what we need to do is focus the debate not on these kids in a basement who aren’t doing any damage — but on the powerful people, the people paying lots of money to find these security holes who then are doing damage and refusing to fix them.

April 8, 2013

French intelligence agency discovers the power of the “Streisand Effect”

Filed under: Europe, France, Government, Media — Tags: , , — Nicholas @ 10:04

The French Central Directorate of Interior Intelligence (DCRI) didn’t appreciate that Wikipedia had an article on one of their installations (link is to the English version of the page in question), so they asked to have it removed. However, because they wouldn’t specify what information in the article was sensitive (even though it was largely based on a French TV broadcast), the Wikipedia editors turned down the request. The DCRI then channelled their inner thug:

Wikipedia refused to delete it, and then things took a nasty turn, as a press release from the Wikimedia Foundation explains:

    Unhappy with the Foundation’s answer, the DCRI summoned a Wikipedia volunteer in their offices on April 4th. This volunteer, which was one of those having access to the tools that allow the deletion of pages, was forced to delete the article while in the DCRI offices, on the understanding that he would have been held in custody and prosecuted if he did not comply. Under pressure, he had no other choice than to delete the article, despite explaining to the DCRI this is not how Wikipedia works.

As the Wikimedia Foundation goes on to note:

    This volunteer had no link with that article, having never edited it and not even knowing of its existence before entering the DCRI offices. He was chosen and summoned because he was easily identifiable, given his regular promotional actions of Wikipedia and Wikimedia projects in France.

This is very similar to the situation discussed last week, where Benjamin Mako Hill seems to have been targeted because he, too, was easily identifiable. As we noted then, putting pressure on Wikipedia volunteers in this way is extremely problematic, since it naturally discourages others from helping out.

How did the DCRI learn about the Streisand Effect?

… the deleted article is, of course, back on line, in French and a dozen other languages. Moreover, the DCRI’s ham-fisted attempt to censor an extremely obscure Wikipedia page that hardly anyone ever visited, has achieved exactly the opposite effect: in the last few days, the page has been viewed over 45,000 times.

March 27, 2013

MI5 and GCHQ will include assistance from the IT industry in the fight against online crime

Filed under: Britain, Government, Technology — Tags: , , , , — Nicholas @ 08:42

Two of the British government’s top intelligence agencies will team up with specialists from the IT field in a new initiative to counter online “cyber” crime:

Cyber-security experts from industry are to operate alongside the intelligence agencies for the first time in an attempt to combat the growing online threat to British firms.

The government is creating a so-called fusion cell where analysts from MI5 and GCHQ, the domestic eavesdropping agency, will work with private sector counterparts.

The cell is part of the Cyber Security Information Sharing Partnership (Cisp), launched on Wednesday, to provide industry with a forum to share details of techniques used by hackers as well as methods of countering them.

At any one time there will be about 12 to 15 analysts working at the cell, based at an undisclosed location in London.

“What the fusion cell will be doing is pulling together a single, richer intelligence picture of what is going on in cyberspace and the threats attacking the UK,” a senior official said.

John Leyden at The Register has more:

The programme, which follows a successful pilot scheme in 2011, is designed to support the wider aims of the UK’s cyber security strategy: such as making Britain the best country in the world to do e-business and protecting critical components of the national infrastructure (ie banks, utilities, telecoms and power grid).

Eighty companies from five key sectors of the economy — finance, defence, energy, telecommunications and pharmaceuticals — were encouraged to share information as part of the pilot scheme. The wider programme (involving a reported 160 organisations, at least initially) will allow access to a secure web-portal to gain access to shared threat intelligence information in real time, the BBC reports.

[. . .]

Terry Greer-King, UK MD for internet security firm Check Point, commented:

“This is a key step forward for both Governments and business in fighting web attacks, and reducing their impact. It’s essential that organisations collaborate and share intelligence with each other to track emerging threats, mitigate their severity or block them before they cause damage. Fighting threats together is much more effective than fighting alone.”

“In 2012, our research found that 63 per cent of organisations were infected with bots, and 54 per cent infected with malware that they didn’t know about. Any move which helps to reduce these figures is very welcome,” he added.

March 20, 2013

The Profumo affair in context

Filed under: Britain, History, Media — Tags: , , , — Nicholas @ 10:06

In History Today, Richard Weight reviews An English Affair: Sex, Class and Power in the Age of Profumo by Richard Davenport-Hines which is being published on the 50th anniversary of the Profumo affair:

Meticulous though he is in separating historical fact from tabloid fiction, Davenport-Hines does not unearth any new secrets about the Profumo Affair. The originality of the book lies in the way he places it in the context of mid-20th century social attitudes. This, as the author says, is ‘a study of milieux’. An accomplished biographer, he puts colour on the cheeks and sparkle in the eyes of the main protagonists in a series of beautifully written portraits. We get to know fully Stephen Ward, for example – the high society osteopath who became the scapegoat of the affair – as a closet homosexual and vain Walter Mitty character, whose social climbing stemmed partly from the fact that osteopathy was dismissed by the medical establishment as ‘a modish form of cosseting’. Ward helped introduce the 46-year-old secretary of state for war, Jack Profumo, to the 19-year-old showgirl, Christine Keeler, at a pool party in the grounds of Cliveden on a July weekend in 1961. Soon after they began the fateful affair that linked him, via pillow talk and paranoia, to a Soviet military attaché that Keeler knew.

[. . .]

Jack Profumo typified British male attitudes: he had forced his wife, the actress Valerie Hobson, to give up her career for the sake of his image, before taking the lover who was raised in a converted railway carriage near Staines. The author describes Keeler and her friend Mandy Rice-Davies as ‘good-time girls who refused to be doormats’ – a new breed of ambitious women less willing to shut up once they had served their purpose. In a sense, Keeler anticipated the glamorous defiance of ‘the People’s Princess’ in the 1990s. And, like Diana Spencer’s, this is a story about the vacuity of the British people as much as it is a story about the hypocrisy of their leaders.

Davenport-Hines also confronts race, the subject usually ignored by historians of the affair. It was the jealous fight between two of Keeler’s black boyfriends outside the Flamingo Club in 1962 that led to a shooting through which the press got hold of the Profumo story. Then a taboo in a predominantly racist country, inter-racial sex gave the cocktail of cross-class transgression an extra shot of liqueur for the public to enjoy. Yet, as the author observes, the Flamingo Club was a multiracial Soho jazz venue then favoured by the ‘hip white Mods’ of Britain’s first youth culture. In other words the Profumo Affair didn’t so much change Britain as reveal how much it was already changing underneath the cracked surface of prudery and prejudice.

Barack’s secret spying club

Filed under: Government, Law, Liberty, USA — Tags: , , , , , — Nicholas @ 09:23

In Reason, Jacob Sullum explains why the ruling against the promiscuous use of National Security Letters was needed:

After 9/11, Congress loosened restrictions on national security letters (NSLs), a kind of administrative subpoena, first authorized in 1986, that the FBI uses to demand information from phone companies, Internet service providers, and financial institutions. According to the Justice Department’s inspector general, NSL “requests” skyrocketed from a total of 8,500 between 1986 and 2000 to more than 56,000 in 2004 alone.

The Obama administration has made liberal use of NSLs, which in 2010 allowed the FBI to peruse information about 14,212 American citizens and permanent residents — a new record — without bothering to get clearance from a judge. If you were one of those people, the odds are that you will never know, because NSLs are almost always accompanied by instructions that prohibit recipients from discussing them.

[. . .]

Secrecy frustrates challenges to counterterrorism tactics even in the case of Obama’s most startling claim to executive power: the authority to kill people he identifies as members or allies of Al Qaeda. In January a federal judge ruled that the Freedom of Information Act does not require Obama to disclose the Justice Department memos that explain the legal rationale for this license to kill.

U.S. District Judge Colleen McMahon expressed frustration with this result, saying, “I can find no way around the thicket of laws and precedents that effectively allow the Executive Branch of our Government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws, while keeping the reasons for their conclusion a secret.” In his State of the Union address the following month, Obama promised to make his “targeting” of suspected terrorists “even more transparent.” I’ll disbelieve it when I don’t see it.

February 28, 2013

North Korea struggling with loss of faith in the state

Filed under: Asia, China, Government — Tags: , , , , , — Nicholas @ 08:50

Strategy Page on the challenges facing the government as the younger generation grows up:

A major source of information about North Korea is obtained by South Korean intelligence experts interviewing the steady flow of refugees arriving in South Korea (via China and the South Korean embassies in neighboring countries like Thailand). For the last decade, over a thousand of these refugees have arrived each year. In the last few years China and North Korea have increased their efforts to reduce that number, which peaked at 2,900 in 2009 and was 1,500 last year. These determined and desperate people keep coming. Separate interviews are compared and checked against each other to obtain an updated and accurate first-hand view of life in the north. This also helps detect the spies North Korea tries (often with success) getting into the south via the refugee route. While the refugees detail the growing decline in living standards up north, it’s also become clear that there is a very real generational shift in loyalties in the north. The generation who grew up during the 1990s famine (that killed about ten percent of the population and starved most of the rest for years) no longer believe in the North Korean dictatorship. Many who came of age before 1990 still do, but for most everyone under 30 the state is the enemy and self-reliance, and not a benevolent dictatorship, is the only way to survive. The North Korean government has been fighting these attitudes more and more, as this generation of unbelievers grows larger each year. The more astute members of the northern leadership see this as a no-win situation. Eventually most North Koreans will be very hostile to the state and more adept at making money in spite of the government, or simply getting out of the country. Most of the leadership is still afraid of enacting Chinese style economic reforms because they believe a more affluent population would seek revenge for the decades of misrule and tyranny. The Chinese say that didn’t happen in China. The North Koreans point out that, as bad as the Chinese communists were in the 1950s and 60s (killing over 50 million people via starvation, labor camps and execution) that was not as bad (proportionately) as what the North Koreans have suffered. Moreover, the North Korean leaders point out that, historically, Koreans have been a bit more excitable and brutal when aroused by misrule. The Chinese say times have changed but the North Korean leaders are not yet willing to bet their lives on that being the case.

The refugees report that most North Koreans understand that the police state up there is strong enough to suppress any uprising now or in the foreseeable future and that the only real threat to the dictatorship is intervention (openly or via a coup) by China. Refugees also report that it’s common knowledge that hundreds of North Koreans have died of radiation poisoning or been born with birth defects because of the uranium mining and working with nuclear materials. The government has responded by offering large cash bonuses to those who will work in the uranium mines. The refugees report in detail many other ways the Kim government abuses their subjects.

Cybersecurity … can it be anything more than fear + handwaving = “we must have a law!”

Filed under: Business, Government, Law, Technology — Tags: , , , , , — Nicholas @ 00:01

At Techdirt, Mike Masnick fisks “the worst article you might ever read about ‘Cybersecurity'”:

There has been a lot of discussion lately about “cybersecurity” “cyberwar” “cyberattacks” and all sorts of related subjects which really really (really!) could do without the outdated and undeniably lame “cyber-” prefix. This is, in large part, due to the return of CISPA along with the White House’s cybersecurity executive order. Of course, the unfortunate part is that we’re still dealing in a massive amount of hype about the “threats” these initiatives are trying to face. They’re always couched in vague and scary terms, like something out of a movie. There are rarely any specifics, and the few times there are, there is no indication how things like CISPA would actually help. The formula is straightforward: fear + handwaving = “we must have a law!”

However, I think we may now have come across what I believe may top the list of the worst articles ever written about cybersecurity. If it’s not at the top, it’s close. It is by lawyer Michael Volkov, and kicks off with a title that shows us that Volkov is fully on board with new laws and ramping up the FUD: The Storm Has Arrived: Cybersecurity, Risks And Response. As with many of these types of articles, I went searching for the evidence of these risks, but came away, instead, scratching my head, wondering if Volkov actually understands this subject at all, with his confused thinking culminating in an amazing paragraph so full of wrong that almost makes me wonder if the whole thing is a parody.

[. . .]

There’s been plenty of talk about these Chinese hacks, which definitely do appear to be happening. But, what economic activity has been undermined? So far, the hacks may have been a nuisance, but it’s unclear that they’ve done any real damage. It is also unclear how CISPA helps stop such hacks, other than making Congress feel like it’s “done something.”

Are there issues with online security that need to be taken seriously? Yes, absolutely. Do we need legislation to deal with those problems? That’s debatable, and we’re still waiting for some evidence not just of scary sounding threats, but that this kind of legislation will actually help. Unfortunately, this article keeps us waiting. But, it did make us laugh. Unintentionally (we think).

« Newer PostsOlder Posts »

Powered by WordPress