Quotulatiousness

June 23, 2013

Two remarkable press releases on the Snowden case

Filed under: China, Government, Law, Russia, USA — Tags: , , , , , — Nicholas @ 10:46

First, here’s the official Hong Kong government’s statement:

Mr Edward Snowden left Hong Kong today (June 23) on his own accord for a third country through a lawful and normal channel.

The US Government earlier on made a request to the HKSAR Government for the issue of a provisional warrant of arrest against Mr Snowden. Since the documents provided by the US Government did not fully comply with the legal requirements under Hong Kong law, the HKSAR Government has requested the US Government to provide additional information so that the Department of Justice could consider whether the US Government’s request can meet the relevant legal conditions. As the HKSAR Government has yet to have sufficient information to process the request for provisional warrant of arrest, there is no legal basis to restrict Mr Snowden from leaving Hong Kong.

The HKSAR Government has already informed the US Government of Mr Snowden’s departure.

Meanwhile, the HKSAR Government has formally written to the US Government requesting clarification on earlier reports about the hacking of computer systems in Hong Kong by US government agencies. The HKSAR Government will continue to follow up on the matter so as to protect the legal rights of the people of Hong Kong.

And here’s a statement from Wikileaks:

Mr Edward Snowden, the American whistleblower who exposed evidence of a global surveillance regime conducted by US and UK intelligence agencies, has left Hong Kong legally. He is bound for a democratic nation via a safe route for the purposes of asylum, and is being escorted by diplomats and legal advisors from WikiLeaks.

Mr Snowden requested that WikiLeaks use its legal expertise and experience to secure his safety. Once Mr Snowden arrives at his final destination his request will be formally processed.

Former Spanish Judge Mr Baltasar Garzon, legal director of Wikileaks and lawyer for Julian Assange has made the following statement:

“The WikiLeaks legal team and I are interested in preserving Mr Snowden’s rights and protecting him as a person. What is being done to Mr Snowden and to Mr Julian Assange — for making or facilitating disclosures in the public interest — is an assault against the people”.

To the vast amusement of many commentators, the reported route out of Hong Kong leads to Russia, with other stopping points including Cuba and Venezuela. It’s like a free press/civil liberties tour of the planet!

June 22, 2013

US charges against Snowden were filed on June 14th

Filed under: China, Government, Law, USA — Tags: , , , , — Nicholas @ 09:10

It apparently takes a week for the US government to publicize that it has laid charges

Federal prosecutors filed espionage charges against alleged National Security Agency leaker Edward Snowden, officials familiar with the process said. Authorities have also begun the process of getting Snowden back to the United States to stand trial.

The charges were filed June 14 under seal in federal court in Alexandria, Va. — and only disclosed Friday.

Snowden has been charged with three violations: theft of government property and two offenses under the espionage statutes, specifically giving national defense information to someone without a security clearance and revealing classified information about “communications intelligence.”

Each of the charges carries a maximum of 10 years in prison.

Snowden, who is a former employee of defense contractor Booz Allen Hamilton, leaked details about far-reaching Internet and phone surveillance programs to The Guardian and The Washington Post earlier this month. He revealed his identity while in Hong Kong, where it is believed he is still hiding.

It’s not clear whether the extradition will be straightforward:

Andy Tsang, Hong Kong’s police commissioner, said that if an extradition request was sent from a country that had a “mutual legal assistance agreement” with Hong Kong, its government would “handle it in accordance with current Hong Kong laws and systems.”

Simon Young, a professor at Hong Kong University’s faculty of law, suggested it was unclear whether Snowden would win or lose any attempt to fight extradition.

He said theft was listed in the U.S.-Hong Kong extradition treaty. “There is an offence listed in the treaty of unlawful handling of property, but this raises the question as to whether information is property and the answer is not clear,” he said in an email.

June 14, 2013

Reason.tv – Tap It: The NSA Slow Jam

Filed under: Government, Humour, Liberty, Technology, USA — Tags: , , , , — Nicholas @ 11:07

June 11, 2013

“Who hired this goofball?”

Filed under: Government, Media, USA — Tags: , , , , — Nicholas @ 09:22

Jim Geraghty talks about Edward Snowden and the NSA:

Everybody’s going to have an opinion on Edward Snowden, today the world’s most famous leaker.

In the coming days, you’re going to see a lot of people talking past each other, conflating two issues: one, did he do the right thing by disclosing all these details of the vast NSA system to gather data on Americans? And two, should he be prosecuted for it?

Of course, you can do the right thing and still break the law.

[. . .]

This may be a story with no heroes. A government system designed to protect the citizens starts collecting all kinds of information on people who have done nothing wrong; it gets exposed, in violation of oaths and laws, by a young man who doesn’t recognize the full ramifications of his actions. The same government that will insist he’s the villain will glide right past the question of how they came to trust a guy like him with our most sensitive secrets. Who within our national security apparatus made the epic mistake of looking him over — completing his background check and/or psychological evaluation — and concluding, “yup, looks like a nice kid?”

Watching the interview with Snowden, the first thing that is quite clear is that his mild-mannered demeanor inadequately masks a huge ego — one of the big motivations of spies. (Counterintelligence instructors have long offered the mnemonic MICE, for money, ideology, compromise, ego; others throw in nationalism and sex.)

Snowden feels he has an understanding of what’s going on well beyond most of his colleagues:

    When you’re in positions of privileged access like a systems administrator for the sort of intelligence community agencies, you’re exposed to a lot more information on a broader scale then the average employee and because of that you see things that may be disturbing but over the course of a normal person’s career you’d only see one or two of these instances. When you see everything you see them on a more frequent basis and you recognize that some of these things are actually abuses.

What’s more, he feels that no one listens to his concerns or takes them seriously:

    And when you talk to people about them in a place like this where this is the normal state of business people tend not to take them very seriously and move on from them. But over time that awareness of wrongdoing sort of builds up and you feel compelled to talk about. And the more you talk about the more you’re ignored. The more you’re told its not a problem until eventually you realize that these things need to be determined by the public and not by somebody who was simply hired by the government.”

My God, he must have been an insufferable co-worker.

    ‘Look, you guys just don’t understand, okay? You just can’t grasp the moral complexities of what I’m being asked to do here! Nobody here really gets what’s going on, or can see the big picture when you ask me to do something like that!’

    ‘Ed, I just asked if you could put a new bottle on the water cooler when you get a chance.’

Update: Politico put together a fact sheet on what we know about Edward Snowden. It’s best summed up by Iowahawk:

June 10, 2013

Edward Snowden is “one of America’s most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning”

Filed under: Government, Liberty, Media, USA — Tags: , , , , , — Nicholas @ 08:03

The identity of the NSA whistleblower is revealed by the Guardian:

The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell.

The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. “I have no intention of hiding who I am because I know I have done nothing wrong,” he said.

Snowden will go down in history as one of America’s most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning. He is responsible for handing over material from one of the world’s most secretive organisations — the NSA.

[. . .]

He does not fear the consequences of going public, he said, only that doing so will distract attention from the issues raised by his disclosures. “I know the media likes to personalise political debates, and I know the government will demonise me.”

Despite these fears, he remained hopeful his outing will not divert attention from the substance of his disclosures. “I really want the focus to be on these documents and the debate which I hope this will trigger among citizens around the globe about what kind of world we want to live in.” He added: “My sole motive is to inform the public as to that which is done in their name and that which is done against them.”

He has had “a very comfortable life” that included a salary of roughly $200,000, a girlfriend with whom he shared a home in Hawaii, a stable career, and a family he loves. “I’m willing to sacrifice all of that because I can’t in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they’re secretly building.”

June 9, 2013

QotD: Whistleblowers

Filed under: Government, Media, Quotations, USA — Tags: , , , , — Nicholas @ 09:36

The U.S. government is on a secrecy binge. It overclassifies more information than ever. And we learn, again and again, that our government regularly classifies things not because they need to be secret, but because their release would be embarrassing.

Knowing how the government spies on us is important. Not only because so much of it is illegal — or, to be as charitable as possible, based on novel interpretations of the law — but because we have a right to know. Democracy requires an informed citizenry in order to function properly, and transparency and accountability are essential parts of that. That means knowing what our government is doing to us, in our name. That means knowing that the government is operating within the constraints of the law. Otherwise, we’re living in a police state.

We need whistle-blowers.

Leaking information without getting caught is difficult. It’s almost impossible to maintain privacy in the Internet Age. The WikiLeaks platform seems to have been secure — Bradley Manning was caught not because of a technological flaw, but because someone he trusted betrayed him — but the U.S. government seems to have successfully destroyed it as a platform. None of the spin-offs have risen to become viable yet. The New Yorker recently unveiled its Strongbox platform for leaking material, which is still new but looks good. This link contains the best advice on how to leak information to the press via phone, email, or the post office. The National Whistleblowers Center has a page on national-security whistle-blowers and their rights.

Bruce Schneier, “What We Don’t Know About Spying on Citizens: Scarier Than What We Know”, The Atlantic, 2013-06-06

June 8, 2013

Don’t put too much faith in denials from Verizon and other companies…

Filed under: Business, Government, Law, Liberty, Technology — Tags: , , , , , — Nicholas @ 10:10

As Mic Wright points out, the companies named in the Prism leaks may not be acting as free agents:

Pastor Niemoller’s “First they came…” poem is over-quoted but with good reason. It is far too easy to be complacent. Addicted and reliant as many of us are on free web services, it’s more convenient to just accept the companies outright denials that they have been complicit with the NSA’s programme. But look closely at those statements and things become rather less clear, as Michael Arrington pointed out.

The tech industry’s denials have been carefully drafted and similarly worded. It is not unfeasible to imagine that those companies have turned over users’ personal information to the NSA in another fashion. Facebook founder and CEO Mark Zuckerberg’s statement was one of the strongest: “Facebook is not and has never been part of any program to give the US or any other government direct access to our servers. We have never received a blanket request or court order from any government agency asking for information…”

Zuckerberg’s words are reassuring until you consider that any company that receives an order under the Foreign Intelligence Surveillance Act Amendments Act — the legislation the Obama administration is using to justify the broad surveillance — is forbidden from disclosing they have received it or disclosing any information about it. It’s not surprising that no mea culpas have emerged from major tech firms or that Palantir — the big data surveillance company with the $5 billion valuation and CIA funding — denies any connection with the project. The NSA has been a Palantir client and one of the company’s co-founders, billionaire investor Peter Thiel, also sits on Facebook’s board.

Charles Stross talks about writing The Jennifer Morgue

Filed under: Books, Britain, Business, Media — Tags: , , , — Nicholas @ 09:07

If you haven’t yet read any of the “Laundry” books by Charles Stross, you really are missing out on a treat. The Jennifer Morgue was the second in the series and Charles has a blog post up about how the book came to be written:

All stories have several seeds. In the case of “The Jennifer Morgue”, the first seed was the surprising success of “The Atrocity Archives”. The novel my agent initially thought was unsaleable sold to Golden Gryphon, a small but respectable Lovecraftian publisher in the United States. It went gold, going into reprint and becoming their second-best selling title at the time. Then, to everyone’s surprise, the additional novella I wrote for the book (“The Concrete Jungle”) made the shortlist for the Hugo award in 2005. This was a stunning surprise. GG had only sold around 3000 copies of the book; the other novellas on the shortlist had all appeared in magazines or anthologies with four to ten times the number of copies sold! After some hurried email consultation, Gary and Marty at GG agreed to let me put the whole novella on the web, to make it more readily available to the Hugo voters. I don’t know if that’s what did the trick, or if there were additional home-mover effects from the Worldcon in 2005 being held in Glasgow (thus bringing more British voters in than normal) but at the end of August that year I became the dazed and surprised owner of a very shiny trophy.

(And the performance anxiety that had been haunting me for years—”I’m not a real writer, I’m just winging this”—went away for a while.)

But anyway. This success coincided with a French publisher making an offer for translation rights to “The Atrocity Archives”, which in turn got my agent’s attention. She proposed a sequel, and James Bond was so obvious that I don’t think I even considered any alternatives. It would have to be the Movie Bond franchise, for most people these days don’t grow up on the original Ian Fleming novels (the way I did); the humour would come from the incongruity of Bob Howard in James Bond’s shoes. We decided to auction the new book, along with paperback rights to “The Atrocity Archives”, and ended up cutting a deal whereby Golden Gryphon would publish “The Jennifer Morgue” in hardcover while Ace rolled “The Atrocity Archives” in trade paperback, and eventually in mass market. Which then left me pondering what to write … because every Bond movie (or novel) needs a Bond-sized plot device, doesn’t it?

By this time we were into late October 2005. One evening, we were eating a Chinese take-away in front of the TV, watching a documentary on the Discovery Channel about one of the most bizarre CIA projects to happen during the Cold War — Project Azorian (better, but mistakenly, known to the public as “Operation Jennifer”). Seriously, if you don’t know about it, go follow that link right now; it’s about how the CIA enlisted Howard Hughes to help them build a 63,000 ton fake deep-see mining ship, the Glomar Challenger, as cover for a deep-sea grapple that would descend 4,900 metres and raise the hull of a shipwrecked Soviet nuclear missile submarine, the K-129. (Project Azorian was so James Bond that the engineering crew working on the ship were cracking jokes about the bald guy stroking the white cat in his seat on the bridge. How post-modern can you go?)

June 7, 2013

Who is Glenn Greenwald?

Filed under: Government, Law, Liberty, USA — Tags: , , , , — Nicholas @ 08:14

The New York Times profiles Glenn Greenwald:

After writing intensely, even obsessively, for years about government surveillance and the prosecution of journalists, Glenn Greenwald has suddenly put himself directly at the intersection of those two issues, and perhaps in the cross hairs of federal prosecutors.

Late Wednesday, Mr. Greenwald, a lawyer and longtime blogger, published an article in the British newspaper The Guardian about the existence of a top-secret court order allowing the National Security Agency to monitor millions of telephone logs. The article, which included a link to the order, is expected to attract an investigation from the Justice Department, which has aggressively pursued leakers.

On Thursday night, he followed up with an article written with a Guardian reporter, Ewen MacAskill, that exposed an N.S.A. program, Prism, that has gathered information from the nation’s largest Internet companies going back nearly six years.

“The N.S.A. is kind of the crown jewel in government secrecy. I expect them to react even more extremely,” Mr. Greenwald said in a telephone interview. He said that he had been advised by lawyer friends that “he should be worried,” but he had decided that “what I am doing is exactly what the Constitution is about and I am not worried about it.”

June 1, 2013

QotD: Internet espionage

Filed under: China, Humour, Quotations, Technology — Tags: , , , — Nicholas @ 08:26

A new report says that the Chinese are hacking American computer networks at an alarming rate. This is hardly news. I’ve been including the phrase “早安,我抱歉有沒有在這封電子郵件中的商業秘密或加拿大色情。請停止殺害酷動物啄木鳥醫學。剛剛買了一些偉哥了” at the bottom of every e-mail for months (I put it just above where it says “Hello Mr. Holder!”). It means, according to Google translate: “Good Morning, I’m sorry there’s no trade secrets or Canadian porn in this e-mail. Please stop killing cool animals for pecker medicine. Just buy some Viagra already.”

What is new is the scope of the problem the report lays out. This is a thorny issue and I think the U.S. needs to be much, much more aggressive in combating it. Why it’s not a bigger issue for the WTO, for instance, is baffling to me. They are stealing our stuff, which strikes me as a bigger deal than taxing it at the border.

Explaining to the Chinese leadership that they shouldn’t be doing this because it’s wrong is like explaining to a dog licking its nethers that what he’s doing is bad manners: To the extent they understand at all, they couldn’t care less. They respect power. They understand when you put a price on bad behavior. So we need to put a price on Chinese hacking. It’s really that simple. The hard thing to figure out is how.

Jonah Goldberg, “Chiiiiiicoms in (Cyber) Spaaaaaaaaaaaace!”, The Goldberg File, 2013-05-31

May 9, 2013

The NSA’s guide to hacking Google searches

Filed under: Technology, USA — Tags: , , , , — Nicholas @ 10:34

Wired‘s Kim Zetter on how the NSA recommends its own analysts get the best intelligence use out of Google and other online tools:

There’s so much data available on the internet that even government cyberspies need a little help now and then to sift through it all. So to assist them, the National Security Agency produced a book to help its spies uncover intelligence hiding on the web.

The 643-page tome, called Untangling the Web: A Guide to Internet Research (.pdf), was just released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to process public records for activists and others.

The book was published by the Center for Digital Content of the National Security Agency, and is filled with advice for using search engines, the Internet Archive and other online tools. But the most interesting is the chapter titled “Google Hacking.”

[. . .]

Stealing intelligence on the internet that others don’t want you to have might not be illegal, but it does come with other risks, the authors note: “It is critical that you handle all Microsoft file types on the internet with extreme care. Never open a Microsoft file type on the internet. Instead, use one of the techniques described here,” they write in a footnote. The word “here” is hyperlinked, but since the document is a PDF the link is inaccessible. No word about the dangers that Adobe PDFs pose. But the version of the manual the NSA released was last updated in 2007, so let’s hope later versions cover it.

May 1, 2013

Google Glass may not be evil, but it will enable lots of less-than-ethical activities

Filed under: Media, Technology — Tags: , , , , , — Nicholas @ 09:10

Jason Perlow on the current capabilities of Google Glass and the easy to envision upgrades that will soon be possible:

Because Glass is an Android device, runs an ARM-based Linux kernel, and can run Android user space programs and custom libraries, any savvy developer can create code that modifies the default behavior in such a way that recording can occur with no display activity showing in the eye prism whatsoever.

And while the default video recording is 10 seconds, code could also be written that begins and stops recording for as long as needed with a custom gesture or head movement, or even innocuous custom voice commands like: “Boy, I’m tired” to begin, and “Boy, I need coffee” to end it.

You could write and side load an application that polls the camera and takes a still photo every 30 seconds, should you say … want to “case” and thoroughly photodocument a place of business prior to committing a crime, or even engage in corporate espionage. Or simply capture ambient audio from unsuspecting people around you.

[. . .]

Once you have root on a Glass headset, any number of custom software packages could be installed without Google being able to prevent one from doing things that would make your hair stand on end, such as on-the-fly image and audio processing.

This is the kind of stuff that until now, only major intelligence agencies could do with very expensive surveillance equipment. Just wait until Israeli and Eastern European startups, which are staffed with former intelligence personnel who have a huge wealth of knowledge in using this kind of technology, get a hold of this thing.

April 21, 2013

Documentary War for the Web includes final interview with Aaron Swartz

Filed under: Liberty, Media, Technology — Tags: , , , , , — Nicholas @ 08:51

CNET‘s Declan McCullagh talks about an upcoming documentary release:

From Aaron Swartz’s struggles with an antihacking law to Hollywood’s lobbying to a raft of surveillance proposals, the Internet and its users’ rights are under attack as never before, according to the creators of a forthcoming documentary film.

The film, titled War for the Web, traces the physical infrastructure of the Internet, from fat underwater cables to living room routers, as a way to explain the story of what’s behind the high-volume politicking over proposals like CISPA, Net neutrality, and the Stop Online Piracy Act.

“People talk about security, people talk about privacy, they talk about regional duopolies like they’re independent issues,” Cameron Brueckner, the film’s director, told CNET yesterday. “What is particularly striking is that these issues aren’t really independent issues…. They’re all interconnected.”

The filmmakers have finished 17 lengthy interviews — including what they say is the last extensive one that Swartz, the Internet activist, gave before committing suicide in January — that have yielded about 24 hours of raw footage. They plan to have a rough cut finished by the end of the year, and have launched a fundraising campaign on Indiegogo that ends May 1. (Here’s a three-minute trailer.)

Swartz, who was charged under the Computer Fraud and Abuse Act, faced a criminal trial that would have begun this month and the possibility of anywhere from years to over a decade in federal prison for alleged illegal downloads of academic journal articles. He told the filmmakers last year, in an interview that took place after his indictment, that the U.S. government posed a more serious cybersecurity threat than hackers:

    They cracked into other countries’ computers. They cracked into military installations. They have basically initiated cyberwar in a way that nobody is talking about because, you know, it’s not some kid in the basement somewhere — It’s President Obama. Because it’s distorted this way, because people talk about these fictional kids in the basement instead of government officials that have really been the problem, it ends up meaning that cybersecurity has been an excuse to do anything…

    Now, cybersecurity is important. I think the government should be finding these vulnerabilities and helping to fix them. But they’re doing the opposite of that. They’re finding the vulnerabilities and keeping them secret so they can abuse them. So if we do care about cybersecurity, what we need to do is focus the debate not on these kids in a basement who aren’t doing any damage — but on the powerful people, the people paying lots of money to find these security holes who then are doing damage and refusing to fix them.

April 8, 2013

French intelligence agency discovers the power of the “Streisand Effect”

Filed under: Europe, France, Government, Media — Tags: , , — Nicholas @ 10:04

The French Central Directorate of Interior Intelligence (DCRI) didn’t appreciate that Wikipedia had an article on one of their installations (link is to the English version of the page in question), so they asked to have it removed. However, because they wouldn’t specify what information in the article was sensitive (even though it was largely based on a French TV broadcast), the Wikipedia editors turned down the request. The DCRI then channelled their inner thug:

Wikipedia refused to delete it, and then things took a nasty turn, as a press release from the Wikimedia Foundation explains:

    Unhappy with the Foundation’s answer, the DCRI summoned a Wikipedia volunteer in their offices on April 4th. This volunteer, which was one of those having access to the tools that allow the deletion of pages, was forced to delete the article while in the DCRI offices, on the understanding that he would have been held in custody and prosecuted if he did not comply. Under pressure, he had no other choice than to delete the article, despite explaining to the DCRI this is not how Wikipedia works.

As the Wikimedia Foundation goes on to note:

    This volunteer had no link with that article, having never edited it and not even knowing of its existence before entering the DCRI offices. He was chosen and summoned because he was easily identifiable, given his regular promotional actions of Wikipedia and Wikimedia projects in France.

This is very similar to the situation discussed last week, where Benjamin Mako Hill seems to have been targeted because he, too, was easily identifiable. As we noted then, putting pressure on Wikipedia volunteers in this way is extremely problematic, since it naturally discourages others from helping out.

How did the DCRI learn about the Streisand Effect?

… the deleted article is, of course, back on line, in French and a dozen other languages. Moreover, the DCRI’s ham-fisted attempt to censor an extremely obscure Wikipedia page that hardly anyone ever visited, has achieved exactly the opposite effect: in the last few days, the page has been viewed over 45,000 times.

March 27, 2013

MI5 and GCHQ will include assistance from the IT industry in the fight against online crime

Filed under: Britain, Government, Technology — Tags: , , , , — Nicholas @ 08:42

Two of the British government’s top intelligence agencies will team up with specialists from the IT field in a new initiative to counter online “cyber” crime:

Cyber-security experts from industry are to operate alongside the intelligence agencies for the first time in an attempt to combat the growing online threat to British firms.

The government is creating a so-called fusion cell where analysts from MI5 and GCHQ, the domestic eavesdropping agency, will work with private sector counterparts.

The cell is part of the Cyber Security Information Sharing Partnership (Cisp), launched on Wednesday, to provide industry with a forum to share details of techniques used by hackers as well as methods of countering them.

At any one time there will be about 12 to 15 analysts working at the cell, based at an undisclosed location in London.

“What the fusion cell will be doing is pulling together a single, richer intelligence picture of what is going on in cyberspace and the threats attacking the UK,” a senior official said.

John Leyden at The Register has more:

The programme, which follows a successful pilot scheme in 2011, is designed to support the wider aims of the UK’s cyber security strategy: such as making Britain the best country in the world to do e-business and protecting critical components of the national infrastructure (ie banks, utilities, telecoms and power grid).

Eighty companies from five key sectors of the economy — finance, defence, energy, telecommunications and pharmaceuticals — were encouraged to share information as part of the pilot scheme. The wider programme (involving a reported 160 organisations, at least initially) will allow access to a secure web-portal to gain access to shared threat intelligence information in real time, the BBC reports.

[. . .]

Terry Greer-King, UK MD for internet security firm Check Point, commented:

“This is a key step forward for both Governments and business in fighting web attacks, and reducing their impact. It’s essential that organisations collaborate and share intelligence with each other to track emerging threats, mitigate their severity or block them before they cause damage. Fighting threats together is much more effective than fighting alone.”

“In 2012, our research found that 63 per cent of organisations were infected with bots, and 54 per cent infected with malware that they didn’t know about. Any move which helps to reduce these figures is very welcome,” he added.

« Newer PostsOlder Posts »

Powered by WordPress