netwit 2.01

WIKILEAKS POLITICS DIPLOMACY What we are supposed to have learnt from WikiLeaks



What We Learn From WikiLeaks

– Media paint flattering picture of U.S. diplomacy




December 21, 2010 Posted by | U.S.Embassy cables, WikiLeaks | Leave a comment

WIKILEAKS ASSANGE BBC Radio 4 Interview with John Humphries, 21 December 2010 – transcript



Transcript: The Assange interview



December 21, 2010 Posted by | WikiLeaks | Leave a comment

CYBERATTACK PRO-WIKILEAKS DIY DDoS



LOIC tool enables ‘easy’ WikiLeaks-driven DDoS attacks

 

“How was it that a loosely-coupled group of cyber-protestors could launch — with varying degrees of success — targeted distributed denial-of-service (DDoS) attacks against sites such as MasterCard, PayPal, PostFinance, and the website belonging to a Swedish prosecutor?

Turns out it’s quite simple. All an attacker need do is download the open source network stress testing tool known as LOIC (the Low Orbit Ion Cannon) that is widely available. Launching an attack with LOIC is mind-numbingly easy: just point and shoot. LOIC will then flood the target with HTTP requests, UDP and TCP packets.”

 






December 21, 2010 Posted by | cyber attacks, cyber security, cyber warfare, cyberspace, Network security, PostFinance | Leave a comment

CYBERSPACE Cyber Storm II National Cyber Exercise



Cyber Storm II National Cyber Exercise

Fact Sheet from Department of Home Security

DHS Kicks Off Next Cyber Security Excercise

 

In a nutshell graphically:

 

 



Right mouse into another tab for a larger version.


Department of Homeland Secuity Organisational chart




December 21, 2010 Posted by | cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyberspace, data leakage, Department of Homeland Security, insider security, insider threats, Internet, Network security, Protecting Cyberspace as a National Asset Act (PCNAA) | Leave a comment

WIKILEAKS THEORY Will Wikileaks help to end Internet freedom?



WikiLeaks: The Day the Internet Died

  • WikiLeaks was the perfect villian to help end Internet freedom. An introduction to Net Neutrality, Internet Blackouts, Cyber Security, and Seizing Domains.

Introduces the Lieberman “Kill” Bill, which is discussed further by Christina Gagnier in the Huffington Post (26 June 2010):



The “Kill” Bill: Obama, the Internet and the Beginning of a Congressional Odyssey



December 21, 2010 Posted by | Department of Homeland Security, National Center for Cybersecurity and Communications (NCCC), PCNAA, Protecting Cyberspace as a National Asset Act (PCNAA) | Leave a comment

WIKILEAKS How did Bradley Manning remove data from a US government intranet?



Insider Threat Behind Wikileaks Cybersecurity Saga

…according to the published chatlog of a conversation that Manning had with a fellow-hacker. “I would come in with music on a CD-RW labelled with something like ‘Lady Gaga’ … erase the music … then write a compressed split file. No one suspected a thing … [I] listened and lip-synched to Lady Gaga’s Telephone while exfiltrating possibly the largest data spillage in American history.” He said that he “had unprecedented access to classified networks 14 hours a day 7 days a week for 8+ months”.

Wikileaks cybersecurity saga shows importance of insider threats

Amichai Shulman, chief technology officer of data security specialist Imperva:

…there are hackers out there, but IT history has shown that the rogue employee is also a threat. The banking community is now starting to take action to protect its assets, but organisations have a long way to go before they can truly tackle the very real risks that insider threats pose to their reputation and integrity

…..it is very difficult today for organisations to control access to files at an individual level – particularly with collaborative behaviour being encouraged.




December 21, 2010 Posted by | asset misuse, cyber security, data leakage, Guardian, insider security, Iraq war logs, Julian Assange, Network security, rogue employee, WikiLeaks | Leave a comment

CYBER SECURITY “On Cyber Warfare” (A November 2010 Chatham House Report)



On Cyber Warfare

A Chatham House Report

November 2010

Paul Cornish, David Livingstone David Clememte, and Clare York

Royal Institute of International Affairs

It’s a biggie: 49 pages. But worth the effort. Final conclusion:

The crux of the problem, however, is that while there might be plenty of politics associated with actual or potential cyber warfare events around the world, we do not see that cyber warfare is a politically constrained phenomenon in the Clausewitzian
sense. We describe cyberspace as terra nullius, currently beyond the reach of mature political discourse. In other
words, it is the absence of a constraining political framework around cyber warfare that makes cyberspace so attractive
as a place in which to achieve cultural, religious, economic, social and even – paradoxically – political goals. We argue
that cyber warfare must be bounded by a Clausewitzian framework of analysis, and that framework must also be
transformed by cyber warfare. In this way national strategy will adapt to the emerging challenges of cyber warfare,
which will in turn be guided by the stabilizing norms and values that national strategy – and only national strategy –
can provide.




December 21, 2010 Posted by | cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyberspace, RIIA, Royal Institute of International Affairs | Leave a comment

INTERNET as defined by urban dictionary

 

Urban dictionary has three definitions of  internet

1.

A vast array of pornography and advertisements.

2.

A vast tundra of knowledge, now corrupted and slowly imploding on itself. Those caught on the outskirts enter a void of stupidity and insecurity. Eventually, it will completely cave in on itself, and then explode with such force, we will all be sent to an information oblivion. Random bits of intelligence will float amongst vast oceans of idiocy, and all of man kind will commit suicide in a futile effort to repent for creating such a weapon of mass destruction. God will not accept their sacrifice, and everyone will go to hell, where Satan will get pissed off at the extreme overpopulation of his facilities, and send everyone to someplace completely unihabitable, like Utah.

3.

the what?




December 21, 2010 Posted by | Internet | Leave a comment

NETWORK NEUTRALITY What is it? Is it a good thing?




The Wikipedia entry for network neutrality is detailed and a good starting point for anyone thinking of puzzling out for the first time which side they might be on. There are 100 references and a good selection of external links.

The inventor of the World Wide Web, Sir Tim Berner- Lee is all for it. He writes in Long Live the Web: A Call for Continued Open Standards and Neutrality ( Scientific American, 22 November 2010) of “..examining the world through a neutral communications medium”, the dangers of “walled gardens” within the web such as social networks like FaceBook, and the need to partition the design of the web from the Internet (“The two layers of technology work together but can advance independently.”)

Some of it is stirring stuff:

Looking back to the Magna Carta, we should perhaps now affirm: “No person or organization shall be deprived of the ability to connect to others without due process of law and the presumption of innocence.




December 21, 2010 Posted by | cyber crime, cyber espionage, cyber security, cyber terrorism, cyberspace, data journalism, data leakage, digital journalism, Government 2.0, Internet packet, net neutrality, Network security, network theory, Open data, Phorm, Tim Burners-Lee, WikiLeaks | Leave a comment

CYBERSECURITY Richard E Clarke talk at 2010 Netwitness User Conference



The Three Challenges of Cyberspace: Cyber Crime, Cyber Espionage, and Cyber War

By

Richard Clarke

Former top counter-terrorism advisor under President Clinton, who later served as President Bush’s cybersecurity czar

* One important point he makes is the need for the governments to have control of packets

This means the filtering out of supect packets of data such as worms before they reach where they were intended to go. This throws us right back into the net neutrality debate. The ordinary compeletely untechnical person who begins to think, assumes this is happening anyway, but that we’re not told about it. What is reasonably widely known – through cases thrown up by the media – is that governments such as the U.S. have a legal right to demand data stored on servers in certain cases.

This leads to the debate about the electronic police state. Note in there, the extent to which the UK has gone. e.g. the MTI programme. ” GCHQ project called Mastering the Internet (MTI). It will include thousands of deep packet inspection probes inside communications providers’ networks”

Richard Clarke Citizenium entry gives full background


Fact or fiction?

You try to make up you mind:

The Attack Coming From Bytes, Not Bombs

Richard Clarke’s Cyberwar: File Under Fiction


December 21, 2010 Posted by | cyber crime, cyber espionage, cyber security, cyber terrorism, cyberspace, MTI | Leave a comment