netwit 2.01

#INTERNET #privacy #digitalforensics [@4ensics] ~ On the Web, Children Face Intensive Tracking:

On the Web, Children Face Intensive Tracking


Steve Stecklow, Wall Street Journal, 17 Sept 2010


Shunned Profiling Technology on the Verge of Comeback

* On the reappearence of badform wiki:Phorm

In my scrabble to Rolodex this blog, I haven’t bothered to make any comments of my own, letting the trend of the material indicate where I am coming from/going to. It isn’t difficult to imagine Govt 1.0 scrambling to find technologies to help them keep ahead of their populations. Govt 2.0 and Citizen 2.0 evident in many places: it won’t be long before there is talk of Govt 3.0, which will be another way of talking P2P politics/society qua Michel Bauwens

January 12, 2011 Posted by | actor-network theory, asset misuse, Citizen 2.0, connective knowledge, connectivism, conspiracy, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cypherpunk, digital forensics, encryption, Govt 3.0, hacker culture, Internet, Julian Assange, National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, Network security, network theory, on-line rights, Open data, open source, Phorm, privacy, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, Web 2.0, Web 3.0, WikiLeaks | Leave a comment

WIKILEAKS Is not Wikipedia {Just in case you’ve been away for years in the Borneo jungle}

Colbert vs. Wikipedia

Just imagine WikiLeaks was a wiki and there was a bidding war to change the US embassy cable data.

December 26, 2010 Posted by | asset misuse, The Colbert Report, U.S.Embassy cables, WikiLeaks | Leave a comment

INTERNET WEB WIKILEAKS The wider perspective

DebateGraph : WikiLeaks

December 23, 2010 Posted by | asset misuse, broadband, Bruno Latour, Citizen 2.0, compliance, connective knowledge, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyberspace, data journalism, data leakage, DebateGraph, Department of Homeland Security, digital journalism, Government 2.0, Guardian, insider threats, Internet, Iraq war logs, Julian Assange, Manning, MTI, National Center for Cybersecurity and Communications (NCCC), net neutrality, network anomalies, Network security, network theory, Open data, PCNAA, Protecting Cyberspace as a National Asset Act (PCNAA), public statistics, RIIA, rogue employee, Semantic Web, SIPRNET, Tim Burners-Lee, U.S.Embassy cables, Web 2.0, Web 3.0, WikiLeaks | Leave a comment

WIKILEAKS How did Bradley Manning remove data from a US government intranet?

Insider Threat Behind Wikileaks Cybersecurity Saga

…according to the published chatlog of a conversation that Manning had with a fellow-hacker. “I would come in with music on a CD-RW labelled with something like ‘Lady Gaga’ … erase the music … then write a compressed split file. No one suspected a thing … [I] listened and lip-synched to Lady Gaga’s Telephone while exfiltrating possibly the largest data spillage in American history.” He said that he “had unprecedented access to classified networks 14 hours a day 7 days a week for 8+ months”.

Wikileaks cybersecurity saga shows importance of insider threats

Amichai Shulman, chief technology officer of data security specialist Imperva:

…there are hackers out there, but IT history has shown that the rogue employee is also a threat. The banking community is now starting to take action to protect its assets, but organisations have a long way to go before they can truly tackle the very real risks that insider threats pose to their reputation and integrity

… is very difficult today for organisations to control access to files at an individual level – particularly with collaborative behaviour being encouraged.

December 21, 2010 Posted by | asset misuse, cyber security, data leakage, Guardian, insider security, Iraq war logs, Julian Assange, Network security, rogue employee, WikiLeaks | Leave a comment


” In many ways we can be described as data we send or receive in today’s network connected environment ”

Chief Technology Officer, NetWitness

“Accessing captured content for network investigations….”

“…A revolutionary new way to Visualize network traffic, NetWitness Visualize brings the data to you in a dynamic and interactive interface that anyone can interpret.”

Network forensics gets a ‘Minority Report’-style UI
– A network security traffic analysis tool, sporting a wicked UI, heralds a new era of easy cyber forensics

NetWitness NextGen

Know Your Network Like Never Before. Move into the Next Generation of Network Security Monitoring. NetWitness NextGen™.

NetWitness NextGen is the most comprehensive network security monitoring solution ever developed. It is the industry’s first security monitoring software that records everything on the network, re-using it multiple times to solve some of the most challenging problems facing organizations today: insider threats, data leakage, malware activity, asset misuse, network anomalies, compliance, and network e-discovery.

The Threat Landscape
We all can read the headlines – organizations are being hit every day and we are in the middle of an ongoing cyber war.

The external threats are clear and present:

* State-sponsored intrusions and data exfiltrations
* Non-state actors and terrorist groups
* Well-funded and highly-sophisticated organized crime and espionage rings

There are serious problems inside our organizations too:

* Disgruntled employees
* Criminals
* Misconfiguration of systems and networks
* User errors and lack of security awareness
* Volumes of regulatory challenges

The Historical Response
Typical security investments to date have focused on creating islands or layers of protection by installing point solutions that detect a specific problem, issue or threat. Your adversaries don’t think about security as a set of “issues” for which there are multiple answers – they think about how to use the network to get to your data. An effective approach requires organizations to stop deploying point solutions that create protection gaps and overlaps, and start thinking about security as a single requirement.

NetWitness Informer [You can play a bit with the software]

NetWitness Investigator

How do you resolve alerts from your IDS or SIM that you do not understand?
Can you quickly understand the scope and impact of malicious activity on your network?
How can you investigate who is leaking information to your competitors or the press?

Introducing NetWitness Visualize

A revolutionary new way to Visualize network traffic, NetWitness Visualize brings the data to you in a dynamic and interactive interface that anyone can interpret. Included in Informer 2.0, this new feature leverages the award-winning NetWitness NextGen network capture and analysis infrastructure to automatically retrieve and display images, documents, audio and VoIP conversations of interest. Speed up investigations, monitor sensitive documents, and uncover a view of your IT infrastructure that you’ve never seen before.

December 18, 2010 Posted by | asset misuse, compliance, data journalism, data leakage, digital journalism, insider threats, network anomalies, network e-discovery, Network security, network theory, visualisation, WikiLeaks | Leave a comment