netwit 2.01

INTERNET WEB WIKILEAKS The wider perspective

DebateGraph : WikiLeaks

December 23, 2010 Posted by | asset misuse, broadband, Bruno Latour, Citizen 2.0, compliance, connective knowledge, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyberspace, data journalism, data leakage, DebateGraph, Department of Homeland Security, digital journalism, Government 2.0, Guardian, insider threats, Internet, Iraq war logs, Julian Assange, Manning, MTI, National Center for Cybersecurity and Communications (NCCC), net neutrality, network anomalies, Network security, network theory, Open data, PCNAA, Protecting Cyberspace as a National Asset Act (PCNAA), public statistics, RIIA, rogue employee, Semantic Web, SIPRNET, Tim Burners-Lee, U.S.Embassy cables, Web 2.0, Web 3.0, WikiLeaks | Leave a comment

CYBERSECURITY Richard E Clarke talk at 2010 Netwitness User Conference

The Three Challenges of Cyberspace: Cyber Crime, Cyber Espionage, and Cyber War


Richard Clarke

Former top counter-terrorism advisor under President Clinton, who later served as President Bush’s cybersecurity czar

* One important point he makes is the need for the governments to have control of packets

This means the filtering out of supect packets of data such as worms before they reach where they were intended to go. This throws us right back into the net neutrality debate. The ordinary compeletely untechnical person who begins to think, assumes this is happening anyway, but that we’re not told about it. What is reasonably widely known – through cases thrown up by the media – is that governments such as the U.S. have a legal right to demand data stored on servers in certain cases.

This leads to the debate about the electronic police state. Note in there, the extent to which the UK has gone. e.g. the MTI programme. ” GCHQ project called Mastering the Internet (MTI). It will include thousands of deep packet inspection probes inside communications providers’ networks”

Richard Clarke Citizenium entry gives full background

Fact or fiction?

You try to make up you mind:

The Attack Coming From Bytes, Not Bombs

Richard Clarke’s Cyberwar: File Under Fiction

December 21, 2010 Posted by | cyber crime, cyber espionage, cyber security, cyber terrorism, cyberspace, MTI | Leave a comment