Category Archives: internet

Turkey threatens to block social media over released documents

The New York Times reports: Turkish officials threatened to shut down Twitter in the country unless the social-media company blocked the account of a left-wing newspaper that had circulated documents about a military police raid on Turkish Intelligence Agency trucks that were traveling to Syria last January.

The demand came on Thursday, a day after a local court in Adana, a southern Turkish province, issued an order barring coverage of the investigation, hinting at the possibility of an overall ban on social media networks where documents on legal proceedings of the raid have been circulated.

The court argued that publication of the information violated national security and interfered with a continuing inquiry. Turkish government officials strongly denied opposition claims that the intelligence agency’s trucks had carried weapons for extremists fighting the regime of President Bashar al-Assad in Syria.

Instead, the trucks were trying to deliver humanitarian aid for the Turkmen minority in Syria, who had been stranded in the conflict since 2011, officials said.

Networks like Twitter, Facebook and Google Plus complied with the court order on Wednesday, removing content from accounts to avert a shutdown, Turkish news outlets reported.

But the BirGun newspaper, as well as other Twitter users, continued to challenge the ban by posting new messages. Twitter refused to block the newspaper’s account but did block specific messages that BirGun had posted showing images of leaked documents in which the military police were said to have confirmed that the trucks contained weapons and explosives. The documents also said the weapons were destined for Al Qaeda. [Continue reading…]

Facebooktwittermail

A mysterious Twitter whistleblower is trying to take down the president of Turkey

Vice News reports: An anonymous whistleblower is captivating Turkey by tweeting revelations from the upper echelons of Turkish politics. The latest claims are the most explosive yet: The whistleblower says Turkish President Recep Tayyip Erdogan plotted terrorist-style attacks on Turkish civilians to frame his opponents.

The whistleblower, who operates on Twitter as Fuat Avni (@FuatAnvi, or @FuatAvniEng for tweets in English), claims he’s male, works alone, and is part of Erdogan’s inner circle. In Turkey, a country that ranks 154th out of 180 in the press freedom index compiled by Reporters without Borders, Fuat Avni has shattered the tightly controlled political discourse and enthralled Turks.

“Fuat Avni’s consistent credibility has established him as a reliable source of information,” Greg Barton, an expert on Turkish politics at Monash University, told VICE News. “The tweets are taken seriously because they have substance behind them; they predict something breaking that is then confirmed to be true.”

In the latest series of tweets, posted January 9, he claims Erdogan and the head of Turkey’s National Intelligence Organization, Hakan Fidan, are planning “a terror act that would kill dozens of innocent people in a large city,” while framing the Gülenists — a splinter faction of Erdogan’s government and his main opposition — for the attack. [Continue reading…]

Facebooktwittermail

Turkey seeks prison for TV presenter over tweet

The Associated Press: A local news agency says Turkish prosecutors are seeking up to five years in prison for a former television presenter who was detained last month for posting a tweet suggesting a cover-up in a government corruption scandal.

Private Dogan news agency reported Friday that Sedef Kabas was charged with “targeting public servants tasked with fighting against terrorism.”

She was questioned after telling her Twitter followers not to forget the name of a prosecutor who dropped a corruption and bribery probe earlier this year that implicated people close to President Recep Tayyip Erdogan.

Facebooktwittermail

‘ISIS’ hackers love American folk-punk, don’t know the name of their own terror group

The Daily Beast: A group calling itself the Cyber Caliphate hacked the Twitter and YouTube accounts for the U.S. military’s Central Command on Monday. “I Love you ISIS,” the group posted atop CENTCOM’s Twitter page, along with threats to American soldiers and a cache of documents it claimed to have hacked.

But all is not what it seems with the cyber jihadis. Privately, defense officials told The Daily Beast they were skeptical that the hacking was conducted by ISIS but said it was too early to say who carried out the attack.

And there are early signs that the Cyber Caliphate may be more of a ruse than a group of hardline Islamic extremists. One of the seven Twitter accounts it followed was “Andrew Jackson Jihad,” a folk punk bank from the American Southwest.

Facebooktwittermail

Obama gives speech on cybersecurity… @CENTCOM gets hacked

The Guardian reports: Barack Obama on Monday unveiled a slew of initiatives to improve Americans’ data security.

In a speech at the Federal Trade Commission, the president outlined proposals aimed at improving student data protection and protecting Americans’ financial health. They will, however, require approval from the Republican-majority Congress, which has already received three veto threats from the White House in less than a week in session.

“As we’ve all been reminded over the past year, including the hack of Sony, this extraordinary interconnection creates enormous opportunities but also creates enormous vulnerabilities for us as a nation,” Obama said.

Wired reports: Twitter and YouTube accounts belonging to the military’s US Central Command were hacked on Monday. Hackers supportive of the terrorist group Islamic State, also known as ISIS, took credit and issued a warning to the US military.

“AMERICAN SOLDIERS, WE ARE COMING, WATCH YOUR BACK. ISIS,” the hackers tweeted through the account for the US Central Command, which is the military command for the Middle East, North Africa, and Central Asia. The tweet included a link to a statement that read in part:

“While the US and its satellites kill our brothers in Syria, Iraq and Afghanistan we broke into your networks and personal devices and know everything about you,” it read. “You’ll see no mercy infidels. ISIS is already here, we are in your PCs, in each military base. With Allah’s permission we are in CENTCOM now. We won’t stop! We know everything about you, your wives and children. U.S. soldiers! We’re watching you!”

The group also replaced the Twitter profile image with an image of a person wearing a black and white keffiyeh, and the text CyberCaliphate and “i love you isis.”

Forty minutes after the first hacked tweet, Twitter suspended the account.

According to news reports, the hackers also posted images of spreadsheets that purported to contain the home addresses and other contact information for retired US Army generals and other images purporting to be US military maps and plans. The Pentagon appeared to confirm the authenticity of the information, telling reporters that the exposed information was not classified and that the images came not from the government but from the Massachusetts Institute of Technology. [Continue reading…]

The Washington Post adds: It is not clear whether the hackers are actually with the Islamic State, sympathizers with the militants, or simply pulling a prank on the Pentagon. But J.M. Berger, an analyst and non-resident fellow with the Brookings Institution, said there is reason to believe it could be someone affiliated directly with the Islamic State.

“ISIS has a team of hackers who are very deeply involved in ISIS the organization,” said Berger, author of the forthcoming book “ISIS: The State of Terror.”

“They have been practicing and recruiting for a while, and this has been going on for months and months,” Berger said.

But analysts added that just because the Islamic State hacked two social media accounts, it does not mean they threatened classified computer networks. Other hacker organizations, like the Syrian Electronic Army, have seized control of websites, and a group using the same “CyberCaliphate” name and photo seen in the hack against Centcom on Monday hacked the Twitter accounts of the Albuquerque Journal in New Mexico and the WBOC TV station in Salisbury, Md., last week.

“Let’s remember this is a social media account,” said Peter Singer, a strategist and analyst with the New American Foundation in Washington, of the attacks on Monday. “This is not a military command and control network. This is not a network that moves classified or even non-classified internal information back and forth. Essentially what they did is for several minutes take control of the megaphone.”

But Singer said the incident does amount to a public relations victory for the Islamic State, even if they were not directly involved. Embarrassing the U.S. government “is a feather in their cap in terms of pulling off something that other groups have not been able to do, no matter how silly it is at the end of the day.”

Whoever hacked the @CENTCOM account, there’s reason to doubt they are closely tied to ISIS — even though ISIS and its supporters will view this as a propaganda victory and make hyperbolic claims like “the landscape of jihad has changed.”

It turns out that the hackers posted pornographic photos:

Facebooktwittermail

In the new era of terrorism, Anwar al-Awlaki’s voice can still be heard

The New York Times reports: For more than five years now, as Western terrorism investigators have searched for critical influences behind the latest jihadist plot, one name has surfaced again and again.

In the failed attack on an airliner over Detroit in 2009, the stabbing of a British member of Parliament in London in 2010, the lethal bombing of the Boston Marathon in 2013 and now the machine-gunning of cartoonists and police officers in Paris, Anwar al-Awlaki has proved to be a sinister and durable inspiration.

Two of those four attacks took place after Mr. Awlaki, the silver-tongued, American-born imam who joined Al Qaeda’s branch in Yemen, was killed by a C.I.A. drone strike in September 2011.

In the age of YouTube, Mr. Awlaki’s death — or martyrdom, in the view of his followers — has hardly reduced his impact. The Internet magazine Inspire, which he oversaw along with another American, Samir Khan, has continued to spread not just militant rhetoric but also practical instructions on shooting and bomb-making.

Times reporters and editors are providing live updates from the march in Paris that comes in the wake of the attacks on a satirical newspaper and a kosher grocery last week.

In effect, Mr. Awlaki has become a leading brand name in the world of armed jihad. [Continue reading…]

Facebooktwittermail

How to talk about a hashtag without using it. Time for metahashtags?

My heart sank when I saw #KillAllMuslims was trending yesterday. But then I saw how it was being used. Nearly all the tweets were condemning the hashtag with tweets like this:


And this:


Twitter needs to create metahashtags.

They would work something like this: Put a hashtag in front of a hashtag creating a metahashtag like ##KillAllMuslims. The extra hashtag would mean that this is a hashtag about a hashtag.

Metahashtags should be counted separately from hashtags in which case in the current situation it might be apparent that what is trending is conversation about the hashtag; not the hashtag itself.

If anyone at Twitter sees this, why not toss the idea around. The need seems to be real and the coding couldn’t be that difficult — at least in the eyes of someone who writes no code 😉

Facebooktwittermail

Neil Postman: The man who predicted Fox News, the internet, Stephen Colbert and reality TV

Scott Timberg writes: These days, even the kind of educated person who might have once disdained TV and scorned electronic gadgets debates plot turns from “Game of Thrones” and carries an app-laden iPhone. The few left concerned about the effects of the Internet are dismissed as Luddites or killjoys who are on the wrong side of history. A new kind of consensus has shaped up as Steve Jobs becomes the new John Lennon, Amanda Palmer the new Liz Phair, and Elon Musk’s rebel cool graces magazines covers. Conservatives praise Silicon Valley for its entrepreneurial energy; a Democratic president steers millions of dollars of funding to Amazon.

It seems like a funny era for the work of a cautionary social critic, one often dubious about the wonders of technology – including television — whose most famous book came out three decades ago. But the neoliberal post-industrial world now looks chillingly like the one Neil Postman foresaw in books like “Amusing Ourselves to Death” and “Technopoly: The Surrender of Culture to Technology.” And the people asking the important questions about where American society is going are taking a page from him.

“Amusing Ourselves” didn’t argue that regular TV shows were bad or dangerous. It insisted instead that the medium would reshape every other sphere with which it engaged: By using the methods of entertainment, TV would trivialize what the book jacket calls “politics, education, religion, and journalism.”

“It just blew me away,” says D.C.-based politics writer Matt Bai, who read the 1985 book “Amusing Ourselves to Death” while trying to figure out how the press and media became obsessed with superficiality beginning in the ‘80s. “So much of what I’d been thinking about was pioneered so many years before,” says Bai – whose recent book, “All the Truth Is Out: The Week Politics Went Tabloid,” looks at the 1987 Gary Hart sex scandal that effectively ended the politician’s career. “It struck me as incredibly relevant … And the more I reported the book, the more relevant it became.”

Bai isn’t alone. While he’s hardly a household name, Postman has become an important guide to the world of the Internet though most of his work was written before its advent. Astra Taylor, a documentary filmmaker and Occupy activist, turned to his books while she was plotting out what became “The People’s Platform: Taking Back Power and Culture in the Digital Age.” Douglas Rushkoff — a media theorist whose book “Present Shock: When Everything Happens Now,” is one of the most lucid guides to our bewildering age — is indebted to his work. Michael Harris’ recent “The End of Absence” is as well. And Jaron Lanier, the virtual-reality inventor and author (“Who Owns the Future?”) who’s simultaneously critic and tech-world insider, sees Postman as an essential figure whose work becomes more crucial every year.

“There’s this kind of dialogue around technology where people dump on each other for ‘not getting it,’” Lanier says. “Postman does not seem to be vulnerable to that accusation: He was old-fashioned but he really transcended that. I don’t remember him saying, ‘When I was a kid, things were better.’ He called on fundamental arguments in very broad terms – the broad arc of human history and ethics.” [Continue reading…]

Facebooktwittermail

America’s effort to rule the digital world

Evgeny Morozov writes: [To] grasp the full extent of America’s hypocrisy on the issue of information sovereignty, one needs to look no further than the ongoing squabble between Microsoft and the US government. It concerns some email content – relevant to an investigation – stored on Microsoft’s servers in Ireland. American prosecutors insist that they can obtain such content from Microsoft simply by serving it a warrant – as if it makes no difference that the email is stored in a foreign country.

In order to obtain it, Washington would normally need to go through a complex legal process involving bilateral treaties between the governments involved. But now it wants to sidestep that completely and treat the handling of such data as a purely local issue with no international implications. The data resides in cyberspace – and cyberspace knows no borders!

The government’s reasoning here is that the storage issue is irrelevant; what is relevant is where the content is accessed – and it can be accessed by Microsoft’s employees in the US. Microsoft and other tech giants are now fighting the US government in courts, with little success so far, while the Irish government and a handful of European politicians are backing Microsoft.

In short, the US government insists that it should have access to data regardless of where it is stored as long as it is handled by US companies. Just imagine the outcry if the Chinese government were to demand access to any data that passes through devices manufactured by Chinese companies – Xiaomi, say, or Lenovo – regardless of whether their users are in London or New York or Tokyo. Note the crucial difference: Russia and China want to be able to access data generated by their citizens on their own soil, whereas the US wants to access data generated by anybody anywhere as long as American companies handle it.

In opposing the efforts of other countries to reclaim a modicum of technological sovereignty, Washington is likely to run into a problem it has already encountered while promoting its nebulous “internet freedom” agenda: its actions speak louder than its words. [Continue reading…]

Facebooktwittermail

Governments around the world stepping up efforts to control the internet

The New York Times reports: Government censorship of the Internet is a cat-and-mouse game. And despite more aggressive tactics in recent months, the cats have been largely frustrated while the mice wriggle away.

But this year, the challenges for Silicon Valley will mount, with Russia and Turkey in particular trying to tighten controls on foreign-based Internet companies. Major American companies like Facebook, Twitter and Google are increasingly being put in the tricky position of figuring out which laws and orders to comply with around the world — and which to ignore or contest.

On Wednesday, Russia’s president, Vladimir V. Putin, signed the latest version of a personal data law that will require companies to store data about Russian users on computers inside the country, where it will be easier for the government to get access to it. With few companies expected to comply with the law, which goes into effect Sept. 1, a confrontation may well erupt.

The clumsiness of current censorship efforts was apparent in mid-December, when Russia’s Internet regulator demanded that Facebook remove a page that was promoting an anti-government rally. After Facebook blocked the page for its 10 million or so Russian users, dozens of copycat pages popped up and the word spread on other social networks like Twitter. That created even more publicity for the planned Jan. 15 event, intended to protest the sentencing of Aleksei A. Navalny, a leading opposition figure. [Continue reading…]

Facebooktwittermail

Gmail access is blocked in China after months of disruption

The New York Times reports: The Chinese government appears to have blocked the ability of people in China to gain access to Google’s email service through third-party email clients, which many Chinese and foreigners had been relying on to use their Gmail accounts after an earlier blocking effort by officials, according to Internet analysts and users in China.

The blocking began last Friday and has ignited anger and frustration among many Internet users in China. Data from Google shows traffic to Gmail dropping to zero from Chinese servers.

The new step in blocking Gmail has consequences that go well beyond making it difficult for users to access personal emails. Some foreign companies use Gmail as their corporate email service, for example. Now, the companies will have to ensure that their employees have software known as VPNs, or virtual private networks, to access Gmail.

That software allows users to bypass the Chinese Internet censorship controls commonly known as the Great Firewall, but the authorities also attempt to inhibit the software.[Continue reading…]

Facebooktwittermail

Is Sony’s crackdown a bigger threat to western free speech than North Korea?

Trevor Timm writes: After a pre-Christmas week full of massive backlash for caving to a vague and unsubstantiated threat by hackers supposedly from North Korea, Sony has reversed course and decided it will allow The Interview to be shown after all – thus all but ending what Senator John McCain absurdly called “the greatest blow to free speech that I’ve seen in my lifetime probably”.

Don’t get me wrong: it’s unequivocally good news that North Korea (or whoever hacked Sony) won’t succeed in invoking a ludicrous heckler’s veto over a satirical movie starring Seth Rogen, but there are far greater threats to our freedom of speech here in the United States. For example, Sony itself.

Lost in the will-they-or-won’t-they controversy over Sony’s potential release of The Interview has been the outright viciousness that Sony has unleashed on some of the biggest social-media sites and news outlets in the world. For the past two weeks, the studio has been trying to bully these publishing platforms into stopping the release of newsworthy stories or outright censoring already-public information contained in the hacked emails, despite a clear First Amendment right to the contrary.

On top of Sony’s worrying and legally dubious threats, the most explosive and under-read story inside the hacked trove involves Sony and its close allies at the Motion Picture Association of America (MPAA) attempting to censor the internet on a much larger scale, by reviving a re-tooled version of a highly controversial bill known as Sopa that was scuttled back in 2011 because of widespread fears that it would destroy online free speech as we know it. [Continue reading…]

Facebooktwittermail

Putting North Korea’s ‘widespread’ internet outage in perspective

If a tree falls in a forest and no one is around to hear it, does it make a sound?

When four networks go down in a country where hardly anyone has internet access, does it make any sense to say that North Korea had an internet outage?

Every single day there are outages on a much larger scale all over the world and apart from for the technicians whose task it is to fix them, they largely go unnoticed.

Two weeks ago there was an outage of 148 networks in the U.S. It didn’t merit media coverage — just a tweet.

A 9 hour 31 minute outage that prompted headlines suggesting the U.S. government might have launched a cyberattack in response to the Sony hack, drew this more measured observation from Mashable:

While nobody knows who blocked access for the four networks and 1,024 IP addresses in the country, the consensus is clear: it wouldn’t have taken much. The attack appears to have been a relatively simple distributed denial of service, or DDoS — the kind of thing just about any experienced hacker could launch.

Meanwhile, North Korea, never known to exercise restraint when it comes to launching fusillades of wild rhetoric, on Sunday threatened to destroy America, which is to say, they are ready to “blow up” every city in this country. The Policy Department of the National Defence Commission of the DPRK said:

The army and people of the DPRK who aspire after justice and truth and value conscience have hundreds of millions of supporters and sympathizers, known or unknown, who have turned out in the sacred war against terrorism and the U.S. imperialists, the chieftain of aggression, to accomplish the just cause.

Obama personally declared in public the “symmetric counteraction”, a disgraceful behavior.

There is no need to guess what kind of thing the “symmetric counteraction” is like but the army and people of the DPRK will never be browbeaten by such a thing.

The DPRK has already launched the toughest counteraction. Nothing is more serious miscalculation than guessing that just a single movie production company is the target of this counteraction. Our target is all the citadels of the U.S. imperialists who earned the bitterest grudge of all Koreans.

The army and people of the DPRK are fully ready to stand in confrontation with the U.S. in all war spaces including cyber warfare space to blow up those citadels.

Funny how a nuclear-armed government can threaten to destroy this country and no one takes it seriously and yet when unknown hackers ominously evoke memories of 9/11, Sony executives panic.

Facebooktwittermail

Sweden’s troll hunters

Adrian Chen reports: We’ve come up with the menacing term “troll” for someone who spreads hate and does other horrible things anonymously on the Internet. Internet trolls are unsettling not just because of the things they say but for the mystery they represent: what kind of person could be so vile? One afternoon this fall, the Swedish journalist Robert Aschberg sat on a patio outside a drab apartment building in a suburb of Stockholm, face to face with an Internet troll, trying to answer this question. The troll turned out to be a quiet, skinny man in his 30s, wearing a hoodie and a dirty baseball cap — a sorry foil to Aschberg’s smart suit jacket, gleaming bald head, and TV-trained baritone. Aschberg’s research team had linked the man to a months-long campaign of harassment against a teenage girl born with a shrunken hand. After meeting her online, the troll tormented her obsessively, leaving insulting comments about her hand on her Instagram page, barraging her with Facebook messages, even sending her taunts through the mail.

Aschberg had come to the man’s home with a television crew to confront him, but now he denied everything. “Have you regretted what you’ve done?” Aschberg asked, handing the man a page of Facebook messages the victim had received from an account linked to him. The man shook his head. “I haven’t written anything,” he said. “I didn’t have a profile then. It was hacked.”

This was the first time Aschberg had encountered an outright denial since he had started exposing Internet trolls on his television show Trolljägarna (Troll Hunter). Usually he just shoots them his signature glare — honed over decades as a muckraking TV journalist and famous for its ability to bore right through sex creeps, stalkers, and corrupt politicians—and they spill their guts. But the glare had met its match. After 10 minutes of fruitless back and forth on the patio, Aschberg ended the interview. “Some advice from someone who’s been around for a while,” he said wearily. “Lay low on the Internet with this sort of stuff.” The man still shook his head: “But I haven’t done any of that.”

“He’s a pathological liar,” Aschberg grumbled in the car afterward. But he wasn’t particularly concerned. The goal of Troll Hunter is not to rid the Internet of every troll. “The agenda is to raise hell about all the hate on the Net,” he says. “To start a discussion.” Back at the Troll Hunter office, a whiteboard organized Aschberg’s agenda. Dossiers on other trolls were tacked up in two rows: a pair of teens who anonymously slander their high school classmates on Instagram, a politician who runs a racist website, a male law student who stole the identity of a young woman to entice another man into an online relationship. In a sign of the issue’s resonance in Sweden, a pithy neologism has been coined to encompass all these forms of online nastiness: näthat (“Net hate”). Troll Hunter, which has become a minor hit for its brash tackling of näthat, is currently filming its second season.

It is generally no longer acceptable in public life to hurl slurs at women or minorities, to rally around the idea that some humans are inherently worth less than others, or to terrorize vulnerable people. But old-school hate is having a sort of renaissance online, and in the countries thought to be furthest beyond it. The anonymity provided by the Internet fosters communities where people can feed on each other’s hate without consequence. They can easily form into mobs and terrify victims. Individual trolls can hide behind dozens of screen names to multiply their effect. And attempts to curb online hate must always contend with the long-standing ideals that imagine the Internet’s main purpose as offering unfettered space for free speech and marginalized ideas. The struggle against hate online is so urgent and difficult that the law professor Danielle Citron, in her new book Hate Crimes in Cyberspace, calls the Internet “the next battleground for civil rights.” [Continue reading…]

Facebooktwittermail

Hollywood’s war against Google

Ars Technica reports: Tensions between Google and Mississippi Attorney General Jim Hood exploded into public view this week, as Google filed court papers seeking to halt a broad subpoena Hood sent to the company.

The Hood subpoena, delivered in late October, didn’t come out of nowhere. Hood’s investigation got revved up after at least a year of intense lobbying by the Motion Picture Association of America (MPAA). E-mails that hackers acquired from Sony Pictures executives and then dumped publicly now show the inner workings of how that lobbying advanced—and just how extensive it was. Attorneys at Sony were on a short list of top Hollywood lawyers frequently updated about the MPAA’s “Attorney General Project,” along with those at Disney, Warner Brothers, 21st Century Fox, NBC Universal, and Paramount.

The e-mails show a staggering level of access to, and influence over, elected officials. The MPAA’s single-minded obsession: altering search results and other products (such as “autocompleted” search queries) from Google, a company the movie studios began referring to as “Goliath” in around February 2014. The studios’ goal was to quickly get pirated content off the Web; unhappy about the state of Google’s voluntary compliance with their demands and frustrated in their efforts at passing new federal law such as SOPA and PIPA, the MPAA has turned instead to state law enforcement.

The most controversial elements of SOPA/PIPA would have let content owners effectively shut down websites they said were infringing their copyrights or trademarks. This already happens—think of various peer-to-peer sites that no longer exist—but it usually involves drawn-out litigation. SOPA promised a faster-moving process that would have essentially made rights holders a website’s judge, jury, and executioner.

To get the same results in a post-SOPA world, MPAA has hired some of the nation’s most well-connected lawyers. The project is spearheaded by Thomas Perrelli, a Jenner & Block partner and former Obama Administration lawyer. Perrelli has given attorneys general (AGs) across the country their talking points, suggesting realistic “asks” prior to key meetings with Google. Frustrated with a lack of results, Perrelli and top MPAA lawyers then authorized an “expanded Goliath strategy” in which they would push the AGs to move beyond mere letter writing. Instead, they would seek full-bore investigations against Google.

If the AGs felt short on resources—well, Hollywood studios could help with that. Money from Sony and other Big Six studios was available to draft the actual subpoenas, to research legal theories to prosecute Google, to spread negative press about the search giant, and to reach out to other state AGs that might join with Hood.

This is how the project unfolded over the past year. [Continue reading…]

Facebooktwittermail

How the internet undermines the value of talking

Nick Bilton writes: According to a producer in Hollywood, people have been staying clear of email and opting for cellphones over the past two weeks as studios have been bolstering firewalls and email systems. “Everyone has been doing business on their cellphone since this happened,” the person said, asking not to be named. “The reality is, every studio has emails in their system that would cause the [same] chaos if they came out.”

Or as Jenni Konner, a writer and executive producer for HBO’s “Girls,” said on Twitter Tuesday night: “The worst thing about the Sony hacks is people using the phone again.”

It’s not only people in Hollywood who are picking up the phone again in case of an email hack.

For the rest of us, the Sony hacking is just another example of how our emails are highly insecure. “Don’t put anything in an email that you wouldn’t want to see on the front page of The New York Times the next day,” said Brian Krebs, who specializes in cybercrime and operates the website Krebs on Security. “It’s like putting a postcard in the mail.”

“And you can’t unsay anything you’ve said on the Internet,” Mr. Krebs added.

What’s so terrible about having to use the phone?

I know — it requires that massively inconvenient social accommodation which requires people to share time.

Nowadays everyone thinks they should be able to control their own time without engaging in submissive forms of behavior like answering phone calls.

Text allows people to connect without sharing space or time.

The sacrifice however, is that text lacks the fluidity of speech. What is said can instantly be modified, modulated and shaped within the flow of conversation.

Instead of bemoaning the inconvenience of talking, maybe its time for everyone to reacquaint themselves with its value.

Facebooktwittermail

Lessons from the Sony hack

Peter W. Singer and Allan Friedman write: The hack of Sony has often been lumped in with stories ranging from run of the mill online credit card theft to the Target, Home Depot and JP Morgan breaches to the time that Iranian-linked hackers allegedly “erased data on three-quarters of Aramco’s corporate PCs.” In fact, most of these crimes have little more in common than the fact that they were committed using computers. It’s a lot like lumping together every incident in New York that involves a gun, whether it’s a bank robbery, a murder or a football player accidentally shooting himself.

What made the Sony hack distinct is that it mixed an evidently organized effort, using advanced tools (what is known as an “advanced persistent threat”) that some have linked to the North Korean state, but with the goal of maximizing attention and embarrassment for the target. That is, they weren’t a few hackers phishing after any target, nor were they trying to keep quiet, so that they could continue to secretly exfiltrate data. Rather, they appear to have wanted to cause havoc — and make sure everyone knew.

Differentiating between these kinds of threats is critical, because different risks require different types of responses. The claims some have made that the Sony hack is an act of “cyberterrorism” are a case in point. The FBI definition of cyberterrorism requires “an act that results in violence,” which stealing scripts about James Bond carrying out acts of violence wouldn’t meet. This also applies to the recent threats by the hackers to create 9/11 style events at any movie theater that shows the film. Rapidly becoming an illustration on how not to handle online threats, virtually all the major U.S. theater companies have now said they won’t show the movie. Yet the ability to steal gossipy celebrity emails is clearly not the same as having the capacity to undertake physical attacks at thousands of movie theaters across the country. So, at least based on their actions so far, the “bitter fate” the hackers promised moviegoers is most likely to be the price they pay for popcorn. [Continue reading…]

Facebooktwittermail