Create an Account
username: password:
 
  MemeStreams Logo

The Nature of the Risk

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
The Nature of the Risk
Topic: Miscellaneous 7:49 am EDT, Jul  2, 2012

Richard Clarke:

According to Congressional testimony last week, 94 percent of companies served by the computer-security firm Mandiant were unaware that they had been victimized.

By failing to act, Washington is effectively fulfilling China's research requirements while helping to put Americans out of work.

Erica Newland, of the Center for Democracy and Technology:

Can export controls be meaningfully extended in ways that reduce the spread of ... 'weapons of mass surveillance' without diminishing the ability of dissidents to connect and communicate?

Amrutha Gayathri:

In a statement released Thursday, Reza Taghipour, the Iranian minister for Information and Communications Technology, announced the setting up of a national Intranet and the effective blockage of services like Google, Gmail, Google Plus, Yahoo and Hotmail, in line with Iran's plan for a "clean Internet."

Christopher Mims:

Most of us leave Wi-Fi on by default, in part because our phones chastise us when we don't. (Triangulation by Wi-Fi hotspots is important for making location services more accurate.) But you probably didn't realize that, using proprietary new "nodes" from Navizon, any device with an active Wi-Fi radio can be seen by a system like Navizon's.

Matt Schwartz:

People tend to believe that Web operators will keep their data safe in perpetuity. They entrust much more than poetry to unseen servers maintained by system administrators they've never met.

Lloyd's Risk Index, on cyber insecurity:

Even large businesses need to ask if they really understand the nature of the risk to which they are exposed.

Alex Howard:

The simple reality is that in Washington, national security trumps everything.

Abu Muqawama:

Military cyberpower, once invisible to all but a few defense specialists, is slowly becoming visible. In some ways the current wave of commentary on Stuxnet is simply a delayed reaction to what should have been apparent once the electromagnetic spectrum was utilized by Abraham Lincoln to command the American Civil War: a new operational domain has military as well as civilian purposes. The civilian use of cyberspace, like the civilian use of the ocean or space, provides commercial and cultural value, but there is also a power-political context that simply cannot be wished away.

Yochai Benkler:

Seeing Anonymous primarily as a cybersecurity threat is like analyzing the breadth of the antiwar movement and 1960s counterculture by focusing only on the Weathermen. Anonymous is not an organization. It is an idea, a zeitgeist, coupled with a set of social and technical practices. Diffuse and leaderless, its driving force is "lulz" -- irreverence, playfulness, and spectacle. It is also a protest movement, inspiring action both on and off the Internet, that seeks to contest the abuse of power by governments and corporations and promote transparency in politics and business. Just as the antiwar movement had its bomb-throwing radicals, online hacktivists organizing under the banner of Anonymous sometimes cross the boundaries of legitimate protest. But a fearful overreaction to Anonymous poses a greater threat to freedom of expression, creativity, and innovation than any threat posed by the disruptions themselves.

Viewing Anonymous purely as a matter of crime reduction or national security will lead governments to suppress it and ignore any countervailing considerations. A more appropriate, balanced response to Anonymous' attacks would err on the side of absorbing damage and making the hacks' targets resilient, rather than aggressively surveilling and prosecuting the network and its participants.



 
 
Powered By Industrial Memetics
RSS2.0