Pages

Tuesday, June 29, 2010

cybersecurity measures would mandate govt 'id tokens' to use the net

cybersecurity measures would mandate govt 'id tokens' to use the netfrom paul joseph watson & alex jones: The move to shut down and regulate the Internet under a new government-controlled system has accelerated into high gear with the announcement that the government’s cybersecurity strategy revolves around issuing Internet users with ID “tokens” without which they will not be able to visit websites, the latest salvo against web freedom which, in combination with Senator Joe Lieberman’s ‘kill switch’ bill, will serve to eviscerate the free Internet as we know it.

Under the guise of “cybersecurity,” the government is moving to discredit and shut down the existing Internet infrastructure in the pursuit of a new, centralized, regulated world wide web.

This exact strategy was outlined in a paper published by Obama’s cybersecurity co-ordinator Howard Schmidt, which was compiled with the aid of the National Security Council.

The strategy revolves around, “The creation of a system for identity management that would allow citizens to use additional authentication techniques, such as physical tokens or modules on mobile phones, to verify who they are before buying things online or accessing such sensitive information as health or banking records,” reports the FInancial Times.

Only with this government-issued “token” will Internet users be allowed to “able to move from website to website,” a system not too far removed from what China proposed and rejected for being too authoritarian.

Monday, June 28, 2010

internet porn to get its own red light district as .xxx name approved

internet porn to get its own red light district as .xxx name approvedfrom guardian: The internet could soon have its own red light district after the ".xxx" suffix was approved – though pornography companies are not keen to use it.

Icann, the organisation which determines what "top-level domains" (TLDs) such as .com or .uk can be added to the internet announced today that it will begin the process of registering .xxx by making checks on ICM Registry, the company that wants to run the domain and sell registrations.

It marks the closing stages of a 10-year battle by ICM Registry, now run by the British internet entrepreneur Stuart Lawley, to get the .xxx domain set up so that legal pornography sites can be found in a single grouping...

But many pornography companies are unhappy with the idea of a dedicated space online because they expect that as soon as .xxx is implemented, conservative members of the US Congress will lobby to make any sex-related website re-register there and remove itself from other domains such as .com or .org.

That would mean that sex sites could be more easily filtered out from web searches, and lower their revenues. Free speech advocates also worry that sites about topics seen by US conservatives as controversial, such as homosexuality, might also be forced to use the .xxx suffix... 


[T]he .xxx domain is notable for only having ICM Registry, which stands to benefit from every domain name it sells. Lawley says he expects to make $30m (£20m) a year in revenue by selling each .xxx site for $60, and pledges to donate $10 from each sale to child protection initiatives.

Sunday, June 27, 2010

obama internet 'kill switch' plan approved by US senate

obama internet 'kill switch' plan approved by US senatefrom techworld: A US Senate committee has approved a wide-ranging cybersecurity bill that some critics have suggested would give the US president the authority to shut down parts of the Internet during a cyberattack.

Senator Joe Lieberman and other bill sponsors have refuted the charges that the Protecting Cyberspace as a National Asset Act gives the president an Internet "kill switch." Instead, the bill puts limits on the powers the president already has to cause "the closing of any facility or stations for wire communication" in a time of war, as described in the Communications Act of 1934, they said in a breakdown of the bill published on the Senate Homeland Security and Governmental Affairs Committee website.

The committee unanimously approved an amended version of the legislation by voice vote Thursday, a committee spokeswoman said. The bill next moves to the Senate floor for a vote, which has not yet been scheduled.

Wednesday, June 23, 2010

white house prepping national internet identity authentication plan

white house prepping national internet identity authentication planfrom fierce government: The White House plans to reveal June 25 a strategy for verifying the online identity of Internet users, said cyber czar Howard Schmidt, speaking June 22 during a Washington, D.C. conference.

"I want to make sure that the computer on the other end knows that it's me that's interacting with it," he told audience members of the Symantec Government Symposium 2010.

To that end, the White House will unveil a strategy for public comment called the National Strategy for Trusted Identities in Cyberspace. The strategy will not limit itself to creating authenticated identities for federal employees.

Rather, it will propose a common identification standard for members of the public, who would utilize it while accessing electronic health records, conducting online banking, shopping online or even just sending an email, Schmidt said.

"Everyone in my office digitally signs email," Schmidt said.

The trusted identity strategy draws on federal efforts such as Homeland Security Presidential Directive 12, the 2004 presidential mandate that federal employees carry a standardized identity card, Schmidt said. The HSPD 12 implementation strategy ended up giving federal employees a smart card containing a chip holding simple biometric information.

"We need to figure out how we get those things to work at the national level," Schmidt said.

National identity authentication will be voluntary and must take into consideration privacy concerns, Schmidt also said.


related: govt devotes more brains & money to cybersecurity

napolitano: US must balance liberties & cybersecurity

"those who would give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety."
napolitano: US must balance liberties & cybersecurityfrom ap: Fighting homegrown terrorism by monitoring Internet communications is a civil liberties trade-off the U.S. government must make to beef up national security, the nation's homeland security chief said Friday.

As terrorists increasingly recruit U.S. citizens, the government needs to constantly balance Americans' civil rights and privacy with the need to keep people safe, said Homeland Security Secretary Janet Napolitano.

But finding that balance has become more complex as homegrown terrorists have used the Internet to reach out to extremists abroad for inspiration and training. Those contacts have spurred a recent rash of U.S.-based terror plots and incidents.

"The First Amendment protects radical opinions, but we need the legal tools to do things like monitor the recruitment of terrorists via the Internet," Napolitano told a gathering of the American Constitution Society for Law and Policy.

Napolitano's comments suggest an effort by the Obama administration to reach out to its more liberal, Democratic constituencies to assuage fears that terrorist worries will lead to the erosion of civil rights.

The administration has faced a number of civil liberties and privacy challenges in recent months as it has tried to increase airport security by adding full-body scanners, or track suspected terrorists traveling into the United States from other countries.

Monday, June 21, 2010

lieberman tells internet to 'relax' about 'kill switch'

lieberman tells internet to 'relax' about 'kill switch'from raw replay: Sen. Joe Lieberman is telling his critics to “relax” over a bill that would allow the president to disable parts of the internet as he deems necessary. China has an internet “kill switch” and the U.S. should too, according to Lieberman.

We need this capacity in a time of war. We need the capacity for the president to say, internet service provider, we’ve got to disconnect the American internet from all traffic coming in from another foreign country, or we have to put a patch on this part of it,” Lieberman told CNN’s Candy Crowley Sunday.

So I say to my friends on the internet, relax. Take a look at the bill. And this is something that we need to protect our country. Right now China, the government, can disconnect parts of its internet in case of war and we need to have that here too,” he said.

This video is from CNN’s State of the Union, broadcast June 20, 2010.


update: cybersecurity bill clears senate committee

Wednesday, June 16, 2010

iarpa wants to scan your youtube clips for terror threats

iarpa wants to scan your youtube clips for terror threatsfrom danger room: Your Youtube videos could soon be scanned and evaluated for terror threats, thanks to a new project funded by the U.S. intelligence community that’ll create a searchable warehouse of open-source clips.

Iarpa (Intelligence Advanced Research Projects Activity), the spy agency’s out-there research arm, is behind the program, called Automated Low-Level Analysis and Description of Diverse Intelligence Video (ALADDIN).

The advent of cell phone cams and online video hubs means thousands of clips are uploaded every day. And while the quality of UAV or spy-cam feeds is relatively consistent, and the videos usually contain similar imagery, “the unconstrained video clips produced by anyone who has a digital camera present a significant challenge,” Iarpa notes.

Uploaded videos contain such diverse scenes and situations, not to mention grainy images and sound, that it’s much harder to prep algorithms for automated evaluation. And human analysts only have so much time for the “eyes-on-video/ears-on-audio” routine.

In ALADDIN, Iarpa wants a boundless database of open source video clips, and the ability to search “for the occurrence of specific events of interest…”. Once the system finds the relevant videos, it should be able to “rapidly and automatically produce a textual English-language recounting…describing the particular scene, actors, objects and activities involved.”

Of course, despite the challenges of analyzing uploaded videos, spy agencies are probably already doing it. In 2008, the director of the Office of the Director of National Intelligence’s Open Source Center noted thatYouTube…carries some unique and honest-to-goodness intelligence.”

Tuesday, June 15, 2010

dhs cyber bill would codify executive emergency powers

dhs cyber bill would codify executive emergency powersfrom the atlantic: At the beginning of the year, the chances that some sort of cybersecurity legislation would reach the president's desk by the end of 2010 were remote. But as of today, there are a half dozen such bills circulating, and the sense of urgency is there, thanks to a huge and largely unremarked upon public lobbying campaign by the defense industry that may or may not comport with the actual level of threat. I don't mean that as a snide aside; I just don't know how vulnerable we are at this moment.

Today, the Senate Homeland Security and Government Affairs Committee unveils its legislation, which would create a Senate-confirmable cyber director in the executive office of the president and imbue him or her with significant emergency powers.


The Protecting Cyberspace as a National Asset Act of 2010 (PC-NNA ... PC Nana?) is "designed to bring together the disjointed efforts of multiple federal agencies and departments to prevent cyber theft, intrusions, and attacks across the federal government and the private sector," its chief author, Sen. Joe Lieberman, will say in prepared remarks today. "The bill would establish a clear organizational structure to lead federal efforts in safeguarding cyber networks. And it would build a public/private partnership to increase the preparedness and resiliency of those private critical infrastructure cyber networks upon which our way of life depends."

The bill would create another Senate-confirmable position, the head of a new National Cybersecurity and Communications Center inside the Department of Homeland Security; the new NCCC would be responsible for threat prevention and mitigation. It would develop risk-based standards for infrastructure with industry and oversee their implementation. Private entities whose power plants or grids or systems are considered vulnerable and critical could choose among a menu of standards.

According to a summary of the legislation, the Act would also create a "responsible" framework for giving the executive branch significant emergency power in the event of a major intrusion or threat.

The President must notify Congress in advance about the threat and the emergency measures that will be taken to mitigate it. Any emergency measures imposed must be the least disruptive necessary to respond to the threat. These emergency measures will expire after 30 days unless the President orders an extension. The bill does not authorize any new surveillance authorities, or permit the government to "take over" private networks.
Industry will read this part of the bill very carefully, as will civil libertarians. The White House believes it already has a lot of these powers, although it welcomes Congress's attempt to codify them, but my sense is that the National Security Staff does not want to create any new cyber infrastructure within the already over-burdened executive office of the president, and isn't keen on having the top two cyber positions be Senate confirmable.

updates: internet 'kill switch' proposed for US*
lawmakers question US cybersecurity readiness*
experts warn of government's inability to respond to cyber threats*
pentagon launches salvo in war to protect an army of 7m*
cybersecurity bill would give president, dhs too much power, critics say*
cybersecurity not a 'command & control' effort*

Saturday, June 12, 2010

wikileaks founder hunted by pentagon over massive leak

wikileaks founder hunted by pentagon over massive leakfrom philip shenon: Anxious that Wikileaks may be on the verge of publishing a batch of secret State Department cables, investigators are desperately searching for founder Julian Assange. Philip Shenon reports. Plus, Daniel Ellsberg tells The Daily Beast: "Assange is in Some Danger." (This story has been updated to reflect new developments on Assange's whereabouts, including the cancelation of a scheduled appearance in Las Vegas.)

Pentagon investigators are trying to determine the whereabouts of the Australian-born founder of the secretive website Wikileaks for fear that he may be about to publish a huge cache of classified State Department cables that, if made public, could do serious damage to national security, government officials tell The Daily Beast.

The officials acknowledge that even if they found the website founder, Julian Assange, it is not clear what they could do to block publication of the cables on Wikileaks, which is nominally based on a server in Sweden and bills itself as a champion of whistleblowers.

We’d like to know where he is; we’d like his cooperation in this,” one U.S. official said of Assange.

American officials said Pentagon investigators are convinced that Assange is in possession of at least some classified State Department cables leaked by a 22-year-old Army intelligence specialist, Bradley Manning of Potomac, Maryland, who is now in custody in Kuwait.

And given the contents of the cables, the feds have good reason to be concerned.


updates: wikileaks founder has afghan massacre video*
wikileaks 'confirms' it has video of US massacre in afghanistan*
wikileaks inspired 'new media haven' proposal passes in icelandic parliament*
3 weeks after manning arrest, still no charges in wikileaks probe*

Wednesday, June 9, 2010

defcon 6/9: wikileaked, registered & artificials

US intel analyst arrested in wikileaks video probe*
US intelligence analyst arrested in wikileaks video probebbc: wikileaks site unfazed by arrest of US army 'source'*
video: state dept anxious about diplomatic secrets bradley manning allegedly downloaded*
wikileaks was launched with documents intercepted from tor*
wikileaks & julian paul assange in 'the new yorker'*
wikileaks denies tor hacker eavesdropping gave site its start* at&t leak leaves US apple ipad owners at risk*
bill gives feds 'emergency’ powers to secure civilian nets*
dhs would be cyber power center under lieberman/collins proposal*
nsa chief: US carefully monitoring military computer networks for sabotage*
wireless signals to be jammed in canada for g8 summit*
top US commander in iraq raises internet concerns*
new worries emerge about internet monitoring*
calls increase for govt to regulate net journalists & bloggers*
michigan considers law to register journalists*
lawyers claim google wi-fi sniffing 'is not an accident'*
chinese net addicts stage mutiny at boot camp*
ceo of firm that made $100m selling 'scareware' was a fugitive*
6 astronauts begin 520-day mock flight to mars*
approaching space object 'artificial, not asteroid' says nasa*
more active sun means nasty solar storms ahead*
ancient meteorite discovered in oregon*

Tuesday, June 1, 2010

privacy fears mount as ad targeting grows

privacy fears mount as ad targeting growsfrom afp: In the quest for better targeted advertising, marketers are using high-tech tools that can pinpoint a person's location, demographics and habits, raising the hackles of privacy activists.

Online or in the shopping mall, these efforts are becoming more prevalent. Google, Yahoo and its advertising partners can track a user's browsing habits in an effort to deliver more relevant marketing messages.

Offline, new digital signs with hidden cameras can use facial recognition software to tailor messages similar to the scenario in the science fiction film "Minority Report." Some analysts say the new technology is positive, enabling firms to get the most for their advertising dollars.

"We're marketers. We present consumers with information that they can use to make informed buying decisions related to our brands," says Rob Graham, vice president at the consulting firm Laredo Group.

But a 2009 study by the University of California and the University of Pennsylvania showed that Americans are opposed to targeted advertising on the Web.

"Contrary to what many marketers claim, most adult Americans (66 percent) do not want marketers to tailor advertisements to their interests," the study concluded. "Moreover, when Americans are informed of three common ways that marketers gather data about people in order to tailor ads, even higher percentages... say they would not want such advertising."

Chris Hoofnagle, director of the Berkeley Center for Law and Technology's information privacy programs, said many Web users are aware their habits are tracked by firms such as Google or Amazon, but are unsettled by third-party advertisers and marketers tracking across websites without any permission.

"Individuals don't want to be tracked," he said. "It might not cause you harm, it might just be creepy."


The practices underscore concerns over online privacy at a time when social network giant Facebook is embroiled in its own controversy over sharing data with third-party websites.

New technology is also testing the limits of acceptable practices and privacy offline. In some shopping malls, a new generation of digital signs not only can change messages frequently but can measure customer traffic and determine who is walking by through facial recognition software.

To some, it raises the specter of the scene in "Minority Report" where Tom Cruise's character walks through a futuristic mall.

"John Anderton. You could use a Guinness right about now," a digital sign announces in the film.

"We're not quite there yet but we are at a point where we can adjust the ads according to who is in front of that screen," said Keith Kelsen, chairman and chief executive of Media Tile, a digital signage firm.

Kelsen said the signage industry has a set of guidelines to protect privacy, and dismissed most of the fears as overblown.

"There is really no reason for concern because we're not tracking individuals, we're tracking information that is collected on whether they are male or female, or quantities of people, how long do they look at the screen," he said.

But some privacy activists say the industry has not done enough to protect against abuses.

"The vast majority of people walking in stores, near elevators and in other public and private spaces have no idea that the innocent-looking flat screen TVs playing videos may be capturing their images and then dissecting and analyzing them for marketing purposes," said a January report by the World Privacy Forum.

Pam Dixon, executive director of the privacy group, said the digital signage industry "has all sorts of issues touching privacy, including children's privacy."

In a prominent blunder for the industry, lubricant maker Castrol set up digital billboards in London last year equipped with cameras that read the license plates of each passing motorist, accessed a database to find the automobile's model and year, and flashed the driver a message about what type of oil their vehicle should use.

The campaign was ended after a few days amid criticism.

Some makers of the technology, including firms like South Korea's Samsung and Japan's NEC, may be able to determine a viewer's race or nationality and can personalize Google and Yahoo! ads.

Companies are also using GPS technology in mobile phones to tailor ads to a user's location, such a specials for lattes as someone walks by a coffee shop.

Although this is still relatively new, the Center for Digital Democracy frets about a lack of guidelines.

"The emerging system for mobile advertising is clearly an extension of the current interactive targeting apparatus that has raised so many concerns over privacy and consumer protection," the group said in a petition to US regulators.