Category Archive 'The Internet'
07 Aug 2010

US Government In Standoff With Wikileaks

, , , , , , , , , , , , ,


Julian Assange

The Pentagon is demanding that Wikileaks cease publishing and return immediately stolen US documents in its possession, hinting darkly at legal prosecution if the Internet news site does not comply. (Christian Science Monitor)

———————————

Of course, it is always possible that Julian Assange and his merry band of pranksters may be less than intimidated by an adversary so clueless that its first response to the theft and publication of Top Secret military documents is to issue a directive prohibiting its own personnel from gazing at the offending web site.

This is the “Close the barn door from the inside when the horse got out” approach to security breaches. [Wired]

———————————

Besides, Wikileaks has uploaded a password-protected file labeled “Insurance,” and believed to contain a massive collection of highly toxic State Department material, consisting of, according to a chat interview published by Wired:

260,000 classified U.S. diplomatic cables that Manning described as exposing “almost criminal political back dealings.”

“Hillary Clinton, and several thousand diplomats around the world are going to have a heart attack when they wake up one morning, and find an entire repository of classified foreign policy is available, in searchable format, to the public,” Manning wrote.

Wikileaks has arranged, in the event that the US Government succeeds in shutting down its web site, to have the password released via Cryptome.

6 August 2010. If there is a takedown of Wikileaks, the insurance.aes256 file will be available through Cryptome along with the entire files of the Wikileaks website which have been archived.

———————————

Even without Julian Assange’s blackmail threat, Some News Agency sees problems trying to stop Wikileaks legally.

[F]rom a legal standpoint, there is probably little the U.S. government can do to stop WikiLeaks from posting the files.

It is against federal law to knowingly and willfully disclose or transmit classified information. But Assange, an Australian who has no permanent address and travels frequently, is not a U.S. citizen.

Since Assange is a foreign citizen living in a foreign country, it’s not clear that U.S. law would apply, said Marc Zwillinger, a Washington lawyer and former federal cyber crimes prosecutor. He said prosecutors would have to figure out what crime to charge Assange with, and then face the daunting task of trying to indict him or persuade other authorities to extradite him.

It would be equally difficult, Zwillinger said, to effectively use an injunction to prevent access to the data.

“Could the U.S. get an injunction to force U.S. Internet providers to block traffic to and from WikiLeaks such that people couldn’t access the website?” Zwillinger said. “It’s an irrelevant question. There would be thousands of paths to get to it. So it wouldn’t really stop people from getting to the site. They would be pushing the legal envelope without any real benefit.”

And the technical approach is problematic, too.

WikiLeaks used state-of-the-art software requiring a sophisticated electronic sequence of numbers, called a 256-bit key [to protect its “Insurance” files].

The main way to break such an encrypted file is by what’s called a “brute force attack,” which means trying every possible key, or password, said Herbert Lin, a senior computer science and cryptology expert at the National Research Council of the National Academy of Sciences.

Unlike a regular six- or eight-character password that most people use every day, a 256-bit key would equal a 40 to 50 character password, he said.

If it takes 0.1 nanosecond to test one possible key and you had 100 billion computers to test the possible number variations, “it would take this massive array of computers 10 to the 56th power seconds — the number 1, followed by 56 zeros” to plow through all the possibilities, said Lin.

How long is that?

“The age of the universe is 10 to the 17th power seconds,” explained Lin. “We will wait a long time for the U.S. government or anyone else to decrypt that file by brute force.”

Could the NSA, which is known for its supercomputing and massive electronic eavesdropping abilities abroad, crack such an impregnable code?

It depends on how much time and effort they want to put into it, said James Bamford, who has written two books on the NSA.

The NSA has the largest collection of supercomputers in the world. And officials have known for some time that WikiLeaks has classified files in its possession.

The agency, he speculated, has probably been looking for a vulnerability or gap in the code, or a backdoor into the commercial encryption program protecting the file.

At the more extreme end, the NSA, the Pentagon and other U.S. government agencies — including the newly created Cyber Command — have probably reviewed options for using a cyber attack against the website, which could disrupt networks, files, electricity, and so on.

“This is the kind of thing that they are geared for,” said Bamford, “since this is the type of thing a terrorist organization might have — a website that has damaging information on it. They would want to break into it, see what’s there and then try to destroy it.”

The vast nature of the Internet, however, makes it essentially impossible to stop something, or take it down, once it has gone out over multiple servers.

In the end, U.S. officials will have to weigh whether a more aggressive response is worth the public outrage it would likely bring. Most experts predict that, despite the uproar, the government will probably do little other than bluster, and the documents will come out anyway.

———————————


Mikael Viborg, owner of PRQ hosting company at its server location

Were the Department of Defense, the NSA, or the FBI actually inclined to do anything about Wikileaks, NYM would be glad to help.

Their web site, we find, is hosted by PRQ in Stockholm, Sweden. That hosting company’s abuse reporting email is: abuse@prq.se

Be aware, however, that PRQ is associated with the notorious Swedish Bit Torrent file sharing hub The Pirate Bay.

22 Jun 2010

Cognitive Surplus

, , , , , , ,

Clay Shirky, in a new book titled Cognitive Surplus, maintains that the post-WWII age of suburbanization was one of those eras of abrupt, dislocating social change which left Americans morose and seeking for self-medication just like 18th century Englishmen driven by economic change from the countryside to the city.

They used gin, a new, potent yet inexpensive distilled spirit, whose method of production had arrived from Holland as part of the the fashionable baggage accompanying William and Mary. Americans used television.

Shirky contends that the Internet is bringing about the end of the age of self-narcotization via sitcoms and game shows. Leisure time sucked down the television time sink, the cognitive surplus simply wasted previously, will instead be transferred to more useful and communitarian activities (like writing Wikipedia entries and blogging) and a wonderful new era of transparency, creativity, and productivity will bloom.

Hmm. I wonder if he has ever heard of World of Warcraft.

Barnes & Noble review.

——————————-

Jonah Leher brings formidable Friedrich Nietzsche to television’s defense.

I would disagree. In some peculiar way, if I hadn’t watched and re-watched The Sopranos then this sentence wouldn’t exist. (And I would have missed out on many interesting, intelligent conversations…) The larger point, I guess, is that before we can produce anything meaningful, we need to consume and absorb, and think about what we’ve consumed and absorbed. That’s why Nietzsche, in Thus Spoke Zarathustra, said we must become a camel (drinking up everything) before we can become a lion, and properly rebel against the strictures of society.


William Hogarth, Gin Lane, Engraving, 1751

19 May 2010

What Happened to Newsweek, CBS, and CNN?

, , , , , ,

Ed Driscoll rubs in the fact that the Internet changed the news and information business permanently, causing establishment media outlets like Newsweek, CBS, and CNN, all notorious for partisan reporting, to wonder where their audience went.

Silicon Graffiti 7:55 video

24 Mar 2010

Wednesday, March 24, 2010

, , , , , , , , , , , ,

Gimme that old time religion department: the Times of India reports that Tekam Das, a Hindu priest in the province of Sind, on Tuesday sacrificed three daughters (all aged under six) and then himself to the goddess Kali.

—————————

Technological tour de force: Eric Whitacre‘s Lux Aurumque 6:20 video of virtual choir performance, 185 performers from 12 countries recorded on 243 tracks.

Audition videos (link).

How it was organized (link).

How it was made (link).

Via Kottke.

—————————

What American states & cities have the best-equipped male residents? Condomania has the list. New Hampshire and New Orleans win.

—————————

Why do I walk like that?

Detail of Megan Jaegerman police graphic discussed by Edward Tufte.

Via Cory Doctorow.

10 Mar 2010

Senate Warned Against Reading Drudge

, , , , , ,

Fox News detects a partisan slant in potential virus warnings pertaining to Drudge Report, one of the most active and infliential agggregators on the Internet, whose reporting commonly, but not always, features a conservative perspective.

[A]n e-mail is circulating warning U.S. Senate staffers not to view one of the most popular news sites on the Web, claiming it could spread computer viruses.

The Senate Sergeant-at-Arms, the chamber’s official gatekeeper, said the Drudge Report, a news aggregator, and whitepages.com, a telephone directory site, “are responsible for the many viruses popping up throughout the Senate,” according to an e-mail from the Environment and Public Works Committee obtained by FoxNews.com.

Another e-mail from a separate office warned that staffers who had visited the Drudge Report or White Pages had experienced viruses on their PCs.

“Please avoid using these sites until the Senate resolves this issue,” the e-mail read. “The Senate has been swamped the last couples (sic) days with this issue.”

But the Drudge Report suggested that politics might be behind the warning, noting in an original story that the e-mail came as the “health care drama in the Capitol reaches a grand finale.”

The Drudge Report noted that it served more than 29 million pages Monday without an e-mail complaint about “‘pop ups,’ or the site serving ‘viruses.'” …

A spokesman for the Environment and Public Works Committee said the Senate Help Desk cited the Drudge Report and whitepages.com only as possible examples of Web sites generating pop-up ads that might be causing a recent increase in the number of virus infections.

“Our non-partisan systems administrator notified both Majority and Minority staff that this issue had been brought to her attention,” the spokesman said in a written statement. “It is still not exactly clear where the increase in viruses is coming from, and staff have been advised to be cautious with outside Web sites at all times.”

A GOP aide to the Environment and Public Works Committee told FoxNews.com that there has been “a flurry of activity in the last couple of days” and that a couple of people on the staff had had “computer problems.”

But Brent Baker, the vice president for research and publications at the Media Research Center, wondered why the conservative Drudge was cited as an example instead of a liberal site like the Huffington Post.

I look at Drudge Report daily and I’ve seen no evidence to suggest that there is any legitimate basis for such warnings at all.

07 Mar 2010

Sunday, March 7, 2010

, , , , , , , , , , , , , , , , , , ,

Cyber vigilantism punishes kitten killing, adultery, and a variety of other things in China these days.

******************************

Essex cockerel and hens victorious when fox invades their coop.

******************************

The LA Times finds that Italians have better political scandals.

Reporting from Rome — The governor made off to a monastery after having affairs with transsexuals, but not before the cops videotaped a tryst, all flesh and white powder, and offered to sell copies to a magazine owned by the prime minister, who, at the time, was rumored to be entangled with an underage Neapolitan model.

Then one of the transsexuals, a Brazilian named Brenda, turned up naked and dead, her laptop computer submerged under a running tap. Oh, yeah, and the drug dealer who supplied cocaine to the governor and Brenda would meet his own demise. It’s an odd coincidence.

******************************

Glenn Reynolds explains why the federal government has come to resemble Schlitz beer.

******************************

Leo Grin, at Big Hollywood has a four part essay on Werner Herzog, Timothy Treadwell, and “Grizzly Man” (2005). Pt1, Pt2, Pt3, Pt4.

Big Hollywood is promising more in-depth reviews of significant conservative films.

Multiple hat tips to Karen L. Myers.

05 Oct 2009

The Internet and Dictatorships

, , , ,

Evgeny Morozov challenges conventional wisdom on the efficacy of the Internet as a tool for democratizing dictatorships.

Morozov questions the significance of what he calls “iPod Liberalism,” and argues that the “Spinternet” and the use of the Net for “authoritarian deliberation” actually significantly aid authoritarian regimes.

11:51 video

31 Aug 2009

Licensed to Surf

, , ,

Not just anyone should be allowed to take his mouse and ride the Information Superhighway anonymously, argues an Australian authority on crime.

Australia’s leading criminologist thinks online scams have escalated to such a point that first-time users of computers should have to earn a licence to surf the web.

Russel Smith, principal criminologist at the Australian Institute of Criminology said the concept of a “computer drivers licence” should be taken seriously as an option for combating internet-related crime.

“There’s been some discussion in Europe about the use of what’s called a computer drivers licence – where you have a standard set of skills people should learn before they start using computers,” Dr Smith told iTnews.

“At the moment we have drivers licences for cars, and cars are very dangerous machines. Computers are also quite dangerous in the way that they can make people vulnerable to fraud.

“In the future we might want to think about whether it’s necessary there be some sort of compulsory education of people before they start using computers,” he said.

03 Jun 2009

Bye Bye, Dinosaur Media

, , , ,


Declining Newspaper Quarterly Ad Revenues From 2006

Another graph, this one is from Tech Crunch:

Total newspaper ad sales dropped by an unprecedented 28.28% in the first quarter of 2009, a deep plunge that represents a loss of more than $2.6 billion in ad revenue compared year-over-year. Compared to 3 years ago – 2006 was a pretty good year for American newspapers – we’re looking at a drop of more than $4.5 billion in ad sales in just three years if you only take into account the first quarter.

The sharp decline is caused by the lousy state of both digital and dead tree ad sales: the stats posted on the Newspaper Association of America website show that print sales fell by 29.7% in the first three months of this year (to $5.9 billion), while online sales dropped a record 13.4% (to $696.3 million).

Buggy whip sales figures probably looked a lot like this after Henry Ford’s Model T hit the market.

Of course, some of us think it isn’t only the Internet & Craig’s List producing this decline. The arrogance, insularity, partisanship, and dishonesty of establishment newspapers has to be having some negative impact.

18 May 2009

New Search Engine: WolframAlpha

, , ,

Mike Harvey, at the Times of London, describes a new approach to web searches.

A revolutionary new search engine that computes answers rather than pointing to websites will be launched officially today amid heated talk that it could challenge the might of Google.

WolframAlpha, named after Stephen Wolfram, the British-born computer scientist and inventor behind the project, takes a query and uses computational power to crunch through huge databases.

The service can compute the distance between two cities, the population of a country at a specific date and the position of the Space Shuttle at a given moment. The user does not have to search through links provided by the engine; the answer comes immediately and, if appropriate, is accompanied by charts or graphs. …

The new service, available at wolframalpha.com, was previewed several months ago amid industry speculation that it could be a “Google killer”. Dr Wolfram, however, is at pains to point out that his brainchild is a “computational knowledge engine”, not a traditional search engine.

27 Mar 2009

Exposing Journolist

, , , , ,

24-year-old Liberal blogger Ezra Klein founded the Journolist email listserver in February 2007 to provide a forum for leftwing bloggers, journalists, academics, and policy professional to coordinate strategy and compare notes.

About a week and a half ago (March 17th), Michael Calderone began shining an investigative light on Jlist.

“It’s sort of a chance to float ideas and kind of toss them around, back and forth, and determine if they have any value,” said New Republic associate editor Eve Fairbanks, “and get people’s input on them before you put them on a blog.”

Indeed, the advantage of JList, members say, is that it provides a unique forum for getting in touch with historians and policy people who provide journalists with a knowledge base for articles and blog posts. …

Said another JLister: “I don’t know any other place where working journalists, policy wonks and academics who write about current politics and political history routinely communicate with one another.”

But, as Calderone reports, Jlist’s key feature has been its limited access and secrecy.

Time’s Joe Klein, who acknowledged being on JList and several other listservs, said in an e-mail that “they’re valuable in the way that candid conversations with colleagues and experts always are.” Defending the off-the-record rule, Klein said that “candor is essential and can only be guaranteed by keeping these conversations private.”

Mark Hemingway, at National Review, raised some ethical concerns.

[O]ne of the most valuable currencies in Washington is access to the press. The article notes that many stories have started on or been shaped by JournoList. If you’re a liberal blogger or activist, you can now push your story on the highest echelons of journalism with a quick email. If you’re a mainstream journalist, is it really ethical that you don’t give the opposing view equal access?

Finally, ripping away the veil completely, Mickey Kaus broke all the rules and served up a real, though bowdlerized, sample exchange of foul-mouthed, twittering lefties “discussing” the New Republic and its editor Martin Peretz, whose lack of enthusiasm for the Palestinian cause has left him vulnerable to accusations of racism and dark hints about his sex life.

11 Jan 2009

What Are Friends For?

, , , ,

Would you trade 10 friends for a hamburger?

Burger King is running a promotion called Whopper Sacrifice. The idea is that FaceBook members can receive a coupon good for one free Whopper for every ten persons they eliminate from their friendship list.

Hopefully our (former) friends will understand.

Your are browsing
the Archives of Never Yet Melted in the 'The Internet' Category.
/div>








Feeds
Entries (RSS)
Comments (RSS)
Feed Shark