world war E
dispatches from the network society

Archive for the ‘guerrilla’ Category

collective information security: part 1

October 7, 2007

Despite a booming volume business for botnets on the black market, herders are beginning to break up swarms and spread them across multiple command servers, in an effort to thwart the detection and neutralization technique most commonly used by security firms and law enforcement: pinpoint the source of a traffic spike and sever the network […]

burma cuts off internet

September 29, 2007

Reports are in that the Burmese government has severed that country’s internet links to the outside world in an effort to halt the global distribution of news and images of repression, using the guise of a damaged cable. While many countries selectively control the inflow of information (viz. Zimbabwe), these reports – if correct – […]

hacking bin laden

September 12, 2007

The Washington Post reports that independent websites are outstripping the U.S. government’s ability to access bin Laden’s latest video releases. Not only has al Qaeda’s distribution – through video, audio and cell phones – become more sophisticated, but its internet capacity seems to have dramatically expanded; according to the article, 650 sites launched the broadcast […]

mapping cyber-jihad

August 10, 2007

The Economist reported a few weeks ago on Younis Tsouli aka Irhabi007, self-styled cyber-jihadi and apparent coordinator of al-Qaeda’s internet propaganda. Tsouli was arrested in London in 2005 along with two other cyber-jihadis and received a ten year sentence. The London Police counter-terrorism bureau delivered a textbook definition of the network society when describing the […]

cybercrime funds organized crime

July 26, 2007

Organized crime has, since the early 19th century, used a sophisticated network structure to insulate its activities from information and prosecution. The application of information technology has amplified the capacity of these networks and offered some new business opportunities, according to U.S. federal law enforcement officials. In addition to run of the mill scams, criminal […]

thai cyberbattlefield opens

July 25, 2007

Cyber-guerrillas hacked into the Thai Ministry of Information and Communication Technology a day after a new law to combat cyber crimes was effected by the military government. The hackers posted photographs of ousted Prime Minister Thaksin Shinawatra, who was removed in a coup last year. In a related story, the recent launch of Thaksin’s official […]

recent cyber skirmishes in China

July 25, 2007

Reporters Without Borders (RSF) draws attention to recent official and unofficial (?) attacks on Chinese news and human rights websites: The Shanghai Information Bureau closed the literary forum Zhongguo Dangdai Shige Luntan. An employee of the hosting server commented in an interview: “All articles relating to politics, the Falungong movement or those critical of the […]

the great firewall of china

June 19, 2007

Flickr is the latest casualty of China’s cyber censorship, according to reports from Beijing. Average surfers complain: “I just want to look at some photos! What’s wrong with that?” Subversive elements quickly posted work-arounds on blogs and in chat rooms. Given the speed with which China’s internet-using population is growing – over 140 million in […]

pitched battles 1986-2007

June 1, 2007

The Economist lists some of the volleys lobbed during the brief history of cyberwarfare: 1986: Soviet hackers attack Lawrence Berkeley National Laboratory in California. 1998: A Russian hacker infiltrates NASA, potentially endangering a shuttle mission. 1999: The NATO bombing of the Chinese embassy in Belgrade unleashes a cyber-assault on U.S. government sites. 2000: Arab and […]

Inside the Brave New War

May 29, 2007

Wired interviews John Robb, author of Brave New War – The Next Stage of Terrorism and the End of Globalization – and blogger at Global Guerrillas. His thesis: new cheap weapons and diffused technologies are changing the nature of warfare, and are undermining the capacity of weak states to deal with the most sinister effects […]