« July 2006 | Main | September 2006 »

August 31, 2006

Censorship in the Router

The ultimate aim of the RIAA/MPAA anti-piracy lobby is to prevent the illegal copying of their content - you can see their point - but their methods aren't winning them any friends right now.

The problem is that they want to demonise file sharing of any kind - and not all P2P file sharers are copyright violation thieves - some of us just want to share files and try really, really, hard not to break the law.

But the announcement of this product makes the idea of including censorship in the router a reality

Allot Communications, a company specializing in "intelligent IP service optimization solutions" has unveiled the newest feature built into its NetEnforcer device. The device is now capable of detecting encrypted BitTorrent traffic. ISPs using the NetEnforcer will now be able to throttle BitTorrent traffic more efficiently.

As P2PNet observes, many ISPs recently began shaping their network traffic to keep BitTorrent users from sucking up all of the available bandwidth -- in some cases, BitTorrent accounts for half of an ISP's traffic. However, BT users were quick to work around the ISP's detection schemes by using RC4 encryption. All of the major BitTorrent clients recently added the option to encode transfer files using RC4 encryption.

The NetEnforcer uses Allot's deep packet inspection technology "to identify and analyze hundreds of applications and protocols, track subscriber behavior, prioritize traffic and shape traffic flows.

Brilliant!!

Now everybody who uses torrents to mirror innocent FOSS software or legal CC torrents are going to be penalised too.

The use of bandwidth throttling via protocols is nothing more than a form of censorship.

Sure some people use bit-torrent to share illegal files - but a lot of us don't - we want to respect the law and also share legal content.

Why should we be penalised because we use a bandwidth efficient P2P protocol to share legal content?

Why should my ISP - who I pay $$$ to monthly restrict my use of certain protocols to share legal music, video and software - when I have contracted for unlimited bandwidth for a month?

Forget FOSS and Creative Copyright - with the introduction of censorware hardware products like these, when the industry is restricting and prohibiting protocols on the grounds that some people might abuse them -then we really have reached a situation where censorship is in the router


Tags: , , , , , , , , , ,


August 26, 2006

Seconds to Go?

I've already talked about the Doomsday Clock which hasn't been moved since 2002, and currently stands at Seven Minutes to Midnight and why it should be updated in the face of the nuclear threat nuclear research over in Iran, but I really think its time to move the doomsday clock on - to the point there's just "Seconds to Go" ...

"No one can deprive a nation of its rights based on its capabilities," Ahmadinejad said in his speech to inaugurate the project. The plant's plutonium by-product could be used to make atomic warheads.

The U.N. Security Council has demanded Iran meet an August 31 to halt uranium enrichment, the part of Tehran's atomic programme which is the biggest worry to the West.

Western nations accuse Iran of seeking to master technology to produce nuclear weapons. Iran, the world's fourth largest oil exporter, insists it only wants to produce electricity.

"Iran is not a threat to anybody, not even to the Zionist regime," Ahmadinejad said, using Iran's term for its arch-enemy Israel, which the Islamic Republic does not recognise.

Really? Coming from a man who has been widely quoted as having said:

Israel must be wiped off the map

I don't see why we should trust Iran to use nuclear power for peaceful purposes.

Even now nobody has made any sensible response to the question I asked when I wrote about The Big Lie earlier this year.

Why would a country like Iran, which holds oil reserves of approx 132.5 billion barrels - roughly 14% of the world’s oil reserves, and which also holds 812 trillion cubic feet of gas reserves – 15.8% of the world’s gas reserves - choose to develop nuclear energy as an alternative power source - with the huge expense, environmental risk, and danger of political fallout?

In a country which enjoys an average of 8.5 hours of sunlight per day wouldn’t a solar solution be more ecologically and politically acceptable?

Well actually - people do have answers - they just seem a little crazy to me.

Every peace activist on the globe ought to be in the streets and elsewhere lobbying in support of something very simple:do not attack Iran, even if this means allowing Iran to develop its own nuclear weapons.

Hmmm ... well try this - which, argues that a succesful terror attack could force "regime change" on the USA and actually save lives in the long run

What if another terror attack just before this fall's elections could save many thousand-times the lives lost?

I start from the premise that there is already a substantial portion of the electorate that tends to vote GOP because they feel that Bush has "kept us safe," and that the Republicans do a better job combating terrorism.

If an attack occurred just before the elections, I have to think that at least a few of the voters who persist in this "Bush has kept us safe" thinking would realize the fallacy they have been under.

If 5% of the "he's kept us safe" revise their thinking enough to vote Democrat, well, then, the Dems could recapture the House and the Senate ...:

So while Iran is busy building nuclear weapons - what is the world doing about it?

Right now everybody is too busy re-arranging the deckchairs on the Titanic in preparation for Nero's premier as violin soloist to see the iceberg looming on the horizon.

But ask yourself this:

Do you think an Iran armed with nuclear weapons is going to make the world more, or less, safe?

Now go home and try and sleep tonight.


Tags: , , , , , , ,


August 20, 2006

Two Things

Sometimes two things come together like a sewing machine and an umbrella ...

Scientists flock to test 'free energy' discovery

A man who claims to have developed a free energy technology which could power everything from mobile phones to cars has received more than 400 applications from scientists to test it.
and Hundreds drink 'sweet seawater'
Hundreds of people flocked to a beach in the Indian city of Mumbai after reports the seawater had turned sweet.

Tags: , , , , ,


August 16, 2006

The Evil Hippie Threat

How much do you trust the Department of Homeland Security to police the Internet and ensure that the networking infrastructure is "safe"?

This recent report by Kevin Poulsen gives a clue - and it doesn't make me feel more secure - especially as I have already registered my doubts about the whole "Net Wargames" exercise here and here - and have also pointed out that there has been a huge rise in the number of cyber-attacks and defacements during the recent war in the Middle-East.

So who did the Department of Homeland Security pick as the most dangerous threat to the USA in the recent "CyberStorm" excercise?

Hippies, and other "leftists" concerned with globalisation, privacy and security - those people who are meant to hardly able to recall their name because they are too stoned - were designated the "enemy of choice".

The attack scenario detailed in the presentation is a meticulously plotted parade of cyber horribles led by a "well financed" band of leftist radicals who object to U.S. imperialism, aided by sympathetic independent actors.

At the top of the pyramid is the Worldwide Anti-Globalization Alliance, which sets things off by calling for cyber sit-ins and denial-of-service attacks against U.S. interests. WAGA's radical arm, the villainous Black Hood Society, ratchets up the tension on day one by probing SCADA computerized control systems and military networks, eventually (spoiler warning) claiming responsibility for a commuter rail outage and the heat going out in government buildings.

The Black Hoods are a faction of Freedom Not Bombs, whose name is suspiciously similar to the real Food Not Bombs, which provides vegan meals to the homeless.

Another allied lefty-group called the Peoples Pact joins in, crashing portions of the power grid. Things get confusing when the "Tricky Trio," three evil hax0rs who are 50 percent more devious than the Deceptive Duo, hacks the FAA, issues false Amber Alerts, and manipulates the communications system of the U.S. Northern Command.

Then someone posts the No-Fly List to a public website (third act shocker: it's all nuns and Massachusetts Democrats), and opportunistic cyber thieves raid a medical database looking for identity theft targets. Logic bombs explode, wireless communications devices are corrupted, DNS caches are poisoned.

Why pick on Hippies? Why not pick on groups who are making real cyber-attacks on a daily basis?

Last time I checked all my spam and spyware was promoting Viagra, not cannabis, and web defacements were running 2-1 in favour of Hezbollah not Pink Floyd.

I haven't seen any comment spam recommending the Grateful Dead or LSD, nor a single web defacement replacing backgrounds with a tie-dye or paisley pattern ...

It might have something to do with the fact that Hippies don't have a CAIR type organisation that objects that the characterisation of "hippies" as possible "cyber-terrorists" could cause backlash amongst the "Hippie Community" who will object against the "stereotypical representation of Hippies" that borders on "Hippie-Phobia" and unfairly smears "moderate hippies" with the "radical hippie" label.

It also might have something to do with the fact that the "Enemy Within" is becoming more useful as a method of getting funding for increased surveillance, monitoriing, and tracking technqiues which reduce our freedom while doing nothing to make us safer.

Do you feel safer now that you know that the whole "CyberStorm" exercise was targeted at US citizens?

Or are you starting to wonder: are these new techniques of surveillance, expressly designed to monitor the "Enemy Within", destroying the freedoms that, until now, we have taken for granted?

When a huge exercise ignores the real threats to the Internet in favour of "anti-globalization radicals and peace activists" you start to wonder what the real agenda is.

Why test and refine techniques that could be used for the suppression of home-grown dissent when there are more pressing problems to be solved - like changing the default passwords on MILNET computers to ensure they are secure - or simulating a wave of web-defacements and attacks perpetrated by foreign cyber-radicals - in preparation for the recent wave of attacks by the "cyber-hezbollah"?

Why the emphasis on the "Enemy Within"?

Could it be that the "War on Terror" is being used to mask an assault on civil liberties - as suggested by the recent report by International Campaign Against Mass Surveillance

Global security and the "war on terror" now dominate the global political agenda. Driven largely by the United States, a growing web of anti-terrorism and security measures are being adopted by nations around the world. This new "security" paradigm is being used to roll back freedom and increase police powers in order to exercise increasing control over individuals and populations.

Under the public's radar screen, a registration and surveillance infrastructure of global reach is quietly being constructed. It includes the convergence of national and international databases, the creation of data profiles for whole populations, the creation of a global ID system, the global surveillance of movement, and the global surveillance of electronic communications.

The current system of surveiilance and control guarantees that when everyone is perpetually watched to see if they are a potential security threat - then everyone is a potential security threat

The logical outcome of the "War on Terror" is that we are all the enemy now.


Tags: , , , , , , , , , , ,


August 10, 2006

The Real Electronic Hezbollah

A good article on the real electronic Hezbollah, rather than the people who spend all their time and effort distributing BigMedia garbage for free

TIME.com: How Hizballah Hijacks the Internet

The recent hijacking of a South Texas cable operator is a case study in how Hizballah moves in. The Texas cable company has an agreement with a New York-based satellite communications aggregator, which moves feeds to a variety of customers from throughout the world, including Lebanon. A technician in New York made an "improper connection," according to an official with the cable company's communications provider who detailed the hijack for TIME. That opening was detected by Hizballah.

Al-Manar, widely considered a mouthpiece for Hizballah and categorized as a terrorist group by the U.S., linked to the small cable company's IP (Internet Protocol) address, which can be thought of, in simple terms, as a telephone number. Hizballah essentially added an extension on that telephone line allowing their traffic to flow. Hizballah then gets the word out through e-mail and blogs that it can be found at that IP address and the hijack is complete. If the hijack is not detected, the IP address can be linked to a new domain name and that opens up the site to anyone who might search online for Al-Manar content. Hizballah uses these Web sites to run recruitment videos and post bank account numbers where supporters can donate funds.
Interesting stuff - especially when you consider that Zone-H recently reported that the Middle East conflict has seen a huge rise in electronic attacks, web defacements and denial of service attacks.
Hundreds of web sites have been attacked in last days as a protest against bombing attacks by Israel against Lebanon.The largest part of web intrusions were defacements - web intrusion at any level by which a web page is replaced by the attacker’s message- against Israeli and U.S. web sites.

Zone-H registered last week a hike in the number of defacements both against Israeli and American commercial or governmental websites, among which there are the NASA website, the Berkeley University website and many other military websites.

Among the intrusions recorded since july 13th, about 8000 are politically motivated, whereas almost 1500 were due to patriotism.

In more then 1100 defacements the conveyed message is specifically related to the war .
Information warfare - once the realm of science fiction - has become a reality.

Tags: , , , , , , , , ,


August 9, 2006

Censorship and Propaganda

Thought Criminal has a good round up of censorship issues.

Have you run into a censor lately? If not, you probably don't get out much. Or perhaps you just don't recognize censorship when you see it.

Here are some examples just from the past few days. Look for similar examples in your own neighborhood.
and makes the point quite nicely ..
The internal censor defines individual values; the government censor defiles individual freedom.

Censorship defiles freedom and mocks the free flow of information that is necessary in the modern world and so does media propaganda.

Propaganda is worse than censorship, the total blackout of news about certain topics which ensures that the people remain totally uninformed, than a flood of disinformation based propaganda which distorts people's perceptions - so that while they think they are well informed - they are ill-informed to the point of distorting reality?

Censorship and propaganda - two essentials tools when you are fighting a New Cold War - so it is no surprise that they are taking center stage in the MSM spin-wars that accompany the Middle East conflict.

Censorship and propaganda - two halves of the (spinning) coin - and we can expect things to get worse rather than better - real soon now ....

Tags: , , , , , , , , ,