Archive for the ‘Internet’ Category

The nation’s largest left-wing newspaper is counting its last days

April 25, 2009

“The Internet is a wonderful place to be, and we’re leading there,” said Arthur Sulzberger, owner, chairman and publisher of the New York Times in February 2007.  “I really don’t know whether we’ll be printing the Times in five years, and you know what? I don’t care either,” he said.

Good thing Mr. Sulzberger doesn’t care because “print” editions of many newspapers seem to be living on borrowed time….and money….

White House Works To Bury Pelosi-CIA Story, New York Times Complies

PelosiTruthGate: Did CIA Lie About Torture To Congress? Time To Find Out Or Fire Pelosi

NYT: Pelosi Accusations of CIA Lying on Page A18; Wash Post Makes Special Editorial; White House Dodges Questions

By Bill O’Reilly
Fox News

The nation’s largest left-wing newspaper and the bible for network news producers and bookers may be going under. This week, The New York Times announced more staggering losses: nearly $75 million dollars in the first quarter alone. The New York Post is reporting that the Times Company owes more than $1 billion and has just $34 million in the bank. A few months ago, the company borrowed $250 million from Mexican billionaire Carlos Slim at a reported 14 percent interest rate. With things going south fast, pardon the pun, Slim might want to put in a call to Times publisher Arthur Sulzberger Jr.

The spin from Sulzberger is that the Internet is strangling the newspaper industry, and there is some truth to that. Why read an ideologically crazed paper when you can acquire a variety of information on your computer? But other papers are not suffering nearly as much as the Times, so there must be more to it.

There is no question that the Times has journalistic talent. This week the paper won five Pulitzers. It’s true that the Pulitzer people favor left-wing operations (the past eight Pulitzer Prizes for commentary have gone to liberal writers), but New York Times journalists often do good reporting.

Read the rest:

Pentagon Cyber-Command Is in the Works

April 22, 2009

The Obama administration is finalizing plans for a new Pentagon command to coordinate the security of military computer networks and to develop new offensive cyber-weapons, sources said last night.

Planning for the reorganization of Defense Department and intelligence agencies is underway, and a decision is imminent, according to a person familiar with the White House plans.

The new command would affect U.S. Strategic Command, whose mission includes ensuring U.S. “freedom of action” in space and cyberspace, and the National Security Agency, which shares Pentagon cybersecurity responsibilities with the Defense Information Systems Agency.

The Pentagon plans do not involve the Department of Homeland Security, which has responsibility for securing the government’s non-military computer domain.

But President Obama must approve the changes and Congress must be notified of them before they can be implemented, said this source, who has spoken with several White House and military officials. This individual spoke on the condition of anonymity because the process is still “in motion.”

Read the rest fromThe Washington Post:

Senate Proposal Could Put Heavy Restrictions on Internet Freedoms

April 22, 2009

A proposed bill that would give the president widespread power to shut down the Internet in the event of a cyberattack could have sweeping implications on civil liberties.

By James Osborne

Fox News

The days of an open, largely unregulated Internet may soon come to an end.

A bill making its way through Congress proposes to give the U.S. government authority over all networks considered part of the nation’s critical infrastructure. Under the proposed Cybersecurity Act of 2009, the president would have the authority to shut down Internet traffic to protect national security.

The government also would have access to digital data from a vast array of industries including banking, telecommunications and energy. A second bill, meanwhile, would create a national cybersecurity adviser — commonly referred to as the cybersecurity czar — within the White House to coordinate strategy with a wide range of federal agencies involved.

Obama’s Plan: Shut Off Free Speech by Shutting Off Internet, Talk Radio and Fox News

The need for greater cybersecurity is obvious:

– Canadian researchers recently discovered that computers in 103 countries, including those in facilities such as embassies and news media offices, were infected with software designed to steal network data.

– A Seattle security analyst warned last month that the advancement of digital communication within the electrical grid, as promoted under President Obama’s stimulus plan, would leave the nation’s electrical supply dangerously vulnerable to hackers.

– And on Tuesday the Wall Street Journal reported that computer spies had broken into the Pentagon’s $300 billion Joint Strike Fighter project and had breached the Air Force’s air-traffic-control system.

Nonetheless, the proposal to give the U.S. government the authority to regulate the Internet is sounding alarms among critics who say it’s another case of big government getting bigger and more intrusive.

Silicon Valley executives are calling the bill vague and overly intrusive, and they are rebelling at the thought of increased and costly government regulations amid the global economic crisis.

Others are concerned about the potential erosion of civil liberties. “I’m scared of it,” said Lee Tien, an attorney with the Electronic Frontier Foundation, a San Francisco-based group.

“It’s really broad, and there are plenty of laws right now designed to prevent the government getting access to that kind of data. It’s the same stuff we’ve been fighting on the warrantless wiretapping.”

Sen. Jay Rockefeller, D-W. Va, who introduced the bill earlier this month with bipartisan support, is casting the legislation as critical to protecting everything from our water and electricity to banking, traffic lights and electronic health records.

“I know the threats we face.” Rockefeller said in a prepared statement when the legislation was introduced. “Our enemies are real. They are sophisticated, they are determined and they will not rest.”

The bill would allow the government to create a detailed set of standards for cybersecurity, as well as take over the process of certifying IT technicians. But many in the technology sector say the government is simply ill-equipped to get involved at the technical level, said Franck Journoud, a policy analyst with the Business Software Alliance.

“Simply put, who has the expertise?” he said. “It’s the industry, not the government. We have a responsibility to increase and improve security. That responsibility cannot be captured in a government standard.”

A spokeswoman from Rockefeller’s office said neither he nor the two senators who co-sponsored the bill, Olympia Snowe, R-Maine, and Bill Nelson, D-Fla., will answer questions on cybersecurity at a later date.

Obama, meanwhile, is considering his own strategy on cybersecurity. On Friday, the White House completed a lengthy review of the nation’s computer networks and their vulnerability to attack. An announcement is expected as early as this week.

“I kind of view [the Rockefeller bill] as an opening shot,” said Tien. “The concept is cybersecurity. There’s this 60-day review underway, and some people wanted to get in there and make their mark on the White House policy development.”

IT leaders hope the president will consider their argument that their business is not only incredibly complex and static, but that it also spreads over the entire globe.

If the United States was to set its own standard for cybersecurity, they say, it would create a host of logistical challenges for technology companies, virtually all of which operate internationally.

“Any standards have to be set at an international level and be industry led,” said Dale Curtis, a spokesman for the Software Business Alliance. “This industry moves so fast, and government just doesn’t move that fast.”

Many Silicon Valley executives remain hopeful that the White House’s recommendations will be more industry-friendly, following what Journoud said was a good dialogue with former Bush administration official Melissa Hathaway, who is leading the White House review and is considered a likely candidate for cybersecurity czar.

China denies claims it hacked into Pentagon computers

April 21, 2009

The $300 billion (£206bn) jet is being developed by Lockheed Martin and will be bought by eight other countries, including the UK.

However, the Wall Street Journal reported that hackers had broken into the project and siphoned off “several terabytes of data related to design and electronics systems”.

By Malcolm Moore in Shanghai
Telegraph (UK)

The leak could make it easier to defend against the plane, also known as the F35 Lightning II. However, the spies could not access the most sensitive material, which is kept on computers that are not connected to the internet.

F-35 Lightning II

Former US officials said the attacks appear to have originated in China, but there is scant concrete evidence because it is easy to mask identities online.

Chinese officials reacted angrily to the accusation, and a spokesman for the foreign ministry said: “China has not changed its stance on hacking. China has always been against hacking and we have cracked down very hard on hacking. This is not a Chinese phenomenon. It happens everywhere in the world.”

Attacks on the Pentagon are common, but are said to have escalated dramatically in the past six months, and coincide with growing speculation about China’s role in cyber espionage.

A report issued by the Pentagon last month said the Chinese military has made “steady progress” in its online warfare capabilities, a key field in which China can compete with the US.

The Chinese Embassy in Washington called the report “a product of the Cold War mentality” and said accusations of cyber crime were being spread to inflame opinion against China.

At the end of last month, researchers at several universities discovered the existence of GhostNet, a vast internet espionage network that was siphoning information from sensitive computers in 103 countries. One third of its targets were based in embassies, news media and NGOs. The researchers said the majority of GhostNet’s attacks originated from within China but stopped short of accusing Beijing of responsibility.


The security of the Joint Strike Fighter may have been breached before, according to a Pentagon report in 2008. The report said that “the advanced aviation and weapons technology for the JSF programme may have been compromised” because the Defence Department had not kept a close enough eye on the 1,200 contractors involved in the mammoth process. At the time, BAE Systems, the UK arms company, was named as one contractor that might have allowed details to leak. BAE denied that any information on the jet had been compromised.

The UK intends to use the Joint Strike Fighter as a replacement for the Harrier jump jet. More than 2,400 jets will be built in total.