Global Security Matrix: Web Archive
Explore Witness Discuss Apply
Human State System Network Global
Warfare Query Query Query Query Query
Terrorism and Crime Query Query Query Query Query
States at Risk Query Query Query Query Query
Resource Conflict Query Query Query Query Query
Pandemics Query Query Query Query Query
Environment Query Query Query Query Query
W.M.D. Proliferation Query Query Query Query Query
InfoWar Query Query Query Query Query
all.gif
Items matching "network infowar"
  1. 2 Chinese Schools Said to Be Linked to Online Attacks - NYTimes.com | SAN FRANCISCO — A series of online attacks on Google and dozens of other American corporations have been traced to computers at two educational institutions in China, including one with close ties to the Chinese military, say people involved in the investigation. | 2010--0-2-
  2. The age of 'celebrity terrorism' | Quite apart from the scores murdered and the hundreds injured, what the Mumbai terrorists really wanted was an exaggerated - and preferably extreme - reaction on the part of governments, the media and public opinion. | 2008--1-1-
  3. Huge System for Web Surveillance Discovered in China | A group of Canadian human-rights activists and computer security researchers has discovered a huge surveillance system in China that monitors and archives certain Internet text conversations that include politically charged words. (NYT) | 2008--1-0-
  4. Chertoff: I'm Listening to the Internet (Not in a Bad Way) | Homeland Security chief Michael Chertoff sat down with Threat Level on Monday in Silicon Valley to talk about laptop searches at the border, the government's new-found interest in computer security, and the continuing saga of overeager terrorist watch lists. (wired.com) | 2008--0-8-
  5. Russian Gang Hijacking PCs in Vast Scheme | A criminal gang is using software tools normally reserved for computer network administrators to infect thousands of PCs in corporate and government networks with programs that steal passwords and other information, a security researcher has found. (NYT) | 2008--0-8-
  6. Gordon Brown aide a victim of honeytrap operation by Chinese agents | A top aide to Gordon Brown has been a suspected victim of a “honeytrap” operation by Chinese intelligence agents. The aide, a senior Downing Street adviser who was with the prime minister on a trip to China earlier this year, had his BlackBerry phone stolen after being picked up by a Chinese woman who had approached him in a Shanghai hotel disco. The aide agreed to return to his hotel with the woman. He reported the BlackBerry missing the next morning. | 2008--0-7-
  7. Cyber risk 'equals 9/11 impact' | The US homeland security chief has made a heartfelt plea to Silicon Valley workers to stand up and be counted in the fight to secure the cyber highway. Michael Chertoff invoked the attacks of 9/11 as he sought to galvanise IT professionals and security experts. He told the world's biggest IT security conference that serious threats to cyberspace are on "a par this country tragically experienced on 9/11". (BBC) | 2008--0-4-
  8. Europeans poised to bolster Web shield | On Wednesday, NATO will present a strategy for countering computer attacks at a meeting for heads of state in Bucharest, with a proposal to create a central cyberdefense authority. "The attacks on Estonia - directed at services on which Estonian citizens rely - could happen anywhere," said James Appathurai, a NATO spokesman. "The only way to defend against them is through multinational, multilateral cooperation." Paet, the foreign minister of Estonia, said he hoped that more countries would support the various international agreements to create "a legal, concrete framework." But it may not improve matters in the long term with Russia, which, along with nations like Georgia, Turkey and Liechtenstein, has not signed the Council of Europe's cybercrime treaty. (International Herald Tribune) | 2008--0-3-
  9. Pentagon bans Google map-makers | The US defence department has banned the giant internet search engine Google from filming inside and making detailed studies of US military bases. (BBC) | 2008--0-3-
  10. BBC enters a crowded marketplace as it unveils new Arabic TV channel | BBC Arabic's flagship evening news show, Hassad al-Yom al-Ikhbari, is the BBC World Service's new a controversial new satellite channel, aimed at re-establishing its pre-eminence in one of the world's most competitive news markets. As it promised to take on al-Jazeera and its rivals head-on, BBC Arabic faced accusations that it was little more than a British foreign policy tool and doubts over whether it could establish itself in an overcrowded sector. (Guardian) | 2008--0-3-
  11. US seeks terrorists in web worlds | The US government has begun a project to develop ways to spot terrorists who are using virtual worlds. (BBC) | 2008--0-3-
  12. Pakistan blocks 'objectionable' YouTube | Pakistan has become the latest country to block access to the video-sharing Web site YouTube on the grounds that one or more videos on the site offend Islam, authorities said Monday. (CNN) | 2008--0-2-
  13. 'Al-Qaeda boys' in training video | US and Iraqi forces have issued video footage which they say shows children under the age of 11 being armed and trained by al-Qaeda. (BBC) | 2008--0-2-
  14. Al-Qaeda: How jihad went freelance | Al-Qaeda has evolved from a single group to an amorphous movement. Does that make it less dangerous or more so? (Economist) | 2008--0-2-
  15. Ask al Qaeda: Questions for terrorist network posted online | Al Qaeda's media arm, Al-Sahab, announced last month that Osama bin Laden's deputy, Ayman al-Zawahiri, would take questions from the public in an "online interview." After receiving 900+ posts by the January 16 deadline, many are waiting for al-Zawahiri to post his online responses. (CNN) | 2008--0-1-
  16. What We Know | In a podcast for the New Yorker, Lawrence Wright writes about Mike McConnell, the director of National Intelligence. Here Wright talks with Matt Dellinger about McConnell’s ideas for reform, his views on privacy issues and torture, and the threats the intelligence community may confront in the future. (the New Yorker) | 2008--0-1-
  17. Al Qaeda taps cell phone downloads | Al Qaeda video messages of Osama bin Laden and Ayman al-Zawahri can now be downloaded to cell phones, the terror network announced as part of its attempts to extend its influence. (CNN) | 2008--0-1-
  18. Bin Laden message 'to be aired' | A new video of Osama Bin Laden on an Islamic jihadist website (as promoted by the leader's media group As-Sahab) is reported to promote the idea of driving a 'wedge' between Western citizens and their leaders. The article also discusses Bin Laden's interest in global media. (BBC) | 2007--1-1-
  19. In Pakistan, a Fight to Stay Connected on the Web | A collection from the New York Times' Lede Blog of articles and pieces written on the web in response to General Musharraf's crackdown in Pakistan. (NYTimes) | 2007--1-1-
  20. America Should Hire al-Qaeda’s PR Agent | An opinion piece that examines al-Qaeda's use of IEDs and other attacks in order to give the impression to both domestic and foreign audiences that America is losing the war. (Good Magazine) | 2007--1-1-
  21. The Iraq war has become a disaster that we have chosen to forget | Discussing the roles of both the media and the government in their inability to accurately report the war in Iraq, this article also touches on the broader affects of the war that are, as it points out, not being broadcasted in mainstream media. (Guardian America) | 2007--1-1-
  22. Pulling the Plug: A Technical Review of the Internet Shutdown in Burma | This bulletin examines the role of information technology, citizen journalists, and bloggers in Burma and presents a technical analysis of the abrupt shutdown of Internet connectivity by the Burmese government on September 29, 2007, following its violent crackdown on protesters there. The shutdown of Internet connectivity was precipitated by its use by citizens to send photographs, updates and videos that documented the violent suppression of protests in Burma, information that contributed to widespread international condemnation of the Burmese military rulers’ gross violations of human rights. (OpenNet Initiative) | 2007--1-1-
  23. U.S. Government Seeks To Deny The Internet To Its Enemies | A newly published government document 'National Strategy for Homeland Security' places greater emphasis on the ab/use of the Internet than the 2002 version, also keeping with the government's 2006 National Infrastructure Protection Plan. | 2007--1-0-
  24. An Internet Jihad Aims at U.S. Viewers | An article about 'Islamic jihadi media.' The NYTimes article discusses the growing constellation of apparently independent media operators who are broadcasting the message of Al Qaeda and other groups, a message that is increasingly devised, translated and aimed for a Western audience. | 2007--1-0-
  25. U.S. pulls plug on 6 al-Qaeda media outlet | The U.S. military says it has captured at least six al-Qaeda media centers in Iraq and arrested 20 suspected propaganda leaders since June. The seizures of the centers underscore the importance al-Qaeda has placed on media, primarily the Internet, as a tool to communicate to its members and use against U.S. forces in Iraq. The group's media emphasis continues to increase, intelligence analysts say. | 2007--1-0-
  26. Proving That Seeing Shouldn't Always Be Believing | An interview with Hany Farid, head of the Image Science Laboratory at Dartmouth College. Farid is a founder of a subdiscipline within computer science: digital forensics. The purpose of his work with image manipulation is to discover how computerized forgeries are made. Intelligence agencies, news organizations and scientific journals employ Dr. Farid’s consulting services when they need to authenticate the validity of images. (NYTimes) | 2007--1-0-
  27. Junta tightens media screw | As Burmese soldiers fire bullets and tear gas to disperse anti-government protests in Rangoon, the military rulers have taken the offensive in the battle to control the flow of information in the country, by blocking media/material that could damage the image of the Junta by the international community. | 2007--0-9-
  28. Osama bin Laden issues threat to Musharraf (video) | The al-Qaida leader, Osama bin Laden, vows to retaliate against the 'infidel' president of Pakistan, Pervez Musharraf. The video has been played across the Internet. | 2007--0-9-
  29. Internet 'bigger threat' in terrorism spread | Television transcript of an interview conducted concerning how the Internet is becoming an increasingly important tool for terrorists. | 2007--0-9-
  30. Yahoo! sued over torture of Chinese dissident | A Chinese political prisoner sued Yahoo! in a US federal court, accusing the internet company of helping the Chinese government torture him by providing information that led to his arrest. The suit, filed under the Alien Tort Claims Act and the Torture Victims Protection Act, is believed to be the first of its kind made against an American internet company. | 2007--0-4-
  31. Space Supremacy | Article discusses how the U.S. has revised its space policy for the first time in ten years in order to achieve "space supremacy" for the future. | 2007--0-1-
  32. Open-Source Spying | National defense agencies are doing an extreme makeover on their computer systems with plans to use wikis and blogs to capture terrorists and terrorist plots. | 2006--1-2-
  33. Al Jazeera enters the 'information war' | Article examines how the launch of Al Jazeera English is shaking up the traditional stronghold of major international media outlets on the market for news. | 2006--1-1-
  34. Anti-U.S. Attack Videos Spread on the Internet | On terror/insurgent networks, the internet as a force multiplier, and infowar. | 2006--1-0-
  35. The Growing World of Google Earth | Interesting article about how something as innocuous as Google Earth can be a threat to (inter)national security with up to one-third of the world's population being covered by high-resolution imagery. | 2006--1-0-
  36. Bush Disagrees That Iraq War Raises Threat of Terrorism | How does this relate to the matrix? Still a test, but a good article. | 2006--0-9-