Global Security Matrix: Web Archive
Explore Witness Discuss Apply
Human State System Network Global
Warfare Query Query Query Query Query
Terrorism and Crime Query Query Query Query Query
States at Risk Query Query Query Query Query
Resource Conflict Query Query Query Query Query
Pandemics Query Query Query Query Query
Environment Query Query Query Query Query
W.M.D. Proliferation Query Query Query Query Query
InfoWar Query Query Query Query Query
all.gif
Items matching "state infowar"
  1. The age of 'celebrity terrorism' | Quite apart from the scores murdered and the hundreds injured, what the Mumbai terrorists really wanted was an exaggerated - and preferably extreme - reaction on the part of governments, the media and public opinion. | 2008--1-1-
  2. Huge System for Web Surveillance Discovered in China | A group of Canadian human-rights activists and computer security researchers has discovered a huge surveillance system in China that monitors and archives certain Internet text conversations that include politically charged words. (NYT) | 2008--1-0-
  3. Chertoff: I'm Listening to the Internet (Not in a Bad Way) | Homeland Security chief Michael Chertoff sat down with Threat Level on Monday in Silicon Valley to talk about laptop searches at the border, the government's new-found interest in computer security, and the continuing saga of overeager terrorist watch lists. (wired.com) | 2008--0-8-
  4. Russian Gang Hijacking PCs in Vast Scheme | A criminal gang is using software tools normally reserved for computer network administrators to infect thousands of PCs in corporate and government networks with programs that steal passwords and other information, a security researcher has found. (NYT) | 2008--0-8-
  5. Gordon Brown aide a victim of honeytrap operation by Chinese agents | A top aide to Gordon Brown has been a suspected victim of a “honeytrap” operation by Chinese intelligence agents. The aide, a senior Downing Street adviser who was with the prime minister on a trip to China earlier this year, had his BlackBerry phone stolen after being picked up by a Chinese woman who had approached him in a Shanghai hotel disco. The aide agreed to return to his hotel with the woman. He reported the BlackBerry missing the next morning. | 2008--0-7-
  6. Cyber risk 'equals 9/11 impact' | The US homeland security chief has made a heartfelt plea to Silicon Valley workers to stand up and be counted in the fight to secure the cyber highway. Michael Chertoff invoked the attacks of 9/11 as he sought to galvanise IT professionals and security experts. He told the world's biggest IT security conference that serious threats to cyberspace are on "a par this country tragically experienced on 9/11". (BBC) | 2008--0-4-
  7. Europeans poised to bolster Web shield | On Wednesday, NATO will present a strategy for countering computer attacks at a meeting for heads of state in Bucharest, with a proposal to create a central cyberdefense authority. "The attacks on Estonia - directed at services on which Estonian citizens rely - could happen anywhere," said James Appathurai, a NATO spokesman. "The only way to defend against them is through multinational, multilateral cooperation." Paet, the foreign minister of Estonia, said he hoped that more countries would support the various international agreements to create "a legal, concrete framework." But it may not improve matters in the long term with Russia, which, along with nations like Georgia, Turkey and Liechtenstein, has not signed the Council of Europe's cybercrime treaty. (International Herald Tribune) | 2008--0-3-
  8. UK: The diversity of modern security threats | Today, the threats are more diverse than during the Cold War and include failing states, terrorism and organised crime - threats which cross boundaries and where the citizen is more directly affected. Globalisation has compounded many of these risks - with the growth in international travel, for instance, increasing the speed of flu pandemics spreading or facilitating greater migration of people away from areas suffering from climate change. (BBC) | 2008--0-3-
  9. UK security threat from cyber crime - Telegraph | Britain is at risk of a “state-sponsored cyber” attack from computer hackers who want to steal political, economic and military secrets, the new national security strategy warns. Last September it emerged that up to 10 Whitehall departments are being regularly targeted by computer hackers from countries such as China and Russia who want to find out state secrets. The strategy raised real fears that a “state-sponsored cyber attack” would “render distance irrelevant” in its effects on Britain. (Telegraph) | 2008--0-3-
  10. Pentagon bans Google map-makers | The US defence department has banned the giant internet search engine Google from filming inside and making detailed studies of US military bases. (BBC) | 2008--0-3-
  11. Pakistan blocks 'objectionable' YouTube | Pakistan has become the latest country to block access to the video-sharing Web site YouTube on the grounds that one or more videos on the site offend Islam, authorities said Monday. (CNN) | 2008--0-2-
  12. What We Know | In a podcast for the New Yorker, Lawrence Wright writes about Mike McConnell, the director of National Intelligence. Here Wright talks with Matt Dellinger about McConnell’s ideas for reform, his views on privacy issues and torture, and the threats the intelligence community may confront in the future. (the New Yorker) | 2008--0-1-
  13. Al Qaeda taps cell phone downloads | Al Qaeda video messages of Osama bin Laden and Ayman al-Zawahri can now be downloaded to cell phones, the terror network announced as part of its attempts to extend its influence. (CNN) | 2008--0-1-
  14. In Pakistan, a Fight to Stay Connected on the Web | A collection from the New York Times' Lede Blog of articles and pieces written on the web in response to General Musharraf's crackdown in Pakistan. (NYTimes) | 2007--1-1-
  15. America Should Hire al-Qaeda’s PR Agent | An opinion piece that examines al-Qaeda's use of IEDs and other attacks in order to give the impression to both domestic and foreign audiences that America is losing the war. (Good Magazine) | 2007--1-1-
  16. The Iraq war has become a disaster that we have chosen to forget | Discussing the roles of both the media and the government in their inability to accurately report the war in Iraq, this article also touches on the broader affects of the war that are, as it points out, not being broadcasted in mainstream media. (Guardian America) | 2007--1-1-
  17. Pulling the Plug: A Technical Review of the Internet Shutdown in Burma | This bulletin examines the role of information technology, citizen journalists, and bloggers in Burma and presents a technical analysis of the abrupt shutdown of Internet connectivity by the Burmese government on September 29, 2007, following its violent crackdown on protesters there. The shutdown of Internet connectivity was precipitated by its use by citizens to send photographs, updates and videos that documented the violent suppression of protests in Burma, information that contributed to widespread international condemnation of the Burmese military rulers’ gross violations of human rights. (OpenNet Initiative) | 2007--1-1-
  18. U.S. Government Seeks To Deny The Internet To Its Enemies | A newly published government document 'National Strategy for Homeland Security' places greater emphasis on the ab/use of the Internet than the 2002 version, also keeping with the government's 2006 National Infrastructure Protection Plan. | 2007--1-0-
  19. The Trouble with Terror Drills | An article that interrogates the utility and positive/negative effects of 'terror drills.' (Time) | 2007--1-0-
  20. Army Enlists Anthropology in War Zones | An article that examines the surge of Army-hired anthropologists for the first Human Terrain Team, an experimental Pentagon program that assigns anthropologists and other social scientists to American combat units in Afghanistan and Iraq. The team’s ability to understand subtle points of tribal relations — in one case spotting a land dispute that allowed the Taliban to bully parts of a major tribe — has won the praise of officers who say they are seeing concrete results. (NYTimes) | 2007--1-0-
  21. Proving That Seeing Shouldn't Always Be Believing | An interview with Hany Farid, head of the Image Science Laboratory at Dartmouth College. Farid is a founder of a subdiscipline within computer science: digital forensics. The purpose of his work with image manipulation is to discover how computerized forgeries are made. Intelligence agencies, news organizations and scientific journals employ Dr. Farid’s consulting services when they need to authenticate the validity of images. (NYTimes) | 2007--1-0-
  22. Junta tightens media screw | As Burmese soldiers fire bullets and tear gas to disperse anti-government protests in Rangoon, the military rulers have taken the offensive in the battle to control the flow of information in the country, by blocking media/material that could damage the image of the Junta by the international community. | 2007--0-9-
  23. Internet 'bigger threat' in terrorism spread | Television transcript of an interview conducted concerning how the Internet is becoming an increasingly important tool for terrorists. | 2007--0-9-
  24. Fears raised over 'vocal terrorism' | Advances in synthesised speech raise the possibility of "vocal terrorism", potentially becoming a new weapon for terrorists. | 2007--0-9-
  25. U.S. says Iraqi militant nonexistent | In March, he was declared captured. In May, he was declared killed, and his purported corpse was displayed on state-run TV. But on Wednesday, Abu Omar Baghdadi, the supposed leader of an Al Qaeda-affiliated group in Iraq, was declared nonexistent by U.S. military officials, who said he was a fictional character created to give an Iraqi face to a foreign-run terrorist organization. An Iraqi actor has been used to read statements attributed to Baghdadi, who since October has been identified as the leader of the Islamic State of Iraq group, said U.S. Army Brig. Gen. Kevin Bergner. (LA Times) | 2007--0-7-
  26. Yahoo! sued over torture of Chinese dissident | A Chinese political prisoner sued Yahoo! in a US federal court, accusing the internet company of helping the Chinese government torture him by providing information that led to his arrest. The suit, filed under the Alien Tort Claims Act and the Torture Victims Protection Act, is believed to be the first of its kind made against an American internet company. | 2007--0-4-
  27. Space Supremacy | Article discusses how the U.S. has revised its space policy for the first time in ten years in order to achieve "space supremacy" for the future. | 2007--0-1-
  28. Vietnam's leaders test internet waters | A former deputy prime minister, Vu Khoan, answered pre-screened, politically soft questions submitted by members of the public via the Communist party's own website. The gesture shows that Vietnam's communist rulers are trying to demonstrate that they are listening to the people. | 2006--1-2-
  29. Al Jazeera enters the 'information war' | Article examines how the launch of Al Jazeera English is shaking up the traditional stronghold of major international media outlets on the market for news. | 2006--1-1-
  30. Suicide Bomber Kills 12 Near Kabul Ministry | | 2006--0-9-
  31. Bush Disagrees That Iraq War Raises Threat of Terrorism | How does this relate to the matrix? Still a test, but a good article. | 2006--0-9-