Global Security Matrix: Web Archive
Explore Witness Discuss Apply
Human State System Network Global
Warfare Query Query Query Query Query
Terrorism and Crime Query Query Query Query Query
States at Risk Query Query Query Query Query
Resource Conflict Query Query Query Query Query
Pandemics Query Query Query Query Query
Environment Query Query Query Query Query
W.M.D. Proliferation Query Query Query Query Query
InfoWar Query Query Query Query Query
all.gif
Items matching "system infowar"
  1. Chertoff: I'm Listening to the Internet (Not in a Bad Way) | Homeland Security chief Michael Chertoff sat down with Threat Level on Monday in Silicon Valley to talk about laptop searches at the border, the government's new-found interest in computer security, and the continuing saga of overeager terrorist watch lists. (wired.com) | 2008--0-8-
  2. Russian Gang Hijacking PCs in Vast Scheme | A criminal gang is using software tools normally reserved for computer network administrators to infect thousands of PCs in corporate and government networks with programs that steal passwords and other information, a security researcher has found. (NYT) | 2008--0-8-
  3. Europeans poised to bolster Web shield | On Wednesday, NATO will present a strategy for countering computer attacks at a meeting for heads of state in Bucharest, with a proposal to create a central cyberdefense authority. "The attacks on Estonia - directed at services on which Estonian citizens rely - could happen anywhere," said James Appathurai, a NATO spokesman. "The only way to defend against them is through multinational, multilateral cooperation." Paet, the foreign minister of Estonia, said he hoped that more countries would support the various international agreements to create "a legal, concrete framework." But it may not improve matters in the long term with Russia, which, along with nations like Georgia, Turkey and Liechtenstein, has not signed the Council of Europe's cybercrime treaty. (International Herald Tribune) | 2008--0-3-
  4. US seeks terrorists in web worlds | The US government has begun a project to develop ways to spot terrorists who are using virtual worlds. (BBC) | 2008--0-3-
  5. Al-Qaeda: How jihad went freelance | Al-Qaeda has evolved from a single group to an amorphous movement. Does that make it less dangerous or more so? (Economist) | 2008--0-2-
  6. Al Qaeda taps cell phone downloads | Al Qaeda video messages of Osama bin Laden and Ayman al-Zawahri can now be downloaded to cell phones, the terror network announced as part of its attempts to extend its influence. (CNN) | 2008--0-1-
  7. Bin Laden message 'to be aired' | A new video of Osama Bin Laden on an Islamic jihadist website (as promoted by the leader's media group As-Sahab) is reported to promote the idea of driving a 'wedge' between Western citizens and their leaders. The article also discusses Bin Laden's interest in global media. (BBC) | 2007--1-1-
  8. The Trouble with Terror Drills | An article that interrogates the utility and positive/negative effects of 'terror drills.' (Time) | 2007--1-0-
  9. U.S. pulls plug on 6 al-Qaeda media outlet | The U.S. military says it has captured at least six al-Qaeda media centers in Iraq and arrested 20 suspected propaganda leaders since June. The seizures of the centers underscore the importance al-Qaeda has placed on media, primarily the Internet, as a tool to communicate to its members and use against U.S. forces in Iraq. The group's media emphasis continues to increase, intelligence analysts say. | 2007--1-0-
  10. Proving That Seeing Shouldn't Always Be Believing | An interview with Hany Farid, head of the Image Science Laboratory at Dartmouth College. Farid is a founder of a subdiscipline within computer science: digital forensics. The purpose of his work with image manipulation is to discover how computerized forgeries are made. Intelligence agencies, news organizations and scientific journals employ Dr. Farid’s consulting services when they need to authenticate the validity of images. (NYTimes) | 2007--1-0-
  11. Junta tightens media screw | As Burmese soldiers fire bullets and tear gas to disperse anti-government protests in Rangoon, the military rulers have taken the offensive in the battle to control the flow of information in the country, by blocking media/material that could damage the image of the Junta by the international community. | 2007--0-9-
  12. Fears raised over 'vocal terrorism' | Advances in synthesised speech raise the possibility of "vocal terrorism", potentially becoming a new weapon for terrorists. | 2007--0-9-
  13. Yahoo! sued over torture of Chinese dissident | A Chinese political prisoner sued Yahoo! in a US federal court, accusing the internet company of helping the Chinese government torture him by providing information that led to his arrest. The suit, filed under the Alien Tort Claims Act and the Torture Victims Protection Act, is believed to be the first of its kind made against an American internet company. | 2007--0-4-
  14. Space Supremacy | Article discusses how the U.S. has revised its space policy for the first time in ten years in order to achieve "space supremacy" for the future. | 2007--0-1-
  15. Vietnam's leaders test internet waters | A former deputy prime minister, Vu Khoan, answered pre-screened, politically soft questions submitted by members of the public via the Communist party's own website. The gesture shows that Vietnam's communist rulers are trying to demonstrate that they are listening to the people. | 2006--1-2-
  16. The Growing World of Google Earth | Interesting article about how something as innocuous as Google Earth can be a threat to (inter)national security with up to one-third of the world's population being covered by high-resolution imagery. | 2006--1-0-
  17. Suicide Bomber Kills 12 Near Kabul Ministry | | 2006--0-9-