Sunday, June 3, 2012

Tun Dr Mahathir Mohamad YOU READY FOR THIS TAXIDRIVER’S ‘FIFTH DIMENSION OF CYBERWARFARE’.


Putrajaya should rethink absolute freedom on the Internet, Tun Dr Mahathir Mohamad has said, reversing his previous guarantee that Malaysia would never censor online content.
The former prime minister, an avid blogger, told The New Sunday Times in an interview published today that countries should now enforce some form of regulatory control to block “filth” and punish those who corrupt the minds of Internet users.
“When I said there should be no censorship of the Internet, I really did not realise the power of the Internet, the power to undermine moral values, the power to create problems and agitate people.
“Now it is so porous that we cannot prevent all this filth from coming into our country,” he was reported saying in the interview at Malaysia’s 26th Asia-Pacific Roundtable held at the Institute of Strategic and International Studies last week.
Dr Mahathir, who was prime minister for 22 years until 2003, had promised that Malaysia would never censor the Internet in any way as part of a pledge draw investors to develop the Multimedia Super Corridor.
He had repeated this stand last at the Third Annual Malaysian Student Leaders Summit in August last year, although he then suggested disciplinary action on some aspects of Net abuse.
“For example, there is too much violence coming through on the Internet.
“That, I think, we have a right to ban, but as far as political thinking, if you are not instigating violence and things like that, I think the Internet should not be censored in any way,” Bernama had then reported him as saying.
Prime Minister Datuk Seri Najib Razak voiced similar sentiments last year and vowed his administration would not resort to Internet censorship but will instead engage further with Malaysians when acknowledging that people now use social networking sites to express outrage.
“Malaysians have to thank Tun Dr Mahathir Mohamad for this.
“When he was the prime minister, and Malaysia was developing our Multimedia Super Corridor, Tun made the promise to the world that Malaysia would never censor the Internet.
“My government is fully committed to that wisdom — we intend to keep his word,” Najib told the first Malaysian-Asean Regional Bloggers Conference here on April 24 last year.
Social media, primarily Facebook and Twitter, has been partly credited with organising the Egyptian uprising that eventually led to the resignation of strongman Hosni Mubarak as president.
The Egyptian government had briefly banned Twitter, a micro-blogging site, as a result of massive protests arranged via social networking sites.
There have been two previous attempts by the government to implement filters similar to China’s “Green Dam” here. Both were met with vociferous protests by Internet users that forced the government to backtrack on the efforts.
Growing Internet access and the ability of the opposition to disseminate information online has been cited as one of the factors for Barisan Nasional’s worst electoral effort in Election 2008.
Since then, the ruling coalition has been working to narrow the gap, including training “cyber troopers” and providing social media training to its members.

It has been called the ‘fifth dimension of warfare’. Along with land, sea, air and space – the cyberworld is increasingly becoming a new frontline.
Innovations in technology are changing the tactics of modern-day conflict. There are new tools in today’s arsenal of weapons. Helped by advances in electro-magnetics and modern information and communications technology, a new form of electronic warfare has been created. It is called cyberwar and is increasingly recognised by governments and the military as posing a potentially grave threat.
“If you have a few smart people and a good computer, then you can do a lot. You don’t need an aircraft, you don’t need tanks, you don’t need an army. You can penetrate another country, create huge damage without even leaving your armchair.” 
Alon Ben David, military analyst for Israel’s Channel 10
And it is not just cyberwar that is a growing phenomenon. The internet has empowered cyberactivism, allowing people to share information and mobilise support to take direct action – both online and on the streets.
Social networking sites such as Facebook, Twitter and YouTube have been at the forefront of this new wave of cyberactivism, helping to galvanise the protests that have recently spread across the Arab world.
The so-called Arab Spring has been described as an electronic revolution. Protesters were turned into citizen journalists – taking frontline images on their mobile phones and uploading them via their computers for the world to see. The regimes may have jammed the signals of satellite news channels and banned international reporters from entering their country, but they were unable to prevent citizens from becoming reporters in their own right.
From cyberactivism to cyberwar
Using the internet as a platform for political action is one thing. But infiltrating and disrupting computer networks and databases takes cyberwar to another level. American security experts have warned that a cyber-attack could cripple key governmental and financial systems and it is a threat the US is taking seriously.
“Cyberspace is real. And so are the risks that come with it. From now on, our digital infrastructure, the networks and computers we depend on every day, will be treated as they should be, as a strategic national asset.” 
Barack Obama, the US president
In recent years a cyberwar has been brewing between China and the US, with both countries accusing each other of running an ‘army of hackers’.
A key battlefield in this war has been the case of Google.
The US internet company partially withdrew from China in 2010 after a tussle with the government over censorship and government-backed hacking.
China accuses the US of using Google to spy on the country, while Google accuses China of hacking into the email accounts of some of its members.
“We must differentiate between independent hackers and those of the state. We must understand that in some countries the authorities hire hackers with excellent technical knowledge to serve their interests. Everything is possible and states shouldn’t accuse each other since all options are open in this war.” 
Han, a Chinese internet hacker
The US also appears to be engaged in a cyberwar with another erstwhile enemy: Iran.
It appeared to begin in 2009 following Iranian anti-government protests – sparked by the disputed presidential elections which saw Mahmoud Ahmadinejad win another term in office.
Seeking to deprive the opposition of its main means of mobilising the masses, the Iranian authorities sought to choke off internet access.
But the protestors continued to use sites such as YouTube and Twitter and when Twitter planned some routine maintenance that would have taken it offline for a few hours, Hillary Clinton, the US secretary of state, asked the site to stay up and running while the protests continued.
Electronic eyes and ears
In the Middle East, Israel has set up a cyber command to secure the country against hacking attacks on its key networks.
Israel’s immediate neighbourhood is the place where it puts into use much of its technical know-how. Along its northern border with Lebanon, Israel deploys a large network of electronic eyes and ears.
And in the ongoing intelligence war between Israel and Lebanon’s Hezbollah, increasingly sophisticated electronic equipment is being used.
In February 2010, Lebanon arrested a man who reportedly confessed to being a Mossad agent. It was claimed that he had used sophisticated surveillance equipment that sent signals to his Israeli handlers via a mobile phone and computer located in a hidden compartment inside his car.
It may all sound like science fiction, but a global spying network does exist that can eavesdrop on every single phone call and email on the planet.
Eavesdropping on phone calls and text messages has become increasing easy for those with the right equipment, especially with the development of GSM networks – the technology used on the vast majority of mobile phone networks around the world.
“Give me your mobile phone for 30 seconds, give me 30 seconds alone with your mobile phone and I can install software that would make your mobile phone a travelling microphone. From that moment on, even if it is shut down, your mobile phone will broadcast everything that goes on around you, through a number that I determine.” 
Alon Ben David, military analyst for Israel’s Channel 10
A brave new world?
Many analysts are amazed at how internet users voluntarily hand over vast amounts of personal data to social media sites.
And planting software into a person’s phone or computer to steal data has become a new tactic of warfare in the fifth dimension.
“Our entire life is now on the internet: personal information, emails, credit cards. We give all this information on the internet to sites like Facebook, Google and Amazon. Governments impose pressure on these sites as they know how much information they have. These governments have asked for personal information from these sites, and they gave them what they needed.” 
Marwan Taher, IT specialist
We live in a brave new world of information and communication technology. The possibilities seem infinite, endless … and uncertain.
Terrorist organization Al Qaeda has launched a different kind of attack on the U.S., this time releasing a dangerously adorable photo of a piglet wearing boots that’s spreading like wildfire across the Internet, the Onion News Network reports.
The photo so cute that it’s a threat to national security has been seen all over the web, crippling servers as it’s sent by email, posted on Facebook and seen on one very familiar-looking website.
Watch “Factzone” anchor Brooke Alvarez’s full report on Piglet-gate 2011 below. “ONN” airs Fridays at 10:00 pm. on IFC
WATCH:

No comments:

Post a Comment