Skip to main contentdfsdf

TransTracker 's List: IntlComm News Brief - 8/31/2010

  • Internet Governance

    Stories related to the ongoing issue of who will control the Internet.

  • Aug 31, 10

    This article details Iranian plans to develop its own national search engine to replace Google.  The Iranian search engine will be named "Ya Haq," which is Persian for "Oh Lord."

  • Aug 31, 10

    Evgeny Morozov of Foreign Policy magazine uses the announcement of an Iranian search engine to comment upon Google's corporate policies around the world and the wisdom of the United States' vocal quest for "Internet freedom."  In short, he makes a good argument that both are unwise and that the latter is back firing.

  • Aug 30, 10

    This article from a Chinese news source provides a Chinese perspective on the issues of Internet freedom and governance.  In particular, it argues that recent discussion of offensive cyberwar strategies by the U.S. mean that it is the U.S., not China, that is a threat to global Internet freedom.

  • Aug 23, 10

    This article provides background information about the threats leading the European Union to enact laws that attempt to police the Internet.  Those threats include child pornography, piracy, cybercrime, and terrorist use of the Internet for propaganda purposes.  Provides links to government, industry, and think tank resources like policy and strategy documents.

  • Aug 23, 10

    Philadelphia is now considering blogs as businesses, regardless of whether they make money, meaning that bloggers must pay for a business license and pay taxes.  Is this a violation of free speech on the Internet?  Does it require a loss of anonymity online for this to be enforced?

  • Filtering, Censoring, & Monitoring

    Stories related to the increasingly common practice of governments around the world censoring and filtering of the Internet, as well as monitoring of online and mobile communications.

  • Aug 30, 10

    On the heels of the ongoing controversy over pressure on Research In Motion by several governments worldwide, all of whom want to be able to monitor communications on the company's popular BlackBerry service, India is now also seeking greater access to Internet communications by its law enforcement and intelligence services.

  • Aug 30, 10

    While many countries around the world filter and censor the Internet, Australia has been the poster child for Internet filtering and censorship by a Western-style, liberal, democratic state.  Proposals to filter the Internet have become a centerpiece of the ongoing political campaign, with the opposition vowing to scrap the current government's filtering plans.

  • Terrorist Use of the Web

    Stories related to terrorist use of the Internet for propaganda, recruiting, and more.

  • Aug 30, 10

    This story is a profile of the radical, American cleric, Anwar al-Awlaki.  It discusses his successes in recruiting American Muslims to the cause of jihad and, in particular, his use of Internet technologies like YouTube.

  • Aug 30, 10

    An American, Samir Khan, who ran a radical Islamic website is facing charges that he use his website to aid al-Qaeda in training and recruiting efforts.  He is believed to have fled the U.S. to join Anwar al-Awlaki in Yemen.  al-Awlaki was dubbed the "bin Laden of the Internet" this week by USA Today.

  • Net Neutrality

    Stories about the ongoing debate over net neutrality.

  • Aug 30, 10

    This is a lengthy but good article that gives an international perspective on the recent Google/Verizon announcement that has led to concern over the prospects for the future of "net neutrality."

  • Cyber Conflict

    Stories related to the increasing militarization of cyberspace.

  • Aug 30, 10

    Based largely on Deputy Secretary of Defense William Lynn's recent article in Foreign Affairs, this piece outlines the offensive technologies and policies that the U.S. is considering in the area of cybersecurity.

    • The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking out parts of an adversary's computer network overseas - but it is still wrestling with how to pursue the strategy legally.
    • But officials are reluctant to use the tools until questions of international law and technical feasibility are resolved, and that has proved to be a major challenge for policymakers. Government lawyers and some officials question whether the Pentagon could take such action without violating international law or other countries' sovereignty.

    5 more annotations...

  • Aug 26, 10

    A story from Wired Magazine's Danger Room blog that is getting a lot of attention.  It calls into question the claims made this week by Deputy Secretary of Defense William J. Lynn III about a 2008 cyber attack against the Department of Defense.

    • The worm, dubbed agent.btz, caused the military’s network administrators major headaches. It took the Pentagon nearly 14 months of stop and go effort to clean out the worm — a process the military called “Operation Buckshot Yankee.” The endeavor was so tortuous that it helped lead to a major reorganization of the armed forces’ information defenses, including the creation of the military’s new Cyber Command.
    • n 2007, the security firm Symantec rated SillyFDC as “Risk Level 1: Very Low.”

    2 more annotations...

1 - 17 of 17
20 items/page
List Comments (0)