Translate

Posts mit dem Label World Wide Web werden angezeigt. Alle Posts anzeigen
Posts mit dem Label World Wide Web werden angezeigt. Alle Posts anzeigen

1/16/2014

VIDEO - Faulty Lines ? Controlling the Web: A Documentary looks at the fight for the Absolute Control of the World Wide Web (2012 - Before Snowden)

"In January 2012, two controversial pieces of legislation were making their way through the US Congress. SOPA, the Stop Online Piracy Act, and PIPA, the Protect Intellectual Property Act, were meant to crack down on the illegal sharing of digital media. The bills were drafted on request of the content industry, Hollywood studios and major record labels.


The online community rose up against the US government to speak out against SOPA, and the anti-online piracy bill was effectively killed off after the largest online protest in US history. But it was only one win in a long battle between US authorities and online users over internet regulation. SOPA and PIPA were just the latest in a long line of anti-piracy legislation US politicians have passed since the 1990s.

"One of the things we are seeing which is a by-product of the digital age is, frankly, it's much easier to steal and to profit from the hard work of others," says Michael O'Leary, the executive vice-president for global policy at the Motion Picture Association of America (MPAA).

The US government says it must be able to fight against piracy and cyber attacks. And that means imposing more restrictions online. But proposed legislation could seriously curb freedom of speech and privacy, threatening the internet as we know it.

Can and should the internet be controlled? Who gets that power? How far will the US government go to gain power over the web? And will this mean the end of a free and global internet?

Fault Lines looks at the fight for control of the web, life in the digital age and the threat to cyber freedom, asking if US authorities are increasingly trying to regulate user freedoms in the name of national and economic security."

 Take a look (on) yourself:

12/06/2013

How long will it take to resolve this Enigma: Who is Siphoning Data Through a Huge Internet Security Hole ?

Every now and then, something seems so huge, that you don't realize it for a long period of time. It's like waking up out of a cosy dream recognizing that real life is something different. But in this one, there is a vast security Vaccum in the WorldWideWeb. At least it seems like. Then you suddenly realize you're in a massive hole. Or, in this case, a gaping Security Hole in the Internet, because someone seems to be sucking enormous amounts of Input out of it.


Wired.com has been reporting, that someone, something, somewhere, has been using a big Security Loophole
(a feared existing one), to steal Internet Traffic heading back to government agencies, Multinational Corporations and other important beneficiaries in the United States. Early in its beginning, it (THAT Traffic) was redirected to Belarus and/or Iceland, then, recently sent on to its predetermined recipients. It took several months, until someone observed this changing pattern. And this may not have been the first time that this took place, simply the first time someone noticed.

Researchers @ Renesys (The Internet Intelligence Authority - as they claim themselves), a Internet Monitoring Company, said, that over several months earlier this year (2013) someone (Extraterrestrials maybe?) diverted the traffic, using the same vulnerability in the so-called Border Gateway Protocol (also short termed BGP, designed to exchange routing and reachability information between Autonomous Systems (AS)), that the two security researchers demonstrated in 2008 (therefor you need to read this article, that gives you full insight to this developing story). This Attack (can be compared to the well known exploiting Man-in-the-Middle-Attack) allows Cybercriminals to jerk other routers by redirecting their data to a system, that the hijackers control themselves. Finally, then when they resend the data to the intended recipient, noone of the origin communicators is aware, that their information has been funneled.

The danger out of this scheme, is potentially enormous. Once critical data is intercepted, copied and secured, the Hijacker can burrow through the archives of any unencrypted information, spying through emails and spreadsheets, extracting credit card numbers, and seizing all available amounts of sensitive data.

In this case, the backers initiated the hijacks at least 38 times, grabbing traffic from about 1.500 individual IP blocks. Sometimes for minutes, sometimes for hours, sometimes for days. It is known, that they did it in such a way, that it is the consistant SAY: Make no mistake about it ! There was no mistake to commit, Analysts say.

(I thought Renesys (a Internet Monitoring Firm), are specialized on this matter. So, how can it be that this happened so often before someone noticed ? But maybe it has nothing else to do with about the first phrase i wrote up in this Post.)


Doug Madory
Renesys Senior Analyst Doug Madory says initially he thought the motive was financial, since traffic destined for a large bankcompany (...?) got sucked up in the deviation. But then the Cybercriminals started diverting traffic, that once was intended for some foreign ministries of several countries (that Doug Madory declined to name...?) as well as a large VoIP (Voice over IP)-Provider in the United States, and Internet Service Providers that process the internet communications of thousands of customers.

Although the intercepts originated from a number of different systems in Belarus and Iceland, Renesys believes the attacks are all related, and that the hijackers may have altered the locations to obfuscate their malicious activity. “What makes a man-in-the-middle attack different from a simple routing hijack? Simply put, the traffic keeps flowing and everything looks fine to the recipient,…” Renesys wrote in a blog post about the hijacks. “It’s possible to drag specific internet traffic halfway around the world, inspect it, modify it if desired, and send it back on its way. Who needs fiberoptic taps?” (...?)

Tony Kapela
Tony Kapela, Vice-President of data center and network technology at 5Nines in Wisconsin (and one of the researchers who exposed the BGP vulnerability in 2008) is shocked that no other signs of intentional hijacking have occurred since their talk five years ago and questions whether this is really the first case, or just the first one seen...(without alerting)? He also thinks that all of this what happened, actually could be a "Newcomer" who simply seizes control of one of the systems, and sends out the phony message without knowledge of the System Owner. He imagines a scenario:

"...where an attacker gains physical access to a router belonging to one of the companies and installs a monitoring device to record data, then gains control of the router console to send out a bogus BGP announcement, to redirect traffic through the router. If anyone discovers the redirect, so that the "Bad Guy" would appear, to be the company itself, that owned the router...."

How long will it take to resolve this Enigma, when you think about the fact that it took 38 blinks of an eye, to realize: There is a Mystery going on...?

11/28/2013

Video: The Internet Rising




Internet Rising is something inbetween Love Activity & a kind of streaming of webcam interviews, and its all conducted within the Webplanet. It is also a documentary about inspecting the emerging communication between the World Wide Web and the collective consciousness of humanity. Afterwards you might change a few points of view about the Internet (or about Life itself).

Hopefully !

The Internet Rising


You also can visit the Website of Internet Rising for other Videos, go to:
internetrising.net

See also: Internet Rising at IMDB

11/26/2013

LEAK: Why Internet Service Providers are Pushers in trying to Contain the Web's Neutrality



...Neutrality ? If you can define it as the right expression, maybe. One or the other will be able to find an answer in (or after) this Video. Most will, pretty sure !


Kind of looks like Harrison Ford in younger years...Enjoy the outcome. 

And do not forget to overview this WIKI Article:

11/21/2013

DotBigBang.org ! The Internet is Changing Forever...
Will Fraudsters profit from the upcoming revolutionary change ?

Over the next year, the Internet Corporation for Assigned Names and Numbers (ICANN) will introduce over 1000 new, industry-specific Top Level Domains (TLD) to the internet addressing system. The new top-level domain extensions will act as alternative options to .COM or .NET. New domain extensions will be created in many categories including .Brands (.google, .netflix, .gucci), .Cities (.NYC, .London, .Berlin), professions (.doctor, .law, .cpa), interests (.art, .fashion, .cars) and more.



The purpose of DotBigBang.org is to raise awareness and educate consumers about this revolutionary change to the internet addressing system. Goals are to minimize harm, maximize benefits and help create a smoother transition to a new dot-anything internet environment. The approach is to create an engaging and relatable message to enhance consumer knowledge in the short window of time before new .addresses emerge online.


About New Dot Media

New Dot Media is a Utah, USA company focused on ICANN New Top-Level Domains. New Dot Media principles are to raise awareness, facilitate understanding, minimize confusion, reduce harms, increase benefits, and accelerate adoption and use of New Top Level Domains.


A principle concern for introducing new top-level domains to the world wide web was the potential for consumer confusion and possible harm that may result out of it. Users will be unfamiliar and disorientated with the first new dot-addresses, and will have difficulty identifying and/or recognizing new web addresses as they appear online. There is also an anticipated increase in frequency and variety of methods used by fraudsters that consumers should be on the lookout for.

"The Dot Big Bang is a transformative event that will change how internet users navigate the web and interact with the world around them," states New Dot Media TLD-Vangelist-in Chief Tom 'Not-Com Tom' Gilles. "Our aim is to help make the transition a smooth one."



The DotBigBang.org approach uses terms and phrasing that most internet users and consumers can relate to and understand today, as opposed to introducing new vocabulary and new views. It is believed this path will assist in reaching the largest audience, and have the most effective bang on user understanding.

DotBigBang.org contains detailed articles explaining aspects of the .address expansion in simple, understandable terms and easy interpretation.

There are also specific user guides tailored specifically for consumers, parents, website owners, small business, professionals and trademark owners. How do you see it.....????? This will make the all complex system of today, more complicated FOR the Future. Some may say later: "Back to the Future"...