TV, radio and newspapers from all over the world often linger on the costs of terrorism, but what is not so often mentioned are the costs of the fight to terrorism. While dealing with such costs, we do not refer to how much money were spent to set up proper countermeasures against terrorist attacks, but to the consequences of a sort of Hysteria that affected whole western society from September 11th on.
Terrorism is undoubtedly a threat that must be fought with all means, but we should take care to avoid that this state of alert will turn us into witch hunters, and we should prevent the fear of terrorism from damaging us much more than terrorism itself.Need some examples? Earlier this year, specifically on January 4th, the CNN apologized after mistakenly putting the name of US Senator Barack Obama as a caption on a story about Osama Bin Laden.
We often witnessed that wars and riots have also a digital form. Take in example few cases from recent history: the conflict between Israel and Lebanon has been transferred to digital ground through the rise of
defacements with anti-war messages and, as it seems, cyber-war will not be over soon . Or consider riots provoked by the publication of satiric pictures about Holy Prophet Mohammed. Reactions were definitely strong in Islamic world, both in streets and on-line .
As things stand, no surprise that the protest that took place some week ago in Estonia because of the removal of a “Red Army memorial” had also digital consequences. As riots started in Tallinn, some governmental websites , such as Foreign Ministry site, got defaced and even the website of Prime Minister’s party, Reform Party ‚was attacked. Prime Minister Andrus Ansip, has been just the main supporter of the move to relocate the memorial.
Zone-H often deals with identity theft. We use to explore methods, vulnerabilities and particular cases that could lead to such frauds in order to inform our audience on the invaluable damages that they could provoke to normal people.
But maybe, no theory or analysis can be as much effective as the words of people who has been victim of an identity fraud. No technical statistics can be more clear than the rage emerging from the story of an innocent man whose family, job and life were destroyed because his personal details were stolen in 1998, while he was shopping on-line on a legal and popular website.
The following story was published few days ago in ORE EXPOSED website . Both the website and the story refer to Operation Ore , an enquiry carried out by British Police against digital crime. Operation Ore was launched in the UK in May 2002, when UK authorities claimed they had the names of 7,272 UK citizens who had paid to view on-line child pornography. Hundreds of people were involved and many of theme were completely innocent, as the enquiry itself demonstrated later .But in the meantime, they lost everything, and someone lost his life as well.
Hew Raymond Griffiths, a British national living in the Australian city of Bateau Bay, after spending almost four years in prison in his native country and after being extradited to the USA, is now about to face a process and eventually a conviction.
The accusation is infringement of the law on copyright. Being processed in the USA, Mr. Griffiths risks up to 10 years in prison and a half– million-dollars fine.
Griffiths was arrested in 2003 because of a warrant emitted by Australian institutions under the request of the American Department of Justice.
The news has been booed by the blogosphere and harshly criticized by magazines that deploy the intromission of US Government in the Australian System of Justice.
The debate on wireless security in Internet cafes keeps burning…
Internet users were recently warned about dangers linked to wi-fi hotspots in Internet cafes, including Starbucks.As reported by Times Online , cyber pranksters base their attacks on the technique of “evil twin attack”, which is a different name for “man in the middle attacks”, where users are diverted to a malicious connection that is controlled by the attacker through a laptop. So, the attacker is allowed to get any kind of Information on users and their activities, and to commit identity frauds.