Feeds

Clinton Admin goes out in a blaze of cyber-terror

Net crashing, zombies rising, sky falling, privacy assaulted, copyrights dying....

  • alert
  • submit to reddit

Top three mobile application threats

Washington Roundup 2000 No Clinton Administration swan song would be complete without a heaping dose of cyber-crime FUD. We have not been disappointed. National Security Advisor Richard Clark and National Infrastructure Protection Centre (NIPC) Director Michael Vatis are clanging the cymbals again, warning that this year's New Year's cyber attacks might be even more devastating than last year's New Year's cyber attacks.

You remember last year's New Year's cyber attacks, right?

Right. Neither do we. But this time the sky really is falling, we are assured. Apparently, a vast number of personal computers have been turned into "zombies" (clients) for the Mother of all DDoS attacks, expected to commence New Year's Eve.

We think the only real "zombies" plugged into the Net are the living dead who would believe this drivel.



But wait, there's more. Organised crime syndicates are involving themselves heavily in intellectual property theft, making it "costlier and more dangerous than ever," US Attorney General Janet Reno writes in a Christmas Day letter

recently posted

on the Department of Justice (DoJ) Web site.

The heavyweight international bad guys are using profits from pirated digital goods to "facilitate a variety of enterprises, including guns, drugs, pornography and even terrorism."

And this, we are told, is the fault of that damned Internet, which "while promoting knowledge-based industries and commerce, also makes it easier to steal, produce and distribute merchandise such as software, music, films, books and games. With the click of a mouse, identical copies can be reproduced and transferred immediately, cheaply, surreptitiously and repeatedly."

"These trends will continue unless law enforcement and rights holders recognize that the threat crosses national borders -- and resolve to work collectively to defeat the increasingly organized efforts of the perpetrators," she warns.

Fortunately the DoJ received extra funds from Congress for FY 2001 to strut further onto the digital beat and protect us from what, by their account, anyway, sounds like a real catastrophe in the making. This includes $30.5 million for Digital Storm, an FBI programme upgrading old-fashioned analogue signals collection gear with slick new digital stuff; $100 million for an overall FBI technology upgrade called the Information Sharing Initiative; and $25 million for DoJ grants to local law-enforcement bodies so they might better investigate and prosecute network intrusions, virus spreading and other digital crimes.

Aaahhh... We feel safer already.



Meanwhile the 106th Congress, in its virtually endless lame-duck session, has managed to dodge just about every bit of Internet-related legislation currently pending. Which is a good thing, since the vast majority of it was pure rubbish. What little did squeak through wasn't bad at all, with a single, awful exception.

The Children's Internet Protection Act (CIPA), sadly, passed both Chambers and was signed by the Gigolo-in-Chief. Sponsored by US Senator John McCain (Republican, Arizona) and US Representative Ernest Istook (Republican, Oklahoma), the Act imposes federally-mandated Internet filtering requirements on public schools and libraries which accept money from Uncle Sam. Naughty pictures and blue prose are to be rendered inaccessible to tender sprouts, and failure to comply results in the money spigot being shut off.



Almost all pending privacy legislation stalled, and again, this is nothing to cry about since a lot of it was shot full of fat loopholes for the data-mining industry's benefit. One notable and quite nice victory was US Senator Richard Shelby's (Republican, Alabama) amendment to the Driver's Privacy Protection Act (DPPA), which now forbids states from disclosing the contents of their vast databases to commercial buyers without the express prior consent of the individuals concerned. Yeah, that spells 'opt-in'. We were amazed too.

A particularly loathsome piece of feelgood privacy legislation sponsored by US Senator Judd Greg (Republican, New Hampshire), which would have accommodated data miners while cynically commemorating a young New Hampshire woman brutally shot dead by a deranged stalker who got her details from an on-line broker, mercifully, stalled.

The Centre for Democracy and Technology (CDT) has a good summary of pending privacy legislation posted here.



Regrettably, suspected cyber-criminals will be subject to looser federal property forfeiture and wiretapping restrictions thanks to the benignly-named Public Safety Medal of Valour (HR-46) amendment, which did pass. On the plus side, far more sweeping legislation (S-2448) much desired by the Clinton Administration and especially by Janet Reno's DoJ, and introduced by Senate Judiciary Committee Chairman Orrin Hatch (Republican, Utah) and Senator Charles Schumer (Democrat, New York), didn't make it through.

One rotten little legislative Trojan horse (HR-3048) did pass, giving the US Secret Service power to issue an administrative subpoena to investigate threats against sitting and former US presidents or their families. An administrative subpoena requires an 'information custodian' (such as an ISP) to cough up records without a judge's approval and without notifying the suspect that his information is in the hands of the Feds.

The administrative subpoena is the weapon of the moment in Washington, well promoted by the Clinton Administration and used pretty much wherever it's not expressly forbidden; but it's also finding its way into a good deal of proposed crime legislation. While we have now a limited official green-light for its use, we can expect to see continued efforts to insert it into law as an express law-enforcement right. Unless, of course, people raise hell about it.



We are, as our beloved readers might imagine, tremendously eager to return to our primary beat on Capitol Hill as the 107th Congress convenes, to take its measure, and to compare its IT-related madness with that of the big-talking, do-nothing 106th. As we anticipate an acutely lame-duck White House, and observe a very narrow partisan split in both Chambers, we are prepared for an even greater ratio of rhetorical flatulence to action than the perennially entertaining outgoing class gave us.

Of course we're equally prepared to be pleasantly surprised. We just can't recall the last time that happened in this incomparably goofy town, and seat of unmatched global influence. ®

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.