Feeds

Bomb the ISPs – Daily Telegraph

Taking liberties

  • alert
  • submit to reddit

Internet Security Threat Report 2014

The Daily Telegraph is calling for the bombing of "uncompliant" ISPs "on foreign territory", in response to the atrocity in America.

In an opinion piece, John Keegan, the newspaper's eminent defence correspondent, blames the Internet for facilitating the attacks.

"The World Trade Centre outrage was co-ordinated on the internet, without question," he writes. "If Washington is serious in its determination to eliminate terrorism, it will have to forbid internet providers to allow the transmission of encrypted messages - now encoded by public key ciphers that are unbreakable even by the National Security Agency's computers - and close down any provider that refuses to comply.

"Uncompliant providers on foreign territory should expect their buildings to be destroyed by cruise missiles. Once the internet is implicated in the killing of Americans, its high-rolling days may be reckoned to be over."

Taking Liberties

As a technical commentator, Keegan makes a very good defence correspondent. How on earth can ISPs ban encrypted messages over their networks? But this is a minor point; more worrying is the anti-Internet sentiment articulated in Keegan's article.

For many, The Internet has become (alongside flight simulators, liberals and anti-gun laws) a scapegoat for last week's WTC massacre.

We can assume that human rights/privacy arguments over the Internet have shifted - probably forever. The nuances of the civil liberties debate do not overly concern countries, even democratic countries, which declare war.

We can expect tougher rules on encryption (albeit impossible to enforce); more surveillance of phone and Internet networks - with the full co-operation of providers; travel restrictions; extended police powers.

The question for us: is how much liberty should be sacrificed in the fight to combat international terrorism? No, we do not have the answer. But we fail to see how demonising The Internet will help. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
DVLA website GOES TITSUP on day paper car tax discs retire
Welcome to GOV.UK - digital by de ... FAULT
Hey Brit taxpayers. You just spent £4m on Central London ‘innovation playground’
Catapult me a Mojito, I feel an Digital Innovation coming on
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
EU probes Google’s Android omerta again: Talk now, or else
Spill those Android secrets, or we’ll fine you
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.