Feeds

Cheap thrills on the cyber-terror beat

Disaster journalism hits new highs

  • alert
  • submit to reddit

Intelligent flash storage arrays

Did you hear of the computer virus that could "attack the Pentagon's ability to mobilize or communicate with its forces" and cripple all government services in a city? I read about it in the Center for Defense Information's July Defense Monitor newsletter. It would be part of an "electronic Waterloo," readers were informed.

These days "electronic Pearl Harbor" and "digital Armageddon" are fit only for the nitwit's book of cliches, but "e-Waterloo" is grossly underused. As such, I recommend gnomic cyber-security gurus massage it into worldwide circulation posthaste.

While on the subject, I would also like to take a moment to field suggestions in the naming game -- terms somewhat less belligerently idiotic but still intriguing to suckers and cub reporters. I favor adoption of "Cyber-Remember the Maine" or "e-Gulf of Tonkin" -- two that can do double duty as rationalizations for attacking someone else. But feel free to coin your own.

Also arriving via The Daily Electronic Crapper was news that organized crime was in the business of disseminating computer viruses. Why the underbosses might be involved in virus surplus was not explained by Reuters, but the news did mix nicely with word from a colleague a week earlier that an "expert" at a recent CERT-hosted conference was chattering excitedly about the Mafia carrying out hits over the Internet.

It's probably this type of colorful apocrypha that moved Sophos' Graham Cluley to complain to The Register last week. Those who prattle on about such things, indicated the anti-virus technologist, were messing up the natural order, "doing a disservice to security by misstating [the] importance" of viruses.

For every Graham Cluley, though, there is a brigade of journalists and pundits who deliver weekly about the coming or the lack of coming (Where is it? What's taking it so long? If not now, when?) of a computer virus or cyberterror end. Further, candor of this nature from inside the industry would not be tolerated long in the good ol' USA. For approaching the media with frankness and not getting with the terror program, Cluley might be quickly furloughed to Camp X-Ray, or at least expelled from the industry.

'Klez Bites Dog'
However, that's only part of the operating dynamic which dictates whose reality is going to get the big push. No one wants to write a story about the fellow who e-mailed me recently to say: "I can get people to spill their drinks by telling them that... we have lost no data to viruses since 1991 ... The money we save on non-working, never-up-to-date copies of [software] goes to a couple of reasonable mail scanners, a firewall which we keep in good order, and a couple of people who know what the hell they're doing."

"Big Gov Network Pretty OK! Modest admin shuns limelight" isn't a story an editor can dig. However, anyone even slightly capable of self-examination will admit to feeling a pleasant surge of anticipation at merely the possibility of: "Net Destroyed by UBL Worm! Nation paralyzed, communications down to runners."

The galvanizing aspect of pleasure should not be minimized.

It's fun to get caught up in the chase of disaster. Passing on official fictions seasoned with anecdotal accounts of pandemic human screw-up salted with the infrequent loquacious virus-writer or hacker eager to play the part of pitiful but sinister freak (the porn-obsessed virus-writer, hackers thought to have Asperger's Syndrome) always lands above the fold, is guaranteed high transfer in mailing lists, and spawns same-day copycat journalism. Tales which lack these ingredients don't.

And nothing could have been more fun in this regard this summer -- if you need more proof -- than the work of the Washington Post. On the front page -- big, smokin' stories about al Qaeda drawing up plans for cyberterror and a computer security firm patriotically penetrating an Army network and squealing about it to the newspaper.

The latter was especially delightful because the Post allowed the reporter to focus on the thrilling parts -- the exposing of the Army's underwear through uninvited penetration -- without discussing how it differed from, say, teenagers arrested for similar actions or, possibly, the Princeton administrators loudly denounced for getting into Yale's admissions accounts.

When news trickled in that the source of the Post's expose was being investigated by the FBI and an Army criminal division, it lacked the same top A-section sass and was delivered buried inside. There it escaped boring discussions of what it might mean for a computer security firm's future if it had to regularly explain to clients why it was visited by the FBI.

© 2002 SecurityFocus.com, all rights reserved.

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.