Feeds

Cheap thrills on the cyber-terror beat

Disaster journalism hits new highs

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Did you hear of the computer virus that could "attack the Pentagon's ability to mobilize or communicate with its forces" and cripple all government services in a city? I read about it in the Center for Defense Information's July Defense Monitor newsletter. It would be part of an "electronic Waterloo," readers were informed.

These days "electronic Pearl Harbor" and "digital Armageddon" are fit only for the nitwit's book of cliches, but "e-Waterloo" is grossly underused. As such, I recommend gnomic cyber-security gurus massage it into worldwide circulation posthaste.

While on the subject, I would also like to take a moment to field suggestions in the naming game -- terms somewhat less belligerently idiotic but still intriguing to suckers and cub reporters. I favor adoption of "Cyber-Remember the Maine" or "e-Gulf of Tonkin" -- two that can do double duty as rationalizations for attacking someone else. But feel free to coin your own.

Also arriving via The Daily Electronic Crapper was news that organized crime was in the business of disseminating computer viruses. Why the underbosses might be involved in virus surplus was not explained by Reuters, but the news did mix nicely with word from a colleague a week earlier that an "expert" at a recent CERT-hosted conference was chattering excitedly about the Mafia carrying out hits over the Internet.

It's probably this type of colorful apocrypha that moved Sophos' Graham Cluley to complain to The Register last week. Those who prattle on about such things, indicated the anti-virus technologist, were messing up the natural order, "doing a disservice to security by misstating [the] importance" of viruses.

For every Graham Cluley, though, there is a brigade of journalists and pundits who deliver weekly about the coming or the lack of coming (Where is it? What's taking it so long? If not now, when?) of a computer virus or cyberterror end. Further, candor of this nature from inside the industry would not be tolerated long in the good ol' USA. For approaching the media with frankness and not getting with the terror program, Cluley might be quickly furloughed to Camp X-Ray, or at least expelled from the industry.

'Klez Bites Dog'
However, that's only part of the operating dynamic which dictates whose reality is going to get the big push. No one wants to write a story about the fellow who e-mailed me recently to say: "I can get people to spill their drinks by telling them that... we have lost no data to viruses since 1991 ... The money we save on non-working, never-up-to-date copies of [software] goes to a couple of reasonable mail scanners, a firewall which we keep in good order, and a couple of people who know what the hell they're doing."

"Big Gov Network Pretty OK! Modest admin shuns limelight" isn't a story an editor can dig. However, anyone even slightly capable of self-examination will admit to feeling a pleasant surge of anticipation at merely the possibility of: "Net Destroyed by UBL Worm! Nation paralyzed, communications down to runners."

The galvanizing aspect of pleasure should not be minimized.

It's fun to get caught up in the chase of disaster. Passing on official fictions seasoned with anecdotal accounts of pandemic human screw-up salted with the infrequent loquacious virus-writer or hacker eager to play the part of pitiful but sinister freak (the porn-obsessed virus-writer, hackers thought to have Asperger's Syndrome) always lands above the fold, is guaranteed high transfer in mailing lists, and spawns same-day copycat journalism. Tales which lack these ingredients don't.

And nothing could have been more fun in this regard this summer -- if you need more proof -- than the work of the Washington Post. On the front page -- big, smokin' stories about al Qaeda drawing up plans for cyberterror and a computer security firm patriotically penetrating an Army network and squealing about it to the newspaper.

The latter was especially delightful because the Post allowed the reporter to focus on the thrilling parts -- the exposing of the Army's underwear through uninvited penetration -- without discussing how it differed from, say, teenagers arrested for similar actions or, possibly, the Princeton administrators loudly denounced for getting into Yale's admissions accounts.

When news trickled in that the source of the Post's expose was being investigated by the FBI and an Army criminal division, it lacked the same top A-section sass and was delivered buried inside. There it escaped boring discussions of what it might mean for a computer security firm's future if it had to regularly explain to clients why it was visited by the FBI.

© 2002 SecurityFocus.com, all rights reserved.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.