Feeds

Cheap thrills on the cyber-terror beat

Disaster journalism hits new highs

  • alert
  • submit to reddit

Build a business case: developing custom apps

Did you hear of the computer virus that could "attack the Pentagon's ability to mobilize or communicate with its forces" and cripple all government services in a city? I read about it in the Center for Defense Information's July Defense Monitor newsletter. It would be part of an "electronic Waterloo," readers were informed.

These days "electronic Pearl Harbor" and "digital Armageddon" are fit only for the nitwit's book of cliches, but "e-Waterloo" is grossly underused. As such, I recommend gnomic cyber-security gurus massage it into worldwide circulation posthaste.

While on the subject, I would also like to take a moment to field suggestions in the naming game -- terms somewhat less belligerently idiotic but still intriguing to suckers and cub reporters. I favor adoption of "Cyber-Remember the Maine" or "e-Gulf of Tonkin" -- two that can do double duty as rationalizations for attacking someone else. But feel free to coin your own.

Also arriving via The Daily Electronic Crapper was news that organized crime was in the business of disseminating computer viruses. Why the underbosses might be involved in virus surplus was not explained by Reuters, but the news did mix nicely with word from a colleague a week earlier that an "expert" at a recent CERT-hosted conference was chattering excitedly about the Mafia carrying out hits over the Internet.

It's probably this type of colorful apocrypha that moved Sophos' Graham Cluley to complain to The Register last week. Those who prattle on about such things, indicated the anti-virus technologist, were messing up the natural order, "doing a disservice to security by misstating [the] importance" of viruses.

For every Graham Cluley, though, there is a brigade of journalists and pundits who deliver weekly about the coming or the lack of coming (Where is it? What's taking it so long? If not now, when?) of a computer virus or cyberterror end. Further, candor of this nature from inside the industry would not be tolerated long in the good ol' USA. For approaching the media with frankness and not getting with the terror program, Cluley might be quickly furloughed to Camp X-Ray, or at least expelled from the industry.

'Klez Bites Dog'
However, that's only part of the operating dynamic which dictates whose reality is going to get the big push. No one wants to write a story about the fellow who e-mailed me recently to say: "I can get people to spill their drinks by telling them that... we have lost no data to viruses since 1991 ... The money we save on non-working, never-up-to-date copies of [software] goes to a couple of reasonable mail scanners, a firewall which we keep in good order, and a couple of people who know what the hell they're doing."

"Big Gov Network Pretty OK! Modest admin shuns limelight" isn't a story an editor can dig. However, anyone even slightly capable of self-examination will admit to feeling a pleasant surge of anticipation at merely the possibility of: "Net Destroyed by UBL Worm! Nation paralyzed, communications down to runners."

The galvanizing aspect of pleasure should not be minimized.

It's fun to get caught up in the chase of disaster. Passing on official fictions seasoned with anecdotal accounts of pandemic human screw-up salted with the infrequent loquacious virus-writer or hacker eager to play the part of pitiful but sinister freak (the porn-obsessed virus-writer, hackers thought to have Asperger's Syndrome) always lands above the fold, is guaranteed high transfer in mailing lists, and spawns same-day copycat journalism. Tales which lack these ingredients don't.

And nothing could have been more fun in this regard this summer -- if you need more proof -- than the work of the Washington Post. On the front page -- big, smokin' stories about al Qaeda drawing up plans for cyberterror and a computer security firm patriotically penetrating an Army network and squealing about it to the newspaper.

The latter was especially delightful because the Post allowed the reporter to focus on the thrilling parts -- the exposing of the Army's underwear through uninvited penetration -- without discussing how it differed from, say, teenagers arrested for similar actions or, possibly, the Princeton administrators loudly denounced for getting into Yale's admissions accounts.

When news trickled in that the source of the Post's expose was being investigated by the FBI and an Army criminal division, it lacked the same top A-section sass and was delivered buried inside. There it escaped boring discussions of what it might mean for a computer security firm's future if it had to regularly explain to clients why it was visited by the FBI.

© 2002 SecurityFocus.com, all rights reserved.

Next gen security for virtualised datacentres

More from The Register

next story
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Ballmer leaves Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Amazon takes swipe at PayPal, Square with card reader for mobes
Etailer plans to undercut rivals with low transaction fee offer
Microsoft exits climate denier lobby group
ALEC will have to do without Redmond, it seems
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.