Pular para o conteúdo principal

Wikileaks under DDOS attack on eve of new revelations [Comment]

Wikileaks under DDOS attack on eve of new revelations [Comment]: "

Tomorrow WikiLeaks is set to reveal a new series of classified US documents that have been sent by United States Embassies around the world. The revelations set to shed new light on the country’s relations with friendly and unfriendly states alike, and now the site itself has come under a distributed denial of service attack.

Despite reports that hackers are responsible for the attack there’s no actual evidence one way or another, but it’s raised important and pertinent questions about the information that’s in the public domain and if there really is such a thing as “too much information”.

Most people will agree that sometimes it’s just better not to know a fact, and to live in ignorance of it. The Human brain and conscience is only capable of processing so much which is why we choose to blank out certain events.

This was the case with the previous WikiLeaks revelations of documents from the Iraq war. Most people chose to ignore the event and, as such, it went away.

Revelations about private discussions and thoughts from US Ambassadors and envoys from around the world though could have a much more serious impact. This time it won’t matter if the public choose to ignore the documents, other countries, friendly or otherwise will be pouring over them and you can be certain that there will be ammunition in there for everyone.

Extracts from the revelations, to add fuel to the fire, are also set to be published in tomorrow’s papers including El Pais in Spain, Le Monde in France, Speigel in Germany, The Guardian in the UK and the New York Times.

The latest round of leaks covers diplomats confidential views on countries including Australia, Britain, Canada, Israel, Russia and Turkey and, according to WikiLeaks founder Julian Assange “covers every major issue in every country in the world”.

Most heads of state will be sensible enough to take such matters on the chin, but it’s the responses of fringe elemants in both friendly and unfriendly countries, and the roll on effects for years to come of the revelations that should cause the people of the world concern.

WikiLeaks has made its point, that the freedom of the Internet cannot be removed. Now Julian Assange needs to stop, and stop quickly before his actions, and the actions of his staff cause an incident that will cost even so much as a single life.

It’s all too easy for those of us who sit behind a screen making a living from the Internet to think only of ourselves, cocooned in our own safe little world. It’s harder to think that anything we say or do, or write, can have consequences for other people and perhaps even cause bloodshed… or worse.

This situation comes about because we’ve had the longest period of western peace in history and every day we see more and more countries working together towards common goals. People like Assange have never witnessed first hand the horrors of war or suffering. Consequently [we] they have no way to properly relate to it or understand it.

Some of the documents from Iraq exposed corruption and aided democracy. That’s great and I’m sure some of these documents will too, which is also great. I’m saying you need to be careful. The information about the Saudi’s wanting the US to bomb Iran’s nuclear facilities neither exposes corruption nor aids democracy. It’s just salatious information that can only have the effect of making any such move to disarm Iran less likely.

This is why people like Assange are dangerous. Power without responsibility is always dangerous and it is us, the people of the world, who will have to accept responsibility for this one man’s actions.

I don’t care tonight whether it is hackers or the US government that is trying to bring down this website. I can only hope that they succeed. Our freedoms, and the freedom of the Internet, do not need to come at such high a price as a person’s life.


© Mike Halsey for gHacks Technology News, 2010. | Permalink | Add to del.icio.us, digg, facebook, reddit, twitter
Post tags:

"

Comentários

Postagens mais visitadas deste blog

Improve Windows Security By Closing Open Ports

Improve Windows Security By Closing Open Ports : " A standard Windows operating system has a number of ports open after installation. Some of these ports are needed for the system to function properly while others might not. These ports can pose a security risk as every open port on a system might be an entry point for a malicious user. A port basically allows communication to or from the device. Characteristics are a port number, an IP address and a protocol type. This article will give you the tools at hand to identify and evaluate the open ports on your Windows system to make a decision in the end whether they can or should be closed or left open. Software programs and tools that we will use: CurrPorts : Available for 32-bit and 64-bit editions of Windows. It is a port monitor that displays all open ports on a computer system. We will use it to identify the ports and the programs that are using them. Windows Task Manager: Also used to identify the programs and link some p

Diagnosing a Blue Screen of Death Error in Windows

Diagnosing a Blue Screen of Death Error in Windows : For many years now the famous Blue Screen of Death (BSoD) has been the ultimate indication that something disastrous has happened to make your computer die, but how useful is the information in the BSoD and the respective crash dump file that Windows produces? The best article I ever found explaining the BSoD in depth is here on the Microsoft website, however it’s quite technical and doesn’t discuss how to actually troubleshoot a problem. The crash dump file is just technical details of what was being held in the computer’s memory at the time of the crash, and this will include details on every driver and service that was loaded, and every piece of software that was running. The most useful pieces of information are to be found on the BSoD itself and are highlighted on the screenshot below. These are the BSoD error name, the stop error code and the name of the driver or service that has failed (this last one might not always appea

Use BGInfo to Build a Database of System Information of Your Network Computers

Use BGInfo to Build a Database of System Information of Your Network Computers : " One of the more popular tools of the Sysinternals suite among system administrators is BGInfo which tacks real-time system information to your desktop wallpaper when you first login. For obvious reasons, having information such as system memory, available hard drive space and system up time (among others) right in front of you is very convenient when you are managing several systems. A little known feature about this handy utility is the ability to have system information automatically saved to a SQL database or some other data file. With a few minutes of setup work you can easily configure BGInfo to record system information of all your network computers in a centralized storage location. You can then use this data to monitor or report on these systems however you see fit. BGInfo Setup If you are familiar with BGInfo, you can skip this section. However, if you have never used this tool, it takes ju