decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
I believe he is sending a wake-up message | 379 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
if the threat is truly 'dire,'...
Authored by: mcinsand on Friday, October 12 2012 @ 08:59 AM EDT
If the potential risk to national security is significant (and I definitely believe that it is), then we need to look at our acceptable infrastructural requirements, as well as recommendations to Joe User. To be honest, as with vehicle construction standards, we really need to start applying Operating System architectural standards. Again, if our cybersecurity risk is significant, then permitting the sale of the currently dominant operating system is equivalent to allowing auto manufacturers to make cars with gas tanks strapped to the rear bumper. For the sake of national security, it’s past time that required layered, modular software systems. Megalithic architectures make it much, much easier to use weaknesses in one corner to take ownership of the entire computer. At the very least, we need to criminalize the use of such software with sensitive information. Granted, I’m taking the ‘we’re nowhere close to being as rotten as those guys,’ and such a review could be Tannenbaum’s dream come true (microkernel, anyone?). Designed-in backdoors are a problem, too, and we need to make them illegal. This wouldn’t just apply to Microsoft and Apple, but the FBI, CIA, and other TLA’s would have to use more traditional methods, rather than cracking peoples’ computers. Although software design is not the whole of the problem, our current state makes us sitting ducks for a skilled attack. If our national security means anything at all, we need to make our cybersociety less of a target.

[ Reply to This | Parent | # ]

What would you expect?
Authored by: Anonymous on Friday, October 12 2012 @ 01:15 PM EDT
More monitoring, more surveillance, criminalize "subversive"
activities such as public gatherings, social/political protests, etc. Automatic
filtering of all online correspondence.

And most important, since its a well known hub of terrorist activity... instant
death penalty for people who download music or video!

[ Reply to This | Parent | # ]

Panetta Warns of Dire Threat of Cyberattack
Authored by: globularity on Saturday, October 13 2012 @ 12:35 AM EDT
Having lived through part of the cold war I do not take claims of threats by any
government agency seriously without detailed an independently sourced
corroborating evidence. None of them ever materialized The virus attacks a
decade ago and the DDOS attacks never amounted to much. Even if the net were
rendered unusable for a few days, so what anybody who has lived in the colder
regions would have been snowbound and life goes on. The whole concept of cyber
threat is the latest scheme for under worked security agencies to talk up their
business. Anybody remember all the Y2K hype?

---
Windows vista, a marriage between operating system and trojan horse.

[ Reply to This | Parent | # ]

I believe he is sending a wake-up message
Authored by: SpaceLifeForm on Monday, October 15 2012 @ 12:54 AM EDT
To a specific TLA agency.

More specifically, they need to pay
attention and not be distracted by
the internal moles.



---

You are being MICROattacked, from various angles, in a SOFT manner.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )