Click to Play

Online and Offline Marketing...
As a result of the economic crisis, retailers are more concerned than ever about the return their marketing dollars are generating. In this video from SMX West...

Recent Articles

Securing Your Site With Google Advice
Hacking is a major problem that is increasing day by day. The Internet world is flocked with hundreds of, infact of thousands of anti hacking software but their effectiveness is still in question! In a recent post at Google's Webmaster Central blog, Search Quality Team...

Dolphin Stadium Hacked For Super Bowl
In what is becoming far too normal, the Dolphin Stadium Web Site was hacked for a few hours and was delivering malware to people who visited it. The American Football League is looking for information on the hacker...

Monster Gets A Monster Of A Hack Again
Monster has been been hacked again, along with USAJobs.gov (which monster runs), this time with a loss of information for people who are seeking jobs.

Learning Hacks The Chinese Hackers Use
You might be surprised by how mundane this list is, most security engineers should have them in their toolboxes as well. A few here are new to me, and worth sharing. The Dark visitor has a list of common tools that Chinese...

Security Professional Need To Test Network Penetration
How do you tell a good security company from a bad one? That is the problem, do you really know you are getting the experts you are paying for. Businesses hire experts to do pen testing and audit their company...

Two Fresh Apple Security Hacks
Two new chunks of malware are making the rounds this week that allow an attacker to download code of choice on your apple computer. What is interesting is that with the increase in sales, and market penetration of...


03.09.09

Bypassing Internet Communication Restrictions

By Dan Morrill

Steve Hodson from Win Extra quite rightly asks what we can do in the face of restrictive or repressive internet social media. The good thing is that this is an easy question to answer, because humans have been working their way around authority since we began. Not everyone is a fan of authority, and the internet makes it very easy to bypass internet restrictions.

Unfortunately for all the hope I might have for these roadblocks of change being removed or for more hurdles of authority being removed the scary part is that for every one we remove two are replacing it. For every story we hear about how social media services have done some good thing we hear ten stories of some new way those in power seek to extend their control. Whether it be the English government passing a law to make photographing the police illegal through to the RIAA encouraging ISPs to remove peoples access to the net we are seeing a rise of repressive policies. While our freedoms on the Internet might appear to be growing there is also an obvious move in our offline lives to take away our freedoms. Source: WinExtra

I have spent the better part of 22 years in industry as an information security person, and I know exactly how easy it is to bypass many of the restrictions that are put in place already. If you take a look at Cuba, people have been silently bypassing authority there in the few ways that they can, the same holds true in China, the Middle East and even in England, no matter what hurdles are put up, there are ways around them.

Systems like TOR, Proxy Systems, even hopping the local non-encrypted wireless connection carelessly left open by your next door neighbor all leave open the possibility of bypassing authority. Server jumping, dynamic DNS, free hosting, drive by propaganda dropping, private video systems, long forgotten bittorrent servers, insecure networks, all these open the door to bypassing the regime. I spent the better part of my working career trying to convince people to fix these things, along with just about every other information security professional out there. Fortunately for people who need to dodge government controls, these systems exist by the hundreds of thousands on the global network. Satellite phone systems, disposable cell phones, SIM cards, all make hiding and evasion easier. The more disposable the easier it is to hide your message in the noise.

The Premier Event for Search Engine
Marketing & Optimization -
Register Now

People every day bypass firewalls, even the great firewall of China cannot keep up with the internet. People every day bypass corporate controls on their networks, every day we see malware that uses DNS shifting techniques making it harder to hunt down the primary servers that control the botnet. These same techniques are used for people to spread their message or their propaganda worldwide. Even under the Taliban in Afghanistan, people worked out some very clever ways of getting information out of the country when the entire network was controlled by a "repressive regime". What works for people bent on destruction can work in the same way for people whose intent is to get the word out and do good or spread a message.

Social networking is about the message and the ability to fire back and start a conversation, some messages will get out no matter what and start conversations if not on line, in darkened living rooms because people live in fear. We have not hit the bottom of what people will try, and it worries me to think that when we were at Waterloo Station, I took pictures of the local police services responding to an incident when they shut down Waterloo station. If there had been a real issue, those pictures would have been news worthy, if England passes the law, I would be arrested rather than having the scoop of the century. I was the only one there with a camera when they shut down the station. That worries me, but there are ways around that, I don't even need to look like I have a camera on me. Taking a look at the current state of investigative reporting and hidden cameras, things will always get out, things will always be taped, recorded, viewed, shared, commented, and otherwise distributed on the internet.

Do the laws matter, yes, but humans have been very clever in working out ways around laws they do not like or agree with. I would expect no different in the future, based on 4000+ of recorded years of human history.

Comments


About the Author:
Dan Morrill has been in the information security field for 18 years, both civilian and military, and is currently working on his Doctor of Management. Dan shares his insights on the important security issues of today through his blog, Managing Intellectual Property & IT Security, and is an active participant in the ITtoolbox blogging community.
About NetworkNewz
NetworkNewz editors, writers and contributors focus on both the big picture and the details of networking. At NetworkNewz our goal is to deliver to you The Key To Network Management.





NetworkNewz is brought to you by:

SecurityConfig.com NetworkingFiles.com
ITmanagementNews.com WebProASP.com
DatabaseProNews.com SQLProNews.com
ITcertificationNews.com SysAdminNews.com
LinuxProNews.com WirelessProNews.com
CProgrammingTrends.com ITmanagementNews.com





-- NetworkNewzis an iEntry, Inc. publication --
iEntry, Inc. 2549 Richmond Rd. Lexington KY, 40509
2009 iEntry, Inc. All Rights Reserved Privacy Policy Legal

archives | advertising info | news headlines | newsletters | comments/feedback | submit article


The Keys To Network Management Ask Questions in the Networking Forum NetworkNewz News Archives About Us Feedback NetworkNewz Home Page About Article Archive News Downloads WebProWorld Forums Jayde iEntry Advertise Contact