If you have something to hide from the government, don’t use Dropbox

“Dropbox yesterday changed its terms of service, as reported by Business Insider.

With the new terms of service, Dropbox now says that it will “United States law enforcement when it receives valid legal process” and may, if necessary, decrypt the files in private Dropbox folders, allowing them to be read by government investigators.”

From ZDNet

UAE to tighten BlackBerry restrictions

“BlackBerry users in the United Arab Emirates will soon be unable to send emails and messages without fear of government snooping, under tighter restrictions on internet communication in the Gulf state.

The UAE is to ban individuals and small businesses from using the most secure BlackBerry settings – for email, web browsing and BlackBerry Messenger – as part of security fears sweeping the Middle East. Only companies with more than 20 BlackBerry accounts will be able to access the encrypted BlackBerry service, which is favoured by corporate users and government agencies.”

From The Guardian

E.U. to Review Mobile Operators’ Policies on Web Access

“BERLIN — The European Commission is planning to investigate whether European mobile operators are managing wireless Internet traffic to discriminate against competitors or consumers who use data-intensive services.

Neelie Kroes, the European Union’s telecommunications commissioner, on Tuesday will ask an advisory panel of national regulators to examine whether mobile operators are upholding the principle of network neutrality, which calls for all data traffic to be treated equally.”

From The New York Times

Mitigative Counterstriking: Self-Defense and Deterrence in Cyberspace

“In short, the current situation with cyberattacks is ominous, and more effective methods must be provided to potential victims to permit them to protect themselves. The time to act is now, and we must legally solidify the right to use self-defense in cyberspace, while also protecting the rights of potential uninvolved third parties who might be harmed by mitigative counterstrikes.”

From Jay P. Kesan

Right to Roam

“THE number of people with access to the internet has more than doubled in the past five years to over two billion. Many governments have responded with regulation and repression, according to a report published on April 18th by Freedom House, which assigns countries an internet freedom score. Nine of the 15 countries that the Washington-based think-tank assessed in 2009 fared worse this year, among them Iran, Tunisia and China. On the plus side, citizens are growing increasingly adept at sidestepping these threats to their internet freedoms, and the use of social media did much to galvanise political opposition across the Arab world in recent months.”

From The Economist

China’s Silent Cyber Takeover?

“According to the Go proverb ‘Play on the Point of Symmetry,’ when right and left have the same shape, there’s play in the centre. The ancient Chinese game of Go provides an apt metaphor for how China and Russia are leveraging US multinational corporations’ economic requirements to accomplish strategic goals that could quite plausibly include covert technology transfer of intellectual property, access to source code for use in malware creation and backdoor access to critical infrastructure.”

From The Diplomat

Russia looks abroad for web laws, including to China

“(Reuters) – Russia is looking to the experience of other countries, including China, to “regulate” Internet use, though Moscow has no plans to broaden web censorship, a government spokesman said on Saturday.

Weeks after hacker attacks temporarily closed down the country’s most popular blog site, a state tender calling for research into “foreign experience in regulating” the Internet has revived fears that authorities plan to clamp down on Internet freedoms ahead of 2012 presidential elections.”

From Reuters

Court Authorizes U.S. Gov’t to Kill Zombies

“Just two days ago on April 12, the United States Government executed an unprecedented (in the U.S.) scheme to shut down one of the more malicious botnets plaguing the Internet. Coreflood is a distributed network of malicious software running on millions of unsuspecting user’s machines (aka “zombies”), skimming financial and other sensitive data, and sending it to a few centralized command servers operated by unknown parties. Wired Threat Level’s Kim Zetter reported that Department of Justice (DOJ) officials in the District of Connecticut worked with the FBI, Microsoft, and the non-profit Internet Systems Consortium (ISC) to coordinate a plan to shut Coreflood down.”

From Law Across the Wire and Into the Cloud

Coreflood and Communication Controls

“This week, the U.S. Department of Justice and the FBI took action to disable the “Coreflood” botnet. In an unprecedented move, a federal judge granted permission to authorities to seize control of the botnet, which compromised private computers with malicious software that captured private online banking information from users. The Internet Systems Consortium, a non-profit organization, was given permission to takeover the botnet’s command-and-control servers — used to communicate with infected private computers — and replace the servers with its own.”

From Information Warfare Monitor

U.S. disables hackers’ henchmen in new era of cyber justice

“Cybercrime ‘is massive in scope and scale right now. The question is what to do about it,’ explained Ron Deibert, a security expert who is the director of the Citizen Lab at the University of Toronto. ‘Now we’re finally seeing governments taking action.’

The U.S. investigation is being touted as the ‘most complete and comprehensive’ law-enforcement action of its kind and, quite possibly, the shape of things to come.”

From The Globe and Mail