Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Networking

    Taking Responsibility

    By
    Rob Fixmer
    -
    September 24, 2001
    Share
    Facebook
    Twitter
    Linkedin

      As Attorney General John Ashcroft fielded reporters questions last Tuesday about the attack on the World Trade Center and the Pentagon, one journalist asked if a new computer worm, discovered only hours earlier, was in any way related to the terrorist strikes. It was not, Ashcroft assured the nation – or at least, there was as yet no evidence linking it to Osama bin Laden and his ilk.

      Somehow that was not altogether reassuring. Yes, it suggested that the same evil minds who plotted the deaths of thousands and the destruction of our national icons in a relatively low-tech assault had not evinced the technological sophistication to attack our computer networks. Not yet, anyway.

      But it also reminded us that the numbers of our invisible enemies are growing each day, turning our commitment to freedom and openness into sundry weapons capable of destroying us.

      It is no exaggeration to describe the creation of computer viruses and worms as terrorism. While none has yet threatened loss of life, as our culture grows increasingly dependent on the network of networks to organize and maintain our social, commercial, military and political institutions, some highly sophisticated worm will eventually wield deadly powers. It will not kill through physical assault, but through deprivation – emergency supplies cut off, urgent calls for help unheard, defenses unplugged. It will kill by throwing crucial institutions into chaos by simply erasing or corrupting the data on which we increasingly depend for daily sustenance.

      As the worlds political leaders counsel patience and perseverance in a type of war never before waged, we risk enormous peril if we take our eyes off the cyberfront. In some ways, digital terrorism will be even harder to combat than suicide bombers and elusive snipers – first, because the attackers are often armies of one whose motivation is unknown, and second, because so much of our aggregate defenses depends on private companies whose allegiances will always be divided between social responsibility and profits.

      As intoxicated as weve become with the notion that the market must decide all things commercial, software developers have proven themselves to be socially irresponsible by consistently releasing products that are vulnerable to attack. Surely, the leaders of the computer industry – men and women cited as visionaries at every opportunity – have realized that network terrorism is an escalating war. Its time to adopt and enforce industry standards with enough teeth to make them stick.

      That said, before we start pointing fingers at Microsoft, I suggest we take a long hard look in the mirror. How many of us have been vigilant in applying the patches developers have made readily available – often proactively? How many of us have circumvented password protections because we couldnt be bothered? How many can say we have been completely vigilant in monitoring firewalls and network diagnostics? How many of us, in fact, have been asleep at the wheel?

      Its not Microsofts job to protect us from ourselves, from our inertia or our unwillingness to invest human and capital resources in our own barricades. Its not Microsofts job to force ISPs to wage a cooperative war on denial-of-service attacks. Nor can Microsoft, as large as it is, act as the worlds software police or central administrator of defensive information. That role lies with industry and government, which have so far compiled a very sorry record in collaborating against cyberterrorism.

      And finally, a great deal of responsibility lies with the hacker community, which consistently criticizes worm and virus attacks and denies any responsibility for their existence, but in truth condones a shadowy subculture that nurtures these terrorists. Three years ago, IBM sponsored a daylong seminar on cyberforensics at its headquarters in Armonk, N.Y. The event drew some of the brightest lights in the hacker world, but when one speaker attempted to distinguish between “black hat” and “white hat” hackers, he was booed. Hacking was “not about morality,” one member of the audience shouted.

      In the immortal words of Harry Truman: bullshit! There are no moral shades of gray here. We cannot condone the argument put forth by social misfits at keyboards that Microsoft products must be attacked to expose their vulnerabilities. Everyone knows there are responsible ways to hack a product. Releasing a worm or otherwise attacking an undefended network is not among them. Its time the hacker community weeded out the evil in its midst.

      The bottom line is that we are already engaged in an escalating confrontation that holds frightening consequences for our economy, culture and well-being. Winning the war against cyberterrorism will require never-ending vigilance – and patience and perseverance – on the part of all of us.

      Rob Fixmer is Editor-in-Chief of Interactive Week. He can be reached at rob_fixmer@ziffdavis.com.

      Rob Fixmer
      Editor-In-Chiefrob.fixmer@ziffdavisenterprise.comRob joined Interactive Week from The New York Times, where he was the paper's technology news editor. Rob also was the founding editor of CyberTimes, The New York Times' technology news site on the Web. Under his guidance, the section grew from a one-man operation to an award-winning, full-time venture.His earlier New York Times assignments were as national weekend editor, national backfield editor and national desk copy editor. Before joining The New York Times in 1992, Rob held key editorial positions at the Dallas Times Herald and The Madison (Wisc.) Capital Times.A highly regarded technology journalist, he recently was appointed to the University of Wisconsin School of Journalism's board of visitors. Rob lectures yearly on new media at Columbia University's School of Journalism, and has made presentations at the Massachusetts Institute of Technology's Media Lab and Princeton University's New Technologies Symposium.In addition to overseeing all of Interactive Week's print and online coverage of interactive business and technology, his responsibilities include development of new sections and design elements to ensure that Interactive Week's coverage and presentation are at the forefront of a fast-paced and fast-changing industry.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×