Internet

717 results arranged by date

Attacks on the Press   |   Mexico, Nigeria, Syria

Broadcasting murder: Militants use media for deadly purpose

A militant uses a mobile phone to film fellow Islamic State fighters taking part in a military parade along the streets of Syria's Raqqa province on June 30, 2014. (Reuters/Stringer)

News of the August 19, 2014, murder of journalist James Foley broke not in the media but instead on Twitter. News organizations faced the agonizing questions of how to report on the killing and what portions of the video to show. If a group or individual commits an act of violence, and then films it, how can traditional news organizations cover it without amplifying the propaganda message?

Attacks on the Press   |   Egypt, Kuwait, Libya, Saudi Arabia, Tunisia, UAE, Yemen

Treating the Internet as the enemy in the Middle East

Supporters of the Muslim Brotherhood and ousted Egyptian President Mohamed Morsi shout slogans against the military and government during a protest in Cairo on November 28, 2014. (Reuters/Mohamed Abd El Ghany)

The snow and freezing temperatures that struck Saudi Arabia unexpectedly in December 2013 were newsworthy in a desert kingdom better known for its extreme heat. But the fact that the ensuing power outages at a regional prison left prisoners without power or heat for nearly a week was apparently off-limits to reporters.

Attacks on the Press   |   Canada, UK, USA

Surveillance forces journalists to think and act like spies

Graffiti attributed to the street artist Banksy is seen near the offices of Britain's eavesdropping agency, Government Communications Headquarters, or GCHQ, in Cheltenham, England, on April 16, 2014. (Reuters/Eddie Keogh)

Once upon a time, a journalist never gave up a confidential source. When someone comes forward, anonymously, to inform the public, it's better to risk time incarcerated than give them up. This ethical responsibility was also a practical and professional necessity. If you promise anonymity, you're obliged to deliver. If you can't keep your word, who will trust you in the future? Sources go elsewhere and stories pass you by.

Attacks on the Press   |   Spain, USA

Two continents, two courts, two approaches to privacy

Mario Costeja Gonzalez speaks on his mobile phone outside a court in Barakaldo, Spain, on June 25, 2013. As a result of a lawsuit he filed against Google, Internet companies can be made to remove irrelevant or excessive personal information from search engine results, Europe's top court ruled.  (Reuters/Vincent West)

At 3:20 a.m. on August 24, 2014, the strongest earthquake in a quarter-century rocked the San Francisco Bay Area, causing damage widely estimated at between $300 million and $1 billion.

Attacks on the Press   |   China, Cuba, Eritrea, Hungary, Iran, Poland, South Africa, Sudan, Syria, Vietnam

Journalists overcome obstacles through crowdfunding and determination

The rubble of a school bombed by the Sudanese government in 2012. To set up a news agency to cover the conflict, humanitarian worker Ryan Boyette used crowdfunding. (AP/Ryan Boyette)

During South Africa's Boer War, at the turn of the 20th century, a determined news organization relocated reporters, copy editors, and printing presses to the front line to ensure accurate reporting. In the Warsaw Ghetto, during World War II, a literal underground press, established to counter Nazi propaganda, required the nightly movement of cumbersome printing equipment to evade capture.

Blog   |   China, Internet

China's Great Cannon: New weapon to suppress free speech online

The headquarters of Baidu in Beijing. New censorship tool the Great Cannon is said to have redirected traffic from the popular Chinese site in a massive distributed denial of service attack. (AFP/Liu Jin)

China, rated as the eighth most censored country in the world, in a report released by CPJ today, has long had a strong line of defense against free speech online. Its Golden Shield Project, launched by the Ministry of Public Security in 1998, relies on a combination of technology and personnel to control what can be expressed and accessed behind the Great Firewall of China.

Blog   |   Internet, Security

When it comes to Great Firewall attacks, HTTPS is greatest defense

An Internet café in Beijing. Attacks that appear to have been mediated by China's censors against GitHub, a software site vital to Chinese developers, demonstrate the importance of HTTPS in protecting against censorship. (Reuters/Jason Lee)

The power of HTTPS to protect has been brought into sharp focus by a series of attacks against software collaboration site GitHub. These attacks consistently failed because of the site's universal use of HTTPS. Most recently, GitHub reported a blistering series of distributed denial of service attacks in March, which it believes were an attempt to persuade the site to remove certain content. Security researchers including Robert Graham and Insight Labs analyzed the latest GitHub attack, concluding that it appears to have been mediated by China's "great firewall" censorship system.

April 8, 2015 2:03 PM ET

Tags:

Blog   |   Pakistan

Evolution of Pakistan's proposed cybercrime law

Journalists browse the Internet in Peshawar. Pakistan's draft cybercrime bill includes a section seeking to justify government censorship of Web content. (AFP/A Majeed)

A pointer to our colleagues at Bolo Bhi, Pakistan's independent Internet freedom and electronic privacy watchdog (it's involved in gender issues too). The watchdog has been tracking the evolution of Pakistan's attempts at cybercrime legislation since 2007.

April 1, 2015 2:30 PM ET

Tags:

Blog   |   China, Internet, Security

China's CNNIC issues false certificates in serious breach of crypto trust

Google's landing page for China is viewed on a laptop in Hong Kong. False credentials were issued for Google and other domains by Chinese digital certificate company CNNIC. (AFP/Frederic J. Brown)

In a major breach of public trust and confidence, the Chinese digital certificate authority China Internet Network Information Center (CNNIC) certified false credentials for numerous domains, including several owned by Google. The deliberate breach had the potential to seriously endanger vulnerable users, such as journalists communicating with sources. The breach was discovered by Google and published on its security blog on March 23. Despite this serious lapse, it appears CNNIC's authority will not be revoked, and that its credentials will continue to be trusted by almost all computers around the world.

717 results

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 Next Page »