News
4/17/2008
02:20 AM
Terry Sweeney
Terry Sweeney
Commentary
Connect Directly
RSS
E-Mail
50%
50%
Repost This

When You Spring A Wikileak

When thinkers of big thoughts talk about the democratizing effect of technology, they needn't look a whole lot further than Wikileaks or LiveLeak. Incendiary anti-Muslim video, copies of documents from Guantanamo -- this stuff leaves the Huffington Post and other Web 2.0 "news" sites in the dust.

When thinkers of big thoughts talk about the democratizing effect of technology, they needn't look a whole lot further than Wikileaks or LiveLeak. Incendiary anti-Muslim video, copies of documents from Guantanamo -- this stuff leaves the Huffington Post and other Web 2.0 "news" sites in the dust.Now if they could just get in to that safe in Dick Cheney's office.

But in the wake of the snooping in the medical files of Britney Spears and Farrah Fawcett, it begs the question of where we draw the line between the private and the secret. Celebrities and regular joes have a reasonable expectation of privacy; isn't the Church of Scientology similarly entitled? Or does its tax-exempt status and those Tom Cruise Cringe-o-Rama videos single it out for scrutiny and the clear light of day?

These questions aren't academic or contemporary hypotheticals for storage professionals. In the wild and woolly world of policy networking, those in the data center implement the requested controls as to who can access what. Granted that's almost always done in concert with a department head or HR and legal. But what does IT do when special cases crop up -- like the CEO's admin, for example. Does that person automatically get the same rights to all the same files and folders because they also download the boss's e-mail (and probably prioritize it and craft responses)?

So to jump back a bit, what if former Enron accountant Sherron Watkins had had Wikileaks at her disposal? I bet it would have hastened the inevitable and foreshortened the interminable legal cases that followed. And again, Enron had a reasonable expectation (maybe even a legal requirement) of confidentiality and privacy. But when you're telling billion-dollar lies and getting away with it, that completely rearranges the ethical landscape.

This sort of stuff is only going to become more common and create some tough decisions for IT, with lots of ethical gray areas ahead. Individuals are a different case, but organizations -- public and private -- may find a lot less sympathy for any need for secrecy. They may, in fact, be provoking Web leakers into action.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Containing Corporate Data on Mobile Devices
Containing Corporate Data on Mobile Devices
If you’re still focused on securing endpoints, you’ve got your work cut out for you. WiFi network provider iPass surveyed 1,600 mobile workers and found that the average US employee carries three devices -- a smartphone, a computer, and a tablet or e-reader -- with more than 80% of them doing work on personal devices.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web