Risk
6/2/2006
05:02 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Monitoring Employees' Outbound E-Mail Doesn't Make You Big Brother

Many of you are deeply involved in privacy initiatives at your company, and you know better than anyone else that it's a very complex and touchy issue, and that it can be hard to find credible information that helps you achieve those important objectives. And while I wish it were otherwise, the nonsense that many media outlets pump out about this critical subject makes it easy for me to understand why so many people don't trust journalists as much as they used to--or even at all. This isn't an e

Many of you are deeply involved in privacy initiatives at your company, and you know better than anyone else that it's a very complex and touchy issue, and that it can be hard to find credible information that helps you achieve those important objectives. And while I wish it were otherwise, the nonsense that many media outlets pump out about this critical subject makes it easy for me to understand why so many people don't trust journalists as much as they used to--or even at all. This isn't an easy admission from someone who's toiled in the field for almost 30 years, but some of the crap being cranked out today under the heading of "news" reminds me of how Oscar Wilde described fox hunting: "The unthinkable in pursuit of the inedible."

Let me share with you the latest "news" from Reuters--and before you read this, sit down and take a deep breath cause it's a real shocker: "According to a new study, about a third of big companies in the United States and Britain hire employees to read and analyze outbound e-mail as they seek to guard against legal, financial, or regulatory risk." Well stop the danged presses, huh? What will Reuters bring us next--maybe an expose on how teenagers use IM more than traditional e-mail?

Now in itself, that quote isn't such a big deal because I don't think most people expect a lot of high-impact information from Reuters about business technology. But check out the opening sentence from that Reuters dog-bites-man yawner: "Big Brother is not only watching but he is also reading your e-mail." Yes, score another one for the "objective" mainstream media. All the effort you and your colleagues have put into trying to secure your e-mail systems is, in the eyes of Reuters, nothing more than a devious and subversive effort to trample privacy and civil liberties.Who can blame you folks for being extremely skeptical of anything you read?

First this Reuters reporter cites a study saying that about one-third of all respondent companies said "their business was hurt by the exposure of sensitive or embarrassing information in the past 12 months." Because about 99.99% of all companies probably don't want to be hurt by such exposures, many businesses are taking steps to prevent such incidents--isn't that a good thing? In most circles, that would be seen as wise, prudent, and appropriate. But not in the conspiracy-obsessed mind of this reporter, who like so many "objective" reporters in the mainstream media today sees only what he wants to see and reports only what he wants the conclusion to be.

So Reuters hauls out the hackneyed cliche of Big Brother--a linguistic touch here that is, to paraphrase Wilde, the inappropriate in support of the unintelligent--to cram some phony sizzle into an otherwise pointless story. Most companies today make it unmistakably clear to employees that e-mail messages written on company equipment and transmitted over company networks are the property of the company and not the individual--yet, true to form, Reuters depicts this basic safeguarding as bogeyman businesses snooping into "your" e-mail.

Well, here's our pledge: We at InformationWeek and TechWeb and Network Computing and other CMP technology sites promise we'll spare you this type of twisted nonsense, and we promise we won't link to useless stories like this one from Reuters (except to criticize them), and we promise we'll focus on giving you the information you want and need, rather than on what we think will get a phony rise out of you. So let us know what you think, and don't pay any attention to these linguistic hallucinations from the hypemeisters at Reuters.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.