Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Anonymous Says DDoS Attacks Like Free Speech
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Laurianne
50%
50%
Laurianne,
User Rank: Apprentice
1/11/2013 | 7:23:21 PM
re: Anonymous Says DDoS Attacks Like Free Speech
My colleague at Dark Reading, Kelly Jackson Higgins, points out that this same issue came up at the most recent DefCon conference. Read more about it: http://www.darkreading.com/dat...

Laurianne McLaughlin
InformationWeek
Nyuk
50%
50%
Nyuk,
User Rank: Apprentice
1/11/2013 | 7:05:27 PM
re: Anonymous Says DDoS Attacks Like Free Speech
After seeing the faces of IT execs hearing that they are being attacked I'd go further to classify them as terrorism.

Release the drones on them! (At risk of having them taken over. ;-)
jries921
50%
50%
jries921,
User Rank: Ninja
1/11/2013 | 6:35:33 PM
re: Anonymous Says DDoS Attacks Like Free Speech
Good point. Unless the owners of all the machines used agreed to participate in the DDoS attack, the attackers are engaging in what amounts to burglary and hijacking (regardless of what the law may happen to say).
jries921
50%
50%
jries921,
User Rank: Ninja
1/11/2013 | 6:32:12 PM
re: Anonymous Says DDoS Attacks Like Free Speech
Right!

...and setting off Molotov cocktails is covered by the right to keep and bear arms!

I agree that corporate political expenditures aren't free speech either (as the late Justice Hugo Black famously said, "Speech is speech"), but dubious Supreme Court precedents are no excuse.

DDoS attacks are harassment, not speech.
ikeman
50%
50%
ikeman,
User Rank: Apprentice
1/11/2013 | 6:25:41 PM
re: Anonymous Says DDoS Attacks Like Free Speech
Doesn't DDoS imply that several compromised systems were required to make this so-called protest? By doing so, they are implicitly including other people in the protest who may not agree with the protest, and they've hacked their computers...sorry, they need to rethink that argument, unless all the computers involved to create the DDoS attack are all their own computers. Plus, protesting should be one person to one protest ratio, not one person can make thousands of the same protest ratio.
irishutopia
50%
50%
irishutopia,
User Rank: Apprentice
1/11/2013 | 6:21:26 PM
re: Anonymous Says DDoS Attacks Like Free Speech
hmm...an interesting spin on the idea, but wouldn't this lead to everyone throwing down random DDoS attacks in the name of protest?
lgaryHB
50%
50%
lgaryHB,
User Rank: Apprentice
1/11/2013 | 6:17:01 PM
re: Anonymous Says DDoS Attacks Like Free Speech
At the risk of being attacked by Anonymous, I would argue that their premise is cute, but flawed. An Occupy protest sits on public property outside of the established business. Were they to enter the business they are protesting, they would be violating laws on the books, not exercising free speech rights. Also, business is still being conducted inside the premises. DDoS attacks are not by definition staying on the public square, but are entering the established online business site. You cannot knock on the door of an online web page without entering. The attacker might also be violating that business or individual's free speech rights by blocking the web page from being presented in the public internet. And if you were to repeatedly knock on a real business's door thousands of times a second, you would be subject to harassment charges if not trespassing. That is not speech nor is it peaceable assembly.
jerrynesmith
50%
50%
jerrynesmith,
User Rank: Apprentice
1/11/2013 | 6:06:59 PM
re: Anonymous Says DDoS Attacks Like Free Speech
I thought this (DDoS as Freedom of Speech) a ridiculous notion. But I thought the same of corporations' having protected freedom of speech as a person and freedom of speech being spending unlimited money on political campaigns and remaining anonymous.
<<   <   Page 2 / 2


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM &amp;amp; Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.