Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/2/2006
05:02 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Monitoring Employees' Outbound E-Mail Doesn't Make You Big Brother

Many of you are deeply involved in privacy initiatives at your company, and you know better than anyone else that it's a very complex and touchy issue, and that it can be hard to find credible information that helps you achieve those important objectives. And while I wish it were otherwise, the nonsense that many media outlets pump out about this critical subject makes it easy for me to understand why so many people don't trust journalists as much as they used to--or even at all. This isn't an e

Many of you are deeply involved in privacy initiatives at your company, and you know better than anyone else that it's a very complex and touchy issue, and that it can be hard to find credible information that helps you achieve those important objectives. And while I wish it were otherwise, the nonsense that many media outlets pump out about this critical subject makes it easy for me to understand why so many people don't trust journalists as much as they used to--or even at all. This isn't an easy admission from someone who's toiled in the field for almost 30 years, but some of the crap being cranked out today under the heading of "news" reminds me of how Oscar Wilde described fox hunting: "The unthinkable in pursuit of the inedible."

Let me share with you the latest "news" from Reuters--and before you read this, sit down and take a deep breath cause it's a real shocker: "According to a new study, about a third of big companies in the United States and Britain hire employees to read and analyze outbound e-mail as they seek to guard against legal, financial, or regulatory risk." Well stop the danged presses, huh? What will Reuters bring us next--maybe an expose on how teenagers use IM more than traditional e-mail?

Now in itself, that quote isn't such a big deal because I don't think most people expect a lot of high-impact information from Reuters about business technology. But check out the opening sentence from that Reuters dog-bites-man yawner: "Big Brother is not only watching but he is also reading your e-mail." Yes, score another one for the "objective" mainstream media. All the effort you and your colleagues have put into trying to secure your e-mail systems is, in the eyes of Reuters, nothing more than a devious and subversive effort to trample privacy and civil liberties.Who can blame you folks for being extremely skeptical of anything you read?

First this Reuters reporter cites a study saying that about one-third of all respondent companies said "their business was hurt by the exposure of sensitive or embarrassing information in the past 12 months." Because about 99.99% of all companies probably don't want to be hurt by such exposures, many businesses are taking steps to prevent such incidents--isn't that a good thing? In most circles, that would be seen as wise, prudent, and appropriate. But not in the conspiracy-obsessed mind of this reporter, who like so many "objective" reporters in the mainstream media today sees only what he wants to see and reports only what he wants the conclusion to be.

So Reuters hauls out the hackneyed cliche of Big Brother--a linguistic touch here that is, to paraphrase Wilde, the inappropriate in support of the unintelligent--to cram some phony sizzle into an otherwise pointless story. Most companies today make it unmistakably clear to employees that e-mail messages written on company equipment and transmitted over company networks are the property of the company and not the individual--yet, true to form, Reuters depicts this basic safeguarding as bogeyman businesses snooping into "your" e-mail.

Well, here's our pledge: We at InformationWeek and TechWeb and Network Computing and other CMP technology sites promise we'll spare you this type of twisted nonsense, and we promise we won't link to useless stories like this one from Reuters (except to criticize them), and we promise we'll focus on giving you the information you want and need, rather than on what we think will get a phony rise out of you. So let us know what you think, and don't pay any attention to these linguistic hallucinations from the hypemeisters at Reuters.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This is not what I meant by "I would like to share some desk space"
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-28452
PUBLISHED: 2021-01-20
This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request ...
CVE-2020-28483
PUBLISHED: 2021-01-20
This affects all versions of package github.com/gin-gonic/gin. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.
CVE-2021-21269
PUBLISHED: 2021-01-20
Keymaker is a Mastodon Community Finder based Matrix Community serverlist page Server. In Keymaker before version 0.2.0, the assets endpoint did not check for the extension. The rust `join` method without checking user input might have made it abe to do a Path Traversal attack causing to read more f...
CVE-2020-25686
PUBLISHED: 2021-01-20
A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same...
CVE-2020-25687
PUBLISHED: 2021-01-20
A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This...