Close the Interwebz?

In my last CSO blog I posted about the Australian Federal Governments recent proposal that requires Internet Service Providers to retain their customers’ activity logs for a period of two years.

In recent days there has been an outcry over Syria switching off the country’s Internet, and parallels have been drawn with the Egyptian switch-off when they went through their own troubles. It has also been likened to the Obama administration’s request for a US “kill-switch” on the internet. I picture it being situated between the bat-phone and the nuke the “commies” button on the President’s desk in the oval office.

At the end of the day the real source of concern is who is watching the watchers; and what do the watchers want to look at.

What really stands clear is that governments globally are realising that the digital economy is overtaking them. It is clearly here to stay and has well and truly moved from the domain of the academic and geek, to the mainstream world - our mothers, grandmothers and children rely on it. Critical national infrastructure and governments are so entrenched in using it they simply cannot be excised. Trade and security borders, which for many years stood as a physical protection—separated by water or other geopolitical boundaries, are now dissolving rapidly. Crimes can be perpetrated electronically from anywhere on the globe against anyone.

Some of the most ready analogies I offer below here come from history, others science fiction, however my point is that governments and citizens face difficulties with the evolution of the global economy. We are all human, so it is a pity that cultures, politics and religions don't change as fast as light through a fibre optic cable.

Imagine if picture teleportation existed right now. I could flick on my iPort and beam myself from one side of the globe to the other, then beam myself back. Obviously I could do all this without a passport or visa. There simply cannot be an immigration/customs officer everywhere, all of the time waiting for me to materialise. I would use the ability for innocuous reasons – picking up an in’n’out burger from San Francisco pops to mind or perhaps a romantic dinner in Paris. However, I could also be malicious, popping in to execute someone, or grab a bunch of gold from a safe, or some plutonium from an enrichment facility. Those would be physical crimes – in fact if I beamed into the US without going through border control (even if I was just getting a burger) it would not be looked upon favourably.

What then, is the difference with electronic crime? And how do governments grapple with regulating crime perpetrated in a digital world?

The point has recently been made that agencies should have the ability to monitor at will and switch off at leisure. This is a knee jerk reaction to being overwhelmed. An acquaintance with vast inside experience of government policy recently pointed out to me how risk averse they are. And this is something that is demonstrated to me daily – 85% of Enex TestLab’s testing business is with state, federal and international Government departments or agencies.

Due to this inherent need to identify and manage risk, no matter how minute, the amount of time this business takes is vast. Those in the public sector do not consider transferal or deferral of risk an option – it all needs to be addressed.

Look at how some governments handle Twitter. Generally anything published on Twitter goes through several committees—vetting which tweets need to be responded to. The material goes up and down the hierarchy chain several times before being released. People expect a response, but government tweets can take weeks to pop out the other side, by which stage they are often all but irrelevant (therefore risk avoided?). Frustrating for most of us.

So let’s move on to the wild west. Another analogy, which I recently attempted in public, was the concept of the printing press and railways. When the first printing presses were produced, politics and religion were up in arms as they realised this was the start of the education of the masses. Their access to, and potential freedom of, information had previously been unheard of. Regulations and restrictions were in place, however, over time the tide changed and the emerging technology worked its influence on the world to assist in making it the way it is today. This is exactly where we are at with the acceptance of the internet as the next incumbent information/education distribution platform. Now anyone with an opinion, right or wrong, can self-publish it.

I wonder about when the next religious prophet-figure has their ‘coming’ and walks the earth. Will they really be heard for all the noise?

Railway lines, on the other hand, were akin to private networks, various economies around the world developed their own private and public systems and standards to meet their own requirements—be it comfort, capacity, performance or a particular design to suit geography or climate.

In Australia, some states had different gauges (width between the two rails) meaning that interstate rail movements required a changing of freight and passengers at the border. This is the type of restriction governments who are seeking to regulate the internet are still seeking – unfortunately, engineers learnt from history’s mistakes and these days try to make basic infrastructure as interoperable as possible. (Hence one of the primary reasons the internet is relatively borderless. And even if it isn’t, where there is a will there is a way.)

Where to from here? Passports and visas on IP address ranges? Time will tell. Evolution of technologies will inevitably continue, from printing presses and railway lines to internet and teleportation (maybe) where we were 200 years ago is not where we will be in another 200 years that is clear.

No one can write words or implement policy to stop innovation, regardless of whether it is for the progress or destruction of our race. Flexibility is called for and the ability to react and adapt rapidly.

Interesting times.

Join the CSO newsletter!

Error: Please check your email address.

More about CSOEnex TestLab

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Matt Tett

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place