11.07.2015 Views

Attacks on the Press in 2010 - Committee to Protect Journalists

Attacks on the Press in 2010 - Committee to Protect Journalists

Attacks on the Press in 2010 - Committee to Protect Journalists

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Introducti<strong>on</strong>Expos<strong>in</strong>g <strong>the</strong> Internet’sShadowy Assailantsby Danny O’BrienFor <strong>the</strong> past decade, those who used <strong>the</strong> Internet <strong>to</strong> report <strong>the</strong> newsmight have assumed that <strong>the</strong> technological edge was <strong>in</strong> <strong>the</strong>ir favor.But <strong>on</strong>l<strong>in</strong>e journalists now face more than just <strong>the</strong> standard risks <strong>to</strong> thosework<strong>in</strong>g <strong>in</strong> dangerous c<strong>on</strong>diti<strong>on</strong>s. They f<strong>in</strong>d <strong>the</strong>mselves victims of newattacks unique <strong>to</strong> <strong>the</strong> new medium. From <strong>on</strong>l<strong>in</strong>e surveillance of writersthrough cus<strong>to</strong>mized malicious software <strong>to</strong> “just <strong>in</strong> time” censorship thatcan wipe c<strong>on</strong>troversial news sites off <strong>the</strong> Internet at <strong>the</strong> most <strong>in</strong>c<strong>on</strong>venientmoment, <strong>the</strong> <strong>on</strong>l<strong>in</strong>e <strong>to</strong>ols <strong>to</strong> attack <strong>the</strong> press are gett<strong>in</strong>g smarter andspread<strong>in</strong>g fur<strong>the</strong>r.In March, Andrew Jacobs, a corresp<strong>on</strong>dent work<strong>in</strong>g for The New YorkTimes <strong>in</strong> Beij<strong>in</strong>g, peered for <strong>the</strong> first time <strong>in</strong><strong>to</strong> <strong>the</strong> obscure corners of hisYahoo e-mail account sett<strong>in</strong>gs. Under <strong>the</strong> “mail forward<strong>in</strong>g” tab was ane-mail address he had never seen before. That o<strong>the</strong>r e-mail address hadbeen receiv<strong>in</strong>g copies of all of his <strong>in</strong>com<strong>in</strong>g e-mails for m<strong>on</strong>ths. His accounthad been hacked.Jacobs’ experience as a journalist <strong>in</strong> Ch<strong>in</strong>a is not unusual. Over <strong>the</strong>past two years, o<strong>the</strong>r members of <strong>the</strong> Foreign Corresp<strong>on</strong>dents’ Clubof Ch<strong>in</strong>a (FCCC) have been <strong>the</strong> victims of a series of targeted computerhacks. In 2009, carefully crafted e-mails from an elaborately c<strong>on</strong>structedfalse identity—“Pam Bourd<strong>on</strong>,” ec<strong>on</strong>omics edi<strong>to</strong>r of <strong>the</strong> Straits Times—were sent <strong>to</strong> <strong>the</strong>ir local news assistants via unpublicized e-mail addresses.If <strong>the</strong> assistants opened an attached document, <strong>the</strong>y were shown exactlywhat <strong>on</strong>e might expect from <strong>the</strong> e-mail’s cover explanati<strong>on</strong>—a detailedlist of dates that “Bourd<strong>on</strong>” would be available dur<strong>in</strong>g a Beij<strong>in</strong>g visit.Simultaneously, a hidden program capable of tak<strong>in</strong>g over and spy<strong>in</strong>g <strong>on</strong><strong>the</strong> recipient’s computer would launch. C<strong>on</strong>trol of <strong>the</strong> assistant’s computer—andthat of any<strong>on</strong>e who opened <strong>the</strong> forwarded document—wouldpass <strong>to</strong> remote servers c<strong>on</strong>trolled by unknown parties.7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!