Attacks on the Press in 2010 - Committee to Protect Journalists
Attacks on the Press in 2010 - Committee to Protect Journalists
Attacks on the Press in 2010 - Committee to Protect Journalists
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Introducti<strong>on</strong><strong>the</strong> severely restricted nati<strong>on</strong>, were be<strong>in</strong>g blocked not just from Burmeseaudiences but from <strong>in</strong>ternati<strong>on</strong>al viewership as well.In Vietnam, more than a quarter of <strong>the</strong> relatively youthful populati<strong>on</strong>was <strong>on</strong>l<strong>in</strong>e <strong>in</strong> <strong>2010</strong>, accord<strong>in</strong>g <strong>to</strong> ITU data. The country’s communistgovernment has made Internet c<strong>on</strong>trol <strong>on</strong>e of its priorities, and <strong>the</strong>sophisticati<strong>on</strong> of surveillance and attacks <strong>on</strong> Vietnamese <strong>on</strong>l<strong>in</strong>e media nowrivals that of any nati<strong>on</strong> <strong>in</strong> <strong>the</strong> world, <strong>in</strong>clud<strong>in</strong>g Ch<strong>in</strong>a. Websites cover<strong>in</strong>gnews of <strong>the</strong> Vietnamese government’s bauxite m<strong>in</strong><strong>in</strong>g policies—a c<strong>on</strong>troversialissue because of potential ecological damage and <strong>the</strong> <strong>in</strong>volvemen<strong>to</strong>f Ch<strong>in</strong>ese companies—were taken offl<strong>in</strong>e <strong>in</strong> early <strong>2010</strong> by DDOS attacks.The thousands of computers used <strong>in</strong> this attack were c<strong>on</strong>trolled by a largedomestic botnet of computers <strong>in</strong>fected by a specific k<strong>in</strong>d of malware.Researchers at Google and McAfee, a computer security company, uncovered<strong>the</strong> source of this <strong>in</strong>fecti<strong>on</strong>. A blog post by McAfee’s CTO, GeorgeKurtz, described a Trojan c<strong>on</strong>cealed <strong>in</strong> <strong>the</strong> software downloaded by manyVietnamese residents <strong>to</strong> allow <strong>the</strong>m <strong>to</strong> enter native text accents when us<strong>in</strong>gW<strong>in</strong>dows computers.In Vietnam, accent software carries adebilitat<strong>in</strong>g Trojan virus.In February, CPJ reported <strong>on</strong> a direct hack<strong>in</strong>g attack that <strong>to</strong>ok down <strong>the</strong>Vietnamese news site Blogos<strong>in</strong>. The site’s edi<strong>to</strong>r, Tru<strong>on</strong>g Huy San, who alsoused <strong>the</strong> name Huy Duc, so<strong>on</strong> posted a message <strong>on</strong> a newly created homepage <strong>to</strong> say that he would s<strong>to</strong>p blogg<strong>in</strong>g <strong>to</strong> focus <strong>on</strong> pers<strong>on</strong>al matters. Theattack occurred <strong>on</strong> <strong>the</strong> same day as <strong>the</strong> trial and c<strong>on</strong>victi<strong>on</strong> of Tran KhaiThanh Thuy, a writer and edi<strong>to</strong>rial board member of <strong>the</strong> <strong>on</strong>l<strong>in</strong>e magaz<strong>in</strong>eTo Quoc. (Thuy was sentenced <strong>to</strong> three and a half years.) The e-mailaccounts of two o<strong>the</strong>r bloggers, Pham Thi Hoar and Huy Duc, were hackedat <strong>the</strong> same time, Human Rights Watch reported.Can governments like Burma and Vietnam really commandeer and coord<strong>in</strong>atesuch elaborate methods of silenc<strong>in</strong>g <strong>on</strong>l<strong>in</strong>e voices? It is difficult, if notimpossible, <strong>to</strong> trace <strong>the</strong> true orig<strong>in</strong>s of DDOS attacks, <strong>the</strong> targeted hack<strong>in</strong>gof websites, and even <strong>the</strong> f<strong>in</strong>al dest<strong>in</strong>ati<strong>on</strong> of secretly forwarded e-mails.Just as <strong>the</strong> Internet’s decentralized and <strong>in</strong>terc<strong>on</strong>nected systems allowjournalists <strong>the</strong> ability <strong>to</strong> speak an<strong>on</strong>ymously and preserve <strong>the</strong> an<strong>on</strong>ymityof sources, <strong>the</strong>y can also misdirect and shroud <strong>the</strong> locati<strong>on</strong> of malicious11