11.07.2015 Views

Attacks on the Press in 2010 - Committee to Protect Journalists

Attacks on the Press in 2010 - Committee to Protect Journalists

Attacks on the Press in 2010 - Committee to Protect Journalists

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Introducti<strong>on</strong><strong>the</strong> severely restricted nati<strong>on</strong>, were be<strong>in</strong>g blocked not just from Burmeseaudiences but from <strong>in</strong>ternati<strong>on</strong>al viewership as well.In Vietnam, more than a quarter of <strong>the</strong> relatively youthful populati<strong>on</strong>was <strong>on</strong>l<strong>in</strong>e <strong>in</strong> <strong>2010</strong>, accord<strong>in</strong>g <strong>to</strong> ITU data. The country’s communistgovernment has made Internet c<strong>on</strong>trol <strong>on</strong>e of its priorities, and <strong>the</strong>sophisticati<strong>on</strong> of surveillance and attacks <strong>on</strong> Vietnamese <strong>on</strong>l<strong>in</strong>e media nowrivals that of any nati<strong>on</strong> <strong>in</strong> <strong>the</strong> world, <strong>in</strong>clud<strong>in</strong>g Ch<strong>in</strong>a. Websites cover<strong>in</strong>gnews of <strong>the</strong> Vietnamese government’s bauxite m<strong>in</strong><strong>in</strong>g policies—a c<strong>on</strong>troversialissue because of potential ecological damage and <strong>the</strong> <strong>in</strong>volvemen<strong>to</strong>f Ch<strong>in</strong>ese companies—were taken offl<strong>in</strong>e <strong>in</strong> early <strong>2010</strong> by DDOS attacks.The thousands of computers used <strong>in</strong> this attack were c<strong>on</strong>trolled by a largedomestic botnet of computers <strong>in</strong>fected by a specific k<strong>in</strong>d of malware.Researchers at Google and McAfee, a computer security company, uncovered<strong>the</strong> source of this <strong>in</strong>fecti<strong>on</strong>. A blog post by McAfee’s CTO, GeorgeKurtz, described a Trojan c<strong>on</strong>cealed <strong>in</strong> <strong>the</strong> software downloaded by manyVietnamese residents <strong>to</strong> allow <strong>the</strong>m <strong>to</strong> enter native text accents when us<strong>in</strong>gW<strong>in</strong>dows computers.In Vietnam, accent software carries adebilitat<strong>in</strong>g Trojan virus.In February, CPJ reported <strong>on</strong> a direct hack<strong>in</strong>g attack that <strong>to</strong>ok down <strong>the</strong>Vietnamese news site Blogos<strong>in</strong>. The site’s edi<strong>to</strong>r, Tru<strong>on</strong>g Huy San, who alsoused <strong>the</strong> name Huy Duc, so<strong>on</strong> posted a message <strong>on</strong> a newly created homepage <strong>to</strong> say that he would s<strong>to</strong>p blogg<strong>in</strong>g <strong>to</strong> focus <strong>on</strong> pers<strong>on</strong>al matters. Theattack occurred <strong>on</strong> <strong>the</strong> same day as <strong>the</strong> trial and c<strong>on</strong>victi<strong>on</strong> of Tran KhaiThanh Thuy, a writer and edi<strong>to</strong>rial board member of <strong>the</strong> <strong>on</strong>l<strong>in</strong>e magaz<strong>in</strong>eTo Quoc. (Thuy was sentenced <strong>to</strong> three and a half years.) The e-mailaccounts of two o<strong>the</strong>r bloggers, Pham Thi Hoar and Huy Duc, were hackedat <strong>the</strong> same time, Human Rights Watch reported.Can governments like Burma and Vietnam really commandeer and coord<strong>in</strong>atesuch elaborate methods of silenc<strong>in</strong>g <strong>on</strong>l<strong>in</strong>e voices? It is difficult, if notimpossible, <strong>to</strong> trace <strong>the</strong> true orig<strong>in</strong>s of DDOS attacks, <strong>the</strong> targeted hack<strong>in</strong>gof websites, and even <strong>the</strong> f<strong>in</strong>al dest<strong>in</strong>ati<strong>on</strong> of secretly forwarded e-mails.Just as <strong>the</strong> Internet’s decentralized and <strong>in</strong>terc<strong>on</strong>nected systems allowjournalists <strong>the</strong> ability <strong>to</strong> speak an<strong>on</strong>ymously and preserve <strong>the</strong> an<strong>on</strong>ymityof sources, <strong>the</strong>y can also misdirect and shroud <strong>the</strong> locati<strong>on</strong> of malicious11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!