<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Inter Press ServiceCybercrimes Topics</title>
	<atom:link href="https://www.ipsnews.net/topics/cybercrimes/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ipsnews.net/topics/cybercrimes/</link>
	<description>News and Views from the Global South</description>
	<lastBuildDate>Fri, 17 Apr 2026 17:10:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
		<item>
		<title>World’s Nuclear Facilities Vulnerable to Cyber-Attacks</title>
		<link>https://www.ipsnews.net/2015/08/worlds-nuclear-facilities-vulnerable-to-cyber-attacks/</link>
		<comments>https://www.ipsnews.net/2015/08/worlds-nuclear-facilities-vulnerable-to-cyber-attacks/#comments</comments>
		<pubDate>Mon, 17 Aug 2015 18:13:19 +0000</pubDate>
		<dc:creator>Thalif Deen</dc:creator>
				<category><![CDATA[Armed Conflicts]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[cyber-attacks]]></category>
		<category><![CDATA[Cybercrimes]]></category>
		<category><![CDATA[International Atomic Energy Agency (IAEA)]]></category>
		<category><![CDATA[Islamic State (IS)]]></category>
		<category><![CDATA[Stockholm International Peace Research Institute (SIPRI)]]></category>
		<category><![CDATA[terrorist attacks]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=142016</guid>
		<description><![CDATA[As hackers continue to rampage through closely-guarded information systems and databases with monotonous regularity, there is a tempting new target for cyber-attacks: the world’s nuclear facilities. A warning has already been sounded by the International Atomic Energy Agency (IAEA), which has urged the world community to intensify efforts to protect nuclear facilities from possible attacks. [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="225" src="https://www.ipsnews.net/Library/2015/08/640px-Nuclear_Power_Plant_Cattenom-300x225.jpg" class="attachment-medium size-medium wp-post-image" alt="Nuclear power plant in Cattenom, France. The IAEA has reported cases of random malware-based attacks at nuclear plants. Credit: Stefan Kühn/cc by 2.0" decoding="async" fetchpriority="high" srcset="https://www.ipsnews.net/Library/2015/08/640px-Nuclear_Power_Plant_Cattenom-300x225.jpg 300w, https://www.ipsnews.net/Library/2015/08/640px-Nuclear_Power_Plant_Cattenom-629x472.jpg 629w, https://www.ipsnews.net/Library/2015/08/640px-Nuclear_Power_Plant_Cattenom-200x149.jpg 200w, https://www.ipsnews.net/Library/2015/08/640px-Nuclear_Power_Plant_Cattenom.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">Nuclear power plant in Cattenom, France. The IAEA has reported cases of random malware-based attacks at nuclear plants. Credit: Stefan Kühn/cc by 2.0</p></font></p><p>By Thalif Deen<br />UNITED NATIONS, Aug 17 2015 (IPS) </p><p>As hackers continue to rampage through closely-guarded information systems and databases with monotonous regularity, there is a tempting new target for cyber-attacks: the world’s nuclear facilities.<span id="more-142016"></span></p>
<p>A warning has already been sounded by the International Atomic Energy Agency (IAEA), which has urged the world community to intensify efforts to protect nuclear facilities from possible attacks.“We need to drain the swamp and stop developing technologies that are vulnerable to catastrophic attacks." -- Randy Rydell<br /><font size="1"></font></p>
<p>Pointing out the nuclear industry was not immune to such attacks, IAEA Director-General Yukiya Amano says there should be a serious attempt at protecting nuclear and radioactive material – since “reports of actual or attempted cyber-attacks are now virtually a daily occurrence.”</p>
<p>The United States, whose defence networks at the Pentagon and also its intelligence agencies have already been compromised by hackers largely from Russia and China, is increasingly concerned about possible cyber-attacks by terrorist organisations – specifically the Islamic State (IS) with its heavy and sophisticated presence on social media.</p>
<p>Ironically, the United States reportedly collaborated with Israel to launch a virus attack on Iran’s nuclear enrichment programme years ago.</p>
<p>Tariq Rauf, director of the Disarmament, Arms Control and Non-Proliferation Programme at the Stockholm International Peace Research Institute (SIPRI), told IPS nuclear power plants and the nuclear industry rely intensively on computer systems and computer codes.</p>
<p>“Any corruption, malware or targeted attacks potentially could have catastrophic consequences for nuclear safety and security,” he warned.</p>
<p>In this regard, he said, it is deplorable that Israel and the United States targeted Iran’s uranium enrichment programme in past years with malware and viruses, thus initiating unprovoked cyber warfare, he added.</p>
<p>Stuxnet, the computer virus introduced into the Iranian nuclear programme by these two countries, has now escaped into other programmes in other countries, said Rauf, the former head of IAEA’s Verification and Security Policy Coordination unit.</p>
<p>“This clearly demonstrates that cyber warfare agents cannot be contained, can spread uncontrollably and can potentially create many hazards for critical infrastructure in the nuclear field,” he said.</p>
<p>He said cyber warfare at the state level is much more dangerous and difficult to defend against than cyber-attacks by hackers, though the hacking of nuclear safety and security systems by amateurs or criminals also pose major risks for radioactive and nuclear materials.</p>
<p>Randy Rydell, a former senior political officer at the U.N’s Office of Disarmament Affairs (ODA), told IPS the real question here is not capabilities but motivation: “Why would someone wish to launch such an attack?”</p>
<p>The answer, he said, is political.</p>
<p>“We need to drain the swamp and stop developing technologies that are vulnerable to catastrophic attacks,” said Rydell, former senior counsellor and Report Director of the Weapons of Mass Destruction (WMD) Commission.</p>
<p>IAEA’s Amano pointed out that last year alone there were cases of random malware-based attacks at nuclear power plants, with such facilities being specifically targeted.</p>
<p>He said staff responsible for nuclear security should know how to repel cyber-attacks and to limit the damage, if systems are actually penetrated.</p>
<p>“The IAEA is doing what it can to help governments, organisations, and individuals adapt to evolving technology-driven threats from skilled cyber adversaries,” he added.</p>
<p>At the next IAEA ministerial conference, scheduled for December 2016, one of the topics for discussion should be how best to elaborate a Code of Conduct for Cyber Security for the Nuclear Industry.</p>
<p>Asked about the cyber capability of terrorist groups and their use of social media, Admiral Cecil Haney, commander U.S. Strategic Command, told reporters last March the Islamic State (IS) and various other organisations have been able to recruit and threaten – “and so we see more and more sophistication associated with that.”</p>
<p>“This is something that we look at very, very closely,” he said, pointing out that U.S. Cyber Command, as well as its interagency team, is working on this.</p>
<p>“And, quite frankly, it is looked at on a day-to-day basis,” he added.</p>
<p>In one of the major breaches of security, the U.S. Office of Personnel Management, which maintains security clearance for millions of federal employees, was one of the targets of hackers last year.</p>
<p>“The threat we face is ever-evolving,” Josh Earnest, the White House press secretary, told reporters last June. “We understand that there is persistent risk out there and we take it seriously,” he added.</p>
<p>But cyber-attacks are also increasingly a policy decision by governments in the United States, Western Europe, Russia and China, as a means of fighting back when attacked.</p>
<p>SIPRI’s Rauf said the IAEA is recognised as playing the central role in setting nuclear security standards for peaceful nuclear activities and has issued guidance documents in this regards for operators of nuclear facilities.</p>
<p>Addressing the IAEA International Conference on Computer Security in a Nuclear World, held in Vienna on June 1, Amano correctly drew attention to the risks and dangers of actual or attempted cyber-attacks against nuclear power plants and the nuclear industry, he noted.</p>
<p>Amano said that “computers play an essential role in all aspects of the management and safe and secure operation of nuclear facilities, including maintaining physical protection, and thus it is vitally important that all such systems are properly secured against malicious intrusions”.</p>
<p>In a statement released last month, the White House said that from the beginning of his current administration, President Barack Obama “has made it clear that cyber security is one of the most important challenges we face as a nation.”</p>
<p>In response, “the U.S. Government has implemented a wide range of policies, both domestic and international, to improve our cyber defences, enhance our response capabilities, and upgrade our incident management tools.”</p>
<p>As the cyber threat continues to increase in severity and sophistication, so does the pace of the Administration’s efforts, the White House noted.</p>
<p><em>Edited by Kitty Stapp</em></p>
<p><em>The writer can be contacted at thalifdeen@aol.com</em></p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/03/u-s-intelligence-sees-cyber-threats-eclipsing-terrorism/" >U.S. Intelligence Sees Cyber Threats Eclipsing Terrorism</a></li>
<li><a href="http://www.ipsnews.net/2012/10/saudi-insider-likely-key-to-aramco-cyber-attack/" >Saudi Insider Likely Key to Aramco Cyber-Attack</a></li>
<li><a href="http://www.ipsnews.net/2015/06/ctbto-the-nuclear-watchdog-that-never-sleeps/" >CTBTO, the Nuclear Watchdog That Never Sleeps</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2015/08/worlds-nuclear-facilities-vulnerable-to-cyber-attacks/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Cybercrime Treaty Could Be Used to Go After Cyberespionage</title>
		<link>https://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/</link>
		<comments>https://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/#respond</comments>
		<pubDate>Thu, 03 Oct 2013 13:48:19 +0000</pubDate>
		<dc:creator>Emilio Godoy</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Globalisation]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Latin America & the Caribbean]]></category>
		<category><![CDATA[Press Freedom]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Budapest Convention]]></category>
		<category><![CDATA[Convention on Cybercrime]]></category>
		<category><![CDATA[Council of Europe]]></category>
		<category><![CDATA[Cyber-espionage]]></category>
		<category><![CDATA[Cybercrime Convention Committee]]></category>
		<category><![CDATA[Cybercrimes]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Mexico]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[WikiLeaks]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=127912</guid>
		<description><![CDATA[Governments of countries that engage in large-scale electronic espionage, like the United States, and companies that develop spying software could theoretically face legal action for violating the Convention on Cybercrime. The Convention, adopted in Budapest in 2001 and in force since 2004, is the first international treaty seeking to address Internet and computer crime, and [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="225" src="https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small-300x225.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small-300x225.jpg 300w, https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small.jpg 629w, https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small-200x149.jpg 200w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">New technologies make it easier than ever for spy agencies to invade privacy. In the photo, students at the Campus Tecnológico in Guatemala. Credit: Danilo Valladares/IPS</p></font></p><p>By Emilio Godoy<br />MEXICO CITY, Oct 3 2013 (IPS) </p><p>Governments of countries that engage in large-scale electronic espionage, like the United States, and companies that develop spying software could theoretically face legal action for violating the Convention on Cybercrime.</p>
<p><span id="more-127912"></span>The Convention, adopted in Budapest in 2001 and in force since 2004, is the first international treaty seeking to address Internet and computer crime, and has a provision that aims to protect the right of privacy of data communication from unauthorised interception.</p>
<p>The treaty, also known as the <a href="http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&amp;CM=&amp;DF=&amp;CL=ENG" target="_blank">Budapest Convention</a>, requires member states to criminalise four kinds of conduct against confidentiality or the integrity and availability of computer systems or data: illegal access, illegal interception, data and system interference, and misuse of devices for the purpose of committing these offences.</p>
<p>These are precisely the practices engaged in by the U.S., British and other governments, according to <a href="https://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/" target="_blank">documents leaked</a> to the media in June by former U.S. <a href="https://www.ipsnews.net/topics/nsa/" target="_blank">National Security Agency</a> (NSA) contractor <a href="https://www.ipsnews.net/topics/edward-snowden/" target="_blank">Edward Snowden</a>.</p>
<p>Cyber surveillance “violates the Convention, and perpetrators can be sued” under the Cybercrime Convention Committee, Lorena Pichardo, a law school professor at the National Autonomous University of Mexico (UNAM), told IPS.</p>
<p>The Convention was adopted by the Council of Europe, which was set up to promote democracy and protect human rights and the rule of law in Europe. But the treaty has also been signed by non-member states, like Canada, the United States and Japan. The United States ratified it in 2006.</p>
<p>So far, 51 states have signed the Convention and 40 have ratified it.</p>
<p>It is possible to file a complaint with the Cybercrime Convention Committee, but any action taken is based on the national laws that its members must approve in order to live up to the Convention. Complainants can also turn to the European Court of Human Rights.</p>
<p>A complaint “can be successful, but it would be partial, because among the countries that are party to the Convention, there are interests at stake. The law can be bent and accommodated to national legislation,” Enoc Gutiérrez, a professor of information and communications technology (ICT) at the Autonomous University of the State of Mexico, told IPS.</p>
<p>In a <a href="http://www.uaemex.mx/Evento/2012/UAPCI/docs/mesa_de_trabajo/Ing_Enoc_Gutierrez_Pallares3.pdf" target="_blank">2012 study </a>that analysed Mexican, U.S. and EU laws, Gutiérrez and his colleagues Lucio Ordóñez and Víctor Saucedo argued the need for special legislation and a special court on computer crime.</p>
<p>The problem is that the Convention does not take into account that cybercrimes can include espionage by a state. The general impression is that when a government seeks cross-border access to computer data, it is doing so to investigate crimes and pursue criminals.</p>
<p>Article 32b of the Budapest Convention introduced an exception to the principle of territorial sovereignty:</p>
<p>“A Party may, without the authorisation of another Party [..] access or receive, through a computer system in its territory, stored computer data located in another Party, if the Party obtains the lawful and voluntary consent of the person who has the lawful authority to disclose the data to the Party through that computer system.”</p>
<p>The Cybercrimes Convention Committee held its <a href="http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/T-CY/TCY_Meetings/TCY_Meetings_2013_9.asp" target="_blank">ninth full session</a> Jun. 4-5 – one day before the Guardian and the Washington Post published the first leaks by Snowden. In the meeting, the Committee did not debate anything related to cyber espionage.</p>
<p>But in a<a href="http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/TCY2012/TCY_2012_3_transborder_rep_V31public_7Dec12.pdf" target="_blank"> recent report</a>, the Committee’s ad hoc sub-group on jurisdiction and transborder access to data said that new developments, such as cloud storage of data and the activities of law enforcement authorities, made it necessary to revise the reach of article 32b.</p>
<p>“Current practices regarding direct law enforcement access to data as well as access via Internet service providers and other private sector entities…illustrate that law enforcement authorities of many States access data stored on computers in other States in order to secure electronic evidence. Such practices frequently go beyond the limited possibilities foreseen in Article 32b and the Budapest Convention in general,” the sub-group says.</p>
<p>This poses risks to human rights, they warn.</p>
<p>“Personal data are increasingly stored by private entities, including cloud service providers. Access by law enforcement to, or the disclosure to law enforcement authorities of personal data stored in a foreign jurisdiction by such private sector entities may violate data protection regulations,” they add.</p>
<p>The NSA and other intelligence agencies use software that enables them to intercept private communications around the world.</p>
<p>Mexico, for example, acquired software from U.S. and European companies to monitor telephone calls, email, chats, Internet browsing histories and social networks.</p>
<p>Of the at least 95 corporations that develop and distribute this kind of software worldwide, 32 are in the U.S., 17 are British and the rest come from some two dozen other nations, according to confidential documents from intelligence contractors <a href="http://wikileaks.org/the-spyfiles.html" target="_blank">published by Wikileaks</a> in December 2011.</p>
<p>The list mentions 78 different products, including Trojan viruses, audio transmitters, audio and video recorders, and tracking tools.</p>
<p>“Any technology with such a huge potential for the violation of fundamental rights should be the focus of the highest level of legal protection, especially if it’s in the hands of private corporations that operate according to purely business objectives,” two officials from Spain’s Interior Ministry, Miguel Ángel Castellano and Pedro David Santamaría, wrote in a December 2012 article, <a href="http://catedraseguridad.usal.es/sites/default/files/Cuaderno_09_Control%20del%20Ciberespacio%20final.pdf" target="_blank">“El control del ciberespacio por parte de gobiernos y empresas”</a> (“Control of cyberspace by governments and companies”).</p>
<p>Pichardo, the law professor, said national legislation tends to take precedence in cases that invoke international principles.</p>
<p>“If we already have a charge of espionage, the serious problem of asking for data from other states is redundant,” she said.</p>
<p>Gutiérrez believes the existing international legal frameworks do not protect citizens, and specific laws are necessary. His studies focus on how to move from ICTs to technologies of learning and communication.</p>
<p>“When citizens are active in a social network like Facebook, by the simple act of accepting the terms of the contract they are saying their information can be shared with banks or government institutions,” he said. “They steal information from us and we don’t even realise it.”</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/09/when-mexico-let-big-brother-spy/" >When Mexico Let Big Brother Spy</a></li>
<li><a href="http://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/" >Breaking U.N. Protocol, Brazil Lambastes U.S. Spying</a></li>
<li><a href="http://www.ipsnews.net/2013/09/the-oil-is-ours-but-its-secrets-are-the-nsas/" >“The Oil Is Ours” – But Its Secrets Are the NSA’s</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>

</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber Bill Fails in U.S. Senate, but Online Privacy Concerns Live On</title>
		<link>https://www.ipsnews.net/2013/04/cyber-bill-fails-in-u-s-senate-but-online-privacy-concerns-live-on/</link>
		<comments>https://www.ipsnews.net/2013/04/cyber-bill-fails-in-u-s-senate-but-online-privacy-concerns-live-on/#respond</comments>
		<pubDate>Tue, 30 Apr 2013 13:32:34 +0000</pubDate>
		<dc:creator>Matthew Charles Cardinale</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[ACLU]]></category>
		<category><![CDATA[CISPA]]></category>
		<category><![CDATA[Cybercrimes]]></category>
		<category><![CDATA[Demand Progress]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[U.S. Congress]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=118392</guid>
		<description><![CDATA[For the second year in a row, activists have successfully defeated a proposal to allow Internet companies to provide customers’ private information to government agencies and each other without risking violation of privacy laws and agreements. The Cyber Intelligence Sharing and Protection Act (CISPA), HR 624, passed the U.S. House on Apr. 18 in a [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="225" src="https://www.ipsnews.net/Library/2013/04/computers-300x225.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/04/computers-300x225.jpg 300w, https://www.ipsnews.net/Library/2013/04/computers-629x472.jpg 629w, https://www.ipsnews.net/Library/2013/04/computers-200x149.jpg 200w, https://www.ipsnews.net/Library/2013/04/computers.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">Under CISPA, anybody whose computer became targeted by a virus - meaning most, if not all, computers - would be subject to having their information released. Credit: Danilo Valladares/IPS</p></font></p><p>By Matthew Charles Cardinale<br />ATLANTA, Georgia, Apr 30 2013 (IPS) </p><p>For the second year in a row, activists have successfully defeated a proposal to allow Internet companies to provide customers’ private information to government agencies and each other without risking violation of privacy laws and agreements.<span id="more-118392"></span></p>
<p>The Cyber Intelligence Sharing and Protection Act (CISPA), HR 624, passed the U.S. House on Apr. 18 in a 288-127 vote. Most Republicans and just under half of Democrats supported the measure."While the bill’s sponsors talk about China hacking in or a terrorist organisation taking down the grid, they’re writing legislation that’s much broader." -- ACLU's Michelle Richardson<br /><font size="1"></font></p>
<p>CISPA had been referred to the Senate Intelligence Committee, but the Senate was unable to support the House version and had yet to come up with its own proposal.</p>
<p>CISPA is not expected to resurface again as a single comprehensive bill on cybersecurity, but will likely be taken up as multiple pieces of legislation dealing with different aspects of cybersecurity.</p>
<p>President Barack Obama announced his opposition to, and threatened to veto, CISPA, both before the House Committee vote and again after it.</p>
<p>“The Administration still seeks additional improvements and if the bill, as currently crafted, were presented to the President, his senior advisors would recommend that he veto the bill,” the White House wrote in a <a href="http://www.whitehouse.gov/sites/default/files/omb/legislative/sap/113/saphr624r_20130416.pdf">policy statement </a>dated Apr. 16.</p>
<p>“Importantly, the Committee removed the broad national security exemption, which significantly weakened the restrictions on how this information could be used by the government,” the White House wrote.</p>
<p>According to the American Civil Liberties Union (ACLU), that is one of several improvements &#8211; although, in the group&#8217;s opinion, still inadequate &#8211; that were made to the bill in the House Permanent Select Committee on Intelligence.</p>
<p>As for the purposes for which the information could be released or used, “They had this catch-all, for national security purposes, that wasn’t defined. Based on how the government has defined national security in the past, with the Patriot Act, we thought that was a very big loophole, so they sort of struck that out altogether,” Michelle Richardson, legislative counsel for the ACLU, told IPS.</p>
<p>The White House echoed many of the same concerns raised by such advocacy groups as the ACLU, the Campaign for Liberty, Demand Progress, Democrats.com, a progressive organisation not affiliated with the Democratic Party, and the Electronic Frontier Foundation, as well as the Libertarian Party of the U.S.</p>
<p><a href="http://www.demandprogress.org/">Demand Progress</a> sent out a petition to its 1.5 million members and around 200,000 signed a petition opposing CISPA, co-founder David Segal told IPS. Demand Progress is a civil liberties advocacy group co-founded in 2010 by Segal and the late Aaron Swartz.</p>
<p>Swartz is an Internet activist who committed suicide in January 2013 after being threatened with federal prison time for releasing copywrite-protected academic journal articles from the website JSTOR to the public for free.</p>
<p>Demand Progress first began organising in 2010 around the Stop Online Piracy Act (SOPA) and Protect IP Act (PIPA), two other bills dealing with government regulation of online freedom that were defeated in January 2012.</p>
<p>However, Segal says there has been a crucial difference between the organising efforts around SOPA and PIPA, which had to do with the government’s ability to block certain websites, and CISPA, which has to do with the government’s ability to obtain private information.</p>
<p>“The opposition to SOPA was so severe, we haven&#8217;t had to worry for the last year. This one [CISPA], the military-industrial complex, corporations, including web platforms that were against SOPA, are for CISPA, explicitly or tacitly,” Segal said, referring to companies like Amazon.com and Google.</p>
<p>“Those platforms, for the most part, are not opposing CISPA, or are supporting it. It gives them greater immunity from users if they share users&#8217; information with the government,” he said.</p>
<p>The ACLU noted additional improvements were made to the bill in House committee, but still called it “scary&#8221;.</p>
<p>“They did say that the government does need to promulgate minimisation procedures, the idea that there would be an overarching set of rules to limit the sharing and use of personal data,” Richardson said.</p>
<p>“It’s also fixed to say as far as private is concerned, if you receive information from another company, you can only use it for cybersecurity purposes. They could have used it for marketing, or sold it to data-brokers,” she said.</p>
<p>Even with the changes, the CISPA proposal was “really scary because cybersecurity truly does affect us all. While the bill’s sponsors talk about China hacking in or a terrorist organisation taking down the grid, they’re writing legislation that’s much broader and encompassing bad acts on the Internet, phishing scams, and malware,” she said.</p>
<p>Anybody whose computer became targeted by a virus &#8211; meaning most, if not all, computers &#8211; would be subject to having their information released.</p>
<p>“I have started those Viagra [spam] emails, I keep getting through my work account. You could get a Nigerian Prince [scam] email. You’re on Facebook and there’s those viruses that say, ‘Oh my God, you have to watch these videos.’ All of these are everyday, just basic crimes, all of those things also implicated by this bill,” she said.</p>
<p>Richardson said that because the proposed law did not mandate that private companies turn over the information &#8211; and instead only provided legal protections for companies that would choose to voluntarily do so &#8211; the bill was an attempt to circumvent the Fourth Amendment to the constitution, which protects U.S. citizens from warrantless searches and seizures.</p>
<p>The ACLU further outlines their concerns regarding CISPA in a <a href="http://www.aclu.org/blog/national-security-technology-and-liberty/cispa-explainer-1-what-information-can-be-shared">series of blog posts</a>.</p>
<p>Segal also has raised concerns about the recent bombing in Boston, Massachusetts, being used by some as a backdrop to rush CISPA through Congress with little or no public debate.</p>
<p>“Some number of people who supported the legislation were invoking the bombings. It was up for a vote anyway, it was pre-scheduled. Some people were swayed to vote for it, because of the atmospherics of the bombing and they were called by other people in Congress,” Segal said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/03/u-s-intelligence-sees-cyber-threats-eclipsing-terrorism/" >U.S. Intelligence Sees Cyber Threats Eclipsing Terrorism</a></li>
<li><a href="http://www.ipsnews.net/2012/05/journalists-and-netizens-in-govt-crosshairs/" >Journalists and Netizens in Govt Crosshairs</a></li>
<li><a href="http://www.ipsnews.net/2012/01/websites-black-out-over-sopa-censorship/" >Websites Black Out over “SOPA Censorship”</a></li>

</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/04/cyber-bill-fails-in-u-s-senate-but-online-privacy-concerns-live-on/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.S. Intelligence Sees Cyber Threats Eclipsing Terrorism</title>
		<link>https://www.ipsnews.net/2013/03/u-s-intelligence-sees-cyber-threats-eclipsing-terrorism/</link>
		<comments>https://www.ipsnews.net/2013/03/u-s-intelligence-sees-cyber-threats-eclipsing-terrorism/#respond</comments>
		<pubDate>Tue, 12 Mar 2013 20:44:44 +0000</pubDate>
		<dc:creator>Jim Lobe</dc:creator>
				<category><![CDATA[Arabs Rise for Rights]]></category>
		<category><![CDATA[Economy & Trade]]></category>
		<category><![CDATA[Financial Crisis]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Peace]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Cybercrimes]]></category>
		<category><![CDATA[James Clapper]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=117114</guid>
		<description><![CDATA[Cyber threats appear to have largely replaced terrorism as posing the greatest risks to U.S. national security, which also confronts major longer-term challenges from the effects of natural resource shortages and climate change, according to the latest in a series of annual threat assessments by the U.S. intelligence community. The report, delivered Tuesday in testimony [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Jim Lobe<br />WASHINGTON, Mar 12 2013 (IPS) </p><p>Cyber threats appear to have largely replaced terrorism as posing the greatest risks to U.S. national security, which also confronts major longer-term challenges from the effects of natural resource shortages and climate change, according to the latest in a series of annual threat assessments by the U.S. intelligence community.<span id="more-117114"></span></p>
<p>The report, delivered Tuesday in testimony by the Director of National Intelligence (DNI), James Clapper, also cited economic threats to U.S. security, including the possible impact of the ongoing Eurozone crisis on social stability and defence budgets in Europe and Washington’s failure to resolve its fiscal deficits as most recently manifested by the so-called sequester – the indiscriminate, across-the-board cuts in all discretionary spending that took effect Mar. 1.</p>
<p>“Let me now be blunt for you and the American people,” Clapper told the Senate panel. “Sequestration forces the intelligence community to reduce all intelligence activities and functions, without regard to impact on our mission.”</p>
<p>The intelligence community (IC) faces a roughly seven percent cut in its roughly 72-billion-dollar budget. The IC’s budget reached an all-time high of 80 billion dollars last year.</p>
<p>On other issues, the “Worldwide Threat Assessment of the U.S. Intelligence Community”, as the report is called, noted that the so-called “Arab Spring” had “unleashed destabilizing ethnic and sectarian rivalries” across the Middle East and that new governments there faced major challenges in controlling “ungoverned spaces” and overcoming economic hardship.</p>
<p>North Korea’s nuclear weapons and missile programmes pose a “serious threat” to the U.S. and to East Asian security, according to Clapper, although its leaders were focused primarily on “deterrence and defense”.</p>
<p>He also reiterated the intelligence community’s six-year-old position that, while Iran is steadily building its capacity to develop a missile-deliverable nuclear weapon, it has not yet decided to build one.</p>
<p>“We assess Iran is developing nuclear capabilities to enhance its security, prestige, and regional influence and give it the ability to develop nuclear weapons, should a decision be made to do so. We do not know if Iran will eventually decide to build nuclear weapons,” he said, adding that the intelligence community was confident it would discover any attempt by Iran to divert its enriched uranium stockpiles to a weapons programme.</p>
<p>The report also cited threats in specific global regions, highlighting more than two dozen countries in South and East Asia, sub-Saharan Africa, the former Soviet Union, Latin America, and Europe, as well as the Middle East and North Africa.</p>
<p>The annual threat assessment report represents the consensus view of the 17 agencies that make up the IC, including the Central Intelligence Agency (CIA), the State Department’s Bureau of Intelligence and Research, the Federal Bureau of Investigation (FBI), as well as number of agencies that fall under the Pentagon’s jurisdiction.</p>
<p>While the report does not explicitly prioritise threats, the fact that he opened this year’s testimony with an extensive discussion of “Cyber” – in contrast to “Terrorism” that has led the litany of threats featured in the DNI’s testimony over the last decade – was seen by analysts here as both remarkable and significant.</p>
<p>“We are in a major transformation because our critical infrastructure, economy, personal lives, and even basic understanding of – and interaction with – the world are becoming more intertwined with digital technologies and the Internet,” he said.</p>
<p>“In some cases the world is applying digital technologies faster than our ability to understand the security implications and mitigate potential risks.”</p>
<p>The IC was particularly concerned with “cyber attacks” – defined as a “non-kinetic offensive operation intended to create physical effects or manipulate disrupt, or delete data” – and “cyber espionage”.</p>
<p>While he said there is only a “remote chance” of a major cyber attack against U.S. critical infrastructure systems that could, for example, cause a regional power outage during the next two years and that the most advanced cyber actors “such as Russia and China” are unlikely to launch one outside an actual military conflict, isolated state or non-state actors could deploy less-sophisticated attacks against poorly protected U.S. networks.</p>
<p>It noted, in particular, an attack last August against the Saudi oil company ARAMCO – widely believed to have been launched by Iran – that effectively destroyed 30,000 computers, as well as a denial-of-service campaign against websites of several U.S. banks and stock exchanges.</p>
<p>It also cited cyber actors targeting classified networks to gain sensitive information, especially about U.S. weapons systems, “almost certainly allowing our adversaries to close the technological gap between our respective militaries, slowly neutralizing one of our key advantages in the international arena.”</p>
<p>While Clapper did not explicitly accuse China of such activity, his testimony came the day after President Barack Obama’s national security adviser, Tom Donilon, charged Beijing with carrying out such activities and noted that the issue “has become a key point of concern and discussion with China at all levels of our government&#8221;.</p>
<p>On terrorism, Clapper said violent Islamist movements have become increasingly decentralised, but that “the Arab Spring has generated a spoke in threats to U.S. interests in the region that likely will endure until political upheaval stabilizes and security forces regain their capabilities.”</p>
<p>The Pakistan-based core Al-Qaeda, he said, has continued to suffer losses over the past year and is now “probably unable to carry out complex, large-scale attacks in the West.”</p>
<p>At the same time, however, he stressed that the rise of transitional governments in Egypt, Tunisia, Yemen, and Libya, as well as the unrest in Syria and Mali, have “offered opportunities for established (Al-Qaeda) affiliates, aspiring groups, and like-minded individuals to conduct attacks against U.S. interests,” such as the one that killed the U.S. ambassador to Libya in Benghazi last September.</p>
<p>He also cited Nigeria’s Boko Haram, and Pakistan’s Lashkar-e-Tayibba (LT); the latter, he said, has the “long-term potential to evolve into a permanent and even HAMAS/Hizballah-like presence in Pakistan.”</p>
<p>As for Iran and Hezbollah itself, Clapper noted they prefer to avoid confrontation with the U.S. despite what he alleged to be an increased level of terrorist activity on both their parts.</p>
<p>On climate change and natural resources, the report stressed that competition and scarcity “are growing security threats” and that “(e)xtreme weather events (floods, droughts, heat waves) will increasingly disrupt food and energy markets, exacerbating state weakness, forcing human migrations, and triggering riots, civil disobedience, and vandalism.”</p>
<p>Disruptions in food supplies caused by, among other things, extreme weather conditions, competition for land between a number of actors, including wealthy foreign countries that are buying up land in poor countries, and population growth, are likely to lead to political violence and insurgencies. Much the same applies to reductions in freshwater supplies.</p>
<p>In an interview with the Boston Globe this weekend, the head of the U.S. Pacific Command (PACOM), Adm. Samuel Locklear, told the Boston Globe that the impact of global warming on affected populations is “probably the most likely thing that is going to happen …that will cripple the security environment, probably more likely than the other scenarios we all often talk about.”</p>
<p>He said PACOM was engaging the militaries of other regional countries, including China and India, about possible co-operation in dealing with the impact in the Asia-Pacific.</p>
<p>“If it goes bad, you could have hundreds of thousands or millions of people displaced and then security will start to crumble pretty quickly,” he told the Globe.</p>
<p>*Jim Lobe&#8217;s blog on U.S. foreign policy can be read at <a href="http://www.lobelog.com">http://www.lobelog.com</a>.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/03/u-s-rebalancing-to-asiapacific-still-a-priority/" >U.S. “Rebalancing” to Asia/Pacific Still a Priority</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/03/u-s-intelligence-sees-cyber-threats-eclipsing-terrorism/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Saudi Insider Likely Key to Aramco Cyber-Attack</title>
		<link>https://www.ipsnews.net/2012/10/saudi-insider-likely-key-to-aramco-cyber-attack/</link>
		<comments>https://www.ipsnews.net/2012/10/saudi-insider-likely-key-to-aramco-cyber-attack/#comments</comments>
		<pubDate>Fri, 19 Oct 2012 00:30:22 +0000</pubDate>
		<dc:creator>Richard Sale</dc:creator>
				<category><![CDATA[Asia-Pacific]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Middle East & North Africa]]></category>
		<category><![CDATA[Nuclear Energy - Nuclear Weapons]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Cybercrimes]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Saudi Arabia]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=113527</guid>
		<description><![CDATA[Last weekend’s disclosure that Iranian cyber warriors had disabled some 30,000 computers owned by the Saudi oil giant Aramco is attracting considerable attention here, particularly in light of a warning last week by Pentagon chief Leon Panetta that Washington could face a “cyber-Pearl Harbor&#8221;. The alleged Iranian hand behind the attack, first reported Saturday by [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Richard Sale<br />WASHINGTON, Oct 19 2012 (IPS) </p><p>Last weekend’s disclosure that Iranian cyber warriors had disabled some 30,000 computers owned by the Saudi oil giant Aramco is attracting considerable attention here, particularly in light of a warning last week by Pentagon chief Leon Panetta that Washington could face a “cyber-Pearl Harbor&#8221;.<span id="more-113527"></span></p>
<p>The alleged Iranian hand behind the attack, first reported Saturday by the Wall Street Journal, was described as one of several forays by the increasingly sophisticated “Iran’s Cyber Army” whose existence first surfaced in 2009, according to experts here.</p>
<p>One key element of the Aramco attack, however, has not yet been reported. Two former senior CIA officials told IPS that it appears to have been carried out with the help of personnel inside Aramco. They said that the Saudi regime has been detaining and questioning staff with access to the affected work stations.</p>
<p>The fact that the work stations were not connected to the Internet lends credence to reports that the attack was facilitated by a Saudi Aramco employee.</p>
<p>“The attackers knew what they were doing, and it is clear they had inside knowledge. They had people inside that could move about,” according to one of the sources who asked not to be named.</p>
<p>Both said that one or more operators were involved.</p>
<p>Saudi Aramco has hired at least six firms with expertise in computer hacking, as well as outside experts, to repair the computers and to try and identify the perpetrators, according to the former CIA officials.</p>
<p>The virus is being called “Shamoon” after a word in its code, according to New York Times technology blogger Nicole Perlroth, who wrote in late August that key data on three-quarters of the company’s office computers were overwritten and replaced with the image of a burning U.S. flag, an account confirmed by U.S. officials here.</p>
<p>U.S. intelligence sources stressed that the damage was limited to those computers. Software used for the company’s massive technical operations, including pumping operations, remained untouched.</p>
<p>The attack is believed to have been fueled in part by sectarian, as well as political differences.</p>
<p>Richard Stiennon at IT-Harvest, a company that tracks evolving cyber threats, told IPS in an interview that Iranian-trained hackers probably launched the attack “in deep wrath” at the long-time mistreatment of the Shiites in Saudi Arabia’s Eastern province where most of Aramco’s operations are based.</p>
<p>Unrest among the Shia Muslims in the region has increased sharply since Riyadh sent troops into Bahrain 18 months ago as part of a crackdown by that sheikhdom’s Sunni monarchy against the Shiite majority and other opposition forces.</p>
<p>Syria’s civil war – which pits the Iranian-backed Alawite-led government of President Bashar Al-Assad against a mainly Sunni insurgency supported by Saudi Arabia, Qatar and Turkey – has also stoked sectarian tensions around the region. An offshoot of Shi’a Islam, Alawites are considered heretics by conservative Sunnis who dominate the Saudi kingdom.</p>
<p>Saudi Arabia also provided support to Sunni tribes in Iraq after a predominantly Shi’ite government took power there following the 2003 U.S. invasion.</p>
<p>The attack on Aramco, as well as an August attack against a Qatari natural gas company &#8211; now being attributed to Iran &#8211; are also seen as retaliation for the Stuxnet virus that was reportedly developed jointly by the U.S. and Israel as part of a larger effort designed to disrupt Iran’s nuclear programme. Stuxnet destroyed up to 1,000 centrifuges at the Natanz enrichment facility.</p>
<p>Recent cyber-attacks on major U.S. bank websites have also been blamed on Iran, whose economy has been sent into a tailspin in major part due to the effectiveness of far-reaching U.S. and European economic sanctions that are also designed to curb Iran’s nuclear programme.</p>
<p>A small group of hackers, numbering about 100 operatives and calling themselves “The Cutting Sword of Justice&#8221;, claimed responsibility for the attack. Reports of similar attacks on other oil and gas firms in the Middle East, including in neighbouring Qatar, suggest that Iran is positioning itself as a regional cyber power.</p>
<p>Iran’s Cyber Army (ICA) began as a group within the Iranian military, according to Paulo Shakarian, an expert at the West Point Military Academy and co-author with Andrew Ruef of a book called “Introduction to Cyber Warfare: A Multidisciplinary Approach”. Shakarian said the ICA uses equipment and tactics far less potent than more advanced cyber powers, including the U.S., Israel, Russia and China, but the group is fast learning more effective tactics.</p>
<p>If the alleged Iranian hackers used one or more insiders to launch the Shamoon virus, they might have been inspired by perhaps their most determined enemies.</p>
<p>The Stuxnet virus that damaged Iran’s nuclear programme was allegedly implanted by an Israeli proxy &#8211; an Iranian, who used a corrupt “memory stick.32&#8243;, former and serving U.S. intelligence officials said. They said using a person on the ground would greatly increase the probability of computer infection, as opposed to passively waiting for the software to spread through the computer facility.</p>
<p>“Iranian double agents&#8221; would have helped to target the most vulnerable spots in the system, one source said.</p>
<p>According to James Lewis, a cyber expert at the Center for International and Strategic Studies (CSIS), here, “The memory stick is the perfect tool. It can be left behind in a men’s room or left in a parking lot, and someone will at last plug it in and set the virus running. It’s human nature.”</p>
<p>“It’s basically a kind of low-grade cyber war,” said Vincent Cannistraro, former head of the CIA’s Counter-Terrorism office.</p>
<p>Israel has allegedly used cruder methods than Stuxnet to attack Iran’s nuclear programme, including the assassination of several scientists associated with it.</p>
<p>A senior State Department official said last month that such attacks were considered “terrorism” by Washington, which denounced the killing last January of a deputy director of the Natanz facility in unusually vehement terms. The same official insisted that the U.S. had no information as to who was behind the assassination, however.</p>
<p>Former and senior U.S. intelligence officials believe Israel has used recruits from the Mujahedeen-e-Khalq (MEK) for the assassinations.</p>
<p>“The MEK is being used as the assassination arm of Israel’s Mossad intelligence service,” said Cannistraro. He said the MEK is in charge of executing “the motorcycle attacks on Iranian targets chosen by Israel. They go to Israel for training, and Israel pays them.”</p>
<p>In his remarks last week, Panetta did charge Iran with responsibility for the attacks on Aramco, but he described them as “probably the most destructive attack that the private sector has seen to date.”</p>
<p>After the existence of Stuxnet was disclosed in June 2010, many international legal and exports noted that it would likely set an unfortunate precedent that could blow back against its creators.</p>
<p>*Richard Sale is author of the 2009 book, ‘Clinton’s Secret Wars: The Evolution of a Commander in Chief”.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2012/10/obama-aides-launch-preemptive-attack-on-new-iran-plan/ " >Obama Aides Launch Preemptive Attack on New Iran Plan </a></li>
<li><a href="http://www.ipsnews.net/2012/10/syria-stands-between-egypt-and-iran/ " >Syria Stands Between Egypt and Iran </a></li>
<li><a href="http://www.ipsnews.net/2012/10/anti-iran-hawks-maintain-p-r-offensive/ " >Anti-Iran Hawks Maintain P.R. Offensive </a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2012/10/saudi-insider-likely-key-to-aramco-cyber-attack/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Filipino Netizens Reject Cybercrime Act</title>
		<link>https://www.ipsnews.net/2012/09/filipino-netizens-reject-cybercrime-act/</link>
		<comments>https://www.ipsnews.net/2012/09/filipino-netizens-reject-cybercrime-act/#comments</comments>
		<pubDate>Sat, 29 Sep 2012 07:40:32 +0000</pubDate>
		<dc:creator>Kara Santos</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Asia-Pacific]]></category>
		<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Press Freedom]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Cybercrimes]]></category>
		<category><![CDATA[Freedom of Expression]]></category>
		<category><![CDATA[Libel]]></category>
		<category><![CDATA[Netizens]]></category>
		<category><![CDATA[Philippines]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=112962</guid>
		<description><![CDATA[A newly enacted cybercrime law in the Philippines has raised fears that not only online media but also ordinary netizens could be persecuted for exercising their freedom of expression. Media groups have expressed concern that the law poses a threat to press freedom and limits freedom of expression in the country. Bloggers and social media [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="199" src="https://www.ipsnews.net/Library/2012/09/facebook-page-300x199.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2012/09/facebook-page-300x199.jpg 300w, https://www.ipsnews.net/Library/2012/09/facebook-page-629x418.jpg 629w, https://www.ipsnews.net/Library/2012/09/facebook-page.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">Ordinary netizens – from bloggers to Facebook users – could be persecuted under the Philippines’ new Cybercrime Prevention Act. Credit: Kara Santos/IPS</p></font></p><p>By Kara Santos<br />MANILA, Sep 29 2012 (IPS) </p><p>A newly enacted cybercrime law in the Philippines has raised fears that not only online media but also ordinary netizens could be persecuted for exercising their freedom of expression.</p>
<p><span id="more-112962"></span>Media groups have expressed concern that the law poses a threat to press freedom and limits freedom of expression in the country. Bloggers and social media practitioners also point out that the new law allows the government to shut down websites without due process, and makes Internet users liable for simply clicking the ‘<a href="http://developers.facebook.com/docs/reference/plugins/like/">like</a>’ button on Facebook or <a href="https://support.twitter.com/articles/77606-what-is-retweet-rt">re-tweeting</a> something on Twitter.</p>
<p>Republic Act (RA) No. 10175, also known as the <a href="http://www.gov.ph/2012/09/12/republic-act-no-10175/">Cybercrime Prevention Act of 2012</a>, was signed into law by Philippine President Benigno Aquino III on Sept. 12. Actions now punishable as ‘cybercrimes’ include illegal access and interception of any part of a computer system without right, computer-related identity-theft, cybersex and child pornography, among others.</p>
<p>However, the law also broadens the coverage of libel as a content-related offense that can be committed by just about anybody using a computer.</p>
<p>Section 4 (4) of the Cybercrime Act deems as illegal any “unlawful and prohibited act of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future”.</p>
<p>Libel is defined in Article 353 of the Revised Penal Code (RPC) as a “public imputation and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstances tending to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead.”</p>
<p>Professor Luis Teodoro, who serves as deputy director of the Centre for Media Freedom and Responsibility (CMFR), says the new law actually strengthens an 82-year-old libel law that has been <a href="http://www.mediadefence.org/sites/default/files/uploads/Comm%201815%202008_lo%20res.pdf">described</a> by the United Nations Human Rights Council as “draconian” and “excessive&#8221;.</p>
<p>“At a time when the global <a href="http://www.theafricareport.com/20120509501811034/columns/the-internet-in-the-21st-century-part-1.html">trend</a> is to decriminalise libel, the new cybercrime law is very regressive and takes us several steps backward,” Teodoro told IPS.</p>
<p>“In the age of new media, where ordinary citizens take to Facebook and Twitter as a venue for free expression, here is this absolutely objectionable law that gives agencies so much power to limit free speech,” he said.</p>
<p>He added that certain provisions of the law empower government agencies to take down or prevent people from seeing Tweets that have been deemed libelous, or even monitor activity on cyberspace, including private Facebook accounts.</p>
<p>The National Union of Journalists in the Philippines (NUJP) <a href="http://www.nujp.org/2012/09/cybercrime-law-threatens-freedom-of-expression/">said</a> that the enactment of the Cybercrime Prevention Act of 2012 betrayed Aquino’s commitment to transparency and freedom of expression.</p>
<p>In an interview with IPS, Secretary General of the NUJP, Rowena Paraan, called the law “sneaky”.</p>
<p>“Certain provisions in the law were not part of versions approved by the Senate and just suddenly appeared in the version that the president signed. These were not subject to consultations,” Paraan told IPS.</p>
<p>Many Filipinos are disturbed by the fact that the man allegedly responsible for this last-minute change, which lumps online libel with cybersex and child pornography, is notorious for plagiarising blogs, and recently elicited a spate of criticism from active netizens.</p>
<p>Citing Senate journals and interviews, investigative journalist and <a href="http://www.raissarobles.com">blogger</a> Raissa Robles claims that Senator Vicente Sotto III <a href="http://raissarobles.com/2012/09/18/who-inserted-that-libel-clause-in-the-cybercrime-law-at-the-last-minute/">pushed for the insertion into the law</a> at the eleventh hour; an ironic twist, given various allegations that he copied parts of blog articles in previous speeches without crediting the bloggers.</p>
<p>Robles goes on to list some of the flaws in the law, including the difficulty of identifying the origin of libelous material, and extending the offending parties to those who “share” or “like” a post on Facebook or comment on articles agreeing with alleged libelous material.</p>
<p>“Historically, in the Philippines, it is the rich and the powerful who use libel as a weapon to suppress criticisms about them,” she added.</p>
<p>“Before the Internet came along, it was easier for the rich and the powerful to control criticisms. All they needed to do was buy a stake in newspapers, TV and radio. Or sue them. Now they have realised that the Web is beyond their control,” she wrote in a <a href="http://raissarobles.com/2012/09/18/who-inserted-that-libel-clause-in-the-cybercrime-law-at-the-last-minute/" target="_blank">blogpost</a>.</p>
<p>According to NUJP’s Paraan, anyone who uses the internet to express their opinions is now liable for what they post. Online statements posted on blogs and social media platforms such as Facebook and Twitter, that can be interpreted as an attack on the reputation of an individual or an entity, may give rise to libel suits.</p>
<p>Human Rights Watch (HRW) released a <a href="http://www.hrw.org/news/2012/09/28/philippines-new-cybercrime-law-will-harm-free-speech">statement</a> Friday criticising the law, which, they say, “drastically increases punishments for criminal libel and gives authorities excessive and unchecked powers to shut down websites and monitor online information”.</p>
<p>“The cybercrime law needs to be repealed or replaced,” said Brad Adams, Asia director for HRW. “It violates Filipinos’ rights to free expression and it is wholly incompatible with the Philippine government’s obligations under international law.”</p>
<p>Various civil society groups have resorted to legal measures to stop government agencies from implementing provisions in the law.</p>
<p>“I’m quite happy that a lot of different groups have been questioning the threat to the rights of freedom of speech and due process and different provisions in the law,” Paraan told IPS, citing various civil society and blogger-led initiatives.</p>
<p>At the time of writing, at least <a href="http://www.gmanetwork.com/news/story/276009/scitech/technology/fifth-petition-vs-cybercrime-act-filed-this-week">five separate petitions</a> have been filed with the Supreme Court, questioning the law’s constitutionality.</p>
<p>On Sept. 27 several bloggers and technology law experts hosted an <a href="http://www.youtube.com/watch?v=joN6JjPxglQ&amp;feature=player_embedded#!">online roundtable discussion</a> on the Act using Google+ Hangouts. Netizens were able to view the live webcast via YouTube and send questions to speakers and lawyers through live chat and by using the <a href="https://twitter.com/i/#!/search/?q=%23cybercrimelaw&amp;src=typd">#cybercrimelaw</a> hashtag on Twitter.</p>
<p>(END)</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2012/05/journalism-is-not-lsquomore-funrsquo-in-the-philippines/" >Journalism is Not ‘More Fun’ in the Philippines</a></li>
<li><a href="http://www.ipsnews.net/2008/12/media-philippines-journo-killings-threaten-press-freedom/" >MEDIA-PHILIPPINES: Journo Killings Threaten Press Freedom</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2012/09/filipino-netizens-reject-cybercrime-act/feed/</wfw:commentRss>
		<slash:comments>68</slash:comments>
		</item>
	</channel>
</rss>
