Personal Democracy Plus Our premium content network. LEARN MORE You are not logged in. LOG IN NOW >

First POST: Worries

BY Nick Judd | Tuesday, February 19 2013

The hapless new media

  • Jim VandeHei and Mike Allen: "Obama boasted Thursday during a Google+ Hangout from the White House: 'This is the most transparent administration in history.' The people who cover him day to day see it very differently."

The new old media

  • The New York Times is beating the drum for accusations that the Chinese military is behind attacks on American corporations and government agencies. The paper of record cites a report by security firm Mandiant that it describes as "unusually detailed" — because, presumably, it includes information gleaned by tracking the movements of intruders from within networks that had been compromised — which says that many such attacks originate from the same city block as the headquarters of a Chinese military unit. The report, by chief Washington correspondent David E. Sanger, China correspondent David Barboza, and technology reporter Nicole Perlroth, goes on to say that this link — between the Chinese military and so-called "cyberattacks" or even a new invention for the Times, "cyberwarriors," is entirely consistent with information from other sources inside the Beltway, such as reports from the intelligence community:

    As Mandiant mapped the Internet protocol addresses and other bits of digital evidence, it all led back to the edges of Pudong district of Shanghai, right around the Unit 61398 headquarters. The group’s report, along with 3,000 addresses and other indicators that can be used to identify the source of attacks, concludes “the totality of the evidence” leads to the conclusion that “A.P.T. 1 is Unit 61398.”

    Mandiant discovered that two sets of I.P. addresses used in the attacks were registered in the same neighborhood as Unit 61398’s building.

    “It’s where more than 90 percent of the attacks we followed come from,” said [Mandiant founder Kevin] Mandia.

    The only other possibility, the report concludes with a touch of sarcasm, is that “a secret, resourced organization full of mainland Chinese speakers with direct access to Shanghai-based telecommunications infrastructure is engaged in a multiyear enterprise-scale computer espionage campaign right outside of Unit 61398’s gates.”

    The story suggests that this engagement is "asymmetric" although it admits that the U.S., too, has "cyberwarriors."

    Crucially, the story concedes that these attacks generally begin thanks to carelessness or guilelessness — someone at a targeted organization opens the wrong email attachment or clicks the wrong link, triggering malicious code.

Around the web

News Briefs

RSS Feed thursday >

NYC Open Data Advocates Focus on Quality And Value Over Quantity

The New York City Department of Information Technology and Telecommunications plans to publish more than double the amount of datasets this year than it published to the portal last year, new Commissioner Anne Roest wrote last week in an annual report mandated by the city's open data law, with 135 datasets scheduled to be released this year, and almost 100 more to come in 2015. But as preparations are underway for City Council open data oversight hearings in the fall, what matters more to advocates than the absolute number of the datasets is their quality. GO

Civic Tech and Engagement: Announcing a New Series on What Makes it "Thick"

Announcing a new series of feature articles that we will be publishing over the next several months, thanks to the support of the Rita Allen Foundation. Our focus is on digitally-enabled civic engagement, and in particular, how and under what conditions "thick" digital civic engagement occurs. What we're after is answers to this question: When does a tech tool or platform enable actual people to make ongoing and significant contributions to each other, to a place or cause, at a scale that produces demonstrable change? GO

More