WEB INVENTOR, TIM BERNERS-LEE RAISES HIGHBROW ON CYBER-SECURITY

Reading Time: 4 minutes

[Web]–The computer scientist who wrote the blueprint for what would become the World Wide Web 28 years ago today is alarmed at what has happened to it in the past years.

“Over the past 12 months, I’ve become increasingly worried about three new trends, which I believe we must tackle in order for the web to fulfill its true potential as a tool which serves all of humanity,” he said in a statement issued from London.

He cited compromised personal data; fake news that he says has “spread like wildfire”; and the lack of regulation in political advertising, which he says threatens democracy.

“Even in countries where we believe governments have citizens’ best interests at heart, watching everyone, all the time is simply going too far,” he said, in an allusion to WikiLeaks’ disclosure of what documents claim is a vast CIA surveillance operation. “It creates a chilling effect on free speech and stops the web from being used as a space to explore important topics, like sensitive health issues, sexuality or religion.”

Berners-Lee founded Web Foundation in 2009 to improve the web as part of a five-year plan.

When Berners-Lee submitted his original proposal for the Web, he imagined it as an open platform that would allow everyone, everywhere to share information, access opportunities and collaborate across geographic and cultural boundaries.

But his faith, and those of privacy advocates and cyber security experts, has been badly shaken by a series of high-profile hacks and the dissemination of fake news through the use of data science and armies of bots.

Berners-Lee is just the latest high-profile technologist to share concerns over what former Cisco Systems executive Monique Morrow calls a fundamental assault on privacy and cybersecurity, with critical infrastructure – banking systems, the grid – hanging in the balance. “How do we use technology responsibly?” she asked at a SXSW talk in Austin Saturday.

The scourge of fake news, a topic of several panels here, has prompted plenty of tech types to brainstorm on solutions. One idea is to apply a simple rating system to stories based on their news value and accuracy, says Amar Lalvani, CEO of hotel chain Standard International. “We could apply the same model to stories as we do to travel sites,” he said here Sunday.

Proliferation of cyber weapons pose a significantly greater threat -especially smartphones in the hands of unwitting consumers, and eavesdropping TVs in their living rooms – because they spread at a faster rate than physical weapons, says Phil Reitinger, CEO of the Global Cyber Alliance and a former director of the National Cybersecurity Center.

“It’s already happening,” says Sean Smith, a professor of computer science at Dartmouth College and author of The Internet of Risky Things. He says many of the same security vulnerabilities exploited in phones, TVs and computers outlined by WikiLeaks apply to IoT devices.

“If the CIA is working on breaking into phones like other hackers, you can bet it’s working on other devices, just like hackers,” Smith says, pointing to malware that was wormed its way into some medical devices at major healthcare providers across the globe. The security breach put tens of thousands of patient records at risk, says TrapX Security.

The same flaws can apply to cars, as proved by a Wired report on how hackers remotely hijacked a Jeep Cherokee’s digital system over the Internet and disabled its brakes at low speeds in 2015, Smith says.

“What WikiLeaks said is Shakespearean when you think about it: It’s much ado about nothing,” says Vince Steckler, CEO of computer-security firm, Avast Software.

“What was revealed has been an open secret for years in the security community. If anything, (the disclosure) informs the general public how exposed infrastructure really is. And that might be a good thing.”




Copyright 2017 The Page. Permission to use quotations from this article is granted subject to appropriate credit being given to www.thepageng.com as the source.

Comments

comments

Leave a Reply

Your email address will not be published. Required fields are marked *