Don’t click that link! How criminals access your digital devices and what happens when they do



File 20190207 174851 1lwq94r.jpg?ixlib=rb 1.1
A link is a mechanism for data to be delivered to your device.
Unsplash/Marvin Tolentino

Richard Matthews, University of Adelaide and Kieren Niĉolas Lovell, Tallinn University of Technology

Every day, often multiple times a day, you are invited to click on links sent to you by brands, politicians, friends and strangers. You download apps on your devices. Maybe you use QR codes.

Most of these activities are secure because they come from sources that can be trusted. But sometimes criminals impersonate trustworthy sources to get you to click on a link (or download an app) that contains malware.

At its core, a link is just a mechanism for data to be delivered to your device. Code can be built into a website which redirects you to another site and downloads malware to your device en route to your actual destination.

When you click on unverified links or download suspicious apps you increase the risk of exposure to malware. Here’s what could happen if you do – and how you can minimise your risk.




Read more:
How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it


What is malware?

Malware is defined as malicious code that:

will have adverse impact on the confidentiality, integrity, or availability of an information system.

In the past, malware described malicious code that took the form of viruses, worms or Trojan horses.

Viruses embedded themselves in genuine programs and relied on these programs to propagate. Worms were generally stand alone programs that could install themselves using a network, USB or email program to infect other computers.

Trojan horses took their name from the gift to the Greeks during the Trojan war in Homer’s Odyssey. Much like the wooden horse, a Trojan Horse looks like a normal file until some predetermined action causes the code to execute.

Today’s generation of attacker tools are far more sophisticated, and are often a blend of these techniques.

These so-called “blended attacks” rely heavily on social engineering – the ability to manipulate someone to doing something they wouldn’t normally do – and are often categorised by what they ultimately will do to your systems.

What does malware do?

Today’s malware comes in easy to use, customised toolkits distributed on the dark web or by well meaning security researchers attempting to fix problems.

With a click of a button, attackers can use these toolkits to send phishing emails and spam SMS messages to eploy various types of malware. Here are some of them.

https://datawrapper.dwcdn.net/QDA3R/2/

  • a remote administration tool (RAT) can be used to access a computer’s camera, microphone and install other types of malware

  • keyloggers can be used to monitor for passwords, credit card details and email addresses

  • ransomware is used to encrypt private files and then demand payment in return for the password

  • botnets are used for distributed denial of service (DDoS) attacks and other illegal activities. DDoS attacks can flood a website with so much virtual traffic that it shuts down, much like a shop being filled with so many customers you are unable to move.

  • crytptominers will use your computer hardware to mine cryptocurrency, which will slow your computer down

  • hijacking or defacement attacks are used to deface a site or embarrass you by posting pornographic material to your social media

An example of a defacement attack on The Utah Office of Tourism Industry from 2017.
Wordfence



Read more:
Everyone falls for fake emails: lessons from cybersecurity summer school


How does malware end up on your device?

According to insurance claim data of businesses based in the UK, over 66% of cyber incidents are caused by employee error. Although the data attributes only 3% of these attacks to social engineering, our experience suggests the majority of these attacks would have started this way.

For example, by employees not following dedicated IT and information security policies, not being informed of how much of their digital footprint has been exposed online, or simply being taken advantage of. Merely posting what you are having for dinner on social media can open you up to attack from a well trained social engineer.

QR codes are equally as risky if users open the link the QR codes point to without first validating where it was heading, as indicated by this 2012 study.

Even opening an image in a web browser and running a mouse over it can lead to malware being installed. This is quite a useful delivery tool considering the advertising material you see on popular websites.

Fake apps have also been discovered on both the Apple and Google Play stores. Many of these attempt to steal login credentials by mimicking well known banking applications.

Sometimes malware is placed on your device by someone who wants to track you. In 2010, the Lower Merion School District settled two lawsuits brought against them for violating students’ privacy and secretly recording using the web camera of loaned school laptops.

What can you do to avoid it?

In the case of the the Lower Merion School District, students and teachers suspected they were being monitored because they “saw the green light next to the webcam on their laptops turn on momentarily.”

While this is a great indicator, many hacker tools will ensure webcam lights are turned off to avoid raising suspicion. On-screen cues can give you a false sense of security, especially if you don’t realise that the microphone is always being accessed for verbal cues or other forms of tracking.

Facebook CEO Mark Zuckerberg covers the webcam of his computer. It’s commonplace to see information security professionals do the same.
iphonedigital/flickr

Basic awareness of the risks in cyberspace will go a long the way to mitigating them. This is called cyber hygiene.

Using good, up to date virus and malware scanning software is crucial. However, the most important tip is to update your device to ensure it has the latest security updates.

Hover over links in an email to see where you are really going. Avoid shortened links, such as bit.ly and QR codes, unless you can check where the link is going by using a URL expander.

What to do if you already clicked?

If you suspect you have malware on your system, there are simple steps you can take.

Open your webcam application. If you can’t access the device because it is already in use this is a telltale sign that you might be infected. Higher than normal battery usage or a machine running hotter than usual are also good indicators that something isn’t quite right.

Make sure you have good anti-virus and anti-malware software installed. Estonian start-ups, such as Malware Bytes and Seguru, can be installed on your phone as well as your desktop to provide real time protection. If you are running a website, make sure you have good security installed. Wordfence works well for WordPress blogs.

More importantly though, make sure you know how much data about you has already been exposed. Google yourself – including a Google image search against your profile picture – to see what is online.

Check all your email addresses on the website haveibeenpwned.com to see whether your passwords have been exposed. Then make sure you never use any passwords again on other services. Basically, treat them as compromised.

Cyber security has technical aspects, but remember: any attack that doesn’t affect a person or an organisation is just a technical hitch. Cyber attacks are a human problem.

The more you know about your own digital presence, the better prepared you will be. All of our individual efforts better secure our organisations, our schools, and our family and friends.The Conversation

Richard Matthews, Lecturer Entrepreneurship, Commercialisation and Innovation Centre | PhD Candidate in Image Forensics and Cyber | Councillor, University of Adelaide and Kieren Niĉolas Lovell, Head of TalTech Computer Emergency Response Team, Tallinn University of Technology

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Travelling overseas? What to do if a border agent demands access to your digital device



File 20181005 52691 12zqgzn.jpg?ixlib=rb 1.1
New laws enacted in New Zealand give customs agents the right to search your phone.
Shutterstock

Katina Michael, Arizona State University

New laws enacted in New Zealand this month give border agents the right to demand travellers entering the country hand over passwords for their digital devices. We outline what you should do if it happens to you, in the first part of a series exploring how technology is changing tourism.


Imagine returning home to Australia or New Zealand after a long-haul flight, exhausted and red-eyed. You’ve just reclaimed your baggage after getting through immigration when you’re stopped by a customs officer who demands you hand over your smartphone and the password. Do you know your rights?

Both Australian and New Zealand customs officers are legally allowed to search not only your personal baggage, but also the contents of your smartphone, tablet or laptop. It doesn’t matter whether you are a citizen or visitor, or whether you’re crossing a border by air, land or sea.




Read more:
How to protect your private data when you travel to the United States


New laws that came into effect in New Zealand on October 1 give border agents:

…the power to make a full search of a stored value instrument (including power to require a user of the instrument to provide access information and other information or assistance that is reasonable and necessary to allow a person to access the instrument).

Those who don’t comply could face prosecution and NZ$5,000 in fines. Border agents have similar powers in Australia and elsewhere. In Canada, for example, hindering or obstructing a border guard could cost you up to C$50,000 or five years in prison.

A growing trend

Australia and New Zealand don’t currently publish data on these kinds of searches, but there is a growing trend of device search and seizure at US borders. There was a more than fivefold increase in the number of electronic device inspections between 2015 and 2016 – bringing the total number to 23,000 per year. In the first six months of 2017, the number of searches was already almost 15,000.

In some of these instances, people have been threatened with arrest if they didn’t hand over passwords. Others have been charged. In cases where they did comply, people have lost sight of their device for a short period, or devices were confiscated and returned days or weeks later.




Read more:
Encrypted smartphones secure your identity, not just your data


On top of device searches, there is also canvassing of social media accounts. In 2016, the United States introduced an additional question on online visa application forms, asking people to divulge social media usernames. As this form is usually filled out after the flights have been booked, travellers might feel they have no choice but to part with this information rather than risk being denied a visa, despite the question being optional.

There is little oversight

Border agents may have a legitimate reason to search an incoming passenger – for instance, if a passenger is suspected of carrying illicit goods, banned items, or agricultural products from abroad.

But searching a smartphone is different from searching luggage. Our smartphones carry our innermost thoughts, intimate pictures, sensitive workplace documents, and private messages.

The practice of searching electronic devices at borders could be compared to police having the right to intercept private communications. But in such cases in Australia, police require a warrant to conduct the intercept. That means there is oversight, and a mechanism in place to guard against abuse. And the suspected crime must be proportionate to the action taken by law enforcement.

What to do if it happens to you

If you’re stopped at a border and asked to hand over your devices and passwords, make sure you have educated yourself in advance about your rights in the country you’re entering.

Find out whether what you are being asked is optional or not. Just because someone in a uniform asks you to do something, it does not necessarily mean you have to comply. If you’re not sure about your rights, ask to speak to a lawyer and don’t say anything that might incriminate you. Keep your cool and don’t argue with the customs officer.




Read more:
How secure is your data when it’s stored in the cloud?


You should also be smart about how you manage your data generally. You may wish to switch on two-factor authentication, which requires a password on top of your passcode. And store sensitive information in the cloud on a secure European server while you are travelling, accessing it only on a needs basis. Data protection is taken more seriously in the European Union as a result of the recently enacted General Data Protection Regulation.

Microsoft, Apple and Google all indicate that handing over a password to one of their apps or devices is in breach of their services agreement, privacy management, and safety practices. That doesn’t mean it’s wise to refuse to comply with border force officials, but it does raise questions about the position governments are putting travellers in when they ask for this kind of information.The Conversation

Katina Michael, Professor, School for the Future of Innovation in Society & School of Computing, Informatics and Decision Systems Engineering, Arizona State University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

I’ve always wondered: why do our computing devices seem to slow down?



File 20171016 21963 sm3929.jpg?ixlib=rb 1.1
Your gadgets might slow down if they’re bloated with apps.
Neirfy/Shutterstock

Robert Merkel, Monash University

This is an article from I’ve Always Wondered, a series where readers send in questions they’d like an expert to answer. Send your question to alwayswondered@theconversation.edu.au


“Why do phones, tablets and computers always slow down as they get older, to the point that they become unusable, but when I back it up and restore it onto a brand new device, it’s fast again (despite not changing any of the installed software)?” – Jason Yosar


Plenty of misconceptions and conspiracy theories surround this topic.

Internet searches for “iPhone slow” spike after the release of a new-generation model, but there’s no evidence to suggest that manufacturers deliberately degrade the performance of older devices with software updates.

Computer hardware does not typically slow down over its useful life. Instead, there are several other reasons why smartphones, tablets and PCs start to seem less snappy. The good news is that you can often take steps to improve your existing device’s performance.

Memory bloat

Each time they update, apps typically become larger and more full of features. Visual pizzazz is also a major attraction, and so desktop and mobile operating systems periodically receive significant redesigns.

All that extra functionality and glitz requires your device to do more computation than it did when it arrived home from the store. Given that it doesn’t magically speed up to compensate, it has less spare capacity available to respond to you quickly.

Newer apps not only tend to do more computation, they also usually take up more space in your device’s storage.

Devices only have a limited amount of fast “Random Access Memory” (RAM) available. One of a device’s data storage components, RAM is the rough equivalent of an office whiteboard – fast and convenient, but limited in capacity. Its contents are wiped every time you switch your device off.

When it runs out of space in RAM, your device can shift things to and from the much slower (and permanent until explicitly erased) data storage, flash memory, which takes considerable time.

In older PCs with mechanical hard disks, this used to be called “thrashing”, as users heard the hard disk’s read-write heads moving across the platters as they waited for data to be shifted in and out of the filled-up RAM.

Flash memory is silent and much faster than magnetic hard disks ever were, but it is still orders of magnitude slower than RAM.

Random Access Memory is a form of data storage.
Marcin Bajer/Flickr, CC BY-NC

Excessive cacheing

To make their apps run faster, some designers make them store copies of things in RAM that they think the user might want to see again to speed things up. For instance, a web browser might retain a copy of what the content in each tab looks like, even if only one tab is visible at a given moment.

Known as cacheing, this makes things work much faster – until your system starts to run out of memory. For cacheing to be effective, the amount of space devoted to it must be carefully managed by the application and the device’s operating system.
Some app developers don’t put the effort that they should into doing this well, and their applications not only slow down over time, but can drag the rest of the system down with them too.

More and more software

It’s also not uncommon for useful software to be accompanied by “crapware” – less-than-useful add-ons like browser toolbars – that use system resources and impact performance.

Additional software can slow a system down in many ways: filling up permanent storage, using up more precious RAM, and using the computer’s central processing unit “in the background” without you noticing. All these factors can result in the system having fewer resources available to respond to you promptly.

A new or factory-reset device tends to have less of this accumulated “cruft” (unwanted data and software) installed, and therefore has more resources available to do the tasks that a user actually wants.

Another unpleasant possibility is that some of the computing capabilities of your device are being used by malware – whether viruses, worms or other varieties of malicious software.

What can you do?

You’re not going to be able to match the performance of the latest and greatest high-end smartphone, tablet, or PC with an older model, as newer devices generally have fundamentally faster components. But with a small amount of effort, you can get the most out of your existing device.

Whether you’re using a phone, tablet, PC or Mac, the most useful zero-cost action you can take is to uninstall unnecessary apps and add-ons.

The ConversationHowever, in some circumstances it may be easier – AFTER carefully backing up all your data – to simply perform the equivalent of a factory reset and reinstall the operating system from scratch, adding only the apps you actually need.


  • Email your question to alwayswondered@theconversation.edu.au
  • Tell us on Twitter by tagging @ConversationEDU with the hashtag #alwayswondered, or
  • Tell us on Facebook

Robert Merkel, Lecturer in Software Engineering, Monash University

This article was originally published on The Conversation. Read the original article.

Cloud, backup and storage devices: how best to protect your data


Image 20170330 15619 l7vchv
How much data do you still store only on your mobile, tablet or laptop?
Shutterstock/Neirfy

Adnene Guabtni, Data61

We are producing more data than ever before, with more than 2.5 quintillion bytes produced every day, according to computer giant IBM. That’s a staggering 2,500,000,000,000 gigabytes of data and it’s growing fast. The Conversation

We have never been so connected through smart phones, smart watches, laptops and all sorts of wearable technologies inundating today’s marketplace. There were an estimated 6.4 billion connected “things” in 2016, up 30% from the previous year.

We are also continuously sending and receiving data over our networks. This unstoppable growth is unsustainable without some kind of smartness in the way we all produce, store, share and backup data now and in the future.

In the cloud

Cloud services play an essential role in achieving sustainable data management by easing the strain on bandwidth, storage and backup solutions.

But is the cloud paving the way to better backup services or is it rendering backup itself obsolete? And what’s the trade-off in terms of data safety, and how can it be mitigated so you can safely store your data in the cloud?

The cloud is often thought of as an online backup solution that works in the background on your devices to keep your photos and documents, whether personal or work related, backed up on remote servers.

In reality, the cloud has a lot more to offer. It connects people together, helping them store and share data online and even work together online to create data collaboratively.

It also makes your data ubiquitous, so that if you lose your phone or your device fails you simply buy a new one, sign in to your cloud account and voila! – all your data are on your new device in a matter of minutes.

Do you really back up your data?

An important advantage of cloud-based backup services is also the automation and ease of use. With traditional backup solutions, such as using a separate drive, people often discover, a little too late, that they did not back up certain files.

Relying on the user to do backups is risky, so automating it is exactly where cloud backup is making a difference.

Cloud solutions have begun to evolve from online backup services to primary storage services. People are increasingly moving from storing their data on their device’s internal storage (hard drives) to storing them directly in cloud-based repositories such as DropBox, Google Drive and Microsoft’s OneDrive.

Devices such as Google’s Chromebook do not use much local storage to store your data. Instead, they are part of a new trend in which everything you produce or consume on the internet, at work or at home, would come from the cloud and be stored there too.

Recently announced cloud technologies such as Google’s Drive File Stream or Dropbox’s Smart Sync are excellent examples of how cloud storage services are heading in a new direction with less data on the device and a bigger primary storage role for the cloud.

Here is how it works. Instead of keeping local files on your device, placeholder files (sort of empty files) are used, and the actual data are kept in the cloud and downloaded back onto the device only when needed.

Edits to the files are pushed to the cloud so that no local copy is kept on your device. This drastically reduces the risk of data leaks when a device is lost or stolen.

So if your entire workspace is in the cloud, is backup no longer needed?

No. In fact, backup is more relevant than ever, as disasters can strike cloud providers themselves, with hacking and ransomware affecting cloud storage too.

Backup has always had the purpose of reducing risks using redundancy, by duplicating data across multiple locations. The same can apply to cloud storage which can be duplicated across multiple cloud locations or multiple cloud service providers.

Privacy matters

Yet beyond the disruption of the backup market, the number-one concern about the use of cloud services for storing user data is privacy.

Data privacy is strategically important, particularly when customer data are involved. Many privacy-related problems can happen when using the cloud.

There are concerns about the processes used by cloud providers for privacy management, which often trade privacy for convenience. There are also concerns about the technologies put in place by cloud providers to overcome privacy related issues, which are often not effective.

When it comes to technology, encryption tools protecting your sensitive data have actually been around for a long time.

Encryption works by scrambling your data with a very large digital number (called a key) that you keep secret so that only you can decrypt the data. Nobody else can decode your data without that key.

Using encryption tools to encrypt your data with your own key before transferring it into the cloud is a sensible thing to do. Some cloud service providers are now offering this option and letting you choose your own key.

Share vs encryption

But if you store data in the cloud for the purpose of sharing it with others – and that’s often the precise reason that users choose to use cloud storage – then you might require a process to distribute encryption keys to multiple participants.

This is where the hassle can start. People you share data with would need to get the key too, in some way or another. Once you share that key, how would you revoke it later on? How would you prevent it from being re-shared without your consent?

More importantly, how would you keep using the collaboration features offered by cloud providers, such as Google Docs, while working on encrypted files?

These are the key challenges ahead for cloud users and providers. Solutions to those challenges would truly be game-changing.

Adnene Guabtni, Senior Research Scientist/Engineer, Data61

This article was originally published on The Conversation. Read the original article.

Vietnam stepping up religious rights abuses, experts say


Government-perpetrated violence against a Catholic village in Vietnam has highlighted a series of human rights abuses in the communist nation, and three U.S. congressmen are calling on the United Nations to intervene, reports Baptist Press.

"A few months ago during a religious funeral procession, Vietnamese authorities and riot police disrupted that sad and solemn occasion, shooting tear gas and rubber bullets into the crowd, beating mourners with batons and electric rods," Rep. Chris Smith, R.-N.J., said at a hearing of the Tom Lantos Human Rights Commission in August.

"More than 100 were injured, dozens were arrested and several remain in custody and have reportedly been severely beaten and tortured. At least two innocent people have been murdered by the Vietnamese police," Smith said.

The Con Dau tragedy, Smith said, "is unfortunately not an isolated incident." Property disputes between the government and the Catholic church continue to lead to harassment, property destruction and violence, Smith said, referring to a report by the U.S. Commission on International Religious Freedom.

"In recent years, the Vietnamese government has stepped up its persecution of Catholic believers, bulldozing churches, dismantling crucifixes and wreaking havoc on peaceful prayer vigils," Smith said.

Persecution is not limited to Catholics, though, as Smith had a list of nearly 300 Montagnard political and religious prisoners. In January, the Vietnamese government sentenced two Montagnard Christians to 9 and 12 years imprisonment for organizing a house church, and others have been arrested in connection with house churches, Smith said.

"The arrests were accompanied by beatings and torture by electroshock devices," the congressman said. "We must not forget the sufferings of Khmer Krom Buddhists, Cao Dai, Hoa Hao, the Unified Buddhist Church of Vietnam and others. The said reality is that the Vietnamese government persecutes any religious group that does not submit to government control."

The violence in the 80-year-old Catholic village of Con Dau in central Vietnam reportedly stemmed from a government directive for residents to abandon the village to make way for the construction of a resort.

International Christian Concern, a Washington-based watchdog group, reported that when Con Dau residents refused to leave, water irrigation was shut off to their rice fields, stopping the main source of income and food.

In May, police attacked the funeral procession, beating more than 60 people, including a pregnant woman who was struck in the stomach until she had a miscarriage, ICC said.

One of the funeral procession leaders later was confronted by police in his home, where they beat him for about four hours and then released him. He died the next day, ICC said. Eight people remain in police custody and are awaiting trial.

"The people of Con Dau are living in desperate fear and confusion," Thang Nguyen, executive director of an organization representing Con Dau victims, told ICC. "Hundreds of residents have been fined, and many have escaped to Thailand."

Smith, along with Rep. Joseph Cao, R.-La., and Frank Wolf, R.-Va., introduced a House resolution in July calling for the United Nations to appoint a special investigator to probe "ongoing and serious human rights violations in Vietnam." In August, the Lantos Commission met in emergency session to address the "brutal murders and systematic treatment of Catholics in Con Dau."

"The Vietnamese government justifies this violence, torture and murder because the villagers of Con Dau had previously been ordered, some through coercion, to leave their village, property, church, century-old cemetery, their religious heritage, and to forgo equitable compensation in order to make way for a new ‘green’ resort," Smith said at the hearing. "Nothing, however, not even governmental orders, grant license for government-sanctioned murder and other human rights abuses."

The U.S. Department of State declined to testify before the Lantos Commission, and the U.S. ambassador to Vietnam characterized the Con Dau incident as a land dispute and refused to get involved.

Logan Maurer, a spokesman for International Christian Concern, told Baptist Press he has publicized about 10 different incidents of persecution in Vietnam during the past few months.

"In some cases, especially in Southeast Asia, religious persecution becomes a gray area. We also work extensively in Burma, where often there are mixed motives for why a particular village is attacked," Maurer said. "Is it because they’re Christian? Well, partially. Is it because they’re an ethnic minority? Partially.

"So I think the same thing happens in Vietnam where you have a whole village that’s Catholic. One hundred percent of it was Catholic," he said of Con Dau.

Maurer explained that local government officials in Vietnam generally align Christianity with the western world and democracy, which is still seen as an enemy in Vietnam on a local level.

"As far as the official government Vietnamese position, that’s different, but local government officials do not take kindly to Christians and never have. We have documented many cases of government officials saying Christianity is the enemy. So here it’s mixed motives as best we can figure out," Maurer said.

"They wanted to build a resort there, and they could have picked a different village but they chose the one on purpose that was Catholic because it represents multiple minorities — minority religion, minority also in terms of people that can’t fight back. If they go seek government help, the government is not going to help them."

A Christian volunteer who has visited Vietnam five times in the past decade told Baptist Press the Con Dau incident illustrates the way the Vietnamese government responds to any kind of dissent.

"In our country, and in modern democracies, there are methods for resolving disputes with the government, taking them to court, trying to work through the mediation process," the volunteer, who did not want to be identified, said. "In Vietnam there is no such thing. It is the government’s will or there will be violence."

Vietnam’s constitution includes a provision for religious liberty, but the volunteer said that only goes as far as the communal will of the people, which is monopolized by the Communist Party.

"So when the Communist Party says you can’t build a church there or you can’t worship this way, those who say, ‘Well, I have religious freedom,’ are essentially trumped by the constitution that says it’s the will of the people, not individual liberty that’s important," the volunteer said.

The government in Vietnam has made efforts during the past 15 years to open up the country to economic development, and with that has come an influx of some western values and a lot of Christians doing work there, the volunteer said.

"I would first caution Christians to still be careful when they’re there working," he said, adding that government officials closely watch Christians who visit from other countries, and books about Jesus cause trouble.

Secondly, the volunteer warned that all news emerging from Vietnam must be tested for accuracy on both sides because both those who are persecuting and those who are sounding the alarm on persecution have their own political goals.

"That being said, I don’t doubt that this happened," the volunteer said regarding Con Dau.

International Christian Concern urges Americans to contact the Vietnamese Embassy in Washington at 202-861-0737, and the Christian volunteer said people can contact the U.S. Commission on International Religious Freedom to encourage changes in Vietnam.

"They can also directly e-mail the ambassador and the consular general in Ho Chi Minh City and encourage them to push for more reform," he said. "And they can contact companies that are having products made in Vietnam and encourage the business leaders to speak out for change in those countries. You go to JC Penney today in the men’s department and pick up almost anything, it’s made in Vietnam. That’s the kind of pressure they could put on them."

Report from the Christian Telegraph

Decline of traditional media


Should the threat to traditional media from the internet really be a cause for concern?

The new social media — blogging, Facebook, MySpace, Twitter, and YouTube are current faves — revolutionising the publishing world, for better and worse. Let’s look at both the better and the worse in perspective.

The current tsunami of personal choices in communication is slowly draining the profit from mainstream media. These media traditionally depend on huge audiences who all live in one region and mostly want the same things (the football scores, the crossword, the TV Guide, etc.). But that is all available now on the Internet, all around the world, all the time.

One outcome is a death watch on many newspapers, including famous ones like the Boston Globe. As journalist Paul Gillin noted recently: “The newspaper model scales up very well, but it scales down very badly. It costs a newspaper nearly as much to deliver 25,000 copies as it does to deliver 50,000 copies. Readership has been in decline for 30 years and the decline shows no signs of abating. Meanwhile, new competition has sprung up online with a vastly superior cost structure and an interactive format that appeals to the new generation of readers.”

Traditional electronic media are not doing any better. As James Lewin observes in “Television audience plummeting as viewers move online” (May 19, 2008), mainstream broadcasters “will have to come to terms with YouTube, video podcasts and other Internet media or they’ll face the same fate as newspapers.”

Radio audiences have likewise tanked. Overall, the recent decline of traditional media is remarkable.

Some conservative writers insist that mainstream media’s failure is due to its liberal bias. But conservatives have charged that for decades — to no effect. Another charge is that TV is declining because it is increasingly gross or trivial. True enough, but TV’s popularity was unaffected for decades by its experiments with edgy taste.

Let’s look more closely at the structure of the system to better understand current steep declines. Due to the low cost of modern media technology, no clear distinction now exists between a mainstream medium and a non-mainstream one, based on either number of viewers or production cost. Today, anyone can put up a video at YouTube at virtually no cost. Popular videos get hundreds of thousands of views. Podcasting and videocasting are also cheap. A blog can be started for free, within minutes, at Blogger. It may get 10 viewers or 10,000, depending on the level of popular interest. But the viewers control that, not the providers.

The key change is that the traditional media professional is no longer a gatekeeper who can systematically admit or deny information. Consumers program their own print, TV, or radio, and download what they want to their personal devices. They are their own editors, their own filmmakers, their own disc jockeys.

Does that mean more bias or less? It’s hard to say, given that consumers now manage their own level of bias. So they can hear much more biased news — or much less. And, as Podcasting News observes, “Social media is a global phenomenon happening in all markets regardless of wider economic, social and cultural development.”

Understandably, traditional media professionals, alarmed by these developments, have constructed a doctrine of “localism” and, in some cases, called for government to bail them out. That probably won’t help, just as it wouldn’t have helped if the media professionals had called for a government “bailed out” of newspapers when they were threatened by radio, or of radio when it was threatened by TV. Video really did (sort of) kill the radio star, but the radio star certainly won’t be revived by government grants.

Still, the news is not all bad. Yes, new media do sometimes kill old media. For example, no one seriously uses pigeon post to send messages today. But few ever thought birdmail was a great system, just the only one available at the time. However, radio did not kill print, and TV did not kill radio. Nor will the Internet kill older media; it will simply change news delivery. Sometimes in a minor way, but sometimes radically.

Media that work, whether radio, TV, newspapers, books, blogs, or any other, thrive when there is a true need. Today’s challenge is to persuade the consumer to look at alternatives to their own programming decisions.

Denyse O’Leary is co-author of The Spiritual Brain.

The original news article can be viewed at:
http://www.mercatornet.com/articles/view/decline_of_traditional_media/

Article from MercatorNet.com

POST-MODERNISM AND TRUE CHRISTIANITY


It is my contention that the church has been invaded and conquered by Post-modernism. When I say the church, I mean that which goes my the name today, in general terms. I am not of course speaking of the true church in the Biblical sense.

How else can we explain the eclectic and ever varying viewpoints and paradigms of churches throughout the country (Australia) and the world, except that the church has been invaded and conquered by Post-modernism? It is rampant everywhere and it no longer needs a subtle approach to infiltrate the church. It can now appear in blinding light as Post-modernism and be found acceptable by most ‘Christians’ within this country and I suspect the world.

Opposition to Post-modernist ideas is difficult to find, though admittedly it is there. The particularbaptist.com website is one outpost of Biblical Evangelical Christianity (Particular Baptist). It is not the only one – there are many such outposts on the World Wide Web and throughout the spiritual wilderness one can find an occasional welcome oasis in a dry, barren desert.

Yet the overwhelming scenario is that entering a random ‘Christian’ church on any Sunday you will find a place devoid of the Spirit of God, for He has long ago withdrawn His candlestick from that place. It is quite likely that you will find a place that for some time has given itself over to fanciful stories, human devised fables and crowd-pleasing activities. The people there have welcomed leaders that have been only too pleased to scratch the ears of their followers and have eagerly lapped up fleshly pleasing rhetoric that has fallen from their poisoned lips.

What are we to do who find ourselves hungering and thirsting in the wilderness? Are we to join ourselves to one of these dens of iniquity because we are not to forsake the assembling of ourselves together? Is this the last desperate act left open for a believer who longs to be obedient to His Lord?

I think it is high time that we who truly believe the Bible and follow the God of the Bible and His Beloved Son and the leadings of His Spirit, separate ourselves from such synagogues of Satan and form true Christian churches after the form outlined in the New Testament. It is time that we leave these forsaken places to their own devices and set out on a pathway that has been marked out by those that have gone before.

Our congregations may only be small and seem to have little impact when contrasted with the Post-modernist mega-churches of our time, yet we will be faithful servants of our God. We will be able to trust Him who is our Refuge and Our Strength, knowing that He who will go before us is the all-conquering sovereign Lord.

I find myself in this barren spiritual desert, surrounded by Post-modernist churches and have often felt the need to meet with Christians as I know I should. Yet I find myself unable to meet with those that worship another God and peddle another gospel that I find abhorrent. I long for the day when I will be able to meet with even two or three like-minded godly brethren who will also not yield to the pressures of the day and simply meet with a ‘powerless’ church that has long lost the powerful Spirit of God and is no longer a true witness of Jesus Christ.

May the Lord raise up like-minded brethren who will come together and form the godly churches of tomorrow. May God yet come among us again through the Person and Work of the Holy Spirit and visit us with fresh displays of His gracious power in the Gospel of Jesus Christ.

EGYPT: STABBING, BOMBING ATTACKS STRIKE NEAR TWO CHURCHES


Copt leaving sanctuary knifed in Minya; bomb explodes near venerable structure in Cairo.

ISTANBUL, May 22 (Compass Direct News) – In separate attacks in Egypt earlier this month, a Coptic Christian suffered severe stab wounds as he left a worship service in Minya, and a car-bombing outside a venerable church in Cairo disrupted a wedding.

Without provocation, three Muslims repeatedly stabbed Coptic Christian Girgis Yousry, 21, as the army conscript was leaving the gates of the church of Saint Mary in Minya, Upper Egypt on May 2, according to Copts United.

The assault left him with severe injuries to internal organs, and he was taken to the district hospital, where he was still receiving treatment at press time.

When Yousry’s father went to the police station to report the attack, the Intelligence Services officer in charge threw him out of the station. Three men implicated in the stabbing, Wael Mohammed Hagag, Mohammed Nasr Anwar and Shabaan Sayed Amin, were arrested on May 5 and have been given a 16-day initial incarceration while the investigation is underway.

All three men stand accused of attempted murder without premeditation, which carries a sentence of five to 15 years.

But Mamdouh Nakhla, president of the Al-Kalema Centre for Human Rights, said he thinks it unlikely that they will be convicted.

“From my experience over the last 15 years, in Minya in particular, all cases of attacks and murder against Christians either went without punishment and [the accused] were totally exonerated, or they were given suspended sentences,” he said.

Home to Egypt’s largest community of Copts (approximately 4 million), Minya is considered a hotbed of anti-Christian violence.

“I am aware of severe injustices happening to Christians who are being incarcerated for no reason,” said Nakhla. “This is my experience of Minya.”

Local sources told Compass that in the last few months there has been a wave of arrests of Christians who are held with no official charges. Sources spoke of cases where detainees are held for months in prison, where they are badly beaten and tortured.

“Police brutality is a widely practiced policy,” said one source, “especially in rural areas, group punishment and systematic intimidation and humiliation are expected practices against all citizens, Christians included.”

This month Compass learned of three illegal arrests of Christians that have taken place since November 2008. Two of the men who were detained have since been released.

“When people are released, they have been beaten and electrocuted so that they are hardly standing up,” said a local Christian.

Local church leaders believe recent pressure is a response to rumors of an increase in Christian converts in Egypt due to Christian satellite programming, although arrests go beyond converts to Coptic-born Christians.

Makeshift Bomb

In Cairo, a makeshift bomb placed under a car exploded outside a renowned Catholic church building in Zeitoun district on May 9, incinerating the vehicle but causing no injuries.

Panicked passersby called police when the small explosion caused the car to burst into flames outside Saint Mary Church, which Egypt’s Coptic community, citing numerous sightings of the Virgin Mary there in the late 1960s, considers a holy site.

Security forces arrived at the scene within minutes and sealed off the area. They found a second bomb, also planted beneath a car. Unable to disarm it, they were forced to detonate it in a controlled fashion, sources told Compass.

The explosion interrupted a wedding and a Bible study that were taking place inside the revered, historic building. Those in attendance were evacuated through a side gate as a precaution, reported Egyptian newspaper Watani. Boutros Gayed, the church’s priest, was unavailable for comment.

The bombs were rudimentary. Cell phones were used as detonators and placed with the explosive material into a bag containing shrapnel.

Police have yet to release information about possible suspects or motives, but newspaper Al-Masry Al-Youm has stated security forces are investigating possible links to a Hezbollah cell, which uses similar explosive devices.

A spokesman for Hezbollah has denied its involvement, stating that the cell was focused on supporting Palestinians in the Gaza Strip and has never had plans to carry out operations in Egypt.

The head of the Orthodox Church, Pope Shenouda, condemned the attack as criminal and pointed to sectarian motives.

“[The bombers] are attempting to tamper with the future of this homeland that they do not deserve to belong to,” he said, according to Egyptian newspaper Al-Ahram.

Similarities between this event and an explosion in February outside Al-Hussain Mosque, where one person was killed and 24 others wounded, have led to speculation that the attacks may be part of an attempt to inflame sectarian tensions.

Rumors also have been spread that “extremist Coptic groups” may have planted the devices in order to attract U.S. President Barack Obama’s attention to their plight on his planned June 4 visit to Cairo.

“This sounds like a ridiculous suggestion, because the Copts do not even respond to attacks against them,” said Ibrahim Habib, chairman of United Copts of Great Britain. “It is not in their agenda, and they have no precedence of violence.”

Report from Compass Direct News

EARTH HOUR: A COLOSSAL WASTE OF TIME???


Earth Hour is to be held this Saturday (March 28) between 8.30 pm and 9.30 pm. All you need to do to take part in Earth Hour is simply turn your lights off for the hour between 8.30 pm and 9.30 pm on March 28.

Earth Hour began as an annual event in Sydney in 2007, when an estimated 2.2 million buildings switched off their lights for an hour. This year Earth Hour is going global for the second year and is giving people the opportunity to ‘vote’ for either the Earth or global warning. By switching off the lights for an hour a person can ‘vote’ for fighting global warning.

Organisers of Earth Hour are hoping some 1 billion people will ‘vote’ for the Earth and hope to be able to give world leaders 1 billion ‘votes’ for the Earth at the Global Climate Change Conference in Copenhagen 2009. The conference is the forum in which world leaders will determine policy to supersede the Kyoto Protocol on Greenhouse Gas reduction.

For more on Earth Hour visit the official website at:

http://www.earthhour.org  

However, is Earth Hour a colossal waste of time? What is really being gained by turning the lights off for an hour once a year? All other electrical devices are still on and a lot of people go for alternative lighting devices that also pollute the environment. Other than awareness of global warming (which I would suggest everyone knows about now and either believes or does not believe – turning off some lights won’t change anyone’s mind on global warming), what does Earth Hour really achieve?

The following Blog post makes for interesting reading:

http://blogs.news.com.au/heraldsun/andrewbolt/index.php/heraldsun/comments/earth_hour_crashes_to_earth/

Am I against reducing Greenhouse Gas Emissions? Am I against reducing Global Warming and other associated disasters? Am I anti-environment? The answer to those questions is no! I’m just simply saying Earth Hour is little more than tokenism by most people who are against the Rudd government Greenhouse Gas Emissions reduction policies and other policies that actually aim to make a difference.