User Tools

Site Tools


fud

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

fud [2014/03/26 12:09]
gianna_chacon created
fud [2014/04/06 16:52] (current)
kwitteman
Line 13: Line 13:
 ==Apple== ==Apple==
  
-Apple is also a user of FUD to spread information that will discourage customers to use their products in certain ways. On an iPod, iPhone, or really most Apple devices it is possible to jailbreak the device, which allows the user to remove limitations set by iOS. To stop users from jailbreaking Apple made the claim to the government that, "a local or international hacker could potentially initiate commands (such as a denial of service attack) that could crash the tower software, rendering the tower entirely inoperable to process calls or transmit data" (([[http://​www.wired.com/​threatlevel/​2009/​07/​jailbreak/​]])) By creating the possibility of a hacker in the midst of consumers Apple used  FUD as an attempt to stifle those who wanted to use their device in ways the company saw as unsavory. ​+Apple is also a user of FUD to spread information that will discourage customers to use their products in certain ways. On an iPod, iPhone, or really most Apple devices it is possible to jailbreak the device, which allows the user to remove limitations set by iOS. To stop users from jailbreaking Apple made the claim to the government that, "a local or international hacker could potentially initiate commands (such as a denial of service attack) that could crash the tower software, rendering the tower entirely inoperable to process calls or transmit data" (([[http://​www.wired.com/​threatlevel/​2009/​07/​jailbreak/​]])) By creating the possibility of a hacker in the midst of consumers Apple used  FUD as an attempt to stifle those who wanted to use their device in ways the company saw as unsavory. 
 + 
 +==Other Software Examples== 
 + 
 +The constant threat of malware for all devices, especially mobile, is an example of FUD. Small vendors who sell anti-viral products create a fear a malware to get the user to buy the software. (([[http://​www.tripwire.com/​state-of-security/​off-topic/​the-four-horsemen-of-the-cyber-apocalypse-fud-in-security-software-marketing/​]]))
  
 ====Government Usage==== ====Government Usage====
  
-Not only us FUD used by private companies as a marketing tool, it is also used by Governments to spread fear and justify heightened states of cyber-security. There are numerous examples of this; the insecurity felt at airports due to the constant threat of terrorism or the war against photography,​ the confiscation of cameras from suspicious individual. [(#3)] Both of these are tactics used by the government to keep United States Citizens afraid of an inevitable terrorist threat because in reality most airline passengers are exactly that and the same goes for photographers. ​+Not only us FUD used by private companies as a marketing tool, it is also used by Governments to spread fear and justify heightened states of cyber-security. There are numerous examples of this; the insecurity felt at airports due to the constant threat of terrorism or the war against photography,​ the confiscation of cameras from suspicious individual. [(#3)] Both of these are tactics used by the government to keep United States Citizens afraid of an inevitable terrorist threat because in reality most airline passengers are exactly that and the same goes for photographers. 
 + 
 +FUD can also be used through the idea of a "​cyber-war"​ that continuously looms on the horizon. Drawing connections and associations with security events like 9/11 triggering a strong emotional response. This fear is seen by security experts to be a stretch, most cyber-threat is not perpetrated by other governments in a warlike effort [(http://​www.tripwire.com/​state-of-security/​off-topic/​the-four-horsemen-of-the-cyber-apocalypse-fud-in-security-software-marketing/​)]
  
-{{page>Internet ​Surveiallance:FUD}}+FUD is not a strictly American phenomena, in reality FUD can happen and likely does happen in most countries with Internet ​capabilities. Take India for example, there has been speculation about India'​s ability to handle the new Information Technology (IT) that has arisen in the country. In an essay by Indian writer S.S. Raghav called "Cyber Security in India'​s Counter Terrorism Strategy"​ (([[http://​ids.nic.in/​art_by_offids/​Cyber%20security%20in%20india%20by%20Col%20SS%20Raghav.pdf]])) he argues that because India has carved a niche out for themselves in the IT sector this has placed more reliance on e-commerce and e-governance,​ which is a new concept to the Indian government. This causes them to be a susceptible target to anyone wishing to create havoc in their economic and financial institutions. This essay could be seen as a form of FUD, attempting to spread fear about cyber-terrorism in India.
fud.txt · Last modified: 2014/04/06 16:52 by kwitteman