Annalist » Das Ende der anonymen E-Mail. Ein Team der kanadischen Concordia-University hat eine Technik entwickelt, um AutorInnen anonymer E-Mails identifizieren zu können – mit einer Sicherheit von 80-90 Prozent, behaupten die ForscherInnen.
Fraude met DigiD blijkt verbluffend simpel. Egypt’s Autocrats Exploited Internet’s Weaknesses - NYTimes.com.
Themes. Woberator. Talk - Naomi Wolf - The End of America. Detained American Says He Was Beaten in Kuwait. U.S. teenager tortured in Kuwait and barred re-entry into the U.S. - Glenn Greenwald. (updated below) Gulet Mohamed is an 18-year-old American citizen whose family is Somalian.
Government-created climate of fear - Glenn Greenwald. One of the more eye-opening events for me of 2010 occurred in March, when I first wrote about WikiLeaks and the war the Pentagon was waging on it (as evidenced by its classified 2008 report branding the website an enemy and planning how to destroy it).
At the time, few had heard of the group — it was before it had released the video of the Apache helicopter attack — but I nonetheless believed it could perform vitally important functions and thus encouraged readers to donate to it and otherwise support it. In response, there were numerous people — via email, comments, and other means — who expressed a serious fear of doing so: they were worried that donating money to a group so disliked by the government would cause them to be placed on various lists or, worse, incur criminal liability for materially supporting a Terrorist organization. The reflexive call for fewer liberties - Glenn Greenwald.
(updated below) William Galston — former Clinton adviser and current Brookings Institution Senior Fellow — has a column in The New Republic about the Gabrielle Giffords shooting that illustrates the mentality endlessly eroding basic American liberty: namely, the belief that every tragedy must lead to new government powers and new restrictions on core liberties.
The lesson of the Arizona tragedy, he argues, is that it’s too difficult to force citizens into mental institutions against their will. This, he says, is the fault of “civil libertarians,” who began working in the 1970s on legal reforms to require a higher burden of proof for involuntary commitment (generally: it must be proven that the person is a danger to himself or to others). There’s so much warped reasoning embedded in this argument that it’s hard to know where to begin.
Indignez vous !! Indignez-vous ! par Stéphane Hessel. Listen to RFI. Politics of Fear. We live in a highly organised climate of fear.
If security organisations depend upon fear and paranoia to sustain their existence, Wikileaks suggests using the same tools to hold them to account. Today, we live in a climate of fear. On 15 December, the US Department of Homeland Security and FBI issued an intelligence bulletin to state and local law enforcement agencies warning that terrorists could target mass gatherings at major metropolitan areas during the 2010 holiday season, although US officials said that there is no specific and credible intelligence about planned terror attacks. In October, the US Department of State issued an alert warning Americans travelling to Europe to be cautious because of suspected terror plots to attack major European cities. Life Inc by Douglas Rushkoff - Trade Paperback.
“Fascinating . . . powerful writing . . . a tour de force survey of the economic history of the modern world . . .
[an] enlightening and consciousness-raising experience.” —The Miami Herald “This is a provocative and controversial look at the dark side of corporatist effects on our economy. . . . Whether or not you agree with Douglas Rushkoff, you will find that this book challenges some of our basic assumptions about how our economy works.” Tim Wu: Net Neutrality and Free Speech. Tim Wu: Information Empires. Tim Wu on the Master Switch. The Master Switch: Tim "Net Neutrality" Wu explains what's at stake in the battle for net freedom. Jacob Weisberg & Tim Wu - The Master Switch. Tim Wu's Home Page. Woberator, de documentaire. A taxonomy of transparency. I’m writing the section of Public Parts on truly public government — transparency leading to collaboration. Newsbrooke The Silent State. Google United States Government.
The two-tiered justice system: an illustration - Glenn Greenwald. Of all the topics on which I’ve focused, I’ve likely written most about America’s two-tiered justice system — the way in which political and financial elites now enjoy virtually full-scale legal immunity for even the most egregious lawbreaking, while ordinary Americans, especially the poor and racial and ethnic minorities, are subjected to exactly the opposite treatment: the world’s largest prison state and most merciless justice system.
Rporate hired spies are here to stay doNOTwaste your time Peter Bleksley. A small independent garage is repeatedly targeted by thieves intent on stealing expensive tools.
A flagship academy suffers the same fate, only it's the IT equipment that the burglars want. A global energy supplier wants to protect its power plant. Step forward the private security sector. Police forces are stretched to breaking point and face deep cuts. Mark Kennedy: A journey from undercover cop to 'bona fide' activist. He turned up with long hair, tattoos and an insatiable appetite for climbing trees.
Few people suspected anything odd of the man who introduced himself as Mark Stone on a dairy farm turned spiritual sanctuary in North Yorkshire. He had come alone on 12 August 2003, in the middle of a heatwave, for a gathering of environmental activists known as Earth First.
Collusion. Local firms. Law. Identity. Net neutrality. Net neutrality clone. Real property. In English common law, real property, real estate, realty, or immovable property is any subset of land that has been legally defined and the improvements to it have been made by human efforts: buildings, machinery, wells, dams, ponds, mines, canals, roads, etc.
Real property and personal property are the two main subunits of property in English Common Law. Historical background
Public space. "protection" censorship. Technology. Help. Flyby And Driveby Photos Of Walmart's Super-Secret Data Center. Events. Network- I'm Mad as Hell. IBM Many Bills: A Visual Bill Explorer. Toby Considine - Smart Energy and the End of Privacy. Back in the early 90’s, there was a national conversation on privacy, and transactional data, and e-commerce. It was an effort to adapt traditional notions of privacy for today’s digital world, in which no information every really goes away, ever. Today, a new generation is wrestling with these issues, but without the fundamental understanding those conversations created.
The first assumption in the national conversation was that it was simply good business to expect privacy and discretion. Many early e-commerce successes were tied to what might be called embarrassing purchases. Birth Control. A certain level of information sharing is necessary. Las Vegas was an early leader in understanding their customers. Everything is OK Montage. Chaîne de cveitch. Chaîne de cveitch.
How To Protect Your Login Information From Firesheep. TechCrunch reader Steve Manuel claims to have found a workaround to Firesheep, the controversial Firefox extension that allows anyone on an insecure open Wifi network to access user login info for almost every single social network in existence. Firesheep banks on the fact that most social sites default to the HTTP protocol because it’s quicker. The already existing Firefox extension Force-TLS attempts to circumvent this by forcing those sites to use the HTTPS protocol, therefore making user cookies invisible to Firesheep. Like the alternative option HTTPS Everywhere, the Force-TLS Firefox extension allows your browser to change HTTP to HTTPS on sites that you indicate in the Firefox Add On “Preferences” menu, protecting your login information and ensuring a secure connection when you access social sites.
Intellectual property. Intellectual property (IP) rights are the legally recognized exclusive rights to creations of the mind. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property rights include copyright, trademarks, patents, industrial design rights, trade dress, and in some jurisdictions trade secrets. Although many of the legal principles governing intellectual property rights have evolved over centuries, it was not until the 19th century that the term intellectual property began to be used, and not until the late 20th century that it became commonplace in the majority of the world. The British Statute of Anne (1710) and the Statute of Monopolies (1624) are now seen as the origins of copyright and patent law respectively. History
To do2. Pearlnet. Perlenkette. Clarinette02. Defenders. Journalism. Art. Privacy. Transparency. Metaphors newspaper. We Live In Public. The Transparency Paradox Colayer. Publicy. Assange’s Mission for Total Transparency. Transparency should be proportional to the power that one has. I'm Writing a Book: WikiLeaks and the Age of Transparency. WikiLeaks and Julian Paul Assange.
LRB · Slavoj Žižek · Good Manners in the Age of WikiLeaks. In one of the diplomatic cables released by WikiLeaks Putin and Medvedev are compared to Batman and Robin. It’s a useful analogy: isn’t Julian Assange, WikiLeaks’s organiser, a real-life counterpart to the Joker in Christopher Nolan’s The Dark Knight? Wikileaks: "Totale Transparenz ist auch totale Überwachung" Das Geheimnis in Zeiten von Wikileaks: Die Kulturwissenschaftlerin Eva Horn erzählt im Interview über die Macht des Leakings und über das Phänomen Julian Assange. Speichern. Boycott the UK census over links to Lockheed Martin, protesters say. Assange praises Indian newspaper's use of WikiLeaks disclosures.
How Dropbox sacrifices user privacy for cost savings.