Get flash to fully experience Pearltrees
2013 Federal Budget Limits Body Scanners, But Expands Domestic Surveillance According to White House budget documents and the Congressional Testimony of Secretary Napolitano, DHS will not purchase any new airport body scanners in 2013. However, the agency will expand a wide range of programs for monitoring and tracking individuals within the United States.
The father of free software philosophy spoke to RT on evil developers, spying social networks, the almost-legitimacy of Anonymous hacks and the condition under which he would take a proprietary program and a million dollars.
Les documents révélés par WikiLeaks laissent entrevoir le paysage de la surveillance.
Total Surveillance by Toni Dimitrov
I arrived in Warsaw yesterday to participate to a panel mysteriously titled Culture as a space of freedom and anarchy .
We've recently started embedding video from YouTube and elsewhere into Deeplinks and other areas of EFF.org. This posed a challenge: On one hand, embedded video is an important tool that we want to be able to use. But, on the other hand, embedded video has worrisome privacy implications that we thought we should do something about.
One aspect of the Egyptian uprising (among the others, most ongoing) that was overpowered by the wild acclamation of social media is something that has been quietly but powerfully changing societal norms over the last decade.
Violence and social networking in Mexico: Actors and surveillance technologies
Con este vídeo de Nina Paley (creadora de la película “ Sita Sings The Blues “) se explica bien cuál es la situación de internet en Estados Unidos y en muchas partes del mundo. El vídeo forma parte de los Minute Meme que ha puesto en marcha esta creadora a través de la web QuestionCopyright.org que quiere generar debate sobre diversos aspectos relacionados con la propiedad intelectual. Hasta ahora sólo 3 vídeos de los 17 propuestos, muy recomendables la canción “ Copiar no es robar ” y espectacular “ Todas las obras creativas son derivadas “.
Overview | How does George Orwell’s vision of technology and its uses in “1984” compare with today’s reality? How have concerns about privacy and freedom expressed in the novel been manifested in the contemporary world? In this lesson, students compare and contrast the world, people and technologies of “1984” with those of today and create a treatment for a modern film, print or stage adaptation that revolves around current technologies. Materials | Full text of “1984, ” computers with Internet access, software for podcasting and projection equipment, copies of the handout “1984” vs. Today (PDF), video cameras and film-editing software (optional) Warm-Up | Give students the following list of words from “1984”:
Essentially, officials want Congress to require all services that enable communications — including encrypted e-mail transmitters like BlackBerry, social networking Web sites like and software that allows direct “peer to peer” messaging like — to be technically capable of complying if served with a wiretap order.
Apple busca más herramientas para combatir los métodos que permiten la ruptura de los sistemas de protección de sus teléfonos para emplear aplicaciones no autorizadas o liberar el mismo para disfrutar de conexión con otra operadora.
Thoughts while reading the Rhizome piece Reaction to Osfavelados and his Rhizome for dummies Maybe Hypertexts do indeed not exist, because we cannot perceive them, we can only follow its branches but it is very hard for a human to perceive all the branches at once, it is hard for humans to comprehend the totality of all possibilities. We think in lines, follow paths, go back on our tracks. If that is hypertext, then maybe it does exist, but chances are that we are only confronted with chaos. I am a phenomenologist: I believe that I can only perceive the world with the aid of myself.
Le nuove tecnologie della sorveglianza di Robin Ballantyne * tratto da Covert Action Quarterly 64 (primavera 1998) tradotto da Tactical Media Crew - http://www.tmcrew.org In un particolareggiato e spaventoso rapporto, lo STOA (Scelta e Valutazione delle Opzioni Scientifiche e Tecnologiche), si descrive un sistema di sorveglianza di telecomunicazione globale che può mettere sotto controllo tutti i telefoni, e-mail, e trasmissione fax, di privati cittadini, politici, sindacalisti, attivisti, sospetti terroristi e aggregazioni simili, insomma tutti.
(Update: Fixed it for ya! ) I noticed these new iWatchLA LAPD posters around the parking garage at Los Angeles International Airport this week.