Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged FBI

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

U.S. Congress must act on government hacking, reject Rule 41 - Access Now - 0 views

  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
Gonzalo San Gil, PhD.

FBI Spied On Activists Because Protecting Corporate Interests Is Roughly Equivalent To ... - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! Another #Global issue: '#They' say it is for # ! #security, but it is really another #commercial # ! strategy, that #sells and #buys #citizens... # ! ...as mere commodities. # ! :(
  •  
    [from the our-disregarded-internal-policies-trump-your-First-Amendment-rights dept That whole thing about the FBI not surveilling people based solely on First Amendment activity? The thing that's been in all the (FISA) papers (and agency policies)? Yeah, the FBI hasn't heard of it either. ]
Gonzalo San Gil, PhD.

FBI Investigates Hollywood Ties to Pirated 'Hateful Eight' Screener - TorrentFreak [# !... - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! we come saying this since long. 'Piracy' is just an excuse to censor and control the cultural flow...
    • Gonzalo San Gil, PhD.
       
      # ! As Hollywood, like avery other Producer, knows that the sharing (Network effect) benefits their income.
    • Gonzalo San Gil, PhD.
       
      # ! Of course that there is a link. What is less clear is if this fact will be publicly revealed if found correct after the investigation...
  •  
    " Ernesto on December 23, 2015 C: 143 Breaking The pirated screener of Tarantino's "The Hateful Eight" has been traced back to a copy sent to a top Hollywood executive. The FBI is currently investigating the breach, which is part of series of leaked screeners that appeared online in recent days. Meanwhile, The Hateful Eight has been shared more than a million times through various unauthorized channels."
  •  
    " Ernesto on December 23, 2015 C: 143 Breaking The pirated screener of Tarantino's "The Hateful Eight" has been traced back to a copy sent to a top Hollywood executive. The FBI is currently investigating the breach, which is part of series of leaked screeners that appeared online in recent days. Meanwhile, The Hateful Eight has been shared more than a million times through various unauthorized channels."
Gonzalo San Gil, PhD.

FBI's Tor Hack Shows the Risk of Subpoenas to Security Researchers | WIRED - 0 views

  •  
    "Computer security researchers who expose hackable vulnerabilities in digital products face plenty of occupational hazards: They can have their work censored by threats of lawsuits from the companies whose products they hack, or they can even be criminally indicted if their white-hat hacking runs afoul of the Computer Fraud and Abuse Act. But one still-mysterious encounter between security researchers and the law points to a newer, equally troubling possibility: They can have their work subpoenaed in a criminal investigation and used as a law enforcement tool."
  •  
    "Computer security researchers who expose hackable vulnerabilities in digital products face plenty of occupational hazards: They can have their work censored by threats of lawsuits from the companies whose products they hack, or they can even be criminally indicted if their white-hat hacking runs afoul of the Computer Fraud and Abuse Act. But one still-mysterious encounter between security researchers and the law points to a newer, equally troubling possibility: They can have their work subpoenaed in a criminal investigation and used as a law enforcement tool."
1 - 4 of 4
Showing 20 items per page