Skip to main content

Home/ CULF 3331: "Middle Eastern Revolutions"/ Group items tagged tech

Rss Feed Group items tagged

pvaldez2

Five ways tech is crowdsourcing women's empowerment | Global Development Professionals ... - 0 views

  •  
    Article describes how tech is crowdsourcing women's empowerment. What tech is doing for these women is allowing them to enter their own data than relying on institutional datasets. Examples are them crowdsourcing data on street harassment, reporting sexual harassment and violence, and finding respectful gynecologists.
nicolet1189

Beheading Video Stirs Debate On Social Media Censorship : NPR - 0 views

  • As an American journalist,
  • determining what is good or bad for their users
  • Twitter and others being proactive about censoring this information start to engage in a slippery slope
  • ...9 more annotations...
  • I don't want any government or industry to censor what I can and cannot say to my community in my attempt to ethically inform them
  • GREENE: Let me just make sure I understand this because it seems like a very important point - you're saying the New York Post, they are journalists; they made the decision on their own. You might say that it was a bad decision, but it was a news organization, a publisher, so to speak, making a decision about what to publish. Twitter, in the eyes of many of us, you know, is a platform for us to share. And that's a different thing for them to censor you or I or other people in terms of what we want to share or not.
  • Yeah, I would look at it as if the printing press operators decided that they wanted to censor the New York Post, right? That's if we view Twitter as a platform. Printing press operators wouldn't shape a newspaper
  • these organizations are really sophisticated with their propaganda, and this is just one video of many different types of strategies that they employ.
  • that by allowing this video to be available, it is helping ISIS - these militants - spread their propaganda
  • we were to have a technology company censoring images from the Vietnam War, think of the iconic images that would be censored and blanked.
  • Viewing a video, I feel like you need to make that decision. You need to make that decision. The government shouldn't make that decision for you. A tech company shouldn't make it for you.
  • these are the images that changed the tone, the country, the direction of that war
  • This one here is not the government censoring. This is a tech company that is censoring. Now, again, it's their platform. It's their rules. But it is something to be aware o
  •  
    The beheading of James Foley by the Islamic State triggered debate. David Greene talks to Robert Hernandez, assistant professor at USC Annenberg, about censorship with new tech platforms like Twitter.
  •  
    The beheading of James Foley by the Islamic State triggered debate. David Greene talks to Robert Hernandez, assistant professor at USC Annenberg, about censorship with new tech platforms like Twitter.
  •  
    The beheading of James Foley by the Islamic State triggered debate. David Greene talks to Robert Hernandez, assistant professor at USC Annenberg, about censorship with new tech platforms like Twitter.
atownen

Cyber Terrorism: How Dangerous is the ISIS Cyber Caliphate Threat? - 0 views

  •  
    I found this article from 2015 to still be very relevant considering President Obama's speech and a recent push by university/techs to communicate regarding the exact threat of ISIS' cyberterrorism capabilities. The NSA reported that this means of war is parallel to that of the Cold War; leaving countries on edge since traditional human espionage is slowly becoming intertwined with "technical operations."
jherna2a

Breaking News, Analysis, Politics, Blogs, News Photos, Video, Tech Reviews - TIME.com - 1 views

  •  
    Before the conflict and poverty that has been affecting the nation for years, Yemen was once a center of civilization and wealth. This article outlines the history of this tumultuous country from its beginnings as "Happy Arabia" (as the Romans used to call it) to a country divided.
micklethwait

CNN.com - Breaking News, U.S., World, Weather, Entertainment & Video News - 0 views

shared by micklethwait on 05 Sep 14 - Cached
  • NEW Missing 4-year-old boy found Soldier beaten to death ... by peers   Asteroid to pass 'very close' to Earth
  • NEW NATO to create 'spearhead' force Can NATO get back to its roots? ISIS vs. Muslims: The media war What does ISIS want?   NEW Ebola
fcastro2

Putin brings China into Middle East strategy - Al-Monitor: the Pulse of the Middle East - 0 views

    • fcastro2
       
      Russia & China's negotiations involving Syria
  • one of China’s main strategic regional projects was the economic region (or belt) of the 21st century Great Silk Road and the Maritime Silk Road, which intends to create a wide area of Chinese economic presence from China’s western borders to Europe
  • clearly comprises the countries of Western Asia (i.e., the Middle East)
  • ...22 more annotations...
  • Chinese leader opened the Sixth Ministerial Meeting of the China-Arab Cooperation Forum on June 5 in Beijing
  • energy cooperation; infrastructure construction and creation of favorable conditions for trade and investment; and high-tech domains of nuclear energy, the space rocket sector and new energy sources
    • fcastro2
       
      China & Arabian cooperation
  • suggested that the creation of a free trade zone between China and the Gulf Cooperation Council (GCC) be accelerated
  • China supports the peace process and the establishment of an independent Palestinian state within the borders of June 4, 1967, with East Jerusalem as its capital, "enjoying full sovereignty."
  • , why shouldn’t Russia and China in the current situation — given the proximity of their interests and positions — undertake joint initiatives to unblock the peace process, while initiating steps to "introduce this activity within an institutional framework?
  • , the unilateral efforts by US Secretary of State John Kerry to promote the Israeli-Palestinian peace process are not bearing fruit
  • Russia is interested in using this unprecedented convergence with China in its operations on the Middle East arena, where Moscow has in many ways already been acting in unison with Beijing
  • , the Middle East Quartet is one of few international platforms where Russia can constructively engage with the United States and the EU
  • China's growing economic cooperation with Arab countries not a cause for concern in Moscow, but it is also viewed in a very favorable light
  • will not one day replace the United States as the security guarantor for the transportation routes of these resources
  • Moscow’s and Beijing’s interests converge in the joint countering of terrorism, extremism and separatism
  • . Among the militants from radical groups fighting against government troops in Syria, there are people hailing not only from Russia and Central Asia (fewer in numbers to those coming from Arab and Islamic as well as Western countries), but also from the Uighur minority in China.
  • recently, Beijing came under harsh criticism from Ankara for its actions in the Xinjiang Uighur Autonomous Region against the Uighur population, which the Turks believe to be their next of kin
  • . Disappointed by the failure of EU accession, the Turkish leadership has even started talking about the desire to join the SCO as an observer
  • Ankara expresses its willingness to cooperate with China in the fight against terrorists and condemns the separatism coming from some groups in Xinjiang
  • There is no doubt that a comprehensive strategic partnership, in which Russia and China would act in concert along the political consensus reached by their two leaders, would in the short term
  • According to both, this convergence is neither a union nor a tournament of predators, but a very pragmatic integrationist instrument of protection and projection of interests by the two powers, including in the Middle East.
  • the Middle East was not the focus of the talks between the two leaders
  • roughly 50 agreements ushering in a period of unprecedented convergence between the two countries
  • seems to allow the two parties to seek further coordination in their actions
  • Such consensus includes Syria, despite Beijing’s lesser involvement on this issue, relative to Moscow; Iran, within the P5+1 (the five permanent UN Security Council members plus Germany) negotiations with Tehran over its nuclear program; the fight against terrorism and extremism; the creation of a weapons of mass destruction-free Middle East; the condemnation of external intervention and the strategy of "regime change" as well as the push for "color revolutions;" the policy to reach a settlement in the Middle East; and relations with the new Egyptian regime and with respect to the Sudanese issues.
tdford333

Everything you need to know about the drone debate, in one FAQ - The Washington Post - 0 views

  • "drone" has come to refer to unmanned combat aerial vehicles (UCAVs), which are UAVs equipped with combat capabilities, most commonly the ability to launch missiles.
  • Predators were deployed to Afghanistan almost immediately after the Sept. 11, 2001 terrorist attacks, and on Oct. 7, 2001 they conducted their first armed mission there.
  • The current program is jointly administered by the CIA and the Joint Special Operation Command (JSOC).
  • ...16 more annotations...
  • Predator drones can carry up to two Hellfire missiles. Those have warheads of about 20 pounds, which are designed to pierce tank armor;
  • Reapers are another story. They feature a maximum payload of 3,000 pounds, or 1.5 tons. That means they can carry a combination of Hellfires and larger 500 pound bombs like the GBU-12 Paveway II and GBD-38 JDAM. Those have an "effective casualty radius" of about 200 feet.
  • From 2008 through October 2012, there were 1,015 strikes in Afghanistan, 48 in Iraq, and at least 105 in Libya
  • Primarily al-Qaeda and its affiliates. That includes al-Shaabab in Somalia, al-Qaeda in the Arabian Peninsula (which works in Yemen), and the Haqqani Network in Afghanistan and Pakistan.
  • Anwar al-Awlaki, an American-born al-Qaeda operative in Yemen, was killed in a drone strike in 2011, as was his American-born 17-year-old son
  • Ahmed Hijazi, also an American citizen based in Yemen, was killed in 2002. 
  • The National Counterterrorism Center (NCTC) will prepare lists of potential targets, which will be reviewed every three months by a panel of intelligence analysts and military officials. They are then passed along to a panel at the National Security Council, currently helmed by CIA director nominee Brennan, and then to Obama for final approval.
  • There is, however, substantial evidence that the percentage of casualties borne by civilians is much lower with drone strikes than with just about any other kind of military intervention
  • It derives the authority for the strikes from the Authorization for the Use of Military Force (AUMF) passed in the wake of 9/11, which grants the government broad powers against al-Qaeda.
  • allows states to make war in the interest of self-defense
  • Critics, like UN special rapporteur on extrajudicial killings, summary or arbitrary executions Christof Heyns, say that this defense is a stretch, and the killings plainly run afoul of the laws of war and international human rights treaties.
  • Only the United States and the United Kingdom (which assists in the Pakistan drone effort) currently use drones in combat
  • All told, the GAO estimates that 76 countries, at least, have drone technology.
  • The Yemeni government quietly agreed to the strikes
  • Citizens in both countries deplore the campaigns.
  • there are deeper doubts as to whether the strategy is recruiting more militants than it kills, by turning local populations against the United States.
jreyesc

Who's Funding ISIS? Wealthy Gulf 'Angel Investors,' Officials Say - NBC News.com - 0 views

  • These rich individuals have long served as "angel investors,"
  • "These rich Arabs are like what 'angel investors' are to tech start-ups, except they are interested in starting up groups who want to stir up hatred,"
  • Once the groups are on their feet, they are perfectly capable of raising funds through other means, like kidnapping, oil smuggling, selling women into slavery, etc."
  • ...7 more annotations...
  • ISIS and the most radical groups comes from Qatar rather than Saudi Arabia, and that the Qatari government has done less to stop the flow than its neighbors in Saudi Arabia and the United Arab Emirates.
  • flow continues.
  • any outside funding represents a small fraction of ISIS’s total annual income.”
  • SIS is taking in about $1 million a day from all sources
  • oil smuggling along the Turkish border,
  • $25 a barrel
  • But U.S. officials suggest that as the group has expanded -- and its range of enemies has broadened – so have its costs, which could make the group vulnerable.
  •  
    This article is about how the Islamic State is being funded by wealthy gulf. These investor are described to be like "angle investors".The money that they receive from these investors is just a jumping off point, then the group finds other ways to get money like "kidnapping, oil smuggling, selling women into slavery."
nicolet1189

Twitter, terror and free speech: Should Twitter block Islamic snuff videos? | The Econo... - 0 views

  • YouTube removed one version of the video, citing a violation of their policy on violent content. On Tuesday, Twitter announced a new policy that it would remove images and video of the deceased at the request of family member
  • g #ISISMediaBlackout
  • The logical incoherence of this statement aside, is disseminating offensive material the same thing as promoting it? It is conceivable that the video could incite potential terrorists and others harboring anti-American sentiments to copycat acts of violence. But it is equally true that content of this kind wakes people up t
  • ...9 more annotations...
  • Should platforms like YouTube and Twitter really have the power to censor what content we can or cannot see? At least in America, the suppression of disturbing or offensive content, if it does not incite violence, is a direct violation of our principles of free speech. Especially in this instance, it seems deeply inappropriate to respond to authoritarianism with authoritarian action.
  • Part of ISIS’s aim is presumably to terrorise us remotely, but most people are just getting angry.
  • Does it matter what ISIS wants?
  • Others have argued that the video shouldn’t be shared because that’s what ISIS wants.
  • intentionality does not factor into censorship decisions anyway. 
  • Twitter is not television. No one is being forced to view the footage.
  • It’s completely understandable that family members don’t want footage of a loved one’s death to spread, but it’s not clear that that’s their decision to make.
  • It’s really not Twitter’s decision either—unless we want to grant tech giants the power to control public knowledge and discourse, a dangerous precedent indeed.
  • Its democratic power derives from the fact that it’s unedited; for better or for worse,
  •  
    The author of this article strongly opposes Social Media companies, specifically Twitter censoring ISIS related materials on their website. The author argues it violates free speech and the democratic principles associated with the website, arguing censoring a beheading video would be a slippery slope for future content.
rlindse3

Iranian Cyber Warfare Threat Assessment | Defense Tech - 0 views

  •  
    This article provides an assessment of Iran's cyber warfare threat, ranking it as top 5 in the world. It also highlights the increased focus on higher education to provide engineers and computer scientists to help fuel the new cyber division in the military.
nicolet1189

Al-Qaida and ISIS Use Twitter Differently. Here's How and Why. - NationalJournal.com - 1 views

  • Al-Qaida has an Internet presence nearly two decades old
  • their separate techniques not only reveal key divisions between the two terrorist groups, but also illustrate the depths of extremism that ISIS will plumb—and that al-Qaida won't.
  • Social media's public and instantaneous nature is ideal for reaching ISIS's target audience—young, disillusioned Westerners who are ripe for radicalization—and it gives them a sense of community.
  • ...12 more annotations...
    • nicolet1189
       
      Wait, seriously? 
  • while ISIS focuses on fighting a nearby enemy to defend the Islamic State, al-Qaida focuses on fighting an external enemy, i.e. the United States.,
  • e group still relies heavily on "older" platforms, like websites and forums, according to Weimann.
  • ecause al-Qaida is more focused on fighting Western influence, it is much more concerned with currying favor with the wider Muslim community.
  • ISIS glorifies violence
  • ISIS, all attention is good attention
  • ISIS's propaganda documentary Flames of War is produced in a Hollywood-esque fashion, complete with pyrotechnics and voice
  • appeal to a younger audience
  • al-Qaida's online magazine, Inspire,
  • al-Qaida leader Anwar al-Awlaki, which numbered over a thousand at one point before Google took them down. Al-Awlaki preaching directly into the camera for close to an hour is in stark contrast to ISIS's sophisticated and sensational production.
  • Weimann predicts al-Qaida will outlast ISIS. I
  • l-Qaida's network is much wider and more deeply rooted than that of ISIS.
  •  
    This article contrasts communication techniques of Al-Qaida and ISIS. It outlines how ISIS communication strategy uses more dominant forms of social media such as facebook, youtube, and twitter while Al-Qaida still uses web pages, forums, and their own magazine they publish to speak to their audience.
kkerby223

Using technology to empower women in Saudi Arabia - 0 views

  •  
    Princess Reema talks about her efforts to train women to join the workforce. She was recently interviewed on her thoughts of social media. She feels it is a strong driving force. What people say is heard immediately. It is making a very positive impact. She wants to teach women skills they need for work such as personal communication and what HR is.
hwilson3

Harvesting the Fruits of a Tech Revolution - 0 views

  •  
    With social media being such an open platform, it can lead to some issues. At the same time, people want to keep rights such as freedom of speech in place. This article discusses a conference held to uphold cyber safety in the Middle East. It discussed how important it is to protect this global platform because it connects the society around the globe in a way that the world has never seen
aacosta8

Egyptian Cyber Hackers Target ISIS, Muslim Brotherhood - Breitbart - 0 views

  •  
    The group displayed its tech expertise when it hacked an ISIS-posted audio message. The Egyptian Cyber Army then changed the audio, its transcript, and left behind an insignia that resembled that of the Egyptian military's. Some believe that the Egyptian Cyber Army is an independent entity, and it borrows inspiration from the 'hacktivist' Syrian Electronic Army outfit, Mashable reported.
mportie

Massive US-planned cyberattack against Iran went well beyond Stuxnet - 0 views

  •  
    The depth of US plans for a cyber war go beyond just the offense of the Stuxnet virus. The US had a contingency plan with nuclear Iranian facilities pinned as key target in case of an all out cyber war. The plans were drafted at the height of fear of Iran's development of potential nuclear weapons.
aacosta8

The Role of Technology in Egypt's Future - A Smarter Planet Blog - 0 views

  •  
    IBM has been doing business in Egypt in 1954, and we've continued to invest in the country and support our clients ever since. We're committed to helping Egypt develop a world-class tech infrastructure, even through the turbulent changes in government of the past few years.
eyadalhasan

Middle East investment in U.S. property rises as returns drag at home - 0 views

  •  
    The boarded-up building sat vacant on a tattered block in San Francisco until a small New York developer and a Kuwaiti real estate partner snapped it up in April 2014, attracted by the proximity to Twitter Inc and other tech companies.
eyadalhasan

Hackers Are Using Fake Terror Alert Emails to Spread Malware - 0 views

  •  
    With terrorism dominating the news, hackers are trying to exploit people's fears by posing as Dubai law enforcement and spreading malware. Hacker attacks are a main issue and used to spread malware and terrorist messages.
1 - 18 of 18
Showing 20 items per page