Skip to main content

Home/ Future of the Web/ Group items tagged 17

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

VII FORO DE INDUSTRIAS CULTURALES | ¿Cultura o barbarie? Diez propuestas al b... - 0 views

  •  
    "PROGRAMA PROVISIONAL ¿Cultura o barbarie? Diez propuestas al borde del abismo Jueves, 5 de noviembre de 2015 Museo Nacional Centro de Arte Reina Sofía Mañana 10:30-12:00 h. Mesa institucional Intervienen: José Luis Acosta, presidente de la Sociedad de General de Autores y Editores (SGAE). Basilio Baltasar, director de la Fundación Santillana (área cultural). Fernando Carro, presidente de Bertelsmann España y miembro del Comité ejecutivo. Laura Halpern, directora de la Fundación Jesús Serra Ignacio Polanco, presidente de la Fundación Santillana. Pere Portabella, presidente de la Fundación Alternativas. 12:00-12:30 h. Pausa 12:30-14:00 h. El papel de las políticas y el Estado Modera: Luz Sanchez-Mellado, periodista de El País. Intervienen: Carmen Alborch, ex ministra de cultura y senadora. Juan Cruz, adjunto a la dirección de El País para Cultura y Babelia. Santiago Eraso, director de contenidos de Madrid Destino. Rosina Gómez-Baeza, presidenta de Factoría Cultural, Vivero de Industrias Creativas. Enric Juliana, periodista de La Vanguardia. César Antonio Molina, escritor y director de la Casa del Lector. 14:00-16:00 h. Almuerzo Tarde 16:00-17:30 h. Decálogo: exigencias y urgencias Modera: Joana Bonet, articulista de La Vanguardia. Intervienen: Antonio María Ávila, director ejecutivo de la Federación del Gremio de Editores. Jesús Cimarro, presidente de la Federación Estatal de Asociaciones de Empresas Productoras de Teatro y Danza de España. Ramon Colom, presidente FAPAE (Confederación de Productores Audiovisuales Españoles). Patricia Gabeiras, directora de Legal Music Producciones Vocal en la Junta Directiva de la Asociación de Promotores Musicales. Isidro López-Aparicio, artista plástico y miembro de la UAAV, Unión de Asociaciones de Artistas Visuales. Profesor de Bellas Artes de la Universidad de Granada y del I
  •  
    "PROGRAMA PROVISIONAL ¿Cultura o barbarie? Diez propuestas al borde del abismo Jueves, 5 de noviembre de 2015 Museo Nacional Centro de Arte Reina Sofía Mañana 10:30-12:00 h. Mesa institucional Intervienen: José Luis Acosta, presidente de la Sociedad de General de Autores y Editores (SGAE). Basilio Baltasar, director de la Fundación Santillana (área cultural). Fernando Carro, presidente de Bertelsmann España y miembro del Comité ejecutivo. Laura Halpern, directora de la Fundación Jesús Serra Ignacio Polanco, presidente de la Fundación Santillana. Pere Portabella, presidente de la Fundación Alternativas. 12:00-12:30 h. Pausa 12:30-14:00 h. El papel de las políticas y el Estado Modera: Luz Sanchez-Mellado, periodista de El País. Intervienen: Carmen Alborch, ex ministra de cultura y senadora. Juan Cruz, adjunto a la dirección de El País para Cultura y Babelia. Santiago Eraso, director de contenidos de Madrid Destino. Rosina Gómez-Baeza, presidenta de Factoría Cultural, Vivero de Industrias Creativas. Enric Juliana, periodista de La Vanguardia. César Antonio Molina, escritor y director de la Casa del Lector. 14:00-16:00 h. Almuerzo Tarde 16:00-17:30 h. Decálogo: exigencias y urgencias Modera: Joana Bonet, articulista de La Vanguardia. Intervienen: Antonio María Ávila, director ejecutivo de la Federación del Gremio de Editores. Jesús Cimarro, presidente de la Federación Estatal de Asociaciones de Empresas Productoras de Teatro y Danza de España. Ramon Colom, presidente FAPAE (Confederación de Productores Audiovisuales Españoles). Patricia Gabeiras, directora de Legal Music Producciones Vocal en la Junta Directiva de la Asociación de Promotores Musicales. Isidro López-Aparicio, artista plástico y miembro de la UAAV, Unión de Asociaciones de Artistas Visuales. Profesor de Bellas Artes de la Universidad de Granada y del I
Gonzalo San Gil, PhD.

Digital Citizen Study on Ad Sponsored Piracy | MUSIC * TECHNOLOGY * POLICY - 1 views

  • March 17, 2014 Chris Castle
  •  
    March 17, 2014 Chris Castle
Gonzalo San Gil, PhD.

10 excelentes alternativas a The Pirate Bay. | Eres algo inesperado - 0 views

  •  
    "17 diciembre, 2014 · de eresalgoinesperado · en Páginas Web. · Tras lo sucedido con la caída de The Pirate Bay, uno mayores portales de descarga de archivos Torrent a nivel mundial, por una operación policial relacionada con la violación de los derechos de autor, hoy os traigo una entrada un tanto especial y distinta a la que estamos acostumbrados." # ! Can't "shut down" #sharing minds...
  •  
    "17 diciembre, 2014 · de eresalgoinesperado · en Páginas Web. · Tras lo sucedido con la caída de The Pirate Bay, uno mayores portales de descarga de archivos Torrent a nivel mundial, por una operación policial relacionada con la violación de los derechos de autor, hoy os traigo una entrada un tanto especial y distinta a la que estamos acostumbrados."
Paul Merrell

The New Snowden? NSA Contractor Arrested Over Alleged Theft Of Classified Data - 0 views

  • A contractor working for the National Security Agency (NSA) was arrested by the FBI following his alleged theft of “state secrets.” More specifically, the contractor, Harold Thomas Martin, is charged with stealing highly classified source codes developed to covertly hack the networks of foreign governments, according to several senior law enforcement and intelligence officials. The Justice Department has said that these stolen materials were “critical to national security.” Martin was employed by Booz Allen Hamilton, the company responsible for most of the NSA’s most sensitive cyber-operations. Edward Snowden, the most well-known NSA whistleblower, also worked for Booz Allen Hamilton until he fled to Hong Kong in 2013 where he revealed a trove of documents exposing the massive scope of the NSA dragnet surveillance. That surveillance system was shown to have targeted untold numbers of innocent Americans. According to the New York Times, the theft “raises the embarrassing prospect” that an NSA insider managed to steal highly damaging secret information from the NSA for the second time in three years, not to mention the “Shadow Broker” hack this past August, which made classified NSA hacking tools available to the public.
  • Snowden himself took to Twitter to comment on the arrest. In a tweet, he said the news of Martin’s arrest “is huge” and asked, “Did the FBI secretly arrest the person behind the reports [that the] NSA sat on huge flaws in US products?” It is currently unknown if Martin was connected to those reports as well.
  • It also remains to be seen what Martin’s motivations were in removing classified data from the NSA. Though many suspect that he planned to follow in Snowden’s footsteps, the government will more likely argue that he had planned to commit espionage by selling state secrets to “adversaries.” According to the New York Times article on the arrest, Russia, China, Iran, and North Korea are named as examples of the “adversaries” who would have been targeted by the NSA codes that Martin is accused of stealing. However, Snowden revealed widespread US spying on foreign governments including several US allies such as France and Germany. This suggests that the stolen “source codes” were likely utilized on a much broader scale.
Paul Merrell

United States v. Cano, No. 17-50151 (9th Cir. 2019) :: Justia - 0 views

  • The Ninth Circuit reversed the district court's denial of defendant's motion to suppress evidence obtained from warrantless searches of his cell phone by a Customs and Border Patrol official. Applying United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013) (en banc), the panel held that manual cell phone searches may be conducted by border officials without reasonable suspicion but that forensic cell phone searches require reasonable suspicion. The panel clarified Cotterman by holding that "reasonable suspicion" in this context means that officials must reasonably suspect that the cell phone contains digital contraband. Furthermore, cell phone searches at the border, whether manual or forensic, must be limited in scope to a search for digital contraband. In this case, the panel held that the officials violated the Fourth Amendment when their warrantless searches exceeded the permissible scope of a border search. Therefore, most of the evidence from the searches of defendant's cell phone should have been suppressed. Finally, the panel held that defendant's Brady claims were unpersuasive. Because the panel vacated defendant's conviction, the panel did not reach his claim of prosecutorial misconduct.
Gonzalo San Gil, PhD.

Cybersecurity law given thumbs up by European Union's ministers | Ars Technica UK - 0 views

  •  
    "Former adoption paves way for legislation at national level within next two years. by Jennifer Baker - May 17, 2016 1:47pm CEST"
  •  
    "Former adoption paves way for legislation at national level within next two years. by Jennifer Baker - May 17, 2016 1:47pm CEST"
Gonzalo San Gil, PhD.

Rightscorp Revenues Collapse, Pirates Too Hard to Track - TorrentFreak - 1 views

  •  
    " By Andy on May 17, 2016 C: 118 Breaking Anti-piracy outfit Rightscorp has just turned in another set of dismal results. During the past three months revenues plummeted 78% versus the same period last year with the company recording a net loss of $784,000. Pirates, it appears, are becoming harder to track and threaten."
  •  
    " By Andy on May 17, 2016 C: 118 Breaking Anti-piracy outfit Rightscorp has just turned in another set of dismal results. During the past three months revenues plummeted 78% versus the same period last year with the company recording a net loss of $784,000. Pirates, it appears, are becoming harder to track and threaten."
Gonzalo San Gil, PhD.

10 Tips to Push Your Git Skills to the Next Level - 1 views

  •  
    " Published June 17, 2014 Tweet Subscribe Recently we published a couple of tutorials to get you familiar with Git basics and using Git in a team environment. The commands that we discussed were about enough to help a developer survive in the Git world. In this post, we will try to explore how to manage your time effectively and make full use of the features that Git provides."
  •  
    " Published June 17, 2014 Tweet Subscribe Recently we published a couple of tutorials to get you familiar with Git basics and using Git in a team environment. The commands that we discussed were about enough to help a developer survive in the Git world. In this post, we will try to explore how to manage your time effectively and make full use of the features that Git provides."
Gonzalo San Gil, PhD.

'Pirate' Site ISP Blockades Reversed By Court | TorrentFreak - 0 views

  •  
    " Andy on July 17, 2014 C: 0 Breaking As Spain struggles with its continuing online piracy problems, a local court has issued an order for several file-sharing sites to be unblocked by ISPs. The decision overturns a ruling in May which required the service providers to censor torrent and download sites on copyright infringement grounds."
  •  
    " Andy on July 17, 2014 C: 0 Breaking As Spain struggles with its continuing online piracy problems, a local court has issued an order for several file-sharing sites to be unblocked by ISPs. The decision overturns a ruling in May which required the service providers to censor torrent and download sites on copyright infringement grounds."
Gonzalo San Gil, PhD.

Coding is fun! Europe Code Week is back | 08 Oct 14 Robin Muilwijk | Opensource.com - 1 views

  •  
    Interview with Alja Isakovic of Europe Code Week "Europe Code Week is organized by Neelie Kroes' Young Advisors with the support from DG Connect at the European Commission and runs from October 11 - 17 this year. It's a program all about teaching kids and adults how to code and understand more about technology."
  •  
    Interview with Alja Isakovic of Europe Code Week "Europe Code Week is organized by Neelie Kroes' Young Advisors with the support from DG Connect at the European Commission and runs from October 11 - 17 this year. It's a program all about teaching kids and adults how to code and understand more about technology."
Gonzalo San Gil, PhD.

10 de octubre de 2015 - Stop TTIP - Español Stop TTIP - Español - 0 views

  •  
    "Del 10 al 17 de octubre de 2015 tendrá lugar la semana de movilización contra TTIP, CETA, TiSA y TPP."
  •  
    "Del 10 al 17 de octubre de 2015 tendrá lugar la semana de movilización contra TTIP, CETA, TiSA y TPP."
Gonzalo San Gil, PhD.

Windows 10 updates to be automatic and mandatory for Home users | Ars Technica - 0 views

  •  
    "by Peter Bright - Jul 17, 2015 3:22 am UTC Share Tweet 84 Windows Update can't be readily disabled in Windows 10 Home, and the license terms that all users must agree to allow Microsoft to install updates automatically."
  •  
    "by Peter Bright - Jul 17, 2015 3:22 am UTC Share Tweet 84 Windows Update can't be readily disabled in Windows 10 Home, and the license terms that all users must agree to allow Microsoft to install updates automatically."
Gonzalo San Gil, PhD.

The Linux Rain - Scripting a fancy chooser for recently used files - 0 views

  •  
    "By Bob Mesibov, published 17/08/2015 I recently scripted a GUI dialog that lists my 10 most recently modified files in reverse chronological order and allows me to choose more than 1 file for opening. The dialog is launched with a keyboard shortcut and is shown here with 2 files selected:"
  •  
    "By Bob Mesibov, published 17/08/2015 I recently scripted a GUI dialog that lists my 10 most recently modified files in reverse chronological order and allows me to choose more than 1 file for opening. The dialog is launched with a keyboard shortcut and is shown here with 2 files selected:"
Gonzalo San Gil, PhD.

MPAA: Google Assists and Profits from Piracy | TorrentFreak - 0 views

  •  
    " Ernesto on June 17, 2015 C: 0 Breaking The MPAA is refusing to hand over documentation discussing the legal case it helped Mississippi State Attorney General Jim Hood build against Google. According to the Hollywood group, Google is waging a PR war against Hollywood while facilitating and profiting from piracy."
  •  
    " Ernesto on June 17, 2015 C: 0 Breaking The MPAA is refusing to hand over documentation discussing the legal case it helped Mississippi State Attorney General Jim Hood build against Google. According to the Hollywood group, Google is waging a PR war against Hollywood while facilitating and profiting from piracy."
Paul Merrell

Rapid - Press Releases - EUROPA - 0 views

  • MEMO/09/15 Brussels, 17th January 2009
  • The European Commission can confirm that it has sent a Statement of Objections (SO) to Microsoft on 15th January 2009. The SO outlines the Commission’s preliminary view that Microsoft’s tying of its web browser Internet Explorer to its dominant client PC operating system Windows infringes the EC Treaty rules on abuse of a dominant position (Article 82).
  • In the SO, the Commission sets out evidence and outlines its preliminary conclusion that Microsoft’s tying of Internet Explorer to the Windows operating system harms competition between web browsers, undermines product innovation and ultimately reduces consumer choice. The SO is based on the legal and economic principles established in the judgment of the Court of First Instance of 17 September 2007 (case T-201/04), in which the Court of First Instance upheld the Commission's decision of March 2004 (see IP/04/382), finding that Microsoft had abused its dominant position in the PC operating system market by tying Windows Media Player to its Windows PC operating system (see MEMO/07/359).
  • ...3 more annotations...
  • The evidence gathered during the investigation leads the Commission to believe that the tying of Internet Explorer with Windows, which makes Internet Explorer available on 90% of the world's PCs, distorts competition on the merits between competing web browsers insofar as it provides Internet Explorer with an artificial distribution advantage which other web browsers are unable to match. The Commission is concerned that through the tying, Microsoft shields Internet Explorer from head to head competition with other browsers which is detrimental to the pace of product innovation and to the quality of products which consumers ultimately obtain. In addition, the Commission is concerned that the ubiquity of Internet Explorer creates artificial incentives for content providers and software developers to design websites or software primarily for Internet Explorer which ultimately risks undermining competition and innovation in the provision of services to consumers.
  • Microsoft has 8 weeks to reply the SO, and will then have the right to be heard in an Oral Hearing should it wish to do so. If the preliminary views expressed in the SO are confirmed, the Commission may impose a fine on Microsoft, require Microsoft to cease the abuse and impose a remedy that would restore genuine consumer choice and enable competition on the merits.
  • A Statement of Objections is a formal step in Commission antitrust investigations in which the Commission informs the parties concerned in writing of the objections raised against them. The addressee of a Statement of Objections can reply in writing to the Statement of Objections, setting out all facts known to it which are relevant to its defence against the objections raised by the Commission. The party may also request an oral hearing to present its comments on the case. The Commission may then take a decision on whether conduct addressed in the Statement of Objections is compatible or not with the EC Treaty’s antitrust rules. Sending a Statement of Objections does not prejudge the final outcome of the procedure. In the March 2004 Decision the Commission ordered Microsoft to offer to PC manufacturers a version of its Windows client PC operating system without Windows Media Player. Microsoft, however, retained the right to also offer a version with Windows Media Player (see IP/04/382).
  •  
    It's official, hot off the presses (wasn't there a few minutes ago). We're now into a process where DG Competition will revisit its previous order requiring Microsoft to market two versions of Windows, one with Media Player and one without. DG Competition staff were considerably outraged that Microsoft took advantage of a bit of under-specification in the previous order and sold the two versions at the same price. That detail will not be neglected this time around. Moreover, given the ineffectiveness of the previous order in restoring competition among media players, don't be surprised if this results in an outright ban on bundling MSIE with Windows.
Gonzalo San Gil, PhD.

Popcorn Time Now "Impossible" to Shut Down | TorrentFreak - 1 views

  •  
    " Ernesto on November 6, 2014 C: 17 News The Popcorn Time fork formally known as Time4Popcorn has released a new version of its client which they say is "impossible" to take down. The change is a direct response to the EURid domain suspension last month. In addition, the fork promises to enable seeding support so its users have the option not to leech from the BitTorrent network."
  •  
    " Ernesto on November 6, 2014 C: 17 News The Popcorn Time fork formally known as Time4Popcorn has released a new version of its client which they say is "impossible" to take down. The change is a direct response to the EURid domain suspension last month. In addition, the fork promises to enable seeding support so its users have the option not to leech from the BitTorrent network."
Gonzalo San Gil, PhD.

Teen Pirates Pay For Movies More Often Than Non-Pirates | TorrentFreak - 0 views

  •  
    " Andy on October 15, 2014 C: 32 Breaking A new study carried out in Australia has found that most 12-17 year-old teens are not online pirates, with around 74% abstaining from the habit. However, those that do consume illegally tend to buy, rent and visit the movies more often than their non-pirating counterparts." [# ! Stop calling #sharers # !'#Pirates' # ! They are just #FreeThinkers... # ! And, above all, they are the #Industry's Life #Support]
  •  
    " Andy on October 15, 2014 C: 32 Breaking A new study carried out in Australia has found that most 12-17 year-old teens are not online pirates, with around 74% abstaining from the habit. However, those that do consume illegally tend to buy, rent and visit the movies more often than their non-pirating counterparts."
Paul Merrell

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - ... - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
Gonzalo San Gil, PhD.

Universal Music Can Delete Any SoundCloud Track Without Oversight | TorrentFreak - 0 views

  •  
    [# ! delete remotely... without oversight? #imagine ... any '#whateveholder' indiscriminately #removing #content from disks w@rldwide...] " Ernesto on July 3, 2014 C: 17 News In a bid to tackle alleged infringement, popular music sharing platform SoundCloud is offering unlimited removal powers to certain copyright holders. Responding to a complaint from a UK DJ the company admitted that Universal Music can delete any and all SoundCloud tracks without oversight."
  •  
    [# ! delete remotely... without oversight? who? what? why?] " Ernesto on July 3, 2014 C: 17 News In a bid to tackle alleged infringement, popular music sharing platform SoundCloud is offering unlimited removal powers to certain copyright holders. Responding to a complaint from a UK DJ the company admitted that Universal Music can delete any and all SoundCloud tracks without oversight."
Gonzalo San Gil, PhD.

Why open source runs the world | News | TechRadar - 0 views

  •  
    "Analysis Discover the secret sauce that greases the internet's wheels By Neil Mohr 21st Nov 2014 | 17:30"
  •  
    "Analysis Discover the secret sauce that greases the internet's wheels By Neil Mohr 21st Nov 2014 | 17:30 Comments "
1 - 20 of 132 Next › Last »
Showing 20 items per page