Skip to main content

Home/ Digit_al Society/ Group items tagged security politics and government

Rss Feed Group items tagged

dr tech

Iran accused of using online censorship and hacking to sway presidential poll... - 0 views

  •  
    "Keyword-based filtering allows blocking of sites and texts containing candidates' names and slogans, say security experts"
dr tech

Singapore to work with New Zealand to tackle terrorism and violent extremism - 0 views

  •  
    "Launched in response to terror attacks in New Zealand in May, where a lone gunman killed 51 people at two mosques in Christchurch while livestreaming the massacre on Facebook, it calls for the "effective enforcement" of laws prohibiting the dissemination of terrorist content. It also states that all action on the issue must be consistent with the principles of a free, open and secure Internet, without compromising freedom of expression."
dr tech

Great Firewall of Cameron blocks Parliamentary committee on rendition/torture - Boing B... - 0 views

  •  
    "Like China's Great Firewall, the UK firewall is a patchwork of rules and filters that are opaque to users and regulators. Every ISP uses its own censorship supplier to spy on its customers and decide what they're allowed to see, and they change what is and is not allowed from moment to moment, with no transparency into how, when or why those decisions are being made. "
dr tech

Gun Detection AI is Being Trained With Homemade 'Active Shooter' Videos - 0 views

  •  
    "The point of creating this vast portfolio of digital gun art is to feed an algorithm made to detect a firearm as soon as a security camera catches it being drawn by synthetically creating tens of thousands of ways each gun may appear. Arcarithm is one of several companies developing automated active shooter detection technology in the hopes of selling it to schools, hotels, entertainment venues and the owners of any location that could be the site of one of America's 15,000 annual gun murders and 29,000 gun injuries."
dr tech

The US has suffered a massive cyberbreach. It's hard to overstate how bad it is | Techn... - 1 views

  •  
    "This is called a supply-chain attack, because it targets a supplier to an organization rather than an organization itself - and can affect all of a supplier's customers. It's an increasingly common way to attack networks. Other examples of this sort of attack include fake apps in the Google Play store, and hacked replacement screens for your smartphone."
dr tech

The Citizen crime app hasn't made me safer - just more scared | Emma Brockes | Opinion ... - 0 views

  •  
    "Citizen, which was launched in 2017, is a glorified police scanner that promises to help users "stay safe and informed". It invites input from witnesses - mostly involving shaky phone footage of police milling around while a stretcher is carted by in the background - and, bafflingly, includes a comments section, in which users speculate fatuously on the crime in question and quibble over the accuracy of the map function. It is grimly fascinating, mildly addictive and, relative to its stated aims, totally without value."
dr tech

Tech firms sign 'reasonable precautions' to stop AI-generated election chaos | Artifici... - 0 views

  •  
    "Major technology companies signed a pact Friday to voluntarily adopt "reasonable precautions" to prevent artificial intelligence tools from being used to disrupt democratic elections around the world. Executives from Adobe, Amazon, Google, IBM, Meta, Microsoft, OpenAI and TikTok gathered at the Munich Security Conference to announce a new framework for how they respond to AI-generated deepfakes that deliberately trick voters. Twelve other companies - including Elon Musk's X - are also signing on to the accord."
dr tech

Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites / B... - 0 views

  •  
    "There aren't many exit nodes out there. Many people fear that running an exit node will put them in police crosshairs if it gets used in the commission of a crime. For the record, Boing Boing runs a very high-capacity exit node, and though we've received multiple contacts from US law enforcement, we've just explained that this is a Tor node that runs with logging switched off, and thus we have no information that'll be relevant to any investigations, and the officers involved have thanked us and gone away without further trouble. "
dr tech

Why we should ban facial recognition technology everywhere / Boing Boing - 0 views

  •  
    YES IAN YOU SHOULD BE READING THIS! "The authors raise three arguments: first, that "notice and choice" has been a failure ("to opt out simply stay indoors!"); second, that facial recognition fears are technophobic overreactions, and finally, that facial recognition is uniquely powerful and dangerous and needs a regulatory framework separate from other privacy rules ("to opt out, just don't have a face")."
dr tech

TikTok sale: Trump approves Microsoft's plan but says US should get a cut of any deal |... - 0 views

  •  
    "On Monday China's foreign ministry said it strongly opposed any US actions against Chinese software companies, and it hoped the US could stop its "discriminatory policies". Pompeo told Fox that countless Chinese software companies were "feeding data directly to the Chinese Communist party, their national security apparatus". "Could be their facial recognition patterns. It could be information about their residence, their phone numbers, their friends, who they're connected to. Those are the issues that President Trump has made clear we're going to take care of," he said."
dr tech

NSA intimidation expanding surveillance state: Column - 0 views

  •  
    "There it is. If you run a business, and the FBI or NSA want to turn it into a mass surveillance tool, they believe they can do so, solely on their own initiative. They can force you to modify your system. They can do it all in secret and then force your business to keep that secret. Once they do that, you no longer control that part of your business. You can't shut it down. You can't terminate part of your service. In a very real sense, it is not your business anymore. It is an arm of the vast U.S. surveillance apparatus, and if your interest conflicts with theirs then they win. Your business has been commandeered."
dr tech

Open Rights Group - ISC report into Lee Rigby's murder is misleading - 0 views

  •  
    ""When the intelligence services are gathering data about every one of us but failing to act on intelligence about individuals, they need to get back to basics, and look at the way they conduct targeted investigations. "The committee is particularly misleading when it implies that US companies do not co-operate, and it is quite extraordinary to demand that companies pro-actively monitor email content for suspicious material. Internet companies cannot and must not become an arm of the surveillance state."
dr tech

'The release of six decades of fear': Egypt's lost revolution | Egypt | The Guardian - 0 views

  •  
    "By then, calls over social media for crowds to gather in areas of Cairo, and converge in public spaces had built an unstoppable momentum. "Social media was the most important tool in the revolution," said Abdelkarim. "People could communicate very easily and express themselves without any censorship." Mubarak's police state was over run by dissenters with smartphones and Facebook accounts."
dr tech

Reddit kills snooping 'warrant canary' - BBC News - 0 views

  •  
    "The FBI can issue national security letters to conduct online surveillance in the US without court approval, but requests often come with a gagging order, which prevents websites from publicly disclosing them. To get around this, many websites state that they have not received any classified requests."
dr tech

Anyone who makes you choose between privacy and security wants you to have neither - Bo... - 0 views

  •  
    "It's clear that surveillance affects a broad group of people, with real painful consequences for their lives. We've seen journalists being monitored, lawyers having their client confidentiality broken, victims of police misconduct being spied on and environmental campaigns infiltrated. These people are not criminals, and yet when we have a system of mass surveillance, they become targets for increasingly intrusive powers. "
dr tech

US Central Command Twitter account hacked to read 'I love you Isis' | US news | The Gua... - 0 views

  •  
    "In an act of cyber vandalism that appeared more embarrassing than destructive, the Twitter and YouTube accounts for US military forces in the Middle East and South Asia were hacked by supporters of Islamic State militants on Monday."
dr tech

FBI warns of look-alike election sites that could mess with voting - 1 views

  •  
    "Dubbed typosquatting, the idea is simple (if devious): A hacker registers a domain that is close enough to a real site, like yourbanknarne.com, and puts up a clone of yourbankname.com. The unsuspecting victim goes to the wrong site by mistake, and enters their personal banking information. In doing so, they have inadvertently handed the digital keys to their account to a hacker. "
ocean14

Strengthening National Security and Privacy in the Digital Era - Office of the Privacy ... - 1 views

  •  
    The Canadian office of primary commissioner stated the changes in the privacy policies, especially after 9-11 when the privacy laws were looked past to concentrate on the gathering of information to reduce terrorism in the US and Canada with no real results. However, this problem has been tackled in Canada and stated that they "believe that Canadians deserve federal privacy laws based on rights. The incorporation of a rights-based framework in our privacy laws would help support responsible innovation and foster trust in government, giving people confidence to fully participate in the digital age."
dr tech

Myanmar's Military Deploys Digital Arsenal of Repression in Crackdown - The New York Times - 0 views

  •  
    "The software is made by BlackBag Technologies, an American company that was bought last year by Cellebrite of Israel. Both companies also make other sophisticated tools to infiltrate locked or encrypted devices and suck out their data, including location-tracking information."
« First ‹ Previous 41 - 60 of 78 Next ›
Showing 20 items per page