- Obama signs cybersecurity executive order ahead of State Of The Union (ZDNet, Feb 13, 2013):
Summary: President Obama unexpectedly signed an executive Order on cybersecurity prior to tonight’s State of the Union address. UPDATED: Links to the Order and “new” CISPA added.
President Obama signed an executive order aimed at bolstering U.S. cybersecurity prior to tonight’s State of the Union address. The Order precedes a House Homeland Security Committee hearing on “new threats.”
It is the government’s latest move in attempting to deal with cyber threats, and the order has not undergone any public technical, rights-based, or privacy review.
The Order “enables the government to share more information with private industry partners and developing a new framework of practices to reduce cybersecurity risks.” Continue reading »
YouTube Added: 11.02.2013
First TRAPWIRE, now RIOT, the new product from the defence company, Raytheon, and which is featured in the above video. RIOT will use GPS and other technologies to track people anywhere in the world. It also boast predictive capabilities (work out the most likely location the target will go to next). RIOT will basically search, analyse and organise all social network content globally.
- UK government plans to track ALL web use: MI5 to install ‘black box’ spy devices to monitor British internet traffic (Daily Mail, Feb 6, 2013):
MPs’ report outlines spooks’ take on the draft Communications Data Bill It shows they are keen to implement nationwide surveillance regime They want ISPs to install ‘black boxes’ that can inspect all internet traffic Spies claim they are only interested in ‘communications data’ Campaigners warn it will give spies unprecedented surveillance powers
UK spy agencies want to install ‘black box’ surveillance devices across the country’s communications networks to monitor internet use, it emerged today.
A report by an influential committee of MPs tells how spooks are keen to implement a nationwide surveillance regime aimed at logging nearly everything Britons do and say online.
The spy network will rely on a technology known as Deep Packet Inspection to log data from communications ranging from online services like Facebook and Twitter, Skype calls with family members and visits to pornographic websites.
Tags: 1984, Big Brother, Dictatorship, Facebook, Fascism, George Orwell, Global News, Government, Internet, Jonathan Evans, Law, MI5, New World Order, Politics, Privacy, Skype, Society, Surveillance, Twitter, U.K.
- Library of Congress almost done archiving 170 billion tweets (RT, Jan 7, 2013):
Don’t let that dwindling number of Twitter followers drag you down: users of the successful social networking service are about to have a huge new audience as the Library of Congress nears archiving every public tweet ever sent.
In a new statement released by the largest library in the world, Washington’s premiere research center says it is almost done with the first steps in a project involving a massive trove of micromessages sent over Twitter going all the way back to when the site first got off the ground in 2006 [.pdf].
In April 2010, Twitter announced that every public tweet published since its inception would be added to the Library of Congress so that the Untied State’s top researchers could have access to a then-untapped form of correspondence that was thought to be on the way to becoming as commonplace as snail mail. Today, they admit that they’ve almost reached that goal.
- Tweeters ‘could be military targets’ (The Age, Dec 13, 2012):
Social media users who use tweets and online posts to comment on a military operation could be regarded as legitimate military targets.
Australian army Land Warfare Studies Centre analyst Chloe Diggins on Thursday said a recent social media war between Israel and Hamas raised complex ethical questions about who was a combatant and therefore a legitimate military target.
A key question was whether such comments constituted an act of war.
“If that’s the case, this might mean that those using social media in support of military operations are now legitimate targets,” she wrote in a blog for the Australian Strategic Policy Institute.
United Nations report calls for Internet surveillance, saying lack of “internationally agreed framework for retention of data” is a problem, as are open Wi-Fi networks in airports, cafes, and libraries.
- U.N. calls for ‘anti-terror’ Internet surveillance (CNET, Oct 22, 2012):
The United Nations is calling for more surveillance of Internet users, saying it would help to investigate and prosecute terrorists.
A 148-page report (PDF) released today titled “The Use of the Internet for Terrorist Purposes” warns that terrorists are using social networks and other sharing sites including Facebook, Twitter, YouTube, and Dropbox, to spread “propaganda.”
“Potential terrorists use advanced communications technology often involving the Internet to reach a worldwide audience with relative anonymity and at a low cost,” said Yury Fedotov, executive director of the U.N. Office on Drugs and Crime (UNODC).
- Obama has millions of fake Twitter followers (USA Today, Aug 24, 2012):
President Obama’s Twitter account has 18.8 million followers — but more than half of them really don’t exist, according to reports.A new Web tool has determined that 70% of Obama’s crowd includes “fake followers,” The New York Times reports in a story about how Twitter followers can be purchased.
“The practice has become so widespread that StatusPeople, a social media management company in London, released a Web tool last month called the Fake Follower Check that it says can ascertain how many fake followers you and your friends have,” the Times reports. Continue reading »