Friday, 11 November 2011

Policy Issues : some possible leads ...

Please find below a collection of links I have collected over the past couple of months, loosely grouped. I hope these may provide food for thought as you prepare your essay for your final assignment.

These links are provided 'as is'. I make no guarantees that the information provided is reliable (it is up to you to judge that). You should not assume that my linking implies endorsement: I may (privately) endorse or condemn the views expoused.

Bill Gates Shaping the Internet is still available for comment on NB.

What are governments (and others) doing?

Neelie Kroes speech at EU Hackathon: on transparency and blocking (video)

"The future of the internet is too important to be left to chance" Foreign Secretary William Hague reflects on the London Conference on Cyberspace

Background Briefing from the US State Department on Hillary Clinton's Participation In the London Conference on Cyberspace

EU Politician Wants Internet Surveillance Built In to Every Operating System

The U.S is seeking detailed info on the trade impact of Chinese policies that block U.S. companies' websites in China

Google asked to remove 135 YouTube videos for 'UK national security issues'

NSA whistleblower Thomas Drake details intelligence cock-ups - 'Government and companies routinely abuse data privacy'

Who is spying on whom? A crowd-sourced Wiki for information on 'the intelligence contracting industry'.

Technological fixes?

Facebook's massive cyber-security system. Discovering what Facebook knows about you.

FBI official calls for secure, alternate net. Telecomix DNS is going next-level with its own decentralized infrastructure to replace the hierarchical DNS currently in place.

Google's advice on on-line safety.

Researchers developing cyber security software to wipe mobile data based on location

How could regulation make a difference?

Judge rules BT must pay for software that will block access to a site that links to free movies.

The worst thing about censorship is what you don't see

Unfortunately, "Google and the Culture of Search" will not be published until 2012. However, you may want to include your thoughts on "search technology’s broader implications for knowledge production and social relations" in your essay. Those without time machines will have to make do with other sources, and the publisher's blurb (follow the link for this), for inspiration:

Can an algorithm be wrong?

Better the devil you know ... What happens if the banks shut down wikileaks?

PROTECT IP Act would break DNS

Law professors say, "PROTECT IP Act is unconstitutional"

EFF on the PROTECT-IP act


Some recent news stories on copyright and IP.
Will Hollywood Break the Internet?
Copyright bill is the 'end of the Internet'.
Warner Bros issued takedowns for files they never saw—and didn't own.


Will Patents kill hte internet?

Hacking pro bono and otherwise

Online hackers threaten to expose drug cartel's secrets.
Denial of service: Wikipedia Italy went on strike against an 'idiotic proposed law' (lang=it : use Google translate).
Video: Attack of the Hactivists

The unmanned aircraft drones that USA uses to kill people in other nations have been hacked.

State-sponsored hacking in Germany

Hackers used a Trojan horse to break into the systems of more than 50 companies, many of them in the chemical and defense sectors. Symantec traces one command-and-control server to China.

How things go wrong

Programmer's error when creating a regular expression leads to calls for a criminal investigation

... the blame can be laid on a poorly-crafted regular expression. In computer science terms, regular expressions (often abbreviated as "regex") are used for complicated forms of text matching and substitution. They rank among the highest forms of programming arcana, primarily because of their flexibility, but are also some of the most prone to bugs.

Crowd-sourcing crime: Crowd-sourcing began as a legitimate tool to leverage the wisdom of the crowds; the same techniques are increasingly being adopted by the criminal underground for nefarious purposes. Video: The Business of Illegal Data
Feds Indict 7 in massive click-fraud scheme that hit 4 Million Computers

Stuxnet Clone 'Duqu' Possibly Preparing Power Plant Attacks. Windows kernel 'zero-day' found in Duqu attack

A week in Internet censorship: Thailand, Sri Lanka, Egypt, and a suit against Amesys for aiding Libyan surveillance.
U.S. Firm, Blue Coat, provides the technology that Syria uses to Block the Web. Blue Coat told investors its reputation could be harmed if foreign gov clients used tech to violate human rights. Washington Post on this Story

Chinese state media says three people have been arrested for "spreading false rumours" online, warning authorities will quash all such activity.

How WikiLeaks complicated the lives of Belarusian dissidents.
Researchers uncover privacy flaws that can reveal users' identities, locations and digital files. Someone hacked Israel's biometric database. Now 9 million people's personal info is on the loose.

No comments:

Post a Comment