Share this post with Digg

Encrypted technologies and terrorism

An armed police officer stands guard opposite the Houses of Parliament after the March 22, 2017 London attack. (Photo credits: AFP)

The Wikipedia for Spies—And Where It Goes From Here

Yes, the intelligence community crowdsources, too

What the Public Knows About Cybersecurity

Before you read the report, test your cybersecurity knowledge by taking the interactive quiz. The short quiz tests your knowledge of questions recently asked in a national poll. After completing the quiz, you can compare your score with the general public and learn more about the terms and topics in each question.

Take the Quiz

WikiLeaks’ latest document dump allegedly shows the CIA has devoted a lot of time to going after Apple products.


The latest in Twitter’s transparency briefs shows how much terrorism effects the flow of social media and what the company has been doing to help combat the threat on its popular platform. Twitter released it’s tenth transparency report today, which covers the back half of 2016. The report includes information on legal requests the company has received, including content removal, copyright violations, and account information requests. The company also discloses what percentage of requests it’s complied with. The countries which issued the most legal content removal requests — that’s requests issued by governments, organizations, and lawyers representing individuals for removal of content…

The UK government wants there to be “no place for terrorists to hide,” and that includes on encrypted messaging services. The company first on its agenda? WhatsApp.

Brands boycotted Google this past week when they learned their ads were appearing on hateful videos. The pressure could finally force the company to change.

The European Union Intellectual Property Office has published the findings of a new study commissioned from Deloitte which aims to better understand how EU citizens perceive intellectual property issues.

Last year the UK Government introduced the Digital Economy Bill, which is set to revamp current copyright legislation.

One of the most controversial proposals is to lengthen the maximum sentence for online copyright infringement, without a clear criminal threshold.

Vault 7: CIA Hacking Tools Revealed | Wikileaks

[Source: https://wikileaks.org/ciav7p1/%5D Contents • Press Release • Analysis • Examples • Frequently Asked Questions   Press Release Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeak

Tagged in: , , , , , , , , ,

%d bloggers like this: