‘Shady, secretive system’: Public Safety green-lit RCMP, CSIS spying devices

Posted by & filed under Big Data, Civil Liberties, Ethical Issues.

Recent revelations in a Montreal court case that police are using electronic tools to scoop up mobile phone signals have prompted some experts to call for greater transparency in the approval and use of technologies that potentially violate privacy. Source: CBC Date: September 22nd, 2016 Link: http://www.cbc.ca/news/technology/government-surveillance-rules-rcmp-csis-1.3769014 Discussion 1) Should the RCMP have to tell the public what… Read more »

Kim Dotcom wins fight to live-stream court hearing on YouTube

Posted by & filed under Civil Liberties, Ethical Issues, IT and the law.

  Internet mogul Kim Dotcom, who’s wanted in the U.S. on criminal charges, has won permission for his court battle to be streamed online. Dotcom is fighting extradition from New Zealand to the U.S., where he’s accused of reproducing and distributing copyrighted content on a massive scale. Source: CNN Tech Date: September 8th, 2016 Link: http://money.cnn.com/2016/08/30/technology/kim-dotcom-hearing-livestream-new-zealand-us/index.html Discussion 1) “This is… Read more »

Who are the hackers who cracked the iPhone?

Posted by & filed under Civil Liberties, Competitive advantage, Cybersecurity.

  The cyber arms NSO Group was founded in 2010 and is based in Herzliya, an attractive city north of Tel Aviv that is known as being a cluster of tech start-ups. The group was likely funded by the elite 8200 Intelligence Unit, an Israeli military-funded scheme for start-ups. Source: BBC Technology Date: September 1st, 2016 Link: http://www.bbc.com/news/technology-37192670… Read more »

Counter-counter hacking

Posted by & filed under Business Intelligence, Civil Liberties, Cybersecurity.

  The whistleblower Edward Snowden believes Russia is behind a leak of malware allegedly belonging to the US National Security Agency (NSA).  Hackers calling themselves Shadow Brokers started an auction for the malware last week.  The malware is used by the NSA to attack or counter-attack in cyberspace. Source: BBC Technology Date: August 17th, 2016 Link: http://www.bbc.com/news/technology-37104745 Discussion… Read more »