Google, Twitter help give voice to Egyptians

Posted by & filed under cyber terroism, cyber war, digital divide, Digital Policy, IS ethics, Social Media, Uncategorized, wireless networks.

Description: CNN’s Josh Levs talks about how technology plays a part in protests around the world Source: CNN.com Date: Jan 29, 2011 Last week, as demonstrators angry with the policies of Egyptian President Hosni Mubarak took to the streets, the government shut down social-media websites, then blacked out all internet access in much of the country. On… Read more »

Security needs drive cyberforensics industry

Posted by & filed under Biometrics, cyber terroism, Cyberforensics, industry analysis, Privacy, Security.

Description: Cyberforensics, the science of finding and securing digital evidence buried deep within company networks, is fast emerging as a global industry. Source: USAToday.com Date: Nov 23, 2010 Three major players are in the vanguard.PricewaterhouseCoopers has recently hired several former law enforcement agents and prosecutors to supplement its cyberforensic services, which already have 3,000 employees… Read more »

Canada’s culture can still make its mark on the Internet

Posted by & filed under cyber terroism, cyber war, national culture, Privacy.

Description: The boundless promise of the Internet come three challenges to nationhood and country: to our common culture, because the Internet has little regard for content restrictions. Source: Globe and Mail Date: Nov 24, 2010 Culture: Canadians are creating great art and inventing new forms of communication inspired by and adapted for the Internet: artful… Read more »

The Internet needs peacekeepers. Is Canada ready?

Posted by & filed under cyber terroism, cyber war.

Description: It is a crime in progress, a cyber-fraud network that moves with blistering efficiency between servers in England, criminals in Russia and victims around the globe. It is borderless, profitable and almost impossible to stop. It is the digital future of criminality. Source: Globe and Mail Date: Nov 24, 2010 But perhaps the scariest… Read more »

Worm Was Perfect for Sabotaging Centrifuges

Posted by & filed under cyber terroism, cyber war, Security.

Description: Experts dissecting the computer worm suspected of being aimed at Iran’s nuclear program have determined that it was precisely calibrated in a way that could send nuclear centrifuges wildly out of control. Source: The New York Times Date: Nov 18, 2010 Their conclusion, while not definitive, begins to clear some of the fog around the Stuxnet… Read more »