German Chancellor Merkel says Facebook, Google ‘distort perception,’

Posted by & filed under Civil Liberties, Ethical Issues, ethics, IT and Politics, IT and the law.

German Chancellor Angela Merkel launched a broadside at internet media giants, accusing them of “narrowing perspective,” and demanding they disclose their privately-developed algorithms. Merkel previously blamed social media for anti-immigrant sentiment and the rise of the far right. Source: RT News Date: November 1st, 2016 Link: https://www.rt.com/news/364235-merkel-facebook-google-algorithms/ Discussion 1) Is it possible that Facebook and Google algorithms could… Read more »

How the street light has been given a hi-tech makeover

Posted by & filed under Civil Liberties, Cloud Computing, Consumer Technology, Cybersecurity, Emerging Technologies.

Not only are light bulbs getting sharper and more energy efficient as they are upgraded to LEDs, but they increasingly help fight crime, promote safe cycling and even protect turtles.  That’s because street lights are also becoming the eyes and ears of “smart” cities.  Lamp posts double as data collectors, communicating with a central control… Read more »

Is that app you’re using for work a security threat?

Posted by & filed under App Economy, Civil Liberties, Cybersecurity, Ethical Issues.

When cybersecurity firm Imperva asked one of its banking clients how many apps it thought its staff were using, the firm estimated between 75 and 100 in total. The figure was actually closer to 800.  Why does this matter? Source: BBC Technology News Date: October 18th, 2016 Link: http://www.bbc.com/news/business-37541594 Discussion 1) “Cloud-based apps often gain access to the… Read more »

Meeting Cellebrite – Israel’s master phone crackers

Posted by & filed under Business Intelligence, Civil Liberties, Cybersecurity, Ethical Issues.

Cellebrite is an Israeli company that helps police forces gain access to data on the mobile phones of suspected criminals.  Cellebrite was in the headlines earlier this year when it was rumoured to have helped the FBI to crack an iPhone used by the San Bernardino shooter. Source: BBC Technology News Date: October 4th, 2016 Link to… Read more »

‘Shady, secretive system’: Public Safety green-lit RCMP, CSIS spying devices

Posted by & filed under Big Data, Civil Liberties, Ethical Issues.

Recent revelations in a Montreal court case that police are using electronic tools to scoop up mobile phone signals have prompted some experts to call for greater transparency in the approval and use of technologies that potentially violate privacy. Source: CBC Date: September 22nd, 2016 Link: http://www.cbc.ca/news/technology/government-surveillance-rules-rcmp-csis-1.3769014 Discussion 1) Should the RCMP have to tell the public what… Read more »

Kim Dotcom wins fight to live-stream court hearing on YouTube

Posted by & filed under Civil Liberties, Ethical Issues, IT and the law.

  Internet mogul Kim Dotcom, who’s wanted in the U.S. on criminal charges, has won permission for his court battle to be streamed online. Dotcom is fighting extradition from New Zealand to the U.S., where he’s accused of reproducing and distributing copyrighted content on a massive scale. Source: CNN Tech Date: September 8th, 2016 Link: http://money.cnn.com/2016/08/30/technology/kim-dotcom-hearing-livestream-new-zealand-us/index.html Discussion 1) “This is… Read more »

Who are the hackers who cracked the iPhone?

Posted by & filed under Civil Liberties, Competitive advantage, Cybersecurity.

  The cyber arms NSO Group was founded in 2010 and is based in Herzliya, an attractive city north of Tel Aviv that is known as being a cluster of tech start-ups. The group was likely funded by the elite 8200 Intelligence Unit, an Israeli military-funded scheme for start-ups. Source: BBC Technology Date: September 1st, 2016 Link: http://www.bbc.com/news/technology-37192670… Read more »

Counter-counter hacking

Posted by & filed under Business Intelligence, Civil Liberties, Cybersecurity.

  The whistleblower Edward Snowden believes Russia is behind a leak of malware allegedly belonging to the US National Security Agency (NSA).  Hackers calling themselves Shadow Brokers started an auction for the malware last week.  The malware is used by the NSA to attack or counter-attack in cyberspace. Source: BBC Technology Date: August 17th, 2016 Link: http://www.bbc.com/news/technology-37104745 Discussion… Read more »