asterisk2a + cyber   253

Couple scammed out of £57,000 fear being homeless at Christmas | Money | The Guardian
doesn't even need social engineering. just very targeted, knowing their business, hacking attack (eg phishing through password change see podesta) and remain undetected for a long time just listening in on the email inbox. and jumping in when the situation comes. // in the end encryption didn't help. would help if there were a 2-auth process for those transactions (business ops, business it security) if you cant be 100% sure that your employees fall for phishing, impersonation, or social engineering (there have been reports of secretaries and assistants falling for social engineering to transfer large amounts for bogus but believable business transactions)
phishing  fraud  scam  cyber  IT  security  private  end  user  social  engineering  crime  impersonation  identity 
november 2017 by asterisk2a
Israeli spies 'watched Russian agents breach Kaspersky software' - BBC News
Israeli spies looked on as Russian hackers breached Kaspersky cyber-security software two years ago, US media report.
The Russians were allegedly attempting to gather data on US intelligence programs, according to the New York Times and Washington Post.
Israeli agents made the discovery after breaching the software themselves.
Kaspersky has said it was neither involved in nor aware of the situation and denies collusion with authorities.
Last month, the US government decided to stop using the Russian firm's software on its computers.
The Israelis are said to have notified the US, which led to the ban on Kaspersky programs.
coldwar  cyber  cold  war  hacking  coldwar20  cyberwar  leak  Wikileaks  Israel  Iran  Russia  USA  European  Union  cable  EU  Germany  spying  Lauschangriff  Angela  Merkel  AngelaMerkel  Security  IT  economic  damage 
october 2017 by asterisk2a
UK's Trident nuclear submarines 'vulnerable to catastrophic hack' | UK news | The Guardian
“To imagine that critical digital systems at the heart of nuclear weapon systems are somehow immune or can be confidently protected by dedicated teams of network managers is to be irresponsibly complacent.”
Trident  nuclear  war  WannaCry  cyber  cyberhack  cyberattack  WinXP  WindowsXP  NHS  NSA  FBI  Wikileaks  Microsoft 
june 2017 by asterisk2a
Watchdog says police cuts have left forces in 'perilous state' | UK news | The Guardian
Government austerity blamed in report, which shows stretched forces downgrading calls and leaving suspects at large [ ie case where women calls police about burglary, says tracking of her ipad shows where it is, police call handler says 'go knock on their door' ]
Police  Austerity  UK  Tories  Home  Office  Theresa  May  nasty  party  Conservative  digital  crime  cybercrime  cyber 
march 2017 by asterisk2a
Putin decides against tit-for-tat expulsion of US diplomats - BBC News
He said Russia would not "stoop" to the level of "irresponsible diplomacy" but would work to restore ties with America under President-elect Donald Trump.
cyberwar  Cold  War  2.0  USA  Russia  Putin  vladimirputin  donaldtrump  Donald  Trump  BarackObama  cyberattack  cyber  attack  Wikileaks  Whistleblower 
december 2016 by asterisk2a
Bruce Schneier: 'The Internet Era of Fun and Games Is Over' | The Daily Dot
That’s not necessarily what Schneier wants, but he recognizes its necessity.

“I don’t like this,” he concluded. “I like the world where the internet can do whatever it wants, whenever it wants, at all times. It’s fun. This is a fun device. But I’m not sure we can do that anymore.”
self-regulation  DDoS  cyber  warfare  attack  Malware  Internet  IoT  Regulation  oversight 
november 2016 by asterisk2a
China warns of 'crucial juncture' over Hinkley delay - BBC News
Writing in the Financial Times, Liu Xiaoming said the delay to approving the plant had brought the two countries to a "crucial historical juncture".
He hinted that "mutual trust" could be in jeopardy if the UK Government decided not to approve the deal.
FDI  foreign  direct  investment  Hinkley  Point  C  UK  China  Russia  Huawei  Theresa  May  national  security  USA  Cisco  Surveillance-Industrial  Complex  cyber  war 
august 2016 by asterisk2a
Putin beklagt ″wahnsinnigen″ Rüstungswettlauf | Aktuell Europa | DW.COM | 30.06.2016
Die NATO hat ihre Aufrüstung damit begründet, dass es im Zusammenhang mit der Ukraine-Krise im Baltikum und in Polen zunehmende Befürchtungen vor russischen Expansionsbestrebungen gibt. Auf ihrem Warschauer Gipfeltreffen am 8. und 9. Juli will die westliche Allianz die Entsendung von je einem Bataillon in vier Nachbarländer Russlands beschließen: Estland, Lettland, Litauen und Polen.
NATO  Germany  Angela  Merkel  European  Union  Russia  Ukrain  Ukraine  Crimea  Crisis  Crimea  Baltic  States  vladimirputin  Putin  Cold  War  2.0  Cold  War  cyber  Cold  War  cyber  attack  cyber  espionage  cyber  crime 
july 2016 by asterisk2a
Government Faces Labour Questions Over Universal Credit Risks
documents obtained under freedom of information showed a risk of fraudulent activity and cyberattacks. [...] It was finally disclosed this month by the department after a freedom of information request by John Slater, a former IT project manager, and Tony Collins, an investigative journalist, following a four-year legal battle. [...] The documents, which date from 2012, contain a line in which parts of the project are described as “pushing above the programme funding envelope”. They also raise concerns that the programme lacks a “robust framework of assurances”, which means “rework” may be needed if elements of the project are “not fit for purpose”. Fears over staffing are described, with concerns over “skilled staff resources not in the right place at the right time”. [...] “shocking” to see “essential considerations” like fraud and cyber security not being “at the core of [UC]” from the start.
DWP  Iain  Duncan  Smith  Stephen  Crabb  Universal  Credit  cyber  attack  Fraud  benefit  FOI  Freedom  of  Information  Act  nasty  party  Tories  Conservative  transparency  accountability  Whitehall  Westminster  George  Osborne  David  Cameron  cyber  crime 
april 2016 by asterisk2a
From a Culture of Connectivity to a Platform Society
transform, change public life and social life. [...] participatory culture (reality is sometimes less than 1% create of the 100% that consume. [,,,] give away your user data, get service for free. it became a economic transaction. user data is currency. [...] harmful for people, but no discussion about harms to society and public life (self-censorship) & rise in vanity, Selbstdarstellung! Also filter bubble. Revenge Porn. Stalking. Cyber bullying and cyber mobbing. Phishing for your data, enabling cyber crime. [...] hidden norms and values [...] not a level playing field [pay to play] [...]
Platfom  Silo  Open  Platform  EULA  TOS  Social  Media  Facebook  Twitter  Instagram  winner  take  all  Strava  Google  News  Google  Inc.  Uber  Silicon  Valley  mobile  homescreen  Brand  Gesellschaft  society  WhatsApp  Public  Life  AirBnB  book  Web  2.0  Tinder  user  data  Privacy  Internet  Privacy  sharing  economy  Gig  YouTube  self-censorship  Big  advertisement  re-targeting  advertisement  targeting  Selbstdarstellung  Selfie  filter  bubble  Newsfeed  revenge  porn  stalking  cyber  mobbing  cyber  bullying  phishing  cyber  crime  self-regulation  NextDoor  Amazon  4chan  Reddit 
april 2016 by asterisk2a
Investigatory Powers Bill: May defends surveillance powers - BBC News
Mrs May has said Britain's spies must continue to be allowed to hack into foreign computer networks, under so-called "bulk equipment interference warrants", as this was "a key operational requirement for GCHQ".
She told MPs that bulk powers had played a significant role in every major counter-terrorism investigation over the past decade, including seven terror plots foiled in the past 18 months, and in responding to the bulk of cyber attacks against UK interests.
Investigatory  Powers  Bill  Snoopers  Charter  Theresa  May  War  on  Terror  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  bulk  data  collection  Vorratsdatenspeicherung  Dataretention  Meta  GPS  mobilephone  Big  Meta  profiling  Smartphone  human  rights  backdoors  backdoor  Secret  Courts  MI5  MI6  GCHQ  organised  crime  activism  activist  Tories  Conservative  Party  David  Cameron  cyber  cyber  attack 
march 2016 by asterisk2a
Online abuse: 'existing laws too fragmented and don’t serve victims' | UK news | The Guardian
“There are crimes now taking place – the malicious use of intimate photographs for example – which we never would have imagined as an offence when I was a PC in the 80s. It’s not just the nature of it, it is the sheer volume. “The levels of abuse that now take place within the internet are on a level we never really expected. If we did try to deal with all of it we would clearly be swamped.” [...] Earlier in the week, it emerged that the Crown Prosecution Service in England and Wales has turned to Twitter for help as it faces a worrying increase in the use of social media by perpetrators to commit crimes against women and girls, including rape, domestic abuse and blackmail.
revenge  porn  Police  online  abuse  Troll  Trolls  haters  hater  hate  speech  cyber  crime  Privacy  human  rights  blackmail  child  grooming  rape  sexual  assault  sexual  violence  Social  Media  anonymity  domestic  abuse  domestic  violence  stalking  Homophobia  racism 
march 2016 by asterisk2a
Pando: Stephen Fry quits Twitter. What took him so long?
Fry has announced  that he is quitting the ailing social platform, explaining that "too many people have peed in the pool."
Twitter  anonymity  haters  hater  abuse  Troll  Trolls  #GamerGate  mobbing  cyber  bullying  bullying  cyber  mobbing  Social  Media 
february 2016 by asterisk2a
UK to send five ships to Baltic as part of Nato buildup against Russia | Politics | The Guardian
Britain will also contribute troops to a new 6,000-strong force that is intended to act as a deterrent [...] After years of steady military withdrawal from Europe since the end of the cold war, the US last week announced a quadrupling of military spending to $3.4bn (£2.35bn) to increase its presence in Europe as a counter to Russia. The UK contribution, though modest by comparison, is still significant given the extent to which the navy has been reduced after years of cutbacks.
NATO  Baltic  States  Russia  USA  UK  sanctions  military–industrial  complex  Surveillance-Industrial  cyber  war  NSA  Pentagon  GCHQ  Crimea  Crisis  Ukraine  Ukrain  East  Europe  Syrien  Syria  civil  war  Assad  geopolitics  Germany  France 
february 2016 by asterisk2a
Draft snooper's charter 'fails on spying powers and privacy protections' | World news | The Guardian
Theresa May’s draft “snooper’s charter” bill fails to cover all the intrusive spying powers of the security agencies and lacks clarity in its privacy protections, a parliamentary committee has said. The intelligence and security committee said the draft legislation published by the home secretary suffered from a lack of sufficient time and preparation. It was evident that even those working on the legislation had not always been clear about what it was intended to achieve, it said.
Snoopers  Charter  Theresa  May  GCHQ  NSA  Five  Eyes  War  on  Terror  War  on  Drugs  organised  crime  cyber  crime  cyber  attack  Secret  Courts  Whistleblower  investigative  journalism  democracy  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Internet  Privacy  Privacy  self-censorship  repression  military–industrial  Hegemony  USA  UK  David  Cameron  Career  Politicians  Tories  neoconservatism  neoconservatives  nasty  party  Conservative  oversight  abuse  of  power  transparency  accountability  Separation  of  powers  Justice  System 
february 2016 by asterisk2a
NSA's Hacker-in-Chief: We Don't Need Zero-Days To Get Inside Your Network | Motherboard
“I think a lot of people think the nation states are running on this engine of zero-days. You go out with your skeleton key and unlock the door and you're in. It's not that,” he said. “I will tell you that persistence and focus will get you in, will achieve that exploitation without the zero-days,” he continued “There's so many more vectors that are easier, less risky and quite often more productive than going down that route.”
cyber  crime  cyber  attack  NSA  National  Security  BND  GCHQ  cyber  espionage  cyber  cyber  war  Surveillance-Industrial  Complex  intellectual  property  China  Russia  Israel  USA  UK  Five  Eyes  surveillance  state  Orwellian  Internet  Privacy  Privacy  Intelligence  Agency  Foreign  Intelligence 
february 2016 by asterisk2a
Neunzigerjahre: Jahrzehnt der Angstfreiheit - SPIEGEL ONLINE
So lange nur nicht auffallen, sitzen und rauchen, die Neunzigerjahre waren das Jahrzehnt der Angstfreiheit. Die Menschen waren nicht besser oder schlechter als heute. Man konnte die schlechten, also alle, die nicht waren wie man selber, nur besser ignorieren, die Welt besser vermeiden, als noch nicht jede Sekunde neue Nachrichten verfügbar waren. Die Neunziger waren die letzte Zeit, in der man noch an etwas Gutes glauben konnte. Die Zeit der Naivität. Unendlich fade. Aber irgendwie rührend.
history  uncertainty  Age  of  the  Internet  mobile  homescreen  Content  Wars  24-hour  news  cycle  fear  fearmongering  populism  manufactured  consent  Lügenpresse  propaganda  neoliberalism  neoliberal  globalisation  globalization  Social  Media  cyber  crime 
january 2016 by asterisk2a
Kreditkartenbetrug trotz Chip und Pin: Software hebelt Schutz aus - SPIEGEL ONLINE
buy credit card data (stolen), put on new raw cards via software (bought for 20-40k euros), and go shopping with said card, without the need of a pin.
cyber  crime  Software  Is  Eating  The  World  organised  crime 
january 2016 by asterisk2a
Theresa May accused of rushing surveillance bill through back door | Politics | The Guardian
Home secretary gives committee three weeks to study ‘snooper’s charter’, despite having ruled out fast-tracking it after Paris attacks [...] The joint committee that scrutinised the previous “snooper’s charter” bill – the draft communications data bill – in 2012 sat for five months and held 13 public witness sessions over a six-week period. It also took evidence in private from the security services. //&! bit.ly/1lkbLjn - State computer hacking The bill gives powers for security services to hack in to phones, computers and networks worldwide in interests of national security. [ like environmental and animal rights activists ]
Snoopers  Charter  Theresa  May  nasty  party  Tories  Conservative  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Dataretention  bulk  data  collection  democracy  David  Cameron  George  Osborne  Internet  Privacy  Privacy  human  rights  Secret  Courts  oversight  abuse  of  power  accountability  cyber  war  cyber  attack  TOR  Linux  encryption  Cryptopocalypse  cryptography  MI5  MI6 
november 2015 by asterisk2a
Überwachung in Großbritannien: Neues Gesetz vorgestellt - SPIEGEL ONLINE
Die Werbekampagne hat sich gelohnt. Am heutigen Mittwoch veröffentlichte Innenministerin Theresa May einen Gesetzentwurf (hier als PDF), der britischen Geheimdiensten noch mehr Macht verspricht. Die Spione können, sobald die sogenannte Investigatory Powers Bill vom Parlament verabschiedet wird, ganz legal das tun, was sie bislang ohne solide rechtliche Grundlage machten. Gleichzeitig sagte Innenministerin May, sie wolle die Aufsicht über die Geheimdienste stärken. [...] Theresa May betonte im Parlament, dass es nicht darum gehe, den gesamten Browserverlauf zu speichern, sondern nachvollziehen zu können, mit wem Verdächtige kommunizieren. [ jeder ist nun verdaechtig ] [ UK people seem not to care ]
Dataretention  Vorratsdatenspeicherung  Snoopers  Charter  Theresa  May  UK  Tories  Conservative  Party  neoconservatism  neoconservatives  GCHQ  War  on  Terror  extremism  Surveillance-Industrial  Complex  surveillance  state  British  Empire  NSA  human  rights  Internet  Privacy  Privacy  oversight  transparency  Separation  of  powers  injustice  Justice  System  Secret  Courts  Edward  Snowden  USA  encryption  Cryptopocalypse  cryptography  Wertegesellschaft  Orwellian  society  Big  Brother  abuse  of  power  democracy  lobbyist  lobby  Lobbying  military–industrial  profiteer  corporate  espionage  industrial  espionage  cyber  espionage  corporate  state  corporate  media  activists  activism 
november 2015 by asterisk2a
Cyber Security Expert Mikko Hyppönen Worries About Extremists With Computers | Re/code
Hypponen said hackers are moving from Europe to Syria, where officials worry they could launch attacks that shut down computer networks or damage critical infrastructure. He said the threat is so serious, a U.S. drone strike this summer targeted a British hacker who, U.S. and European officials said, had become a top cyber expert for the Islamic State in Syria. Authorities believe the hacker led the CyberCaliphate, a hacking group which in January attacked a Twitter account belonging to the Pentagon.
cyber  war  on  Terror  ISIS  cyber  security  IT  internet  security  password  security  online  security  energy  security  Smart  Grid  infrastructure 
october 2015 by asterisk2a
Hacked! - Tech Weekly podcast by Guardian Tech Weekly
book - @War: The Rise of the Military-Internet Complex3 Nov 2015 by Shane Harris // Doomsday Scenarios: breaking the internet, bringing down electricity grid, transportation/infrastructure, nuclear plant, manipulating digital money vault/value exchanges, << low probability - high impact >> distrust/lost trust.
cyber  war  industrial  espionage  scam  phishing  scam  corporate  espionage  cyber  espionage  USA  UK  Cina  Russia  Israel  Five  Eyes  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  military–industrial  foreign  affairs  Hegemony  foreign  policy  Intelligence  foreign  relations  book  Smart  Grid  encryption  Cryptopocalypse  cryptography  cyber  security  IT  password  security  energy  security 
october 2015 by asterisk2a
TalkTalk cyber attack: Company admits it could have done more to protect customers' information | Crime | News | The Independent
The attack exposed the latest security failure for the company, which was forced to admit it had not encrypted some personal details of customers. The hackers appeared to have stolen details that amount to a full toolkit for fraud including names, addresses and bank account information.
cyber  attack  encryption  phishing  scam  phishing  cyber  crime  cyber  security  cyber  war 
october 2015 by asterisk2a
Facebook: The Secret Force Behind CISA? | Betrayed by Tech
bit.ly/1PAg5rx //&! CISA is “surveillance bill masquerading as a cybersecurity bill” via EFF //&! bit.ly/1LOkilv // We've gotten information that Facebook is secretly lobbying for a dirty bill called >> “CISA” that would give them impunity for violating their users’ privacy << (bc people were unable to sue said company) —as long as they hand over user data to the government. Most tech companies are against it for privacy reasons, but apparently Facebook is working behind the scenes to make sure it passes. [...] Facebook’s chief Senate lobbyist, Myriah Jordan, worked as General Counsel for CISA's sponsor, Senator Richard Burr, right up until taking the job at Facebook. On her lobbying disclosures she lists “cybersecurity” as one of the issues she's been discussing with senators. These “revolving door” connections give companies more power and influence than ordinary people could ever have, // If you have the money, size, and influence. You can write the rules you have to play by.
CISA  Facebook  Mark  Zuckerberg  Internet  Privacy  Privacy  cyber  war  on  Terror  on  Drugs  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  lobbyist  lobby  Lobbying  revolving  door  Silicon  Valley  crony  capitalism  capitalism  profit  maximisation  shareholder  value  fiduciary  responsibility  injustice  Justice  System  Rechtsstaat  TTIP  TPP  Wall  Street  zombie  consumer  TOS  Platfom  Silo  morality 
october 2015 by asterisk2a
Xi Jinping state visit: UK and China sign cybersecurity pact | Politics | The Guardian
[ this is just show: https://wikileaks.org/nsa-germany/selectors.html // look at cable gate. what officials wrote and what was said in-front of cameras and press. ] Cameron said the two nations had signed a “high-level security dialogue” on cybercrime, aimed at stopping attacks on companies either to gain access to intellectual property or confidential information or to disable systems. The deal mirrors one agreed between China and the US last month, but which the American monitoring group CrowdStrike believes was violated almost immediately. GCHQ has reported “disturbing” levels of cyber-attacks on British companies, which are thought mostly to originate in Russia and China. The agreement is the first time that Britain and China have committed to work together on cybersecurity.
cyber  war  cyberwar  corporate  espionage  industrial  espionage  cyber  espionage  Hegemony  USA  Russia  China  GCHQ  NSA  BND  Angela  Merkel  presidency  barackobama  Nationalism  national  interest  Security  on  Terror  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  foreign  affairs  foreign  policy  foreign  relations  Career  Politicians 
october 2015 by asterisk2a
China and the U.S. Are Long-term Enemies - YouTube
//&! speculations that state visit and foreign investment push in UK could create rift between transatlantic relations between USA-UK. UK and Germany after all are part of AIIB. USA not. BRIC are not part of TTIP and TPP. // [A week after Osborne's visit to China with business entourage] China's President Xi Jinping has said he believes his visit will lift UK-China relations to a "new height". - bbc.in/1PwbbvB
Hegemony  China  Russia  NATO  European  Union  USA  G  Zero  SouthChinaSea  Japan  AIIB  TTIP  TPP  TISA  NAFTA  CETA  foreign  affairs  foreign  policy  foreign  relations  cyber  war  corporate  espionage  industrial  espionage  cyber  espionage  Africa  geopolitics  BRIC  global  trade  UK  Germany  David  Cameron  George  Osborne 
october 2015 by asterisk2a
Alan Rusbridger takes aim at press over phone hacking and Snowden | Media | The Guardian
Former editor-in-chief of Guardian tells Society of Editors’ conference that use of surveillance powers to discover journalistic sources is ‘greatest scandal of all’ //&! David Cameron urged to reveal when MPs have been spied on Liberal Democrat leader Tim Farron demands to know which politicians have been placed under surveillance by the security services since 1966 - bit.ly/1LjcrhL
UK  USA  corporate  espionage  industrial  espionage  cyber  espionage  freedom  of  press  Pressefreiheit  freedom  of  expression  self-censorship  Surveillance-Industrial  Complex  surveillance  state  Orwellian  NSA  GCHQ  MI5  MI6  corporate  state  Career  Politicians  military–industrial  investigative  journalism  Whistleblower  journalismus  journalism  abuse  of  power 
october 2015 by asterisk2a
Krieg ǀ Evolution der Gewalt — der Freitag
Krieg Die Geschichte der Kriege hört nicht auf, sie ändern nur ihre Form und ihre Gestalt: Herfried Münklers neuer Wälzer // Kriegssplitter: Die Evolution der Gewalt im 20. und 21. Jahrhundert Herfried Münkler Rowohlt 2015, 400 S., 24,95 €
cyber  war  Drone  Strike  Drone  Warfare  civil  war  private  military  company  Blackwater  Academi  CIA  FBI  corporate  espionage  industrial  espionage  cyber  espionage  Iraq  Lybia  arms  trade  military–industrial  complex  military  intervention  military  Surveillance-Industrial  surveillance  state  surveillance  self-censorship  Dictatorship  free  speech  freedom  of  expression  freedom  of  speech  Pressefreiheit  freedom  of  press  of  Information  Act  FOI  democracy  No  Representation  Career  Politicians  neoconservatism  neoconservatives  TTIP  NAFTA  crony  capitalism  corporate  state  corporate  media  Lügenpresse  manufactured  consent  Polarisation  Russia  vladimirputin  Putin  Crimea  Crimea  Crisis  economic  free  trade  trade  agreement  CETA  TPP  TISA  protectionism  sanctions  OPEC  China  commodity  prices  class  neoliberalism  neoliberal  profiteer  racket  Wall  Street  profit  maximisation  shareholder  value  human  rights  Internet  Privacy  Privacy  G  Zero  World  Police  USA  national  interest  Nationalism  corporate  scandal  book  Contractor  Contractor  outsourcing 
october 2015 by asterisk2a
BND spionierte USA und andere Partnerländer aus - SPIEGEL ONLINE
Der Skandal um die sogenannte Selektorenliste der NSA ist noch nicht aufgearbeitet, jetzt geht's um die Vergangenheit des BND: Nach Informationen von SPIEGEL ONLINE spionierte er offenbar selbst in großem Stil Botschaften und andere Institutionen von EU-Ländern und US-Amerikanern aus.
cyber  war  corporate  espionage  industrial  espionage  cyber  espionage  BND  NSA  GCHQ  Five  Eyes  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  Wall  Street  profit  maximisation  shareholder  value  Privacy  Internet  Privacy  Nationalism  Foreign  Intelligence  affairs  policy  relations  national  interest  profiteer  human  rights 
october 2015 by asterisk2a
Cyber attack warning after millions stolen from UK bank accounts | Technology | The Guardian
The NCA added: “Computers become infected with Dridex malware when users receive and open documents in seemingly legitimate emails. The NCA assesses there could be thousands of infected computers in the UK, the majority being Windows users.”
phishing  phishing  scam  cyber  attack  cyber  security  IT 
october 2015 by asterisk2a
Russland und Syrien: Das Ende der alten Weltordnung - SPIEGEL ONLINE
Viel wichtiger aber ist, nach vorne zu schauen. Die alten Sicherheitsstrukturen aus dem vergangenen Jahrhundert taugen nicht mehr. Nach dem Ende des ersten Kalten Krieges haben die Regierungen versäumt, sie weiterzuentwickeln und sich naiv auf der Friedensdividende ausgeruht. Der Krieg in der Ukraine und das russische Abenteuer in Syrien sind die Folge dieses Versagens. Die eigene Sicherheit oder Einflusssphäre auf Kosten anderer erhöhen zu wollen, führt nicht zu mehr, sondern zu weniger Sicherheit und Stabilität. Europa braucht deshalb neue Absprachen über Sicherheit und Zusammenarbeit. Europa braucht ein neues Helsinki.
NATO  diplomacy  Ukraine  Ukrain  Crimea  Crimea  Crisis  Russia  Putin  geopolitics  foreign  affairs  foreign  policy  foreign  relations  Intelligence  vladimirputin  presidency  barackobama  Syrien  Syria  Iran  OPEC  Arab  League  Middle  East  National  Security  Career  Politicians  status  quo  Cold  War  cyber  corporate  espionage  Nationalism  industrial  espionage  cyber  espionage  China  India  neoliberalism  neoliberal  neoconservatism  neoconservatives  UK  Germany  USA  France  European  Union  Turkey  Drone  Warfare  Drone  Strike  Pakistan  War  on  Terror  Afghanistan  Iraq  War  Iraq  G  Zero 
october 2015 by asterisk2a
Henryk M. Broder über Deutschland: "Ein opferbereites Volk" - SPIEGEL ONLINE
Nationalstolz? Keineswegs. Henryk M. Broder attestiert Deutschland stattdessen eine "sonderbare Form der Selbstverachtung". Der Publizist über das fehlende Selbstbewusstsein der Deutschen.
Angela  Merkel  Wolfgang  Schäuble  GroKo  Germany  Deutschland  foreign  affairs  foreign  policy  foreign  relations  refugee  crisis  corporate  espionage  industrial  espionage  cyber  espionage  sovereign  debt  crisis  bank  bailout  banking  crisis  TBTF  too  big  to  jail  too  big  to  bail  PIIGSFB  Career  Politicians  No  Representation  history  European  Europe  Nationalism  Russia  Ukraine  Ukrain  Middle  East  Putin  vladimirputin  Crimea  Crimea  G  Zero  USA  presidency  barackobama  Iraq  War  UK  France  China 
october 2015 by asterisk2a
Jung & Naiv - Kommissar für Menschenrechte über die Situation in...
[ right to privacy ] [ institutional ingrained problem ] // Der Menschenrechtskommissar des Europarats, Nils Muižnieks, war heute zu Gast in der BPK und hat über die Menschenrechtslage in Deutschland berichtet. Hier sind unsere naiven Fragen an ihn zu Ehe für alle, Totalüberwachung, institutioneller Rassismus und Menschenrechte in der deutschen Außenpolitik... und seine Antworten.
self-censorship  Internet  Privacy  Privacy  European  Union  human  rights  NSA  oversight  GCHQ  BND  CIA  9/11  War  on  Terror  Secret  Courts  FISA  Court  FISAAA  Patriot  Act  Dataretention  Vorratsdatenspeicherung  Snoopers  Charter  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Career  Politicians  Justice  System  democracy  Law  &  Justice  No  Representation  social  contract  political  theory  political  economy  foreign  affairs  foreign  policy  Intelligence  foreign  relations  Torture  public  awareness  public  debate  public  discourse  public  perception  manufactured  consent  Polarisation  Lügenpresse  Pressefreiheit  freedom  of  press  corporate  media  corporate  state  military–industrial  propaganda  populism  Nationalism  USA  UK  Germany  corporate  espionage  industrial  espionage  cyber  espionage  cyber  Politics 
october 2015 by asterisk2a
Flüchtlingskrise: Angela Merkel ist nicht mehr unantastbar - SPIEGEL ONLINE
Gerade noch galt Angela Merkel als unantastbar. Jetzt bröckeln die Sympathiewerte, die interne Kritik wird immer lauter. Die Flüchtlingskrise markiert eine Zäsur in Merkels Kanzlerschaft. // Putin bombt in Syrien, und die Welt schaut zu. Das schmerzt, ist aber eine logische Konsequenz des westlichen Versagens in der Nahostpolitik. - bit.ly/1KT1CAy
Brexit  Grexit  sovereign  debt  crisis  Wolfgang  Schäuble  Angela  Merkel  Career  Politicians  Greece  PIIGSFB  No  Representation  refugee  crisis  Middle  East  Russia  Syrien  Syria  Ukraine  Ukrain  NATO  ISIS  Iraq  Afghanistan  vladimirputin  Putin  foreign  affairs  USA  corporate  espionage  industrial  espionage  cyber  espionage  NSA  GCHQ  Five  Eyes  Aid  foreign  policy  foreign  relations  UK  France  history  Iraq  War 
october 2015 by asterisk2a
U.S. and China Seek Arms Deal for Cyberspace - The New York Times
In the last year there have been devastating Chinese hacks of American computer systems, and the U.S. government has floated the idea of sanctioning China in response. Here's the apparent response: A noticeable downtick in significant hacks of American networks, and news that the U.S. and China are working on a cybersecurity arms deal, ahead of Chinese President Xi Jinping's Thursday arrival in America. The proposed agreement would supposedly prevent either nation from attacking the other's "critical infrastructure" during peacetime.
cyber  war  cyber  attack  military–industrial  complex  military  intervention  Surveillance-Industrial  surveillance  state  Internet  Privacy  Privacy  Five  Eyes  GCHQ  UK  USA  BRIC  China  Russia  Israel  Intelligence  Agency  Foreign  Intelligence  BND  cyber  espionage  corporate  espionage  industrial  espionage  Europe  affairs  policy  relations  Pentagon  CIA  NSA 
september 2015 by asterisk2a
The internet is run by an unaccountable private company. This is a problem | Technology | The Guardian
The US government’s plan to give up authority over Icann may create the web’s answer to Fifa – when problems arise, no one will have the power to intervene
ICANN  Tim  Berners-Lee  Wall  Street  crony  capitalism  counter  culture  Silicon  Valley  profit  maximisation  corruption  Net  Neutrality  bribery  capitalism  shareholder  value  corporate  media  corporate  state  cyber  war  interest  groups  vested  interest 
september 2015 by asterisk2a
Egon Krenz: der Kalte Krieg war nie zu Ende by Sputnik Deutschland
Europa ohne Russland geht nicht. USA sieht nicht gern das Europa/Deutschland gut mit Russland sind. [...] Die idee des kommunismus ist nicht tod zu kriegen. [...] Der kapitalismus kann nicht das letzte wort gehabt haben. [...] AIIB & BRIC (+South Africa) - ohne USA, ohne EU (ja nicht alle, Germany in AIIB)! // TTIP und co. schliesst BRIC aus. Punkt!!! USA will sich wirtschafts and und politische macht sichern mit TTIP und TPP before es zu spaet ist. // battle of ideas. battle to capture parts of new world, global trade and economy, future generations (emerging middle class).
Ukraine  Ukrain  Russia  vladimirputin  Putin  Europe  NATO  Cold  War  cyber  Middle  East  USA  foreign  affairs  geopolitics  foreign  policy  foreign  relations  Intelligence  German  reunification  UK  East  Europe  United  Nations  Security  Council  United  Nations  Angela  Merkel  Leadership  Crimea  Crimea  Crisis  presidency  barackobama  David  Cameron  diplomacy  Baltic  States  Balkan  East  Germany  east-europe  east-germany  China  World  Police  global  economy  sanctions  protectionism  global  trade  BRIC  European  Union  Turkey  Eurasia  Germany  cooperation  GCHQ  NSA  surveillance  state  Surveillance-Industrial  Complex  history  Aid  Arab  League  OPEC  military–industrial  military  intervention  neoconservatism  neoconservatives  neoliberalism  neoliberal  ISIS  al-Qaida  Taliban  Iraq  War  Iraq  Iran  Afghanistan  globalization  globalisation  TTIP  TPP  CETA  cablegate  Wikileaks  AIIB  World  Bank  TISA  Wall  Street  crony  capitalism  capitalism  ideology  dogma  emerging  class  Developing  World  Frontier  Markets  emerging  market  economic  history  trickle-down  economics  political  economy  political  science  political  theory  Niall  Ferguson  Africa  South  Africa 
september 2015 by asterisk2a
Die Story: Zehn Jahre Kanzlerin: Mysterium Merkel | Kontrovers | BR - YouTube
6:20 - nicht falsch stehen wollen ... // macht sich unberechenbar und flexibel // but no long-term vision and mission >> thus no long-term future of germany in globalised digital economy and marginal cost and economic abundance! // no Principles. No spine. // Teflon Kanzlerin. Und andere muessen dann gehen. // "hat immer die Kontrolle behalten." 10 Jahre lang.
Angela  Merkel  GroKo  Germany  CDU  CSU  Career  Politicians  refugee  crisis  war  refugee  European  Union  sovereign  debt  crisis  bank  bailout  GFC  recovery  Schuldenbremse  Fiscal  Pact  austerity  dogma  ideology  Grexit  Brexit  East  Europe  Rechtsruck  Rechtsextremismus  AfD  NPD  Xenophobia  Homophobia  homophobic  Homo-Ehe  inequality  Gini  coefficient  European  Election  2014  Fukushima  underinvestment  infrastructure  investment  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  USA  UK  corporate  espionage  cyber  espionage  industrial  espionage  cyber  war  cyber  attack  Ukraine  Ukrain  ISIS  Russia  vladimirputin  Putin  Edward  Snowden  Principle  military–industrial  Iraq  Syrien  Syria  Saudi  Arabia 
september 2015 by asterisk2a
So Wrong for So Long | Foreign Policy
[T]heir earlier support for the Iraq War and their opposition to the Iran deal stem from the basic neoconservative worldview that informs their entire approach to foreign policy. [...] To be more specific, the problem isn’t that these people just happened to be embarrassingly wrong about Iraq. After all, plenty of other people were equally misguided back then, including many people who now support the deal today. Nor is the problem the neocons’ stubborn and morally dubious refusal to admit they were wrong and take responsibility for the lives and money they squandered. No, the real problem is that the neoconservative worldview — one that still informs the thinking of many of the groups and individuals who are most vocal in opposing the Iran deal — is fundamentally flawed. [...] they think weaker states are easy to bully and never stand up to powerful adversaries. ...
Iraq  War  Iran  progressive  neoconservatism  neoconservatives  USA  foreign  policy  foreign  affairs  World  Police  Middle  East  foreign  relations  UK  gwbush  georgewbush  al-Qaida  Afghanistan  Turkey  Saudi  Arabia  Russia  China  bullying  cyber  Iraq 
september 2015 by asterisk2a
U.S. developing sanctions against China over cyberthefts - The Washington Post
[ double standard. probably know that they will be outed come time to have e-mailed trade secrets of other nations big companies to their own national companies, even if it is just for infrastructure or defense contract bids ] The White House is getting ready to issue "unprecedented economic sanctions" against Chinese companies and individuals "who have benefited from their government’s cybertheft of valuable U.S. trade secrets," says the Washington Post. But the Post doesn't explain what those sanctions would be, or why the U.S. is going after individual targets instead of the Chinese government itself. One thing that is clear: Chinese president Xi Jinping is scheduled to visit the U.S. next month.
cyber  war  China  NSA  GCHQ  Five  Eyes  IT  Security  Patent  trade  secret  Europe  Germany  corporate  espionage  cyber  espionage  industrial  espionage  presidency  barackobama  Edward  Snowden  Wikileaks  Julian  Assange  bulk  data  collection  FISA  Court  FISAAA  national  interest  Nationalism  protectionism  Security  False  Flag  on  Terror  smoke  mirror  smoking  gun  Russia  Israel  USA  UK  Courts  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Internet  Privacy  Privacy  military–industrial  Hacking  cyber  attack  cyber  crime  cyber 
september 2015 by asterisk2a
Pando: Sec. of Defense to Silicon Valley: “There is no limit to what we can achieve together"
Ash Carter announces a new public-private project and delivers a recruitment pitch. [...] a hawkish focus on his goal: to develop stronger private partnerships in Silicon Valley. // [ defence contractor ] // &! Andreessen: Pentagon Wants to Work With Silicon Startups - youtu.be/PTBV4rowPsg &! youtu.be/_lQWIFi0D4k "nation state wars" &! // &! IT Security needs time in stealth before production ready - youtu.be/VY6TUw3J9FY // &! The Takeaway - youtu.be/HlDfMi9Uzqc - attracting talent & repair relations post-Edward Snowden & 'state-subsidies' for Valley firms (defence/defense contracts) // &! youtu.be/C_qeUCU7N1o - rebuilding bridge between SV and Pentagon // youtube.com/watch?v=0dZs9wzQsZI
Pentagon  military–industrial  complex  Surveillance-Industrial  surveillance  state  NSA  FBI  CIA  Orwellian  GCHQ  Five  Eyes  interest  groups  vested  interest  Big  Data  abuse  of  power  technological  progress  Software  Is  Eating  The  World  World  Police  corporate  espionage  cyber  espionage  industrial  espionage  Europe  China  Israel  Russia  Japan  Cold  War  cyber  Drone  Warfare  Drone  Strike  NASA  Department  of  Defense  counter  culture  Silicon  Valley  Wall  Street  profit  maximisation  shareholder  value  Internet  Privacy  Privacy  cyber  attack  cyber  security  Net  Neutrality  IoT  PR  spin  doctor  public  relations  Edward  Snowden  Wikileaks  Whistleblower  Julian  Assange  Career  Politicians  presidency  barackobama  Chelsea  Manning  Defense  Contractor  trust  distrust  trustagent 
august 2015 by asterisk2a
Markus Beckedahl, Andre Meister: Kontrolle ist gut. #Landesverrat ist besser. - YouTube
// Statement von Georg Restle zu der Anzeige wegen Landesverrat gegen die Journalisten Markus Beckedahl und Andre Meister von Netzpolitik.org. - youtu.be/bLuu4ekznT8 // Verschwörung gegen die Freiheit (Doku, ZDF 2014) - youtu.be/HoTW5c2MEYQ // &! O-Ton GroKo - youtu.be/y9pRz5KQ6vo - Eiertanz: Viele, viele naive Fragen zum BND-Skandal // &! http://www.dctp.tv/filme/markus-beckedahl-netzpolitik-org/
netzpolitik  Pressefreiheit  Lügenpresse  Angela  Merkel  GroKo  Surveillance-Industrial  Complex  military–industrial  NSA  GCHQ  Five  Eyes  surveillance  state  Orwellian  BND  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  USA  Europe  UK  Germany  Vorratsdatenspeicherung  Dataretention  Snoopers  Charter  bulk  data  collection  FISA  Court  FISAAA  Patriot  Act  presidency  barackobama  David  Cameron  encryption  Cryptopocalypse  cryptography  False  Flag  on  Terror  IT  Security  cyber  netzpolitik.org  freedom  of  press  of  Information  Act  National  Security  interest  on  Drugs  organised  crime  cyber  crime  investigative  journalism  journalismus  journalism  Whistleblower  Career  Politicians  No  Representation  social  contract  political  theory  Internet  Privacy  Privacy  Meta  metadata  Big  Wikileaks  Edward  Snowden  Julian  Assange  Secret  Courts  Glenn  Greenwald 
august 2015 by asterisk2a
Erpressung durch Cyberattacken: Angriffsziel Industrieanlage - SPIEGEL ONLINE
Hacker richten mit Cyberangriffen nach Schätzungen von Experten Schäden von Hunderten Millionen Euro an. Sichtbar werden die Attacken auf die Industrie aber selten: Den Tätern geht es um Erpressung.
IT  Security  cyber  war  corporate  espionage  industrial  espionage  cyber  espionage  national  interest  corporate  state  Surveillance-Industrial  Complex  surveillance  state  NSA  GCHQ  military–industrial  Europe  UK  USA  foreign  affairs  China  Russia  Israel  foreign  policy  Intelligence  Intelligence  Agency  foreign  relations 
august 2015 by asterisk2a
Foreign Affairs Expert Leslie Gelb: Masters in Business (Audio) by Bloomberg View | Free Listening on SoundCloud
Leslie Gelb, wrote Pentagon Papers. Which Ellsberg leaked (Whistleblower) - bit.ly/1Lgsq2D // Back in the days, national interests and force was expressed in war and seldomly in economic embargos (Napoleon tried that against British Empire) and there were economic skirmishes (oil/diesel, rubber) in the run-up to WW2 and the first couple of months before USA officially entered WW2. TODAY! National interests are only expressed in economic terms with trade embargoes, tariffs, trade deals and protectionism. Only little military skirmishes here and there and when, the nation tries to hide them from the publics eye (through rouge nations for hire army/special forces, a nations secret services supplying the underground arms trade that doesn't show up on its balance sheet or one of their nations manufacturers. West excluded Russia from recent G8 summit in Munich and made it G7. Russia/Europe/USA playing game of chicken of economic escalation. Or using corporate actors & new cyber war!
Russia  protectionism  embargo  Iran  nuclear  power  USA  Latin  America  corporate  state  national  interest  Nationalism  Europe  UK  cyber  crime  cyber  war  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  espionage  industrial  espionage  cyber  espionage  Crimea  Crimea  Crisis  presidency  barackobama  vladimirputin  Putin  China  Asia  Pakistan  Drone  Strike  Drone  Warfare  Africa  history  foreign  affairs  foreign  policy  foreign  relations  Afghanistan  Irak  Israel  Gaza-Israel  conflict  Germany  Ukraine  Ukrain  Angela  Merkel  Pentagon  CIA  MI6  Japan  SouthChinaSea  South  Korea  military–industrial  military  intervention  IT  Security  collateral  damage  international  relations  Security  False  Flag  on  Terror  ISIS  al-Qaida  book  G7  G8  United  Nations  Security  Council  NATO  OPEC  Oil  price  Saudi  Arabia  Arab  League  Cuba  Vietnam  WMD  smoking  gun  Syria  Syrien 
august 2015 by asterisk2a
EU extends farm aid amid Russian food import ban - BBC News
The EU says it will continue aid for exporters of dairy produce, fruit and vegetables into next year to ease the impact of a Russian ban on those goods.
Russia  Europe  protectionism  sanctions  2015  Cold  War  NATO  cyber  USA  UK 
august 2015 by asterisk2a
Tech Firm Ubiquiti Suffers $46M Cyberheist — Krebs on Security
via bit.ly/1J55suT // Networking firm Ubiquiti Networks Inc. disclosed this week that cyber thieves recently stole $46.7 million using an increasingly common scam in which crooks spoof communications from executives at the victim firm in a bid to initiate unauthorized international wire transfers. [...] Known variously as “CEO fraud,” and the “business email compromise,” the swindle that hit Ubiquiti is a sophisticated and increasingly common one targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. In January 2015, the FBI warned that cyber thieves stole nearly $215 million from businesses in the previous 14 months through such scams, which start when crooks spoof or hijack the email accounts of business executives or employees.
phishing  phishing  scam  spoofing  cyber  security  IT  internet  security  online  security 
august 2015 by asterisk2a
Google’s $6 Billion Miscalculation on the EU - Bloomberg Business
via https://news.ycombinator.com/item?id=10021018 // Google declined to make its executives available for on-the-record interviews, but several concede that the company was caught off guard by the intensity of European criticism, in large part because of its broad popularity with users. Google is so relied upon that many people casually assert that the most prevalent search term on rival Bing is, in fact, “Google.” (Microsoft declines to confirm this.) [...] The more Europeans rely on Google, however, the more they’ve come to fear it, making it an easy target for politicians. Last November members of the European Parliament voted 384 to 174 for a symbolic proposal to break up the search giant into two separate pieces—its monolithic search engine and everything else. [ + agressive tax evasion schemes came under public & political pressure; Amazon, Google, Apple, Facebook, and Co ]
Google  antitrust  Europe  2015  Google  Search  NSA  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Edward  Snowden  corporate  espionage  industrial  espionage  cyber  espionage  Germany  France  Five  Eyes  GCHQ  UK  USA  Silicon  Valley  Stasi  2.0  national  interest  Foreign  Intelligence  affairs  policy  Intelligence  Agency  Google  News  Internet  Privacy  Privacy  Big  Data  right  to  be  forgotten  tax  evasion  tax  avoidance  FTC  Yelp!  Yelp  monopoly  monopsony  oligopoly  oligopol  lobbyist  lobby  Lobbying  revolving  door  Don't  be  evil  Washington  Career  Politicians  No  Representation  Consumer  Protection  Android 
august 2015 by asterisk2a
Chinesische Hacker spionieren Netzwerke aus - SPIEGEL ONLINE
Sicherheitsforscher haben eine Hackergruppe entdeckt, die massenhaft Daten ausspioniert. Betroffen seien unter anderem Rüstungskonzerne und politische Organisationen. Die Angriffe erfolgen offenbar aus China.
corporate  espionage  industrial  espionage  cyber  espionage  NSA  USA  GCHQ  UK  Five  Eyes  Russia  China  Europe  national  interest  Cold  War  Intelligence  Agency  Foreign  Intelligence  Israel  surveillance  state  Orwellian  military–industrial  complex  Surveillance-Industrial  competitive  advantage  Patent  Trade  Secrets  protectionism  corporate  state  manufactured  consent  corporate  media  propaganda  populism  Germany  secret 
august 2015 by asterisk2a
Russia will fork Sailfish OS to shut out pesky Western spooks
Paranoia over NSA tampering spurs de-Westernisation drive // well only the Paranoid survive. [...] Russia’s Minister of Communications and Mass Media, Nikolai Nikiforov, has taken part in talks to form a consortium that will aid Russia in developing a custom mobile OS, reportedly a forked version of Jolla’s Sailfish OS, to lessen its dependence on Western technology. Nikiforov held a working meeting last week with the leadership of Hong Kong-based Sailfish Holdings, developer of the quietly admired Sailfish OS. Alongside other participants, the parties involved discussed the use of open-source software in the public and private sectors, taking into account technical, economic and political factors, the latter of which is expected to include United States’ interference with exported technologies.
Open  Source  Russia  corporate  espionage  industrial  espionage  cyber  espionage  NSA  Five  Eyes  Nationalism  barackobama  presidency  Europe  GCHQ  UK  Foreign  Intelligence  affairs  relations  2015  cyber  war  encryption  Angela  Merkel  Leadership  Career  Politicians  No  Representation  human  rights  Privacy  Internet  Privacy  Cryptopocalypse  cryptography  national  interest  False  Flag  on  Terror  on  Drugs  organised  crime  backdoors  backdoor  IT  Security  exploit  Germany  FRance  surveillance  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  state  manufactured  consent  Cold  propaganda  populism  Pressefreiheit  Lügenpresse  Vorratsdatenspeicherung  Snoopers  Charter  investigative  journalism  Whistleblower  tracking  bulk  data  collection  democracy  freedom  freedom  of  press  Secret  Courts  FISA  Court  FISAAA  BND  military–industrial 
august 2015 by asterisk2a
Pressure mounts over claims Police Scotland breached rules over spying on journalists (From Herald Scotland)
PRESSURE is mounting on ministers to take action on Police Scotland amid further criticism of the force over claims it illegally spied on a journalist to uncover sources. The force's elite Counter Corruption Unit (CCU) is said to have snooped on the reporter without getting judicial approval - a tactic which was banned on March 25 following a row over officers using the Regulation of Investigatory Powers Act (Ripa) to access journalists’ phone records, texts and emails. // [ endemic and systemic! you are not safe. period. ] // &! bbc.in/1OQEaGJ - Ministers questioned over Police Scotland 'spying' claims // &! bbc.in/1KUFPu9 &! bbc.in/1Maojno << time to get their story right!?
Met  Police  GCHQ  freedom  of  press  UK  journalismus  investigative  journalism  journalism  corporate  state  corporate  media  media  conglomerate  Pressefreiheit  Lügenpresse  Five  Eyes  NSA  Career  Politicians  No  Representation  democracy  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  2015  human  rights  Internet  Privacy  Privacy  Snoopers  Charter  Vorratsdatenspeicherung  abuse  of  power  corruption  manufactured  consent  populism  War  on  Terror  False  Flag  organised  crime  cyber  cyber  crime  Cryptopocalypse  cryptography  encryption  backdoors  backdoor  propaganda  Intelligence  Agency  Foreign  Intelligence  corporate  espionage  industrial  espionage  cyber  espionage  Nationalism  national  interest  domestic  affairs  affairs  policy  relations  MI5  MI6  Secret  Courts  FISA  Court  FISAAA 
august 2015 by asterisk2a
Windows 10: Microsoft under attack over privacy | Technology | The Guardian
>> It is not Free. Period! Stupid. << // &! Get Tracked with Windows 10 | Tech Talk Today 198 - youtu.be/Gh0y5drKwAE &! http://www.jupiterbroadcasting.com/85697/get-tracked-with-windows-10-ttt-198/ &! Microsoft’s new small print – how your personal data is (ab)used - https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/ &! &! bit.ly/1eNKQJm - Mit Windows 10 wird alles besser - sagt Microsoft. Viele Neuerungen funktionieren aber nur, weil der Konzern auf Nutzerdaten zugreift. Wir zeigen, wie Sie die Datensammelei sinnvoll einschränken. [ einschraenken, nicht abschaltbar - selling you out ] &! bit.ly/1g2TLHN - Like all proprietary software, Windows 10 puts those that use it under the thumb of its owner. [...] Windows is an open window onto you &! bit.ly/1SFoXhT &! Linux: The OS of the Future - youtu.be/cTpujBq1Zi0 // &! bit.ly/1MUDxeB &! youtu.be/ULq1ajA1Jek
TOS  Microsoft  Platform  Internet  Privacy  Privacy  Big  Data  advertisement  advertisement  targeting  user  Facebook  Windows  10  business  model  Free  perma-cookie  ISP  Google  Wireless  Carrier  Android  Apple  human  rights  Linux  Open  Source  Twitter  backdoors  backdoor  Cryptopocalypse  encryption  NSA  FISA  Court  FISAAA  corporate  espionage  industrial  espionage  cyber  espionage  national  interest  Nationalism  Five  Eyes  GCHQ  Secret  Courts  cryptography  FOSS  GNU  GNU/Linux  GPL 
august 2015 by asterisk2a
SPIEGEL Interview with WikiLeaks Head Julian Assange - SPIEGEL ONLINE
In an interview, Julian Assange, 44, talks about the comeback of the WikiLeaks whistleblowing platform and his desire to provide assistance to a German parliamentary committee that is investigating mass NSA spying.
Julian  Assange  Wikileaks  NSA  BND  corporate  espionage  industrial  espionage  cyber  espionage  surveillance  state  Orwellian 
july 2015 by asterisk2a
Sicherheitshysterie nach britischem Urteil gegen Vorratsdatenspeicherung: „Tausende Leben in Gefahr“ | netzpolitik.org
Die Notwendigkeit der technisierten Überwachung wird gar nicht mehr hinterfragt, die gerichtlichen Backpfeifen an die britische Regierung stattdessen in grotesker Weise kommentiert. So titelt beispielhaft der Telegraph in Anlehnung an eine Aussage der britischen Innenministerin Theresa May: Thousands of lives at risk after High Court rules snooping powers unlawful. // theguardian.com/world/surveillance - bit.ly/1fa4mQP // &! bit.ly/1CMnrUg &! bit.ly/1DoKqiZ - Why appeasing governments over encryption will never work. David Cameron & the director of the FBI have both asked for ‘backdoors’ to be included in encryption software [...] Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications, is worth reading in full. It concludes that proposals for backdoors are “unworkable in practice, raise enormous legal and ethical questions, and would undo progress on security at a time when internet vulnerabilities are causing extreme economic harm”.
Snoopers  Charter  Vorratsdatenspeicherung  DRIPA  data  retention  law  bulk  data  collection  propaganda  surveillance  surveillance  state  Orwellian  False  Flag  War  on  Terror  ISIS  ISIL  Surveillance-Industrial  Complex  military–industrial  UK  GCHQ  MI5  Met  Police  abuse  of  power  transparency  accountability  democracy  Secret  Courts  Five  Eyes  British  Empire  populism  Lügenpresse  manufactured  consent  corporate  state  NSA  Career  Politicians  Tony  Blair  presidency  barackobama  David  Cameron  society  Gesellschaft  European  Union  Internet  Privacy  Privacy  human  rights  self-censorship  encryption  Cryptopocalypse  backdoors  backdoor  FBI  MI6  cyber  corporate  espionage  industrial  espionage  cyber  espionage  Intelligence  Agency  Foreign  Intelligence  national  interest  protectionism  economic  damage  IT  Security  policy  folly  policy  error 
july 2015 by asterisk2a
Former Reddit CEO Ellen Pao: The trolls are winning the battle for the Internet - The Washington Post
--- 444 comments and counting - https://en.wikipedia.org/wiki/Helen_Lewis_(journalist)#Lewis.27s_law // By Ellen Pao // PAX East 2014: Why Internet Jerks Aren’t Going to Win, And You Can Help // Posted by Patrick Klepek | Apr. 17, 2014 9:37am // Depression Quest designer Zoe Quinn joined me to talk about the Internet, and how we can make things just a tiny bit better. // via http://redd.it/3djpjy // the frictionless type thing of the internet and the anonymity - is an enabler of the best and worst in us.
Reddit  Ellen  Pao  Troll  Trolls  haters  hater  SJW  #GamerGate  hate  speech  frictionless  cyber  mobbing  cyber  bullying  sexual  harassment  harassment  gender-based  harassment  Twitter  Facebook  Digg  YouTube  sexism  everyday  sexism  sexismus  Misogynie  misogyny  Patriarchy  male  privilege  white  male  privilege  straight  white  male  feminism  feminist  4chan  anonymity 
july 2015 by asterisk2a
« earlier      
per page:    204080120160

related tags

#GamerGate  &  2.0  3D  4chan  9/11  24-hour  Aaron  Abstieg  abuse  Academi  academia  academics  accountability  Act  activism  activist  activists  adoptarefugee.org  AdSense  advantage  advertisement  advice  AfD  affairs  affirmative  Afghanistan  Africa  After  Age  Agency  Agent  agreement  AI  Aid  AIIB  air  AirBnB  Airbus  al-Qaida  Alain  Alexis  algorithm  Alibaba  all  allabouttrans.org  Amazon  Amendment  America  American  analytics  and  Andreessen  Android  Angela  AngelaMerkel  angry  Annie  AnonIB  anonym  anonymity  anonymous  Anti-Hacking  antitrust  Antivirus  anxiety  apathy  app  Appel  Appelbaum  Apple  Arab  Arabia  arms  artificial  Asia  Ask.com  ask.fm  Assad  Assange  assault  Asylbewerber  Asylum  athlete  attack  attila  augmented  Ausländerfeindlichkeit  austerity  Australia  Austria  authentication  automation  avoidance  awareness  AWS  backdoor  backdoors  backroom  bail  bailout  Balances  Balkan  Baltic  bank  banking  banks  barackobama  Bargeld  Barrett  barriers  Basic  be  behavior  behaviour  being  Belgacom  beliefs  benefit  Berlin  Berners-Lee  big  bigotry  Bill  bisexual  bisexuality  black  blackmail  Blackwater  Blair  blame  blamegame  blind  BND  BND-Affäre  BND-Skandal  Boing  Boko  book  botnet  Botton  Box  Bradley  Brand  Bremmer  Brené  Brexit  bribery  BRIC  British  brogrammer  Brother  Brown  Brutality  brute  bubble  buffer  Bug  bulk  bullying  Bundestags  business  BuzzFeed  C  cable  cablegate  Caitlin  Cameron  campaign  Campus  Canada  Capital  capitalism  Career  Carrier  cash  CCC  CDU  celeb  Celebgate  celebrity  Central  centralbanks  CETA  chamber  change  Charter  Checks  Chelsea  child  childhood  China  Chomsky  CIA  Cina  CISA  Cisco  CITIZENFOUR  civic  civil  class  classified  clickbait  clicks  climate  clone  cloud  Cloudflare  Cloudstorage  code  coefficient  cohesion  cold  coldwar  coldwar20  collateral  collection  comments  Commission  Commissioner  commodity  communication  Communications  communism  community  company  compassion  competition  competitive  competitiveness  complex  complexity  compromise  computing  conduct  confidence  conflict  conforming  conglomerate  Congress  consent  consequences  conservative  Constitution  consumer  Consumerism  consumerist  content  contract  contractor  cookie  cooperation  copycat  copywriting  Corp.  corporate  corporatism  corruption  Council  counter  Court  Courts  Crabb  Creative  Creatives  creator  Credit  crime  Crimea  crisis  crony  cruelty  cryptography  cryptopocalypse  cryptowar  CSR  CSU  Cuba  culture  currency  curriculum  Curtain  cyber  cyber-espionage  cyberattack  cyberbullying  cybercrime  cyberespionage  cyberhack  cybersecurity  cyberwar  cycle  Daily  damage  Dark  darknet  DARPA  data  Dataretention  Dating  DAU  David  davidcameron  DDoS  de  dealings  death  debasement  debate  debt  decency  defamation  Defense  deflationary  dehumanisation  democracy  Democratic  Department  deposit  Depression  Desensitization  desensitized  Despotism  deterrent  Deutschland  Developing  development  Dictatorship  Digg  digital  Dilemma  diplomacy  direct  disarmament  disaster  discourse  discovery  discrimination  disorder  disrupting  disruption  distress  distribution  distrust  diversity  doctor  dogma  DOJ  domestic  Don't  Donald  donaldtrump  door  double  doxing  doxxing  Draft  Drake  Dream  DRIPA  Drive  Drone  DropBox  Dropbox  Drugs  Duncan  DWP  EADS  East  east-europe  east-germany  Eating  ECB  ECHELON  echo  ecological  economic  economics  economy  ed  education  Edward  EFF  efficiency  ego  election  Ellen  embargo  emerging  emotional  empathy  Empire  encryption  end  energy  engineering  Enterprise  Entertainment  entitlement  entropy  entry  environmental  ephemeral  equality  Erdogan  error  erzkonservativ  espionage  espionagem  eSport  ethical  ethics  EU  EU-Digitalkommissar  EULA  Eurasia  Europe  European  Europol  evasion  everyday  evil  Existenzangst  experience  exploit  exploits  expression  extinction  extremism  Eyes  Facebook  factor  fairness  False  Fame  Fappening  fat  FBI  FDI  fear  fearmongering  feminism  feminist  Ferguson  Fetish  fiat  fiduciary  filter  FinFisher  Firmware  First  Firstlook.org  FISA  FISAA  FISAAA  fiscal  Fish  Five  Flag  FNAC  FOI  folly  for  force  forecast  foreign  foreignaffairs  forgotten  Formspring  forum  FOSS  FRance  France  Francisco  fraud  free  freedom  freepress  freespeech  Fremdenfeindlichkeit  Fremdenhass  frictionless  Frontier  FTC  Fukushima  Future  G  G7  G8  game  gamer  GamerGate  Games  gaming  Gamma  gap  Gawker  gay  Gaza-Israel  GCHQ  GCSB  Gemalto  gender  gender-based  geopolitics  George  georgewbush  German  Germany  gesellschaft  GFC  Gig  Gini  Glenn  global  globalisation  globalization  Glossy  GNU  GNU/Linux  good  Google  gossip  governance  GPL  GPS  gratification  Greece  Greenwald  Grexit  Grid  GroKo  grooming  Group  groups  groupthink  Grundrecht  gun  gwbush  Günther  hack  hacker  hacking  Hacktivism  haircut  Haram  harassment  hat  hate  hater  haters  health  Heartbleed  Hegemony  hildmann  Hinkley  HIPAA  history  Hollywood  Home  homescreen  Homo-Ehe  Homophobia  homophobic  homosexuality  Hong  House  Huawei  human  hypocrisy  IAC  Iain  Ian  IBM  ICANN  iCloud  idealism  identity  ideology  illness  image  imgur  immigration  Imperialism  impersonation  in  Inc.  income  independence  India  Indie  industrial  industry  inequality  infographic  Information  infrastructure  injustice  innovation  innovator  instability  Instagram  instant  insult  integration  integrity  intellectual  intelligence  Intercept  interdiction  interest  interestgroups  international  internet  Interpol  intervention  Intimate  investigative  Investigatory  investment  IoT  iPhone  IPO  Irak  Iran  Iraq  Iratemonk  Iron  Is  ISIL  ISIS  Islamic  ISP  Israel  IT  Jacob  jail  Janet  Japan  Jean-Claude  Jesselyn  jock  journalism  journalismus  journalist  judgement  Judiciary  Julian  Juncker  Justice  KGB  knowledge  Kong  Korea  Kultur  language  Latin  Laura  Lauschangriff  law  Leadership  League  leak  Legislation  Lenovo  lesson  leverage  Levie  LGBT  LGBTQIASP  libel  liberty  life  Linkbait  Linux  Listicle  lobby  Lobbying  lobbyist  Lucy  LulzSec  Lybia  Lügenpresse  M  machine  Machon  Magazine  Mail  Makers  male  malware  man-in-the-middle  mandatory  Manning  manufactured  Manufacturing  Marc  Mark  market  markets  masculinity  maximisation  May  me  Meadows  media  Meerkat  Meinungsfreiheit  mental  Merkel  Met  Meta  metadata  method  MI5  MI6  Michael  Microsoft  middle  migration  military  military–industrial  Millennials  minimum  minority  mirror  Misogynie  Misogynistic  misogyny  mission  mob  mobbing  mobile  mobilephone  mobility  mobs  Mock  model  moderation  monetary  monetisation  monetization  money  monopoly  monopsony  Moore  moral  morality  morals  Moran  Morgan  Music  n00d  NAFTA  NASA  nasty  national  Nationalism  Nations  NATO  NCA  neoconservatism  neoconservatives  neoliberal  neoliberalism  Net  netzpolitik  netzpolitik.org  Neutrality  New  news  Newsfeed  NextDoor  NHS  Niall  Nigeria  NIRP  nls_933w.dll  No  Noam  norms  North  NPD  NSA  NSA-Affäre  NSA-Untersuchungsausschuss  nuclear  objectification  Occupy  Oettinger  of  Office  Ohanian  Oil  okcupid  oligarchy  oligopol  oligopoly  Omidyar  on  One  online  onlinebanking  OPEC  Open  OpenSSL  Operation  opinion  Opportunism  opportunist  organised  Orwellian  Osborne  outsourcing  overflow  oversight  Pact  pageviews  Pakistan  Palantir  Palestine  Pao  Paparazzi  Parliament  Partei  party  password  passwords  Patent  Patriarchy  Patriot  patriotact  patriotism  Pentago  Pentagon  perception  Periscope  perma  perma-cookie  personal  Perspective  phishing  phpBB  physical  Pierre  Piers  PIGS  PIIGSFB  Pinterest  Platfom  Platform  Platforming  Play  Plenty  pluralism  pluralistic  plurality  Point  Poitras  Polarisation  Police  policestate  policing  policy  political  Politicians  politics  poor  popularity  populism  porn  pornography  poverty  power  powers  PR  Precariat  precarious  prediction  predictions  prejudice  presidency  presidential  press  Pressefreiheit  price  prices  Principle  printing  PRISM  Prisoners  prison–industrial  Privacy  private  privilege  pro  Process  product  Profile  profiling  profit  profiteer  progress  progressive  promises  propaganda  property  protection  protectionism  Protest  psychiatric  Psychiatry  psychology  public  publicrelations  Putin  QE  Qualification  quantified  quantum  quo  QWERTY  racism  racket  Radack  rape  re-targeting  Reaktionismus  Reality  Rechtsextremismus  Rechtsruck  Rechtsstaat  recognition  recovery  Reddit  referendum  reform  refugee  Regin  regulation  regulators  relations  relationship  Religion  Representation  repression  resignation  responsibility  retention  reunification  revenge  Reverse  Revolution  revolving  right  rights  Ring  rippers  Road  Robotics  role  rootkit  Ross  RSA  Russia  S3  SAAS  Salesforce  San  sanctions  Saudi  scam  scandal  Scene  School  Schuldenbremse  Schäuble  science  Scottish  Search  SEC  secret  Secrets  secular  security  Security-Industrial  securityr  Selbstdarstellung  Selbstfürsorge  selector  Selectors  self  self-censorship  self-governance  self-regulation  Selfie  sensitive  sentences  Separation  Services  sex  sexism  sexismus  sexting  sexual  sexuality  sexualität  shaming  shared  shareholder  sharing  shitstorm  short-term  Silicon  Silk  Silo  SIM  SJW  slut  Smart  Smartphone  Smith  smoke  smoking  Snapchat  Snappening  Snoopers  Snowden  social  Socialist  society  sociology  socratic  Software  solidarity  Sony  Source  South  SouthChinaSea  sovereign  Sozialer  speech  Spideroak  spin  spoofing  sport  sports  spot  springform  spying  squeezed  SSH  SSL  stagnation  stakeholder  stalking  standard  Start-Up  Stasi  state  States  status  STEM  Stephen  stereotype  storytelling  straight  Strava  Street  strenght  Strike  study  Stuxnet  subculture  subhuman  suicide  Sum  Super  surveillance  Surveillance-Industrial  Swartz  symbol  Syria  Syrien  Syriza  System  Tabloid  take  Taliban  target  targeting  tax  TBTF  Tech  technological  teenager  teens  Tempora  Terror  the  TheFappening  theory  Theresa  thinking  Thomas  threat  ThreatExchange  threats  Tim  Tinder  TISA  TMZ  to  tolerance  Tolls  Tony  too  toobigtofail  Tor  TOR  Tories  torture  TOS  Totalitarian  Totalitarianism  TPM  TPP  tracking  trade  Trading  tragedy  Transgender  transparency  transphobia  Transphobic  trends  trickle-down  Trident  Trojan  Trojaner  troll  trolls  TrueCrypt  Trump  trust  trustagent  TTIP  Tumblr  Turkey  Turla  turnout  TV  Twitter  two  two-factor  Uber  UK  UKIP  Ukrain  Ukraine  Ulbricht  Umbrella  UN  uncertainty  underinvestment  undoxing  unintended  Union  United  Universal  Unix  unknown  unknowns  unkown  unrecht  Unrechtsstaat  USA  USB  user  Valley  value  values  VC  Venture  verification  vested  victim  Vietnam  view  Vigilante  Vigilantism  Village  Vine  violence  viral  virality  VirusTotal  vision  vladimirputin  Vorratsdatenspeicherung  voter  VPN  Wall  WannaCry  wants  war  warfare  warming  warrant  Warrent  Wars  Washington  waste  weapon  Web  well  Wertegesellschaft  western  Westminster  WhatsApp  Whisper  Whistleblower  white  Whitehall  Wikileaks  Windows  WindowsXP  winner  WinXP  Wireless  wiretapping  Wirtschaftsspionage  WMD  Wolfgang  Women  work  working  World  Xenophobia  Xenophobic  XKeyscore  Yak  Yelp  Yelp!  Yik  You  YouTube  Zealand  Zero  ZIRP  Zivilcourage  Zivilgesellschaft  zombie  Zuckerberg 

Copy this bookmark:



description:


tags: