Search Results for: hacking team

New IWM Report: Shadows in the Cloud

The Information Warfare Monitor/ (Citizen Lab, Munk School of Global Affairs, University of Toronto and the SecDev Group, Ottawa) and the Shadowserver Foundation announce the release of Shadows in the Cloud: An investigation into cyber espionage 2.0.FULL REPORT. The report documents a complex ecosystem of cyber espionage that systematically targeted and compromised computer systems in… Read more »

Cyberwar and the ‘destruction of rules’

Ron Deibert and Rafal Rohozinski were featured in this Sify News article on cyberwar. The article discusses the Tracking Ghostnet report published by the Citizen Lab. It features an interview from The Christian Science Monitor from which both investigators discuss the recent attacks on Google and the growing frequency of contestion in cyberspace.

From Sify News

The fog of cyberwar

As Kyrgyzstan reels from a sustained cyberattack, Danny Bradbury asks whether it was a show of strength from Russia, or whether the perpetrators are closer to home. From guardian.co.uk

Spy Fears: Twitter Terrorists, Cell Phone Jihadists

Could Twitter become terrorists’ newest killer app? A draft Army intelligence report, making its way through spy circles, thinks the miniature messaging software could be used as an effective tool for coordinating militant attacks. From Wired

Web Tool Said to Offer Way Past the Government Censor

TORONTO, Nov. 21 — Deep in a basement lab at the University of Toronto a team of political scientists, software engineers and computer-hacking activists, or “hactivists,” have created the latest, and some say most advanced tool yet in allowing Internet users to circumvent government censorship of the Web. From New York Times

Is Activism Dead?

Protests as we know them seem to have lost their urgency. But guess where it’s gaining steam Street marches may be the peace movement’s equivalent of heavy armor and lots of infantry—which has been supplanted by high-tech weaponry that supposedly requires fewer troops. Maybe rather than taking to the public square, protestors should have taken… Read more »

Does the End Justify the Means?

If your site contains material critical of certain governments or you run a porn site, someone, somewhere is blocking access to your content. Now you can find out who’s doing it, but the method — port-scanning technology — may itself be unethical. From Wired

Hacktivism on campus

Want to learn about hacktivism from a “heroin addict teaching Fuck the State”? East Van Rules! From The Independent