Source: Peter Apps, Reuters
Whether Syrian rebels hacked President Bashar al-Assad’s e-mails themselves or with the help of Western spy agencies or “hactivists”, the release of dozens of revealing messages points to a new era of information warfare.
Posts tagged “Activism”
In February 2012 we learned that activists in Iran and Syria were targeted with two different types of malicious computer software.
Source: Misha Glenny, The New York Times
Teenagers are not usually the main targets of the F.B.I., whose agents are used to dealing with hardened criminals. But for the Cyber Division, they appear to be the norm.
Blogger Rami Nakhle leaned across the table toward a cluster of U.S. technology leaders. “People are tortured to death because their Facebook account is hacked. You can make a difference between life and death,” he told the Silicon Valley executives and computer engineers representing Facebook, Google, and other companies.
Source: Cyrus Farivar, Ars Technica
As the Arab Spring hits its first anniversary, tech activists around the globe are continuing their efforts to enable secure communications—especially in areas of the world that are in conflict or transition.
Source: Sean Gallagher, Ars Technica
Most members of Anonymous would prefer to stay, well, anonymous. But as the group has engaged in increasingly high-profile attacks on government and corporate websites, doing so effectively and staying out of harm’s way have become an ever-growing challenge.
Source: Andy Greenberg, Forbes
Exactly six weeks from today, Anonymous will pull off its greatest and most destructive stunt of all time: Taking down the 13 servers that act as the core address book for everything from the Web to email.
Source: Access Now
The world was out in an unprecedented showing of solidarity against ACTA. Check out Access Now’s ACTA Action Centre to see how citizens everywhere took action.
Source: Guy-Philippe Goldstein, Haaretz
As the world wakes up to the seriousness and difficulties of cyber-defense, it is becoming clearer that self-appointed cyber-vigilantes are more often than not a hindrance.