The Internet Society today expressed concern over the recent order from the United States District Court for the Central District of California requiring Apple to bypass or disable the auto-erase function on a seized iPhone and to enable the FBI to more effectively conduct a brute force attack on the device. more
At his farewell speech in August outgoing, Telstra CEO Andy Penn mentioned that the cyber threat has never been as serious as the present. He mentioned the deteriorating geopolitical situation and the big shift in how criminals operate in the cyber domain. One thing is for sure is that in order to enjoy all the positives resulting from the digital economy, we need to be far more vigilant about the barrage of information that we are receiving and/or have access to. more
Yahoo recently become the latest company to join Twitter, Facebook and Google for promising to alert users suspected of being spied on by state-sponsored actors. However UK ministers want to make it a criminal offence for tech firms to warn users of requests for access to their communication data made by security organizations. more
After quelling nationwide protests, Iran has intensified its use of digital surveillance, deploying phone tracking, facial recognition and online monitoring to identify, intimidate and detain dissenters through a vast state-controlled communications infrastructure. more
When I was a young child growing up in the late 1980s, my parents were lucky enough to be able to afford to have both a VHS-tape video-recorder in the living room and a Betamax tape recorder in their bedroom. This effectively meant that to me, the great video format wars weren't a decade-defining clash of technologies, but rather they consisted mainly of answering the question "in which room can I watch my favorite cartoons?". more
Speaking at the the Second World Internet Conference, a government-organized conference attended by executives of global and Chinese Internet companies, Xi called for the creation of a global "governance system" to reflect the "wishes and interests of all countries." more
Google reported today that it has filed an amended petition in the U.S. Foreign Intelligence Surveillance Court. The company, in a blog post, reports: "This petition [PDF] mirrors the requests made to Congress and the President by our industry and civil liberties groups in a letter [PDF] earlier this year. Namely, that Google be allowed to publish detailed statistics about the types (if any) of national security requests we receive under the Foreign Intelligence Surveillance Act, including Section 702." Request has also been made by Google for the court to hold its hearing in open rather than behind closed doors. more
According to reports today, the Australian federal government made a drastic change to a bill that could potentially allow ISPs to police online traffic. Karen Dearne of the Australian IT reports: "Electronic Frontiers Australia spokesman Geordie Guy said it was unclear if the draft Telecommunications (Interception and Access) Amendment Bill was an "attempt to sneak through" a wholesale expansion of intercepts of private emails and file-sharing or merely a badly drafted bill." more
Google, Facebook, Twitter and Microsoft are among tech companies that have joined Apple in its iPhone fight with the U.S. government, according the latest report from the Wall Street Journal. more
Speaking during a discussion on innovation hosted by Reuters in Washington, Bill Gates said that no one was an "absolutist" on either side of the digital privacy debate but that he supports Microsoft's lawsuit against the U.S. government seeking the freedom to tell customers when federal agencies have sought their data. more
The digital domain encompasses the different spaces and spheres we use to relate and interact with the people and things that surround us using digital technologies. The digital domain is not limited to the technologies itself, but it has an important ethical dimension that encompasses the values, principles and instruments that inform and govern it. Created by humans for humans, our beliefs, cultural backgrounds, and biases are reflected in the codes we write and the algorithms we create. more
Beijing and leading Chinese tech firms are collaborating to build a secure smartphone for government officials that rely on domestically built operating system and processor chip, according to reports. more
Africa's cybersecurity failures stem less from sophisticated hackers than from insecure system design, weak governance and limited skills, leaving institutions exposed and shifting the challenge from external threats to internal accountability and resilience. more
Comcast has sketched out plans for a gigantic database called "TV Warehouse," able to store a full year of statistics gathered from digital set-tops in more than 16 million households nationwide, according to an industry executive familiar with the project. TV Warehouse, envisioned as having a massive 500 Terabytes of storage, would then feed up to a database even broader in scope operated by Canoe Ventures, the advanced-advertising venture formed by Comcast and five other large MSOs. more
C-SPAN interviews professor Gene Spafford from Purdue University on the topic of cybersecurity and how the current Internet is a conduit for all types of "cybercrime". He also talks about the much discussed article "A New Internet?" by John Markoff in the February 14, 2009, New York Times in which he was quoted. The piece argued for a new type of Internet that is more secure with the trade-off of users giving up more of their anonymity. Professor Spafford talks about alternative solutions and he responded to questions via telephone calls and email. more