Kate Woodsome | Washington, D.C When news breaks, most reporters focus on the facts captured on tape to bring the story alive. But Taiwan’s Next Media Animation is taking a different approach to create compelling material. Their team of writers, actors, artists and computer programmers create digital animations that depict — and embellish — the […]
When No News Is Bad News
“Battlefield Blackout” and the Silence of Facebook Anyone with family or friends in the military knows how important electronic communications are. Tweets and Facebook updates have, if not replaced, then overtaken the handwritten letters and box of cookies sent from home. (Although we’ve never met anyone in the service who would turn their nose up […]
The Keys To The Kingdom
…And Why HTML5 May Be A Hacker’s Dream Andy Greenberg over at Forbes’ “Firewall” has this curtain-lifter from next week’s Black Hat conference on Internet security. Greenberg reports that one of next week’s presenters, security researcher (a.k.a. “reformed hacker”) Lavakumar Kuppan will demonstrate HTML5’s enhancements will also give malicious hackers to access other users browsers […]
Freedom of “Cyber-Speech”
When Is Virtual Speech Not Like Real Speech? Pop quiz: what do Governor Arnold Schwarzeneggar, Bugs Bunny, and the destruction of the US Capitol have in common? Arguably nothing except this: they all played a part in oral arguments this week before the US Supreme Court in a case that could have a major implications […]
Web Privacy Gains Traction On Both Sides of the Atlantic
Could the New US Congress Find Common Cause with the EU? Even before the votes were counted, the Internet was buzzing with speculation about the 2010 midterm elections: what their meaning may be, their economic fallout and impacts on foreign policy across the globe. Now add to the list: increased scrutiny of Internet privacy. The […]
The First Strike in Cyber-War
The Stuxnet worm has been neutralized, but not before it may have done its damage. But what’s to come? More attacks, and more sophisticated cyber-weapons, are safe bets. Read Martin Secrest’s full report by clicking here.
Digital Frontiers: BlackBerry in a Jam
The BlackBerry smart phone’s unique data encryption standards have made it a must-have by business executives, government officials, and others concerned about just who might be monitoring their communications. But those standards are putting BlackBerry’s manufacturer, Research in Motion, into hot water with governments around the world. VOA’s Doug Bernard has this look.
Center for Democracy and Technology
Independent, non-profit public interest group “…dedicated to promoting the democratic potential of today’s open, decentralized global Internet.” Its mission: “…to conceptualize, develop, and implement public policies that will keep the Internet open, innovative and free.” Address: 1634 I Street NW #1100, Washington, DC 20006Phone: 202.637.9800Website: www.cdt.org
CSIS Technology and Public Policy Program
A project within the Center for Strategic and International Studies, exploring “…how technological change affects security and economic growth in the new international environment. Current research includes cybersecurity, intelligencereform, military space, and Internet governance.” Address: 1800 K Street NW, Washington, DC 20006Phone: 202.887.0200Website: csis.org/program/technology-and-public-policy