Showing Archived Posts

Taking Credit Where It’s Due

Posted February 25th, 2011 at 1:54 pm (UTC-4)
3 comments

Are Social Networks Inherently Democratizing? “Libya is not Egypt, it is not Tunisia.”  It’s an observation recently made by many – no less in this quote than by Saif  al-Islam, son of Libyan autocrat Moammar Gadhafi. Unlike Tunisia, there’s less national and more tribal identity in Libya.  Unlike Egypt, there are no strong Libyan institutions […]

Poisoning the Internet

Posted February 23rd, 2011 at 2:12 pm (UTC-4)
1 comment

William Ide  –  Washington A group of computer hackers hijacked websites run by the Voice of America this week, sending its online traffic to an Internet website claimed to be run by the “Iranian Cyber Army”.  The attack comes as the U.S. government is renewing its push to promote freedom in cyber space and as […]

Look Who Wants To Be Facebook Friends

Posted February 18th, 2011 at 3:57 pm (UTC-4)
1 comment

And Bloggers Pay the Price for Free Speech Online Periodically we like to share a few of the stories and posts from across the web that caught our eye.  There are no editorial threads implied connecting these items together, other than being interesting. #1 Terrorists Move to Social Media.  The open-source group Public Intelligence recently […]

Future War

Posted January 18th, 2011 at 7:53 pm (UTC-4)
Leave a comment

Jennifer Glasse | London A new OECD cyber-security study by British  professors says cyber weaponry will be used routinely in future wars. The study says computer attacks on their own will not necessarily constitute a threat, but a coordinated attack – or in combination with more computer attacks – could have serious consequences.  Read more […]

Chasing Secrets

Posted December 20th, 2010 at 5:57 pm (UTC-4)
1 comment

Once a Secret is Out of the Bag, Can It Ever Go Back In? Kate Woodsome | Washington, D.C The U.S. Justice Department is reportedly considering whether to file espionage charges against the WikiLeaks Web site and its founder Julian Assange. The case has raised broad legal questions about how the government will protect the […]

Reach Out and Touch Someone…From Prison

Posted December 13th, 2010 at 4:32 pm (UTC-4)
1 comment

How Mobile Phones are Increasingly Becoming a Threat in Jails Andrew McIntyre is no school boy.  As the BBC reports, he had been convicted on numerous firearms and drug-related charges and was serving an eight-month sentence behind bars. But that wasn’t enough to slow McIntyre’s burgeoning drug business.  From his jail cell he was able […]

Tags: , Posted in Security

The Keys To The Kingdom

Posted November 5th, 2010 at 3:58 pm (UTC-4)
Leave a comment

…And Why HTML5 May Be A Hacker’s Dream Andy Greenberg over at Forbes’ “Firewall” has this curtain-lifter from next week’s Black Hat conference on Internet security.   Greenberg reports that one of next week’s presenters, security researcher (a.k.a. “reformed hacker”) Lavakumar Kuppan will demonstrate HTML5’s enhancements will also give malicious hackers to access other users browsers […]

Posted in Security

The First Strike in Cyber-War

Posted November 3rd, 2010 at 11:55 pm (UTC-4)
1 comment

The Stuxnet worm has been neutralized, but not before it may have done its damage.  But what’s to come?  More attacks, and more sophisticated cyber-weapons, are safe bets. Read Martin Secrest’s full report by clicking here.

Tags: , Posted in Security

The Tweet That Shook The World

Posted September 13th, 2010 at 12:46 pm (UTC-4)
Leave a comment

Armed with little more than a flammable message, pastor Terry Jones set the Internet on fire recently when he announced he planned to burn copies of the Quran at his Florida church. He now says he doesn’t intend to follow through on his threat, but damage has already been done. With few followers and fewer […]

What Is Wikileaks?

Posted July 26th, 2010 at 2:15 pm (UTC-4)
Leave a comment

How One Website is Changing Journalism Wikileaks first came online in 2007, promising any individual a forum to anonymously publish previously classified, hidden or sensitive documents and make them publicly available. The idea was relatively simple: given the viral nature of the Internet – and the ease of duplicating digital documents – once secret information […]

Tags: Posted in Security

What’s Digital Frontiers?

What’s Digital Frontiers?

The Internet, mobile phones, tablet computers and other digital devices are transforming our lives in fundamental and often unpredictable ways. “Digital Frontiers” investigates how real world concepts like privacy, identity, security and freedom are evolving in the virtual world.

Find us on twitter

Calendar

July 2018
M T W T F S S
« Aug    
 1
2345678
9101112131415
16171819202122
23242526272829
3031