Cyberculture roundup: New Laws on Privacy issues, Iranian presidential candidate does Reddit AMA, CISPA on the agenda…

In Uncategorized on February 14, 2013 at 11:57

The Legislation of Privacy: New Laws That Will Change Your Life

from Background Check by admin

Iranian presidential candidate does Reddit AMA

from FP Passport by Neha Paliwal

The Enduring Power of Radio in the Digital Age

from Mashable! by Matt Petronzio

Did Terrorists Use Twitter to Increase Situational Awareness?

from iRevolution by Patrick Meier

Those who are still skeptical about the value of Twitter for real-time situational awareness during a crisis ought to ask why terrorists likely think otherwise. In 2008, terrorists carried out multiple attacks on Mumbai in what many refer to as the worst terrorist incident in Indian history. This study, summarized below, explains how the terrorists in question could have used social media for coor-dination and decision-making purposes.

CISPA, the Privacy-Invading Cybersecurity Spying Bill, is Back in Congress

from Updates by Mark M. Jaycox
It’s official: The Cyber Intelligence Sharing and Protection Act was reintroduced in the House of Representatives this morning. CISPA is the contentious bill civil liberties advocates fought last year, which would provide a poorly-defined “cybersecurity” exception to existing privacy law. CISPA offers broad immunities to companies who choose to share data with government agencies (including the private communications of users) in the name of cybersecurity. It also creates avenues for companies to share data with any federal agencies, including military intelligence agencies like the National Security Agency (NSA).

An analysis of gender on Twitter

from by Sarah Pavis
A study of 14,000 Twitter users was published recently (pdf) by a trio of linguists and computer scientists (Bamman, Eisenstein, Schnoebelen) that looks at the gendered expression of language online.

Amazon Tops Apple and Google as Most Reputable Company in U.S.

from Mashable! by Anita Li

Disproportionate State Surveillance: A Violation of Privacy

from Updates by Katitza Rodriguez
This is the fourth in a series of posts mapping global surveillance challenges discussed at EFF’s State Surveillance and Human Rights Camp in Rio de Janeiro, Brazil.
States around the world are faced daily with the challenge of protecting their populations from potential and real threats. To detect and respond to them, many governments surveil communication networks, physical movements, and transactional records. Though surveillance by its nature compromises individual privacy, there are exceptional situations where state surveillance is justified. Yet, if state surveillance is unnecessary or overreaching, with weak legal safeguards and a failure to follow due process, it can become disproportionate to the threat—infringing on people’s privacy rights.

Is ‘Pirate DRM’ Really the Best Response to Bulk DMCA Takedowns?

from TorrentFreak by enigmax

The file-sharing world is a multi-headed beast but not just in the traditional ‘hydra’ sense.

The most visible elements are the public torrent sites like The Pirate Bay, KickassTorrents and any of the others from the current Top 10. Generally (censorship efforts aside) these sites can be accessed by just about anyone. All that is needed is a torrent client and the ability to read.

5 Things Bill Gates Revealed on Reddit

from Mashable! by Pete Pachal

US Is Victim of Massive Cyber Espionage Campaign

from Mashable! by Lorenzo Franceschi-Bicchierai

The future of Russia’s i-curtain

from open Democracy News Analysis – by Irina Borogan
Hot on the heels of a new law establishing a register of forbidden sites, Russian authorities are now promoting a system of ‘virtual’ borders and international supervision. Their proposal has so far failed to find significant support, but Russia will keep trying, says Irina Borogan

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: