|
Sources Experts & SpokespersonsNews ReleasesCompanies that cooperate with dictatorships must be sanctioned2011-09-06 Reporters without Borders Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes. Sources Select ResourcesCompanies that cooperate with dictatorships must be sanctionedSources News Release Article 2011 Reporters without Borders Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes. Documents Reveal Canada's Secret Hacking TacticsGallagher, Ryan Article 2015 The Intercept Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified do... Netizen Report: Why Did YouTube Censor Your Videos? You May Never Know.Global Voices Advocacy's Netizen Report offers an international snapshot of challenges, victories, and emerging trends in Internet rights ar Netizen Report Team Article 2017 GlobalVoices Amid an apparent shift in YouTube’s approach to monitoring for rules violations and staying in the good graces of advertisers, a wave of YouTube users have found their work either blocked or relegated... Polishing Putin: hacked emails suggest dirty tricks by Russian youth groupElder, Miriam Article 2012 Guardian Nashi runs web of online trolls and bloggers paid to praise Vladimir Putin and denigrate enemies. Preparing for a Digital 9/11 Greenberg, Karen Article 2012 TomDispatch In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First... Researchers Find 'Astonishing' Malware Linked to NSA SpyingGallagher, Peter Article 2015 The Intercept Security researchers have uncovered highly sophisticated malware that is linked to a secret National Security Agency hacking operation. Richard O'Dwyer: living with the threat of extraditionStudent who set up website posting links to TV and film content fears being used as a guinea pig by Hollywood giants Ball, James Article 2012 The Guardian Richard O'Dwyer's web-linking site would place him at the heart of the titanic running battle between the Hollywood giants – struggling to keep their beleaguered business model intact in the online er... Stuxnet and the BombBenedict, Kennette Article 2012 Bulletin of the Atmoic Scientists Over the past decade, US experts have strenuously warned about the ominous possibility of other nations, rogue states, or even terrorist groups attacking US infrastructure through the Internet. As it ... Stuxnet on the LooseSecurity for the One Percent Blunden, Bill Article 2012 CounterPunch Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable crimi... Stuxnet-Like Digital Attack on Iran Nuclear Talks May Have Come from Israel, Security Researchers Say Alimardani, Mahsa Article 2015 Global Voices Moscow-based technical security company Kaspersky Lab last week revealed evidence of a new cyber attack on both its own network and those of several European hotels that hosted nuclear negotiations be... The 10 Tools of Online OppressorsO'Brien, Danny Article 2011 Committee to Protect Journalists The world’s worst online oppressors are using an array of tactics, some reflecting astonishing levels of sophistication, others reminiscent of old-school techniques. From China’s high-level malware at... US: Offensive Cyber-Warfare is Illegal... Unless We Do ItGlaser, John Unclassified 2013 Antiwar.com The US government declares that cyberwarfare directed against the US would be an act of war -- and, oh, by the way, that it is agressively engaged in cyberwarfare against foreign countries. US was 'key player in cyber-attacks on Iran's nuclear programme'Obama reported to have approved bid to target Tehran's nuclear efforts Beaumont, Peter; Hopkins, Peter Article 2012 The Guardian Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies. Where the Anti-Russian Moral Panic is Leading UsRaimondo, Justin Article 2017 Antiwar This is how the smear campaign scores points: you don't have to be on the Russian payroll -- you can be a "useful idiot" just because of your political views, which condemn you as an "unwitting" agent... Windows and online banking - Just say noArticle 2009 The Register There has been a rash of online heists that have stolen millions of dollars from businesses and non-profit organizations. While circumstances are different in each case, they all point to a single poi... Sources BookshelfDark MarketCybethieves, Cybercops and You Glenny, Misha Book 2011 Investigative research into a hackers' cybermarket where cyberthieves exchange tricks and tips. The author finds the individuals who founded the site and also tackles the problem of policing these cri...
|
|
Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2021. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.
|