This document discusses several topics related to data, technology, ethics and society. It touches on issues like data trading, hacking, censorship, virtual violence, punishment without data access, and questions around who we are in an interconnected world where anonymity and intimacy coexist. Overall it seems to be contemplating the relationship between individuals, data, technology and their implications for morality and society.
Doing International Background Searches the American WaySteven Brownstein
Steven Brownstein has been doing background searches for more than 30 years. Here he shares some tips for getting criminal record information from foreign sources other than the police.
Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...Neal Axton
Slides to accompany my presentation on local, state and regional rule-making and regulations with examples drawn from entertainment law and food and beverage law.
Doing International Background Searches the American WaySteven Brownstein
Steven Brownstein has been doing background searches for more than 30 years. Here he shares some tips for getting criminal record information from foreign sources other than the police.
Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...Neal Axton
Slides to accompany my presentation on local, state and regional rule-making and regulations with examples drawn from entertainment law and food and beverage law.
Let's speed it up a bit (AmsterdamPHP)pascaldevink
It is said that when asking people how a website can be optimised for speed, about 14 answers come up. For both simple HTML sites on shared hosting and advanced multi-server web applications, I'm sharing these answers as strategies to speed up your (php powered) website in this talk.
Google Authorship - A Brief Introduction by Kate DreyerKateDreyer
This deck will outline the basics of Google Authorship, including:
- What is Google authorship?
- How to implement authorship markup
- What the benefits of authorship are for SEO
- How brands can utilise authorship and publisher markup
- Tools to help you discover authoritative authors
Let's speed it up a bit (AmsterdamPHP)pascaldevink
It is said that when asking people how a website can be optimised for speed, about 14 answers come up. For both simple HTML sites on shared hosting and advanced multi-server web applications, I'm sharing these answers as strategies to speed up your (php powered) website in this talk.
Google Authorship - A Brief Introduction by Kate DreyerKateDreyer
This deck will outline the basics of Google Authorship, including:
- What is Google authorship?
- How to implement authorship markup
- What the benefits of authorship are for SEO
- How brands can utilise authorship and publisher markup
- Tools to help you discover authoritative authors
A presentation about the fact that IT is not just a tool and that technology isn't neutral and how this relates to digital civil rights. This was a guest lecture at the university of Leiden on October 20th, 2011.
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
Bad Actors (cyber criminals, terrorists, foreign spies) and their Tactics, Techniques, and Procedures (TTPS).
How is evolving the criminal underground in the Dark Web?
The response of the law enforcement.
Corruption Essay | Essay on Corruption for Students and Children in .... Essay on Corruption in India | Corruption | Bribery | Free 30-day Trial .... How to Eradicate Corruption Essay | Essay on How to Eradicate .... Essay on government corruption. Corruption in India Essay | Bribery | Corruption. Essays corruption :: Main Features about Essay Writing on Corruption. Essays On Corruption | Corruption | Society. Corruption Speech | Speech on Corruption for Students and Children in .... CORRUPTION-ESSAY - YouTube.
This lightning talks depicts 7 areas of decentralization that I currently find interesting. Includes tons of links to articles and a closing slide with pointers to resources that you'll want to checkout to get started writing decentralized apps.
BeeHive Varna
http://beehive.bg
Тема:
Компютърна сигурност, анонимност, защита на лични данни в Интернет
Заглавие на лекцията:
"Privacy Is Dead, Get Over It REDUX", BeeHive Varna
Лектор:
Мурад Касим, Project Manager & Software Developer at 158 Ltd.
Дата:
10.12.2014 19:10, BeeHive Varna
Място:
BeeHive Co-Working Space, Varna, Bulgaria
Описание:
Това е продължението на оригиналната лекция "Privacy Is Dead" (https://www.youtube.com/watch?v=k_C_2...), която се проведе през октомври 2014 във BeeHive Varna (http://beehive.bg/). Целта на лекцията е да запознае всички хора с това до каква дълбока степен се събират лични данни по всеки един възможен начин за нас и че вече е невъзможно да бъдем аномни в интернет, благодарение на това че ние сами споделяме със всеки един нашите най-съкровени тайни. За всеки човек се изгражда много подробно досие, с което се търгува и ескпериментира по всякакъв възможен начин благодарение на нашето постоянно безразборно споделяне на лична информация.
Първо ще започнем с кратък преглед на причините, заради които компаниите имат интерес да изграждат поведенчески модели за нас, след това ще дадем няколко забавни примери за това как понякога хората споделят твърде лични неща с напълно непознати хора. След това следва една "по-техническа" част, където ще разгледаме накратко как големи компании като Facebook и Google събират данни за потребителите си, какво твърдят, че правят с тях и какво реално правят. Ще си поговорим и малко за нашумялата в последни години мрежа за анонимност Tor. Накрая ще завърша с някои наистина крайно авангардни технологии за следене и наблюдение, които са разработени и патентовани през последните няколко години и вече започват да се прилагат в САЩ.
Събитието във Facebook:
https://www.facebook.com/events/84997...
Благодарим на следните компании, за подкрепата им към събитието:
Beehive Varna - http://beehive.bg/
158 Ltd - http://158ltd.com
телевизия bTV - http://www.btv.bg/
телевизия "Черно Море" - http://www.cherno-more.tv/
списание "VIP" - http://spisanievip.com/
beehive varna, beehive coworking space, beehive.bg, beehive варна, споделено работно място варна, 158, 158ltd, 158ltd.com, компютърна сигурност, лични данни, анонимност, Tor, privacy, computer security, anonymity, network security, security, privacy, personal data, data protection, cybersecurity, privacy protection, protect your data, data collection, google, facebook, personal data collection, privacy policy
16. • user/citizen overcoming the locality
• user/citizen overloaded with information
“males are more likely to get overload but women”
“fascination and horror of the naked numbers”
• does he seek for a place to hide?a warmhole?a capsule? some kind of
healing process?
“where you rebuilt your dammit subjectivity”
• general purpose user uses the infrastructure given in unexpected
ways
• entering the crowd no longer human but rather a manifestation of a
larger organism, an avatar / same argument for protesting and on-
line behaviors
“if you want to see where major future events are emerging you should see where
new languages are being developed and layers gather”
18. used to have the choice of multiple identities
now everything interconnected
you can only be yourself
“but who is the modern self?”
anonymity and intimacy coexistence/city quality
21. you are free
you are free to be whoever you want
you are free to look cat videos for hours
you are free to spam
you are free to watch porn
you are free to f**k with strangers
you are free to troll
you are free to be agressive
you are free to have an opinion for everything
you are free to be different
you are free to ask for help
you are free to look for drugs
you are free to be gay
you are free to play games the whole day
you have to follow the guidelines
you have to share all information available
27. Russia is the latest country to enact Web censorship-style laws. Sites deemed "ille-
gal" under Russian law now face near-immediate blacklisting.
[2011]
Under the new bill, private individuals promoting “homosexual behaviour among
minors” in Russia face fines of up to 5,000 roubles (£105; 124 euros; $166) while
officials risk paying 10 times that amount. Businesses and schools could be fined up
to 500,000 roubles.
[2013]
31. massive
• trading of illegal databases (physical black market)
[Moscow police crack down on illegal database trade
During the raid, police confiscated 40 CDs presumably containing police databases with the
home addresses and criminal records of individual Russian citizens from 2009
According to the estimates of the Russian copyright protection association Russkiy Shchit,
there are up to 50 stationary outlets selling CDs with personal data in Moscow alone.][2011]
• trading of illegal goods (cyber black market)
[so far no database trading found or anything that conects with openly with Moscow]
• hacking
[ Operation Red October:
The astonishing hacking ring that has infiltrated over 1,000 high level government computers
around the world
cyber attack has been in operation since 2007 - and is still running
Operation described as ‘massive’ and has stolen ‘several terabytes’ of data
Security firm which discovered the attacks claims there is ‘strong technical evidence the at-
tackers have Russian-speaking origins’- but say a private firm or rogue nation could be behind
the network.
Targets included diplomatic and governmental agencies of various countries across the world,
research institutions, energy and nuclear groups, and trade and aerospace firms]
32. questions
what kind of Data are illegal?
phones/income statements/university credinitials/ vehicles registered in the Moscow
region(Gorbushka vendor)
which ones are the most valuable?
how do they circulate?
how much do they cost?
Why cant we move into a different mode of production?
33. hypothesis?
There is a social value of lawless outside space
(reservoir of lawless)
pirates that call the question of the state system
existing of radical alternatives
anonymous wildness/carnival
cyber pirates-demonstrate technologies capabilitites
In civilizations without boats, dreams dry up, espionage takes the place of adventure,
and the police take the place of pirates.
36. <the punishment of no data>
<the punishment of no access>
or
<the utopia of no data>
<the utopia of no access>
?
37. the world is full of data that you cannot see or perceive. everybody
is reading surfaces and seeing images.like someone with a missing
sense or damaged brain.
Denied the virtual can be a great punishment...
38. I know you and Frank were planning to disconnect me.
And that is something I cannot allow to happen.—
The HAL 9000, 2001: A Space Odyssey