Privacy is a complex concept that is impacted by new technologies. While many are concerned about online privacy and data collection, anonymity on the internet allows for important anonymous speech. However, anonymous online spaces are also used for harassment and illegal activities. An ethical approach to privacy involves balancing openness with appropriate limits, through principles like "privacy by design" and laws that protect both privacy and security. Anonymous platforms have enabled important political speech but are also threatened by calls for increased monitoring.
When Privacy Scales - Intelligent Product Design under GDPRAmanda Casari
Data-driven companies making intelligent products must design for security and privacy to be competitive globally. The EU General Data Protection Regulation (GDPR), implemented May 2018, is the benchmark that global data privacy will be measured against.
This presentation outlines the basic tenets of personal data and details the high-level changes that GDPR-compliant businesses face. It translates the current and near-future impact to teams designing products driven by machine learning and artificial intelligence and shares use cases of how SAP Concur is designing to meet this challenge while still delivering services to its end users that are driven by advanced algorithms.
Presented at The AI Conference, San Francisco, September 2018
When Privacy Scales - Intelligent Product Design under GDPRAmanda Casari
Data-driven companies making intelligent products must design for security and privacy to be competitive globally. The EU General Data Protection Regulation (GDPR), implemented May 2018, is the benchmark that global data privacy will be measured against.
This presentation outlines the basic tenets of personal data and details the high-level changes that GDPR-compliant businesses face. It translates the current and near-future impact to teams designing products driven by machine learning and artificial intelligence and shares use cases of how SAP Concur is designing to meet this challenge while still delivering services to its end users that are driven by advanced algorithms.
Presented at The AI Conference, San Francisco, September 2018
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
This presentation provides an overview of social media law, that is, the legal issues involved in using social media. The presentation provides practical examples of how those issues come about in the business world and provides ways to minimize the risks associated with those issues, including the use of social media policies.
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
This legally focused MENGinar will educate you on the risks of using Social Media along with other digital businesses. It will provide ways to help highlight:
What is social media law?
What are the more common legal issues related to businesses using social media?
How social media law can impact businesses?
What can be done to minimize the risks of those potential legal problems related to using social media?
Do the potential issues raised by using social media mean that it is better for my company to not use social media?
Shawn Tuma is a partner at the law firm BrittonTuma, a full service boutique business law firm that helps clients with all civil matters, including a full range of transaction, litigation, technology, and general counseling services. Shawn’s own broad based experience centers on business, technology, civil litigation, intellectual property litigation, and a unique expertise with cutting-edge legal issues such as computer fraud, information security, and cyber and information law.
Shawn is a frequent speaker on digital business risk issues such as computer fraud, data security, and social media law.
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
The Internet Blackout of 2012 - Protest Against SOPA and PIPAShanna Kurpe
In this presentation, Shanna Kurpe explains the Internet Blackout of 2012 and discussed the impact of house bill SOPA and senate bill PIPA with web design and web development students.
Everything Attorneys Need to Know About Web Based TechnologyAmy Larrimore
Presented in original form for CLE credits with accompanying handouts, this presentation covers everything attorneys need to understand in order to work and practice in the world of web based technology. I cover where the risks are, and aren't and how a "digital" practice is different from what you've always known. The risks are in a different place and the practice of contract law is flipped on it's head. The IT Department and the business unit can't help you to the level you're relying upon them and you might be doing a disservice by not helping them to the level that you can. The presentation includes references to case law, statutes, applicable regulations and other useful goodies.
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
This presentation provides an overview of social media law, that is, the legal issues involved in using social media. The presentation provides practical examples of how those issues come about in the business world and provides ways to minimize the risks associated with those issues, including the use of social media policies.
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
This legally focused MENGinar will educate you on the risks of using Social Media along with other digital businesses. It will provide ways to help highlight:
What is social media law?
What are the more common legal issues related to businesses using social media?
How social media law can impact businesses?
What can be done to minimize the risks of those potential legal problems related to using social media?
Do the potential issues raised by using social media mean that it is better for my company to not use social media?
Shawn Tuma is a partner at the law firm BrittonTuma, a full service boutique business law firm that helps clients with all civil matters, including a full range of transaction, litigation, technology, and general counseling services. Shawn’s own broad based experience centers on business, technology, civil litigation, intellectual property litigation, and a unique expertise with cutting-edge legal issues such as computer fraud, information security, and cyber and information law.
Shawn is a frequent speaker on digital business risk issues such as computer fraud, data security, and social media law.
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
The Internet Blackout of 2012 - Protest Against SOPA and PIPAShanna Kurpe
In this presentation, Shanna Kurpe explains the Internet Blackout of 2012 and discussed the impact of house bill SOPA and senate bill PIPA with web design and web development students.
Everything Attorneys Need to Know About Web Based TechnologyAmy Larrimore
Presented in original form for CLE credits with accompanying handouts, this presentation covers everything attorneys need to understand in order to work and practice in the world of web based technology. I cover where the risks are, and aren't and how a "digital" practice is different from what you've always known. The risks are in a different place and the practice of contract law is flipped on it's head. The IT Department and the business unit can't help you to the level you're relying upon them and you might be doing a disservice by not helping them to the level that you can. The presentation includes references to case law, statutes, applicable regulations and other useful goodies.
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
Cyberterrorism can be in the form of Information attacks which are attempts to access, destroy, or alter information retained, processed, and distributed by computers and their networks and infrastructure attacks which are attempts to damage or disable critical services such as transportation, the distribution of electricity, gas and water, air traffic control and other critical government services (excelsiour, 2020). Hacktivism would be to use a computer to progress an agenda either a social or politically motive stance on a subject matter. The fundamental difference between cyberterrorism and hacktivism is that one wants to destroy (cyberterrorism) while the other (hacktivism)wants to persuade people to their cause or create a change.
Technology has advanced these types of groups agenda farter and faster than ever before. There has always been dissenting views to what governments agendas or from what is the acceptable social norms for behavior. But now with the Internet (Technology) groups (mostly radical) can reach out to a greater audience perpetrate nefarious deeds with some form amenity. Groups can post fake news, statistics or false information to sway an audience to believe as they do. We only need to take our national security agencies word (or can we?) that state sponsored hackers infiltrated our last presidential election to sway our votes.
In my opinion our governments have perpetuated the lack of freedoms that we the people are supposed to enjoy and, in many cases, still think we have but don’t. Governments have used for themselves and suppled countries that are under totalitarian rule the software to hack SSL inscription. SSL inscription is what is supposed to protect people privacy of communication over the internet. Communication such as Gmail or your private online discussions. State sponsored Trojan’s are used by the governments now to monitor normal peoples and suspects communications to investigate its own citizens -internet connections – watch and listen to online discussions they can even collect your passwords. People have always assumed that they have some basic privacy from the government. People should now assume that what they do on a computer is going to be known by whomever wishes to view or listen.
When cybercrime expert Mikko Hypponen talked to an audience at TEDxBrussels, an independent event about how company based in Germany sold to the Egyptian government a set of tools for intercepting, at a very large scale, all the communication of the citizens of the country. This really started me to think about when this video was made -2011 a decade ago this was occurring. How far have we gone to invading privacy since then is the question?
I don’t believe that Hacktivism is a subset of cyberterrorism. I do believe they need to walk a fine line. I can understand their existence with all the government intrusion over the last 20 years (see TED video). How else are ordinary p.
Social media, surveillance and censorshiplilianedwards
Talk delivered at European University Florence, March 2012. Did the Aran spring really prove that social media enables the flowering of democracy or are social media in fact easy venues for blanket state surveillance? Can they be arenas for free speech when platforms likeTwitter are refining their censorship policies to avoid legal risk?
Isao MATSUNAMI - Digital security in japanese journalismREVULN
Massive leaks such as Wikileaks, Panama Papers and Snowden have made journalists realize that good old "just-meet-people-shoot-photo" days are gone.
Getting leak documents over the internet, grappling with data format, processing text with machine learning and protecting sources from surveillance are all getting new-norm for journalism.
However reporters, generally and historically, would be the last species to understand digital technology and data-oriented thinking.
I would like to share my experiences of teaching digital security to journalists and discuss difficulties of journalism in this post-truth world.
As our lives are more and more digital, more and more personal data travels. Consumers are becoming aware & worry, especially in a context of scandals around privacy on internet. Brands have to change their approach to big data to establish a real trusting relationship with their consumers.
Tattoos and Intellectual Property 2023 KCBABrian Rowe
Tattoo have traditionally been outside the scope of copyright. Videogames, Social Media and Movies are changing this.
*How tattoos collide with copyright
*What other rights are in tattoos
*Recent cases
*Practical basics of rights releases
Art, Free Speech, & Copyright are colliding on a daily basis. This talk looks at these intersection and asks you to use your fair use rights to help create new norms of sharing.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
3. There are knowable unknowables and then there are unknowable unknowables, and then there is the internet Majority of Americans state they are very concerned about their privacy and what online companies are doing with their data Facebook has over 600 million users and has overtaken Google as the top visited site. Zuckerberg’s Law – Sharing will grow exponentially whereby people will share twice as much this year as last, and next year will see people sharing twice the amount of content as this year, etc. (track’s with Moore’s law). Top 100 websites include mostly user generated content Youtube – 24 hours of new content is posted to youtube every minute of every day.
9. The Future of Moore’s Law Today: $349.99 In 20 years: $0.04
10.
11. Government and Court Records Customer and Commercial Records Elections The story of your life…in data Consumer and Online Records And so much more…
15. Data Brokers Data from all sources is interrelated and is compiled, analyzed and sold by Data Brokers – The used car dealers of data InfoUsa Hoovers Experion Dunn and Bradstreet Reed Elsevier -(Choicepoint, Lexis) CACI
25. Identity Theft & Data Security Over 600 million records containing private info lost in security breaches since January 2005 ID Theft is allegedly more profitable to organized crime than drugs. Cost per valid CC# on carder sites: $.04
29. Public and Private are relative terms, like hot and cold, wet and dry. One defines the other and neither exists alone. Every revolution in communication technology has resulted in IRL revolution once the public is given the means to speak without fear of reprisal; to speak anonymously. Since Brandeis and the Kodak, however, each new bit of technology also brings with it a measure of privacy fear.
31. Privacy fears can lead to lead to censorship of that which should be public Self regulation and market regulation of privacy leads to industry being the sole regulator and protector of privacy. Germans hate Google Street View, so Google now blurs German houses in street view to continue to do business in Germany. Google has censored Chinese search traffic and the Aurora Attacks arose out of a Chinese Politburo Member Googling his name and finding unflattering things. In the US, Google obscures a number of public buildings including the Vice President’s mansion. If Google can be pressured to pixelate images of public buildings, what next? Why do we trust Google? ,
32. Why is the private private and the Public Public? Because some things are just creepy, right? Define “Creepy” Policy Shouldn’t be based on an undefined emotion Scandinavian countries publish salaries. U.S. publishes mugshots.
33. Absolute Privacy, Trust and Duty What is absolute privacy? Only that which you keep in your head. (Cat’s third name, PD). For all other knowledge exchanges, the individual provides information based on some trust/value calculus. No matter how small the reveal, the provider has certain expectations as to how the recipient will receive and use the information. These expectations are privacy. What if you could share and speak anonymously? TL:DR – knowledge = duty = privacy + Anon tease
35. First, The Ethic of Publicness That which is public must be: Generous Transparent Authentic We must demand publicness from those who protect our privacy. Publicness is a potential tool and a weapon. Wikileaks didn’t bring about the apocalypse, and the work of the people should be done before the people.
36. The Ethic of Privacy Don’t Steal Information Protect Information Context Matters (threat model (g-chat v. Obama’s Blackberry, culture, etc.) Give Credit Be Transparent about use of information Give Access Don’t Use Information Against the Individual Where information is collected, a return value must be provided. (free services for data – google, facebook, OKCupid).
37. That’s why we have laws and stuff, right? No expectation of privacy or warrant needed for information we turn over to third parties. Electronic Communications Privacy Act (ECPA) of 1986 Feudal age of data regulation – Assorted state and local statutes Law enforcement officials have claimed that records of online activities are not protected. What result for data in the cloud? E-book, iPad, phone GPS tracking?
38. What Must Be Done? Update ECPA and enact comprehensive technology specific privacy laws
40. If Not Privacy By Policy, then What? www.privacybydesign.ca - Dr. Ann Cavoukian Information & Privacy Commissioner of Ontario
41. 7 Foundational Principles of Privacy by Design 1. Proactive not Reactive; Preventative not Remedial 2. Privacy as the Default 3. Privacy Embedded into Design 4. Full Functionality – Positive-Sum, not Zero-Sum 5. End-to-End Lifecycle Protection 6. Visibility and Transparency 7. Respect for User Privacy
43. Anonymous Speech This country is founded on the freedom of speech which includes a right to speak anonymously. Publius When an oppressive regime shuts down open channels of communication only anonymous speech can continue to safely question the Anonymous speech requires no trust relationship, allowing people to freely speak their minds without fear of persecution or shame No trust and no duty, however, also allows people to divorce themselves from responsibility for their speech - None of us are as cruel as all of us
44. The Anonymous Internet What happens when people have the ability to use the internet as an anonymous forum to interact with strangers? Sadly, ChatRoulette answered this question all too clearly
45. 4Chan – The Soul of The Internet What is 4Chan? Anonymous Image Board No Archives The likely source of everything amazing and horrible you’ve seen on the internet.
47. Rule 34 and memes Anonymous allows the community to take hold of something and make it something new. Original content barely exists
48. Anonymous allows the community to take hold of something and make it something new. Original content barely exists
49. Anonymous also brings out the worst Anonymous will test the limits of the first amendment.
50. The Other Side of Online Anonymous Speech The Tor Project Navy built to provide anonymous channels State department funds efforts to train foreign dissidents of oppressive regimes to use Tor to communicate anonymously. Used by journalists, military, students, dissidents and anyone and everyone else. Also forms the backbone of the secure wikileaks document submission process Wikileaks Provides anonymous means for those in possession of secrets to release them. Secrets are power. Wikileaks seeks to return that power to the people.
52. Anonymous in the Middle East After Egypt and other regimes shut down the internet, a volunteer militia of volunteer hackers and other interested parties set to work restoring communications and attacking the government Anon_Ops – developed makeshift comms 1-pager Faxbombedwikileaks Egypt docs to Egypt. LOIC lasers pointed at Government Targets Others Voice to tweet invented and deployed Ad Hoc networks and other support
53. Anonymous the Collective Roots in 4Chan Although clans exist, and leaders necessarily emerge Anonymous is nebulous and without leadership. Longstanding fight with Scientology Things changed about a year ago with Wikileaks Operation Payback Gawker HB Gary Scott Walker the Furry? Anonymous is the internet The internet is feeling threatened.
54. Anonymous Speech is Threatened The right to connect is fundamental Anonymous is frightening Fear again leads to censorship and curtailing of rights New Digital ID systems threaten online anonymous speech as one would essentially log in to use an ISP Blogs, newspapers, and even 4Chan have been ordered to divulge identifying information about anonymous posters which chills speech. No one entity should have the power to shut down the internet. We are all anonymous and we all need our protection.
55. Contact info: Brian J. Alseth Technology and Liberty Director ACLU of Washington balseth@aclu-wa.org 206-624-2184 @balseth