HEARING BEFORE THE SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES
Julian Assange conta seu encontro com Eric Schmidt, presidente do Google, discutindo os problemas políticos enfrentados pela sociedade – da Primavera Árabe ao Bitcoin – e as respostas tecnológicas geradas pela rede global para esses dilemas.
Depois da publicação de Cypherpunks: liberdade e o futuro da internet e há mais de dois anos asilado na Embaixada do Equador em Londres, Julian Assange, fundador e editor do WikiLeaks, lança no Brasil seu segundo e mais recente livro, Quando o Google encontrou o WikiLeaks. Ao longo de 168 páginas, Assange discute as consequências da acumulação de poder pelo Google no século XXI e relata seu encontro com Eric Schmidt, presidente do grupo, em 2011. O resultado é um livro fascinante e alarmante, que revela os polos opostos em que esses dois personagens icônicos da atual “era tecnológica” se encontram e suas opiniões divergentes sobre o destino do mundo e das novas tecnologias.
Continue reading “Quando o Google encontrou o WikiLeaks (Portuguese Edition)”
Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Recently, terrorist groups have been conducting more passive forms of information warfare. It is reported that these terrorist groups are using the Internet to conduct their operations by employing email and file encryption and steganography, as well as conducting web defacement attacks. Information Warfare (IW) has been around since the dawn of war. Information warfare has been and remains a critical element in deciding the outcome of military battles. According to Denning, "Information warfare consists of those actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary. This book discusses the nature and impact of cyber terrorism with the methods that have proven to be effective in law enforcement.
How to be a Hacktivist: Using hacking to be an Activist
With the times changing and the people losing more of their freedoms than ever to the powerful governments around the world hacktivism is quickly becoming the newest form of political activism. More and more political activists are using the internet as their preferred source to extend their voice. Hacktivists come from all walks of life. They are doctors, parents, and politicians. Hacktivists are quickly becoming the most power political activists that the world has ever seen.
Continue reading “How to be a Hacktivist – Political activism through a cyber environment”