netwit 2.01

#INTERNET #China #firewall #greatfirewallofchina





There is a US gov site which has a good summary of China and filtering, but I’ve lost it in a sudden browser shut down. And I haven’t managed to re-Google it. See it, let me know. Or anything else similarly comprehensive.

In the meantime a Der Spiegel starter from which there are some ideas to work with :

How China Leads the World in Web Censorship



Advertisements

January 19, 2011 Posted by | China, Citizen 2.0, cognitive infilltration, connectivism, cyber security, cyber warfare, cyber-utopianism, cyberspace, Der Spiegel, Electronic Frontier Foundation (EFF), Evgeny Morozov, Government 2.0, Govt 3.0, Indentity Ecosystem Framework, info-war, information silos, Internet, Internet filtering, internet-centrism | | Leave a comment

#wikileaks #USembassycable #social media #Indonesia [http://bit.ly/hUj0Zy]



WikiLeaks: the latest developments
Turkish airbase used as refuelling stop for US rendition flights and fears on ‘Baby Doc’ Duvalier, plus social media strategy in Indonesia and the latest WikiLeaks news and views

* Guardian summary

Indonesia cable:

US embassy cables: Jakarta embassy requests $100k for its social media strategy

* Indonesia’s emerging Internet community:

“….roughly 10% of the population able to access the internet at least monthly, this represents over 25 million people, nearly half of whom are on Facebook. ”

* Mission Indonesia requests $100,000 immediately in order reach a goal of 1 million Facebook fans in just 30 days — just before POTUS visit.

” 6. This money would be used in three areas. First, it would increase direct advertising via Facebook. Currently, Embassy Jakarta spends less than $25 per day on advertising, and nets between 300-400 new fans daily. Increasing this tenfold over 30 days, results in a gain of 100,000 to 120,000 fans. The funds would also be used to promote the visit and our fan page as the place to learn more by extensively advertising on Indonesian online portals, banner ads, YouTube, Twitter, and other promotional efforts, including embedding bloggers, contests and giveaways, and using SMS technology. With over 100 million mobile phone users in Indonesia, texting is a powerful way to include a huge audience. Partnering with a major telecom provider, we can encourage Indonesians to sign up for real-time updates via their cell phone — a great way to reach those not yet online about the visit. Cost: $60,000.

7. Another key promotion strategy to generate interest will be offering a “golden ticket” via Facebook. We propose making a dream come true for one lucky Indonesian, by providing an opportunity to meet POTUS during his visit. If the White House approves, we could invite fans to post why they should meet President Obama, and in doing so, use our social media platform to connect fans to the visit, as well as build excitement beforehand and follow-up coverage afterwards. In addition, we could partner with a local TV station to have a “finalist” show and increase coverage. RSO would ensure any winner(s) are vetted for security issues. If the White House would not agree to this, an alternate “dream prize” might be an educational trip to the U.S. Cost: $15,000.

8. Third, in order to implement these ideas in this limited time-frame, we need short-term expert help on this promotion in the form of a qualified local digital marketing agency, who could assist the Embassy’s new media team (currently one officer and three FSNs working on it part-time). Cost: $25,000.”



January 18, 2011 Posted by | cognitive infilltration, FaceBook, Indonesia, Mission Indonesia, P2P, Peer-to-Peer, POTUS, social media, social networks, Twitter, U.S. diplomatic cables, U.S.Embassy cables, WikiLeaks, YouTube | Leave a comment

#SOCIALMEDIA #cyber-utopianism #internet-centrism #BBCNewsnight [http://bit.ly/fNrj7i] @evgenymorozov ~ The Power of the Internet, Not?



Eugeny Morozov{ EM about}, author of The Net Delusion, will be on Newsnight 17 Jan 2011.



January 17, 2011 Posted by | "Collateral Murder" video, actor-network theory, Afghanistan documents, anonymity online, anonymous whistleblowing, Birgitta Jónsdóttir, Bradley Manning, Canberra cyber security centre, China, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberpunk, cyberspace, Cyberspace Policy Review, cypherpunk, Daniel Domscheit-Berg, Daniel Ellsberg, data journalism, data leakage, data security, data-dump journalism, Defence Signals Directorate (DSD, Department of Homeland Security, Der Spiegel, digital forensics, digital journalism, diplomatic cables, Echelon spy system, Electronic Frontier Foundation (EFF), encryption, Evgeny Morozov, FaceBook, FGI, free government information [FGI], Frontline Club, Government 2.0, hacker culture, Hrafnsson, Indentity Ecosystem Framework, info-war, information silos, insider security, insider threats, Internet, internet activism, internet-centrism, investigative journalism, Iraq War 2003, Iraq war logs, Jaron Lanier, Jónsdóttir, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, network theory, NSA, on-line rights, ontology, Open data, open source, organisational network analysis, P2P, P2P Foundation, Peer-to-Peer, Phorm, Pretty Good Privacy (PGP), privacy, Protecting Cyberspace as a National Asset Act (PCNAA), rogue employee, Semantic Web, silo effect, Single Person Organisation [SPO], social media, social networks, social semantic web, social silos, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, Tor, trust, trust models, Twitter, Virtual Private Network (VPN), virtual tunnel, visualisation, Web 2.0, WikiLeaks | Leave a comment

#WIKILEAKS A capacity for trust model




CEOs say creativity most important in next 5 years





Both from The Practice of Leadership blog by George Ambler.



January 15, 2011 Posted by | actor-network theory, anonymity online, anonymous whistleblowing, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, conspiracy, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, data leakage, data security, digital forensics, Electronic Frontier Foundation (EFF), encryption, Government 2.0, Govt 3.0, hacker culture, Indentity Ecosystem Framework, info-war, insider security, Internet, internet activism, investigative journalism, Julian Assange, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, network e-discovery, Network security, network theory, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, Semantic Web, social media, social networks, social semantic web, trust, trust models, Twitter, Web 2.0, WikiLeaks | Leave a comment

#INTERNET #privacy ~ Australia’s new cyber-warefare facility [http://bit.ly/fjOrlJ]



Australia’s new cyber-warefare facility



January 12, 2011 Posted by | ASIO, Canberra cyber security centre, Citizen 2.0, cognitive infilltration, connective knowledge, connectivism, conspiracy, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberspace, Cyberspace Policy Review, cypherpunk, data journalism, data leakage, Defence Signals Directorate, Defence Signals Directorate (DSD, Department of Homeland Security, digital forensics, digital journalism, DSD, encryption, free government information [FGI], Government 2.0, Govt 3.0, hacker culture, Indentity Ecosystem Framework, info-war, information silos, insider security, insider threats, Internet, internet activism, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, Phorm, privacy, Protecting Cyberspace as a National Asset Act (PCNAA), Semantic Web, silo effect, Single Person Organisation [SPO], social media, social networks, social semantic web, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, U.S. diplomatic cables, U.S.Embassy cables, Unique Personality Organisation [UPO], Web 2.0, Web 3.0, WikiLeaks | Leave a comment

#WEB+#WIKILEAKS+#ASSANGE+#Jónsdóttir – Did Julian Assange Learn The Politics Of V For Vendetta From Birgitta Jónsdóttir?






Did Julian Assange Learn The Politics Of V For Vendetta From Birgitta Jónsdóttir?



January 10, 2011 Posted by | Birgitta Jónsdóttir, cognitive infilltration, cyber attacks, cyber crime, cyber terrorism, cyber warfare, cyber-utopianism, cyberpunk, cypherpunk, Government 2.0, hacker culture, internet activism, Jónsdóttir, Julian Assange, V for Vendetta, WikiLeaks | Leave a comment