BATTLE FOR THE INTERNET Google’s Sergey Brin: state filtering of dissent threatens web freedom
Day 3 Guardian 7 day series Battle for the Internet
Google’s Sergey Brin: state filtering of dissent threatens web freedom
Charles Arthur, Guardian 18 April 2012
Google Hands Wikileaks Volunteer’s Gmail Data to U.S. Government
Google Hands Wikileaks Volunteer’s Gmail Data to U.S. Government
John Titlow, ReadWriteWeb 10 October 2011
The contacts list and IP address data of Jacob Appelbaum, a WikiLeaks volunteer and developer for Tor was given to the U.S. government after they requested it using a secret court order enabled by a controversial 1986 law called the Electronic Communications Privacy Act, according to the Wall Street Journal.
Google, Cloud Computing and the Surveillance -Industrial Complex
Google, Cloud Computing and the Surveillance-Industrial Complex
by
Christopher Ketcham and Travis Kelly
CounterPunch, April 1-15 2010
#WIKILEAKS #China ~ WikiLeaks: China’s Politburo a cabal of business empires [6 Dec 2010]
WikiLeaks: China’s Politburo a cabal of business empires
Peter Foster, Beijing, The Telegraph, 6 Dec 2010
The WDIK column
When this article was first published, there was no rush of articles musing about the similarities between the Chinese and U.S. Systems. Who in mainstream U.S. media would dare to moot such parallels?
It seems all states evolve into this sort of set-up. With Gore Vidal’s words about the U.S never having been a democracy echoing (what then an ‘electoral state’ ?), it’s quite easy to grasp that the U.S. might have been designed from inception to operate in the way the U.S. diplomats in the Wikileaks U.S cable leaks describes present day China.
Perhaps there is a rule of statehood, governance, power, influence networks, that states this kind of arrangement is the default to which states – which didn’t start off like like that – revert to over time. A kind of biological-social law.
In a post WikiLeaks world – full of notions of P2P – what is essential is that spidercharts of influence (influence landscape) are draw up to enable individuals to make up their own minds whether to trust a politician or business leader.
A series of flashcards in Netwit 2.1 will link to ideas on trust models. They won’t necessarily come consecutively but as they are found. I prefer visualisations to long screeds, so they will more often than not be graphics to aid thinking, rather than complete explanations. The first one which came from business trust modelling, has at its core ‘capacity for trust’.
WEB WEBSITE #URLsematicweb {#sematicweb #RDAa #Facebook #Twitter #Google}
#RDFa Support: How Do #Google, #Facebook & #Twitter Compare? And How Will This Impact Their Position In The #Semantic #Search #Engine Market?
Bernard Lunn, 26 June 2010
* plumps for #Facebook at time of writing
SEMANTIC WEB Google, Twitter and Facebook build the sematic web
Google, Twitter and Facebook build the semantic web
Jim Giles, New Scientist, 2 August 2010 [subscription only]
This is the introduction:
A TRULY meaningful way of interacting with the web may finally be here, and it is called the semantic web. The idea was proposed over a decade ago by Tim Berners-Lee, among others. Now a triumvirate of internet heavyweights – Google, Twitter and Facebook – are making it real.
The defining characteristic of the semantic web is that information should be stored in a machine-readable format. Crucially, that would allow computers to handle information in ways we would find more useful, because they would be processing the concepts within documents rather than just the documents themselves.
Imagine bookmarking a story about Barack Obama: your computer will store the URL, but it has no way of knowing whether the content relates to politics or, say, cookery. If, however, each web page were to be tagged with information about its content, we can ask the web questions and expect sensible answers.
It is a wildly attractive idea but there have been few practical examples. That’s about to change.
Google’s acquisition this month of Metaweb, a San Francisco-based semantic search company is a step in the right direction. Metaweb owns Freebase, which is an open-source database. Why would Google want Freebase? Partly because it contains information on more than 12 million web “entities”, from people to scientific theories. But mostly because of the way in which Freebase accumulates its knowledge – it is almost as if a person were doing it, making links between pieces of information in a way that makes sense to them.
Freebase entries, culled from sources such as Wikipedia, are tagged so that computers can understand what each is about and link them together. Freebase lists, for example, that one entry for “Chicago” is about a city and another describes the hit musical. Entries are also linked to other relevant entries, such as other towns or shows.
-
Archives
- August 2012 (1)
- May 2012 (1)
- April 2012 (8)
- February 2012 (1)
- January 2012 (14)
- December 2011 (11)
- October 2011 (11)
- September 2011 (7)
- July 2011 (5)
- June 2011 (9)
- May 2011 (26)
- April 2011 (17)
-
Categories
- "Collateral Murder" video
- #occupytheweb
- #ows
- 1917 Espionage Act
- 2703(d) order
- 2TE Corproration
- Aaron Barr
- ACLU
- ACTA
- actor-network theory
- Afghanistan documents
- Alan Rusbridger
- Amazon
- Amesys
- Amnesty International
- anarcho-capitalism
- Anders Johnsson
- anonymity
- anonymity online
- Anonymous
- anonymous networks
- anonymous remailers
- anonymous whistleblowing
- Antoine de Saint-Exupery
- Apple
- apps
- ASIO
- ASIS
- Assange
- Assange extradition
- asset misuse
- Bank of America
- Barrett Brown
- Bernard Keane
- Bill Gates
- Birgitta Jónsdóttir
- Bitcoin
- botnet
- Bradley Manning
- broadband
- Bruno Latour
- Bull S.A.
- Cambridge Union
- Canberra cyber security centre
- CCDCOE
- censorship-circumventing software
- Centre for Security and Intelligence Studies
- China
- Chris Dodd
- Citizen 2.0
- citizen journalism
- Clay Shirkey
- Cloud computing
- cognitive infilltration
- cognitive infiltration
- COICA
- Combating Online Infringement and Counterfeits Act [COICA]
- community wireless networks
- compliance
- connective knowledge
- connectivism
- conspiracy
- Conspiracy as Governance
- Cooperative Cyber Defence Centre of Excellence
- Cory Doctorow
- crowd sourcing
- cyber attacks
- Cyber Command
- cyber crime
- Cyber Defence League [Estonia]
- cyber espionage
- cyber rights
- cyber security
- cyber terrorism
- cyber warfare
- cyber-activism
- cyber-arms
- cyber-auxiliaries
- cyber-optimism
- cyber-pessimism
- cyber-tools
- cyber-utopianism
- cyber-war
- cybersiege [Estonia]
- cyberspace
- Cyberspace Policy Review
- cypherpunk
- cypherpunk philosophy
- cypherpunk rejectionists
- Czechoslovakia
- Daniel Domscheit-Berg
- Daniel Ellsberg
- Darwinism
- data analysis
- data journalism
- data leakage
- data security
- data-dump journalism
- David Correira
- David Friedman
- David Leigh
- DDOS
- DebateGraph
- Declan McCullagh
- Defence Signals Directorate
- Defence Signals Directorate (DSD
- Defense Advanced Research Projects Agency
- Denial of Service
- Department of Homeland Security
- Department of Justice [U.S.]
- Der Spiegel
- digileaks
- digital cash
- digital forensics
- digital journalism
- diplomatic cables
- DNSSEC
- DOJ
- DSD
- Duncan Frissell
- E-PARASITE Act
- Eagle System
- Echelon spy system
- Ed Cummings
- Egypt
- El País
- Electronic Frontier Foundation
- Electronic Frontier Foundation (EFF)
- encryption
- Eric Holder
- Eric Hughes
- Espionage Act
- Esther Dyson
- Estonia
- Estonian Internet Community (EIC)
- European Arrest Warrants (EAWs)
- European Counter Network [ECN]
- Evgeny Morozov
- FBI
- FGI
- fiat currency
- Finland
- France
- free government information [FGI]
- Friedrich Kittler
- Frontline Club
- GCHQ
- Global Online Freedom Act
- Government 1.0
- Government 2.0
- Govt 3.0
- graphic literacy
- Guantánamo
- Guardian
- hacker culture
- hackerworld
- hacking
- hacking tools
- hacktivism
- hacktivist
- Hans Ulrich Obrist
- HBGary
- HBGary Federal
- Helen Nissenbaum [privacy researcher]
- HQ2
- Hrafnsson
- i2e Technologies
- Ibsen
- Indentity Ecosystem Framework
- Indonesia
- info-war
- information security
- information silos
- Inside Wikileaks
- insider security
- insider threats
- insurance.aes256
- Inter-Parliamentary Union
- intercept
- International Transfer of Prisoners (ITP) scheme
- Internet
- internet activism
- Internet censorship
- internet engineers
- Internet filtering
- internet in a suitcase
- internet monitoring
- Internet packet
- Internet Relay Chat [IRC]
- internet-centrism
- interpersonal ties
- investigative journalism
- Iran
- Iraq War 2003
- Iraq war logs
- IRC
- ISP
- Israel Shamir
- Jacob Appelbaum
- James Ball
- Jan Palach
- Jaron Lanier
- Jónsdóttir
- Jeff Jarvis
- John Gilmore
- John Naughton
- Jonathan Stray
- Jonathan Zittrain
- journalism
- JP Rangaswami
- Julian Assange
- Kevin Mitnick
- kill switch
- L-3 Communications
- lamestream media
- Le Monde
- Lockheed Martin
- Low Orbit Ion Cannon [LOIC]
- Luke Harding
- Malcolm Gladwell
- Manning
- Mark S. Granovetter
- Mark Zuckerberg
- MARUTUKKU
- massive intercept gear
- MasterCard
- MayFirst/People Link
- media
- Micah Sifry
- Misha Glenny
- Mission Indonesia
- Mitch Kapor
- Mixmaster
- Mohamed Bouazizi
- MPAA
- MTI
- Myanmar
- Narus
- Natanz
- Nate Anderson
- National Center for Cybersecurity and Communications (NCCC)
- National Open Source Intelligence Centre
- National Security Agency [NSA]
- National Strategy for Trusted Identities in Cyberspace
- native apps
- Nepal
- net activism
- net neutrality
- netizen
- NetOwl Programme
- network anomalies
- network e-discovery
- Network security
- network silos
- network theory
- network-based pedagogy
- New York Times
- NSA
- NSTIC
- OECD
- on-line rights
- online anonymity
- online privacy
- ontology
- Open data
- open source
- Openleaks
- OPSEC [operations security]
- organisational network analysis
- P2P
- P2P Foundation
- Pakistan Papers
- Paul Carr
- PayPal
- PCNAA
- Peer-to-Peer
- Peiter Zatko
- Pentagon
- Pentagon Papers
- perfect forward secrecy
- personal data
- personal data economy
- Personal Democracy Forum
- Peter Ludlow
- Phil Zimmerman
- Phorm
- PIPA
- post-representational networks
- PostFinance
- POTUS
- Pretty Good Privacy (PGP)
- privacy
- Privacy Act
- Privacy Bill of Rights
- Protecting Cyberspace as a National Asset Act (PCNAA)
- public statistics
- public-key cryptography
- Radia Tapes
- Rap News 5
- RDF
- Reality Distortion Field
- redaction
- remailers
- Reporters Without Borders
- RIIA
- Riseup Networks
- rogue employee
- Ron Paul
- Rop Gonggrijp
- routing censorship
- Royal Institute of International Affairs
- RT
- RT [Russia Today]
- Sarah Lacy
- Sarah Palin
- Sascha Meinrath
- Scott Ludham
- Scott Ludlam
- Semantic Web
- Shell/Nigeria
- Shoe-Thrower's Index
- Signals Intelligence Automation Research Center [SARC]
- silo effect
- Single Person Organisation [SPO]
- SIPRNET
- Skype
- slacktivism
- Slavoj Žižek
- Smári McCarthy
- social media
- social networks
- social semantic web
- social silos
- socket puppets
- SOPA
- SPARQL
- SQL injection
- SRA
- SSL encryption
- Stephen Downes
- Stop Online Piracy Act
- Strict Transport Security
- Stuxnet
- Suelette Dreyfus
- sureveilance technology
- surveillance technology
- tactical media
- Takedown
- techno-libertarianism
- Telecommunications Interceptions and Access Act
- The Colbert Report
- The Crypto Anarchist Manifesto
- The Dragonfly Effect
- ThinThread
- Tim Burners-Lee
- Tim May
- Timothy C. May
- Timothy Garton Ash
- Titan Rain attacks
- Tom Espiner
- Tor
- Tor Project
- TrapWire
- trust
- trust models
- Tsutomu Shimamura
- Tunisia
- Tunisian cyberactivists
- Twitter data logs
- Twitter No Logs campaign
- U.S. diplomatic cables
- U.S.Embassy cables
- Uncategorized
- Unique Personality Organisation [UPO]
- Uprising Index
- US Department of Justice
- USCYBERCOM
- V for Vendetta
- VASTech
- Virtual Private Network (VPN)
- virtual tunnel
- Visa
- visualisation
- VPN
- Wall Street Journal
- walled gardens
- warrantless surveillance program
- Wau Holland
- Web 2.0
- Web 3.0
- web scraping
- whistleblowers
- WiFi
- WikiLeaks
- WikiLeaks rival
- WikiLeaks vs. The Yes Men
- Yemen
- You Loop
- YouTube
- Zeynep Tufekci
- Zizek
- ZXMT System
-
RSS
Entries RSS
Comments RSS