netwit 2.01

#SOCIALMEDIA #cyber-utopianism #internet-centrism #BBCNewsnight [http://bit.ly/fNrj7i] @evgenymorozov ~ The Power of the Internet, Not?



Eugeny Morozov{ EM about}, author of The Net Delusion, will be on Newsnight 17 Jan 2011.



January 17, 2011 Posted by | "Collateral Murder" video, actor-network theory, Afghanistan documents, anonymity online, anonymous whistleblowing, Birgitta Jónsdóttir, Bradley Manning, Canberra cyber security centre, China, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberpunk, cyberspace, Cyberspace Policy Review, cypherpunk, Daniel Domscheit-Berg, Daniel Ellsberg, data journalism, data leakage, data security, data-dump journalism, Defence Signals Directorate (DSD, Department of Homeland Security, Der Spiegel, digital forensics, digital journalism, diplomatic cables, Echelon spy system, Electronic Frontier Foundation (EFF), encryption, Evgeny Morozov, FaceBook, FGI, free government information [FGI], Frontline Club, Government 2.0, hacker culture, Hrafnsson, Indentity Ecosystem Framework, info-war, information silos, insider security, insider threats, Internet, internet activism, internet-centrism, investigative journalism, Iraq War 2003, Iraq war logs, Jaron Lanier, Jónsdóttir, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, network theory, NSA, on-line rights, ontology, Open data, open source, organisational network analysis, P2P, P2P Foundation, Peer-to-Peer, Phorm, Pretty Good Privacy (PGP), privacy, Protecting Cyberspace as a National Asset Act (PCNAA), rogue employee, Semantic Web, silo effect, Single Person Organisation [SPO], social media, social networks, social semantic web, social silos, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, Tor, trust, trust models, Twitter, Virtual Private Network (VPN), virtual tunnel, visualisation, Web 2.0, WikiLeaks | Leave a comment

#WIKILEAKS A capacity for trust model




CEOs say creativity most important in next 5 years





Both from The Practice of Leadership blog by George Ambler.



January 15, 2011 Posted by | actor-network theory, anonymity online, anonymous whistleblowing, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, conspiracy, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, data leakage, data security, digital forensics, Electronic Frontier Foundation (EFF), encryption, Government 2.0, Govt 3.0, hacker culture, Indentity Ecosystem Framework, info-war, insider security, Internet, internet activism, investigative journalism, Julian Assange, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, network e-discovery, Network security, network theory, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, Semantic Web, social media, social networks, social semantic web, trust, trust models, Twitter, Web 2.0, WikiLeaks | Leave a comment

INTERNET #WEB Rethinking Conspiracy: The Political Philosophy of Julian #Assange [http://bit.ly/guyoRd]



Rethinking Conspiracy: The Polical Philosophy of Julian Assange



by


Peter Ludlow



January 12, 2011 Posted by | actor-network theory, Bradley Manning, Canberra cyber security centre, Citizen 2.0, connective knowledge, connectivism, conspiracy, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberspace, cypherpunk, data journalism, data leakage, Defence Signals Directorate, Department of Homeland Security, digital forensics, digital journalism, encryption, FGI, free government information [FGI], Government 2.0, Govt 3.0, hacker culture, info-war, insider security, insider threats, Internet, internet activism, Iraq war logs, Julian Assange, National Center for Cybersecurity and Communications (NCCC), National Strategy for Trusted Identities in Cyberspace, Network security, network theory, P2P, P2P Foundation, techno-libertarianism, The Crypto Anarchist Manifesto, U.S. diplomatic cables, U.S.Embassy cables, Unique Personality Organisation [UPO], WikiLeaks, WikiLeaks vs. The Yes Men | Leave a comment

#INTERNET #privacy ~ Australia’s new cyber-warefare facility [http://bit.ly/fjOrlJ]



Australia’s new cyber-warefare facility



January 12, 2011 Posted by | ASIO, Canberra cyber security centre, Citizen 2.0, cognitive infilltration, connective knowledge, connectivism, conspiracy, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberspace, Cyberspace Policy Review, cypherpunk, data journalism, data leakage, Defence Signals Directorate, Defence Signals Directorate (DSD, Department of Homeland Security, digital forensics, digital journalism, DSD, encryption, free government information [FGI], Government 2.0, Govt 3.0, hacker culture, Indentity Ecosystem Framework, info-war, information silos, insider security, insider threats, Internet, internet activism, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, Phorm, privacy, Protecting Cyberspace as a National Asset Act (PCNAA), Semantic Web, silo effect, Single Person Organisation [SPO], social media, social networks, social semantic web, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, U.S. diplomatic cables, U.S.Embassy cables, Unique Personality Organisation [UPO], Web 2.0, Web 3.0, WikiLeaks | Leave a comment

#INTERNET #privacy #digitalforensics [@4ensics] ~ On the Web, Children Face Intensive Tracking: http://budurl.com/PrivacyWSJ



On the Web, Children Face Intensive Tracking


by


Steve Stecklow, Wall Street Journal, 17 Sept 2010
steve.stecklow@wsj.com


also:


Shunned Profiling Technology on the Verge of Comeback


* On the reappearence of badform wiki:Phorm


In my scrabble to Rolodex this blog, I haven’t bothered to make any comments of my own, letting the trend of the material indicate where I am coming from/going to. It isn’t difficult to imagine Govt 1.0 scrambling to find technologies to help them keep ahead of their populations. Govt 2.0 and Citizen 2.0 evident in many places: it won’t be long before there is talk of Govt 3.0, which will be another way of talking P2P politics/society qua Michel Bauwens





January 12, 2011 Posted by | actor-network theory, asset misuse, Citizen 2.0, connective knowledge, connectivism, conspiracy, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cypherpunk, digital forensics, encryption, Govt 3.0, hacker culture, Internet, Julian Assange, National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, Network security, network theory, on-line rights, Open data, open source, Phorm, privacy, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, Web 2.0, Web 3.0, WikiLeaks | Leave a comment

INTERNET WEB Cyberspace Policy Review



Cyberspace Policy Review
– Assuring a Trusted and Resilient Information and Communications Infrastructure

* 76 page draft paper

* Useful  timeline graphic on page 78, titled  ‘History Informs Our Future’ from 1900 to the present, which highlights key technological and legal milestones.



Open in another tab to read.


Kim Cameron’s Identity Blog post 27 June 2010 gives short review:

National Strategy for Trusted Identities in Cyberspace



January 10, 2011 Posted by | Bradley Manning, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyberpunk, cyberspace, Cyberspace Policy Review, cypherpunk, data leakage, Department of Homeland Security, encryption, Government 2.0, hacker culture, Indentity Ecosystem Framework, info-war, insider security, insider threats, Internet, internet activism, internet-centrism, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, Network security, network theory, NSA, NSTIC, Open data, open source, Protecting Cyberspace as a National Asset Act (PCNAA), Semantic Web, social media, social networks, social semantic web, social silos, techno-libertarianism, Tim Burners-Lee, Web 2.0, Web 3.0, WikiLeaks | Leave a comment

INTERNET WEB National Strategy for Trusted Identities in Cyberspace #NSTIC



National Strategy for Trusted Identities in Cyberspace

– Creating Options for Enhanced Online Security and Privacy

June 25, 2010

 

* Department of Home Security draft paper

*  Proposal for an Indentity Ecosystem Framework

* Appendix of terms



January 10, 2011 Posted by | cypherpunk, data journalism, data leakage, Department of Homeland Security, digital journalism, encryption, Government 2.0, hacker culture, Indentity Ecosystem Framework, info-war, insider security, insider threats, Internet, internet activism, investigative journalism, Julian Assange, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, network theory, NSA, NSTIC, Open data, open source | Leave a comment