Brazilian flag. Image: bea_marques/Pixabay.
This article was originally published by OpenDemocracy on 20 November, 2014.
Brazil has embraced the digital age with more gusto than most countries. It is one of the top users of social media and recently signed-off on a bill of rights for the Internet, the marco civil. The country is also a leader in the development of online banking with more than 43% of web users engaging such services, and can be proud of a thriving software industry, including some world beating companies.
But as computer users around the world are beginning to grasp, the spread of the digital world has its downsides. Alongside all the great things the Internet offers, not least new forms of political and economic empowerment, it brings some very serious threats. » More
The NASA Supercomputer “Discover”. Image: NASA Goddard Space Flight/Flickr
“Cyber incidents are a bit like a bar brawl – you might have a pretty good idea who started it, but you will never be absolutely sure”.
When it comes to managing contemporary cyber incidents and crises, the above statement couldn’t be more accurate. National cybersecurity strategies and international regimes are not only becoming increasingly common, they’re also proving difficult to implement and enforce. In this respect, some of the most pressing concerns are associated with key cybersecurity aspects like ‘terminology’, ‘perspective’ and ‘attribution’. » More
Computer screen. Image: hackNY.org/Flickr
On November 7, the Swiss Chairmanship of the Organization for Security and Co-operation in Europe (OSCE) held a conference in Vienna on confidence-building measures for cybersecurity. The event built on several positive international developments last year, including a bilateral agreement between the U.S. and Russia and the member states of the OSCE to adopt “an initial set of OSCE Confidence-Building Measures (CBMs) to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies.” Last week’s conference sought to promote the implementation of the latter and further negotiations. This includes a recent study commissioned by the Swiss Government, and available at the Global Cyber Definitions Database, which offers a compilation of existing cybersecurity-related terms in order to shed light on these differences. » More
CIA memorial wall. Image: Wikimedia
This article was originally published by The Conversation on 10 October 2014.
In the last few years, the list of sensitive government information made public as a result of unauthorised disclosures has increased exponentially. But who really benefits from these leaks?
While they are media catnip and provide useful information to hostile individuals and organisations, they only occasionally contribute to the public debate on intelligence and truly advance the cause of democracy.
A scoop on the secret world of espionage is a guaranteed journalistic coup. And with good reason; at the simplest level, news exposures of intelligence service activities inform the public and contribute to a self-evidently important public debate on the role of intelligence in modern democracies. » More
Scientific research is no stranger to the battlefield. Technological breakthroughs have often started off in military research labs or prompted by military funding. The trend caught momentum during the Cold War when the superpowers on both sides of the Iron Curtain delegated researchers and huge budgets to the development of technologies of war, space and ocean exploration. » More