4,425 research outputs found

    Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World

    Get PDF
    Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americans’ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure

    New models for digital government: the role of service brokers in driving innovation

    Get PDF
    Executive summary Digital Government strategies are being rolled out in many Australian and international jurisdictions, ushering in a fundamentally different approach to the design and delivery of public sector services. Digital Government makes digital services (usually delivered through internet and mobile channels) the default delivery channels for the majority of services, and places them at the centre of innovating, designing and operating government services. Public sector or independent service brokers are increasingly important to delivering and designing these services. Service brokers are organisations or businesses that enable customers to interact with other organisations through easy-to-use and seamless interfaces. In the digital realm, a public sector service brokers example is one that provides a customer-focussed portal, such as the Federal Department of Human Services’ MyGov website. Independent service brokers from the private or community sectors can also provide greater service choice and innovation in how people interact with governments. Models for independent service brokers include Digital Mailboxes and Personal Safeboxes (eg Australia Post); public transport information service brokers (eg TripView, Tripgo and Google Transit), taxation service brokers (eg Xero and MYOB Online), community service brokers (eg HubCare) and access brokers for government services (eg public libraries, online access centres, etc) to assist those unable to access digital services. It is likely that the ambitious goals for large-scale adoption of digital government will only be achieved if governments encourage the involvement of independent service brokers to complement the role of public sector service brokers. However, there is currently little guidance on best practice models for agencies seeking to collaborate with independent service brokers or the other way around. This report addresses this critical knowledge gap by providing a practical guide to the service broker model. It explains the different roles of public sector and independent service brokers and provides case studies of service broker models. This will help to inform digital government strategies and policies to encourage the development of public sector and independent service brokers. It also considers how the emergence of a marketplace of service brokers will raise important issues such as how customer data is managed and protected, identity assured and how research and analysis of the data generated by these digital services can help inform better public policies and service improvement

    Addressing the cyber safety challenge: from risk to resilience

    Get PDF
    Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each group’s unique cyber safety needs. Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ‘risk and protection’ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to: Address the needs of populations often neglected by current policies and programs – including adults, seniors, parents, and small to medium enterprises Continue to build the digital literacy skills of all populations, because digital literacy strongly influences users’ ability to engage safely online – this is best achieved by a hands-on learning approach Keep risk in perspective – the risks and benefits of digital participation go hand in hand Broaden the focus from awareness-raising to long-term behaviour change. As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved. Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services

    Biometric Cyberintelligence and the Posse Comitatus Act

    Full text link
    This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems. This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult to enforce to protect against militarized cyberpolicing and cybersurveillance harms that may generate from the domestic use of military grade cybersurveillance tools. Maintaining strict separation of data between military and intelligence operations on the one hand, and civilian, homeland security, and domestic law enforcement agencies on the other hand, is increasingly difficult as cooperative data sharing increases. The Posse Comitatus Act and constitutional protections such as the Fourth Amendment’s privacy jurisprudence, therefore, must be reinforced in the digital age to appropriately protect citizens from militarized cyberpolicing: the blending of military/foreign intelligence tools and operations, and homeland security/domestic law enforcement tools and operations. The Article concludes that, as of yet, neither statutory nor constitutional protections have evolved sufficiently to cover the unprecedented surveillance harms posed by the migration of biometric cyberintelligence from foreign to domestic use

    Biometric Cyberintelligence and the Posse Comitatus Act

    Get PDF
    This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems. This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult to enforce to protect against militarized cyberpolicing and cybersurveillance harms that may generate from the domestic use of military grade cybersurveillance tools. Maintaining strict separation of data between military and intelligence operations on the one hand, and civilian, homeland security, and domestic law enforcement agencies on the other hand, is increasingly difficult as cooperative data sharing increases. The Posse Comitatus Act and constitutional protections such as the Fourth Amendment’s privacy jurisprudence, therefore, must be reinforced in the digital age to appropriately protect citizens from militarized cyberpolicing: the blending of military/foreign intelligence tools and operations, and homeland security/domestic law enforcement tools and operations. The Article concludes that, as of yet, neither statutory nor constitutional protections have evolved sufficiently to cover the unprecedented surveillance harms posed by the migration of biometric cyberintelligence from foreign to domestic use

    Frontline(s)

    Get PDF
    The challenge of theorising and analysing socio-political phenomena can feel overwhelming given today’s somewhat threatening realpolitik (9/11, US-led wars on Afghanistan, Iraq and now, perhaps, Syria) and the rapid pace with which (dis)information is received, digested and discarded. Through an act of ‘literary montage’ construction, and prefaced by some interpretation of my own, I offer this ‘exhibit’ as an attempt to highlight this sense of dislocation whilst simultaneously ‘building a picture’. A specific concern is to problematise the notion of ‘the frontline’. Given blatant military and economic imperialism by the US, underscored by the construction and fetishising of the rational subject under modernity and the social democratic state, I suggest that frontlines are located in any public or private space where the legitimacy of these interests and categories is questioned. Expressions of difference, including peace activism, thus become ‘proliferating illegitimacies’ and are policed as such. Against this context, the texts positioned here tell of growing realisation and fear of the coldness and instrumentalism at the heart of empire-building, of which both the horrific violence currently inflicted on Iraqi people, and the discounting and suppression of dissent to war worldwide, are part. For a global anti-capitalist/pro-justice movement that recognises trade in arms as a core constraint on human potential, reaching beyond this fear - retaining the hope of the ‘politics of possibility’ with which this ‘movement of movements’ has come to be identified – emerges as a latent and essential challenge

    Roadmap for NIS education programmes in Europe:education

    Get PDF
    This document continues work from previous activities by suggesting training materials, scenarios and a way forward for implementing the EC roadmap for NIS education in Europe. In doing so, the Agency has recognised the heterogeneous landscape of Europe in this area

    Research Roundup Newsletter: November 2022

    Get PDF
    NCITE (National Counterterrorism Innovation, Technology, and Education) is the Department of Homeland Security\u27s center of excellence for terrorism prevention and counterterrorism research. They are a federally funded academic consortium based in Omaha, Nebraska. Their newsletters covers the current news, activities, and updates of the center and the latest in counterterrorism research. The Research Roundup specifically highlights research and resources on timely counterterrorism topics
    • 

    corecore