-
Published in: openSecurityMass surveillance: wrong in practice as well as principle
The paradox of mass state surveillance, as the answer to non-state violence, is that it can overlook the...
-
Published in: openSecurityHow Bahrain spies on British soil
The Bahraini government has been using sophisticated malware—complete with technical support from its...
-
Published in: openSecurityFailure is success: how American intelligence works in the 21st century
Is repeated failure actually the key to the success and endless expansion of the US intelligence community?
-
Published in: openSecurityThe Fourth Branch: the rise of the national security state
Though the US may be finally addressing some of the fictions propping up its security policies, the question...
-
Published in: openSecurityThe UN privacy report: Five Eyes remains
Will Navi Pillay's defiant stand on privacy be the first step to dismantling the dubious legal frameworks propping...
-
Published in: openSecurityA clear-eyed look at mass surveillance
The Snowden revelations on mass surveillance practices, especially by the US and UK, have triggered a global...
-
Published in: openSecurityTwenty-first century protest: social media and surveillance
The internet is a two-edged sword—a vehicle for mass surveillance on the one hand and the organisation of...
-
Published in: openSecuritySaving privacy from deformed democracy
With focus on the government's grip over surveillance, the public debate over privacy has ignored citizen-led data...
-
Published in: openSecurityCybercriminals find wonderland in developing countries
With increased Internet access and smartphone use across Latin America, Asia and Africa, organized crime networks...
-
Published in: openSecurityBorder patrol international
The U.S. border is no longer static and 'homeland security' no longer stays in the homeland: it’s mobile, it’s...
-
Published in: openDemocracyUKDoes the government need new internet surveillance powers?
The UK faces a range of cyber threats to its security – including terrorist cells, child pornography and...
-
Published in: oDRThe Kremlin and the hackers: partners in crime?
The recent Russian parliamentary and presidential elections were notable for the wide use of cyber attacks on the...
-
Published in: HomeCybersecurity: politics, interests, choices
The threat of cyber-attack is driving states and corporations to devote ever-greater resources to meet the...
-
Published in: openDemocracyUKReality Management: Hack-gate, Hari, Milibot and the Cyber War
The closure of the Murdoch-owned British tabloid News of the World amidst an escalating phone hacking scandal is...
-
Published in: HomeWill the spirit of spring come to cyberspace?
Anonymous and LulzSec represent a real change in the politics of cyberspace. The networked power at the hands of the...
-
Published in: HomeLiberation technology: dreams, politics, history
The doctrinal commitment to new cyber and social technologies as a means of solving political problems needs to...
-
Published in: HomeThe freedom cloud
The tools that help Arab democracy protesters also extend the reach of three United States corporations. The power...
-
Published in: openSecurityThe year in security
openSecurity's briefings team highlight a selection of security developments from the past year and the clues they...
-
Published in: HomeGoogle vs China: capitalist model, virtual wall
The breach between a corporate behemoth of the new-media age and an emerging state superpower defines the struggle...