only search

Mass surveillance: wrong in practice as well as principle

The paradox of mass state surveillance, as the answer to non-state violence, is that it can overlook the intelligence targeted law enforcement finds and render critical infrastructures vulnerable—never mind threatening fundamental freedoms.

How Bahrain spies on British soil

The Bahraini government has been using sophisticated malwarecomplete with technical support from its manufacturerto remotely conduct surveillance operations on its political dissidents living in the UK. 

Failure is success: how American intelligence works in the 21st century

 Is repeated failure actually the key to the success and endless expansion of the US intelligence community?  

The Fourth Branch: the rise of the national security state

Though the US may be finally addressing some of the fictions propping up its security policies, the question remains: who rules Washington? 

The UN privacy report: Five Eyes remains

Will Navi Pillay's defiant stand on privacy be the first step to dismantling the dubious legal frameworks propping up the Five Eyes intelligence-sharing arrangement? 

A clear-eyed look at mass surveillance

The Snowden revelations on mass surveillance practices, especially by the US and UK, have triggered a global struggle over the right to privacy—and a report by the outgoing UN human-rights commissioner has set the terrain for the next phase.

Twenty-first century protest: social media and surveillance

The internet is a two-edged sword—a vehicle for mass surveillance on the one hand and the organisation of civil-society protest on the other.

Saving privacy from deformed democracy

With focus on the government's grip over surveillance, the public debate over privacy has ignored citizen-led data initiatives to regain power in the digital age - and the war being waged against them. 

Cybercriminals find wonderland in developing countries

With increased Internet access and smartphone use across Latin America, Asia and Africa, organized crime networks are exploiting vulnerabilities to extend their reach - sometimes with violent results. What's the impact inside and outside cyberspace? 

Border patrol international

The U.S. border is no longer static and 'homeland security' no longer stays in the homeland: it’s mobile, it’s rapid, and it's international. Todd Miller exposes the growing border-security complex. 

Does the government need new internet surveillance powers?

The UK faces a range of cyber threats to its security – including terrorist cells, child pornography and cyber-crime. Are they enough to justify extending the government’s powers of online surveillance? 

The Kremlin and the hackers: partners in crime?

The recent Russian parliamentary and presidential elections were notable for the wide use of cyber attacks on the websites of the liberal media, as well as opposition hackers accessing officials’ intranet email exchanges. But was this a question of large-scale collusion between the Kremlin and professional hackers, or an altogether more amateur effort by political activists? In the latest article in their ‘Project ID’ series, Irina Borogan and Andrei Soldatov investigate the destructive forces targeting the Russian internet.

Cybersecurity: politics, interests, choices

The threat of cyber-attack is driving states and corporations to devote ever-greater resources to meet the challenge. The accompanying debate about the scale of the risk has profound implications for the future of the internet, says Ben Schiller.

Reality Management: Hack-gate, Hari, Milibot and the Cyber War

The closure of the Murdoch-owned British tabloid News of the World amidst an escalating phone hacking scandal is just one aspect of a bigger crisis that is undermining the reality management system upon which the media, politicians and the financial sector rely

Will the spirit of spring come to cyberspace?

Anonymous and LulzSec represent a real change in the politics of cyberspace. The networked power at the hands of the hackers may show itself to be the equal of people power on the streets

Liberation technology: dreams, politics, history

The doctrinal commitment to new cyber and social technologies as a means of solving political problems needs to learn from the past and take a more realistic view, says Armine Ishkanian.

The freedom cloud

The tools that help Arab democracy protesters also extend the reach of three United States corporations. The power of Facebook, Google, and Twitter represents an appropriation of the hacker-utopian ideals of the early internet, says Becky Hogge. The challenge to those who still uphold these ideals is to recover a true freedom path.

The year in security

openSecurity's briefings team highlight a selection of security developments from the past year and the clues they hold for 2011.

Google vs China: capitalist model, virtual wall

The breach between a corporate behemoth of the new-media age and an emerging state superpower defines the struggle for the world’s information future, say Johnny Ryan & Stefan Halper.

iWar: pirates, states and the internet

The internet-dependence of governments, businesses and authorities around the world invites a proliferation of net-based assaults. Welcome to the new age of "iWar", says Johnny Ryan.

The China model

As Chinese companies “go global”, NGO campaigners are increasingly concerned about Beijing’s model of international development.

Angola’s government, in need of reconstruction funds after the country’s long civil war, was in the process of negotiating a new loan with the International Monetary Fund in 2004. The IMF, aware of Angola’s long history of corruption and poor governance since independence from Portuguese colonial rule in 1975, was keen to include measures to cut corruption and tighten the country’s economic management.

Syndicate content