If you can't read this email click here

 

FBTW

V gozdu kimajočih dreves

Junij 2016

Politični potencial IT industrije

Poletje je čas konferenc. Je čas strategij. Je čas pogledov v preteklost. Letos se po sprejemu trojčka IT strategij dogajajo pomembne spremembe na področju selitve organov, ki se pri nas ukvarjajo z informacijsko družbo. In spremembe so problematične.

Primer Tetra se je končal s pogojno obsodbo človeka, ki je opozoril na problem. In hkrati s pogojno obsodbo človeka, ki je vdrl v sistem in zlorabil pooblastila. Odvisno od tega, koga vprašate.

Javna uprava pa razvija tudi strategijo kriptologije. Po začetnih spodrsljajih je Urad za varovanje tajnih podatkov potrebno pohvaliti. Z razliko od ministrstva za javno upravo strategijo namreč sprejemajo transparentno, z vključevanjem javnosti in s koristnim namenom. Tako da se to očitno da.

Novice

Državna uprava naj le šifrira

V uradu za varovanje tajnih podatkov so že osnovi šli v pisanje strategije politike kriptografije v Sloveniji precej bolj previdno. In, vsaj enkrat za spremembo, tudi po vseh pravilih transparentnega postopka.

Odkritelju ranljivosti sistema Tetra leto in tri mesece pogojne zaporne kazni

Dejanu Ornigu, ki je v času svojega študija opozoril na varnostne ranljivosti policijskega komunikacijskega sistema Tetra, sodišče očita napad na informacijski sistem, ponarejanje listin in neupravičeno zvočno snemanje.

Pozivi proti prenosu direktorata za informacijsko družbo

Zavod Državljan D nasprotuje prenosu direktorata za informacijsko družbo z ministrstva za izobraževanje, znanost in šport na ministrstvo za javno upravo.

Informacijski pooblaščenec lani prejel največ prijav do zdaj

V uradu informacijskega pooblaščenca so lani zaznali povečanje števila pritožb zaradi molka organa, kar kaže na manjšo odzivnost prvostopenjskih organov, pravijo v uradu.

What’s driving Silicon Valley to become ‘radicalized’

Like many Silicon Valley start-ups, Larry Gadea’s company collects heaps of sensitive data from his customers. Recently, he decided to do something with that data trove that was long considered unthinkable: He is getting rid of it.

FBI wants to exempt its huge fingerprint and photo database from privacy protections

The federal law gives Americans the right to sue for government violations of the Privacy Act, such as refusing to tell a person if he or she is in the system.

Online Political Ads Find Lonely, Isolated Voters—And Barrage Them

We win by targeting the smallest of segments with the hardest hitting ads. And it’s exposed a weakness in our system that probably can’t stand the test of time.

Snowden interview:
Why the media isn’t doing its job

One of the most challenging things about the changing nature of the public’s relationship to media and the government’s relationship to media is that media has never been stronger than it is now.

Predavanja

How do we Live in a Post-Privacy World


Former NSA and CIA Director Michael Hayden on Cyber Security & Privacy


Edward Snowden Glenn Greenwald Noam Chomsky A Conversation on Privacy


Unhealthy Hacking: Medical Privacy in the Age of Cyber Attacks


Bralna značka

How Not to Network a Nation: The Uneasy History of the Soviet Internet

In How Not to Network a Nation, Benjamin Peters reverses the usual cold war dualities and argues that the American ARPANET took shape thanks to well-managed state subsidies and collaborative research environments and the Soviet network projects stumbled because of unregulated competition among self-interested institutions, bureaucrats, and others.

Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World

As with major paradigm shifts that preceded it, the blockchain will create winners and losers. And while opportunities abound, the risks of disruption and dislocation must not be ignored.

There Will Be Cyberwar

The move on the part of the US military, which began in 1996, to Network-Centric Warfare (NCW), meant the combination of sensor grids, C&C grids, and precision targeting to increase speed to command, and represented a military offset. Along with networking comes exposure to cyber attacks, attacks that will be used in future wars.

Cybersecurity and Cyberwar: What Everyone Needs to Know

In Cybersecurity and CyberWar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life.

If you wish to unsubscribe from our mailing list, click here

Cryptoparty Slovenija je projekt zavoda Državljan D | domen@drzavljand.si