The third-party cookie is dying, and Google is trying to create its replacement. No one should mourn the death of the cookie as we know it. For more than two decades, the third-party cookie has been the lynchpin in a shadowy, seedy, multi-billion dollar advertising-surveillance industry on the Web...
March 30th, 2019 By Whitney Webb The story behind the decision to shutter its Snowden archive suggests issues of cost were unlikely to have been behind the action.
Scholarly Networks Security Initiative (SNSI): working together to combat the threat of cybercrime
Cybercrime is a huge threat to the entire scholarly ecosystem and safeguarding data and privacy is paramount. Higher education institutions need protection from cyber-attacks. Their data and their users’ data must be protected.
Researchers need confidence that research they are using is correct, up to date and properly connected to the scientific record.
Cybersecurity isn’t just an issue for publishers. It isn’t just a challenge for librarians. It is not just an obstacle for institutions or nuisance for researchers. This is an issue for all of us, and a ...
Scholarly Networks Security Initiative (SNSI) brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.
Members include large and small publishers, learned societies and university presses and others involved in scholarly communications.
Khrono 26.11.2020
Från vaggan till graven. "Universiteter og høgskoler vil lagre informasjon om studenter og ansatte fra de begynner å studere til de er ferdige i arbeids- og utdanningslivet. Men personvernet har skapt implikasjoner.
2007-10-26 What was only a theoretical concept in 2001 has now become a reality with the latest development by Hitachi, and could find its way to intelligence agencies across the world. RFID chips are also a source for increasing controversy surrounding issues of privacy. An RFID chip can be used to track the location of unsuspecting individuals who have bought products that include RFID tags in their package. Having miniature cheap RFID chips, such as those developed by Hitachi, implanted inside anything we buy might make many people feel very uncomfortable. However, big businesses believe that consumers’ fears are dwarfed by the benefits of RFID chips, which include reduced theft, digital real time inventory, and better information on consumer shopping habits. This tech is now actively used in automatic dog feeders with RFID tags to feed multiple dogs at a schedule. The feeder identifies the dog with the unique RFID chip and dispenses the food. Multiple dogs in a house are fed even in the absence of dog owner.
USA Today 4 juni 2020:
The DOD and HHS did contract with ApiJect Systems, a company that makes pre-filled syringes, for a mass-production supply chain during an emergency. RFID/NFC tracking is an optional feature of the syringes, according to the RAPID Consortium.
But there is no evidence the contract is a precursor to law-enforced vaccination on the federal or state levels. Trump said that once the coronavirus vaccine becomes available, immunization will be optional. Moreover, generally states only require vaccinations for certain individuals.
We rate this claim as PARTLY FALSE because some of it was not supported by our research.
The Software Freedom Law Center provides legal representation and other law related services to protect and advance Free and Open Source Software. Eben Moglen. The Freedom Box
Sege Halimi: Une fois cette tragédie surmontée, tout recommencera-t-il comme avant ? Depuis trente ans, chaque crise a nourri l'espérance déraisonnable d'un retour à la raison, d'une prise de conscience, d'un coup d'arrêt. On a cru au confinement puis à l'inversion d'une dynamique sociopolitique dont chacun aurait enfin mesuré les impasses et les menaces.
JBS Haldane FRS: 1892-1964. His communism and espionage, including the VENONA Intercepts and the MI5 file, the betrayal of Nikolai Vavilov and support for Trofim Lysenko. Includes a complete scientific bibliography and facsimiles of his major books.
2018
Amazon is the leading cloud provider for the United States intelligence community. In 2013, Amazon entered into a $600 million contract with the CIA to build a cloud for use by intelligence agencies working with information classified as Top Secret. Then, in 2017, Amazon announced the AWS Secret Region, which allows storage of data classified up to the Secret level by a broader range of agencies and companies. Amazon also operates a special GovCloud region for US Government agencies hosting unclassified information.
Carl Bernstein's website
After leaving The Washington Post in 1977, Carl Bernstein spent six months looking at the relationship of the CIA and the press during the Cold War years. His 25,000-word cover story, published in Rolling Stone on October 20, 1977, is reprinted below.
THE CIA AND THE MEDIA
How Americas Most Powerful News Media Worked Hand in Glove with the Central Intelligence Agency and Why the Church Committee Covered It Up
Meroe Park (SFS’89), former executive director of the CIA, will provide faculty, students and university leaders with insights and perspectives as the university’s newest Distinguished Executive-in-Residence.
The Georgetown alumna also served as the acting CIA director for a short time in 2017, maintaining the agency’s operations and providing a smooth transition for Mike Pompeo to take the helm as the new director.
As Distinguished Executive-in-Residence at Georgetown, she will provide faculty, students and university leaders with insights and perspectives based on her lengthy career in public service.
Former FBI director Robert Mueller and former U.S. Defense Secretary Chuck Hagel have held past residencies.
Park, a 27-year veteran of the agency, served in the position from 2013 to 2017 – acting as the agency’s chief operating officer.
In that role, she managed the day-to-day operations of the agency, guided the organization through its largest organizational and cultural change, modernized the agency’s information technology systems and helped revamp the CIA’s talent management and development system.