Scholarly Networks Security Initiative (SNSI): working together to combat the threat of cybercrime
Cybercrime is a huge threat to the entire scholarly ecosystem and safeguarding data and privacy is paramount. Higher education institutions need protection from cyber-attacks. Their data and their users’ data must be protected.
Researchers need confidence that research they are using is correct, up to date and properly connected to the scientific record.
Cybersecurity isn’t just an issue for publishers. It isn’t just a challenge for librarians. It is not just an obstacle for institutions or nuisance for researchers. This is an issue for all of us, and a ...
Scholarly Networks Security Initiative (SNSI) brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.
Members include large and small publishers, learned societies and university presses and others involved in scholarly communications.
Bevisene som gjorde at FN gjenopptok undersøkelsene ble lagt fram i boka «Who killed Hammarskjöld» av Susan Williams i 2014. Hennes undersøkelser viser med stor tydelighet at vestmaktene og viktige finansinteresser må ha stått bak nedskytinga av Hammarskiölds fly for å bevare sin kontroll over Kongo og landets enorme rikdommer. Tidligere undersøkelser bærer preg av å dekke over fakta framfor å grave dem fram.
Noah Shachtman December 6, 201: "What the 29-foot-long craft did during all those months in orbit is still a matter of intense speculation. a prototype for an orbiting bomber? platform to take out the satellite assets of an enemy"?Russian military estab
James Bamford (Threat Level), Wired 15.3.2012: "The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy."
We know that dozens of law enforcement agencies already have drones, based on information from EFF’s Freedom of Information Act lawsuit over the FAA’s initial refusal to release the list of authorizations. And one of the biggest cities with a police department on the list was Seattle. It turned out Seattle’s city council—which oversees the police department—was just as surprised as many citizens to see Seattle Police Department’s name on the list. The city council learned about the drones through a reporter asking questions related to EFF’s lawsuit, not through official channels. After front page stories in the Seattle Times and an official apology from the Seattle police department, Seattle is now the first city to consider privacy safeguards for drone use by law enforcement.
Toronto Star May 21 2012: "As many as 48,000 security forces. 13,500 troops. Surface-to-air missiles stationed on top of residential apartment buildings. A sonic weapon that disperses crowds by creating “head-splitting pain.” Unmanned drones peering down from the skies. A safe zone, cordoned off by an 18-kilometre electrified fence, ringed with trained agents and 55 teams of attack dogs. One would be forgiven for thinking that these were the counter-insurgency tactics used by U.S. army bases in Iraq and Afghanistan. But instead of being used in a war zone, they in fact make up the very visible security apparatus in London for the 2012 Summer Olympics."
Wilkerson: "Let's make it a commercial empire and let's maintain that empire in terms of commerce and not in terms of killing people, killing people for oil or killing people for human rights. I think both are just as bad as the other..."
Military's 'sock puppet' software creates fake online identities to spread pro-American propaganda Jeff Jarvis: Washington shows the morals of a clumsy spammer Nick Fielding and Ian Cobain The Guardian, Thursday 17 March 2011 "The multiple persona contract is thought to have been awarded as part of a programme called Operation Earnest Voice (OEV), which was first developed in Iraq as a psychological warfare weapon against the online presence of al-Qaida supporters and others ranged against coalition forces. Since then, OEV is reported to have expanded into a $200m programme and is thought to have been used against jihadists across Pakistan, Afghanistan and the Middle East."
A lobbying organization that counts Google, Yahoo, Microsoft, Apple and other tech giants among its clients has lent support to the Cyber Intelligence Sharing and Protection Act,
Regie: James Bamford, C. Scott Willis "Das jüngste Werk von James Bamford, "The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America", bildet die Grundlage der Dokumentation. Darin deckt der amerikanische Journalist und Autor auf, wie die National Security Agency , die amerikanische Nationale Sicherheitsbehörde - deren Existenz übrigens James Bamford 1982 publik machte - die neuesten Informationstechniken anwendet, um im Krieg gegen den Terror an Informationen zu gelangen. Von Lichtwellenleitern bis zur Satellitenkommunikation erkundet er alle Mittel, die der NSA für die Audio- und E-Mail-Überwachung, bei der Millionen von E-Mails abgefangen werden, zur Verfügung stehen."
17 nov 2012 Speakers: JAMEEL JAFFER DEPUTY LEGAL DIRECTOR, AMERICAN CIVIL LIBERTIES UNION ; WILLIAM BINNEY FORMER OFFICIAL, NATIONAL SECURITY AGENCY ; JAMES BAMFORD INVESTIGATIVE JOURNALIST ALEX ABDO STAFF ATTORNEY, AMERICAN CIVIL LIBERTIES UNION