Bestand wählen
Merken

Black Code

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
this so we could
buy it in
if you see a half hour a literary thank you for coming I'm really glad to be
here in Berlin uh at the beginning uh with Edward Snowden's but all eyes are on stone of course and what can you say this is the biggest intelligence in all of human history and as I understand it many millions of documents
were taken so we're going to be living in on world in the aftermath of the world that Edwards stillness help shape of for many years to come that notwithstanding the importance of this topic I'm not actually going to go through the other revelations in any detail in fact I'm going to start somewhere far far away in Pakistan now as many of you know I think Pakistan as a country with more than its share of problems it's a country that has a corrupt government there are 2 major Governance Challenges insurgencies throughout the country but it faces
almost on a weekly basis drone strikes from the air that have major collateral damages to civilians many casualties which inflame already a tense situation around a religious sensitivities it's also 1 of the world's worst places for human rights and free expression that journalists were routinely harassed many kidnap and torture media
headquarters or bond and it's also 1 of the world's worst senses of the Internet all of you to do is blocked for example in Pakistan as are many websites having to do with human rights information or information about LGBT issues on not that long ago the Government of Pakistan put out this tender for proposals for a
nationwide Internet filtering system they wanted to solicit proposals from companies to build effectively the Great Firewall of Pakistan and it was quite a sophisticated set of requirements they wanted a company that could service up to 50 million euros a 2nd and so uh this was quite something quite substantial worldwide public reaction to this was quite inflamed many people within the
communities that I belong to the organized up public advocacy campaign a letter-writing campaign where they send letters to the companies that manufacture Internet censorship technologies and they said please don't be on Pakistan's request for proposals and actually had some effect of McAfee the maker of this Markov filter system actually tweeted
their response saying that it's official we're not going to be at on this project but the system went ahead and today if you visit Pakistan and you get online and you try to access you to uh this is what you'll see block page like this now as the citizen Lab which I direct we look upon this as a kind of challenge for this is a puzzle that we want to solve but who are the manufacturers of the company of the technologies that are used to do the censorship in Pakistan who won the contract so we undertook a series of remote scans and in-country tasks undertaken by partner
organizations in Pakistan and after analysis the researchers came across this which may not mean much to some people in the room but to
the researchers at the system while it's the equivalent of a fingerprint in the HTML response code alone we can tell from this who the manufacture of
the filtering system was but the funny thing was the filtering system was actually misconfigured such that if you went to the IP address directly instead of the domain name you would get this which is the administration panel for the filtering system itself including a login prompt and on the
admin panel you can see all sorts of
fingerprints clearly laid out the company is named their Netsweeper now for those of you don't know that there's a connection for me to this because Netsweeper happens to be a company based in
Canada and when we released a report there was some significant media attention about this in Canada made all of the headlines and the major newspapers but then it quickly died
off overtaken by the usual slew of current events in Pakistan however it was only the beginning of the story 1 of the organizations in Pakistan within its citizens have worked on this project fights for all did not stop at the research but actually took the Pakistan
government to court they've been engaging in public of litigation for many months but unfortunately bytes for all has experienced the darker
side of Pakistan as a result of threats and intimidation open
calls on national media for blasphemy charges to be laid against the header bytes for all effectively a death sentence and kidnappings of staff members in the middle of the nite this is this is the price that is paid by advocacy organizations like fights for all simply for doing research public litigation and advocacy in the promotion of human rights meanwhile other Pakistan right so groups
were puzzled by the fact that comedian companies supply the technology to do the filtering and 1 of them actually wrote to the Canadian government and remarkably the canadian government replied and this is the letter here I know you can't read it but I can tell you the gist of it is yes in Canada we believe
in human rights but when it comes to the situation of Netsweeper in Pakistan well the the line is down here use of such technologies in Pakistan is the responsibility of the government of Pakistan to managed in accordance with local laws that's what you
call having your cake and eating it too I think is a phrase but now to
me this is a microcosm of the type of world we are going to see more of in the future when it comes to Internet
freedom issues of flood democracy revision with internal insurgencies corruption and strife a major violator of human rights in a country where access to the platforms of the internet we take for granted in places like Germany were filtered using hybrid technology supplied by a Canadian firm is this the future of the Internet posts no it's also a microcosm of the type
of work that we do at the Citizen Lab now for those of you who don't know the system I is an unusual place where Research Unit at the University of Toronto and we employ a mixed methods approach to the research that we
do we combine the skills of of engineers computer scientists with social scientists we collaborate with people from all over the world to do field research that we do like our partners in Pakistan and we do this to advance research on global security cyberspace in human rights we've uncovered global cyber espionage networks we've documented patterns of
Internet censorship worldwide to projects like the Open Net Initiative and more recently we've documented the disturbing growth of what many are calling the market for digital harms
products and services for Internet censorship and surveillance spyware in computer network attack we been a kind of digital early warning systems scanning the horizon and what we've seen frankly has been really disturbing
when I'm going to do today is described to you some of what we have seen and I'm going to start by putting the conversation in a bit of a broader historical context outlining 3 major social
forces shaping global Internet politics today and then I'm going to describe some of these warning signs which we need to take seriously the signs of growing censorship surveillance and militarization of this global commons so that we now call cyberspace and I hope to end by saying some suggestions of what we
can do about it but 1st of broader historical context and the first one I think is an obvious 1 to everyone here in this room but I think it needs to be said we are going through the most profound
change in communication technologies in all of human history right that that's a bold thing to say when you think about technologies like the printing press radiotelegraph television all very important but I believe just within the last 3 to 5 years we're going through the most transformative purely on the basis of 3 technologies mobile social media and cloud computing
nobles are different in many ways but they share 1 very important characteristic and that's the amount of private information information that used to be an art desktop search filing cabinets even in our heads that we now interested 3rd parties most of those 3rd
parties are private companies and many of them are private companies that are headquartered in the in jurisdictions other than the ones that we're citizens and this includes data
that we are conscious and deliberate about the females we stand in the tweets we post but it also includes a lot of information that were completely or mostly unconscious of about
and that and I think the best way to describe way the people talking about his metadata so if you take my mobile phone even when I'm not using and its emitting a pulse every few
seconds as a beacon trying to locate the nearest Wi-Fi router or cell phone exchange and live within that
region is the make and model of the
form the fact that it's my phone because my name is attached to the operating system the operating system on the phone and most importantly the geo
location of the phone so all you have phones in your pocket were all connected to each other now in time and space and that's just the mobile phone most of us have
dozens of applications on her mobile phones that do more or less the same thing then each of them can give permission to access our communications or e-mail it's about our social networks even our photographs and the data doesn't just evaporate into the it sits there on the computers on the servers of the companies that owned and operated there to be mined or shared perhaps indefinitely now all of this is really profound but with what many people are calling out the Internet of Things is going to grow exponentially as more and more
devices now something like 15 billion are connected to each other and to the internet we're leaving this digital exhaust around us as we go about our daily lots of that contains extraordinary precise
information about our lives are habits or social relationships reduced to trillions of data points that form now this new ethereal where around the planet that's only growing in all directions so that's the very 1st historical context the 2nd is the growing role of the state in
cyberspace now this will simplify things of that but if you go back 20 years or so and did a survey most governments didn't think about the Internet
all very few of them had even Internet policy this right fast forward to today not only are they very involved in Internet issues but cyber security is at the top of most countries agendas worldwide right and I think in hindsight this was to be expected with so much technology connected to the internet including critical infrastructure creating all sorts of externalities was really inevitable that the state would have to get involved but there was as often happens in history a punctuation point that accelerated in color that and that punctuation point was of course about 9 11 now it's
hard to underestimate the impact this has had on the technologies that we're all talking about today we still live in the shadow of 9 11 several things in the wake of those horrific attacks occurred that we know more about that 1st the security paradigm
turned inward to all of society game this is something that happened gradually after the end of the Cold War the primary threat paradigm change from 1 which was previously a concerned mostly about what other states is doing that in the middle of the nite estate on the other side of the planet would launch ballistic
missiles over the horizon to 1 where the paradigm is of of the threat being instead someone blowing themselves up in a crowded theater like this so that the paradigm
turned inward you also see a culture shift especially in the United States especially in and around Washington DC this idea of all
bets are off an edge of the envelope type thinking which brings about the urgency to overcome of barriers and see is part of this culture shift and operate a
reverence to the rule of law that begins to manifest itself you also have a very important legal changes after 9 11 the Patriot Act another security and terrorism acts were passed in the United States and most industrialized countries around the world that empowers law-enforcement and intelligence and part of this was based on the perception of the failure to connect the dots that led to this catastrophe right so now we need to connect the dots meaning we have to collected
all collect the entire haystack you also see at this time important change in the military strategic thinking beginning in the 2 thousands and have a definition of
cyberspace as a domain equal to land sea air and space in Pentagon thinking and the development of ofensive capabilities to fight and win wars in this domain important Rubicon was crossed with the Stuxnet virus when the US and Israeli intelligence agencies targeted nuclear enrichment facilities in enron you had in effect the 1st act of war sabotage occurring through cyberspace and now predictably we have an arms race in cyberspace as dozens of governments are standing up within the armed forces capabilities to fight and win wars that shows no signs of abating it brings up some interesting questions what does it mean when war is constant its scope
is global and the battlefield is the realm of ideas and public dialog now those 2
historical forces together are generating a new markets and new political economy dynamics dynamic that
i've called the cyber security industrial complex the aims of the Internet economy on the 1 hand and the aims of State security
convergence of overlap around the same functional means collecting and monitoring and analyzing as much fake data as possible not surprisingly you see
many of the same firms servicing both segments of the markets like companies of market facial recognition technologies for example which tend to be dominated by Israeli firms servicing Facebook on the 1 hand and the CIA on the other they read what
we so now part of the market is much more nefarious capabilities of being put in the hands of policymakers 5 years ago they never imagined
that they would have a cell phone tracking social media infiltration in computer network attack and exploitation companies that we used to associate with wiring the world and connecting individuals are now turning those wires into secret weapons of warfare and repression this is
where big data meets big brother now the confluence of these 2 social forces happening in this historical error are
really breathtaking in scope and scale and I think require us to step back and think about the historical significance at the very same time that we're in the midst of turning their digitalized inside of the world's most powerful surveillance machinery is turning inwards on all of us a surveillance machine who's over arching intention is to shield itself from public scrutiny to barely
acknowledged its own existence to operate in a cloak of secrecy that to me is not possible shift requiring an urgent conversation on the order
of a new social contract now there's a 3rd historical social forces happening right now that we need to take into account and its way less understood
especially by people living in affluent Western countries and that is the true of the Internet is changing fast were going through a demographic a demographic revolution when it comes to
cyberspace I believe is perhaps the most important in the center of gravity of cyberspace the shifting break before our
eyes from the north and the west of the planet where was invented to the south and the east and this change is going to be an extraordinary the vast majority of Internet users today and into the future are coming from the developing world was sent me
well when you look at it closely some the fastest-growing online populations are emerging from the world's weakest states the fail the fragile for whom these technologies are empowering in many of them like Pakistan religion plays a more important role in governance typically does in the last many of them are authoritarian or autocratic
regimes failed states or slipping into something like authoritarianism remember these countries and their populations are quickly entering into what we call Cyberspace at a much different time than the early adopters they're coming after the prisoner as
revelations with the model of the NSA in mind at a time when cyber security is at the top of the international agenda and most importantly when products and services of unparalleled surveillance in computer network exploitation power are being offered commercially what should we expect that
from these next billion digital users as they come on line in the post known error why I think we 1st have to consider the international dynamic now before so many people had a kind of simplified black and white view of the international governance of the Internet there was on the 1 hand all of those freedom-loving countries the United
States Germany United Kingdom Canada and so on so called the Freedom online coalition that favored something like the existing open distributed model of Internet governance and on the other side were all the other countries that favored a more top-down state-centric approach greater national controls what can we expect of the governance in this space in the wake of the Snowden revelations well 1 thing you can say is that of freedom online coalition is facing a
major legitimacy crisis the full details around the scope of the NSA documents in practices and what's been
going on with gchq and others like them have angered many leaders understandable leading to calls for data localization and detachment from the United States here in Germany of course calls a very strong showing in routing as it's known now data localization in and of itself is not that but 1 person's data localization can be another's national censorship regime like many I fear the balkanization of the Internet will result in will we see countries
that the 1st the government Internet engaging in partnerships and sharing best practices due jointly developing technical platforms as China Enron of Don will we see major events like the Sochi Olympics which I called prism on
steroids will we see them used as a kind of showcase marketed turned turnkey style wholesale to countries undergoing rapid development a kind of surveillance by designing for whole whole urban centers how these pressures come to bear on a region like sub-Saharan Africa undergoing growth rates on the order of several hundred per cent per year remember we said talk about the Chinese company while way having public-relations problems for fear about after being implanted on the rotors 1 now the tables are turned
and American companies have a hallway problems of their own which is opened the door for new investment opportunities for companies like this will we see the legitimization of nationwide monitoring systems that seek to duplicate
the imperative to collect the entire haystack monitor at all as appears to be the case in India with the role of of its so-called central monitoring system for the 40 million dollar Nigerian system powered by the Israeli security firm Elbit Systems will we come to take for granted that the popular applications millions of us now used to chat and socialize chair pictures and even organize politically will have contained within the hidden functionalities of keyword censorship and surveillance uploaded with new lists every week to reflect current events as we discovered in the is allowed in the Chinese version of Skype and the popular instant messaging
application will we experienced more warnings like this because well it's acceptable and that's what everyone does what about the benefits of the Internet for social mobilization democratic change a few years ago many of us celebrated the arab spring
as the paradigm of what these technologies to do you remember we called at the time of liberation technologies that would bring about the end of authoritarian rule unfortunately Syria has become the arab spring stock after working together Citizen Lab and EFF researchers have shown how the very means of online organization could become sources of insecurity as groups sympathetic to this aberration have employed off the shelf malware crime kids to infiltrate social networks arrest torture and murder opposition groups and even target the airstrikes Our research has uncovered numerous cases of human rights activists in places like Bahrain Ethiopian elsewhere targeted by advanced spyware manufactured by Western companies if these were isolated
incidents perhaps we could write them off as anomalies but our global span of the command and control servers of these products pioneered by Bill Mahers and Morgan marking wire and Claudio Panarin others has
produced deeply disturbing evidence of a global market that knows no boundaries we found command-and-control servers for fins by backdoors a total of 25 countries including countries with dubious human rights records like Bahrain Bangladesh Ethiopia gather and Turkmenistan among others a subsequent project found that 21 governments are current or former users of software including 9 receiving the lowest ranking authoritarian in the economists 2012 democracy index that that's just to companies their products all over the
world a market that is going to spread far and wide in our research has only picked at the surface of what is a growing major field products that provide advanced deep packet inspection content filtering Social network mining cell phone
tracking and even computer network in an attack capabilities are being put in the hands of policymakers developed by Western firms and used to limit democratic participation isolate and identify opposition
and infiltrate meddlesome adversaries all over the world indeed what I worry about most is that the template for the future of the Internet is not the arab spring at all it's actually the green movement in from a few years prior to recall hellip began with such
high hopes dubbed a Twitter revolution by many but it ended in a dark cloud through an Arabian version of prison user data turned over by the largest cell phone provider
Nokia Siemens to the Revolutionary Guard clearly we want to prevent such abuses from happening but on what basis will we do so what moral grounds will we stand on
here to make the case that that is something wrong that shouldn't happen over there now I'm a Canadian citizen so I think it's instructive task that question with respect to Canada which is what we've been doing lately at the citizen love led by Christopher persons he sent out a survey a detailed questionnaire to around 13 telcos and I as in Canada asking them whether how and how often they share user data this big ethereal digital exhaust poles us around with police and intelligence agencies and the answer he got unfortunately no comment there nothing like transparency reports in Canada but we tell you that and then just a few
weeks ago we found out what is considered normal practice for the Canadian government agencies to routinely share user data but with governments on the order of millions of times a year all without a warrant shouldn't be any surprise that that in Canada are signals intelligence agency which is supposed to be restricted to monitoring activities abroad is using all of this data has been collected to model canadian communication habits at airports hotels places of works in coffee shops should not be surprising or perhaps not a surprise as the official response given by c set which is our NSA says the government of Canada node you make Canadian communications were our or are targeted collected or used all this work are scratching their heads of that now that the does make sense maybe they're basing what they're doing in on a secret interpretation of a
secret plot maybe they're using a different thing English language dictionary than the rest of the human
rights or maybe they're following the George Costanza rule of public policy yeah just remember it's not a a if you believe that
a whichever the answer is it's not good if we're turning over user data without judicial oversight who we to hold the moral high ground on what basis can be credibly criticize those countries abroad when we do no difference here at home now granted
whatever sketch here I think is pretty daunting and it may seem at times to those of us who study this area that it's all overwhelming but I think we have to have a strategy to bring about change I think that strategy has to begin at home after 9 11 the
pendulum swung way over here in terms of the greater empowerment for law-enforcement and intelligence and restrictions on
privacy rights we need to restore transparency accountability and oversight to governments and liberal democratic governments need to start getting their own house is in awarded known theories are needed for this we just need to remind ourselves of some basic principles
at the heart of democracy mixture division we need to extend oversight and transparency
accountability of private-sector precisely because the hand so much highly revealing information as never before in human history to private companies we need to find ways to monitor what they're
doing and that is going to require new forms of innovation new watchdog capacities new types of monitoring that overseas with the private sector's doing especially around the Cybersecurity industrial complex and the stock market of cyber arms we also need to be d secure ties and reuse so late the engineering community and by that I mean reverse the process that has happened over the last decade or so where the engineers the core
scientists that effectively run the Internet developed the standards to cryptography and the regulations
that the protocols that define how it all works have been gradually user into national security rivalries that have tainted their communities and undermined trust and reputation somehow we need to get that back we need to give
meaning to the empty euphemism of multi-stakeholder is I can't tell you how often I hear governments loading but they support
multi-stakeholder results but don't practice what they preach we need to distribute governments as widely as possible and make sure decision
making about the Internet and cyberspace doesn't happen behind closed doors decided upon by States and private sector we can never let that happen again and finally I believe we need a cultural change we need to recover the original sense of half of what it means to be a factor in the original hacktivists so that at which in many quarters today is synonymous with breaking the law but originally had a very positive connotation it meant someone who is interested in technology understanding how it works beneath the surface not taking it for granted not just
accepting things as shrink-wrapped I think we need to encourage that type of attitude towards technology as a civic ethic today need to not take the Internet for granted we need to lift the lid on it and find out what goes on beneath the surface now I'm not idealistic I realize that all
of this can happen overnight this it's going to take a very long time but we need to start somewhere and I see this as a long of world map to recover democracy and human rights in cyberspace before it's too late thank you very much I
have higher
it
so the question but if by the time might was from from Polish free and open source software foundation and I
agree with those 5 points completely but I miss a set S 6 point and I think that the 6 6 point is crucial to the 6 point being we need to convince the users need to convince everybody that they need to support its right this need support this it's also financial support this it's also a public debate afford this need support in the media etc. etc. etc. and if users do not understand the users cannot see that the point the users that not see the connection between supporting something and expecting the results of this this will not happen and this has been uh extremely visible and extremely stock in the heart situation where a lot of a lot of future IT companies ICT companies and by extension a huge swaths of users were using a single of software developed by 11 guys that are underfunded and this is something that we need to think what I agree
completely that what if I I would I would add that is another 1 I think it's it is obviously a major challenge for a lot of people especially the people who really have toiled tirelessly in the human rights advocacy space and so there's a lot is a research organization we don't necessarily do that advocacy that we work with an admirer
the the ones that do the groups like yeah that and you know I had and some of the people that met here in Germany doing phenomenal work but you're absolutely right that the scales are imbalanced here
you can look at many indications of that
the the team that worked on the Open SSL I heard some statistics about the funding that they received for the year is something like 2 thousand dollars you know
this is ridiculous given that this is
used by you know a a huge number of people that rely on just on the basis of Security alone it's it's ridiculous and so is not does not take money from any government but I think it's still interesting to think about the the imbalance that exists there when you look at for example the funds from the freedom online coalition to support Internet freedom in a lot of people are doing a lot of good work using those funds including I
believe Torah gets some of its funding from from that fund and that's a good thing but that we're talking about the tens of millions of dollars compared to the billions tens hundreds of
billions of dollars of that defines the market for surveillance censorship and computer network attack capabilities and programs that are designed to sum over those very things so there's a huge imbalance right now and we all frankly have to work on rectifying out somehow to change is hard to see from
appears to continue to to make you might perceive the redundant now but I know I was going to say
on point number 4 using being shouldn't
happen behind but not all stories them effectively remember uh Microsoft pushed
through this variable the format the completely open doors by basically bribing everyone mn for receiving come companies to vote for for accepting that table format in if we again if you think about the internet so example but just brought up the the funds for the British East these humongous it's they should go to to to fight in in such
an imbalance that hold on for example the fight Microsoft promised the strong because you can clearly see the techniques that they're in all value that the point of making use just money in an inner cities going again and again
it's coming up in this kind of problem of imbalanced money coming up very often in that's the I'm interested in what your thoughts of what are your thoughts on trying to you know balances out of these you know is the order of magnitude that the talking about the difference in the order of magnitude is only like 3 5 0 that listen and it's quite a lot so again it's a very
good question and I think you know it allows
me to bring up another a pet project of mine if you will of being a professor at a university among the many different things that can be done on these issues I think universities have a special role to play and are not really fulfilling their responsibility and by that I mean it was out of the universities that the Internet was born
forget about the universe of story about the Defense Advanced Research Project Agency whatever I'm not talking about time but what
we take for granted as the basic protocols and so on come out of the university is where many of the notions of peer networking and some of the other principles of that define the Internet have their origins and it was primarily among university engineers that the Internet was built and designed and effectively run for many decades but unfortunately now I think universities are not stepping up to the major challenges that exist that we're all talking about now and have been revealed thanks in part to Edward known the Internet is under threat to the very the very commons of
information the that that we used to not only engage in shopping and all sorts of trivial things but is now become the repository of our common knowledge the university should be standing up and saying this threat to
this system cannot go on it must not happen because the university the whole rationale there is the university is the custodian of knowledge and it's the Internet or knowledge is shared now an archive and that's why I think universities have a special role to play in taking on this challenge unfortunately you have the same problems there you have a major imbalance in funding for research that goes towards the very things that we oppose if you go to any engineering sciences department or any computer science department the vast majority of funds for research comes from military intelligence sectors that needs to change somehow from we need to overcome
disciplinary divides within the university as well is crazy that we live in a society that we live in and you can go through in engineering and computer science program without taking a single social science
courses philosophy course and likewise in the arts and sciences we have people going through whole undergraduate degrees and they do even know how to what to do inside the computers or how the technology actually works beneath the surface were new during our citizens and we need to change that by overcoming these disciplinary divides and all that answer you the challenges you lay out entirely but it has to be 1 small component of all
close of brothers of fantastic presentation and thank to record this is of from Mikosch from the Center for Internet and
Society of I just had a few questions on on these last few of points of so 1 is 1 point number 2 of despite all the problems we have with governmental accountability there exist frameworks of the existing systems vary widely recognized things like the Universal Declaration of Human Rights for private sector accountability on the other hand there isn't any they're accountable to their shareholders not to sit is your accountable perhaps because like the of just like extends consumers as well so how do you propose giving human rights ideas which we can enforce against governments up to the how we extend that to the private sector that's 1 because the 2nd 1 can emerges of points 3 and 4 of which is to build a widely cited example of good multi-stakeholder processes the of fear 1 example would be something like the idea I. to yes or would be the Internet architecture for except except I'm not really sure about that I see the
idea was primarily a commercial organization the most of the things that get pushed through odd things that are supported by
large commercial organization of if you look at the constitution of the Internet architecture for for instance it has been around 15 people of which of proteins are all white meals from North America and Western and Northern Europe maybe it's hardly represents the Internet community get that currently the most successful multi-stakeholder thing you have to do so would you know any other know examples of rare multi-stakeholder rats that actually work so
in terms of 1st question about the private sector I don't pretend to have any you know novel answer in my back pocket about how to do this but I do think tho that there's some obvious things that we need we need to do more of that I can see working now but if you look at pressures on companies from known people column name and shame campaigns but I think that trivializes actually what's involved so I'll give you an example of this is allowed of 1 of the projects uh
that is now being undertaken by Christopher persons is to have put out there if you go to this is my website very I see is the 1st entry details to citizens on how they can exercise their rights to ask companies what data they keep on I think that alone is right that very
few systems actually exercise right so at Christie's he laid out the argument rational why this is important they went further any actually outputs all of the the addresses for the company offices and even puts a form letter together for you by giving you the text that you can use and going further yet again he says well what happens if they don't reply will here's what you do here's how you logic complaint and here's the template letter you can use to lodge the complaint so as successful as is then that are now developing an app that will facilitate this even more quickly so this is 1 example of i think the type of distributed watchdog functionalities that can
happen think must happen if we're going to hold the private sector responsible because you're absolutely right it can we can think about in terms of just 1 state more you know because corporations are very nimble many of them a transnational it has to happen in a distributed way that has to happen in the new creative manner rather the questionable multi-stakeholder
processes it is very difficult to actually do this in practice you see this all the time not meaning internet area but and climate change governance right where you have
thousands of stakeholders involved in all sorts of special interest lobbying and cost no civil society groups can be manipulated by a special forces and lobbyists to presented positions as
if they're coming from civil society I didn't go to next Monday I'll in Brazil but I heard that it was a very successful example of the type of multi-stakeholder process that can happen but also on the issue is we need to start doing this we can have something like the London cyber process I was at the 1st London cyber event and for those of you don't know this was meant to be a major gathering around governance of cyber security and there is a point at this meeting where the government representatives literally went behind a closed door I there's like no it's not a metaphor they actually did that and we're not allowed in we all the rest of us all us to
the way they are actually behind closed doors allowed to go there at the time of this like that just can't happen you know this is not the Government's domains to shape according to national interest it is as
someone said earlier what we make of it it's ours right and we need to government accordingly it just so happens that turns out to be the best way to ensure that security by distributing it as widely as possible any other questions the comments the we show
that the quality you have to me for that column I old in what I think With this thing the right here in the office and this is
what
Verzeichnisdienst
Code
Besprechung/Interview
Datenerfassung
Vorlesung/Konferenz
Arithmetischer Ausdruck
Sensitivitätsanalyse
Shape <Informatik>
Freeware
Rechter Winkel
Gemeinsamer Speicher
Hypermedia
Basisvektor
Hilfesystem
Computeranimation
Physikalisches System
Web Site
Uniforme Struktur
Menge
Firewall
Rechter Winkel
Vorlesung/Konferenz
Hill-Differentialgleichung
Physikalisches System
Information
Internetworking
Soundverarbeitung
Besprechung/Interview
Reihe
Physikalisches System
p-Block
Internetworking
Design by Contract
Homepage
Task
RPC
Endogene Variable
Firewall
Projektive Ebene
Portscanner
Domain-Name
Selbst organisierendes System
Endogene Variable
Besprechung/Interview
Systemverwaltung
Elektronischer Fingerabdruck
Vorlesung/Konferenz
Maschinensprache
Physikalisches System
Äquivalenzklasse
Netzadresse
Analysis
Einfach zusammenhängender Raum
Selbst organisierendes System
Hypermedia
Besprechung/Interview
Elektronischer Fingerabdruck
Systemverwaltung
Vorlesung/Konferenz
Projektive Ebene
Strömungsrichtung
Ereignishorizont
Verkehrsinformation
Resultante
Selbst organisierendes System
Rechter Winkel
Offene Menge
Stab
Hypermedia
Besprechung/Interview
Gruppenkeim
Systemaufruf
Vorlesung/Konferenz
E-Mail
Rechter Winkel
Endogene Variable
Besprechung/Interview
Stellenring
Systemaufruf
Gesetz <Physik>
Gerade
DoS-Attacke
Rechter Winkel
Datentyp
Versionsverwaltung
Vorlesung/Konferenz
Systemplattform
Internetworking
Cyberspace
Datenfeld
Einheit <Mathematik>
Datennetz
Rechter Winkel
Cybersex
Computersicherheit
Besprechung/Interview
Physikalisches System
Bit
Umsetzung <Informatik>
Gewicht <Mathematik>
Datennetz
Besprechung/Interview
Physikalisches System
Kontextbezogenes System
Biprodukt
Internetworking
Dienst <Informatik>
Offene Menge
Digitalisierer
Vorlesung/Konferenz
Projektive Ebene
Spyware
Horizontale
Cyberspace
Forcing
Rechter Winkel
Vorzeichen <Mathematik>
Basisvektor
Mobiles Internet
Hypermedia
Mathematisierung
Vorlesung/Konferenz
Informationstechnik
Kontextbezogenes System
Cloud Computing
Soziale Software
Internetworking
Twitter <Softwareplattform>
Vorlesung/Konferenz
Information
Elektronische Publikation
Eins
Schreib-Lese-Kopf
Bildschirmmaske
Informationsmodellierung
Puls <Technik>
Enterprise-Resource-Planning
Netzbetriebssystem
Zwei
Besprechung/Interview
Vorlesung/Konferenz
Router
URL
Räumliche Anordnung
Minkowski-Metrik
Telekommunikation
Digitale Photographie
Server
Vorlesung/Konferenz
Kartesische Koordinaten
Internet der Dinge
Computerunterstütztes Verfahren
E-Mail
Internetworking
Cyberspace
Punkt
Cybersex
Rechter Winkel
Computersicherheit
Cyberspace
Leistung <Physik>
Vorlesung/Konferenz
Kantenfärbung
Information
Sondierung
Kontextbezogenes System
Quick-Sort
Aggregatzustand
Internetworking
Richtung
Spieltheorie
Computersicherheit
Mathematisierung
Programmierparadigma
Abschattung
Aggregatzustand
Computersicherheit
Mathematisierung
Besprechung/Interview
Einhüllende
Schlussregel
Gesetz <Physik>
Katastrophentheorie
Skalarprodukt
Rechter Winkel
Datentyp
Mereologie
Programmierparadigma
Vorlesung/Konferenz
Horizontale
Verschiebungsoperator
Soundverarbeitung
Cyberspace
Domain-Name
Computervirus
Forcing
Vorzeichen <Mathematik>
Mathematisierung
Vorlesung/Konferenz
Softwareentwickler
Arithmetisches Mittel
Forcing
Cybersex
Diskretes System
Computersicherheit
Vorlesung/Konferenz
Komplex <Algebra>
Computeranimation
Aggregatzustand
Internetworking
Facebook
Datennetz
Hypermedia
Mereologie
Exploit
Mustererkennung
Virtuelle Maschine
Zentrische Streckung
Forcing
Konfluenz <Informatik>
Familie <Mathematik>
Vorlesung/Konferenz
Leistung <Physik>
Fehlermeldung
Umsetzung <Informatik>
Forcing
Existenzsatz
Rotationsfläche
Vorlesung/Konferenz
Ordnung <Mathematik>
Internetworking
Design by Contract
Verschiebungsoperator
Internetworking
Gravitation
Cyberspace
Mathematisierung
Kontrollstruktur
Vorlesung/Konferenz
Aggregatzustand
Internetworking
Cyberspace
Dienst <Informatik>
Informationsmodellierung
Datennetz
Cybersex
Computersicherheit
Biprodukt
Exploit
Leistung <Physik>
Aggregatzustand
Koalitionstheorie
Cyberspace
Informationsmodellierung
Electronic Government
Sichtenkonzept
Besprechung/Interview
Gamecontroller
Gerade
Internetworking
Fehlermeldung
Stellenring
Systemaufruf
Vorlesung/Konferenz
Internetworking
Druckverlauf
Softwareentwickler
Bitrate
Systemplattform
Ereignishorizont
Tabelle <Informatik>
Internetworking
Zentralisator
Internetworking
Lineares Funktional
Wort <Informatik>
Computersicherheit
Versionsverwaltung
Vorlesung/Konferenz
Kartesische Koordinaten
Mailing-Liste
Physikalisches System
Ganze Funktion
Ereignishorizont
Quelle <Physik>
Selbst organisierendes System
Open Source
Mobiles Internet
Mathematisierung
Gruppenkeim
Kartesische Koordinaten
Schlussregel
Malware
Quellcode
Kardinalzahl
Internetworking
Rechter Winkel
Programmierparadigma
Spyware
Total <Mathematik>
Hintertür <Informatik>
Biprodukt
Inzidenzalgebra
Computeranimation
Programmfehler
Randwert
Datensatz
Rechter Winkel
Software
Automatische Indexierung
Gamecontroller
Server
Projektive Ebene
Quelle <Physik>
Datennetz
Template
Besprechung/Interview
Biprodukt
Data Mining
Internetworking
Weg <Topologie>
Datenfeld
Flächentheorie
Inverser Limes
Vorlesung/Konferenz
Identifizierbarkeit
Inhalt <Mathematik>
Task
Gefangenendilemma
Polstelle
Twitter <Softwareplattform>
Digitalisierer
Basisvektor
Besprechung/Interview
Versionsverwaltung
Vorlesung/Konferenz
Sondierung
Verkehrsinformation
Service provider
Interpretierer
Telekommunikation
Subtraktion
Gemeinsamer Speicher
Formale Sprache
Plot <Graphische Darstellung>
E-Mail
Datenmissbrauch
Data Dictionary
Informationsmodellierung
Endogene Variable
Vorlesung/Konferenz
Ordnung <Mathematik>
Schreib-Lese-Kopf
Subtraktion
Rechter Winkel
Basisvektor
Vorlesung/Konferenz
Schlussregel
Datenmissbrauch
Flächeninhalt
Rechter Winkel
Open Source
Mathematisierung
Besprechung/Interview
Strategisches Spiel
Vorlesung/Konferenz
Term
Physikalische Theorie
Zusammengesetzte Verteilung
Bildschirmmaske
Prozess <Physik>
Cybersex
Datentyp
Kanalkapazität
Vorlesung/Konferenz
Speicherabzug
Information
Maßerweiterung
Komplex <Algebra>
Division
Resultante
Protokoll <Datenverarbeitungssystem>
Kryptologie
Computersicherheit
Besprechung/Interview
Vorlesung/Konferenz
Regulator <Mathematik>
Entscheidungstheorie
Standardabweichung
Internetworking
Cyberspace
Flächentheorie
Datentyp
Mathematisierung
Abgeschlossene Menge
Vorlesung/Konferenz
Euler-Winkel
Gesetz <Physik>
Teilbarkeit
Internetworking
Aggregatzustand
Mapping <Computergraphik>
Cyberspace
Software
Rechter Winkel
Open Source
Vorlesung/Konferenz
Wiederherstellung <Informatik>
Baumechanik
Resultante
Einfach zusammenhängender Raum
Cyberspace
Punkt
Selbst organisierendes System
Rechter Winkel
Software
Hypermedia
Besprechung/Interview
Maßerweiterung
Computeranimation
Zentrische Streckung
Statistik
Computersicherheit
Güte der Anpassung
Besprechung/Interview
Gruppenkeim
Zahlenbereich
Eins
Internetworking
Koalitionstheorie
Summengleichung
Verzeichnisdienst
Offene Menge
Basisvektor
Vorlesung/Konferenz
Indexberechnung
Summengleichung
Datennetz
Zehn
Relationentheorie
Optimierung
Punkt
Besprechung/Interview
Dateiformat
Zahlenbereich
Internetworking
Tabelle <Informatik>
Summengleichung
Subtraktion
Punkt
Besprechung/Interview
Vorlesung/Konferenz
Größenordnung
Protokoll <Datenverarbeitungssystem>
Datennetz
Mereologie
Besprechung/Interview
Vorlesung/Konferenz
Projektive Ebene
Grundraum
Data Mining
Internetworking
Summengleichung
Angewandte Physik
Dokumentenserver
Physikalisches System
Information
Informatik
Grundraum
Packprogramm
Faserbündel
Quick-Sort
Computeranimation
Internetworking
Minimalgrad
Flächentheorie
Vorlesung/Konferenz
Zusammenhängender Graph
Computerunterstütztes Verfahren
Optimierung
Grundraum
Informatik
Punkt
Prozess <Physik>
Güte der Anpassung
Besprechung/Interview
Familie <Mathematik>
Zahlenbereich
Ausnahmebehandlung
Physikalisches System
Kombinatorische Gruppentheorie
Framework <Informatik>
Internetworking
Rechter Winkel
Computerarchitektur
Selbst organisierendes System
Anwendungsspezifischer Prozessor
Besprechung/Interview
Onlinecommunity
Vorlesung/Konferenz
Computerarchitektur
Internetworking
Instantiierung
Druckverlauf
Rechter Winkel
Projektive Ebene
Reelle Zahl
Baumechanik
Term
Parametersystem
Lineares Funktional
App <Programm>
Bildschirmmaske
Adressraum
Datentyp
Physikalisches System
Term
Mathematische Logik
Aggregatzustand
Office-Paket
Punkt
Prozess <Physik>
Cybersex
Computersicherheit
Selbstrepräsentation
Besprechung/Interview
Gruppenkeim
Baumechanik
Ereignishorizont
Quick-Sort
Internetworking
Flächeninhalt
Forcing
Verbandstheorie
Rechter Winkel
Datentyp
Vorlesung/Konferenz
Domain-Name
Rechter Winkel
Computersicherheit
Vorlesung/Konferenz
Hill-Differentialgleichung
Office-Paket
Besprechung/Interview
Datenerfassung
Vorlesung/Konferenz

Metadaten

Formale Metadaten

Titel Black Code
Serientitel re:publica 2014
Anzahl der Teile 126
Autor Deibert, Ron
Lizenz CC-Namensnennung - Weitergabe unter gleichen Bedingungen 3.0 Deutschland:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen und das Werk bzw. diesen Inhalt auch in veränderter Form nur unter den Bedingungen dieser Lizenz weitergeben.
DOI 10.5446/33415
Herausgeber re:publica
Erscheinungsjahr 2014
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract A recent stream of documents leaked by former NSA contractor Edward Snowden has shed light on an otherwise highly secretive world of cyber surveillance. Among the revelations, perhaps the most important for the future of global cyberspace are those concerning the way the U.S. government compelled the secret cooperation of American telecommunications, Internet, and social media companies with signals intelligence programs.

Ähnliche Filme

Loading...
Feedback