Committee to Protect Journalists: Video Report on Iran, Database of Imprisoned Journalists, & Impunity Index

05 Iran, Journalism/Free-Press/Censorship, Key Players
report + database


Click on the logo to enter the video report on Iran along with the database.

Related:

Shadowserver Foundation

Computer/online security, Topics (All Other)

The Shadowserver Foundation has been added to our righteous sites section of this site. From their website: The Shadowserver Foundation is an all volunteer watchdog group of security professionals that gather, track, and report on malware, botnet activity, and electronic fraud. It is the mission of the Shadowserver Foundation to improve the security of the Internet by raising awareness of the presence of compromised servers, malicious attackers, and the spread of malware.

The Shadowserver Foundation is responsible for:

  • Capturing and receiving malicious software, or information related to compromised devices
  • Disassembling, sandboxing, and analyzing viruses and trojans
  • Monitoring and reporting on malicious attackers
  • Tracking and reporting on botnet activities
  • Disseminating cyber threat information
  • Coordinating incident response

Related:
+ FireEye Malware Intelligence Lab
+ Researcher ‘Fingerprints' The Bad Guys Behind The Malware (June 22, 2010)

Event: 9-10 June 2010, D.C., Intelligence, Surveillance and Reconnaissance-Challenges, Opportunities, Requirements, and Master Plans

Commerce, Communities of Practice, Government, Intelligence (government), Military
conference info

30 Leading Experts from HAF/A2, OPNAV/N2/N6F2(ISR), Army G2/DCS-I, OUSD-I, USJFCOM, USAF 480th ISR Wing, AFWC, AFMC, NGA, USNORTHCOM, USAF 950th ELSG, Army EW Div., USAF Space AE, GAO, Northrop Grumman, Lockheed Martin, Boeing, Raytheon, General Dynamics, Microsoft, SAIC, Mercury, Booz Allen Hamilton examine:

* Government ISR Strategy, Plans, Roadmaps, Needs & Initiatives
* Developing/Deploying Integrated ISR (DCGS-based) Networks
* Platform and Payload Needs, Challenges and Capabilities
* Next-Generation Intelligence Collection, Analysis & Dissemination
* Developing the ISR Enterprise

About The Conference:
Dealing with the New Realities, Opportunities and Challenges in Global ISR. Continuing gaps in intelligence information sharing capabilities post 9/11, emerging requirements for new “ISR surges” in Afghan and Iraqi operations, ISR challenges associated with new counter-insurgency and counter-terrorism operations, increased roles for ISR assets across a broad range of new and evolving missions (space defense, maritime domain awareness, global surveillance/global strike, etc.) – these and many other critical issues are driving the ongoing reassessment of our current ISR forces.

Continue reading “Event: 9-10 June 2010, D.C., Intelligence, Surveillance and Reconnaissance-Challenges, Opportunities, Requirements, and Master Plans”

CIA retired Carmen Medina on Info-tech & Openness

Government, Intelligence (government), Open Government, Privacy

read the interview

Interview where she responds to the following questions/issues:

+ Social media and extreme views
+ How our ideas about privacy have to change
+ How failure to share information leads to more failure
+ Why previous attempts to share intelligence have failed
+ The way government adopts technology is broken
+ Can we crowdsource intelligence gathering?

ADMIN: Malware Defeated, Google Helped, Lessons Learned

Collective Intelligence, Computer/online security

We have eradicated the Malware that snuck in with a comment. It was a two-step process.

1) Delete all comments and then Close Comments.

2) Find the infected file that reactivated itself each time an unsecured computer visited Phi Beta Iota–evidently the robots are resident everywhere.

We should have reacted to Google's warning signals sooner. We could not replicate the issue here and that is why we were slow. In the process of eradicating the malware, Google's interactive help was both essential and easily available.

This was NOT, as some of you have suggested, an attack by the US Government unit that resides at Google. We are satisfied that this was a completely random attack by robot software that found a hole Word Press had not plugged, and nature took its course.

We continue to believe that both Google and the National Security Agency (NSA) should spend more time helping create hardware and software impervious to attack, and if they will not do it, we certainly hope Microsoft will wake up and smell the roses–the first totally reliable cloud-handheld environment is a win-win for all.

See also:

Event: 16-18 July 2010 NYC NY The Next Hope

2010: OPINION–America’s Cyber Scam

Journal: Cyber-War, Cyber-Peace, Cyber-Scam

Journal: Government Information Policy & Security Not Favoring the Public

21.3% of Malicious ‘Spam’ Researched by Symantec comes from Shaoxing China (30% China, 21.1% from Romania, US 3rd)

1994 Sounding the Alarm on Cyber-Security

Event: 8-12 June Narobi Africa Agriculture GIS Week 2010

01 Agriculture, 03 Economy, Africa, Geospatial
event info

Jointly organized by the Consortium for Spatial Information (CSI) of the Consultative Group on International Agricultural Research (CGIAR), HarvestChoice, and the Agricultural Geospatial Commons (AGCommons) Program, the event builds on the success of last year’s meeting. However, AAGW 2010 has a broader scope and will be presented as a “GIS ShareFair”, complete with a market place that will include exhibitors, training sessions, thematic workshops, presentation sessions, CGIAR Spatial Science Sessions, the third gathering of WhereCampAfrica, and the unveiling of the AGCommons service bureau.

EVENT: 9-16 Oct, Univ Passau Germany, Economics of Corruption 2010: Lecture and Workshop in Good Governance and Reform

03 Economy, 09 Justice, Corruption, Government, Open Government
event info

Training and qualifying practitioners, researchers and students in anti-corruption is increasingly requested, utterly needed, but still in its infancy. For many years now we developed a training program that fills this gap, joining the world of theory with the world of practice. An analysis of political, economic and organizational incentives allows participants to obtain a profound understanding of the forces that are at play.

Survey techniques and statistical analysis confront theory with data. Interactive tools such as games, poster presentations and case studies involve participants and make them acquainted with today's challenges. Prof. Johann Graf Lambsdorff and his team have spearheaded models for reform related to such issues as contract penalties, compliance systems, debarment, procurement, leniency and corporate liability. Participants are introduced into this body of research.

This international event continues to be offered on a pro bono basis. It is directed towards anti-corruption policymakers and practitioners, as well as towards graduate and post-graduate students and faculty in the social sciences.