Blogs

BROWSE: Most Recent | Popular Tags |

Tags > terrorism

Biohacking and the problem of bioterrorism

By Mike Loukides
April 8, 2014

You don’t get very far discussing synthetic biology and biohacking before someone asks about bioterrorism. So, let’s meet the monster head-on. I won’t downplay the possibility of a bioterror attack. It’s already happened. The Anthrax-contaminated letters that were sent to political figures …

Visualization of the Week: Every recorded U.S terror attack 1970-2011

By Jenn Webb
April 24, 2013

The recent terror attack at the Boston Marathon prompted the Guardian’s Simon Rogers (who will soon be Twitter’s Simon Rogers) to look into the history of attacks on U.S. soil. Using data from the START Global Terrorism Database, Rogers mapped …

Predictive analytics and data sharing raise civil liberties concerns

By Alex Howard
April 11, 2013

Last winter, around the same time there was a huge row in Congress over the Cyber Intelligence Sharing and Protection Act (CISPA), U.S. Attorney General Holder quietly signed off on expanded rules on government data sharing. The rules allowed the National …

Big crime meets big data

By Ciara Byrne
December 19, 2011

Marc Goodman, consultant and cyber crime expert, explains how criminals and terrorists can put data, automation, and scalability to effective use.

The September 11 attacks: how little changed

By Andy Oram
September 11, 2011

What jumps out at me when considering September 11, 2001 is how little the world has changed in response. Ideas for integrating September 11 into our culture in a more healthy manner.

The Watering Hole - Through a Scanner Darkly (With Butter)

By James Turner
December 4, 2010

Have you noticed, by the way, that all the nude microwave scanner pictures of women we've seen so far look vaguely like Persis Khambatta from Star Trek: The Motion Picture?

The Watering Hole - Through a Scanner Darkly (With Butter)

The Watering Hole - Through a Scanner Darkly (With Butter)
By James Turner
December 4, 2010

Have you noticed, by the way, that all the nude microwave scanner pictures of women we've seen so far look vaguely like

The Watering Hole - I've Got a Secret... Or Not...

The Watering Hole - I've Got a Secret... Or Not...
By James Turner
August 28, 2010

Remember the good old days, when you needed to use things like sex and blackmail to get good secrets?

How Terrorists May Abuse Micro-Blogging Channels Like Twitter

By Nitesh Dhanjani
December 18, 2008

In this article, I want to further the discussion on how micro-blogging channels may be leveraged by terrorist organizations to obtain real time surveillance and intelligence of their efforts.

A code of ethics from Brian McConnell concerning employee rights

By Andy Oram
September 4, 2008

My colleague Brian McConnell has a story about employer abuse guaranteed to make you scared and angry. But finding something constructive and beneficial in an incident that was personally devastating, he offers a Code of Ethics concerning workplace privacy that seems to me simple, fair, and both technically and legally capable of being implemented. A call for privacy is particularly well-timed in this election season, when the Republicans publicly spat on the Bill of Rights at least three times last night.


1 to 10 of 10
The Watering Hole