Metadata Investigation : Inside Hacking Team

nce online, our every movement, every click, sent or received email, our every activity produces a vast amount of invisible traces. These traces, once collected, put together and analysed, can reveal ...
Pročitaj još

Hacking Team : The “Italian job” of Serbian security services

Database of leaked Hacking Team emails reveals details on negotiations for purchasing spy software At least one Serbian security service negotiated the purchase, while the Ministry of Defense ...
Pročitaj još

The “Italian job” of Serbian security services

Database of leaked Hacking Team emails reveals details on negotiations for purchasing spy software At least one Serbian security service negotiated the purchase, while the Ministry of Defense ...
Pročitaj još

Invisible Infrastructures : Surveillance Architecture

n April 2014, we collected about 2000 pages of documents and reports through the series of FOIA1 requests to the Commissioner2 related to the 2012 Report on the inspection procedure over the ...
Pročitaj još

Invisible Infrastructures : Data Flow

n the previous story we explored the exciting life of our hero – one small Internet packet, but in order to create a wider picture of the data flow and map key locations and actors we conducted a ...
Pročitaj još

Invisible Infrastructures : Online Trackers

There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even ...
Pročitaj još

Invisible Infrastructures : Mobile permissions

Users, even advanced ones, often neglect the importance of the Terms of Service, Privacy Policies and other legal documents they are bound to by installing applications on their devices. On the other ...
Pročitaj još

Regulatory approaches to protection of human rights in the digital society: international standards for the protection of personal data

Regulatory approaches to protection of human rights in the digital society: international standards for the protection of personal data As data we give to corporations while using their services ...
Pročitaj još
Previous Next