Return the constitutional provision to the Law on Personal Data Protection

Legal restriction enabling the police, information agencies or private companies to enter the privacy of citizens only when it is prescribed by law has been deleted from the Bill of the Law on ...
Pročitaj još

The Human Fabric of the Facebook Pyramid

n our previous research, we investigated different areas of the Facebook dispositif:[1] algorithmic and human labor, the digital infrastructure behind the social network, and the exploitation of ...
Pročitaj još

Browsing Histories – Metadata Explorations

t was Friday morning. Mr. J woke up kind of late, in a bed in a rented apartment near People’s Park in Singapore. The pink sheets, beige walls, modest and minimalistic decoration in the flat made ...
Pročitaj još

IMMATERIAL LABOUR AND DATA HARVESTING – FACEBOOK ALGORITHMIC FACTORY (1)

This is the first story in our investigation trilogy titled Facebook Algorithmic Factory, created with the intention to map and visualise a complex and invisible exploitation process hidden ...
Pročitaj još

Human Data Banks and Algorithmic Labour Facebook Algorithmic Factory (2)

This is the second story in our investigation trilogy titled Facebook Algorithmic Factory, created with the intention to map and visualise a complex and invisible exploitation process hidden behind ...
Pročitaj još

Quantified Lives on Discount Facebook Algorithmic Factory (3)

This is the third and final story in our investigation trilogy titled Facebook Algorithmic Factory, created with the intention to map and visualise a complex and invisible exploitation process ...
Pročitaj još

Metadata Investigation : Inside Hacking Team

nce online, our every movement, every click, sent or received email, our every activity produces a vast amount of invisible traces. These traces, once collected, put together and analysed, can reveal ...
Pročitaj još

Hacking Team : The “Italian job” of Serbian security services

Database of leaked Hacking Team emails reveals details on negotiations for purchasing spy software At least one Serbian security service negotiated the purchase, while the Ministry of Defense ...
Pročitaj još

The “Italian job” of Serbian security services

Database of leaked Hacking Team emails reveals details on negotiations for purchasing spy software At least one Serbian security service negotiated the purchase, while the Ministry of Defense ...
Pročitaj još

Invisible Infrastructures : Surveillance Architecture

n April 2014, we collected about 2000 pages of documents and reports through the series of FOIA1 requests to the Commissioner2 related to the 2012 Report on the inspection procedure over the ...
Pročitaj još
Next