Managing ‘Threats’: Uses of Social Media for Policing Domestic Extremism and Disorder in the UK

Description: “The research examines two key areas of social media practices for policing: 1) the ways in which social media communication and data becomes identified as potential domestic ‘threats’ and 2) the ways in which the police engages with social media to manage and minimize those ‘threats’.” Report Author(s): Lina Dencik, Arne Hintz, Zoe Carey,…

Continue reading

Encrypting Your Laptop Like You Mean It

Description: “Time and again, people are told there is one obvious way to mitigate privacy threats of all sorts, from mass government surveillance to pervasive online tracking to cybercriminals: Encryption. As President Obama put it earlier this year, speaking in between his administration’s attacks on encryption, “There’s no scenario in…

Continue reading

Off-the-Record Communication, or, Why Not To Use PGP

Description: “Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryption keys (subject to compromise) for confidentiality, and digital signatures (which provide strong, and in some jurisdictions, legal, proof of authorship) for authenticity.” Web link Author(s): Nikita Borisov – UC Berkeley, Ian…

Continue reading

The Darknet and Online Anonymity

Description: “A very small proportion of websites use sophisticated anonymity systems, which allow their operators to conceal their identity if they wish to. This part of the web is commonly referred to as the darknet. The darknet helps citizens to protect their security and privacy and to circumvent censorship. It…

Continue reading