Reinfeldt told reporters Thursday that Sweden’s policy is not to extradite people to nations with the death penalty. But he said Sweden’s courts, not its government, would decide that.
Archive for 2011/01/20
Swedish Prime Minister Fredrik Reinfeldt says his government will play no role in deciding whether WikiLeaks’ founder Julian Assange should be extradited to the U.S.Posted: 2011/01/20 in Education / Awareness, Enforcement, Public Policy
The 30,000-Year-Old Cave That Descends Into Hell – The great German film director Werner Herzog has made a 3D film of itPosted: 2011/01/20 in Education / Awareness, Tech Evolution
A new update just brought Vudu’s collection of HD streaming movies—some 4000 of them in all—to Boxee BoxesPosted: 2011/01/20 in Education / Awareness, New Business Models, Tech Evolution
You’ve probably not heard of Spotify yet. That’s ok—it’s still relatively new over here in Europe, where I live. But I can say in the year I’ve used it, I’ve never touched iTunes or used BitTorrent once.
a way to “streamline decision making and create clearer lines of responsibility and accountability at the top of the company”
European startups have been accused of being lazy because they haven’t had the big breakout success stories of the likes of Facebook, Twitter and Google. But is this true?Posted: 2011/01/20 in Education / Awareness, New Business Models
The UK Minister for Culture, Jeremy Hunt, has hinted that the government might be about to crackdown on online broadband ISP based television (TV) content through tighter regulation, specifically the new generation of IPTV services rather than YouTubePosted: 2011/01/20 in Education / Awareness, Public Policy
News Corp tried to guide MySpace, to add planning, and to use “professional management” to determine the business’s future. That was fatally flawed when competing with Facebook which was managed in White Space, letting the marketplace decide where the business should goPosted: 2011/01/20 in Education / Awareness, New Business Models
A fascinating, nearly two-hour discussion, on a variety of issues related to Wikileaks, transparency, freedom of speech, politics and the law, which never got slow or boringPosted: 2011/01/20 in Education / Awareness
The headliner on the panel, was clearly Daniel Ellsberg, of Pentagon Papers fame, who has been quite vocal about the Wikileaks situation, and outspoken in his support for both Bradley Manning and Julian Assange. However, the panel also included astute commentators on the modern tech, media and legal worlds: Clay Shirky, Jonathan Zittrain and Peter Thiel. This was clearly an A-list panel. The fifth member of the panel was Roy Singham, the founder and chair of ThoughtWorks, a company that sponsored the event — which made me initially assume that he wouldn’t have much interesting to say. This turned out to be wrong as he added quite a lot to the conversation. In fact, all five panelists added some valuable and thought-provoking insights.
Jim D’Addario, the CEO of D’Addario and Company, famous makers of guitar strings, stopped by in the comments to defend his decision to sign onto the list. A few folks asked me to respond, and I figured it would be best to do so in a new post. First, I’ll repost what D’Addario said, and then respond
More privacy for the Queen, less for everyone else – More access to info, except about Prince WilliamPosted: 2011/01/20 in Education / Awareness, Privacy / Data Protection, Public Policy
Miscreants have released a Trojan specially designed to disable cloud-based anti-virus security defencesPosted: 2011/01/20 in Education / Awareness, Network Security, Privacy / Data Protection
Sen. Al Franken (D-MN) warns that Comcast has a dark plan for dealing with its few viable competitors like NetflixPosted: 2011/01/20 in Education / Awareness, Public Policy
The RIAA is taking strong exception to an ICANN proposal to accept challenges to generic top level domains only if the proposed suffix clearly hurts “the broader Internet community.” This, it seems, will allow pirates to hijack music themed gTLDs “to enable wide scale copyright infringement of our works,” the trade group and 14 other signers warn.
Apple is purposefully making it harder to get inside its devices buy using special pentalobe screws on newer iPhones and MacBook Airs. Compatible screwdrivers are hard to find, making DIY repair difficultPosted: 2011/01/20 in Education / Awareness
We can either look the other way and pretend that corruption and wrongdoing is not happening over the world, or we can stare it straight in the face and try to combat it. If the governments of the world want to hide something from its people, it’s up to the people themselves to make sure that their government knows the will of the people is a dangerous thing to mess withPosted: 2011/01/20 in Education / Awareness
WikiLeaks helps keep integrity
Hackers steal £94k with malicious job application
Intelligence agencies may be ordered to limit the information they share. When you look at information sharing, I think we have almost overdone itPosted: 2011/01/20 in Education / Awareness, Public Policy
The strategy that has protected the Wikileaks phenomenon involves a complex machine of technological loopholes, alliances with nations supporting the free press and a well-maintained veil of secrecy shrouding the operation’s sources, staff and technicalitiesPosted: 2011/01/20 in Education / Awareness
Wikileaks is a nonprofit entity funded by donors and sustained through a network of activists and volunteers. The tightly knit operation currently has no official headquarters and is staffed by a five-person team of full-time administrators along with more than 800 volunteer journalists, who aren’t financially compensated. To further combat censorship and ensure accessibility, Wikileaks has released a complete collection of its content to four news organizations: Le Monde, El Pais, The Guardian and Der Spiegel.
Wikileaks shields itself with a degree of legal protection by keeping servers on multiple continents and passing its content through free press nations such as Sweden, Belgium and Iceland. To protect its sources, Wikileaks uses military-grade encryption and employs a variety of security technologies designed to uphold anonymity. The source’s identities are anonymous even to the operators of Wikileaks.
To further secure the continued accessibility of its content, Wikileaks has also released a heavily encrypted “insurance” file to its Afghanistan War Logs site and a select torrent site. The file, speculated to contain many unpublished controversial diplomatic cables and political documents, has been downloaded more than 100,000 times according to Wikileaks. Assange has announced the password to the file will be released in the event that Wikileaks ceases to function as an organization, further complicating all efforts aimed at shutting the organization down.
With Assange’s army of volunteers and a small, loyal staff, he has created a new type of challenge for world diplomats. To many, WikiLeaks is a new form of media and a crusader for justice and transparency.
US Embassy in Jakarta: We would like to request $100,000 funding to increase the number of fans on Facebook to one million in 30 daysPosted: 2011/01/20 in Education / Awareness, Public Policy
Europe wide carbon trading system taken down after major online fraud. The EU took action after it discovered that emissions allowances worth €7 million (£5.9 million) had been stolen from an account based in the Czech Republic. It is understood that the cybercriminals have also hacked into accounts in Austria, Greece, Poland and EstoniaPosted: 2011/01/20 in Cybercrime, Education / Awareness, Public Policy
WikiLeaks, which has said it doesn’t know who provides it with information, may seek out secret data itself, using so-called peer-to-peer networks – computers in Sweden were trolling through hard drives accessed from popular peer-to-peer networks such as LimeWire and KazaaPosted: 2011/01/20 in Cybercrime, Education / Awareness, File Sharing, Network Security, Organized Crime, Privacy / Data Protection, Public Policy
Tiversa Inc., a company based in Cranberry Township, Pennsylvania, has evidence that WikiLeaks, which has said it doesn’t know who provides it with information, may seek out secret data itself, using so-called “peer-to-peer” networks, Chief Executive Officer Robert Boback claimed. He said the government is examining evidence that Tiversa has turned over.
Rudolf Elmer, who handed over bank client data to Wikileak’s Julian Assange this week, was arrested in Zurich late yesterday as prosecutors investigate possible breaches of the country’s banking secrecy laws.