[liberationtech] Call for Papers: World Congress on Internet Security (WorldCIS-2013)
Apologies for cross-postings. Please send it to interested colleagues and students. Thanks! CALL FOR PAPERS World Congress on Internet Security (WorldCIS-2013) Technically Co-Sponsored by IEEE Tokyo Section August 5-7, 2013 Venue: Tokyo University of Information Sciences, Japan www.worldcis.org The World Congress on Internet Security (WorldCIS-2013) is Technically Co-Sponsored by IEEE Tokyo Section. The WorldCIS-2013 is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry. The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and and to fostering discussions on information technologies, information systems and globa security applications. The WorldCIS-2013 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation. Original papers are invited on recent advances in Internet, Computer Communications and Networking Security. The topics in WorldCIS-2013 include but are not confined to the following areas: *Internet Security *Security, trust and privacy *Self-organizing networks *Sensor nets and embedded systems *Service overlays *Switches and switching *Topology characterization and inference *Traffic measurement and analysis *Traffic engineering and control *Trust and Data Security *Virtual and overlay networks *Web services and performance *Wireless mesh networks and protocols *Ad hoc mobile networks Security *Addressing and location management *Broadband access technologies *Blended Internet Security Methods *Biometrics *Boundary Issues of Internet Security *Capacity planning *Cellular and broadband wireless nets *Congestion control *Content distribution *Cryptography *Cross layer design and optimization *Cyber-physical computing/networking *Geographic information systems *Privacy Protection and Forensic in Ubi-com *Quality of Service Issues *Regulations *Secured Database Systems *Security in Data Mining *Security and Access Control *Semantic Web and Ontology *Data management for U-commerce *Software Architectures *Defence Systems *Delay/disruption tolerant networks *End Users *Enabling technologies for the Internet *Implementation and experimental testbeds *Future Internet Design and Applications *Middleware support for networking *Mobility models and systems *Multicast and anycast *Multimedia protocols and networking *Network applications and services *Network architectures Network control *Network management *Network simulation and emulation *Novel network architectures *Network and Protocol Architectures *Peer-to-peer communications *Performance evaluation *Power control and management *Pricing and billing *Protocols and Standards *Resource allocation and management *RFID *Optical networks *Routing protocols *Scheduling and buffer management *Virtual Reality IMPORTANT DATES: Full Paper Submission Date: Extended May 15, 2013 Extended Abstract (Work in Progress) Submission Date: Extended May 31, 2013 Proposal for Workshops and Tutorials: Extended May 15, 2013 Notification of Workshop and Tutorial Acceptance: Extended May 31, 2013 Proposal for Industrial Presentation: February 25, 2013 Notification of Extended Abstract Acceptance/Rejection: Extended June 15, 2013 Notification of Industrial Presentation Acceptance: March 05, 2013 Notification of Paper Acceptance/Rejection: Extended June 05, 2013 Camera Ready Extended Abstract Due: Extended June 30, 2013 Camera Ready Paper Due: Extended till June 30, 2013 Early Registration Deadline: January 01 to June 20, 2013 Late Registration Deadline (Authors only): June 21 to July 15, 2013 Late Registration Deadline (Participants only): June 21 to August 5, 2013 Conference Dates: August 5-7, 2013 For further details, please visit conference website www.worldcis.org -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
Re: [liberationtech] Call for Papers: World Congress on Internet Security (WorldCIS-2013)
On Fri, Apr 05, 2013 at 10:29:12AM +0100, Dan Lin wrote: World Congress on Internet Security (WorldCIS-2013) Technically Co-Sponsored by IEEE Tokyo Section August 5-7, 2013 Venue: Tokyo University of Information Sciences, Japan www.worldcis.org I'm throwing the bullshit flag. I think this is another fake conference (as we've recently discussed) being promoted via spam. ---rsk -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
[liberationtech] Funding for DIY projects on online protest performance
http://platformlondon.org/2013/04/05/final-call-for-proposals-artist-led-funded-projects-with-platform-lada/ This Monday is the dealine for DIY 10 proposals. Get yours in now! DIY is an opportunity for artists working in Live Art to conceive and run unusual training and professional development projects for other artists. Platform’s call is for “Live Art, performance as protest and the online element.” Platform invites proposals that look at performance and protest via the internet. Many artists make work with an online element. Protest art often takes place via the internet. What approaches might artists want to explore for this kind of work? What questions does this raise for artists and groups making art interventions around where they situate their work, how they reach new audiences, the potential of the web to add a new layer to their performances, and the impact taking place online has on the work? We’re open to proposals from artists, activists, social media geeks, video editors…anyone who wants to propose a project that looks at live art and protest with an online element. Proposal-makers might want to refer to the live streaming of Marinahttp://www.moma.org/explore/inside_out/2010/03/15/live-streaming-marina-abramovic-crazy-or-brave/ Abramovic’s The Artists is Presenthttp://www.moma.org/explore/inside_out/2010/03/15/live-streaming-marina-abramovic-crazy-or-brave/ , Tate Live/The Performance Room http://www.youtube.com/user/tate/tatelive , Liberate Tate and Link Uphttp://www.youandifilms.com/category/environmental/liberate-tate/ Films http://www.youandifilms.com/category/environmental/liberate-tate/ - whose films were online usually within two hours of Liberate Tate’s performances, and the live streaming of protest events e.g. Occupy Wall Street http://www.livestream.com/occupywallstnyc. More information on the other calls for DIY 10 and the application process at: http://www.thisisliveart.co.uk/prof_dev/diy/diy10_callforproposals.html-- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
[liberationtech] Google defies FBI, asks federal judge to challenge National Security Letter
I am very happy to report to the list that apparently, Google is now challenging a National Security Letter issued by the FBI According to what I have read, Google filed a petition to “set aside the legal process,” citing a provision that enables judges to modify or deny NSLs that are “unreasonable, oppressive, or otherwise unlawful.” That is a bit short of what I did ( with ACLU's and EFF's help ) in Doe v. Ashcroft ( 334 F. Supp. 2d 471 (S.D.N.Y. 2004) ) which was to challenge the constitutionality of the statute itself. However it's still something and it keeps the issue in the forefront of the news and helps to keep it a current issue. I have always hoped that more companies would challenge warrantless seizure of telecommunications records which has repeatedly been ruled to be unconstitutional and in violation of the 4th amendment, and I hope that more of these types of challenges are to come in the near future. More coverage: 1. http://www.bloomberg.com/news/2013-04-04/google-fights-u-s-national-security-probe-data-demand.html 2. http://venturebeat.com/2013/04/04/google-defies-fbi-asks-federal-judge-to-challenge-national-security-letters/ 3. http://thehill.com/blogs/hillicon-valley/technology/291871-google-fights-secret-fbi-subpoena 4. http://rt.com/usa/google-letters-national-unconstitutional-365/ 5. http://mashable.com/2013/04/04/google-challenge-national-security-letter/ 6. http://www.wired.com/threatlevel/2013/04/google-fights-nsl/ In my humble opinion, Google deserves to be commended for taking this action which it did not have to take ! -Nick -- Nicholas Merrill Executive Director The Calyx Institute 287 Spring Street New York, NY 10013 https://www.calyxinstitute.org -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
[liberationtech] OSI Program Manager job...
I'm not sure if this is appropriate for libtech, but this seems like an exceedingly awesome opportunity for those of our collective ilk: http://www.opensocietyfoundations.org/about/jobs/program-manager-0 The Open Society Foundations work to build vibrant and tolerant societies whose governments are accountable and open to the participation of all people. We seek to strengthen the rule of law; respect for human rights, minorities, and a diversity of opinions; democratically elected governments; and a civil society that helps keep government power in check. We help to shape public policies that assure greater fairness in political, legal, and economic systems and safeguard fundamental rights. We implement initiatives to advance justice, education, public health, and independent media. We build alliances across borders and continents on issues such as corruption and freedom of information. Working in every part of the world, the Open Society Foundations place a high priority on protecting and improving the lives of people in marginalized communities. Protection of data privacy as well as unfettered expression and are critical open society issues. Threats and opportunities come from several directions: from state surveillance and censorship; from private-sector surveillance, harvesting and manipulation of personal data; from private litigation with chilling effects on our civil liberties; and from the development of new technologies and technical standards which threaten or enhance data-related rights and freedoms. The Information Program employs several strategies for addressing these challenges: Supporting expertise-building in digital security for NGOs and development of software tools and tactics to combat online censorship and surveillance; Empowering key NGOs to advocate for changes in law and governmental practice; Supporting advocacy for human rights compliant corporate behavior in the technology sector; Supporting legal challenges to egregious violations of civil liberties. The program manager will be based in an Open Society Foundations office in London, Washington, D.C., or New York. Geographically, this work will focus primarily on impact in developing and middle income countries. Purpose of Position The Information Program seeks a full-time program manager to help develop and expand the program’s work on the protection of civil liberties in the digital environment, with a particular focus on surveillance and privacy. Essential Duties Responsibilities OSF may add, change, or remove essential and other duties at any time. Help to develop and implement the OSF Information Program’s civil liberties funding and policy advocacy strategy as well as annual work plans and budgets, in close collaboration with Senior Program Managers; strengthening the Program’s work on surveillance and privacy will be of particular importance; Develop a portfolio of grants, including the drafting of requests for proposals, evaluation of proposals, preparation of related documentation, and follow up and monitoring of grantee activities; Travel widely and conduct site visits to identify new grantees and partners and to monitor existing grants to ensure progress; Build and develop collaborative projects with OSF Programs and local Foundations as well as other funders; Represent the Information Program at various fora, including meetings, conferences, partnerships and special events; Engage in other projects as assigned. Education / Experience Bachelor’s degree and several years’ relevant experience and/or training, or equivalent combination of education and experience. Advanced degree preferred. Skills Required Extensive experience, preferably international, in the field of civil liberties in the digital environment; An understanding of civil society approaches for conducting advocacy desirable; A demonstrated commitment to human rights protection online; Effectively manage to work efficiently in a fast-paced environment, troubleshoot and follow projects through to completion, with strict deadlines and without loss of attention to detail, budget and reporting; Excellent oral and written English; Excellent written, verbal, organizational, analytical and interpersonal skills; Excellent computer skills, proficient in Microsoft Office and experience with internet research and database management; Exercise good listening and communication skills with sensitivity to cultural communication differences; Effectively work as a team member and independently, with a high-level of self-motivation and ability to set and meet goals; Show discretion and ability to handle confidential issues; Knowledge of key organizations and networks active in the field; Pleasant, diplomatic manner and disposition in interacting with colleagues and the general public; Excellent analytical and organizational skills; Willingness to travel
[liberationtech] Natalia Project: personal assault alarm for human rights defenders at risk
Hola all, Does anyone know or have access to the specs of the device? http://natalia.civilrightsdefenders.org/ Enrique Piracés Human Rights Watch https://www.hrw.org https://www.twitter.com/epiraces PGP keyhttp://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x80951C31844CB395 -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
Re: [liberationtech] Google defies FBI, asks federal judge to challenge National Security Letter
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 04/05/2013 01:20 PM, Nicholas Merrill wrote: In my humble opinion, Google deserves to be commended for taking this action which it did not have to take ! *** Isn't the FBI is getting for free what they usually sell? Isn't that a good enough incentive? Sure they're doing the right thing, this time. But I smell a trend in the last few weeks of enthusiastic announcements for progress of this, and leaks of that. But there are *details* that really look suspicious to me: - - Google wants your information, it's their plan, and their business. That they don't want to share it with the FBI is probably a good thing, but it doesn't change their plan. - - The recent OffshoreLeaks sound great, and are important, but I'm (not) very surprised there's nobody really important there, just some adequate puppets, so far. The real beneficiaries of offshore banking are still hiding. Is that because the British Virgin Islands were deemed expandable, or because we don't have the whole picture yet? - - The shortlist of State Enemies of the Internet given by the Reporters Without Borders is the most suspicious of all: Bahrain, China, Iran, Syria, Vietnam. To everybody else, the actual enemies would be the ones sitting on the UN Security Council, and another for good measure: USA (ACTA? CISPA? NSL? NSA Bunker? StuxNet? Aaron Swartz?), Israel (Stuxnet?), Russia, UK, France (Amesys, wow!), the entire EU, Myanmar/Burma (hey, need to remember those racist buddhists oppressing poor Muslims sometimes, unless it's politically incorrect to do so?), etc. but no: instead they're pointing at the designated enemies of U.S. interests. (http://surveillance.rsf.org/en/) It's become so difficult not to lose one's mind over paranoia, nor to abandon all hope of seeing the light. The media landscape looks more and more like a polarized lens to demonize the enemy (hint: you're part of it) and sneak war propaganda everywhere. If I were in London, I would bet on the declaration of war on Iran before Spring 2014. == hk -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCgAGBQJRXyM6AAoJEDhjYTkcokoT+VUP/ROdEONjtNpEP9K8eojDDAL/ A9VziO1xnGb2ZZih1dTuV4Ru11k0HCuWECclv84QWhKydbHKk6cI8olu6vfEwjz3 +hrqcc1WMDz7rzF3GR8Qc5KbO7vH5t31LvmNdYNVmHGgpV3zlHzEzdRQNJs+Cu87 WhPzu8AdzumF4wRnr4JjeAGNGQgwE8J+rBtpJgVCwao/3lfJW/Z1jfqLKw09GIhy 9/N3H/fsSLyJO8yxDbb9UquYju1XRfJxZiw0XM7qOD+gorswPWEVC1zqeiGxEGOq G9XciUUb7dtZY4cB9xB9nUkunidXB7Xr0YkEQxh02R6FTMA+8hMpbJHt9paIfby1 jyppunfLsqK9YyZwweNb2IjWpvkhhYVFwoLcwomnBkDtgRJLZ3O/CtomahD0p09/ ENiIfnYOdu97RRHW+8npVAwVpuxUlC/byP8sFaTCm3pvrLV5u8Swvbsw2YShV0wV f8tz7ZIGMED7yCQvP8gSjR2zlGM/fsZNbQw019arRSuR0GPdq5TJP9pOdWfGk7zA q3XII6Dtj+AorxZBxgVbILQB2Gqox6IFuMwMHiFXdYXOWDLWp4XZ8ZhXJTEySvrT pDwCgGbh+Qinbv3ufUVWz+pd+BI4gpBKNU/kNicB2YJgukfRLhrwBrf3esiWW9Re KS5EjKVvp4qBbSbeMWS1 =60aZ -END PGP SIGNATURE- -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
[liberationtech] CPJ: Attacks on Knight Center sites reflect digital dangers
Appreciate the help on this one from Masashi and others at Citizen Lab and from Eva at EFF. FShttps://www.cpj.org/security/2013/04/attacks-on-knight-center-sites-reflect-digital-dan.phpAttacks on Knight Center sites reflect digital dangersByFrank Smyth/Senior Adviser for Journalist SecurityThe two websites at the University of Texas at Austin, at first blush, seemed to have been unlikely targets for attack. TheKnight Center for Journalism in the Americasand itsblogcover news about journalism, press freedom and journalist safety throughout the Western hemisphere, with an emphasis on trends in Latin America. The website of theInternational Symposium for Online Journalismprovides information about meetings and other professional issues. Both websites wereshut downfor two weeks last month in a targeted cyber-attack.Attacks targeting news, human rights, and free _expression_ organizations "are very common," Eva Galperin, global policy analyst at the San Francisco-based Electronic Frontier Foundation, told CPJ. In fact, CPJ's own website briefly came under attack on February 8, although the hacking did not take the site down. "Many groups encounter such threats on a near-daily basis, and civil society must exercise constant vigilance to protect against these threats," said Masashi Crete-Nishihata, research manager at the University of Toronto-based Citizen Lab, in an email to CPJ.The hackers of the two UT websites used a method called cross-site scripting to plant malicious code in the sites' hosting computers, according to a Knight Center researcher. The university's information technology researchers tracked the origin of the attacks to IP addresses in Russia. The IT team at UT put the two websites under quarantine while it repaired the damage and addressed vulnerabilities.The Knight Center deftly moved to other platforms while it addressed the problem. "The malicious cyber-attack was enough to shut our websites down, but not enough to shut us up," Rosental Alves, founder and director of the Knight Center for Journalism in the Americas,saidin a posting. The Knight Center put up two temporary WordPress blogs to keep news and information flowing while the websites were down.The motive for the attack on the UT websites is not known. In the days and weeks before the attack, the Knight Center'sAmericas blogreported on matters such asan attackon a northern Mexican newspaper, a number of newspapers'opposition to a defamation lawin the Dominican Republic, an Ecuador-based non-governmental organization's protest against the "arbitrary"suspension of its Twitter accountby the U.S.-based firm of the same name, and themurder of a radio hostin Brazil who spoke out against organized crime.In the strike against the CPJ website, the attacker exploited a vulnerability in the site's Movable Type publishing system to install code that redirected visitors to a third-party site capable of downloading malware to computers running Internet Explorer, and then on to Google.com. CPJ spotted and removed the redirect code within seven minutes and, in the aftermath, took a number of measures to harden its system. CPJ's investigation into the attack, which is continuing, preliminarily traced the attack to a Turkish web server.Hackers use a number of tactics, noted Crete-Nishihata of Citizen Lab. A common method is the denial-of-service attack, which prevents a website from functioning normally by overloading its host server with external communications requests. In December 2011, a denial-of-service attack took the Mexican websiteRíodoceofflinefor six days.Ríodocewas one of the few publications in the Mexican state of Sinaloa to cover the narco-traffickers operating with impunity in the region, including the powerful Zetas cartel. Defacement attacks are yet another tactic. An entity called the Iranian Cyber Army hasdefacedthe websites of Iranian opposition activists and journalists.Perhaps more insidious is the infiltration of computer networks, including email systems. In many dozens of documented cases--affecting such major news organizations asThe New York Times,The Washington Post,andTheWall Street Journal--hackers have quietly infiltrated computers to monitor sensitive email and other digital communications. In January, technologists at Citizen Lab revealed that hackers, most likely working on behalf of the government in Syria, had been using software made by the California-based developerBlue Coat Systemsto gather information about Syrian activists and citizen journalists. Spyware doesn't even need to be expensive. A Russian software maker produces effective spyware calledBlackShadesfor just $40.So what can journalists, human rights defenders, and others do to protect themselves? Education and awareness go a long way to helping keep individuals and groups safe, both Crete-Nishihata and Galperin told CPJ. Open-source tools such as those offered byMetasploitallow groups to test potential vulnerabilities in their digital systems.