In the first part of a three part series of articles, Pauline C. Reich, Professor and Director of the Asia-Pacific Cyberlaw, Cybercrime and Internet Security Research Institute at Waseda University School of Law in Tokyo, Japan gives some context to the recent US v. Apple case.
Are individuals more likely to allow use of their data when it’s ‘for the greater good’ – even if permission is not sought? It may be that they don’t have a choice. Even as data protection measures increase and regulatory bodies increase their ability to punish bad behaviour by data custodians, there are still some thorny issues when it comes to the moral and legal obligations governing the sharing of Big Data and personal information.
In this, the third of a series of articles, Pauline C. Reich examines how Asian countries are approaching the thorny issue of cybercrime and the interception of data. The author takes a look at two Southeast Asian countries in particular, Cambodia and the Philippines.
In this first part of a two-part series, we explore some of the issues around government surveillance and the search for that elusive balance between security and privacy. In this first part, we explore how serious the threat of cyber snooping by government surveillance is and why we shouldn’t panic just yet.
In this two-part series, we explore some of the issues around government surveillance and the search for that elusive balance between security and privacy. In this second part, we look at the search for that digital ‘safe place’ where privacy is assured and just why that place is becoming ever more elusive.
According to U.S. Director of National Intelligence Dan Coats, the U.S. is at “a critical point.” With Russian hackers breaking into the U.S. power grid and gaining access to utility control rooms, they have the opportunity to “throw the switch”, plunging the nation into darkness and chaos.
As location-based services become ubiquitous and the rise of selfie soldiers, the Strava heat map incident shows the difficulty in governing civilian technology in military settings.
GAO audits carried out between fiscal years 2012-2017 have discovered significant cyber vulnerabilities in the U.S. Department of Defense’s top weapons systems, reflecting a misguided approach that does not take into consideration basic cyber security.
Though the company is coming off of its best year ever, Huawei cyber security is set for a big boost in 2019 to allay concerns in Western countries about the security of their hardware.
A major cyber attack on South Korea is usually not a stop-the-presses global news item; it's fairly routine for North Korea and China to make attempts. But what's interesting are the organizational failures that this cyber attack highlights.