Feeds

Facebook-based privacy campaign to spam Wacky Jacqui

10 for effort, 0 for irony appreciation

Internet Security Threat Report 2014

More than 3,000 people have agreed to protest against the privacy threat from the government's forthcoming consultation on communications data... by joining a Facebook group.

Participants in "CC all your emails to Jacqui Smith Day" plan to bombard the Home Secretary's inbox with their daily trivia to register opposition to expansion of internet surveillance systems, currently being devised under the Interception Modernisation Programme.

"That way Jacqui Smith and the Home Office will be able to see how difficult it will be to get on with their actual work - keeping our country safe - when they're trying to monitor every harmless private thing we say and do," wrote the group's creator.

The date of the protest has yet to be decided.

The government has been in talks with communications providers since 2007 about the perceived threat to law enforcement posed by IP-based communications. It's known GCHQ's preferred solution is a massive centralised database containing details (who contacts whom, when, where and how) of every email, phone call, SMS and web browsing session.

If the irony (or perhaps appropriateness?) of protesting against the growth of monitoring and retention of communications data via a business whose raison d'être is the monitoring and retention of communications data isn't too much for you to bear, there's more here. ®

Beginner's guide to SSL certificates

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.