Exaggerating the effects of foreign influence campaigns serves only the foreign operatives.
Downplaying the threat of foreign disinformation campaigns risks making it easier for bad actors to take advantage of an unprepared public.
Overstating the power of propaganda risks amplifying not only the original falsehood, but also an even more corrosive and polarizing narrative—that politicians are somehow remote-controlled, and that citizens don’t have agency.
@hanscees The analysis is based on data protection law, GDPR. The definition of personal data does not consider cpu and electricity. Hence why it stands.
My book 'PROPAGANDA: from disinformation and influence to operations and information warfare' treats the subject adequately, comprehensively, broadly, expertly. Information surrounds us. How does information influence work? An expert arrangement of the subject. https://blog.lukaszolejnik.com/propaganda-my-book-on-information-security/
@stf Well, I know how I wrote the book - the thing is that I used references through the book, so it is based on sources. And obviously the sentence is "in my view/opinion", since I said that. Would it sound better to you if I spoke negatively about my work? :-)
Russian cyber group infiltrated the systems of a hydroelectric dam in France and water utilities in the United States and Poland. Claims to tamper with industrial control settings. Sabotage attempt?
The aimed political effect of these cyber operators is evident.
It may be seen as crossing the threshold interference in internal affairs.
Welcome to our new Fedi-experiment: a Lemmy (Fedi-Reddit) community to share academic/policy articles on tech policy! Web: https://lemmy.ml/c/mae Fedi: @mae
I've recently joined @robin@mnot and @chadkoh in a small discussion group where we’ve done that privately. But why not make it a broader resource! You can browse the links without an account. If you sign up, you can up/down-vote articles and leave comments as well!
Acts amounting to direct participation in hostilities must meet 3 requirements: (1) a threshold regarding the harm likely to result from the act, (2) a relationship of direct causation between the act and the expected harm, and (3) a belligerent nexus between the act and the hostilities conducted between the parties to an armed conflict.
This applies also to the management and uses of technology. Including servers. Including cyberattacks/operations. Such civilians become unlawful combatants.
What's the privacy of Apple Pay? Unsurprisingly, it's not cash, even when paying in over-the-counter cafe or store. Theoretically merchants may request user addresses. However, if I understand correctly these may be edited out in "Wallet & Apple Pay defaults in Settings" to be arbitrary. Of course bank/card-provider still have real addresses, but maybe there's little reason to share it with retailers (when they do not need it)? :-)