US-Soldaten in Afghanistan


suche-links1 2 3 4 5 6 7suche-rechts


"Trump Takes Aim at a Critical Cold War Treaty With Russia"

US-Präsident Trump erwägt Berichten zufolge, den 1992 von NATO- und ehemaligen Warschauer-Pakt-Staaten unterzeichneten Vertrag über den Offenen Himmel (Open Skies) aufzukündigen. Das vertrauensbildende Abkommen erlaubt den Unterzeichnern, das Territorium anderer Vertragsteilnehmer auf festen Routen mit Beobachtungsflugzeugen zu überfliegen. Garrett M. Graff berichtet, dass der US-Kongressabgeordnete Eliot Engel vor den Folgen eines Austritts der USA gewarnt habe. "'[I] strongly urge you against such a reckless action,' Engel wrote. 'American withdrawal would only benefit Russia and be harmful to our allies’ and partners’ national security interests. ... The US should prepare for the challenge that Russia presents — not abandon mechanisms that provide the US with an important tool in maintaining surveillance on Russia.' While the Trump administration and Capitol Hill allies like senator Tom Cotton, the Republican from Arkansas, have long expressed frustration with the deal, Monday’s movement seemed to blindside foreign policy and arms control experts, who quickly expressed puzzlement and outrage that Trump would unwind what’s been seen as a cornerstone of global defense. (...) If the Trump administration does pull out, the collapse of the Open Skies agreement would be the latest in a series of little noticed but significant moves by the White House to undo the patchwork of arms control agreements that have kept at bay a new nuclear arms race between the two nuclear superpowers."

Mehr lesen


"The Wrong Way to Talk About the El Paso Shooter's Manifesto"

Nach Ansicht einiger Extremismus-Forscher sollten die Medien den Botschaften von Massenmördern wie dem Schützen von El Paso nicht zu viel Aufmerksamkeit widmen, schreibt Brian Barrett. "(...) extremism experts advocate for 'strategic silence' rather than a detailed accounting. Report on the manifesto’s existence, sure, and on its role in recruitment. In doing so, though, be sure to think about whom the coverage benefits. 'Do we really need to break down the specifics of the manifesto to understand that the action was motivated by violent hatred,' Phillips asks. 'If you quote the manifesto verbatim, that’s going to frame the conversation in their terms. It’s going to go along with their game. They become the center of the universe, and everyone else revolves around them.' (...) Already there are signs that the media has gotten more savvy. While several news sites have quoted the manifesto verbatim, they have done so in brief snippets. Very few outlets seem to have linked to it directly."

Mehr lesen


"How the West Got China's Social Credit System Wrong"

Die westliche Berichterstattung über das chinesische Sozialkreditsystem ist von vielen Missverständnissen und Übertreibungen geprägt, meint Louise Matsakis. Vor dem Hintergrund dieser übertriebenen Darstellungen könne nicht zuletzt das Ausmaß der westlichen Überwachungsmaßnahmen heruntergespielt werden. "With just over a year to go until the government’s self-imposed deadline for establishing the laws and regulations governing social credit, Chinese legal researchers say the system is far from the cutting-edge, Big Brother apparatus portrayed in the West’s popular imagination. 'I really think you would find a much larger percentage of Americans are aware of Chinese social credit than you would find Chinese people are aware of Chinese social credit,' says Jeremy Daum, a senior research fellow at Yale Law School’s Paul Tsai China Center in Beijing. The system as it exists today is more a patchwork of regional pilots and experimental projects, with few indications about what could be implemented at a national scale. (...) Western concerns about what could happen with China’s Social Credit System have in some ways outstripped discussions about what's already really occurring. Critiques are often based on worst-case scenarios far off in the future, and run the risk of minimizing the troubling aspects of the project as it is in place today. The exaggerated portrayals may also help to downplay surveillance efforts in other parts of the world. 'Because China is often held up as the extreme of one end of a spectrum, I think that it moves the goalposts for the whole conversation,' says Daum. 'So that anything less invasive than our imagined version of social credit seems sort of acceptable, because at least we’re not as bad as China.'"

Mehr lesen


"The Global Hawk Drone Iran Shot Down Was a $220M Surveillance Monster"

Bei der durch den Iran abgeschossenen US-Drohne vom Typ RQ-4A Global Hawk handle es sich um eine 220 Millionen US-Dollar teure "massive Überwachungsplattform", berichtet Lily Hay Newman. "It's likely, though, that this particular Global Hawk was a typical surveillance workhorse, says [Ulrike Franke, a policy fellow at the European Council on Foreign Relations], and was downed for geopolitical reasons rather than with the specific goal of technological reconnaissance. (...) It's currently unknown at what altitude the drone was flying when it was downed, but if it was in its high-altitude zone it would have been a somewhat difficult target to nab. Still, Franke emphasizes that such an interception is within the bounds of Iran's known capabilities. 'Part of the selling point is Global Hawks fly so high and normally they should be secure from being shot down,' Franke says. 'It’s not incredibly difficult to shoot down a system like that, but it’s comparatively difficult. It shows resolve on the political side.'"

Mehr lesen


"US to Russia on Nuke Experiments: Do as We Say, Not as We Do"

Nach dem Vorwurf der US-Regierung, dass Russland "wahrscheinlich" gegen den Kernwaffenteststopp-Vertrag von 1996 verstoße, macht Patrick Malon auf Experimente des US-Militärs aufmerksam, die ebenfalls als Verstoß gegen das Abkommen interpretiert werden könnten. "In a maze of tunnels 900 feet beneath the Nevada desert, US nuclear weapons scientists have since the 1990s been intermittently agitating flecks of plutonium with chemical high explosives, carefully trying to push them to the brink of a chain reaction capable of yielding nuclear force. In a separate network of underground tunnels about 4,800 miles away, in the northern Russian archipelago of Novaya Zemlya in the Arctic Circle, Russia conducts its own such experiments, meant to model the key chemical and physical actions that occur in the run-up to a full-blown nuclear explosion, without actually causing one. (...) Because the experiments are designed to closely simulate such explosions, 33 Latin American and Caribbean countries in 2016 called them violations of the 'spirit and letter' of the treaty (...). Washington dismissed that claim, but on May 29, the Trump administration abruptly leveled similar accusations at Russia, when a top intelligence official vaguely accused its scientists of transgressing the test ban treaty by conducting experiments meant to be barred. The irony of the recent charge is that it comes just as the US Energy Department’s National Nuclear Security Administration is about to step up the pace of the country’s complex and costly nuclear simulation experiments, the Center for Public Integrity has learned."

Mehr lesen


"The Huawei Case Signals the New US–China Cold War Over Tech"

Der Streit um das chinesische Unternehmen Huawei erinnert Zachary Karabell an den Kalten Krieg, in dem die USA und die Sowjetunion darum wetteiferten, andere Länder mit Panzern und Flugzeugen auszurüsten. Nun gehe es um die Vorherrschaft bei der Gestaltung der technologischen Infrastruktur in Europa, Asien, Lateinamerika und Afrika. "(...) if you are not American or Chinese, it can be difficult to discern how arrangements between the US government and American technology companies differ fundamentally from relationships between the Communist Party and Chinese technology companies. In a world where the two increasingly dominant technology superpowers, China and the US, are jockeying for position globally, other countries and foreign companies see all choices as potentially compromising their own domestic security. Or to put it differently: Who do you want spying on you, the Americans or the Chinese? If it’s going to be both, how do you best protect yourself? In that light, Washington’s fight against Huawei looks less like a clear case of defending against Chinese government espionage and cyber threats. It looks more like a cyber version of a new Cold War, where the United States and China are both attempting to line up proxies and divide the world into technology spheres of influence."

Mehr lesen


"Facebook's '10 Year Challenge' Is Just a Harmless Meme — Right?"

Kate O'Neill macht darauf aufmerksam, dass Facebooks aktuelle "10 Year Challenge" genutzt werden könnte, um die Algorithmen von Programmen zur Gesichtserkennung zu "trainieren". "Is it bad that someone could use your Facebook photos to train a facial recognition algorithm? Not necessarily; in a way, it’s inevitable. Still, the broader takeaway here is that we need to approach our interactions with technology mindful of the data we generate and how it can be used at scale. I’ll offer three plausible use cases for facial recognition: one respectable, one mundane, and one risky. The benign scenario: Facial recognition technology, specifically age progression capability, could help with finding missing kids. (...) Facial recognition's potential is mostly mundane: Age recognition is probably most useful for targeted advertising. (...) Like most emerging technology, there's a chance of fraught consequences. Age progression could someday factor into insurance assessment and health care. For example, if you seem to be aging faster than your cohorts, perhaps you’re not a very good insurance risk. You may pay more or be denied coverage. (...) The broader message, removed from the specifics of any one meme or even any one social platform, is that humans are the richest data sources for most of the technology emerging in the world. We should know this, and proceed with due diligence and sophistication."

Mehr lesen


"Stunning Photos of Ordinary Life in Ukraine's Conflict Zone"

Die österreichischen Journalisten Florian Rainer und Jutta Sommerbauer haben im vergangenen Jahr den Osten der Ukraine bereist und ihre Eindrücke in ihrem Buch "Grauzone: Eine Reise zwischen den Fronten im Donbass" veröffentlicht. hat eine Bilderserie aus dem Buch zusammengestellt. "Life in Donbass proceeds against a background of conflict — distant gunfire is almost constant, growing heavier at night, when the warring sides send out scouting parties; locals, who have become accustomed to the racket, refer to it as 'barking dogs' or 'the fireworks.' Neither side intentionally targets civilians, but mistakes are inevitable. 'If a drunk soldier shoots a grenade in the wrong way, he might hit a school,' Rainer explains. 'That's something that happens on a weekly basis.' Rainer and Sommerbauer took their book title from the name locals give to this battle-scarred landscape, which is gray both visually and morally. 'It's hard to tell who exactly is fighting,' Rainer says. 'You have a lot of Russian soldiers fighting, obviously — we met a few. But Russia isn't officially fighting, so who are the separatists? Who are the government supporters?'"

Mehr lesen


"Iran Emerges as Latest Threat to Facebook and Twitter"

Facebook und Twitter haben hunderte verdächtige Konten gelöscht, die möglicherweise genutzt werden sollten, um die öffentliche Meinung in den USA zu manipulieren. Issie Lapowsky schreibt, dass viele der gelöschten Accounts aus Russland, dem Iran und anderen Ländern stammen. "The news is a reminder of the broad scope of potential adversaries targeting American tech companies. But it simultaneously signals a strengthening alliance between those companies, which have begun proactively sharing the details of their investigations with other tech giants. On a call with reporters Tuesday night, Facebook executives including CEO Mark Zuckerberg described a multi-pronged investigation that unearthed several networks of bad actors. Some were associated with Russia, but others were affiliated with Iranian state media."

Mehr lesen


"Legal Win Opens Pandora’s Box for DIY Weapons"

In den USA ist einer Wired zufolge "anarchistischen" Gruppe gerichtlich erlaubt worden, technische Daten für den 3D-Druck von fast allen erhältlichen Schusswaffen im Internet zu veröffentlichen. "Defense Distributed, the anarchist gun group known for its 3D printed and milled 'ghost guns,' has settled a case with the federal government allowing it to upload technical data on nearly any commercially available firearm."

Mehr lesen


"The New Arms Race Threatening to Explode in Space"

Mit seiner Forderung nach einer "Space Force" für das US-Militär habe Präsident Trump auf ein bisher kaum beachtetes Wettrüsten zwischen den USA, China und Russland aufmerksam gemacht, schreibt Garrett M. Graff. "Everything has changed in space. A secretive, pitched arms race has opened up between the US, China, Russia, and, to a lesser extent, North Korea. The object of the race: to devise more and better ways to quickly cripple your adversary’s satellites. After decades of uncontested US supremacy, multinational cooperation, and a diplomatic consensus on reserving space for peaceful uses, military officials have begun referring to Earth’s orbit as a new 'warfighting domain.'"

Mehr lesen


"All the Times North Korea Promised to Denuclearize"

In den vergangenen Jahrzehnten habe Nordkorea mehrfach versprochen, auf sein Atomwaffenprogramm zu verzichten, schreibt Brian Barrett in seiner kritischen Nachbetrachtung zum Gipfeltreffen in Singapur. Aus diesem Grund sei auch diesmal Skepsis gegenüber vermeintlichen Zugeständnissen angebracht. "The offer has resurfaced over the past several decades with surprising regularity. And it has never panned out so far. 'There’s definitely a pattern where the North Koreans agree to denuclearize in theory, but then there’s not really a substantive process that they agree to, to actually hammer it out,' says James McKeon, a policy analyst at the Center for Arms Control and Non-Proliferation. (...) in general, North Korea uses denuclearization as a bargaining chip in times of desperation. 'Usually they suffer some kind of internal crisis, and then start acting in a really threatening way to try to get people to give them stuff,' says Mieke Eoyang, a national security analyst for center-left think tank Third Way."

Mehr lesen


"Haunting Photos of the Hidden War on Terror"

Der Fotograf Edmund Clark hat in den vergangenen Jahren US-Einrichtungen besucht, die im Zusammenhang mit dem amerikanischen "Krieg gegen den Terror" stehen. Seine Bilder werden gegenwärtig in der Ausstellung "The Day the Music Died" in New York präsentiert. "Clark believes that the nearly two-decade-long 'War on Terror' launched by President George W. Bush after 9/11 has subtly permeated our culture and everyday lives in similar ways. Working with investigative journalist Crofton Black, Clark has spent the past decade traveling to black sites, detention facilities, and naval bases around the world, seeking to capture the commonplace reality of horrific practices like torture, extraordinary rendition, and indefinite detention. His goal is to de-sensationalize these locations — and, in doing so, make us realize the War on Terror is all around us."

Mehr lesen


"Scientists Know How You’ll Respond to Nuclear War — and They Have a Plan"

Wie würden sich überlebende Zivilisten in einer Großstadt wie Washington D.C. im Fall eines Atomwaffenangriffs verhalten? US-Wissenschaftler beschäftigen sich Megan Molteni zufolge seit Jahrzehnten mit diesen Szenaren, um Strategien und Notfallpläne zu entwickeln. Forscher wie Chris Barrett vom Biocomplexity Institute of Virginia Tech könnten bei ihren Simulationen mittlerweile auf riesige Datensätze und Rechnerkapazitäten zurückgreifen. "In addition to information about where they live and what they do, each synthetic Washingtonite is also assigned a number of characteristics following the initial blast — how healthy they are, how mobile, what time they made their last phone call, whether they can receive an emergency broadcast. And most important, what actions they’ll take. These are based on historical studies of how humans behave in disasters. Even if people are told to shelter in place until help arrives, for example, they’ll usually only follow those orders if they can communicate with family members. They’re also more likely to go toward a disaster area than away from it — either to search for family members or help those in need. Barrett says he learned that most keenly in seeing how people responded in the hours after 9/11."

Mehr lesen


"What Would Really Happen If Russia Attacked Undersea Internet Cables"

Louise Matsakis schreibt angesichts jüngster Warnungen aus NATO-Ländern vor russischen U-Boot-Aktivitäten in der Nähe von transatlantischen Datenkabeln, dass die Sorge vor den Folgen einer möglichen Sabotage nach Ansicht von Experten übertrieben sei. "The world’s internet infrastructure is vulnerable, but Russia doesn't present the greatest threat. There are plenty of more complicated problems, that start with understanding how the cable system actually works. (...) For one, ruptures aren’t exactly an anomaly. One of the estimated 428 undersea cables worldwide is damaged every couple of days. Nearly all faults aren’t intentional. (...) That means Russia snipping a handful of cables in the Atlantic, where its submarines have been spotted, would disturb the global internet very little. In fact, even if it ruptured every single cable in the Atlantic Ocean, traffic could still be re-routed the other way, across the Pacific. (...) That’s not to say that the world’s undersea cables aren’t at risk, or that they don’t need protection — especially in areas of the world with less internet infrastructure, like Africa and some parts of Southeast Asia. When a fault happens there, the consequences can be more severe, including genuine internet disruption."

Mehr lesen


"Exclusive: Tracing ISIS’ Weapons Supply Chain—Back to the US"

Brian Castner berichtet in dieser umfassenden Reportage, wie es dem "Islamischen Staat" offenbar gelingen konnte, mit Hilfe von amerikanischen Materialien eine eigene Massenproduktion von Waffen und Munition auf die Beine zu stellen. "In Syria and Iraq, ISIS fighters are in retreat, losing ground to government forces and becoming increasingly constrained in their attacks and ambitions. But their intellectual capital—their weapon designs, the engineering challenges they’ve solved, their industrial processes, blueprints, and schematics — still constitute a major threat. (...) Much of the international structure that prevents weapons trafficking is rendered useless if ISIS can simply upload and share their designs and manufacturing processes with affiliates in Africa and Europe, who also have access to money and machinery. (...) They have already shown they can produce a nation-state’s worth of weapons, and their manufacturing process will only become easier with the growth of 3-D printing."

Mehr lesen


"North Korea’s Latest Missile Test Puts the Entire US in Range"

Der jüngste Raketentest Nordkoreas hat verdeutlicht, dass theoretisch auch Washington zu den Zielen eines möglichen nordkoreanischen Angriffs gehören könnte. Einige Experten weisen allerdings Brian Barrett zufolge auf technologische Mängel der bisher getesteten Raketen hin, die einen erfolgreichen Angriff in der Praxis wohl verhindern würden. "Setting aside the technological speed bumps, many remain skeptical that North Korea would actually go so far as to launch an ICBM at the United States, given that the reprisal likely would effectively obliterate the country. Instead, experts generally see the ICBM launches as shows of strength designed to prevent US aggression, rather than provoke it. The question once again becomes what, if anything, the US does in response."

Mehr lesen


"Provoking Iran Could Have Unseen Cyber Consequences"

Eine weitere Verschlechterung der Beziehungen zwischen den USA und Iran könnte eine neue Welle von iranischen Cyberangriffen auf westliche Ziele auslösen, schreibt Lily Hay Newman. "Iranian hackers were very active in targeting US and European targets a few years ago, launching waves of powerful DDoS attacks against dozens of financial institutions in 2011 and 2012, and laying groundwork for possible critical infrastructure attacks, including against a dam in New York state. Though these initiatives haven't completely abated, experts note that the country has seemingly shifted its focus in the past couple of years, turning to largely Middle Eastern targets like Saudi Arabia. Solidifying the nuclear agreement in 2015 may not have been the direct cause of the shift, or even related. But experts say it seems as though Iran has taken the last few years to centralize and organize its hacking initiatives, adding more government control and developing more sophisticated operations."

Mehr lesen


"Hacking North Korea Is Easy. Its Nukes? Not So Much"

Trotz der technologischen Überlegenheit der USA habe Nordkorea in der verdeckten Cyberkriegführung nach Ansicht von Experten einige entscheidende Vorteile, schreibt Andy Greenberg. "US hackers can take bites out of the edges of North Korea's infrastructure. But getting to its core — and anywhere close to disrupting or even delaying its nuclear capabilities — will be extremely difficult, they say, if not impossible. (...) the vast majority of North Korea's overall infrastructure still remains disconnected, vastly reducing any footholds for hackers — and making the prospect of compromising its locked-down and air-gapped nuclear weapons systems all the more daunting. (...) For years, US officials and analysts have warned that North Korea's anachronistic separation from the internet would be transformed into an advantage in an age of state-sponsored hacking. In his 2010 book Cyberwar, former US counterterrorism czar Richard Clarke ranked countries by their cyber-conflict preparedness. He placed North Korea first, and the US dead last, based on their diametrically opposed reliance on the internet."

Mehr lesen


"A Fishy Wikileaks Dump Targets Russia For a Change"

WikiLeaks hat ein Dossier mit geheimen Dokumenten über Einzelheiten der Überwachung russischer Bürger durch Regierungsbehörden veröffentlicht. Lily Hay Newman schreibt, dass die Informationen nicht so spektakulär seien, wie frühere Leaks über amerikanische Praktiken. Experten hätten die Veröffentlichung dennoch begrüßt. "(...) security and privacy analysts agree that the documents support, rather than expand, the existing picture of how Russian surveillance works. But with oppressive surveillance and censorship posing an increasingly grim human-rights threat in Russia, experts caution against writing the release off altogether. 'It doesn’t solve the problem that we know very few things about what’s going on on the side of the FSB,' says Andrei Soldatov, a Russian journalist who specializes in investigating digital surveillance and Russian government intelligence like the Federal Security Service. 'But nevertheless I decided that I need to praise this release, because it’s more than nothing. At least we got some hint about the data exchange interface between telecoms and secret services.'"

Mehr lesen


"How the US Can Counter Threats from DIY Weapons and Automation"

Nach Ansicht des früheren nationalen Geheimdienstdirektors Michael Dempsey wird sich das Umfeld amerikanischer Sicherheitspolitik in den kommenden Jahren durch drei neue Trends spürbar verändern. "First, consider the growth in automation, and the automated car market specifically. (...) It isn’t hard to imagine how terrorist groups or ill-intentioned state actors could adapt this technology in frightening ways. (...) A second underappreciated threat is the proliferation of sophisticated conventional weapons and capabilities. (...) A third emerging threat is the steady erosion of the US's advantage in the area of information awareness. (...) It’s not an exaggeration to say that an average person in many parts of the world can now get on the internet and within an hour purchase a small drone, GPS guidance system, and high-resolution camera, and thereby have the ability to acquire information that would have been unthinkable even a generation ago, including on US military bases and critical weapons storage sites."

Mehr lesen


"For Superpowers, Artificial Intelligence Fuels New Global Arms Race"

Die Großmächte USA, China und Russland sind sich US-Experten zufolge darin einig, dass der Einsatz künstlicher Intelligenz bei der Entwicklung ihrer militärischen Machtposition eine zentrale Rolle spielen wird. "The US, widely recognized as home to the most advanced and vibrant AI development, doesn’t have a prescriptive roadmap like China’s. But for several years the Pentagon has been developing a strategy known as the 'Third Offset,' intended to give the US, through weapons powered by smart software, the same sort of advantage over potential adversaries that it once held in nuclear bombs and precision-guided weapons. (...) Russia lags behind China and the US in sophistication and use of automation and AI, but is expanding its own investments through a military modernization program begun in 2008. (...) The AI race among the world’s three largest military powers differs from earlier competitions like those to deploy nuclear weapons or stealth technology because much artificial intelligence technology can be used for both commercial and military applications."

Mehr lesen


"North Korea’s Missile Shot Over Japan Calls Trump’s Bluff"

Einige Experten betrachten den jüngsten Raketenabschuss Nordkoreas Lily Hay Newman zufolge als Teil einer Kampagne, die im Verlauf des Jahres zu weiteren Vorfällen und möglicherweise einem neuen Atomwaffentest führen könnte. "Just last week, secretary of state Rex Tillerson remarked that Pyongyang had 'demonstrated some level of restraint that we have not seen in the past,' and Trump added that same day that he thought Kim Jong-un was beginning to respect the US. This week's missile test rebuffs that interpretation. 'I don’t think [Tillerson] understands North Korea’s thinking. North Korea is very adept at incrementally ratcheting up the pressure to see what the response is,' Aum says. 'They are going to continue with their tests and we can expect provocations for the rest of the year — it may ultimately get to a sixth North Korean nuclear test. So the real question is what President Trump’s response is going to be. If he doesn’t do anything, then that diminishes the credibility of our deterrence and makes him look weak. If he does do something along the lines of 'fire and fury' then we’re heading toward nuclear escalation, so either way it’s a bad situation.'"

Mehr lesen


"Sorry, Banning 'Killer Robots' Just Isn’t Practical"

Simonite bezweifelt nach der von internationalen Experten formulierten Warnung vor "Killer-Robotern", dass sich eine Ächtung derartiger Waffensysteme durch die UNO tatsächlich umsetzen ließe. "A recent report on artificial intelligence and war commissioned by the Office of the Director of National Intelligence concluded that the technology is set to massively magnify military power. Greg Allen, coauthor of the report and now an adjunct fellow at nonpartisan think tank the Center for New American Security, doesn’t expect the US and other countries to be able to stop themselves from building arsenals of weapons that can decide when to fire. 'You are unlikely to achieve a full ban of autonomous weapons,' he says. 'The temptation for using them is going to be very intense.'"

Mehr lesen


"Instagram’s Kevin Systrom Wants to Clean Up the Internet"

Nicholas Thompson berichtet in diesem ausführlichen Magazinbeitrag von Wired, dass große Tech-Unternehmen wie Instagram und Facebook in Silicon Valley dabei seien, ihre Interpretation der Meinungsfreiheit zu ändern. "In 2012, an executive at [Twitter] referred to the platform as the 'free speech wing of the free speech party.' Now that period in Twitter’s corporate lifetime looks like a moment of naive idealism: the creation of young men who didn’t understand the depths to which sexism, and maybe even fascism, lurk within the human id. (...) And so the notion of free speech is shifting at the companies that run the internet. (...) To [Kevin Systrom, the CEO of Instagram,] it’s pretty simple: Freedom of speech does not mean the freedom to shitpost. (...) Jackson Colaco makes the same point more sharply. 'If toxicity on a platform gets so bad that people don’t even want to post a comment, they don’t even want to share an idea, you’ve actually threatened expression.' Her comment raises a new problem, though: How exactly do you know when restricting speech helps speech? When is less more and when is less less?"

Mehr lesen


"The World May Be Headed for a Fragmented 'Splinternet'"

Die staatlichen Bemühungen um eine stärkere Regulierung großer Internetkonzerne lassen Davey Alba befürchten, dass das Netz künftig weltweit durch immer enger gefasste juristische Einschränkungen geprägt werden wird. "'There’s a risk of a race to the bottom here,' says Vivek Krishnamurthy, assistant director of Harvard Law School’s Cyberlaw Clinic, who specializes in international internet governance. 'Anything that’s mildly controversial is probably illegal in some authoritarian country. So we could end up with a really sanitized internet, where all that’s left is cute cat photos.' (...) 'The way the trend is going, there is a lot of pressure directed at breaking the internet, this global network, into a national network with interconnections,' says Krishnamurthy. 'It could change what the internet looks like in five or ten years.' If internet users, tech companies, governments, and advertisers want to keep that from happening, now's the time to come together and conceive a plan."

Mehr lesen


"Latest Ransomware Hackers Didn't Make WannaCry's Mistakes"

Sieben Wochen nach dem WannaCry-Angriff sind prominente Ziele in aller Welt erneut Opfer einer massiven Cyberattacke geworden. Lily Hay Newman schreibt, dass die diesmal verwendete Schadsoftware deutlich ausgeklügelter sei. "Some researchers call this new iteration 'NotPetya' or 'GoldenEye,' while others still refer to it as Petya. Regardless of the name, it has already hit 2,000 targets, seizing the systems of high-profile victims like Danish shipping giant Maersk, US pharmaceutical company Merck, and multiple private and public institutions in Ukraine. And while it owes its rapid spread in part to EternalBlue, the same stolen NSA exploit WannaCry leveraged, it lacks several of the traits that made WannaCry — which turned out to be an unfinished North Korean project gone awry — easier to stop."

Mehr lesen


"Feds Charge NSA Contractor Accused of Exposing Russian Hacking"

Kurz nach der Veröffentlichung des Intercept-Artikels über mutmaßliche russische Hackerangriffe im US-Wahlkampf ist Reality Leigh Winner, Mitarbeiterin eines NSA-Dienstleisterunternehmens, wegen der angeblichen Weitergabe des geheimen NSA-Dokuments verhaftet worden. "That near-instant outcome for Winner underscores the grave risks of sharing top secret information — and the pitfalls of public-interest journalism that depends on illegal leaks. (...) Winner’s real mistake, according to the complaint, was emailing with the Intercept’s reporters from her work computer. When investigators checked the computers of their six suspects, they quickly found evidence of her communications with the news outlet — though it’s not clear if those communications took place before or after her leak, or whether they were directly associated with her leaks at all."

Mehr lesen


"Don’t Read Too Much Into That Successful Missile Defense Test"

Das US-Militär hat den Abschuss einer Interkontinentalrakete durch ein Raketenabwehrsystem offenbar erfolgreich simuliert. Brian Barrett schreibt, dass derartige Tests unter genau kontrollierten Bedingungen stattfinden und der Erfolg deshalb nicht als Beleg für einen effektiven Schutz interpretiert werden sollte. "Think instead of the $244 million test as a competent recital, a choreographed display of US missile defense capabilities under optimal conditions. It leaves open the question of how the so-called Ground-based Midcourse Defense system would perform under real-world conditions — and how North Korea might respond to this latest demonstration of a system that US has spent almost two decades testing."

Mehr lesen


"Why Governments Won’t Let Go of Secret Software Bugs"

Lily Hay Newman erwartet nicht, dass die Regierungen und Geheimdienste nach der globalen "WannaCry"-Hackerattacke darauf verzichten werden, entdeckte kritische Lücken im Internet geheim zu halten bzw. für eigene Zwecke zu nutzen. "(...) one concrete thing agencies can do to reduce incidental impact is devote even more resources and effort to securing their digital tools. Perfect security is impossible, but the more control intelligence groups can maintain, the less danger these spy tools pose. 'You cannot do modern espionage without these capabilities,' [Jason Healey, a cyberconflict researcher at Columbia University,] says. 'If you want to know what the Islamic State is doing if you want to keep track of loose nukes in central Asia, if you want to follow smugglers who are trying to sell plutonium, this is the core set of capabilities that you need to do that. [But] a minimum role of public policy is if you’re going to weaponize the IT made by US companies and depended on by citizens, for fuck’s sake at least keep it secret. If you’re going to have to do this, then don’t lose it.'"

Mehr lesen

suche-links1 2 3 4 5 6 7suche-rechts

Hier finden Sie die Redaktion der Sicherheitspolitischen Presseschau.

Mehr lesen



Europa, Asien, Afrika, Amerika und weltweite Phänomene und Institutionen. Die bpb bietet ein breites Angebot zu internationalen Themen.

Mehr lesen


Informationsportal Krieg und Frieden

Wo gibt es Kriege und Gewaltkonflikte? Und wo herrscht am längsten Frieden? Welches Land gibt am meisten für Rüstung aus? liefert wichtige Daten und Fakten zu Krieg und Frieden.

Mehr lesen auf


Innerstaatliche Konflikte

Vom Kosovo nach Kolumbien, von Somalia nach Süd-Thailand: Weltweit schwelen über 280 politische Konflikte. Und immer wieder droht die Lage gewaltsam zu eskalieren.

Mehr lesen

Zahlen und Fakten


Kaum ein Thema wird so intensiv und kontrovers diskutiert wie die Globalisierung. "Zahlen und Fakten" liefert Grafiken, Texte und Tabellen zu einem der wichtigsten und vielschichtigsten Prozesse der Gegenwart.

Mehr lesen

Publikationen zum Thema

Coverbild Internationale Sicherheit im 21. Jahrhundert

Internationale Sicherheit im 21. Jahrhundert

Die internationale Sicherheit ist fragil und bedroht. Wie können und müssen demokratische Systeme ...

Internationale Sicherheitspolitik Cover

Internationale Sicherheitspolitik

Seit Ende des Ost-West-Konflikts hat sich die internationale Sicherheitspolitik deutlich verändert....

Zum Shop