A world without libertiesThe referencesHugo C.·Follow4 min read·Oct 21, 2017--ListenShareA world without liberties“Virtually” no freedom of speech leftmedium.comEU Terrorism Situation & Trend Report (Te-Sat) | Activities & Services | Main Reports | EuropolEU Terrorism Situation & Trend Report (Te-Sat)13; View all TE-SAT reports View TE-SAT 2017 online site Download TE-SAT 2017 PDF 
…www.europol.europa.eu2017 EU Terrorism Report: 142 failed, foiled and completed attacks, 1002 arrests and 142 victims died | Europol2017 EU Terrorism Report: 142 failed, foiled and completed attacks, 1002 arrests and 142 victims…In 2016, a total of 142 failed, foiled and completed attacks were reported by eight EU Member States. More than half…www.europol.europa.eu700,000 deaths a year: tackling smoking in the EU | News | European Parliament700,000 deaths a year: tackling smoking in the EU | News | European ParliamentMore than one in four Europeans smoke. Half of them will die prematurely, shortening their life by 14 years on average…www.europarl.europa.euTimeline of recent terror attacks against the West | Fox NewsTimeline of recent terror attacks against the WestThe “terror incident” in London on Friday is the latest in a series of recent terror strikes aimed at the West. Here is…www.foxnews.comBig data — WikipediaBig data — WikipediaLately, the term “big data” tends to refer to the use of predictive analytics, user behavior analytics, or certain…en.wikipedia.orgGoogle Ngram Viewer — Big DataGoogle Ngram Viewer© 2013 Google — Privacy & Terms — About Google — About Google Books — About Ngram Viewerbooks.google.comExabyte — WikipediaExabyte — WikipediaThe exabyte is a multiple of the unit byte for digital information. In the International System of Units (SI), the…en.wikipedia.orgUtah Data Center — WikipediaUtah Data Center — WikipediaThe Utah Data Center, also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data…en.wikipedia.orgA Very Short History Of Big DataA Very Short History Of Big DataThe story of how data became big starts many years before the current buzz around big data. Already seventy years ago…www.forbes.comPrism slide 5 — PRISM (surveillance program) — WikipediaPRISM (surveillance program) — WikipediaPRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration. The program is…en.wikipedia.orgGlobal surveillance disclosures (2013–present) — WikipediaGlobal surveillance disclosures (2013-present) — WikipediaThese media reports have shed light on the implications of several secret treaties signed by members of the UKUSA…en.wikipedia.orgTor (anonymity network) — WikipediaTor (anonymity network) — WikipediaTor is free software for enabling anonymous communication. The name is derived from an acronym for the original…en.wikipedia.orgTor Project: OverviewTor Project: OverviewThe Tor Project’s free software protects your privacy online. Site blocked? Email [mailto:gettor@torproject.org] for…www.torproject.orgSecret NSA documents show campaign against Tor encrypted network — The Washington PostSecret NSA documents show campaign against Tor encrypted networkOn Nov. 1, 2007, the National Security Agency hosted a talk by Roger Dingledine, principal designer of one of the world…www.washingtonpost.comTorsploit — NSA tools behind attack | CONFIRMED — cryptostorm’s community forumTorsploit — NSA tools behind attack | CONFIRMED — cryptostorm’s community forumcryptostorm_is twitter feed if you’re into that kind of thing ∞ Ξ we’re rolling out voodoo network security across…cryptostorm.orgnsa | Tor Blognsa | Tor BlogTor 0.3.2.2-alpha is the second release in the 0.3.2 series. This release fixes several minor bugs in the new scheduler…blog.torproject.orgNSA paid $10 million to put its backdoor in RSA encryption, according to Reuters report — The VergeNSA paid $10 million to put its backdoor in RSA encryption, according to Reuters reportWhen leaked documents claimed to have caught the NSA inserting bad protocols into the national standards board NIST, it…www.theverge.comSnowden Doc Search: TORSnowden Doc SearchEdit descriptionsearch.edwardsnowden.comSnowden Doc : Techniques against TORSnowden Doc SearchDocument: UK TOP SECRET STRAP1 COMINT A potential technique to deanonymise users of the TOR network OPC-MCR, GCHQ This…search.edwardsnowden.comExclusive: Secret contract tied NSA and security industry pioneerExclusive: Secret contract tied NSA and security industry pioneerAs a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U…www.reuters.comExclusive: NSA infiltrated RSA security more deeply than thought — studyExclusive: NSA infiltrated RSA security more deeply than thought — studySAN FRANCISCO (Reuters) — Security industry pioneer RSA adopted not just one but two encryption tools developed by the…www.reuters.com(2) Government Surveillance: Last Week Tonight with John Oliver (HBO) — YouTubeUkraine, anatomie d’une cyberguerre — épisode 1 : la menace au quotidien — Politique — NumeramaUkraine, anatomie d’une cyberguerre — épisode 1 : la menace au quotidien — Politique — NumeramaEn Ukraine, les cyberattaques sont une menace de tous les jours depuis le début du conflit. Le but : saper la légitimit…www.numerama.comJean-Claude Juncker annonce un renforcement de la cyberdéfense et confirme un Wi-Fi européen — Politique — NumeramaJean-Claude Juncker annonce un renforcement de la cyberdéfense et confirme un Wi-Fi européen …Pour son dernier discours sur l’état de l’Union (SOTEU), le président de la Commission se savait attendu : il y a un an…www.numerama.comWhat is jihadism? — BBC NewsWhat is jihadism?A BBC investigation has found that more than 5,000 people around the world died during November as a result of violence…www.bbc.comJihadist | Definition of Jihadist by Merriam-WebsterDefinition of JIHADISTa Muslim who advocates or participates in a jihad… See the full definitionwww.merriam-webster.comJihad: A Misunderstood Concept from Islam — What Jihad is, and is notJihad: A Misunderstood Concept from Islam — What Jihad is, and is notShaykh Muhammad Hisham Kabbani (Chairman, Islamic Supreme Council of America) and Shaykh Seraj Hendricks (Head Mufti…islamicsupremecouncil.org