I will be removing some data from my Zotero database regarding privacy methods that can be used for criminal activity.
On one hand, I included the material for the sake of completeness. However, at the same time, the misfeasance (if not malfeasance) of the security community in ignoring identified terror threats (Tsarnaevs, Mateen, Hasan, etc) while using illegal and ineffective bulk collection methods against the public at large led me to include the methods in place for privacy's sake.
I have long believed that the privacy versus security balance in this country is far out of whack.
I have been reexamining the relationship between cybercrime and terror financing, and have decided to go ahead and remove some of the material I consider to be the most dangerous.
This is a log of my work in an online graduate criminal justice program. My program focused on homeland security, while the courses themselves had a focus on organizational concerns. There are my papers, discussions, notes, and references. There are additional posts on the conferences and seminars I have attended. Finally, there are some essays I have written re: criminal justice and homeland security.
Featured Post
Homeland Security: The Sworn Duty of Public Officials
Homeland Security: The Sworn Duty of Public Officials The United States has a unique position amongst the countries of the world;...
No comments:
Post a Comment