Security, Surveillance, and Privacy 
Security, Surveillance, and Privacy
by HKU / Jonathan Stray
Video Lecture 8 of 8
Not yet rated
Views: 909
Date Added: March 14, 2015

Lecture Description

Who is watching our online activities? How do you protect a source in the 21st Century? Who gets to access to all of this mass intelligence, and what does the ability to survey everything all the time mean both practically and ethically for journalism? In this lecture we will talk about who is watching and how, and how to create a security plan using threat modeling.

Topics: How is email transmitted? Who has access to your emails. Mass surveillance and its legal status. How cryptography works. Encryption versus authentication. Man-in-the-middle attacks. Secure communications using OTR. Case study: the leaked Wikileaks cables. Threat modeling. Security planning.

Instructor: Jonathan Stray
Course blog: jmsc.hku.hk/courses/jmsc6041spring2013/

Course Index

Course Description

Computational Journalism is a course given at JMSC during the Spring 2013 semester. It covers, in great detail, some of the most advanced techniques used by journalists to understand digital information, and communicate it to users. We will focus on unstructured text information in large quantities, and also cover related topics such as how to draw conclusions from data without fooling yourself, social network analysis, and online security for journalists. These are the algorithms used by search engines and intelligence agencies and everyone in between.

Comments

There are no comments. Be the first to post one.
  Post comment as a guest user.
Click to login or register:
Your name:
Your email:
(will not appear)
Your comment:
(max. 1000 characters)
Are you human? (Sorry)