JacketFlap connects you to the work of more than 200,000 authors, illustrators, publishers and other creators of books for Children and Young Adults. The site is updated daily with information about every book, author, illustrator, and publisher in the children's / young adult book industry. Members include published authors and illustrators, librarians, agents, editors, publicists, booksellers, publishers and fans. Join now (it's free).
Login or Register for free to create your own customized page of blog posts from your favorite blogs. You can also add blogs by clicking the "Add to MyJacketFlap" links next to the blog name in each post.
Blog Posts by Tag
In the past 7 days
Blog Posts by Date
Click days in this calendar to see posts by day or month
Viewing: Blog Posts Tagged with: hackers, Most Recent at Top [Help]
Results 1 - 5 of 5
How to use this Page
You are viewing the most recent posts tagged with the words: hackers in the JacketFlap blog reader. What is a tag? Think of a tag as a keyword or category label. Tags can both help you find posts on JacketFlap.com as well as provide an easy way for you to "remember" and classify posts for later recall. Try adding a tag yourself by clicking "Add a tag" below a post's header. Scroll down through the list of Recent Posts in the left column and click on a post title that sounds interesting. You can view all posts from a specific blog by clicking the Blog name in the right column, or you can click a 'More Posts from this Blog' link in any individual post.
Julian Assange is an unusual figure in the world of hacktivism. He embraced his notoriety as leader of Wikileaks, and on 4 February 2016, he appeared on the balcony of the Ecuadorian embassy holding a copy of a UN panel report that declared that he has been “arbitrarily detained” while avoiding extradition to Sweden for alleged rape for almost six years (British and Swedish prosecutors still seek to detain him).
As the analysis reaches deeper behind the recent Paris attacks, it has become clear that terrorism today is a widening series of global alliances often assisted and connected via cyber social media, and electronic propaganda.
I am a huge fan of Chuck Wendig’s Miriam Black series so when I saw he had a new book coming out I had to read it. On the surface this appears to be a cyber-thriller about hacking. But in the hands of Chuck Wendig it goes somewhere quite different. The book opens and we are […]
Most writers will get the “where do you get your ideas?” question at least once in their careers. Probably many, many times. Short of tossing out a snarky response like “J.C. Penney” or “the Idea catalog,” I usually reply, “From everything around me.” Helpful, right?
I’m not kidding though. I’m actually not the most observant of people and I have a terrible memory, which is why I became a writer instead of a consulting detective. (I know, these aren’t good qualities for a writer either, but I figure in the digital age everyone is going to carry their memories in their pockets or on their wrists one day, so I’m just ahead of the curve.) Truth is, I get ideas from all sorts of places: overheard conversations, misread words, images, other books, TV shows, etc.
My short story “All the Lonely People” (Shimmer #13, 2011), came from a billboard for a sports drink with the slogan “Don’t Fade,” which inspired a story about a woman who can see people who are literally fading from life and can either help them stick around or disappear entirely. The “Eleanor Rigby” references came in later.
I heard a friend refer to winter as “the time when everything dies,” which inspired me to write a story called “The Dying Time” (forthcoming) about a village where everyone becomes temporarily undead and hibernates during the winter, which is bad news for the guy who stumbles into town just as autumn is ending. Meanwhile, a fantasy short story mashup of Gilmore Girls and Supernatural began life as a Tweeted pun which led to “The Grimoire Girls” (also forthcoming). You get the idea. This is why I carry a notebook and pen everywhere; I write down anything that triggers inspiration in my brain, because you never know what it can turn into.
Naturally, the internet is also fertile ground for ideas. Online research (and books!) inspired and informed a lot of the hacking that appears in The Silence of Six, because I was striving for authenticity and plausibility. But one big plot point originated from a web article I read years ago — probably back in 2010, well before I started working on the book — about USB flash drives embedded in walls. These “dead drops” were in public so anyone could transfer files to them or copy files off with their laptop, as long as they knew about them. (Not really a good idea when you think about it, but still.)
An interesting thing about inspiration is you often can’t trace it back to the source. Minds are complex and ideas have a way of taking over and growing, so it’s difficult to untangle where it all came from. Everything I’ve ever written has essentially grown out of the books I’ve read, the films I’ve seen, my favorite TV shows, and so on. How can I acknowledge all of those influences? It’s one reason why some copyright theft and plagiarism accusations can be difficult to prove, because it’s possible for someone to unconsciously copy someone else’s work or ideas — to a degree. Again, do your research!
Where do you get your ideas?
By the way, if you’re fascinated by dead drops too, you can win a special The Silence of Six USB drive this week (through March 15, 2015) in Adaptive’s #ChallengeofSix digital scavenger hunt, with online puzzles and clues inspired by the book. Grand prize is an Xbox One! Watch this video for more info and to get the first clue.
In 1928 the iconic United States Supreme Court Justices Holmes and Brandeis dissented in a judgment that ruled the product of telephone conversations derived from “wiretapping” admissible. With characteristic eloquence, Mr Justice Brandeis held that “the confined criminal is as much entitled to redress as his most virtuous fellow citizen; no record of crime, however long, makes one an outlaw”. The judges could be forgiven for thinking that, at least in terms of the English law, eighty years on, things haven’t changed much.
There is a connection between the phone hacking row, which appears to be the preserve of celebrities who fear their calls may have been listened into and the changes to control orders, inelegantly re-named Terrorism Prevention and Investigatory Measures. On the one hand, there is a gaggle of media lawyers and their clients complaining that the Metropolitan Police has failed to take action against individuals eavesdropping on the most private of conversations and on the other the same material is secretly relied upon by the State to confine individuals, who have not been convicted of any offence, to effective house arrest and to impose other Orwellian sanctions. The apparent juxtaposition becomes manifest; the police and agencies rely on the material to counter terrorism, yet appear impotent in terms of investigating allegations of what is given the seemingly neutral term of phone hacking.
There needs to be some attempt to de-mystify what is meant by phone hacking, sometimes referred to as phone tapping. It is clear that practically what is meant is eavesdropping on voicemail messages.
Previously the police have asserted they could not rely on the evidence provided on the ground that it is not admissible. This is a reference to a legal provision in the Regulation of Investigatory Powers Act 2000 that prohibits the use of intercept product in court proceedings. However, it has been misunderstood. The prohibition largely relates to product of intercept warrants that the State obtains to protect national security and investigate other threats as well as serious crime – this is why terror suspects aren’t prosecuted in the criminal courts – the intelligence implicating them cannot be used for this purpose. It expressly does not apply where an illegal interception has occurred.
But is a third party listening to a voicemail an interception? The simple answer is that it might be, particularly if it has not been listened to (if it is, it is a criminal offence) but if it is not, it is almost certainly an offence under the Computer Misuse Act 1990. Where such offences may have been committed there is no question that the incident and evidence of interception or hacking is admissible and capable of being used by the police. Even if there was an argument to the contrary, the consent of the “victim” alleviates any remaining difficulty concerning the issue (if an individual consents to their calls being intercepted the prohibition on admissibility no longer applies).
To fair to the police, the highest courts in the land have found the question of what may amount to an interception “particularly puzzling” and the legislation “difficult to understand”. It is almost impenetrable but that is not really any excuse.
Add to this the fact that the law in this area is under review (again). A cynic could muse what all the fuss is about; surely the simplest thing would be to make the product of intercept admissible, even i
0 Comments on Phone-hacking: The law may be difficult to understand but that’s no excuse as of 1/1/1900