wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/06\/22\/techcrunch-disrupts-security-stage-highlights-the-risks-of-spyware-government-surveillance\/<\/a><\/br> Governments all over the world, authoritarian and democratic, use spyware to hack the phones of activists, journalists, and political rivals who are critical of their governments.<\/p>\n Initially, the spyware industry consisted of a few known actors, like Hacking Team and FinFisher. But over the past decade \u2014 as the technology evolved and smartphones and computers became ubiquitous \u2014 the industry has ballooned in size. Can this industry operate legally and ethically? If not, what can we do to counter state-backed abuse of spyware and its violent consequences, including harassment, arbitrary detention, and killings?<\/p>\n We\u2019re thrilled that Marietje Schaake, the international policy director at Stanford University\u2019s Cyber Policy Center, and John Scott-Railton, a senior researcher at the University of Toronto\u2019s Citizen Lab, will join us on the Security Stage<\/a> at TechCrunch Disrupt 2023<\/a>, which takes place September 19-21 in San Francisco.<\/p>\n The surveillance genie isn\u2019t going back in the bottle. Schaake and Scott-Railton will tackle this challenging topic in their session, \u201cThe Spyware Industry is Out of Control. Now What?\u201d<\/p>\n We\u2019ll discuss whether governments can be trusted to use these technologies at all and, if so, how do we ensure they use them proportionately, fairly and legally? What should spyware makers themselves do (or be compelled to do) to limit abuse?<\/p>\n Governments using spyware that exploit flaws found in billions of phones put everyone at risk. Should there be a vulnerabilities equities process to ensure serious vulnerabilities are reported and disclosed to the relevant technology companies affected, the way that U.S. intelligence does now?<\/p>\n We\u2019ve already seen companies, like Apple, step up their counter-spyware protections aimed at trying to prevent digital intrusions that target at-risk users, but what more can tech companies do to fix spyware-exploitable security flaws they don\u2019t even know about?<\/p>\n Learn more about our expert speakers and their qualifications for tackling these complicated challenges, below.<\/p>\n Marietje Schaake has been vocal about spyware abuse for more than a decade, ever since she served as a member of European Parliament from 2009 to 2019, where she worked on trade, foreign and tech policy. At the time, she was one of the first lawmakers in the world who put spyware abuse on the map for policymakers and pushed for regulating government spyware.<\/p>\n She currently serves as the international policy director at Stanford\u2019s Cyber Policy Center and is a fellow at the Institute for Human-Centered AI. Schaake is also a columnist for Financial Times, and she sits on a number of not-for-profit boards.<\/p>\n John Scott-Railton is a senior researcher at Citizen Lab, a digital investigative unit based at the University of Toronto\u2019s Munk School of Global Affairs and Public Policy. He leads investigations into targeted threats against civil society, including mercenary spyware and disinformation.<\/p>\n Scott-Railton has led collaborative investigations into operations attributed to Russia, Iran, Syria, China, ISIS and others. He has also investigated the abuse of commercial mercenary spyware around the globe. Conducted in close partnership with at-risk dissidents, journalists and human rights defenders, these investigations have discovered hundreds of targets of sophisticated hacking carried out with products sold by Hacking Team, FinFisher, NSO Group and others. They have also uncovered zero-day exploits against Apple and Microsoft products, among others, resulting in patches to billions of devices worldwide.<\/p>\n Scott-Railton has testified before the House Permanent Select Committee on Intelligence, the European Parliament\u2019s Committee of Inquiry to investigate the use of Pegasus and equivalent surveillance spyware (PEGA), and was part of the Parliament of Poland\u2019s inquiry into Pegasus spyware. He also founded The Voices Projects, collaborative information feeds that bypassed internet shutdowns in Libya and Egypt.<\/p>\n You\u2019ll find more conversations with leading experts on the Security Stage<\/a>, which features topics like data protection, privacy regulations, information sharing, risk management and more. It\u2019s just one of the six new stages for six breakthrough sectors<\/a> at Disrupt.<\/p>\n Join the global startup community at TechCrunch Disrupt 2023<\/a> on September 19\u201321 in San Francisco. Buy your pass now<\/a> and save up to $625.<\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nTechCrunch Disrupt\u2019s Security Stage highlights the risks of spyware, government surveillance<\/br>
\n2023-06-22 22:03:01<\/br><\/p>\nMarietje Schaake: Stanford University International Policy Director<\/h2>\n
John Scott-Railton: University of Toronto Senior Researcher<\/h2>\n
Join us at the Security Stage<\/h2>\n