Speaking Freely: Lynn Hamadallah

There's been a lot of censorship for example on social media, which I've experienced myself when posting content in support of Palestine.
The argument put forward was that those cases represented instances of free speech rather than hate speech.
You know, even with social media - there is censorship.
That being said, I do think social media is making free speech more accessible, despite the censorship.
To the point where we've now had South Africa take Israel to trial at the International Court of Justice for genocide, using evidence from social media videos that went viral.
One is the issues around speech on social media platforms, and I've of course followed and worked on the Palestinian campaigns quite closely and I'm very aware of the BSR report.
Video content, specifically, that's found on social media being used in tribunals.
I guess what social media is doing is it's giving a voice to those who are often voiceless.
Mass media were so trusted, to the point where no one would have paid attention to these alternative viewpoints.
What social media has done I think it's made people become more aware or more critical of mass media and how it shapes public opinion.
Social media is providing a voice to more diverse people, elevating them and giving the public more control around narratives.
Now people all over the world are paying more attention and advocating for Sudanese and Congolese rights, thanks to social media.
I personally was raised with quite a critical view of mass media, I think in my family there was a general distrust of the West, their policies and their media, so I never really relied personally on the media as this beacon of truth, but I do think that's an exception.
I think the majority of people rely on mass media as their source of truth.
So social media plays an important role in keeping them accountable and diversifying narratives.
So I think on social media, again, it's very documented, but it's this kind of constant censorship.
There've been random strategies that have popped up to increase social media engagement, like posting random content unrelated to Palestine or creating Instagram polls for example.
The last strand I'd include, actually, that I already touched on, is the mass media.
I think it was really powerful when he was arguing the need to stop giving the West and mass media this power, and that we need to disempower them by ceasing to rely on them as beacons of truth, rather than working on changing them.
Instead, we need to turn to Palestinians, and to brave cultural workers, knowledge producers, academics, journalists, activists, and social media commentators who understand the meaning of oppression and view them as the passionate, angry and, most importantly, reliable narrators that they are.


This Cyber News was published on www.eff.org. Publication date: Tue, 16 Apr 2024 20:28:03 +0000


Cyber News related to Speaking Freely: Lynn Hamadallah

Speaking Freely: Lynn Hamadallah - There's been a lot of censorship for example on social media, which I've experienced myself when posting content in support of Palestine. The argument put forward was that those cases represented instances of free speech rather than hate speech. You ...
2 months ago Eff.org
Speaking Freely: Alison Macrina - In the US, I think about power that comes from, not just the government, but also rich individuals and how they use their money to influence things like free speech, as well as corporations. I think the best way that we can use our speech is using it ...
6 months ago Eff.org
#MIWIC2024: Illyana Mullins, Founder of WiTCH - Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. Overall I consider myself a community specialist when it comes to cyber ...
2 months ago Itsecurityguru.org
Black Basta ransomware made over $100 million from extortion - Russia-linked ransomware gang Black Basta has raked in at least $100 million in ransom payments from more than 90 victims since it first surfaced in April 2022, according to joint research from Corvus Insurance and Elliptic. Over 329 victims ...
7 months ago Bleepingcomputer.com
Feds seek attestation on secure software - The US federal government has released a software attestation form intended to ensure that software producers partnering with the government leverage minimum secure development techniques and tool sets. The form was announced March 11 by the ...
3 months ago Infoworld.com
Meta's 'Pay or Consent' Data Model Breaches EU Law - The EU Commission has informed Meta that its 'pay or consent' model breaches EU law as it does not allow users to freely consent to their personal data being collected for advertising purposes. The Commission's preliminary view is that the tech ...
3 days ago Infosecurity-magazine.com
Speaking Freely: Mohamed El Gohary - After majoring in Biomedical Engineering in October 2010, he switched careers to work as a Social Media manager for Al-Masry Al-Youm newspaper until October 2011, when he joined Global Voices contracts managing Lingua until the end of 2021. Free ...
1 month ago Eff.org
Bad bot traffic skyrockets across the web - Bad bots are automated programs designed with malicious intent to perform various activities on the internet, often causing harm to individuals, organizations, and online ecosystems. What makes them particularly dangerous is their ability to mimic ...
5 months ago Helpnetsecurity.com
Data broker's "staggering" sale of sensitive info exposed in unsealed FTC filing - One of the world's largest mobile data brokers, Kochava, has lost its battle to stop the Federal Trade Commission from revealing what the FTC has alleged is a disturbing, widespread pattern of unfair use and sale of sensitive data without consent ...
7 months ago Arstechnica.com
Week in review: Palo Alto Networks firewalls under attack, Microsoft patches two exploited zero-days - Strategies for secure identity management in hybrid environmentsIn this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments. Leveraging AI for ...
2 months ago Helpnetsecurity.com
Hackers use new IceBreaker malware to breach gaming companies - Hackers have been targeting online gaming and gambling companies with what appears to be a previously unseen backdoor that researchers have named IceBreaker. The compromise method relies on tricking customer service agents into opening malicious ...
1 year ago Bleepingcomputer.com
New Nevada Ransomware Targets Windows and VMware ESXi Systems - A relatively new ransomware operation known as Nevada is quickly growing in capabilities, targeting Windows and VMware ESXi systems. On December 10, 2022, Nevada ransomware was promoted on the RAMP darknet forums, inviting Russian and ...
1 year ago Bleepingcomputer.com
Toronto Public Library confirms data stolen in ransomware attack - The Toronto Public Library confirmed that the personal information of employees, customers, volunteers, and donors was stolen from a compromised file server during an October ransomware attack. According to TPL, the attackers stole "a large number of ...
7 months ago Bleepingcomputer.com
Arid Viper Campaign Targets Arabic-Speaking Users - Cybersecurity experts at Cisco Talos have exposed the latest operations of the espionage-driven Arid Viper advanced persistent threat group. The new campaign, active since April 2022, has been targeting Arabic-speaking Android users. According to an ...
7 months ago Infosecurity-magazine.com
SugarGh0st RAT Delivered via Malicious Windows & JavaScript - RATs allow threat actors to execute the following malicious actions while remaining hidden from the victim:-. Recently, cybersecurity researchers at Cisco Talos discovered a malicious campaign that was found to be delivering a new RAT that's been ...
7 months ago Cybersecuritynews.com
HTC Global Services confirms cyberattack after data leaked online - IT services and business consulting company HTC Global Services has confirmed that they suffered a cyberattack after the ALPHV ransomware gang began leaking screenshots of stolen data. HTC Global Services is a managed service provider offering ...
6 months ago Bleepingcomputer.com
Increased Cyber Regulation in the Offing As Attacks Mount - BLACK HAT EUROPE 2023 - London - Expect governments to impose greater levels of cybersecurity regulation if businesses cannot defend against major attacks and stop breaches from happening. That's a prediction from Black Hat founder Jeff Moss, ...
6 months ago Darkreading.com
Clorox says cyberattack caused $49 million in expenses - Clorox has confirmed that a September 2023 cyberattack has so far cost the company $49 million in expenses related to the response to the incident. Clorox is an American manufacturer of consumer and professional cleaning products with 8,700 employees ...
5 months ago Bleepingcomputer.com
Identity Hijack: The Next Generation of Identity Theft - Artificial intelligence is not a novel concept. ChatGPT's launch at the end of 2022 made AI technology widely available at a low cost, which in turn sparked a competition to develop more potent models among almost all of the mega-cap tech companies. ...
4 months ago Cysecurity.news
Android malware Grandoreiro returns after police disruption - In January 2024, an international law enforcement operation involving Brazil, Spain, Interpol, ESET, and Caixa Bank announced the disruption of the malware operation, which had been targeting Spanish-speaking countries since 2017 and caused $120 ...
1 month ago Bleepingcomputer.com
Banking malware Grandoreiro returns after police disruption - In January 2024, an international law enforcement operation involving Brazil, Spain, Interpol, ESET, and Caixa Bank announced the disruption of the malware operation, which had been targeting Spanish-speaking countries since 2017 and caused $120 ...
1 month ago Bleepingcomputer.com
Review: Top 5 For Outsourced Customer Service Solutions UK and Abroad - For companies that have too many phone calls and emails to keep up, it is very common to outsource your customer services, either domestically in the UK or abroad to the likes of India or The Philippines. An outsourced customer service firm can ...
6 days ago Itsecurityguru.org
Beijing fosters foreign influencers to spread its propaganda The Register - China is offering foreign influencers access to its vast market in return for content that sings its praises and helps to spreads Beijing's desired narratives more widely around the world, according to think tank the Australian Strategic Policy ...
7 months ago Theregister.com
CVE-2014-5918 - The Secret Circle - talk freely (aka com.easyxapp.secret) application 2.2.00.26 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted ...
9 years ago
CVE-2017-7915 - An Improper Restriction of Excessive Authentication Attempts issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 15082117 and previous versions, OnCell G3110-HSDPA Version 1.2 Build 09123015 and previous versions, OnCell G3150-HSDPA ...
4 years ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)