Menu

Skip to content
  • Home
  • List of all posts on this blog

Matthijs R. Koot's notebook

Personal blog. Hobbies: IT, security, privacy, democracy.

Reset The Net!

Posted on 2014-06-05 by mrkoot

Reset The Net!

  • Uncategorized

Post navigation

← Chairman of Dutch intel oversight to Dutch Senate: ‘I want to oversee ex ante (before the fact), not just ex post (afterwards)’
Citing increased threats, Dutch govt partially reverses budget cuts on intelligence & security service AIVD →

Leave a Reply Cancel reply

You must be logged in to post a comment.



Twitter: @mrkoot
LinkedIn: my profile
E-mail: koot at cyberwar dot nl
PGP key: 51F9 8FC9 C92A 1165 (verified via Keybase.io)

MSc in OS3 System & Network Engineering (2005-2006) and PhD in data anonymity (2007-2011) from University of Amsterdam.

Many posts on this blog are scraps of information, published for posterity and reference. Posts prior to Q2/2012 were submitted while I was employed at the University of Amsterdam.

Links

Critical thinking
  • Master List of Logical Fallacies
  • Taxonomy of Logical Fallacies
  • Your Logical Fallacy Is
  • Understanding Uncertainty
  • A Skeptical Manifesto
Other
  • The 20% Statistician (Daniël Lakens)
  • Adam Shostack
  • Albert Benschop (UvA)
  • Alessandro Acquisti's The Economics of Privacy
  • Amsterdam Platform for Privacy Research (UvA-APPR)
  • Archive of Privacy/Security/Hacking Videos
  • Arno Reuser's OSINT resources
  • Bits of Freedom
  • IEEE Cipher S&P Calendar
  • Cryptome
  • Cyber CoE (US Army)
  • DCAF
  • DefenceTalk
  • Didier Stevens
  • Electronic Frontier Foundation
  • Electrospaces (Peter Koop)
  • Eric Rescorla
  • Harvard National Security Journal
  • IEEE Information Theory Society
  • Inlichtingendiensten.nl
  • IntelNews.org
  • Intelligence & Information
  • Intelligence and National Security Alliance
  • Jaap-Henk Hoepman
  • Jeroen van der Ham
  • Jesus Oquendo
  • Krypt3ia
  • Light Blue Touchpaper
  • MIT OpenCourseWare
  • Netherlands Intelligence Studies Association (NISA)
  • Open & Free Tech Community
  • Pew Research Center
  • Privacy International
  • Privacy by Design
  • Signal Identification Guide
  • Richard Bejtlich
  • Ross Anderson's Economics and Security Resource Page
  • Simon Davies
  • Social Engineering
  • Sources And Methods
  • The Potomac Institute Cyber Center
  • Transparency International Defence
  • Video lectures of mathematics
  • contagio malware dump

Recent Posts

  • Dutch General Intelligence & Security Service (AIVD) disrupts activities of Russian intelligence officer targeting the International Criminal Court
  • EU Member States expel >120 Russian diplomats in an apparent coordinated effort to reduce Russian intelligence presence in the EU
  • Russian and Chinese services use LinkedIn to target & recruit persons to spy on Dutch companies, says General Intelligence & Security Service (AIVD)
  • Dutch govt expels two Russians using diplomatic cover to commit espionage on behalf of Russia’s civil foreign intelligence agency SVR; pursued information on AI, semiconductors & nano tech
  • Submarine communication cables and the Netherlands: translation of a letter from the Dutch state secretary of Economic Affairs and Climate Policy

Recent Comments

  • Germany’s data retention bill requires metadata to be kept in the country – TechGoor on Dutch telecom data retention law ruled invalid by court in The Hague
  • The foreign intel angle on Spygate: What probably didn’t happen, and what probably did – The Optimistic Conservative on June 15th 2014: Dutch Joint Sigint Cyber Unit (JSCU) officially started
  • Cryptome – My Blog on Dutch govt expels two Russians using diplomatic cover to commit espionage on behalf of Russia’s civil foreign intelligence agency SVR; pursued information on AI, semiconductors & nano tech
  • Resetting the privacy discussion - Kris Joseph on The many interpretations and perspectives of privacy
  • Por qué el proyecto de ley de propiedad intelectual amenaza a la industria tecnológica del Reino Unido on Full translation of the Dutch government’s statement on encryption

Archives

  • June 2022
  • April 2022
  • February 2022
  • December 2020
  • October 2020
  • June 2020
  • May 2020
  • April 2020
  • December 2019
  • September 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • November 2018
  • October 2018
  • September 2018
  • June 2018
  • October 2017
  • September 2017
  • June 2017
  • May 2017
  • April 2017
  • August 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
Powered by GovPress.