David Kaye: David is the Special Rapporteur to the United Nations Human Rights Council on the promotion and protection of the right to freedom of opinion and expression.  He detailed in a report for the council the need for Governments to be  proportionate when dealing with encryption and privacy as these have grave implications for individuals exercising their rights in expressing opinion freely.

Influential Cyber Security Heroes of 2015 Source: Google Image Search Patrick Leahy
Influential Cyber Security Heroes of 2015 Source: Google Image Search Patrick Leahy

U.S. Senator Patrick Leahy:  The Senator introduced the USA FREEDOM Act of 2015 that bans  bulk collection of U.S. metadata for security reasons and the bill was passed by the U.S. Congress and signed into Law by the U.S. President, Barack Obama in June 2015.

Jeremy
Influential Cyber Security Heroes of 2015 Source: Google Image Search Jeremy Scahill

Jeremy Scahill and Josh Begley: These two journalists exposed how Government spies stole huge numbers of encryption keys by hacking into the internal computer network of the world’s largest producer of SIM cards. This exposes the ability of the concerned Governments in monitoring the voice and text communications of millions of people using these SIM cards, without their consent or that of the service provider or their own Governments.

Moxie_Marlinspike
Influential Cyber Security Heroes of 2015 Source: Google Image Search Moxie Marlinspike

Moxie Marlinspike (& team): Moxie and his team is credited with developing Signal, TextSecure, and Redphone – free programs that  encrypt voice and messaging communications allowing individuals to securely communicate with one another.

Tim Cook
Influential Cyber Security Heroes of 2015 Source: Google Image Search Tim Cook

Tim Cook: The CEO of Apple has openly resisted Government and Court Orders to provide access to encrypted iMessage communications. This ensured that Apple continues to protect its company’s data security practices with respect to customer communication.

Tom Watson
Influential Cyber Security Heroes of 2015 Source: Google Image Search Tom Watson
David Davis
Influential Cyber Security Heroes of 2015 Source: Google Image Search David Davis

David Davis and Tom Watson: Both are British Members of Parliment who proved that the UK’s Data Retention and Investigatory Powers Act was inconsistent with European Union law and required  internet and phone companies to retain communications data beyond that mandated.

Source: AccessNow.org

Source: Influential Cyber Security Heroes of 2015 Source: Google Image Search David Kaye

About The Author

"Founded in July, 2016, WhackHack.com is a cyber security blog that covers important security issues affecting common users, industry and governments. It aims to create awareness among its readers about malware, hacking, encryption, identity theft, privacy, etc and also offer solutions to protect themselves from such attacks"

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

4 × 2 =

Close