Read about our current Projects
On 14 September 2020
On Monday the 14th of September, a consortium of international news outlets released reports of a leaked database from China's Zhenhua Data Information Technology Co. that included significant amounts of data pertaining to over 2.4 million people. The database included the details of prominent figures and their families from around the world including key national decision makers and the personal details of over 52,000 American, 35,000 Australian and nearly 10,000 British citizens.
With the rise of big data, the ubiquity of the internet and the exponential growth in computing power Governments and Business have quickly developed the capability to the use Big Data as a commodity or a Strategic Capability.
The aim of the Data Tyranny Project is to Counter totalitarian governments surveillance, storage and analysis of big data with the intent of political oppression and censorship.
The drive in market forces on the illegal data market is concerning.
The use of Big Data against the citizens the information is derived must not be used in their political oppression.
During the outbreak of COVID-19 Human Rights Activists facilitated multiple data leaks to OSI concerning the Wuhan Institute of Virology.
OSI is looking into these for future disclosure as they are in the public interest. We expect to make an announcement soon.
Of note the World Health Organization (WHO) has agreed to hold an inquiry into the global response to the coronavirus pandemic.
Gateway of Troy
Data Centers in developing economies are being exploited by Foreign Government interests. States in developing economies cannot defend their data due to the monopolization by global superpowers of the requisite skills, capital and intellectual property.
Our aim for the Gateway of Troy Project is to raise awareness of the issues developing economies face and to support them to build capability to secure their citizen's data. This will protect vulnerable data and personal information. Already the African Union and Papua New Guinea have fallen victim to this exploitation by trading cyber security for infrastructure costs in building their national data centers.