I hope you enjoyed reading my previous post, has it left you thinking about who should control our access to information?
Google? The government? Ourselves?
Feel free to comment, or if you have just found yourself reading this, please do not hesitate to take a look at my previous post:
In my next post, I will be exploring the strategies, tools and resources used by counter-terrorist actors, discussing the rationale behind one tested strategy in particular.
Watch this space!