Tesi Di Diploma Di Mediatore Linguistico

Total Page:16

File Type:pdf, Size:1020Kb

Tesi Di Diploma Di Mediatore Linguistico ! SCUOLA SUPERIORE PER MEDIATORI LINGUISTICI (Decreto Ministero dell’Università 31/07/2003) Via P. S. Mancini, 2 – 00196 - Roma TESI DI DIPLOMA DI MEDIATORE LINGUISTICO (Curriculum Interprete e Traduttore) Equipollente ai Diplomi di Laurea rilasciati dalle Università al termine dei Corsi afferenti alla classe delle LAUREE UNIVERSITARIE IN SCIENZE DELLA MEDIAZIONE LINGUISTICA CASO SNOWDEN: IL DATAGATE RELATORI: CORRELATORI: Prof.ssa Bisirri Adriana Prof.re Farrell Paul Nicholas Prof.re Medina Delgado Carlos Alberto Prof.ssa Piemonte Claudia CANDIDATA: LUDOVICA MARTINO MATRICOLA: 2347 ANNO ACCADEMICO 2017/2018 1! A mia mamma, mio papà e mio fratello Tommaso che credono sempre in me e mi danno fiducia. Ad Alessia sorella e complice nelle difficoltà. Alle mie amiche di una vita Beatrice e Flavia, certezze inesauribili. A mia nonna Teresa luce della mia vita. Vi voglio bene. 2! 3! INDICE SEZIONE ITALIANA Introduzione…………………………………………………..………10 CAPITOLO I: Chi è Edward Snowden…………………………….…..13 CAPITOLO II: La NSA…………………………………………..……17 2.1 Il quarto emendamento……………………………………20 CAPITOLO III: Quali informazioni ha divulgato……………………..21 3.1 PRISM………………….……….…………………………22 3.1.1 Contenuti e metadati…………………………….25 3.2 Caso VERIZON……….……….…………………………..26 3.2.1 Patriot Act …………..…………………………..26 3.3 Boundless Informant….……………….…………………..27 3.4 Tempora……………….……………………………………28 3.4.1 Upstream………..……………………………….29 3.5 Xkeyscore………………………………………………….30 3.6 Blarney………..….………………………………………..31 CAPITOLO IV: Chi l’aveva già fatto prima di lui……………………..33 4.1 Wikileaks: Julian Assange….……………………………..33 4.2 Chelsea Manning………………………………………….35 CAPITOLO V: Come ha divulgato il materiale……………..…………37 5.1 Da “Cincinnatus” ad Edward Snowden.……..…………..38 4! 5.2 L’epilogo: fuga da Hong Kong……………..…………….44 5.3 Il GCHQ distrugge i documenti del “The Guardian….….47 5.4 David Miranda…………………………………………………48 CAPITOLO VI: Perché l’ha fatto…..………………….………………50 CAPITOLO VII: L’importanza della privacy……..…………………..54 CAPITOLO VIII: La crittografia come soluzione…………………….59 8.1 TOR, PGP, SIGNAL, WIRE, DUST, SILENT PHONE….…60 Conclusione……………………………………………………………63 SUMMARY ENGLISH SECTION Introduction……………………………….……………………………67 CHAPTER I: Who is Edward Snowden……..…………..…………68 CHAPTER II: The NSA…………………..………………..………71 2.1 The Fourth Amendment……………………………………72 CHAPTER III: What kind of information he disclosed…………….73 3.1 PRISM……….…………….………………………………73 3.1.1 Content and metadata…………………….….75 3.2 Verizon…….………………………………………………76 3.2.1 Patriotic Act……………………….…………76 3.3 Boundless informant………………………………..…….76 5! 3.4 Tempora………………………………………….……….77 3.4.1 Upstream……………………..………………77 3.5 Xkeyscore…….…………………………..………………78 3.6 Blarney…………………………………………..….……79 CHAPTER IV: Who had already done something similar.…………80 4.1 WikiLeaks: Julian Assange………………………………80 4.2 Chelsea Manning……….………………………..………81 CHAPTER V: How Snowden published the material………………83 5.1 From “Cincinnatus” to Edward Snowden………………83 5.2 Escape from Hong Kong……………………………..….87 CHAPTER VI: Why he did it………………………………………90 CHAPTER VII: The importance of privacy……..…………………92 CHAPTER VIII: Cryptography as a solution….….………………..94 8.1 TOR, PGP, SIGNAL, WIRE, DUST, SILENT PHONE.….94 Conclusion……..……..…………………………..……………………97 ÍNDICE SECCIÓN ESPAÑOLA Introducción…..……………………..………………………….…..100 CAPÍTULO I: Quién es Edward Snowden….………..……….101 6! CAPÍTULO II: La NSA……..…………….………………..…103 CAPÍTULO III: Qué información ha divulgado..……….….…104 3.1 Prism………….…..……………………………104 3.2 Verizon…………..………….………………….106 3.3 Boundless informant……..…….………………107 3.4 Tempora………………………………………..107 3.4.1 Upstream…………………………….108 3.5 Xkeyscore………………………………………108 3.6 Blarney…………………………………………109 CAPÍTULO IV: Quién ya había hecho algo similar….….……111 4.1 WikiLeaks: Julian Assange……………………..111 4.2 Chelsea Manning……………………………….112 CAPÍTULO V: Cómo divulgó el material……………………..113 5.1 De “Cincinnatus” a Edward Snowden…………113 5.2 Epílogo: fuga desde Hong Kong………………..116 CAPÍTULO VI: Por qué lo ha hecho…………………………..119 CAPÍTULO VII: La importancia de la privacidad…………….122 CAPÍTULO VIII: La criptografía como solución……………..124 8.1 TOR, PGP, SIGNAL, WIRE, DUST, SILENT PHONE……124 Conclusión…………………………………………..……………..127 7! Bibliografia…………………….…………………………………131 Sitografia………………………………………………………….135 Filmografia………………………………………………………..138 8! SEZIONE ITALIANA 9! INTRODUZIONE “Non voglio vivere in un mondo dove ogni cosa che dico, ogni cosa che faccio, ogni persona con cui parlo, ogni espressione di creatività, amore o amicizia viene registrata…” EDWARD SNOWDEN Inizialmente ho deciso di scrivere la mia tesi di laurea sul caso Snowden per pura curiosità nei confronti di questa storia estremamente affascinante. Poi, andando avanti con la scrittura, mi sono resa conto che nella mia mente lo scopo di fondo di questa analisi si stava trasformando. Oltre a voler raccontare appunto di quest’uomo coraggioso, il mio obbiettivo stava diventando trattare il tema della compromissione della privacy a livello mondiale e il senso etico che ha avuto quest’uomo nel compiere ciò che ha fatto. Il termine etica significa distinguere i comportamenti umani in buoni, giusti, leciti, rispetto ai comportamenti ritenuti ingiusti, illeciti, sconvenienti o cattivi secondo un ideale modello comportamentale. Attraverso queste parole in cui si può ritrovare il credo di Edward Snowden, la mia ricerca si è aperta ed è diventata molto più ampia. Le parole di George Orwell nel romanzo “1984” suonavano come una brutta profezia o un avvertimento. Ma a volte la finzione si mischia con la realtà. La storia è ambientata in un mondo, non troppo lontano, fondato sul totalitarismo dove le persone sono sorvegliate e le informazioni vengono distorte. Chi tenta di esprimere le sue idee in modo libero viene punito con lo “psicoreato” che consiste in una scomunica sociale dalle gravi conseguenze. Nell’era moderna assistiamo ad una scomparsa quasi totale della privacy: tutti i dati personali che cediamo, anche online, ad aziende, organizzazioni ed istituzioni non sono più al sicuro. Per non parlare del fatto che ci sono telecamere di sicurezza ad ogni angolo della strada. Lo Stato tramite 10! intercettazioni telefoniche, e-mail, chat, telefonate, geolocalizzazioni (anche se il cellulare risulta spento), transazioni bancarie, Telepass e l’utilizzo dei computer come microfoni ambientali può facilmente ricostruire le abitudini di una persona e le sue attività. Internet oggi è diventato il centro della nostra vita. Non riusciamo più a non servirci della tecnologia per espletare le nostre attività quotidiane. La rete è ormai un contenitore che ha al suo interno più informazioni sul nostro conto di quanto possiamo immaginare. La privacy dà appunto il diritto alle persone di scegliere a chi concedere e a chi non concedere il permesso di conoscere le cose più riservate della propria esistenza. Questa libertà dovrebbe rimanere essenziale per ogni cittadino. Ammettere di non avere nulla da nascondere è una menzogna, ognuno di noi richiede riservatezza nella sua sfera privata perché fa parte della natura umana. È anche vero che la svalutazione della privacy deriva da nuove abitudini sociali, evolute rispetto agli anni passati. Qualche tempo fa nessuno si sarebbe mai sognato di mettere le proprie informazioni riservate online, crearsi un blog o avere un seguito di milioni di utenti. Grazie ad alcuni informatori come Edward Snowden, che hanno portato alla luce illeciti governativi, si è innescato un dibattito contro i governi del mondo che si appropriano della privacy dei cittadini utilizzando come giustificazione la sicurezza nazionale. Questi informatori hanno agito in modo coraggioso, etico e umano denunciando gli illeciti del potere e accettando tutte le conseguenze penali, pur di togliersi dalla coscienza il peso di contribuire ad occultare le attività segrete dei governi. Se volessimo fare un paragone tra il libro di Orwell e il mondo odierno è questo: chi si ribella ad un potere più grande di lui, anche se questo potere fa più del male che del bene, si macchia dello “psicoreato” ovvero del “reato di opinione”. Il pensare liberamente o condividere pensieri proibiti con se stessi non è reato, lo diventa se si condivide ciò con il pubblico. In America è considerato alto tradimento. I diritti democratici spesso vengono messi da 11! parte per permettere alle agenzie di intelligence di operare, poiché sono svincolate da ogni tipo di controllo. La sorveglianza a tappeto inoltre è illegale e ha anche dei costi elevatissimi. Le agenzie di intelligence non amano avere i riflettori puntati contro. Il mio obbiettivo è far conoscere le rivelazioni di Edward Snowden a cui tutti noi dovremmo essere grati e creare uno spunto di riflessione sulla sicurezza nazionale e sul perché bisogna avere cura della propria privacy. 12! CAPITOLO I: CHI È EDWARD SNOWDEN Edward Joseph Snowden è nato il 21 giugno 1983. Cittadino americano patriottico e conservatore, cresciuto nel Maryland, figlio di impiegati del governo federale, decide di abbandonare gli studi tradizionali e dedicare la sua attenzione interamente ai computer: secondo lui Internet “era l’invenzione più importante di tutta la storia dell’umanità”1. Tramite i computer riesce a scambiare opinioni con persone che vivono in altri paesi, può confrontarsi su vari punti spaziando dalla politica fino ad argomenti di ogni tipo. Più avanti frequenta un corso di informatica e ottiene un titolo di studio equipollente al diploma di scuola superiore (GED). Senza una laurea e senza aver completato gli studi liceali, decide di intraprendere
Recommended publications
  • Case 1:13-Cv-03994-WHP Document 42-1 Filed 09/04/13 Page 1 of 15
    Case 1:13-cv-03994-WHP Document 42-1 Filed 09/04/13 Page 1 of 15 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK AMERICAN CIVIL LIBERTIES UNION; AMERICAN CIVIL LIBERTIES UNION FOUNDATION; NEW YORK CIVIL LIBERTIES UNION; and NEW YORK CIVIL LIBERTIES UNION FOUNDATION, Plaintiffs, v. No. 13-cv-03994 (WHP) JAMES R. CLAPPER, in his official capacity as Director of National Intelligence; KEITH B. ALEXANDER, in his ECF CASE official capacity as Director of the National Security Agency and Chief of the Central Security Service; CHARLES T. HAGEL, in his official capacity as Secretary of Defense; ERIC H. HOLDER, in his official capacity as Attorney General of the United States; and ROBERT S. MUELLER III, in his official capacity as Director of the Federal Bureau of Investigation, Defendants. BRIEF AMICI CURIAE OF THE REPORTERS COMMITTEE FOR FREEDOM OF THE PRESS AND 18 NEWS MEDIA ORGANIZATIONS IN SUPPORT OF PLAINTIFFS’ MOTION FOR A PRELIMINARY INJUNCTION Of counsel: Michael D. Steger Bruce D. Brown Counsel of Record Gregg P. Leslie Steger Krane LLP Rob Tricchinelli 1601 Broadway, 12th Floor The Reporters Committee New York, NY 10019 for Freedom of the Press (212) 736-6800 1101 Wilson Blvd., Suite 1100 [email protected] Arlington, VA 22209 (703) 807-2100 Case 1:13-cv-03994-WHP Document 42-1 Filed 09/04/13 Page 2 of 15 TABLE OF CONTENTS TABLE OF AUTHORITIES .......................................................................................................... ii STATEMENT OF INTEREST ....................................................................................................... 1 SUMMARY OF ARGUMENT…………………………………………………………………1 ARGUMENT……………………………………………………………………………………2 I. The integrity of a confidential reporter-source relationship is critical to producing good journalism, and mass telephone call tracking compromises that relationship to the detriment of the public interest……………………………………….2 A There is a long history of journalists breaking significant stories by relying on information from confidential sources…………………………….4 B.
    [Show full text]
  • A Public Accountability Defense for National Security Leakers and Whistleblowers
    A Public Accountability Defense For National Security Leakers and Whistleblowers The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, A Public Accountability Defense For National Security Leakers and Whistleblowers, 8 Harv. L. & Pol'y Rev. 281 (2014). Published Version http://www3.law.harvard.edu/journals/hlpr/files/2014/08/ HLP203.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:12786017 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP A Public Accountability Defense for National Security Leakers and Whistleblowers Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman be- gan to publish stories in The Guardian and The Washington Post based on arguably the most significant national security leak in American history.1 By leaking a large cache of classified documents to these reporters, Edward Snowden launched the most extensive public reassessment of surveillance practices by the American security establishment since the mid-1970s.2 Within six months, nineteen bills had been introduced in Congress to sub- stantially reform the National Security Agency’s (“NSA”) bulk collection program and its oversight process;3 a federal judge had held that one of the major disclosed programs violated the
    [Show full text]
  • A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985
    Description of document: A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985 Requested date: 15-June-2009 Released date: 03-February-2010 Posted date: 15-February-2010 Source of document: National Security Agency Attn: FOIA/PA Office (DJP4) 9800 Savage Road, Suite 6248 Ft. George G. Meade, MD 20755-6248 Fax: 443-479-3612 Online form: Here The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. A REFERENCE GUIDE TO SELECTED HISTORICAL DOCUMENTS RELATING TO THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1931-1985 (U) SOURCE DOCUMENTS IN Compiled by: CRYPTOLOGIC HISTORY Gerald K.
    [Show full text]
  • New Yorker Launches Online Anonymous Tip System 15 May 2013
    New Yorker launches online anonymous tip system 15 May 2013 will be open-source, and we are very glad to be the first to bring it out into the world, fully implemented." Swartz, an activist who committed suicide in January as he faced a potential prison sentence for breaking into a university research database, developed the system with Kevin Poulsen, a former hacker who is now an editor at Wired magazine. The New Yorker said the system was designed to avoid putting media organizations at the center of investigations of news leaks. "Readers and sources have long sent documents to the magazine and its reporters, from letters of complaint to classified papers," Davidson said. The New Yorker magazine is diplayed in an Upper East Side newstand in New York on October 9, 2012. The "But, over the years, it's also become easier to New Yorker magazine on Wednesday unveiled a new trace the senders... Strongbox addresses that; as online system for anonymous whistleblower tips, based it's set up, even we won't be able to figure out on technology developed by the late Internet activist where files sent to us come from. If anyone asks Aaron Swartz and a former hacker. us, we won't be able to tell them." The system aims to encourage the anonymous submission of newsworthy information, in the The New Yorker magazine on Wednesday manner of WikiLeaks and other Internet sites. unveiled a new online system for anonymous whistleblower tips, based on technology developed The Wall Street Journal set up its own tip system in by the late Internet activist Aaron Swartz and a May 2011 called SafeHouse.
    [Show full text]
  • The Lincoln Humanities Journal Panopticon: Surveillance
    LHJ The Lincoln Humanities Journal Fall 2016 | Volume 4 Panopticon: Surveillance, Suspicion, Fear Editor ABBES MAAZAOUI Annual publication of the College of Arts, Humanities and Social Sciences, Lincoln University of Pennsylvania. All rights reserved. ISSN 2474-7726 (print) ISSN 2474-7726 (online) 4 The Lincoln Humanities Journal (LHJ) The Lincoln Humanities Journal, ISSN 2474-7726 (print), ISSN 2474-7726 (online), is an interdisciplinary double blind peer-reviewed journal published once a year by the College of Arts, Humanities and Social Sciences of Lincoln University of Pennsylvania. Its main objective is to promote interdisciplinary studies by providing an intellectual platform for international scholars to exchange ideas and perspectives. Each volume is focused on a pre- selected theme in the fields of arts, humanities, the social sciences, and contemporary culture. Preference is given to topics of general interest that lend themselves to an interdisciplinary approach. Manuscripts should conform to the MLA style. Submissions may be made by e-mail to the editor at [email protected]. The preferred language is English. The journal is published both online and in print, in November-December of each year. Editor ABBES MAAZAOUI Lincoln University Editorial Board J. KENNETH VAN DOVER Lincoln University ERIK LIDDELL Eastern Kentucky University KIRSTEN C. KUNKLE Scholar & Opera Singer HÉDI JAOUAD Skidmore College EZRA S. ENGLING Eastern Kentucky University JEAN LEVASSEUR Bishop’s University, Canada The Lincoln Humanities Journal 5 TABLE
    [Show full text]
  • Anonymous Javascript Cryptography and Cover Traffic in Whistleblowing Applications
    DEGREE PROJECT IN COMPUTER SCIENCE AND ENGINEERING, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2016 Anonymous Javascript Cryptography and Cover Traffic in Whistleblowing Applications JOAKIM UDDHOLM KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF COMPUTER SCIENCE AND COMMUNICATION Anonymous Javascript Cryptography and Cover Traffic in Whistleblowing Applications JOAKIM HJALMARSSON UDDHOLM Master’s Thesis at NADA Supervisor: Sonja Buchegger, Daniel Bosk Examiner: Johan Håstad Abstract In recent years, whistleblowing has lead to big headlines around the world. This thesis looks at whistleblower systems, which are systems specifically created for whistleblowers to submit tips anonymously. The problem is how to engineer such a system as to maximize the anonymity for the whistleblower whilst at the same time remain usable. The thesis evaluates existing implementations for the whistle- blowing problem. Eleven Swedish newspapers are evaluated for potential threats against their whistleblowing service. I suggest a new system that tries to improve on existing sys- tems. New features includes the introduction of JavaScript cryp- tography to lessen the reliance of trust for a hosted server. Use of anonymous encryption and cover traffic to partially anonymize the recipient, size and timing metadata on submissions sent by the whistleblowers. I explore the implementations of these fea- tures and the viability to address threats against JavaScript in- tegrity by use of cover traffic. The results show that JavaScript encrypted submissions are viable. The tamper detection system can provide some integrity for the JavaScript client. Cover traffic for the initial submissions to the journalists was also shown to be feasible. However, cover traffic for replies sent back-and-forth between whistleblower and journalist consumed too much data transfer and was too slow to be useful.
    [Show full text]
  • Introduction to American Government Development of the News Business
    Development of the News Business The news media are the organizations that: •Gather • Package • Transmit the news through some proprietary communications Introduction to American Government technology. April 21, 2009 Developed primarily as private POLS 1101 business enterprises The University of Georgia uncontrolled by Prof. Anthony Madonna government. [email protected] Development of the News Business Early Papers • Colonial times. • Profit motive. – Publishing extremely expensive task. – High unit costs – the costs of transmitting a news product to each • But also suppliers of vital civic information. consumer. – Competition to increase audiences • Printing process. for their news. – Time-consuming, labor intensive – Mid-1770s approximately twenty-five weekly newspapers were serving the colonies. • However, the news media have undergone • Pamphlet -- most popular means of communicating. vast changes over time. – Thomas Paine’s Common Sense. – Durable, reusable. 1 Early Papers Early Papers • With the emergence of the Federalist and Democratic- Republican Parties in the 1790s, commercial concerns directed newspapers toward party politics. • Parties launched newspapers wherever they competed in order to advance their particular vision for the Republic. – Little objective reporting. – Required subsidies from parties to maintain themselves. – But also required audiences to justify the party’s support. Andrew Jackson’s administration (1829-1837). • Parties used these newspapers to: – Three journalists in his cabinet. – Advocate their platforms and candidates. – Jackson had close relationship with the editor of the Washington Globe. – Attack their opposition. •Gave Globe government printing contracts. • Appointed fifty-seven editors to patronage positions. – But changeable fortunes of parties in election years provided a poor foundation for building a business. The Rise of the Penny Press The Rise of the Penny Press • A larger audience was the main alternative to relying on a party subsidy.
    [Show full text]
  • How Much Is Too Much?
    LINCOLN MEMORIAL UNIVERSITY LAW REVIEW __________________________________ VOLUME 3 FALL 2015 _____________________________________ THE NSA’S EAVESDROPPING OPERATIONS AFTER THE SNOWDEN REVELATIONS: HOW MUCH IS TOO MUCH? JANUARY 2015 SYMPOSIUM TRANSCRIPT James Bamford MR. JACOB BAGGETT: I have the pleasure of introducing Mr. James Bamford as our first speaker. Mr. Bamford is an award-winning journalist in the field of national security. The New York Times calls him the nation's premier journalist on the subject of the NSA. And his most recent book, "The Shadow Factory", which is on sale outside by Union Avenue Books, was named by the Washington Post as one of the best books of the year. And he's here to discuss the transformation of the NSA since September 11th. Please welcome Mr. Bamford. (Applause) MR. JAMES BAMFORD: Thanks very much. It's really great being here. I want to thank Matt Lyon and Melanie Reid, Jacob Baggett, and Lauren Mullins for taking really great care of me. It's really great being here. The fact that this university is named after NSA AFTER SNOWDEN 116 President Lincoln is really quite an honor for me because I've always admired one of the things he's said. And that is the quote he has up here. I think if he had been President about a dozen years ago, we might not have gotten into the war in Iraq. If you read his quote there, "[k]ings had always been involving and impoverishing their people in wars, pretending generally, if not always, that the good of the people was the object."1 He was very much against attacking countries without getting congressional approval.
    [Show full text]
  • Media Diplomacy: the Negotiator's Dilemma
    Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1990-12 Media diplomacy: the negotiator's dilemma Howell, Abigail S. Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/27601 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA DTQ ===== MARO0, igzrm+ THESIS MEDIA DIPLOMACY: THE NEGOTIATOR'S DILEMMA BY ABIGAIL S. HOWELL DECEMBER 1990 Thesis Advisor: R. MITCHELL BROWN III Approved for public release; distribution is unlimited. 92-05046 92 2 26052'| ', SECURITY CLASSIFICATION OF THIS PAGE Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 la REPORT SECURITY CLASSIFICATION lb RESTRICTIVE MARKINGS UNCLASSIFIED 2a. SECURITY CLASSIFICATION AUTHORITY 3 DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; 2b. DECLASSIFICATION/DOWNGRADING SCHEDULE Distribution ig unlimiteA. 4. PERFORMING ORGANIZATION REPORT NUMBER(S) 5. MONITORING ORGANIZATION REPORT NUMBER(S) 6. NAME OF PERFORMING ORGANIZATION 6b OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION N~va' Postgraduate School I(If applicable) 38 Naval Postgraduate School 6c. ADDRESS (City, State, and ZIP Code) 7b ADDRESS (City, State, and ZIP Code) Monterey, CA 93943-5000 Monterey, CA 93943-5000 8a. NAME OF FUNDING/SPONSORING .. 8b. OFFICE SYMBOL 9 PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (If applicable) 8c. ADDRESS (City, State, and ZIP Code) 10 SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO NO NO ACCESSION NO 11. TITLE (Include Security Classification) MEDIA DIPLOMACY: THE NEGOTIATOR'S DILEMMA 12 PERSONAL AUTHOR(S) Howell, Abigail S. 13a TYPE OF REPORT 13b TIME COVERED 14 DATE OF REPORT (Year, Month, Day) 15 PAGE COUNT Master's Thesis I FROM TO December 1990 241 16 SUPPLEMENTARY NOTATION The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S.
    [Show full text]
  • Overview of Whistleblowing Software
    U4 Helpdesk Answer Overview of whistleblowing software Author: Matthew Jenkins, Transparency International, [email protected] Reviewers: Marie Terracol, Transparency International and Saul Mullard, U4 Anti-Corruption Resource Centre Date: 14 April 2020 The technical demands of setting up a secure and anonymous whistleblowing mechanism can seem daunting. Yet public sector organisations such as anti-corruption agencies do not need to develop their own system from scratch; there are a number of both open-source and proprietary providers of digital whistleblowing platforms that can be deployed by public agencies. This Helpdesk answer lays out the core principles and practical considerations for online reporting systems, as well as the chief digital threats they face and how various providers’ solutions respond to these threats. Overall, the paper has identified that open source solutions tend to offer the greatest security for whistleblowers themselves, while the propriety software on the market places greater emphasis on usability and integrated case management functionalities. Ultimately, organisations looking to adopt web-based whistleblowing systems should be mindful of the broader whistleblowing context, such as the legal protections for whistleblowers and the severity of physical and digital threats, as well as their own organisational capacity. U4 Anti-Corruption Helpdesk A free service for staff from U4 partner agencies Query Please provide an overview of the most common web-based whistleblower systems, exploring their respective advantages and disadvantages in terms of anonymity, security, accessibility, costs and so on. We are particularly interested in systems that would be appropriate for Anti-Corruption Agencies. Contents Main points 1. Background a. Advantages of digital reporting — Whistleblowing can act as a crucial systems check on human rights abuses, b.
    [Show full text]
  • Congress's Right to Counsel in Intelligence Oversight
    CLARK.DOCX (DO NOT DELETE) 4/25/2011 3:05 PM CONGRESS’S RIGHT TO COUNSEL IN INTELLIGENCE OVERSIGHT Kathleen Clark* This Article examines Congress’s ability to consult its lawyers and other expert staff in conducting oversight. For decades, congres- sional leaders have acquiesced in the executive branch’s insistence that certain intelligence information not be shared with congressional staffers, even those staffers who have high-level security clearances. As a result, Congress has been hobbled in its ability to understand and analyze key executive branch programs. This policy became par- ticularly controversial in connection with the Bush administration’s warrantless surveillance program. Senate Intelligence Committee Vice Chair Jay Rockefeller noted the “profound oversight issues” im- plicated by the surveillance program and lamented the fact that he felt constrained not to consult the committee’s staff, including its counsel. This Article puts this issue into the larger context of Congress’s right to access national security-related information and discusses congres- sional mechanisms for protecting the confidentiality of that informa- tion. The Article also provides a comprehensive history of congres- sional disclosures of national security-related information. History suggests that the foremost danger to confidentiality lies with disclo- sure to members of Congress, not to staff. The Article identifies sev- eral constitutional arguments for Congress’s right to share informa- tion with its lawyers and other expert staff, and explores
    [Show full text]
  • Timeline of US Govt. Surveillance & Spying
    The history of United States government domestic surveillance and spying is long. Over the years, the US government has launched covert and illegal projects whose purpose among other is to "expose, disrupt, misdirect, discredit, or otherwise neutralize" movements for justice and freedom. Launched in March 2008, the LAPD Suspicious Activity Reporting (SAR) – Special Order 1 and iWATCH “See Something, Say Something” Program is one such open assault on people’s privacy and freedom, done under the pretext of “national security and the war on terror”. 1798: Congress passes four laws which come to be known collectively as the Alien and Sedition Acts: o June 17, 1798: The Naturalization Act increases the amount of time necessary for immigrants to become naturalized citizens in the United States from five to fourteen years; 1 o June 24, 1798: The Alien Friends Act authorizes the president to deport any resident alien considered "dangerous to the peace and safety of the United States;”2 o July 5, 1798: The Alien Enemies Act authorizes the president to apprehend and deport resident aliens if their home countries are at war with the United States of America. This includes aliens who are not chargeable with actual hostility or other crime against the public safety;3 o July 13, 1798: The Sedition Act makes it a crime to "oppose any measure or measures of the government" as well as to publish "false, scandalous, and malicious writing" against the government or its officials. The Act is intended to stifle dissent.4 April 12, 1917: President Wilson persuades Congress to declare war on Germany and enter World War 1, but the American public is wary of the financial and military cost.
    [Show full text]