Wikileaks Ante El Derecho Estadounidense: ¿Delincuencia Informática, Espionaje O Ejercicio Legítimo De La Libertad De Expresión Y De Prensa?

Total Page:16

File Type:pdf, Size:1020Kb

Wikileaks Ante El Derecho Estadounidense: ¿Delincuencia Informática, Espionaje O Ejercicio Legítimo De La Libertad De Expresión Y De Prensa? WIKILEAKS ANTE EL DERECHO ESTADOUNIDENSE: ¿DELINCUENCIA INFORMÁTICA, ESPIONAJE O EJERCICIO LEGÍTIMO DE LA LIBERTAD DE EXPRESIÓN Y DE PRENSA? Memoria de prueba para optar al grado de Licenciado en Ciencias Jurídicas y Sociales FELIPE GONZALO CAMPOS ARLEGUI Profesor Guía Dr. Salvador Andrés Millaleo Hernández Santiago de Chile 2014 2 3 4 A mi familia, pero por sobretodo y por siempre a mi madre. 5 6 TABLA DE CONTENIDOS DEDICATORIA…………………………………………………………………………………….Página 5 TABLA DE CONTENIDOS………………………………………………………………………………...7 INTRODUCCIÓN………………………………….………………………………………………...........12 CAPÍTULO I………………………………………………………………………………………………..15 ¿QUÉ ES UN SITIO WIKI ? ¿QUÉ ES EL LEAKING ? ¿QUIÉN ES EL FUNDADOR Y LOS PRINCIPALES COLABORADORES DE WIKILEAKS ? ¿CUÁL ES SU BASE TECNOLÓGICA? ¿CUÁLES SON SUS PRIMERAS FILTRACIONES? I.1. ¿QUÉ ES UN SITIO WIKI ?..........................................................................................................15 I.1.1. Los primeros Wiki………...…… ……………………….. ……………………………………….15 I.1.1.1. WikiWikiWeb …………………………………………………………………………………..15 I.1.1.2. Wikipedia ……………………………………………………………………………………...16 I.1.2. ¿Cuáles son los elementos esenciales de un Wiki ?.......................................................17 I.1.2.1. Autoría colectiva……………………………………………………………………………...17 I.1.2.2. Limitado uso del HTML y uso de una estructura hipertextual…………………………...17 I.1.2.3. Flexibilidad………………………………………………………………………………….....18 I.1.2.4. Están libres de ego, libres de tiempo y nunca acabados………………………………..18 I.1.3. ¿Qué otro elemento diferenciador no esencial hay en un Wiki ? ..................................18 I.1.4. ¿Cuál es nuestro concepto de Wiki ?................................................................................20 I.1.4.1. Concepto del fundador de WikiWikiWeb…………………………………………………..21 I.1.4.2. Concepto del Oxford English Dictionary …………………………………………………...21 I.1.4.3. Concepto de Oxforddictionaries.com/……………………………………………………... 21 I.1.4.4. Nuestro concepto…………………………………………………………………...………..21 I.2. ¿QUÉ ES EL LEAKING ?.............................................................................................................22 I.2.1 Precedentes. Los Pentagon Papers y Cryptome.org ……………………………………….22 I.2.1.1. El precedente histórico. Los Pentagon papers ……………………………………………23 I.2.1.1.a. El informe………………………………………………………………………………..24 I.2.1.1.b. La filtración………………………………………………………………………………25 I.2.1.1.c. La respuesta del gobierno. …………………………………………………………....26 I.2.1.1.d. El escándalo Watergate . ……………………………………………………………...27 I.2.1.2. El precedente tecnológico . Cryptome.org ………………………………………………….27 I.2.1.1.a. La filtración en Agosto de 2000 de un informe de la CIA de 1998………………..28 I.2.1.2.b. La filtración de la “guía espía” de Microsoft………………………………………….28 I.2.2. ¿Cuáles son los elementos esenciales de un Leaking ?.................................................29 I.2.2.1. La información y el productor de la información. …………………………………………29 I.2.2.2. La fuente. ……………………………………………………………………………………..29 I.2.2.3. La publicación…..……………………………………………………………………….……30 I.2.2.4. La audiencia. …………………………………………………………………………………31 I.2.3. ¿Cuál es nuestro concepto de Leaking ?..........................................................................31 I.2.3.1. Concepto de Oxforddictionaries.com/…………………………………………………….. .31 I.2.3.2. Concepto de C ollinsdictionary.com/……………………………………………………….. 31 I.2.3.3. Nuestro Concepto de Leaking. ……………………………………………………………..31 7 I.3. ¿CÓMO SE ORIGINA Y ESTRUCTURA WIKILEAKS ?..............................................................32 I.3.1. Su contexto. La web 2.0………………………………………………………………………….32 I.3.1.1. ¿Qué es la web 1.0? ………………………………………………………………………...32 I.3.1.2. ¿Qué es la web 2.0? ………………………………………………………………………...33 I.3.2. ¿Quién crea WikiLeaks y quiénes son sus principales colaboradores?......................35 I.3.2.1. Julian Assange es su fundador……………………………………………………………..35 I.3.2.2. Daniel Domscheit-Berg. Su principal colaborador………………………………………..43 I.3.2.3. Kristinn Hrafnson, el actual portavoz……………………………………………………….44 I.3.2.4. Birgitta Jónsdóttir……………………………………………………………………………..44 I.3.2.5. Otros colaboradores………………………………………………………………………….45 I.3.3. ¿Cuál es la base tecnológica de WikiLeaks ?...................................................................47 I.3.3.1. Los portátiles y la comunicación interna…………………………………………………..47 I.3.3.2. Los servidores………………………………………………………………………………..48 I.3.3.3. El proveedor………………………………………………………………………………….48 I.3.3.4. Los sistemas de encriptación. ……………………………………………………………..49 I.3.4. ¿Cómo se financió?............................................................................................................51 I.3.5. ¿Cuáles son los primeros pasos de WikiLeaks y sus primeras filtraciones?..............51 I.3.5.1. La primera publicación: La Unión de Cortes de Somalia………………………………...52 I.3.5.2. La revelación de la corrupción del ex líder keniano Daniel Arap Moi…………………..54 I.3.5.3. La publicación del manual del centro de detención de Guantánamo…………………..55 I.3.5.4. La filtración sobre la sucursal del banco suizo Julius Bär en Islas Caimán……………56 I.3.5.5. La filtración sobre los grandes deudores del banco islandés Kaupthing ………………59 I.3.5.6. Premio de la Prensa de Amnistía Internacional…………………………………………..59 CAPÍTULO II……………………………………………………………………………………………….60 ¿CUÁLES SON LAS FUGAS MÁS IMPORTANTES DE WIKILEAKS ? ¿CUÁL ES LA RELACIÓN ENTRE WIKILEAKS Y LOS MEDIOS DOMINANTES? ¿CUÁL HA SIDO LA REACCIÓN DEL GOBIERNO DE EE.UU.? II.1. ¿CUÁLES SON LAS FUGAS MÁS IMPORTANTES DE WIKILEAKS?....................................60 II.1.1. Abril de 2010: El video Collateral Murder ……………………………………………………60 II.1.1.1. La información y el productor de la información. ………………………………………..60 II.1.1.2. La fuente. …………………………………………………………………………………….69 II.1.1.3. El editor. ……………………………………………………………………...………………72 II.1.1.4. La audiencia. ………………………………………………………………………...………73 II.1.1.5. ¿Por qué es importante? …………………………………………………………………...73 II.1.2. Julio de 2010: Los Afghan War Diaries ………………………………………………….….74 II.1.2.1. La información y el productor de la información. ………………………………………..74 II.1.2.2. La fuente..………………………………………… …………………………………………79 II.1.2.3. El editor..……………………… …………………………………………………………… 80 II.1.2.4. La audiencia. ………………………………… …………………………………………… 81 II.1.2.5. ¿Por qué es importante?.…………………………………………………………………81 II.1.3. Octubre de 2010: Los documentos de Iraq War Logs …….……………………………….81 II.1.3.1. La información y el productor de la información. ……………………..…………………81 II.1.3.2. La fuente..…………………………………………………………………………………….84 II.1.3.3. El editor……………………………………………………………………………………….84 II.1.3.4. La audiencia. ………………………………………………………………………………85 II.1.3.5. ¿Por qué es importante?.…………………………… …………………………………… 85 II.1.4. Noviembre de 2010. La mayor filtración de la historia. El Cablegate…………………..86 II.1.4.1. La información y el productor de la información….………………………………………86 8 II.1.4.2. La fuente..…………………………………………………………………………………….93 II.1.4.3. El editor.………………………………………………………………………………………93 II.1.4.4. La audiencia….………………………………………………………………………………94 II.1.4.5. ¿Por qué es importante?.. ………………………………………………………………....94 II.2. ¿CUÁL ES LA RELACIÓN ENTRE WIKILEAKS Y LOS MEDIOS DOMINANTES?…………96 II.2.1. ¿Cuáles son los medios dominantes?............................................................................96 II.2.1.1. The New York Times . ……………………………………………………………………….97 II.2.1.2. The Guardian . ……………………………………………..…………………………………97 II.2.1.3. El País de España..………………………………………………………………………… 98 II.2.1.4. Der Spiegel ...…………………………………………………………………………………99 II.2.1.5. Le Monde . ……………………………………………………………………………………99 II.2.2. ¿Por qué WikiLeaks decide cooperar con ellos en 2010?.............................................99 II.2.2.1. Capacidad…………………………………………………………………………...........100 II.2.2.2. Protección. ………………………………………………………………………………….100 II.2.2.3. Impacto. …………………………………………………………………………………….101 II.2.3. ¿Por qué los medios dominantes cooperaron con WikiLeaks ?.................................101 II.2.4. ¿Cómo se dio esta relación?..........................................................................................102 II.2.5. ¿Cómo determinaron que los documentos no eran falsos?.......................................107 II.2.5.1. En las publicaciones previas a las grandes filtraciones de 2010. ……………………107 II.2.5.2. En las grandes filtraciones. ……………………………………………………………….109 II.2.6. ¿Hubo criterios de edición para prevenir daños?........................................................109 II.3. ¿CUÁLES HAN SIDO LAS REACCIONES DE HECHO DE LA AUTORIDAD POLÍTICA?....120 II.3.1. ¿Cuál ha sido su reacción material?.............................................................................121 II.3.1.1. Respuesta Física……………………………..…………………………………………….121 II.3.1.2. Respuesta Tecnológica……………………………………………………………………123 II.3.1.3. Respuesta Mediática…..…………………………………………………………………..126 CAPÍTULO III…………………………………………………………………………………………….132 ¿CUÁL HA SIDO LA REACCIÓN JURÍDICA DE LA AUTORIDAD POLÍTICA? ¿QUÉ DECISIONES HA TOMADO LA JURISPRUDENCIA ESTADOUNIDENSE? ¿QUE PREGUNTAS SE HA HECHO LA DOCTRINA? III.1. ¿CUÁL HA SIDO LA REACCIÓN JURÍDICA DE LA AUTORIDAD POLÍTICA?....................132 III.2. LA LEY ESTADOUNIDENSE...................................................................................................136 III.2.1. Tratados Multilaterales firmados por Estados Unidos……………………………………..136 III.2.1.1. Convención Americana sobre Derechos Humanos……………………………………137 III.2.2. La Primera Enmienda
Recommended publications
  • Anti-Zionism and Antisemitism Cosmopolitan Reflections
    Anti-Zionism and Antisemitism Cosmopolitan Reflections David Hirsh Department of Sociology, Goldsmiths, University of London, New Cross, London SE14 6NW, UK The Working Papers Series is intended to initiate discussion, debate and discourse on a wide variety of issues as it pertains to the analysis of antisemitism, and to further the study of this subject matter. Please feel free to submit papers to the ISGAP working paper series. Contact the ISGAP Coordinator or the Editor of the Working Paper Series, Charles Asher Small. Working Paper Hirsh 2007 ISSN: 1940-610X © Institute for the Study of Global Antisemitism and Policy ISGAP 165 East 56th Street, Second floor New York, NY 10022 United States Office Telephone: 212-230-1840 www.isgap.org ABSTRACT This paper aims to disentangle the difficult relationship between anti-Zionism and antisemitism. On one side, antisemitism appears as a pressing contemporary problem, intimately connected to an intensification of hostility to Israel. Opposing accounts downplay the fact of antisemitism and tend to treat the charge as an instrumental attempt to de-legitimize criticism of Israel. I address the central relationship both conceptually and through a number of empirical case studies which lie in the disputed territory between criticism and demonization. The paper focuses on current debates in the British public sphere and in particular on the campaign to boycott Israeli academia. Sociologically the paper seeks to develop a cosmopolitan framework to confront the methodological nationalism of both Zionism and anti-Zionism. It does not assume that exaggerated hostility to Israel is caused by underlying antisemitism but it explores the possibility that antisemitism may be an effect even of some antiracist forms of anti- Zionism.
    [Show full text]
  • As Assange Awaits Ruling, Wikileaks Faces Its Fate 1 November 2011, by RAPHAEL G
    As Assange awaits ruling, WikiLeaks faces its fate 1 November 2011, By RAPHAEL G. SATTTER , Associated Press Harvard University's Belfer Center for Science and International Affairs. Legal analysts were predicting a ruling in favor of extradition. "Very, very few people defeat a European Arrest Warrant," said Julian Knowles, an extradition lawyer at London's Matrix Chambers who has been following the case. "The courts in England generally lean in favor of extradition." Assange may have the right to challenge an This is a Monday, Feb. 7, 2011 file photo of WikiLeaks unfavorable verdict in Britain's Supreme Court. But founder Julian Assange as he leaves Belmarsh Magistrates' Court in London. Assange on Tuesday Nov. Knowles said that if he were denied leave to 1, 2011 awaits a judge's extradition verdict, it could be appeal, it could be only days before he were sent to WikiLeaks' very future that's at stake. Its finances under Scandinavia to face allegations of sex crimes. pressure and some of its biggest revelations already public, WikiLeaks may not have the strength to survive if That result could be devastating for WikiLeaks. Britain's High Court judge decides Wednesday in favor of a Swedish request to extradite Assange to face trial For much of the past year Assange has been over rape allegations, some experts argue. (AP running the website from a supporter's country Photo/Kirsty Wigglesworth, File) manor in eastern England, where the terms of his bail have confined him to virtual house arrest. The 40-year-old Australian says he has 20 staff (AP) -- As Julian Assange awaits a judge's members, but it's unclear who might take over were extradition verdict, it could be WikiLeaks' very he jailed.
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • Considering the Planks of U.S. International Cyber Policy, 2005-2011
    JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY FROM TUNIS TO TUNIS: CONSIDERING THE PLANKS OF U.S. INTERNATIONAL CYBER POLICY, 2005–2011 BY CHRISTOPHER BRONK, PH.D. FELLOW IN INFORMATION TECHNOLOGY POLICY JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY MAY 21, 2012 Considering the Planks of U.S. International Cyber Policy THESE PAPERS WERE WRITTEN BY A RESEARCHER (OR RESEARCHERS) WHO PARTICIPATED IN A BAKER INSTITUTE RESEARCH PROJECT. WHEREVER FEASIBLE, THESE PAPERS ARE REVIEWED BY OUTSIDE EXPERTS BEFORE THEY ARE RELEASED. HOWEVER, THE RESEARCH AND VIEWS EXPRESSED IN THESE PAPERS ARE THOSE OF THE INDIVIDUAL RESEARCHER(S), AND DO NOT NECESSARILY REPRESENT THE VIEWS OF THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY. © 2012 BY THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY OF RICE UNIVERSITY THIS MATERIAL MAY BE QUOTED OR REPRODUCED WITHOUT PRIOR PERMISSION, PROVIDED APPROPRIATE CREDIT IS GIVEN TO THE AUTHOR AND THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY. 2 Considering the Planks of U.S. International Cyber Policy Abstract How have U.S. policies on the governance of the Internet and cyberspace evolved between the 2005 World Summit of the Information Society (WSIS) in Tunisia and the massive, cyber-fueled uprisings in the Middle East of 2011? The paper develops a framework of possible actions regarding Internet or cyber governance to produce contexts for the timeline of significant policy statements by U.S. government officials and agencies on the topic. In the resulting narrative, Internet governance policy rises from a relatively marginal issue for the foreign policy establishment to a significant component of U.S.
    [Show full text]
  • Galilee Flowers
    GALILEE FLOWERS The Collected Essays of Israel Shamir Israel Adam Shamir GALILEE FLOWERS CONTENTS INTRODUCTION........................................................................................................................... 5 WHY I SUPPORT THE RETURN OF PALESTINIANS.................................................................... 6 PART ONE....................................................................................................................................... 8 THE STATE OF MIND ................................................................................................................. 8 OLIVES OF ABOUD.................................................................................................................... 21 THE GREEN RAIN OF YASSOUF................................................................................................ 23 ODE TO FARRIS ........................................................................................................................ 34 THE BATTLE FOR PALESTINE.................................................................................................. 39 THE CITY OF THE MOON ......................................................................................................... 42 JOSEPH REVISITED................................................................................................................... 46 CORNERSTONE OF VIOLENCE.................................................................................................. 50 THE BARON’S BRAID...............................................................................................................
    [Show full text]
  • Oliveira, Caio Augusto Guimarães De. Das Ameaças Securitizadas O Caso
    UNIVERSIDADE FEDERAL DO PAMPA CAMPUS SANTANA DO LIVRAMENTO BACHARELADO EM RELAÇÕES INTERNACIONAIS CAIO AUGUSTO GUIMARÃES DE OLIVEIRA DAS AMEAÇAS SECURITIZADAS: O CASO DA WIKILEAKS Santana do Livramento 2016 CAIO AUGUSTO GUIMARÃES DE OLIVEIRA DAS AMEAÇAS SECURITIZADAS: O CASO DA WIKILEAKS Trabalho de Conclusão de Curso apresentado como requisito parcial para obtenção do grau de Bacharel em Relações Internacionais pela Universidade Federal do Pampa- UNIPAMPA. Orientador: Prof. Dr. Renato José da Costa Santana do Livramento 2016 Catalogação da Publicação Serviço de Documentação Universidade Federal do Pampa - Unipampa Oliveira, Caio Augusto Guimarães de. Das ameaças securitizadas: o caso da Wikileaks/ Caio Augusto Guimarães de Oliveira. – Santana do Livramento: Universidade Federal do Pampa, 2016. xii, 88 f. : 3 il. : 29,7 cm. Orientador: Renato José da Costa Monografia (graduação) – Universidade Federal do Pampa, Unipampa, Bacharelado em Relações Internacionais, 2016. 1. Wikileaks. 2. Segurança Internacional. 3. Securitização. 4. Julian Assange. 5. Mudança Social. – Monografia. I. Costa, Renato José da. II. Universidade Federal do Pampa, Campus Santana do Livramento, Curso de Relações Internacionais, 2016. III. Das ameaças securitizadas: o caso da Wikileaks. CDD: 327.172 CAIO AUGUSTO GUIMARÃES DE OLIVEIRA DAS AMEAÇAS SECURITIZADAS: O CASO DA WIKILEAKS Trabalho de Conclusão de Curso apresentado como requisito parcial para obtenção do grau de Bacharel em Relações Internacionais pela Universidade Federal do Pampa- UNIPAMPA. Trabalho de Conclusão de Curso defendido e aprovado em: ___/___/_____. Banca examinadora ________________________________________________________________ Prof. Dr. Renato José da Costa Orientador (UNIPAMPA) ________________________________________________________________ Prof. Dr. Flávio Augusto Lira Nascimento (UNIPAMPA) ________________________________________________________________ Prof. Dr. Antonio José Guimarães Brito (UNIPAMPA) A todos que buscam e buscaram a verdade.
    [Show full text]
  • Rudolf Elmer [Address] RECIPIENT High Court of Zurich Hirschgraben
    Rudolf Elmer [address] RECIPIENT High Court of Zurich Hirschgraben 13/15 8021 Zurich 26th March 2013 Business-No. SB110200-0/K11 As a defendant I have the legal right to a fair trial and to review all documentary evidence of my case. Reviewing the psychiatric report of the psychologist Dr. Kiesewetter (Forensic Psychiatrist of the Court of Zurich), various clarifications from my part are required and particularly related to what the prosecutor accuses me in her indictment titled "Threats etc" of 19 January 2011. Rudolf Elmer, 1 November 1955, Certified Public Accountant, [address] Dear Mr. President of the High Court P. Marti, Dear speakers and judges R. Naef and E. Leuenberger, I refer to the conclusion of Chief Justice P. Marti, dating 20 February 2013 that there is currently no reason to perform additional investigations related to the response of Dr. Kiesewetter. Due to the response from Dr. Kiesewetter I have noticed more inconsistencies and facts regarding the untrue statement that "[My] mother should have stated that my grandfather committed suicide" in Dr. Kiesewetter’s lengthy report. Dr. Kiesewetter’s response of 18 February 2013 reiterated my claim "to have access to all original documents of the police in order to identify their author." It is to be clarified and made known who is the author and the source of the defamatory statement that "[my] grandfather committed suicide" and by whom and on what occasion my mother was questioned when she presumably should have made that statement. 1. Dr. Kiesewetter’s (forensic psychiatrist) report With apology from Dr. Kiesewetter I would like to say that it irritates one already if an expert's mistake (for example by giving me the name of Robert instead Rudolf Elmer) in his evaluation is rejected on the secretary who performed the final editing of the 117 pages analysis and conclusion.
    [Show full text]
  • ENSAIOS DO IEEI Número 20 EL CASO WIKILEAKS: UNA VISIÓN
    ENSAIOS DO IEEI Número 20 EL CASO WIKILEAKS: UNA VISIÓN RETROSPECTIVA Y ALGUNOS DATOS SOBRE SUS CONSECUENCIAS EN MÉXICO BERENICE FERNÁNDEZ NIETO São Paulo, dezembro de 2013 ENSAIOS DO IEEI Publicação que objetiva divulgar os resultados dos estudos realizados no Instituto de Estudos Econômicos e Internacionais. O Instituto de Estudos Econômicos e Internacionais (IEEI-UNESP) é um Conselho Editorial centro multidisciplinar de análises e Andrés Serbin (CRIES/Argentina) pesquisas sobre as questões econômicas Carlos E. Lins da Silva (IEEI-UNESP) e internacionais, congregando Carlos Oliva Campos (UH/Cuba) especialistas de diversas áreas para Clodoaldo Bueno (IEEI-UNESP) promover e enriquecer o debate dessas Feliciano Garcia Aguirre (UV/México) questões, produzir e divulgar trabalhos e Gary Prevost (Stjohns/EUA) promover parcerias com entidades Harry Vanden (USF/EUA) públicas e privadas nas diversas Lenina Pomeranz (USP e IEEI-UNESP) atividades pertinentes ao seu objeto de Luis Fernando Ayerbe (IEEI-UNESP) atuação. Marcos Cordeiro (IEEI-UNESP) URL: http://www.ieei-unesp.com.br Marta Loza (UDG/México) Sandra Colombo (UNICEN/Argentina) Tullo Vigevani (IEEI-UNESP) As opiniões divulgadas nesta publicação são de inteira responsabilidade de seu(s) autor(es). É permitida a reprodução, desde que seja citada a fonte. ISSN 2176-8773 2 ENSAIOS DO IEEI Número 20 EL CASO WIKILEAKS: UNA VISIÓN RETROSPECTIVA Y ALGUNOS DATOS SOBRE SUS CONSECUENCIAS EN MÉXICO 1 BERENICE FERNÁNDEZ NIETO2 1 Agradezco al Centro de Investigaciones sobre América del Norte de la UNAM,
    [Show full text]
  • The Revisionist Clarion Oooooooooooooooooooooooooo
    THE REVISIONIST CLARION OOOOOOOOOOOOOOOOOOOOOOOOOO QUARTERLY NEWSLETTER ABOUT HISTORICAL REVISIONISM AND THE CRISIS OF IMPERIAL POWERS oooooooooooooooooooooooooooooooo TOWARDS THE DESTRUCTION OF ISRAEL AND THE ROLLING BACK OF USA ooooooooooooooooo Issue Nr. 23 Spring-Summer 2007 <revclar -at- yahoo.com.au> < http://revurevi.net > alternative archives http://vho.org/aaargh/engl/engl.html http://aaargh.com.mx/engl/engl.html ooooooooooooooooooooooooooooo Ahmadinejad President Mahmoud Ahmadinejad here Monday expressed surprise over the European Union's biased approach to the historical event of holocaust. The statement was made in an exclusive interview with the Spanish television broadcast, in response to the question about holocaust. "I just raised two questions on the issue. Does EU consider questions as a crime. Today, anywhere in the world, one can raise questions about God, prophets, existence and any other issue. "Why historical events should not be clarified?" asked the chief executive. Turning to his first question, he said, "If a historical event has taken place, why do you not allow research to be conducted on it. What is the mystery behind it, given that even fresh research is conducted on definite rules of mathematics and physics.?" Ahmadinejad referred to his first question, "If such an event has actually taken place, where did it happen? Why should the Palestinian people become homeless (because of this)? "Why should Palestinian children, women and mothers be killed on streets every day for 60 years?" The president said that these innocent people losing their lives had no role in World War II. "All of them had been killed in Europe and Palestinian people were not involved in it," he added.
    [Show full text]
  • Benghazi.Pdf
    ! 1! The Benghazi Hoax By David Brock, Ari Rabin-Havt and Media Matters for America ! 2! The Hoaxsters Senator Kelly Ayotte, R-NH Eric Bolling, Host, Fox News Channel Ambassador John Bolton, Fox News Contributor, Foreign Policy Advisor Romney/Ryan 2012 Gretchen Carlson, Host, Fox News Channel Representative Jason Chaffetz, R-UT Lanhee Chen, Foreign Policy Advisor, Romney/Ryan 2012 Joseph diGenova, Attorney Steve Doocy, Host, Fox News Channel Senator Lindsay Graham, R-SC Sean Hannity, Host, Fox News Channel Representative Darrell Issa, R-CA, Chairman, House Committee on Oversight and Government Reform Brian Kilmeade, Host, Fox News Channel Senator John McCain, R-AZ Mitt Romney, Former Governor of Massachusetts, 2012 Republican Presidential Nominee Stuart Stevens, Senior Advisor, Romney/Ryan 2012 Victoria Toensing, Attorney Ambassador Richard Williamson, Foreign Policy Advisor, Romney/Ryan 2012 ! 3! Introduction: Romney’s Dilemma Mitt Romney woke up on the morning of September 11, 2012, with big hopes for this day – that he’d stop the slow slide of his campaign for the presidency. The political conventions were in his rear-view mirror, and the Republican nominee for the White House was trailing President Obama in most major polls. In an ABC News/Washington Post poll released at the start of the week, the former Massachusetts governor’s previous 1-point lead had flipped to a 6-point deficit.1 “Mr. Obama almost certainly had the more successful convention than Mr. Romney,” wrote Nate Silver, the polling guru and then-New York Times blogger.2 While the incumbent’s gathering in Charlotte was marked by party unity and rousing testimonials from Obama’s wife, Michelle, and former President Bill Clinton, Romney’s confab in Tampa had fallen flat.
    [Show full text]
  • TESIS: El Fenómeno Informativo Wikileaks: Caso Carlos Pascual
    Universidad Nacional Autónoma de México Programa de posgrado en Ciencias Políticas y Sociales Facultad de Ciencias Políticas y Sociales Instituto de Investigaciones Sociales Centro de Investigaciones sobre América del Norte Centro Regional de Investigaciones Multidisciplinarias Facultad de Estudios Superiores de Acatlán El fenómeno informativo WikiLeaks: Caso Carlos Pascual Tesis que para optar por el grado de Maestría en Comunicación Presenta: Guadalupe Isabel Uriostegui Carlos Directora de Tesis: Dra. Eva Salgado Andrade, Facultad de Ciencias Políticas y Sociales Lectora: Dra. Carmen Millé Moyano, Facultad de Ciencias Políticas y Sociales México D.F. mayo 2014 1 UNAM – Dirección General de Bibliotecas Tesis Digitales Restricciones de uso DERECHOS RESERVADOS © PROHIBIDA SU REPRODUCCIÓN TOTAL O PARCIAL Todo el material contenido en esta tesis esta protegido por la Ley Federal del Derecho de Autor (LFDA) de los Estados Unidos Mexicanos (México). El uso de imágenes, fragmentos de videos, y demás material que sea objeto de protección de los derechos de autor, será exclusivamente para fines educativos e informativos y deberá citar la fuente donde la obtuvo mencionando el autor o autores. Cualquier uso distinto como el lucro, reproducción, edición o modificación, será perseguido y sancionado por el respectivo titular de los Derechos de Autor. Índice Introducción………………..…………………………………………………………………………..…4 1. La información en tiempos globales ¿Cómo definir un medio de control?… ………………………………………………………………….11 Un modelo de propaganda mundial…………….………………………………………………...……...18
    [Show full text]
  • In the United States District Court for the Southern District of New York
    Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 1 of 111 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK DEMOCRATIC NATIONAL COMMITTEE, ) Civil Action No. 1:18-cv-03501 ) JURY DEMAND Plaintiff, ) ) SECOND AMENDED v. ) COMPLAINT ) COMPUTER FRAUD AND ABUSE THE RUSSIAN FEDERATION; ) ACT (18 U.S.C. § 1030(a)) ARAS ISKENEROVICH AGALAROV; ) RICO (18 U.S.C. § 1962(c)) EMIN ARAZ AGALAROV; ) ) RICO CONSPIRACY (18 U.S.C. JOSEPH MIFSUD; ) § 1962(d)) WIKILEAKS; ) WIRETAP ACT (18 U.S.C. JULIAN ASSANGE; ) §§ 2510-22) DONALD J. TRUMP FOR PRESIDENT, INC.; ) ) STORED COMMUNICATIONS DONALD J. TRUMP, JR.; ) ACT (18 U.S.C. §§ 2701-12) PAUL J. MANAFORT, JR.; ) DIGITAL MILLENNIUM ROGER J. STONE, JR.; ) COPYRIGHT ACT (17 U.S.C. ) JARED C. KUSHNER; § 1201 et seq.) GEORGE PAPADOPOULOS; ) ) MISAPPROPRIATION OF TRADE RICHARD W. GATES, III; ) SECRETS UNDER THE DEFEND ) TRADE SECRETS ACT (18 U.S.C. Defendants. ) § 1831 et seq.) ) INFLUENCING OR INJURING ) OFFICER OR JUROR GENERALLY ) (18 U.S.C. § 1503) ) ) TAMPERING WITH A WITNESS, ) VICTIM, OR AN INFORMANT (18 ) U.S.C. § 1512) ) WASHINGTON D.C. UNIFORM ) TRADE SECRETS ACT (D.C. Code ) Ann. §§ 36-401 – 46-410) ) ) TRESPASS (D.C. Common Law) ) CONVERSION (D.C. Common Law) ) TRESPASS TO CHATTELS ) (Virginia Common Law) ) ) ) Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 2 of 111 CONSPIRACY TO COMMIT TRESPASS TO CHATTELS (Virginia Common Law) CONVERSION (Virginia Common Law) VIRGINIA COMPUTER CRIMES ACT (Va. Code Ann. § 18.2-152.5 et seq.) 2 Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 3 of 111 TABLE OF CONTENTS Page NATURE OF ACTION .................................................................................................................
    [Show full text]