Infosecurity (Gran Knows Why)

Total Page:16

File Type:pdf, Size:1020Kb

Infosecurity (Gran Knows Why) Infosecurity (Gran knows why) by Arjen Kamphuis A collection of articles, posts and lectures And a handy InfoSec guide Infosecurity (Gran knows why) by Arjen Kamphuis A collection of articles, posts and lectures And a handy InfoSec guide 1 Colophon ISBN 9789090328218 First edition, 2020 Infosecurity (Gran knows why) - By Arjen Kamphuis A collection of articles, posts and lectures. And a handy InfoSec guide CC BY-NC-SA 4.0 Arjen Kamphuis Initiative by #teamArjen: Ancilla van de Leest, Sanne Terlingen, Jos Weyers, Maurice Verheesen, Helma de Boer Editor: Helma de Boer Preface & photo selection: Ancilla van de Leest Book design & layout: Harry van Mierloo Cover design: Ancilla van de Leest & Harry van Mierloo Photo back cover: Jos Weyers Publisher: Gendo Print: Bookadew, Roermond 2 4 5 6 7 8 9 10 11 12 Preface The book you are holding was written by a man who has disappeared. It was compiled by people who loved him, and who feel the need to fill the void he left with a lasting echo of his work. If Arjen would stand before you right now, he would leave you no choice but to quickly develop an opinion on him. This could be positive or negative – depending on your own biases – but he always left an impression. With his strong voice, black humour, quick wit and straight forwardness on complicated political issues, he set out to challenge the status quo and speak truth to power. It was no surprise he was a well sought after lecturer at schools and at companies. He was a talented and passionate debater, with a stunning memory for even the most minute details of past events. It was not just his passion and brains that got him noticed. Arjen wore his trademark ‘nerd look’ with pride: long blonde hair and black attire. He often bought a couple of those same pants and shirts at once, so as to never run out of his uniform. By fully embracing his geekiness, he made an effort to be a good ambassador for his fellow nerds, as well as the hackerspaces they inhabit. Quirky hackerspace Hack42, located in an old military base in Arnhem, was his home away from home, where he was even welcome to stay the night whenever he was in the neighbourhood. The white church next to it is therefore an appropriate pick for the launch of this book, around the time of his birthday. 13 As a young and optimistic futurist, Arjen was convinced technological advancements would allow for a better humankind and healthier planet. However, over the years he became increasingly dismayed that other people did not seem naturally interested in the bigger picture for the better world he clearly envisioned technology could bring us. The lack of knowledge and insight that powerful people displayed, baffled him. After all, wilful ignorance borders on the side of criminal when making decisions that affect all of society, he argued. Principled, passionate, outspoken and energetic, Arjen became aware of and vocal about the fact that society is using technology in clueless ways. Always way ahead of his time, he preached inclusivity of everyone early on. If his writing and speaking had one message, it would be that. Let’s not let slip this opportunity of advancements in technology to make lives better for everyone in the world. A true renaissance man, he certainly enjoyed being a bit of a provocateur in conveying his message. And, as you will soon come to read, he did not shy away from making bold statements in order to wake people up to the disconcerting reality he perceived to be unfolding right before our very eyes. But as arrogant as he would come across when on stage or engaged in a heated debate, as gentle and humble a soul he was when out of the spotlights. Always on the lookout to make himself useful, and help people with his vast amount of knowledge, as well as his appetite for physical labour. When he was not handing out customised surveillance-proof laptops to befriended journalists and hacktivists, he was supporting crowdfund 14 campaigns for innovative technology with the same enthusiasm he put into constructing hiking tents or Ikea furniture. He would never throw away a sleeping bag, because ‘you never knew when you’d have a bunch of people over who were in need of one’. Indeed, when friends or strangers alike needed a place to stay for a night, or even a few months, he would not think twice to quickly provide a roof over their heads. He was a giver, without expecting payback in glory or otherwise. It was not unusual to be gifted a book by him he thought you would like. Many a friend still calls him a mentor, too. Some say he was a dreamer. Arjen loved sailing more than anything, and his big dream was to one day own his own sailing boat. His friends associate him with a diet of fish and a sip of the occasional quality whisky. He loved to travel, and when he was young, he would regularly go hiking in snowy mountains and other rough and unusual places. In later years he would allow himself to enjoy more luxury holidays and not ‘having’ to do too much. But whenever the opportunity arose to plan for a boat trip, he would always jump to the occasion. His last holiday to Norway was right up his alley: cool temperatures, raw nature and plenty of solitude. He joked about the possibility of being eaten by a polar bear, because “Really, it happened to a couple of tourists not too long ago”. How does a person as unique and fascinating as Arjen come to be? We know that much of his intellectual disposition and broad interests came from the middle class family he was born into. His mom was a psychotherapist, his dad worked as an ergonomist for a large tech 15 corporation. In naming the book ‘Infosecurity (Gran knows why)’, we half jokingly say Arjen’s grandmother was his big inspiration, and indeed it appears like his principled and engaged attitude came from his family. A love for technology, society and the outdoors were instilled in him from a young age. Many of the childhood pictures included in this book show a boy who engaged in activities he still enjoyed later in life: building things, being outdoors, sailing a boat and checking out technology from up close. His younger sister and him seemingly lacked nothing growing up. The fall of the Berlin wall was a life defining moment for him, as it undoubtedly was for many of his generation. The event left a great impression on him, one of hope and liberty that he carried with him in everything he did. In matters of the heart, his long-term relationship with the beautiful and articulate MI5 whistleblower Annie Machon, was formative to his life and work, as well. Yet not all of his life was rainbows and unicorns. His beloved mother suffered from Parkinson’s disease when Arjen was only a teenager, and her decline and eventual euthanasia in 2007 made a lasting impression on him. We can only speculate whether his simultaneous struggle with academic results was a result of this tragedy, but the suffering of this strong, wise and caring woman certainly broke his heart. Another tragic and traumatising event occurred when Arjen was a young adult. He was involved in a serious mountaineering accident in Argentina, in which a several of his hiking partners lost their lives right before his eyes. He did not speak about the accident much, but did 16 confess once that the guilt of not being able to save them still haunted him. Another consequence was that he was unable to fully pursue his passion for dangerous outdoor adventures due to a permanently injured knee. He continued to suffer from the physical pain until shortly before his disappearance, when he proudly got ‘upgraded’, as he called it, with a titanium part. Even when he painfully chopped off a fingertip or two during wood chopping - as one does - he still kept his cool. “All the better!” He would joke sarcastically, “One more way to make it more difficult for authorities to track me through fingerprints!” His dark humour will be so very dearly missed. Never one to display any sign of discomfort, Arjen struggled to be open about even the most obvious personal flaws or hurts. He was here to save the world, after all. A strong shoulder to lean on, and super heroes do not show weakness. At least not when in costume. But as much as he was loved by those around him, he too, was all too human. Despite his career success, financial challenges caught up with him repeatedly. And it is entirely possible he lost a good friend or two, simply by being a no-show to obligations now and again. No surprise then, that when he initially went missing, alarm bells did not immediately go off with his inner circle. “Just like Arjen,” we thought, “to stay on holiday for a bit longer and forgetting to get in touch”. Arjen’s disappearance caused quite a media storm. Many dozens of people across Europe reported they thought they had seen Arjen, but not a single shred of evidence has resulted in finding Arjen. After a year of thorough investigation, for which we are grateful, Dutch and Norwegian authorities have closed the case, assuming he was probably killed in a kayaking 17 incident. Until ‘new shit has come to light’, this is where the story ends.
Recommended publications
  • Excerpts of Chapters From
    Excerpts of Chapters from A Practical Guide to Ubuntu Linux® FOURTH EDITION Mark G. Sobell ISBN-13: 978-0-13-392731-3 CopyrightExcerpt © 2015 Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Blank Excerpt 3 Step-by-Step Installation 3Chapter3 In This Chapter Objectives Booting Ubuntu and Running a After reading this chapter you should be able to: Live Session. 56 Run a live session and use gnome-disks to view and Automatic Boot Sequence . 56 change disk partitioning Running a Live Session. 59 Install Ubuntu from a live session Installing from a Live Session . 60 Install Ubuntu using the Server Image Installing from the Desktop Modify system behavior using boot parameters Boot Menu . 61Excerpt Modify partitions during installation The ubiquity Graphical Installer. 61 The ubiquity Advanced Partitioning List the requirement and considerations for a dual- Screen. 67 boot configuration Advanced Installation. 71 Modifying Boot Parameters (Options) . 75 debian-installer: The Ubuntu Textual Installer . 78 gnome-disks: The GNOME Disk Utility . 88 Setting Up a Dual-Boot System . 91 5555 56 Chapter 3 Step-by-Step Installation Chapter 2 covered planning the installation of Ubuntu: determining the requirements; planning the layout of the hard disk; obtaining the files you need for the installation, including how to download and burn or write Desktop and Server Images to installa- tion media; and collecting information about the system. This chapter focuses on installing Ubuntu. Frequently the installation is quite simple, especially if you have done a good job of planning.
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • Wikileaks Advisory Council
    1 WikiLeaks Advisory Council 2 Hi everyone, My name is Tom Dalo and I am currently a senior at Fairfield. I am very excited to Be chairing the WikiLeaks Advisory Council committee this year. I would like to first introduce myself and tell you a little Bit about myself. I am from Allendale, NJ and I am currently majoring in Accounting and Finance. First off, I have been involved with the Fairfield University Model United Nations Team since my freshman year when I was a co-chair on the Disarmament and International Security committee. My sophomore year, I had the privilege of Being Co- Secretary General for FUMUN and although it was a very time consuming event, it was truly one of the most rewarding experiences I have had at Fairfield. Last year I was the Co-Chair for the Fukushima National Disaster Committee along with Alli Scheetz, who filled in as chair for the committee as I was unaBle to attend the conference. Aside from my chairing this committee, I am currently FUMUN’s Vice- President. In addition to my involvement in the Model UN, I am a Tour Ambassador Manager, and a Beta Alpha Psi member. I love the outdoors and enjoy skiing, running, and golfing. I am from Allendale, NJ and I am currently majoring in Accounting and Finance. Some of you may wonder how I got involved with the Model United Nations considering that I am a business student majoring in Accounting and Finance. Model UN offers any student, regardless of their major, a chance to improve their puBlic speaking, enhance their critical thinking skills, communicate Better to others as well as gain exposure to current events.
    [Show full text]
  • Barefoot Into Cyberspace Adventures in Search of Techno-Utopia
    Barefoot into Cyberspace Adventures in search of techno-Utopia By Becky Hogge July 2011 http://www,barefootintocyberspace.com Barefoot into Cyberspace Becky Hogge Read This First This text is distributed by Barefoot Publishing Limited under a Creative Commons Attribution-ShareAlike 2.0 UK: England & Wales Licence. That means: You are free to copy, distribute, display, and perform the work to make derivative works to make commercial use of the work Under the following conditions Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one. For any reuse or distribution, you must make clear to others the licence terms of this work. The best way to do this is with a link to http://barefootintocyberspace.com/book/hypertext Any of these conditions may be waived by seeking permission from Barefoot Publishing Limited. To contact Barefoot Publishing Limited, email barefootpublishing [AT] gmail [DOT] com. More information available at http://creativecommons.org/licenses/by- sa/2.0/uk/. See the end of this file for complete legalese 2 Barefoot into Cyberspace Becky Hogge Contents Prologue: Fierce Dancing ...................................................................................................................................... 5 Chapter 1: Digging the command line ............................................................................................................
    [Show full text]
  • Ubuntu 18.04 Essentials Ubuntu 18.04 Essentials ISBN-13: 978-1-951442-17-0 © 2020 Neil Smyth / Payload Media, Inc
    Ubuntu 18.04 Essentials Ubuntu 18.04 Essentials ISBN-13: 978-1-951442-17-0 © 2020 Neil Smyth / Payload Media, Inc. All Rights Reserved. This book is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved. The content of this book is provided for informational purposes only. Neither the publisher nor the author offers any warranties or representation, express or implied, with regard to the accuracy of information contained in this book, nor do they accept any liability for any loss or damage arising from any errors or omissions. This book contains trademarked terms that are used solely for editorial purposes and to the benefit of the respective trademark owner. The terms used within this book are not intended as infringement of any trademarks. Rev: 1.0 Contents Table of Contents 1. Introduction .........................................................................................................................1 1.1 Superuser Conventions................................................................................................. 1 1.2 Opening a Terminal Window ...................................................................................... 2 1.3 Editing Files ................................................................................................................... 3 1.4 Feedback ......................................................................................................................... 4 1.5 Errata ..............................................................................................................................
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Solar Powered Beach Buggy Challenge
    Solar Powered Beach Buggy Challenge Group #1 Team Members: Jared Cozart Jose Rosales Robinson Charles Tony Jimogaon Summer 2018 June 30, 2018 Sponsored by Duke Energy Table of Contents 1. Executive Summary …………………………………………………………...1 2. Project Description …………………………………………………………...2 2.1. Block Diagram ……………………………………………………...2 2.2. Requirement Specifications ………………………...……………...3 2.3. Project Constraints …………………...……………...……………...4 2.4. Economic and Time Constraints …………………...……………...4 2.5. Ethical, Health, and Safety Constraints ……………...…………...5 2.6. Environmental, Social, and Political Constraints ……………...6 2.7. Manufacturability and Sustainability constraints ……………...6 2.8. House of Quality …………………...……………...……………...6 2.9. Objectives ……………...……………...……………...……………...8 3. Initial Research ……………...……………...……………...……………...9 3.1. Mechanical Components ……………...……………...……………...9 3.1.1. Chassis ...…………………...……………...……………...9 3.1.2. Suspension .…………………...……………...……………...10 3.1.3. Drivetrain ….…………………...……………...……………...11 3.1.4. Frame Structure and Material Selection ……………...12 3.1.5. Beach Buggy Tires ……………...……………...…………...13 3.1.6. Motors ………………………...……………...……………...14 3.1.7. Batteries ………………………...……………...……………...17 3.1.8. Frame Materials ……………...……………...……………...20 3.1.9. Steering ………………………...……………...……………...21 3.2. Electrical Components ……………...……………...……………...22 3.2.1. Solar Cells …………………...……………...……………...22 3.2.1.1. Advantages ……………...……………...……………..24 3.2.1.2. Disadvantages ………………………...……………...25 3.2.2. Inverters ……………...……………...……………...25
    [Show full text]
  • K:\Buchanan\Mkelley\Order Opinions\Wikileaks\11-Dm-3
    Case 1:11-dm-00003-TCB Document 38 Filed 03/11/11 Page 1 of 20 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division ) ) ) ) ) In Re: §2703(d) Order; 10GJ3793 ) Miscellaneous No. 1:11dm00003 ) ) ) ) ) ) MEMORANDUM OPINION This matter came before the Court the Motion of Real Parties in Interest Jacob Appelbaum, Birgitta Jonsdottir, and Rop Gonggrijp to Vacate December 14, 2010 Order (“Motion to Vacate”, Dkt. 1) and Motion of Real Parties in Interest Jacob AppelBaum, Rop Gonggrijp, and Birgitta Jonsdottir for Unsealing of Sealed Court Records. (“Motion to Unseal”, Dkt. 3). For the following reasons, petitioners’ Motion to Vacate is DENIED, and petitioners’ Motion to Unseal is DENIED in part, GRANTED in part, and taken under further consideration in part. BACKGROUND Petitioners are Twitter users associated with account names of interest to the government. Petitioner Jacob Appelbaum (Twitter name “ioerror”) is a United States citizen and resident, described as a computer security researcher. (Pet. Motion to Unseal at 3). Rop Gonggrijp (Twitter name “rop_g”) is a Dutch citizen and computer security specialist. Id. Birgitta Case 1:11-dm-00003-TCB Document 38 Filed 03/11/11 Page 2 of 20 Jonsdottir (Twitter name “birgittaj”) is an Icelandic citizen and resident. She currently serves as a member of the Parliament of Iceland. Id. On December 14, 2010, upon the government’s ex parte motion, the Court entered a sealed Order (“Twitter Order”) pursuant to 18 U.S.C. § 2703(d) of the Stored Communications Act, which governs government access to customer records stored by a service provider.
    [Show full text]
  • Linux – Das Umfassende Handbuch 1.430 Seiten, Gebunden, Mit CD, 14
    Know-howWissen, wie’s für geht. Kreative. Leseprobe In dieser Leseprobe erhalten Sie einen Einstieg in die Linux-Welt und erfahren, wie Sie Audio und Video unter Linux nutzen. Dar- über hinaus lernen Sie die Kommandozentrale kennen: die Shell. Außerdem können Sie einen Blick in das vollständige Inhalts- und Stichwortverzeichnis des Buches werfen. »Was ist Linux?« »Installationsgrundlagen« »Audio und Video« »Die Shell« »Software- und Paketverwaltung« Inhaltsverzeichnis Index Der Autor Leseprobe weiterempfehlen Michael Kofler Linux – Das umfassende Handbuch 1.430 Seiten, gebunden, mit CD, 14. Auflage 2015 49,90 Euro, ISBN 978-3-8362-3775-8 www.rheinwerk-verlag.de/3855 “buch” — 2015/11/5 — 21:54 — page 25 — #19 1 Kapitel 1 Was ist Linux? Um die einleitende Frage zu beantworten, erkläre ich in diesem Kapitel zuerst einige wichtige Begriffe, die im gesamten Buch immer wieder verwendet werden: Betriebs- system, Unix, Distribution, Kernel etc. Ein knapper Überblick über die Merkmale von Linux und die verfügbaren Programme macht deutlich, wie weit die Anwendungs- möglichkeiten von Linux reichen. Es folgt ein kurzer Ausflug in die Geschichte von Linux: Sie erfahren, wie Linux entstanden ist und auf welchen Komponenten es basiert. Von zentraler Bedeutung ist dabei natürlich die General Public License (kurz GPL), die angibt, unter welchen Bedingungen Linux weitergegeben werden darf. Erst die GPL macht Linux zu einem freien System, wobei »frei« mehr heißt als einfach »kostenlos«. 1.1 Einführung Linux ist ein Unix-ähnliches Betriebssystem. Der wichtigste Unterschied gegenüber historischen Unix-Systemen besteht darin, dass Linux zusammen mit dem vollstän- digen Quellcode frei kopiert werden darf. Ein Betriebssystem ist ein Bündel von Programmen, mit denen die grundlegend- Betriebssystem sten Funktionen eines Rechners realisiert werden: die Schnittstelle zwischen Mensch und Maschine (also konkret: die Verwaltung von Tastatur, Bildschirm etc.) und die Verwaltung der Systemressourcen (CPU-Zeit, Speicher etc.).
    [Show full text]
  • How to Make an Old Computer Useful Again
    How to Make an Old Computer Useful Again Howard Fosdick (C) 2018 19.1 / 6.0.6.2 Who am I? * Independent Consultant (DBA, SA) * Refurbishing for charity is a hobby * Talked on this 12 years ago OMG! What'd I do this time? Stick figure by ViratSaluja at DeviantArt Photo by www.global1resources.com Why Refurb ? + Charity + Fun + Environment Agenda I. Why Refurb? II. How to – Hardware III. How to – Software Wikipedia -By Ana 2016 - Own work OR Refurbish = Reuse Recycle = Destroy What I Do Small Individuals Organizations Recyclers I fix it Individuals or Small Groups FreeGeek People Trash Good Hardware... Because of Software -- Windows slows down -- People don't know to tune it -- Perceive their system is obsolete -- Like a disposable razor blade -- Vendors like this I'm still on Win 7. I better toss it! Friggin' computer! ...too slow... It's outta here! 10 2015 8.1 2013 8 2012 7 2009 Vista 2007 Clipart @ Toonaday How Long Should a Computer Last? > Depends on use > Laptops vs Desktops ---or--- Consensus is 3 to 5 years Treat it like a car -- + Regular maintenance (tune ups) + Replace parts + Run age-appropriate software (Linux) -> Any dual-core is still useful Windows is excellent for many roles. Refurbishing is not one of them. Vendor Incentives -- Would you rather sell to a customer every 3 years, or every 9 years? -- Financial incentive to recycle... not refurbish + Incentives against pollution Vendors prefer this: Courtesy: Wikipedia uncredited Dirty Recycling ---vs--- Environmental Recycling Courtesy: AP/scmp.com Courtesy: Basel Action Network -- 80% is not Environmentally Recycled..
    [Show full text]
  • Student Handbook TV Journalism Goldsmiths
    For Distribution to CPs Student Handbook 2 0 1 1 - 2 0 1 2 TV Journalism Course No: 730038A PLEASE CHECK NOTiCE BOARDS OR THiS HANDBOOK BEFORE YOU SEEK iNFORMATiON FROM THE OFFiCE, THE iNFORMATiON YOU WANT iS OFTEN THERE. This handbook is also available on http://learn.qold.ac.uk Department of Media and Communications Goldsmiths - University of London New Cross - London - SE14 6NW Tel: 020 7919 7615 Goldsmiths UNIVERSITY OF LONDON MODI 00050961 For Distribution to CPs Programme Convenor: Peter Lee-Wright 2011-2012 MA TV Journalism This booklet contains all the essential information you will need for the MA TV Journalism programme; it also contains important information about examinations, assessment and work deadlines. Please read this booklet carefully and keep it in a safe place for reference throughout the year. Every care has been taken in the com piiation of the information given in this bookiet. However, no guarantee as to the accuracy can be given, nor shouid the contents be regarded as contractuaiiy binding upon the Coiiege. MODI 00050962 For Distribution to CPs The public have an insatiable curiosity to know everything. Except what is worth knowing. Journalism, conscious of this, and having tradesman-like habits, supplies their demands. Oscar Wilde Put it before them briefly so they will read it, clearly so they will appreciate it, picturesquely so they will remember it and, above all, accurately so they will be guided by its light. ■ Joseph Pulitzer The TV business is a cruel and shallow money trench, a long plastic hallway where thieves and pimps run free and good men die like dogs.
    [Show full text]
  • Kommunikationsfreiheit Emanzipatorische Diskurse Im Kontext Medientechnologischer Entwicklungsprozesse
    Saskia Sell Kommunikationsfreiheit Emanzipatorische Diskurse im Kontext medientechnologischer Entwicklungsprozesse Anhang II: Akteure und Sprecherpositionen © Springer Fachmedien Wiesbaden 2017 Grobanalyse: Akteure und Sprecherpositionen im Diskurssegment "Netzfreiheit" Die in den Artikeln genannten Akteure (Einzelpersonen, Institutionen, Organisationen) wurden nach einer ersten Gesamtsichtung nach gesellschaftlicher Funktion und Position in bestimmte Akteursgruppen aus den Bereichen Politik, Wirtschaft, Journalismus und Medien, Kunst, Wissenschaft und Recht eingeteilt. Diese haben sich induktiv aus dem Material heraus ergeben. Die Häufigkeit der Nennung entspricht der Zahl der Artikel, in denen die Akteure sowie ihre Positionen im Aushandlungsprozess von Netzfreiheit erwähnt wurden oder Sprecherpositionen innehatten. Mehrfachnennungen in einem Artikel wurden nicht erhoben. Bezüge zu anonymen Personen sowie zu Anonymous kamen ebenfalls wiederholt vor, wurden aber aufgrund fehlender Zuordnungsmöglichkeit zu einem gesellschaftlichen Bereich hier nicht in die Aufstellung integriert. A79 Tab. 1: Übersicht über im Diskurssegment benannte Akteursgruppen, denen Akteure und Sprecherpositionen zugeordnet sind Gesellschaftliche Sphäre Akteursgruppen, denen Akteure/Sprecherpositionen zugeordnet werden Politik Staaten und Staatenverbünde; Institutionen (Regierungen, Behörden) und deren Vertreter_innen; Parteien und (Partei-)Politiker_innen; politische Arbeitsgruppen, Organisationen und Stiftungen; Politikberater_innen und politische Beamt_innen Zivilgesellschaft
    [Show full text]