Journalism and the NSA Revelations
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Media Analysis of Julian Assange's Superseding Indictment
defend.wikileaks.org Media analysis of Julian Assange's superseding indictment The precedent Glenn Greenwald: The indictment of Assange is a blueprint for making journalists into felons The argument offered by both the Trump administration and by some members of the self- styled “resistance” to Trump is, ironically, the same: that Assange isn’t a journalist at all and thus deserves no free press protections. But this claim overlooks the indictment’s real danger and, worse, displays a wholesale ignorance of the First Amendment. Press freedoms belong to everyone, not to a select, privileged group of citizens called “journalists.” Empowering prosecutors to decide who does or doesn’t deserve press protections would restrict “freedom of the press” to a small, cloistered priesthood of privileged citizens designated by the government as “journalists.” The First Amendment was written to avoid precisely that danger. Most critically, the U.S. government has now issued a legal document that formally declares that collaborating with government sources to receive and publish classified documents is no longer regarded by the Justice Department as journalism protected by the First Amendment but rather as the felony of espionage, one that can send reporters and their editors to prison for decades. It thus represents, by far, the greatest threat to press freedom in the Trump era, if not the past several decades. … The vast bulk of activities cited by the indictment as criminal are exactly what major U.S. media outlets do on a daily basis. The indictment, for instance, alleges WikiLeaks “encouraged sources” such as Chelsea Manning to obtain and pass on classified information; that the group provided technical advice on how to obtain and transmit that information without detection, and that it then published the classified information stolen by its source. -
How Laura Poitras Helped Snowden Spill His Secrets
How Laura Poitras Helped Snowden Spill His Secrets Documentary filmmaker Laura Poitras in Berlin. By PETER MAASS Published: August 13, 2013 This past January, Laura Poitras received a curious e-mail from an anonymous stranger requesting her public encryption key. For almost two years, Poitras had been working on a documentary about surveillance, and she occasionally received queries from strangers. She replied to this one and sent her public key — allowing him or her to send an encrypted e-mail that only Poitras could open, with her private key — but she didn’t think much would come of it. The stranger responded with instructions for creating an even more secure system to protect their exchanges. Promising sensitive information, the stranger told Poitras to select long pass phrases that could withstand a brute-force attack by networked computers. “Assume that your adversary is capable of a trillion guesses per second,” the stranger wrote. Before long, Poitras received an encrypted message that outlined a number of secret surveillance programs run by the government. She had heard of one of them but not the others. After describing each program, the stranger wrote some version of the phrase, “This I can prove.” 1 From www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html?hpw 20 August 2013 Seconds after she decrypted and read the e-mail, Poitras disconnected from the Internet and removed the message from her computer. “I thought, O.K., if this is true, my life just changed,” she told me last month. “It was staggering, what he claimed to know and be able to provide. -
And Jeremy Scahill (USA) Win Human Rights Award
FOR IMMEDIATE RELEASE Contact: Marina Garde February 9, 2016 [email protected] / www.alba-valb.org Tel. 212-674-5398 Fearless, Border-Crossing Journalists Expose Corruption at the Highest Levels: Lydia Cacho (Mexico) and Jeremy Scahill (USA) Win Human Rights Award New York—On Saturday, May 7, 2016, the Abraham Lincoln Brigade Archives (ALBA) will present the ALBA/Puffin Award for Human Rights Activism to journalists Lydia Cacho and Jeremy Scahill. One of the largest monetary awards for human rights in the world, this $100,000 cash prize is granted annually by ALBA and the Puffin Foundation to honor the International Brigades and connect their inspiring legacy with contemporary causes. “Cacho and Scahill both shine as rare examples of investigative journalists who place human rights at the center of their work,” said ALBA board member and 2012 award recipient Kate Doyle. “Their reporting not only affects government policies, but seeks to champion and protect the lives of the world’s most vulnerable citizens. ALBA is proud to honor them.” Working on both sides of the volatile Mexico-United States border, Lydia Cacho and Jeremy Scahill have dedicated their careers to exposing the corruption, violence and abuse of power which go routinely unchallenged in the mainstream media. Cacho’s and Scahill’s work exemplifies the intersections of expository reporting and human rights activism. Their commitment to breaking the most profound silences has prompted investigations into the United States’ shadow wars across the Middle East and Africa as well as Mexican authorities’ use of censorship, torture and corruption. Part of an initiative designed to sustain the legacy of the experiences, aspirations and idealism of the Abraham Lincoln Brigade, the ALBA/Puffin Award for Human Rights Activism supports current international activists and human rights causes. -
The Civilian Impact of Drone Strikes
THE CIVILIAN IMPACT OF DRONES: UNEXAMINED COSTS, UNANSWERED QUESTIONS Acknowledgements This report is the product of a collaboration between the Human Rights Clinic at Columbia Law School and the Center for Civilians in Conflict. At the Columbia Human Rights Clinic, research and authorship includes: Naureen Shah, Acting Director of the Human Rights Clinic and Associate Director of the Counterterrorism and Human Rights Project, Human Rights Institute at Columbia Law School, Rashmi Chopra, J.D. ‘13, Janine Morna, J.D. ‘12, Chantal Grut, L.L.M. ‘12, Emily Howie, L.L.M. ‘12, Daniel Mule, J.D. ‘13, Zoe Hutchinson, L.L.M. ‘12, Max Abbott, J.D. ‘12. Sarah Holewinski, Executive Director of Center for Civilians in Conflict, led staff from the Center in conceptualization of the report, and additional research and writing, including with Golzar Kheiltash, Erin Osterhaus and Lara Berlin. The report was designed by Marla Keenan of Center for Civilians in Conflict. Liz Lucas of Center for Civilians in Conflict led media outreach with Greta Moseson, pro- gram coordinator at the Human Rights Institute at Columbia Law School. The Columbia Human Rights Clinic and the Columbia Human Rights Institute are grateful to the Open Society Foundations and Bullitt Foundation for their financial support of the Institute’s Counterterrorism and Human Rights Project, and to Columbia Law School for its ongoing support. Copyright © 2012 Center for Civilians in Conflict (formerly CIVIC) and Human Rights Clinic at Columbia Law School All rights reserved Printed in the United States of America. Copies of this report are available for download at: www.civiliansinconflict.org Cover: Shakeel Khan lost his home and members of his family to a drone missile in 2010. -
The Nsa's Prism Program and the New Eu Privacy Regulation: Why U.S
American University Business Law Review Volume 3 | Issue 2 Article 5 2013 The SN A'S Prism Program And The ewN EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble Juhi Tariq American University Washington College of Law Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the International Law Commons, and the Internet Law Commons Recommended Citation Tariq, Juhi "The SAN 'S Prism Program And The eN w EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble," American University Business Law Review, Vol. 3, No. 2 (2018) . Available at: http://digitalcommons.wcl.american.edu/aublr/vol3/iss2/5 This Note is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized editor of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTE THE NSA'S PRISM PROGRAM AND THE NEW EU PRIVACY REGULATION: WHY U.S. COMPANIES WITH A PRESENCE IN THE EU COULD BE IN TROUBLE JUHI TARIQ* Recent revelations about a clandestine data surveillance program operated by the NSA, Planning Tool for Resource Integration, Synchronization, and Management ("PRISM'), and a stringent proposed European Union ("EU") data protection regulation, will place U.S. companies with a businesspresence in EU member states in a problematic juxtaposition. The EU Proposed General Data Protection Regulation stipulates that a company can be fined up to two percent of its global revenue for misuse of users' data and requires the consent of data subjects prior to access. -
Table of Contents
Table of Contents Foreword ........................................................................................................ 2 Introduction .................................................................................................... 3 Setting Up a Training Program ........................................................................... 5 A 12-step program ............................................................................................ 7 Newsroom managers survey ............................................................................... 8 Topics for training seminars ............................................................................ 10 The proposal ................................................................................................. 11 The questions ................................................................................................ 12 Planning a training session ............................................................................. 13 Training seminar checklist .............................................................................. 14 Route 66 ....................................................................................................... 15 Don’t forget human resources .......................................................................... 18 Starting a newsroom library ............................................................................. 19 Sources ....................................................................................................... -
George Thorley Class 12 Project
SURVEILLANCE !1 Surveillance Watch The Many, To Catch The Few George J. Thorley Norwich Steiner School Author Note George J. Thorley, Level 3 Steiner School Certificate, Norwich Steiner School. This report is the piece of work required for the Steiner School Certificate Level 3 Class 12 Project. Correspondence concerning this report should be addressed to George Thorley, Norwich Steiner School, Hospital Lane, Norwich, NR1 2HW. Contact: [email protected] 11 - 05 - 2017 SURVEILLANCE !2 Contents Title 1 Summary 3 Introduction 4 Historical Context 5 9/11 7 USA PATRIOT Act 2001 8 Presidents Surveillance Program 10 The Timeline 12 Edward J Snowden 16 Prism 17 Tempora 20 Treasure Map 21 Conclusion 23 Diagrams 26 References 27 11 - 05 - 2017 SURVEILLANCE !3 Summary In this report, my main question will be: What was the extent of government mass surveillance, in particular the NSA in the United States, running from the September 11 attacks in 2001, to the Edward Snowden revelations in 2013? In answering this I will focus on how public and political feelings prompted the conditions possible for the security forces to be doing what they do in todays world. In particular, I will be looking at the National Security Agency (NSA) in the United States (US) and some of the revelations brought forward by Edward Snowden in 2013, along with the scale of involvement of the United Kingdom’s (UK) Government Communication Headquarters (GCHQ). I will then look at some of the fundamental questions that surround the world of mass surveillance, such as the effectiveness of the programs that were acted upon by security agencies, who they were really looking for, and whether, in my eyes, their methods were morally right. -
Foreign Corrupt Practices Act Alert Latin America Anti-Bribery Year-In-Review: 2019 Developments and Predictions for 2020
February 28, 2020 Foreign Corrupt Practices Act Alert Latin America Anti-Bribery Year-in-Review: 2019 Developments and Predictions for 2020 By Tico Almeida, Lillian Howard Potter, and John F. Walsh1 I. INTRODUCTION Foreign Corrupt Practices Act (FCPA) enforcement activity reached new heights in 2019. Corporate penalties paid to US enforcement agencies topped last year’s record levels, and individuals were charged at a pace matching last year’s near-record level.2 As discussed in detail below, Latin American citizens from Ecuador to Venezuela have recently found themselves facing criminal anti-corruption charges in federal courts in the US. These trends are critically important both to Latin American companies and to US companies doing business in Latin America. As recent enforcement trends show, foreign companies are a perennial target of US enforcement agencies. Nine of the top 10 all-time largest FCPA enforcement actions have been brought against companies based outside the US, including several Brazilian companies. Similarly, US companies with operations in Latin America have good reason to ensure that they have strong anti-corruption controls in place because, as discussed below, US enforcement agencies are investigating corruption by US companies operating across the region, from Mexico to Peru. This alert summarizes key Latin America 2019 anti-bribery enforcement developments and concludes with predictions for 2020. For a comprehensive global review of enforcement and policy developments, please refer to WilmerHale’s FCPA Alert: Global Anti-Bribery Year-in-Review for 2019. II. KEY INVESTIGATION-RELATED DEVELOPMENTS IN LATIN AMERICA A. Notable Features of 2019 Corporate Resolutions in Latin American Cases 1. -
High Technology, Consumer Privacy, and U.S. National Security
Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2015 High Technology, Consumer Privacy, and U.S. National Security Laura K. Donohue Georgetown University Law Center, [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/1457 http://ssrn.com/abstract=2563573 Bus. L. Rev. (forthcoming) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Constitutional Law Commons, Consumer Protection Law Commons, Fourth Amendment Commons, and the National Security Law Commons HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY Laura K. Donohue* I. INTRODUCTION Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. 1 The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security. The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act.2 The following day, The Guardian published classified slides detailing how the NSA had intercepted international content under Section 702 of the FISA Amendments Act.3 The type of information obtained ranged from E-mail, video and voice chat, videos, photos, and stored data, to Voice over Internet Protocol, file transfers, video conferencing, notifications of target activity, and online social networking.4 The companies involved read like a who’s who of U.S. -
USA V JULIAN ASSANGE EXTRADITION HEARING When
USA V JULIAN ASSANGE EXTRADITION HEARING When: Part 1: 24th February -28th February Part 2: 18th May - 5th June Where: Woolwich Crown Court/Belmarsh Magistrate's Court, which is adjacent to HMP Belmarsh (See end of this briefing for travel advice). Magistrate: Vanessa Baraitser Defence team: Solicitor Gareth Peirce (Birnberg, Peirce & Partners), lead Barristers Edward Fitzgerald QC, Doughty Street Chambers, Mark Summers QC, Matrix Chambers The US is seeking to imprison Julian Assange for obtaining and publishing the 2010/2011 leaks, which exposed the reality of the Bush Administration's "War on Terror": Collateral Murder (Rules of Engagement), Afghan War Diaries, Iraq War Logs, Cablegate, and The Guantanamo Files. The US began its criminal investigation against Julian Assange and WikiLeaks in early 2010. After several years, the Obama administration decided not to prosecute WikiLeaks because of the precedent that this would set against media organisations. In January 2017, the campaign to free Mr. Assange's alleged source Chelsea Manning was successful and President Obama gave her a presidential commutation and freed her from prison. In August 2017 an attempt was made under the Trump administration to pressure Mr. Assange into saying things that would be politically helpful to the President. After Mr. Assange did not comply, he was indicted by the Trump Administration and the extradition request was set in motion. Chelsea Manning was re-imprisoned due to her refusal to cooperate with the grand jury against WikiLeaks. President Trump has declared that the press is "the enemy of the people" (https://www.nytimes.com/2017/02/17/business/trump-calls-the-news-media-the-enemy-of-the- people.html). -
Can Trust and Quality Save Journalism? the Wake-Up Call Conference • August 9, 2005 • San Antonio
A WAKE-UP CALL: Can Trust and Quality Save Journalism? The Wake-Up Call Conference • August 9, 2005 • San Antonio This conference is the centerpiece of a one-year Restoring the Trust project developed in partnership with the Robert D. Fowler Distinguished Chair in Communication at Kennesaw State University and the Reynolds School of Journalism at the University of Nevada-Reno in consultation with the PJNet and the AEJMC’s Civic Journalism and Community Journalism interest groups. The Journalism and the Public: Restoring the Trust project is underwritten in part by the Ethics and Excellence in Journalism Foundation. Final report Edited by Donica Mensing, Merlyn Oliver and Leonard Witt Design by Alex Newman Table of Contents An Introduction: Do We Trust Our Audiences? Thirteen Percent of Americans Cole Campbell Prefer Ethnic to Mainstream Media Dean, Reynolds School of Journalism, Alice Tait University of Nevada, Reno 1 Central Michigan University 29 The Audience Can Save Quality Immigrants Have a Different Definition Journalism, If Asked to Help of What’s News Leonard Witt Alejandro Manrique Robert D. Fowler Distinguished Chair in Managing editor, Rumbo de San Antonio 31 Communications, Kennesaw State University 2 Is There A Need For Mainstream Media? The Wake-Up Call: Are the George White Mass News Media in a Death Spiral? Assistant director, UCLA Center Phil Meyer for Communications and Community 33 Knight Chair in Journalism, University of North Carolina at Chapel Hill. 5 Small Papers Have a Big Place on the News Media Spectrum Expanding The Definition of News Media Trust Daily Encounters with Readers Reinforce Trust A Jay Rosen-Led Conversation Peggy Kuhr Jay Rosen Knight Chair in Journalism, University of Kansas 35 ProfessorNew York University with Neil Chase, Charles Lewis and Dan Gillmor. -
UNITED STATES DISTRICT COURT DISTRICT of MARYLAND LEADERS of a BEAUTIFUL STRUGGLE Et Al., Plaintiffs, V. BALTIMORE POLICE DEPART
Case 1:20-cv-00929-RDB Document 2-1 Filed 04/09/20 Page 1 of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ase 1:20-cv-00929-RDB Document 2-1 Filed 04/09/20 Page 2 of 44 $)80%',-'+,"$%"$(' ' ,#*!"'()'#+,`(%-,-"&'1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111'66! -5,%($+4,-(5'111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111'Q! )#4,+#!'*#4D.%(+5$'111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111'<! -1! 37B6;96FFI'111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111'<!