Wikileaks, the Global Fourth Estate History Is Happening

Total Page:16

File Type:pdf, Size:1020Kb

Wikileaks, the Global Fourth Estate History Is Happening WikiLeaks, the Global Fourth Estate History Is Happening WikiLeaks, the Global Fourth Estate History Is Happening - Nozomi Hayase © 2018 Nozomi Hayase All rights reserved. ISBN: 1984027182 ISBN 13: 9781984027184 Cover design by Somerset Bean Credit: Inspiration for the book’s subtitle, “History Is Happening,” is derived from the motto of The Juice Media. Dedicated to the youth who grew up on the Internet. The future of civilization depends on acts of courage inspired by the heart. “Who controls the past controls the future: who controls the present controls the past.” —George Orwell1 Contents Preface: History Has Awakened · · · · · · · · · · · · · · · · · · · · xiii Chapter 1 The Rise of New Journalism . 1 Chapter 2 Freedom of Speech in the Age of WikiLeaks . 8 Chapter 3 The Effect of WikiLeaks in the Stadium of Democracy . .15 Chapter 4 Redefining Power . 20 Chapter 5 Revolutionary Journalism in a Time of Universal Deceit . 26 Chapter 6 “Terrorist” by Association, Assange’s Lawyer on the Watch List . 36 Chapter 7 Activist or Journalist? Pulling a Yes Men on Bill Keller . .41 Chapter 8 We Are All Enemies of the State . .45 Chapter 9 Inside the Hourglass . .56 Chapter 10 Whistleblowers at the Frontier of Digital Liberation . .59 Chapter 11 The Unsung Hero of the NSA Revelations . .71 Chapter 12 Defeating the Conspiracy of Governance . .75 Chapter 13 The First Amendment Revolution . .89 Chapter 14 When Google Met WikiLeaks . .98 Chapter 15 Countering the Banality of Evil . .108 Chapter 16 Sixth Anniversary of “Collateral Murder” Video . 115 Chapter 17 Standing with the Conscience of Truth-Tellers . .120 Chapter 18 Ten Years of Pushing the Boundaries of Free Speech . .127 Chapter 19 Controversy over Podesta Emails Opens a Debate for Future Journalism . .137 Chapter 20 Filling the Phantom of Democracy with Our Networked Power . .146 Chapter 21 Vault 7, CIA Cyberwar and the Battleground of Democracy . .152 Chapter 22 Prosecution of Assange Is Persecution of Free Speech . .159 Chapter 23 From Gandhi to Catalans, the Revolutionary Movement of Peacemakers . .164 Afterword: History Is Happening · · · · · · · · · · · · · · · · · ·173 Notes · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · ·175 Acknowledgments · · · · · · · · · · · · · · · · · · · · · · · · · · · · · ·233 PREFACE History Has Awakened - April 2010 was a typical spring day in San Francisco. The world I knew was about to change. The WikiLeaks publication of the “Collateral Murder” video became an international sensation. The cruel scenery in an Iraqi suburb viewed from a US military helicopter gunsight was laid bare for the whole world to see. The uncensored face of modern war lifted the dark cloud of apathy in the post-9/11 world, opening a crack in public consciousness. The new vocabu- lary of transparency and government secrecy entered into everyday discourse. Along with it came the notion of “illegitimate governance.” At key moments in history, the right term captures a zeitgeist, guiding the world in a new di- rection. Illegitimate governance became one such term. WikiLeaks, with its method of transparency, revealed a gap between ide- als and reality and made it possible for people to have a more honest account of history. The meaning of a leak can be fully understood with the philosophi- cal foundation of humanity as a species that lives in time and space. We are historical beings. We process information in a context that is built from the past. Our interpretation of past events informs our actions, influencing the trajectory of the future. For so long, our right to exist historically—to participate in a discourse of civilization—has been denied for so many. Democracy was a promise and aspiration to acknowledge that each person ought to participate in under- standing historical events and that the consensus of ordinary people could guide the direction of society. Yet democracy has become an empty word, and people are relegated to being merely spectators. The system of representation has become a shield that conceals and guards elite interests. People have been kept in the dark. The perspective of the few, bypassing democratic consensus, has become accepted as an official narrative. WikiLeaks brought an end to this dark age. Through releasing informa- tion that belongs to the public, the organization began bringing historical records back to civilization. In a sense, by opening archives, WikiLeaks freed people from a stolen history that repeats abuses of the past. Leaked docu- ments allow us to look at past events anew and restore perspectives that were oppressed and pushed to the margins. Released documents helped everyday people to participate in shaping the course of their own destiny. I was one of these ordinary people who witnessed this tidal shift of balance of power. I am one of countless others who were inspired, empowered, and whose life was changed by WikiLeaks. This book is a collection of articles that I wrote from 2010 through 2017 about WikiLeaks. I tried to capture the effect of this organization, not just on journalism but also on the future of democracy and civilization at large. I put the articles in chronological order with publication date to docu- ment the historical unfolding. I kept the text to maintain authenticity, except with minor editing for readability and orientation in time, including shorten- ing some of the articles. Only through entering into the present, with our uncompromising power of imagination, can we change the course of history. WikiLeaks is a media for all people. It invites everyone to join the front lines of history that is hap- pening. It is my hope that this chronicle can contribute to narratives of this pivotal time in history when the birth of this global Fourth Estate changed the world forever. CHAPTER 1 The Rise of New Journalism AUGUST 21, 2010 - In the spring of 2010, the unknown whistleblowing website was thrust onto the world stage with the release of a cockpit video from a 2007 Apache gun- ship attack in Baghdad. WikiLeaks called this sensational video “Collateral Murder.”1 It opened with a quote from George Orwell’s 1984 and depicted the US military gunning down Iraqi civilians and Reuters reporters on a street in Baghdad. As the controversy over the video boiled over, attention was directed at WikiLeaks, with the US security establishment coming out with rhetorical guns blazing, trying to shoot the messenger and avert attention from the mes- sage itself. WikiLeaks brought polarizing reactions. Despite the establishment’s ef- forts to paint the organization in a negative light, many saw WikiLeaks as a positive development toward transparency and accountability of those in power. On one hand, the organization became an instant hero as a champion of open government. On the other, some perceived these leaks as a threat to the national security state and that WikiLeaks’ releases of war documents were putting lives in danger. The primary criticism has come mostly from US government leaders and from Americans, who are insulated by the mainstream corporate media. WikiLeaks’ editing of the video, and especially the naming of it, became a center of scrutiny. Some viewed it as a slant put out to manipulate the public. 1 Nozomi Hayase Collateral damage vs. collateral murder One might recall Julian Assange’s interview on Comedy Central’s Colbert Report back in 2010 where Colbert challenged Assange in a sarcastic tone on the framing of the “Collateral Murder” video.2 Colbert, playing the role of a stereotypical right-wing character, said, “You have given it a title called ‘Collateral Murder.’ That’s not leaking, that’s a pure editorial.” To which Assange responded, “The promise that we make to our sources is that . we will attempt to get the maximum political impact for the materials they give to us.” Colbert continued, “That way you have manipulated the audience into the emotional state you want before something goes on the air. That is an emotional manipulation. .” Then, tongue-in-cheek, he said, “That’s journalism I can get behind.” Colbert’s satire was taken as real by some, and for them WikiLeaks’ action seemed to be intentional manipulation. Was the editing and naming of the video an act of deception? The term “collateral murder” had a strong effect, triggering shock in some people. When one carefully examines people’s reactions not only to the video but also to the way it was edited, a lot can be revealed about their position and perspective in the matter. In the article “Manning & WikiLeaks Are True Patriots by Definition,” Dallas GoldBug examined a controversial question related to the ethics of whistleblowers—namely, whether they should be pros- ecuted for their actions or not. He said, “The answer to this would perceivably be different depending on what side of the pond you call home.”3 This home is one’s foundational framework through which one perceives the world and is something that one is often not aware of. This titling by WikiLeaks broke down the habitual patterns of viewing reality. Many of us were used to hearing the term “collateral damage.” This is a commonly accepted euphemism coined by the military that refers to inno- cent civilians being injured or killed. This word reveals a certain perspective. The USAF (United States Air Force) Intelligence Targeting Guide defines the term as the “unintentional or incidental damage affecting facilities, equip- ment or personnel, occurring as a result of military actions directed against targeted enemy forces or facilities. Such damage
Recommended publications
  • How Laura Poitras Helped Snowden Spill His Secrets
    How Laura Poitras Helped Snowden Spill His Secrets Documentary filmmaker Laura Poitras in Berlin. By PETER MAASS Published: August 13, 2013 This past January, Laura Poitras received a curious e-mail from an anonymous stranger requesting her public encryption key. For almost two years, Poitras had been working on a documentary about surveillance, and she occasionally received queries from strangers. She replied to this one and sent her public key — allowing him or her to send an encrypted e-mail that only Poitras could open, with her private key — but she didn’t think much would come of it. The stranger responded with instructions for creating an even more secure system to protect their exchanges. Promising sensitive information, the stranger told Poitras to select long pass phrases that could withstand a brute-force attack by networked computers. “Assume that your adversary is capable of a trillion guesses per second,” the stranger wrote. Before long, Poitras received an encrypted message that outlined a number of secret surveillance programs run by the government. She had heard of one of them but not the others. After describing each program, the stranger wrote some version of the phrase, “This I can prove.” 1 From www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html?hpw 20 August 2013 Seconds after she decrypted and read the e-mail, Poitras disconnected from the Internet and removed the message from her computer. “I thought, O.K., if this is true, my life just changed,” she told me last month. “It was staggering, what he claimed to know and be able to provide.
    [Show full text]
  • UC Riverside UC Riverside Electronic Theses and Dissertations
    UC Riverside UC Riverside Electronic Theses and Dissertations Title Sonic Retro-Futures: Musical Nostalgia as Revolution in Post-1960s American Literature, Film and Technoculture Permalink https://escholarship.org/uc/item/65f2825x Author Young, Mark Thomas Publication Date 2015 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA RIVERSIDE Sonic Retro-Futures: Musical Nostalgia as Revolution in Post-1960s American Literature, Film and Technoculture A Dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in English by Mark Thomas Young June 2015 Dissertation Committee: Dr. Sherryl Vint, Chairperson Dr. Steven Gould Axelrod Dr. Tom Lutz Copyright by Mark Thomas Young 2015 The Dissertation of Mark Thomas Young is approved: Committee Chairperson University of California, Riverside ACKNOWLEDGEMENTS As there are many midwives to an “individual” success, I’d like to thank the various mentors, colleagues, organizations, friends, and family members who have supported me through the stages of conception, drafting, revision, and completion of this project. Perhaps the most important influences on my early thinking about this topic came from Paweł Frelik and Larry McCaffery, with whom I shared a rousing desert hike in the foothills of Borrego Springs. After an evening of food, drink, and lively exchange, I had the long-overdue epiphany to channel my training in musical performance more directly into my academic pursuits. The early support, friendship, and collegiality of these two had a tremendously positive effect on the arc of my scholarship; knowing they believed in the project helped me pencil its first sketchy contours—and ultimately see it through to the end.
    [Show full text]
  • Ethics in Photojournalism: Past, Present, and Future
    Ethics in Photojournalism: Past, Present, and Future By Daniel R. Bersak S.B. Comparative Media Studies & Electrical Engineering/Computer Science Massachusetts Institute of Technology, 2003 SUBMITTED TO THE DEPARTMENT OF COMPARATIVE MEDIA STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPARATIVE MEDIA STUDIES AT THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY SEPTEMBER, 2006 Copyright 2006 Daniel R. Bersak, All Rights Reserved The author hereby grants to MIT permission to reproduce and distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature of Author: _____________________________________________________ Department of Comparative Media Studies, August 11, 2006 Certified By: ___________________________________________________________ Edward Barrett Senior Lecturer, Department of Writing Thesis Supervisor Accepted By: __________________________________________________________ William Uricchio Professor of Comparative Media Studies Director Ethics In Photojournalism: Past, Present, and Future By Daniel R. Bersak Submitted to the Department of Comparative Media Studies, School of Humanities, Arts, and Social Sciences on August 11, 2006, in partial fulfillment of the requirements for the degree of Master of Science in Comparative Media Studies Abstract Like writers and editors, photojournalists are held to a standard of ethics. Each publication has a set of rules, sometimes written, sometimes unwritten, that governs what that publication considers to be a truthful and faithful representation of images to the public. These rules cover a wide range of topics such as how a photographer should act while taking pictures, what he or she can and can’t photograph, and whether and how an image can be altered in the darkroom or on the computer.
    [Show full text]
  • Government Hacking What Is It and When Should It Be Used?
    Government Hacking What is it and when should it be used? Encryption is a critical component of our day-to-day lives. For much of the world, basic aspects of life rely on encryption to function. Power systems, transport, financial markets, and baby monitors1 are more trustworthy because of encryption. Encryption protects our most vulnerable data from criminals and terrorists, but it can also hide criminal content from governments. Government hacking is one of the approaches national security and law enforcement agencies use to obtain access to otherwise encrypted information (e.g. the FBI hired a hacking company to unlock the iPhone at the center of the San Bernardino case2). It complements their other efforts to obtain exceptional access3 by asking or requiring tech companies to have the technical ability to decrypt users’ content when it is needed for law enforcement purposes. The Internet Society believes strong encryption is vital to the health of the Internet and is deeply concerned about any policy or action that might put that in jeopardy — regardless of its motivation. Government hacking poses a risk of collateral damage to both the Internet and its users, and as such should only ever be considered as a tool of last resort. Government hacking defined We define ‘government hacking’ as government entities (e.g. national security or law enforcement agencies or private actors on their behalf) exploiting vulnerabilities in systems, software, or hardware to gain access to information that is otherwise encrypted, or inaccessible. Dangers of government hacking Exploiting vulnerabilities of any kind, whether for law enforcement purposes, security testing, or any other purpose, should not be taken lightly.
    [Show full text]
  • Martin Kragh Är Ett Demokratiskt Problem” Hur Aftonbladet Gav Spridning Åt En Rysk Påverkansoperation
    419 ” Martin Kragh är ett demokratiskt problem” Hur Aftonbladet gav spridning åt en rysk påverkansoperation Martin Kragh Abstract On 7 February 2019 the largest evening paper in the Nordic countries, Aftonbladet, published an article on the scholar Martin Kragh, head of the Russia and Eurasia Programme at the Swedish Institute of International Affairs in Stockholm and researcher at Uppsala University. Kragh, according to Aftonbladet, was allegedly working for “a covert state intelligence organization in Great Britain,” and he should therefore be investigated “by Swedish media and the security police.” The problem with Aftonbladet’s claims is that they are false, and that they with a high degree of confidence had their origin in a Russian influence operation against the British think tank Institute for Statecraft. Using quantitative and qualitative method, this article analyses the origins and diffusion of the campaign internationally and in Sweden as an informational cascade. Inledning Den 7 februari 2019 publicerar Aftonbladet, Nordens största kvällstidning, en artikel om Martin Kragh, chef för Rysslands- och Eurasienprogrammet vid Utrikespolitiska institutet i Stockholm och forskare vid Institutet för Rysslands- och Eurasienstudier vid Uppsala universitet. Kragh, påstår Aftonbladet, har visat sig arbeta för ”en hemlig, statlig säkerhetsorganisation i Storbritannien”, och han borde därför utredas ”av svenska medier och säkerhetspolis” (Aftonbladet 2019a). Argumentationen följs upp den 12 februari, där det hävdas att ”enligt läckta dokument som brittisk press tar på allvar, misstänks Kragh arbeta för främmande makt, närmare bestämt den brittiska underrättelsetjänsten”, och Martin Kragh är docent i ekonomisk historia, forskare vid Institutet för Rysslands- och Eurasienstudier vid Uppsala universitet och chef för Rysslands- och Eurasienprogrammet vid Utrikespolitiska institutet.
    [Show full text]
  • Swedish Film New Docs #3 2012
    Swedish Film NEW DOCS FALL 2012 / WINTER 2013 After You The Clip Colombianos Dare Remember Days of Maremma Everyone Is Older Than I Am Fanny, Alexander & I For You Naked Give Us the Money Le manque The Man Behind the Throne Martha & Niki No Burqas Behind Bars Palme The Sarnos She Male Snails She’s Staging It Sing, Sing Louder Storm In the Andes The Stripper TPB AFK Tzvetanka The Weather War The Wild Ones Welcome to the world of Swedish docs! This year has been a real success, starting at the Sundance Film Festival where Big Boys Gone Bananas!* by Fredrik Gertten and Searching for Sugar Man by Malik Bendjelloul competed and Sugar Man got both the Audience Award and the Jury Special Prize. These two titles are now up for the Oscar nomination run. Domestically we’ve had the best year in the cinemas for Swedish docs since 1979. Titles like Palme by Kristina Lindström and Maud Nycander with an audience over 150.000, and still growing, Searching for Sugar Man, For You Naked by Sara Broos and She Male Snails by Ester Martin Bergsmark have all attracted large audiences. The film critics are also overwhelmed; of all Swedish films that premiered during 2012 so far, five docs are at the top! And more is to come, you now hold in your hands the new issue of Swedish Film with 24 new feature documentaries, ready to hit international festivals and markets such as DOK Leipzig, CPH:DOX and IDFA. Please visit our website www.sfi.se for updated information on Swedish features, documentaries and shorts.
    [Show full text]
  • The Use of Prior Restraints on Publication in the Age of Wikileaks
    35 6 June 2018 Patent Volume 35 ▲ Number 6 ▲ JUNE 2018 Ronald L. Johnston, Arnold & Porter, LLP, Editor-in-Chief The Use of Prior Restraints on Publication in the Age of Wikileaks By CJ Griffin and Frank Corrado s James Madison put it, “A popular Government, The rationale for that principle is simple: If the gov- Awithout popular information, or the means of ernment can ban publication of speech, it can control acquiring it, is but a Prologue to a Farce or a Tragedy; or, what the public knows about governmental operations perhaps both. Knowledge will forever govern ignorance: and thereby deprive citizens of their ability to make And a people who mean to be their own Governors, intelligent decisions about governmental action. Too must arm themselves with the power which knowl- often, government favors secrecy over disclosure. The edge gives.”1 Free speech is essential to effective self- presumption against prior restraints ensures that officials government. A democracy cannot function if its citi- cannot indulge that propensity. It prevents the govern- zens do not know what their government is doing. ment from enjoining purportedly “secret” or “sensitive” For that reason, the First Amendment significantly information that may really be embarrassing, unsavory, limits the government’s ability to control the flow or indicative of government illegality or abuse. of information to the public. In particular, the First Of course, legitimate reasons exist for government Amendment renders prior restraints on speech pre- secrecy. As the Supreme Court said in Near v. Minne- sumptively unconstitutional.2 Even if the government sota,3 the seminal case on prior restraints, “no one would could punish the speech after the fact, it cannot—absent question but that a government might prevent actual a heavy burden of justification—prohibit the publica- obstruction to its recruiting service or the publica- tion of that speech.
    [Show full text]
  • Combatting Fake News
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Southern Methodist University Science and Technology Law Review Volume 20 | Number 2 Article 17 2017 Combatting Fake News: Alternatives to Limiting Social Media Misinformation and Rehabilitating Quality Journalism Dallas Flick Southern Methodist University, [email protected] Follow this and additional works at: https://scholar.smu.edu/scitech Part of the Internet Law Commons Recommended Citation Dallas Flick, Combatting Fake News: Alternatives to Limiting Social Media Misinformation and Rehabilitating Quality Journalism, 20 SMU Sci. & Tech. L. Rev. 375 (2017) https://scholar.smu.edu/scitech/vol20/iss2/17 This Comment is brought to you for free and open access by the Law Journals at SMU Scholar. It has been accepted for inclusion in Science and Technology Law Review by an authorized administrator of SMU Scholar. For more information, please visit http://digitalrepository.smu.edu. Combatting Fake News: Alternatives to Limiting Social Media Misinformation and Rehabilitating Quality Journalism Dallas Flick* I. INTRODUCTION The continued expansion and development of the Internet has generated a malicious side effect: social media intermediaries such as Facebook and Google permit the dispersion of third-party generated fake news and misin- formation. While the term “fake news” tends to shift in definition, it most frequently denotes blatantly false information posted on the Internet intended to sway opinion.1 The social and political implications for
    [Show full text]
  • Govts Seek Facebook Info
    SUBSCRIPTION WEDNESDAY, AUGUST 28, 2013 SHAWWAL 21, 1434 AH www.kuwaittimes.net Brotherhood US heat wave Wildfire rages on, Arsenal in CL leader denies prompts early threatens San for 16th ‘terror’ 7claims school10 dismissals Francisco10 water straight20 year Max 45º ‘Ready to hit’ Min 31º High Tide 03:48 & 17:31 West powers could attack Syria ‘in days’ Low Tide 11:01 & 22:52 40 PAGES NO: 15911 150 FILS AMMAN: Western powers could attack Syria within days, envoys from the United States and its allies have told rebels fighting President Bashar Al-Assad, sources who attended the meeting said yesterday. US forces in the region are “ready to go”, Defense Secretary Chuck Hagel said, as Washington and its European and Middle Eastern partners honed plans to punish Assad for a major poison gas attack last week that killed hundreds of civilians. Several sources who attended a meeting in Istanbul on Monday between Syrian opposition leaders and diplomats from Washington and other governments said that the rebels were told to expect military action and to get ready to negotiate a peace. “The opposition was told in clear terms that action to deter further use of chemical weapons by the Assad regime could come as early as in the next few days, and that they should still prepare for peace talks at Geneva,” one of the sources said. Ahmad Jarba, president of the Syrian National Coalition, met envoys from 11 states in the Friends of Syria group, including Robert Ford, the US ambassador to Syria, at an Istanbul hotel. United Nations chemical weapons investigators, who finally crossed the frontline to take samples on Monday, put off a second trip to rebel-held suburbs of Damascus.
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • The Nsa's Prism Program and the New Eu Privacy Regulation: Why U.S
    American University Business Law Review Volume 3 | Issue 2 Article 5 2013 The SN A'S Prism Program And The ewN EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble Juhi Tariq American University Washington College of Law Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the International Law Commons, and the Internet Law Commons Recommended Citation Tariq, Juhi "The SAN 'S Prism Program And The eN w EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble," American University Business Law Review, Vol. 3, No. 2 (2018) . Available at: http://digitalcommons.wcl.american.edu/aublr/vol3/iss2/5 This Note is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized editor of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTE THE NSA'S PRISM PROGRAM AND THE NEW EU PRIVACY REGULATION: WHY U.S. COMPANIES WITH A PRESENCE IN THE EU COULD BE IN TROUBLE JUHI TARIQ* Recent revelations about a clandestine data surveillance program operated by the NSA, Planning Tool for Resource Integration, Synchronization, and Management ("PRISM'), and a stringent proposed European Union ("EU") data protection regulation, will place U.S. companies with a businesspresence in EU member states in a problematic juxtaposition. The EU Proposed General Data Protection Regulation stipulates that a company can be fined up to two percent of its global revenue for misuse of users' data and requires the consent of data subjects prior to access.
    [Show full text]
  • George Thorley Class 12 Project
    SURVEILLANCE !1 Surveillance Watch The Many, To Catch The Few George J. Thorley Norwich Steiner School Author Note George J. Thorley, Level 3 Steiner School Certificate, Norwich Steiner School. This report is the piece of work required for the Steiner School Certificate Level 3 Class 12 Project. Correspondence concerning this report should be addressed to George Thorley, Norwich Steiner School, Hospital Lane, Norwich, NR1 2HW. Contact: [email protected] 11 - 05 - 2017 SURVEILLANCE !2 Contents Title 1 Summary 3 Introduction 4 Historical Context 5 9/11 7 USA PATRIOT Act 2001 8 Presidents Surveillance Program 10 The Timeline 12 Edward J Snowden 16 Prism 17 Tempora 20 Treasure Map 21 Conclusion 23 Diagrams 26 References 27 11 - 05 - 2017 SURVEILLANCE !3 Summary In this report, my main question will be: What was the extent of government mass surveillance, in particular the NSA in the United States, running from the September 11 attacks in 2001, to the Edward Snowden revelations in 2013? In answering this I will focus on how public and political feelings prompted the conditions possible for the security forces to be doing what they do in todays world. In particular, I will be looking at the National Security Agency (NSA) in the United States (US) and some of the revelations brought forward by Edward Snowden in 2013, along with the scale of involvement of the United Kingdom’s (UK) Government Communication Headquarters (GCHQ). I will then look at some of the fundamental questions that surround the world of mass surveillance, such as the effectiveness of the programs that were acted upon by security agencies, who they were really looking for, and whether, in my eyes, their methods were morally right.
    [Show full text]