Wikileaks, the Global Fourth Estate History Is Happening
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How Laura Poitras Helped Snowden Spill His Secrets
How Laura Poitras Helped Snowden Spill His Secrets Documentary filmmaker Laura Poitras in Berlin. By PETER MAASS Published: August 13, 2013 This past January, Laura Poitras received a curious e-mail from an anonymous stranger requesting her public encryption key. For almost two years, Poitras had been working on a documentary about surveillance, and she occasionally received queries from strangers. She replied to this one and sent her public key — allowing him or her to send an encrypted e-mail that only Poitras could open, with her private key — but she didn’t think much would come of it. The stranger responded with instructions for creating an even more secure system to protect their exchanges. Promising sensitive information, the stranger told Poitras to select long pass phrases that could withstand a brute-force attack by networked computers. “Assume that your adversary is capable of a trillion guesses per second,” the stranger wrote. Before long, Poitras received an encrypted message that outlined a number of secret surveillance programs run by the government. She had heard of one of them but not the others. After describing each program, the stranger wrote some version of the phrase, “This I can prove.” 1 From www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html?hpw 20 August 2013 Seconds after she decrypted and read the e-mail, Poitras disconnected from the Internet and removed the message from her computer. “I thought, O.K., if this is true, my life just changed,” she told me last month. “It was staggering, what he claimed to know and be able to provide. -
UC Riverside UC Riverside Electronic Theses and Dissertations
UC Riverside UC Riverside Electronic Theses and Dissertations Title Sonic Retro-Futures: Musical Nostalgia as Revolution in Post-1960s American Literature, Film and Technoculture Permalink https://escholarship.org/uc/item/65f2825x Author Young, Mark Thomas Publication Date 2015 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA RIVERSIDE Sonic Retro-Futures: Musical Nostalgia as Revolution in Post-1960s American Literature, Film and Technoculture A Dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in English by Mark Thomas Young June 2015 Dissertation Committee: Dr. Sherryl Vint, Chairperson Dr. Steven Gould Axelrod Dr. Tom Lutz Copyright by Mark Thomas Young 2015 The Dissertation of Mark Thomas Young is approved: Committee Chairperson University of California, Riverside ACKNOWLEDGEMENTS As there are many midwives to an “individual” success, I’d like to thank the various mentors, colleagues, organizations, friends, and family members who have supported me through the stages of conception, drafting, revision, and completion of this project. Perhaps the most important influences on my early thinking about this topic came from Paweł Frelik and Larry McCaffery, with whom I shared a rousing desert hike in the foothills of Borrego Springs. After an evening of food, drink, and lively exchange, I had the long-overdue epiphany to channel my training in musical performance more directly into my academic pursuits. The early support, friendship, and collegiality of these two had a tremendously positive effect on the arc of my scholarship; knowing they believed in the project helped me pencil its first sketchy contours—and ultimately see it through to the end. -
Ethics in Photojournalism: Past, Present, and Future
Ethics in Photojournalism: Past, Present, and Future By Daniel R. Bersak S.B. Comparative Media Studies & Electrical Engineering/Computer Science Massachusetts Institute of Technology, 2003 SUBMITTED TO THE DEPARTMENT OF COMPARATIVE MEDIA STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPARATIVE MEDIA STUDIES AT THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY SEPTEMBER, 2006 Copyright 2006 Daniel R. Bersak, All Rights Reserved The author hereby grants to MIT permission to reproduce and distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature of Author: _____________________________________________________ Department of Comparative Media Studies, August 11, 2006 Certified By: ___________________________________________________________ Edward Barrett Senior Lecturer, Department of Writing Thesis Supervisor Accepted By: __________________________________________________________ William Uricchio Professor of Comparative Media Studies Director Ethics In Photojournalism: Past, Present, and Future By Daniel R. Bersak Submitted to the Department of Comparative Media Studies, School of Humanities, Arts, and Social Sciences on August 11, 2006, in partial fulfillment of the requirements for the degree of Master of Science in Comparative Media Studies Abstract Like writers and editors, photojournalists are held to a standard of ethics. Each publication has a set of rules, sometimes written, sometimes unwritten, that governs what that publication considers to be a truthful and faithful representation of images to the public. These rules cover a wide range of topics such as how a photographer should act while taking pictures, what he or she can and can’t photograph, and whether and how an image can be altered in the darkroom or on the computer. -
Government Hacking What Is It and When Should It Be Used?
Government Hacking What is it and when should it be used? Encryption is a critical component of our day-to-day lives. For much of the world, basic aspects of life rely on encryption to function. Power systems, transport, financial markets, and baby monitors1 are more trustworthy because of encryption. Encryption protects our most vulnerable data from criminals and terrorists, but it can also hide criminal content from governments. Government hacking is one of the approaches national security and law enforcement agencies use to obtain access to otherwise encrypted information (e.g. the FBI hired a hacking company to unlock the iPhone at the center of the San Bernardino case2). It complements their other efforts to obtain exceptional access3 by asking or requiring tech companies to have the technical ability to decrypt users’ content when it is needed for law enforcement purposes. The Internet Society believes strong encryption is vital to the health of the Internet and is deeply concerned about any policy or action that might put that in jeopardy — regardless of its motivation. Government hacking poses a risk of collateral damage to both the Internet and its users, and as such should only ever be considered as a tool of last resort. Government hacking defined We define ‘government hacking’ as government entities (e.g. national security or law enforcement agencies or private actors on their behalf) exploiting vulnerabilities in systems, software, or hardware to gain access to information that is otherwise encrypted, or inaccessible. Dangers of government hacking Exploiting vulnerabilities of any kind, whether for law enforcement purposes, security testing, or any other purpose, should not be taken lightly. -
Martin Kragh Är Ett Demokratiskt Problem” Hur Aftonbladet Gav Spridning Åt En Rysk Påverkansoperation
419 ” Martin Kragh är ett demokratiskt problem” Hur Aftonbladet gav spridning åt en rysk påverkansoperation Martin Kragh Abstract On 7 February 2019 the largest evening paper in the Nordic countries, Aftonbladet, published an article on the scholar Martin Kragh, head of the Russia and Eurasia Programme at the Swedish Institute of International Affairs in Stockholm and researcher at Uppsala University. Kragh, according to Aftonbladet, was allegedly working for “a covert state intelligence organization in Great Britain,” and he should therefore be investigated “by Swedish media and the security police.” The problem with Aftonbladet’s claims is that they are false, and that they with a high degree of confidence had their origin in a Russian influence operation against the British think tank Institute for Statecraft. Using quantitative and qualitative method, this article analyses the origins and diffusion of the campaign internationally and in Sweden as an informational cascade. Inledning Den 7 februari 2019 publicerar Aftonbladet, Nordens största kvällstidning, en artikel om Martin Kragh, chef för Rysslands- och Eurasienprogrammet vid Utrikespolitiska institutet i Stockholm och forskare vid Institutet för Rysslands- och Eurasienstudier vid Uppsala universitet. Kragh, påstår Aftonbladet, har visat sig arbeta för ”en hemlig, statlig säkerhetsorganisation i Storbritannien”, och han borde därför utredas ”av svenska medier och säkerhetspolis” (Aftonbladet 2019a). Argumentationen följs upp den 12 februari, där det hävdas att ”enligt läckta dokument som brittisk press tar på allvar, misstänks Kragh arbeta för främmande makt, närmare bestämt den brittiska underrättelsetjänsten”, och Martin Kragh är docent i ekonomisk historia, forskare vid Institutet för Rysslands- och Eurasienstudier vid Uppsala universitet och chef för Rysslands- och Eurasienprogrammet vid Utrikespolitiska institutet. -
Swedish Film New Docs #3 2012
Swedish Film NEW DOCS FALL 2012 / WINTER 2013 After You The Clip Colombianos Dare Remember Days of Maremma Everyone Is Older Than I Am Fanny, Alexander & I For You Naked Give Us the Money Le manque The Man Behind the Throne Martha & Niki No Burqas Behind Bars Palme The Sarnos She Male Snails She’s Staging It Sing, Sing Louder Storm In the Andes The Stripper TPB AFK Tzvetanka The Weather War The Wild Ones Welcome to the world of Swedish docs! This year has been a real success, starting at the Sundance Film Festival where Big Boys Gone Bananas!* by Fredrik Gertten and Searching for Sugar Man by Malik Bendjelloul competed and Sugar Man got both the Audience Award and the Jury Special Prize. These two titles are now up for the Oscar nomination run. Domestically we’ve had the best year in the cinemas for Swedish docs since 1979. Titles like Palme by Kristina Lindström and Maud Nycander with an audience over 150.000, and still growing, Searching for Sugar Man, For You Naked by Sara Broos and She Male Snails by Ester Martin Bergsmark have all attracted large audiences. The film critics are also overwhelmed; of all Swedish films that premiered during 2012 so far, five docs are at the top! And more is to come, you now hold in your hands the new issue of Swedish Film with 24 new feature documentaries, ready to hit international festivals and markets such as DOK Leipzig, CPH:DOX and IDFA. Please visit our website www.sfi.se for updated information on Swedish features, documentaries and shorts. -
The Use of Prior Restraints on Publication in the Age of Wikileaks
35 6 June 2018 Patent Volume 35 ▲ Number 6 ▲ JUNE 2018 Ronald L. Johnston, Arnold & Porter, LLP, Editor-in-Chief The Use of Prior Restraints on Publication in the Age of Wikileaks By CJ Griffin and Frank Corrado s James Madison put it, “A popular Government, The rationale for that principle is simple: If the gov- Awithout popular information, or the means of ernment can ban publication of speech, it can control acquiring it, is but a Prologue to a Farce or a Tragedy; or, what the public knows about governmental operations perhaps both. Knowledge will forever govern ignorance: and thereby deprive citizens of their ability to make And a people who mean to be their own Governors, intelligent decisions about governmental action. Too must arm themselves with the power which knowl- often, government favors secrecy over disclosure. The edge gives.”1 Free speech is essential to effective self- presumption against prior restraints ensures that officials government. A democracy cannot function if its citi- cannot indulge that propensity. It prevents the govern- zens do not know what their government is doing. ment from enjoining purportedly “secret” or “sensitive” For that reason, the First Amendment significantly information that may really be embarrassing, unsavory, limits the government’s ability to control the flow or indicative of government illegality or abuse. of information to the public. In particular, the First Of course, legitimate reasons exist for government Amendment renders prior restraints on speech pre- secrecy. As the Supreme Court said in Near v. Minne- sumptively unconstitutional.2 Even if the government sota,3 the seminal case on prior restraints, “no one would could punish the speech after the fact, it cannot—absent question but that a government might prevent actual a heavy burden of justification—prohibit the publica- obstruction to its recruiting service or the publica- tion of that speech. -
Combatting Fake News
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Southern Methodist University Science and Technology Law Review Volume 20 | Number 2 Article 17 2017 Combatting Fake News: Alternatives to Limiting Social Media Misinformation and Rehabilitating Quality Journalism Dallas Flick Southern Methodist University, [email protected] Follow this and additional works at: https://scholar.smu.edu/scitech Part of the Internet Law Commons Recommended Citation Dallas Flick, Combatting Fake News: Alternatives to Limiting Social Media Misinformation and Rehabilitating Quality Journalism, 20 SMU Sci. & Tech. L. Rev. 375 (2017) https://scholar.smu.edu/scitech/vol20/iss2/17 This Comment is brought to you for free and open access by the Law Journals at SMU Scholar. It has been accepted for inclusion in Science and Technology Law Review by an authorized administrator of SMU Scholar. For more information, please visit http://digitalrepository.smu.edu. Combatting Fake News: Alternatives to Limiting Social Media Misinformation and Rehabilitating Quality Journalism Dallas Flick* I. INTRODUCTION The continued expansion and development of the Internet has generated a malicious side effect: social media intermediaries such as Facebook and Google permit the dispersion of third-party generated fake news and misin- formation. While the term “fake news” tends to shift in definition, it most frequently denotes blatantly false information posted on the Internet intended to sway opinion.1 The social and political implications for -
Govts Seek Facebook Info
SUBSCRIPTION WEDNESDAY, AUGUST 28, 2013 SHAWWAL 21, 1434 AH www.kuwaittimes.net Brotherhood US heat wave Wildfire rages on, Arsenal in CL leader denies prompts early threatens San for 16th ‘terror’ 7claims school10 dismissals Francisco10 water straight20 year Max 45º ‘Ready to hit’ Min 31º High Tide 03:48 & 17:31 West powers could attack Syria ‘in days’ Low Tide 11:01 & 22:52 40 PAGES NO: 15911 150 FILS AMMAN: Western powers could attack Syria within days, envoys from the United States and its allies have told rebels fighting President Bashar Al-Assad, sources who attended the meeting said yesterday. US forces in the region are “ready to go”, Defense Secretary Chuck Hagel said, as Washington and its European and Middle Eastern partners honed plans to punish Assad for a major poison gas attack last week that killed hundreds of civilians. Several sources who attended a meeting in Istanbul on Monday between Syrian opposition leaders and diplomats from Washington and other governments said that the rebels were told to expect military action and to get ready to negotiate a peace. “The opposition was told in clear terms that action to deter further use of chemical weapons by the Assad regime could come as early as in the next few days, and that they should still prepare for peace talks at Geneva,” one of the sources said. Ahmad Jarba, president of the Syrian National Coalition, met envoys from 11 states in the Friends of Syria group, including Robert Ford, the US ambassador to Syria, at an Istanbul hotel. United Nations chemical weapons investigators, who finally crossed the frontline to take samples on Monday, put off a second trip to rebel-held suburbs of Damascus. -
JULIAN ASSANGE: When Google Met Wikileaks
JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton... -
The Nsa's Prism Program and the New Eu Privacy Regulation: Why U.S
American University Business Law Review Volume 3 | Issue 2 Article 5 2013 The SN A'S Prism Program And The ewN EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble Juhi Tariq American University Washington College of Law Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the International Law Commons, and the Internet Law Commons Recommended Citation Tariq, Juhi "The SAN 'S Prism Program And The eN w EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble," American University Business Law Review, Vol. 3, No. 2 (2018) . Available at: http://digitalcommons.wcl.american.edu/aublr/vol3/iss2/5 This Note is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized editor of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTE THE NSA'S PRISM PROGRAM AND THE NEW EU PRIVACY REGULATION: WHY U.S. COMPANIES WITH A PRESENCE IN THE EU COULD BE IN TROUBLE JUHI TARIQ* Recent revelations about a clandestine data surveillance program operated by the NSA, Planning Tool for Resource Integration, Synchronization, and Management ("PRISM'), and a stringent proposed European Union ("EU") data protection regulation, will place U.S. companies with a businesspresence in EU member states in a problematic juxtaposition. The EU Proposed General Data Protection Regulation stipulates that a company can be fined up to two percent of its global revenue for misuse of users' data and requires the consent of data subjects prior to access. -
George Thorley Class 12 Project
SURVEILLANCE !1 Surveillance Watch The Many, To Catch The Few George J. Thorley Norwich Steiner School Author Note George J. Thorley, Level 3 Steiner School Certificate, Norwich Steiner School. This report is the piece of work required for the Steiner School Certificate Level 3 Class 12 Project. Correspondence concerning this report should be addressed to George Thorley, Norwich Steiner School, Hospital Lane, Norwich, NR1 2HW. Contact: [email protected] 11 - 05 - 2017 SURVEILLANCE !2 Contents Title 1 Summary 3 Introduction 4 Historical Context 5 9/11 7 USA PATRIOT Act 2001 8 Presidents Surveillance Program 10 The Timeline 12 Edward J Snowden 16 Prism 17 Tempora 20 Treasure Map 21 Conclusion 23 Diagrams 26 References 27 11 - 05 - 2017 SURVEILLANCE !3 Summary In this report, my main question will be: What was the extent of government mass surveillance, in particular the NSA in the United States, running from the September 11 attacks in 2001, to the Edward Snowden revelations in 2013? In answering this I will focus on how public and political feelings prompted the conditions possible for the security forces to be doing what they do in todays world. In particular, I will be looking at the National Security Agency (NSA) in the United States (US) and some of the revelations brought forward by Edward Snowden in 2013, along with the scale of involvement of the United Kingdom’s (UK) Government Communication Headquarters (GCHQ). I will then look at some of the fundamental questions that surround the world of mass surveillance, such as the effectiveness of the programs that were acted upon by security agencies, who they were really looking for, and whether, in my eyes, their methods were morally right.