Skip to main content

Home/ CNDLS Design Seminar/ Group items tagged Data

Rss Feed Group items tagged

Ian Palm

Data Mining - the effects of browsing - 5 views

The following article shows a few methods to block people from mining data. http://www.minousoft.com/2010/12/a-few-notes-on-technology-wikileaks-data-mining-and-privacy/

Data Mining Privacy

Jaclyn Udell

Mirror (computing) - Wikipedia, the free encyclopedia - 0 views

  • In computing, a mirror is an exact copy of a data set. On the Internet, a mirror site is an exact copy of another Internet site. Mirror sites are most commonly used to provide multiple sources of the same information, and are of particular value as a way of providing reliable access to large downloads. Mirroring is a type of file synchronization. A live mirror is automatically updated as soon as the original is changed.
  • To provide access to otherwise unavailable information. For example, when the popular Google search engine was banned in 2002 by the People's Republic of China, the mirror elgooG was used as a way of effectively circumventing the ban.
Edward Maloney

CNDLS Design Seminar - 2 views

  •  
    The web is no longer just an integral part of our lives; the web significantly defines the way we engage with the world. To be a wholly educated leader, a successful and effective member of an organization or business, and or an engaged citizen, it is now vital to understand web technologies beyond the level of a consumer. Instead of seeing the web as something that "happens behind the computer screen," the liberally educated person must understand how the web works and shapes our lives. This means understanding how data travels, what happens to your personal information on the web, how the definition of privacy is changing, how the web serves as a publishing and authoring platform, how media is shared and remixed, and how an online economy is changing the way we learn. In Spring 2011 we will launch a Design Seminar to begin mapping out integrated academic approaches to the Web, modeling the ways that multiple disciplines and perspectives are necessary to really comprehend the technological and cultural landscape.
Nicholas Adams

Iraq war logs: An introduction - 0 views

  •  
    The leaking of more than 390,000 previously secret US military reports details the hidden realities of the war in Iraq. More than 100,000 people have died and whole towns such as Falluja have been reduced to near-rubble, while allegations of brutal abuse by some US and UK soldiers at Abu Ghraib prison and elsewhere continue to surface. WikiLeaks has defied the Pentagon to pass this data on to a wide range of media organizations such as newspapers and other webpages.
Tyler Sax

WikiLeaks - About - 2 views

shared by Tyler Sax on 16 Mar 11 - No Cached
  • Our goal is to bring important news and information to the public. We provide an innovative, secure and anonymous way for sources to leak information to our journalists (our electronic drop box).
    • Jaclyn Udell
       
      Do WikiLeaks have a bias/ulterior motive in leaking this information? How can we be certain that the electronic drop box is anonymous and ensures the safety of those submitting the information?
    • Jaclyn Udell
       
      I heard an interview on NPR one time and the people were talking about how authors should reveal their bias in their publications. Since WikiLeaks keeps submitters anonymous how do they expose the bias in their publications?
    • Tom Zorc
       
      While there is a bias in promoting certain data or info over others... a tool commonly used across many media sources, it seems to me that Wikileaks has been determined to release everything credible that comes across their desks, no matter what. (Correct me if I'm wrong.) Not much bias there. Bias on the side of the submitters though, I don't think that's Wikileak's responsibility to uncover... nor a possibility?
  • One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the truth.
    • Jaclyn Udell
       
      Who in the company WikiLeaks is responsible for the repercussions of the information that is exposed? In America we have the right to express ourselves through words, but how does this impose upon other social norms in places where freedom of speech is limited?
    • Tyler Sax
       
      The question about responsibility is a great one. Obviously Julian Assange is taking a lot of heat right now, but he can't be the only one... wikileaks is an organization of paople all around the globe, most of whom work anonymously. 
    • Tom Zorc
       
      Does the responsibility of the repercussions of the content not lie with its creator? The issue of secrecy is interesting here - their communications obviously would have been very different if they *knew* it would be public information. So is secrecy a necessary part of the institution of government? Would the US political engine be designed differently if Wikileaks were a factor from day one? How might it be affected from here on out?
Ihsaan Patel

Facing WikiLeaks Threat, Bank of America Plays Defense - NYTimes.com - 0 views

  • take down” a major American bank and
    • Ihsaan Patel
       
      It is interesting to see the ability that wikileaks has to move markets and its impact on the world of finance, where information is king. Is it possible that wikileaks could help huge financial firms because it provides information that was previously unavailable?
  • That Mr. Assange might shift his attention to a private company — especially one as politically unpopular as Bank of America or any of its rivals, which have been stained by taxpayer-financed bailouts and the revelation of improper foreclosure practices — raises a new kind of corporate threat, combining elements of law, technology, public policy, politics and public relations
  • reveal an “ecosystem of corruption” with a cache of data from an executive’s hard drive. With Bank of America’s share price falling on the widely held suspicion that the hard drive was theirs
Tyler Sax

WikiLeaks Was Launched With Documents Intercepted From Tor | Threat Level | Wired.com - 0 views

  • WikiLeaks, the controversial whistleblowing site that exposes secrets of governments and corporations, bootstrapped itself with a cache of documents obtained through an internet eavesdropping operation by one of its activists, according to a new profile of the organization’s founder. The activist siphoned more than a million documents as they traveled across the internet through Tor, also known as “The Onion Router,” a sophisticated privacy tool that lets users navigate and send documents through the internet anonymously.
    • Tyler Sax
       
      This is an interesting note about something that isn't taled about very often -- where did Wikileaks come from in the first place?
  • The siphoned documents, supposedly stolen by Chinese hackers or spies who were using the Tor network to transmit the data, were the basis for WikiLeaks founder Julian Assange’s assertion in 2006 that his organization had already “received over one million documents from 13 countries” before his site was launched, according to the article in The New Yorker.
  •  
    (This article seems to have been debunked by another I bookmarked)
  •  
    (This article seems to have been debunked by another I bookmarked)
Tom Zorc

WikiLeaks and Tor: Moral use of an amoral system? | Invisible Inkling - 0 views

  • Reading the New Yorker’s piece on WikiLeaks, it’s hard to decide whether I’m reading about freedom fighters, skilled propagandists, or as is often the case, both.
  • The Tor Project blog responds, pointing out that Tor doesn't magically encrypt text, it simply allows for the anonymous transfer of files. So if you use unsecure connections and send data in plain text, it's just as safe as writing down the information on a piece of paper, folding it into an airplane, and throwing it across the street.
Hadley Stein

Twitter data privacy in dispute in WikiLeaks case - Technology & science - Security - m... - 1 views

  • The dispute cuts to the core of the question of whether WikiLeaks allies are part of a criminal conspiracy or a political discussion
  • The U.S. is investigating whether WikiLeaks should be held responsible for leaking classified information, even though it was not the original leaker.
  • "The First Amendment guarantees their right to speak up and freely associate with even unpopular people and cause," attorneys wrote.
  •  
    How exactly would the U.S. government hold WikiLeaks responsible (i.e. Would they identify a person within the organization, the entire organization etc.) Who determines whether WikiLeaks "are part of a criminal conspiracy or a political discussion"?
1 - 9 of 9
Showing 20 items per page