Skip to main content

Home/ CNDLS Design Seminar/ Group items tagged Right

Rss Feed Group items tagged

Nicholas Adams

Iraq war logs: secret files show how US ignored torture - 0 views

  •  
    This article brings up a good question regarding whether the United States military has been honest in their reports of "enemy" casualties. Another important question is posed at the end of the article with a pentagon statement: "Condemning this fresh leak, however, the Pentagon said: "This security breach could very well get our troops and those they are fighting with killed. Our enemies will mine this information looking for insights into how we operate, cultivate sources and react in combat situations, even the capability of our equipment." Where do we draw the line between the citizens' right to know and the safety of government operations? Is it acceptable to allow secrecy to protect citizens or do the citizens have a right to know all that the government does? These are interesting questions given that the government is to be responsible to the citizenry, however, what if included in that responsibility is keeping certain information classified?
Tyler Sax

WikiLeaks - About - 2 views

shared by Tyler Sax on 16 Mar 11 - No Cached
  • Our goal is to bring important news and information to the public. We provide an innovative, secure and anonymous way for sources to leak information to our journalists (our electronic drop box).
    • Jaclyn Udell
       
      Do WikiLeaks have a bias/ulterior motive in leaking this information? How can we be certain that the electronic drop box is anonymous and ensures the safety of those submitting the information?
    • Jaclyn Udell
       
      I heard an interview on NPR one time and the people were talking about how authors should reveal their bias in their publications. Since WikiLeaks keeps submitters anonymous how do they expose the bias in their publications?
    • Tom Zorc
       
      While there is a bias in promoting certain data or info over others... a tool commonly used across many media sources, it seems to me that Wikileaks has been determined to release everything credible that comes across their desks, no matter what. (Correct me if I'm wrong.) Not much bias there. Bias on the side of the submitters though, I don't think that's Wikileak's responsibility to uncover... nor a possibility?
  • One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the truth.
    • Jaclyn Udell
       
      Who in the company WikiLeaks is responsible for the repercussions of the information that is exposed? In America we have the right to express ourselves through words, but how does this impose upon other social norms in places where freedom of speech is limited?
    • Tyler Sax
       
      The question about responsibility is a great one. Obviously Julian Assange is taking a lot of heat right now, but he can't be the only one... wikileaks is an organization of paople all around the globe, most of whom work anonymously. 
    • Tom Zorc
       
      Does the responsibility of the repercussions of the content not lie with its creator? The issue of secrecy is interesting here - their communications obviously would have been very different if they *knew* it would be public information. So is secrecy a necessary part of the institution of government? Would the US political engine be designed differently if Wikileaks were a factor from day one? How might it be affected from here on out?
Nicholas Adams

The shameful abuse of Bradley Manning - 0 views

  •  
    The WikiLeaks suspect's mistreatment amounts to torture. Either President Obama knows this or he should make it his business. The president refused to comment on PJ Crowley's (State department Spokesperson) statement that the treatment of Manning is "ridiculous, counterproductive and stupid". Prolonged isolation, sleep deprivation, nudity - the punishments currently being levied upon Manning - come right out of the manual of the CIA for "enhanced interrogation". Such practices are applied in Guantánamo and Abu Ghraib. It's what the CIA calls "no-touch torture", and its purpose is to demoralise someone to the point of offering a desired confession regardless of whether it is true or false.
Hadley Stein

Twitter data privacy in dispute in WikiLeaks case - Technology & science - Security - m... - 1 views

  • The dispute cuts to the core of the question of whether WikiLeaks allies are part of a criminal conspiracy or a political discussion
  • The U.S. is investigating whether WikiLeaks should be held responsible for leaking classified information, even though it was not the original leaker.
  • "The First Amendment guarantees their right to speak up and freely associate with even unpopular people and cause," attorneys wrote.
  •  
    How exactly would the U.S. government hold WikiLeaks responsible (i.e. Would they identify a person within the organization, the entire organization etc.) Who determines whether WikiLeaks "are part of a criminal conspiracy or a political discussion"?
Hadley Stein

From Facebook to WikiLeaks: Addressing privacy and security | EHR Watch - 0 views

  • One can argue whether the privacy provisions were weakened or not. In the case of the WikiLeaks, Twila Brase, president of the Citizens' Council for Health Freedom, got to the heart of the matter when she said, "What WikiLeaks shows you is how security information is all about the integrity of individuals." The bottom line is that someone in the State Dept. leaked the documents. No iron-clad privacy provision in the world can protect against a person leaking information - whether it's paper based or computerized. Brase went on to say, "Once you get information on any kind of electronic format, it is very easy to take it, to access it, to share it, to download it."
  • The silver lining in the WikiLeaks scandal is that it puts a laser focus on privacy and security issues, which are things we need to keep working on to make it right.
  •  
    An interesting view of WikiLeaks through the perspective of health care and privacy information. Argues that security information relies on integrity of individuals.
Lee Stromberg

All- Found this event in GU Weekly Events Email - 4 views

Video Contest for Cyber Civility Sponsored by: Georgetown University School of Continuing Studies - Technology Management Details: Do you believe in the right to free speech online without fear o...

started by Lee Stromberg on 27 Apr 11 no follow-up yet
1 - 6 of 6
Showing 20 items per page