Skip to main content

Home/ CNDLS Design Seminar/ Group items tagged to

Rss Feed Group items tagged

Duncan Gillespie

Top 10 revelations from WikiLeaks cables - Yahoo! News - 0 views

  • On Sunday, five international news outlets published a selection of more than 250,000 U.S. diplomatic cables, provided by the website WikiLeaks.
    • Duncan Gillespie
       
      The scope of "calbegate" is massive. It would be interesting to learn how a news agency would pour through such a enourmous repository of documents.
  • According to one cable, King Abdullah of Saudi Arabia has repeatedly asked the U.S. to "cut off the head of the snake"
  • 3. The Obama administration offered sweeteners to try to get other countries to take Guantanamo detainees, as part of its (as yet unsuccessful) effort to close the prison. Slovenia, for instance, was offered a meeting with President Obama, while the island nation of Kiribati was offered incentives worth millions.
  • ...1 more annotation...
  • 7. The State Department labeled Qatar the worst country in the region for counterterrorism efforts. The country's security services were "hesitant to act against known terrorists out of concern for appearing to be aligned with the U.S. and provoking reprisals," according to one cable.
  •  
    Helpful to get a breakdown of the overall takeaways from some of the Wikileaks documents that an individual wouldn't be able to do on one's own.
Nicholas Adams

Scope of information. - 3 views

I was worried at first that this would be a difficult topic to research granted that I am in the SFS and have been explicitly warned to remain as far separated from Wikileaks as possible due to pot...

started by Nicholas Adams on 19 Mar 11 no follow-up yet
Tyler Sax

Blogs | The Tor Blog - 1 views

    • Hadley Stein
       
      This is kind of confusing. Why is it that this more technological discussion on the internet is uncommon. If it is important that we understand these concepts to understand technology, privacy etc., why isn't it always accessible? Do those you understand these concepts purposely make it inaccessible to those who do not?
  • The question he didn't even know to ask is, "What are safe and secure computing and online practices?"
  • how to think about adversaries online, what is ssl, what it means, what are phishing, viruses, botnets, and state-sponsored malware. By the end of the 4th hour, he understood how tor is different than a simple vpn or proxy server, and when to use tor and when it isn't needed. 3.5h of that discussion was basic operational, computer, and online security and safe practices.
  • ...13 more annotations...
    • Hadley Stein
       
      Is it a problem when even people who you would except (or at least hope) understand how the internet works do not? This really highlights the lack of education surrounding th internet.
  • Look at the infrastructures of google, facebook, yahoo, and microsoft to see the challenges that lie ahead for these tools.
    • Hadley Stein
       
      I had never really thought about the infrastructure, specifically the money, required to develop the internet.
  • who uses and how they use it matters
  • What one should or should not do is policy and law, what one can actually do or not do is technology.
    • Tyler Sax
       
      Good quote
  • technology exists to circumvent internet censorship
  • what a proxy is
  • technology exists to circumvent internet censorship
  • Technology is agnostic, who uses and how they use it matters.
  • Circumvention, anonymity, and privacy tools used in a free world can be a minor annoyance,
  • i.e. wikileaks used wikis, ssl, email, and yes, tor, but in the end, it's an annoyance. We don't have people in the streets rioting trying to overthrow our govt. Wikipedia uses the same technology in wikis, ssl, and email. Everyone loves Wikipedia and considers it a net positive.
  • 1 billion people are online in some way
  • In the 1930s, the feds and police warned of mass chaos if the interstate highway system was built in the US. The ability for criminals to quickly transit between cities was of grave concern.
    • Tyler Sax
       
      I like this analogy about internet security
  •  
    What is the line between moral and immoral? Who determines what is moral or "net positive"?
Ian Palm

OpenLeaks, Wikileaks' successor - 8 views

http://www.bc.edu/bc_org/avp/law/st_org/iptf/commentary/content/fisher_gillespie_etal.html

OpenLeaks

Adam Rosenfeld

WikiLeaks Archive - A Selection From the Cache of Diplomatic Dispatches - Interactive F... - 0 views

  • A small number of names and passages in some of the cables have been removed (———) by The New York Times to protect diplomats’ confidential sources, to keep from compromising American intelligence efforts or to protect the privacy of ordinary citizens.
    • Adam Rosenfeld
       
      In the "About" section, wikileaks says "from time to time we may remove or significantly delay the publication of some identifying details from original documents to protect life and limb of innocent people." While it doesn't appear the cable wires put anyone's life in immediate danger, it it interesting to note that the Times additionally censors the documents... Why didn't wikileaks censor these documents already, or why did the Times feel the need to censor them when wikileaks didn't?
  • Below are a selection of the documents from a cache of a quarter-million confidential American diplomatic cables released by WikiLeaks. A small number of names and passages in some of the cables have been removed (———) by The New York Times to protect diplomats’ confidential sources, to ke
Tyler Sax

WikiLeaks - About - 2 views

shared by Tyler Sax on 16 Mar 11 - No Cached
  • Our goal is to bring important news and information to the public. We provide an innovative, secure and anonymous way for sources to leak information to our journalists (our electronic drop box).
    • Jaclyn Udell
       
      Do WikiLeaks have a bias/ulterior motive in leaking this information? How can we be certain that the electronic drop box is anonymous and ensures the safety of those submitting the information?
    • Jaclyn Udell
       
      I heard an interview on NPR one time and the people were talking about how authors should reveal their bias in their publications. Since WikiLeaks keeps submitters anonymous how do they expose the bias in their publications?
    • Tom Zorc
       
      While there is a bias in promoting certain data or info over others... a tool commonly used across many media sources, it seems to me that Wikileaks has been determined to release everything credible that comes across their desks, no matter what. (Correct me if I'm wrong.) Not much bias there. Bias on the side of the submitters though, I don't think that's Wikileak's responsibility to uncover... nor a possibility?
  • One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the truth.
    • Jaclyn Udell
       
      Who in the company WikiLeaks is responsible for the repercussions of the information that is exposed? In America we have the right to express ourselves through words, but how does this impose upon other social norms in places where freedom of speech is limited?
    • Tyler Sax
       
      The question about responsibility is a great one. Obviously Julian Assange is taking a lot of heat right now, but he can't be the only one... wikileaks is an organization of paople all around the globe, most of whom work anonymously. 
    • Tom Zorc
       
      Does the responsibility of the repercussions of the content not lie with its creator? The issue of secrecy is interesting here - their communications obviously would have been very different if they *knew* it would be public information. So is secrecy a necessary part of the institution of government? Would the US political engine be designed differently if Wikileaks were a factor from day one? How might it be affected from here on out?
Nicole Wallace

WikiLeaks: Japan Was Warned About Nuclear Plant Safety, Cables Show - 0 views

  • The Japanese government has said it is doing all it can to contain the crisis at Fukushima Dai-ichi nuclear power plant, which was critically damaged in last week's earthquake. But according to U.S. diplomatic papers released by WikiLeaks, that atomic disaster might have been avoided if only the government had acted on earlier safety warnings.
    • Lee Stromberg
       
      I read Tyler's "irrelevant but relevant" article on the problems of nuclear power reactors/how they work/their safety and decided to try and find a direct connection with Wikileaks.
  • The overall picture that emerges from the cables is of a government afraid of interfering with the powerful nuclear industry, which supplies about one-third of Japan's electricity.
  • Another cable sent from Tokyo to Washington in October 2008 alleged that the government had hidden past nuclear accidents. In 2008, Taro Kono -- a senior member of Japan's lower house of parliament -- told U.S. diplomats that the ministry of economy, trade and industry was "covering up nuclear accidents, and obscuring the true costs and problems associated with the nuclear industry."
  • ...1 more annotation...
  • . But according to U.S. diplomatic papers released by WikiLeaks, that atomic disaster might have been avoided if only the government had acted on earlier safety warnings.
    • Nicole Wallace
       
      Now that there is the potential for private documents to be leaked because of the founding of Wikileaks, will this prevent governments, corportations etc. from doing things behind the public's back? If Japan had known that papers would be revealed demonstrating that the disaster could have been avoided would they have gone to greater lengths to have tried to prevent the atmomic disaster?
Shida Zhang

Debian mirrors - 1 views

shared by Shida Zhang on 15 Mar 11 - Cached
    • Shida Zhang
       
      What are the specific reasons that some Debian packages couldn't be distributed in the States? Any specific examples for those packages?
    • Duncan Gillespie
       
      I'm not positive, but I believe that certain packages were not allowed to be distributed in the US because some of the software used in the Debian packages mimicked commercially available software. It may be similiar to how wikipedia got in trouble in its infancy because people would copy articles from encyclopedias like Britannica and make the information available for free. Like wikipedia, Debian is community driven (open-source).
  • Debian is distributed all around the world using mirrors in order to provide users with better access to our archive and to reduce the load on our servers.
  • Prior to Debian 3.1, there was also a Non-US packages archive (debian-non-US/) which included Debian packages that could not be distributed in the United States due to software patents or use of encryption.
Hadley Stein

From Facebook to WikiLeaks: Addressing privacy and security | EHR Watch - 0 views

  • One can argue whether the privacy provisions were weakened or not. In the case of the WikiLeaks, Twila Brase, president of the Citizens' Council for Health Freedom, got to the heart of the matter when she said, "What WikiLeaks shows you is how security information is all about the integrity of individuals." The bottom line is that someone in the State Dept. leaked the documents. No iron-clad privacy provision in the world can protect against a person leaking information - whether it's paper based or computerized. Brase went on to say, "Once you get information on any kind of electronic format, it is very easy to take it, to access it, to share it, to download it."
  • The silver lining in the WikiLeaks scandal is that it puts a laser focus on privacy and security issues, which are things we need to keep working on to make it right.
  •  
    An interesting view of WikiLeaks through the perspective of health care and privacy information. Argues that security information relies on integrity of individuals.
Adam Rosenfeld

Will the Rise of Wikileaks Competitors Make Whistleblowing Resistant to Censorship? | E... - 1 views

  • When payment providers, service providers and even visualization software services cut off services, Wikileaks struggled to keep their site online, going down for periods of time and reducing the content they carry. But while the availability of Wikileaks content was restricted, the demand from readers and media organizations to access that information stayed strong. Now a new generation of Wikileaks-inspired websites is populating the Internet — decentralizing the concept of whistleblowing and making it harder to shut down speech merely by cutting off services to one site.
  •  
    Short but very interesting article that touches on the phenomenon of multiple other websites similar to wikileaks springing up when wikileaks is attacked. Wikileaks has created a demand for such information and when the website is attacked by payment and service providers, other websites have stepped up to fill the void. Also, lots of interesting links built into this piece.
Ihsaan Patel

G.W. Schulz: Is WikiLeaks Driving Bank of America to Seize Ugly Web Domains? - 0 views

  • "using defensive domain registration to block others from exploiting domain names associated with your brand," according to its website.
    • Ihsaan Patel
       
      An intersting strategy for combating the wikileaks corporate threat that differs from the one proposed by the three security firms. This one seems to acknowledge that the information will get out, and it is simply trying to do some damage control.
  • snapping up more than 400 domain names (such as brianmoynihansucks.com) in recent weeks that could feasibly be used as destinations for leveling hatred at the company.
    • Ihsaan Patel
       
      The actions seem futile since there seems to be an infinite number of domain names that could be created to hurt Bank of America's image
  • Why the sudden burst in apparent pre-emptive action? One theory is that Bank of America is bracing for a fresh release of documents from the anti-secrecy site WikiLeaks.
Shida Zhang

BBC News - Anonymous hacktivists say Wikileaks war to continue - 1 views

    • Shida Zhang
       
      Note: they are trying to create hundreds of mirror sites for Wikileaks.
  • Paul Mutton at the security firm Netcraft, who is monitoring the attacks, said Visa is considered a more difficult target and the attack on it required a much larger number of "hacktivists" - politically motivated hackers - 2,000 compared with 400 for Mastercard.
  • Anonymous, which claimed to have carried out the attack, is a loose-knit group of hacktivists, with links to the notorious message board 4chan.
  • ...6 more annotations...
  • PayPal, which has stopped processing donations to Wikileaks, has also been targeted.
  • Security experts said the sites had been targeted by a so-called distributed denial-of-service attack (DDoS), which swamp a site with so many page requests that it becomes overwhelmed and drops offline.
  • "We feel that Wikileaks has become more than just about leaking of documents, it has become a war ground, the people vs. the government," he said.
  • "The idea is not to wipe them off but to give the companies a wake-up call," he said. "Companies will notice the increase in traffic and an increase in traffic means increase in costs associated with running a website."
  • DDoS attacks are illegal in many countries, including the UK.
  • Anonymous is also helping to create hundreds of mirror sites for Wikileaks, after its US domain name provider withdrew its services.
Adam Rosenfeld

WikiLeaks diplomatic documents put educators in a quandary - Page 2 - Philly.com - 0 views

  • "There is an ethical and moral dimension here that cannot be ignored," he says. "Some people have suffered because of this [leak]; they may even be dead." Danspeckgruber says there is evidence that a number of foreign sources cited in the cables have been punished, perhaps even executed, for passing on information to U.S. diplomats.
    • Adam Rosenfeld
       
      This professor touches on the ethical dilemma of even reading the documents
  • "It has been made clear by the government," she says by e-mail, "that it would be unwise for those who will need security clearances to avail themselves of the cables."Vladeck lays it out: "The government routinely asks potential employees whether they have had access to classified information in the past."If you've read the WikiLeaks material, he says, "you'd either have to say yes, and admit you've broken the law, or you'd have to lie." Not advisable, given the screening process, which often includes a polygraph test.
  • few weeks later," says Meunier, "one student in the [college military program] ROTC found out from his chain of command that reading the actual cables could prevent one from getting a security clearance."
Tyler Sax

How Nuclear Reactors Work, And How They Fail | Popular Science - 0 views

  •  
    This article is completely irrelevant to what we're talking about...Yet at the same time, I find something relevant about it. It's an article written by Pop Sci about the basics of how nuclear reactors work, in light of the current situation in Japan. The key line (in the subtitle) is: "Here's what you need to know to understand the news, as it happens" As soon as I read this I, of course, though of our approach to the seminar. Not everyone can be an expert in web technologies (or in nuclear engineering) but there is definite value in understanding the web (or nuclear reactors) at a deeper level than the average news-reader/consumer/global citizen. This article is proof of that.   
  •  
    I completely agree!
Duncan Gillespie

Julian Assange - Wikipedia, the free encyclopedia - 0 views

  • The judge said "there is just no evidence that there was anything other than sort of intelligent inquisitiveness and the pleasure of being able to—what's the expression—surf through these various computers"[2] and stated that Assange would have gone to jail for up to 10 years if he had not had such a disrupted childhood.[27]
    • Duncan Gillespie
       
      It is interesting to see the effect Assange's troubled childhood had on his world views.
  • The fact that his fellow students were doing research for Pentagon's DARPA was reportedly a factor in motivating him to drop out and start WikiLeaks
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • ...19 more annotations...
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year
  • Readers' Choice for Time magazine's 2010 Person of the Year.[
  • awards and nominations
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • ] Assange has received a number of awards and nominations, including the 2009 Amnesty
  • tions, including the 2009
  • Readers' Choice for Time magazine's 2010 Person of the Year
  • Assange has received a number of awards and nominations, including the 2009 Amnesty International Media Award for publishing material about extrajudicial killings in Kenya and Readers' Choice for Time magazine's 2010 Person of the Year.[14] Assange has appealed a February 2011 decision by English courts to extradite him to Sweden for questioning in relation to a sexual assault investigation.[15][16][17][18] He has said the allegations of wrongdoing are "without basis".[19] Contents [hide]
  • Readers' Choice for Time magazine's 2010 Person of the Year
  • Readers' Choice for Time magazine's 2010 Person of the Year
  • awards and nominations
  • 2009 Amnesty International Media Award for publishing material about extrajudicial killings in Kenya and Readers' Choice for Time magazine's 2010 Person of the Year.
Randall Bass

Anonymous and attacks on 'anti-wikileaks' sites - 4 views

Ian--I like these questions. That is, even if you understand what denial of service attack is, it still raises the question of how does one launch one, how easy is it to do so, etc.?

Anonymous

Shida Zhang

BBC News - Anonymous leaks Bank of America e-mails - 2 views

  • In late 2010, Wikileaks founder Julian Assange said he planned to release documents in early 2011, which could bring down a well known bank.
  • Previously, he had claimed to be in possession of a hard drive containing internal documents from a senior Bank of America official. The Wikileaks release has yet to appear, and it is unclear if those files are the same ones obtained by Anonymous. One of the documents appears to show an employee of Bilboa Insurance asking a colleague to delete certain loan identifying numbers from their computer system.
  • the e-mails form the first part of a series of planned leaks that will prove Bank of America engaged in improper mortgage foreclosure practices.
  • ...2 more annotations...
  • Subsequently, sites mirroring the content have sprung up and the documents have also been released through peer-to-peer networks.
  • Anonymous members have engaged in a campaign of action against websites and companies that assisted the United States government in its attempt to isolate Wikileaks.
Nicholas Adams

Iraq war logs: secret files show how US ignored torture - 0 views

  •  
    This article brings up a good question regarding whether the United States military has been honest in their reports of "enemy" casualties. Another important question is posed at the end of the article with a pentagon statement: "Condemning this fresh leak, however, the Pentagon said: "This security breach could very well get our troops and those they are fighting with killed. Our enemies will mine this information looking for insights into how we operate, cultivate sources and react in combat situations, even the capability of our equipment." Where do we draw the line between the citizens' right to know and the safety of government operations? Is it acceptable to allow secrecy to protect citizens or do the citizens have a right to know all that the government does? These are interesting questions given that the government is to be responsible to the citizenry, however, what if included in that responsibility is keeping certain information classified?
Edward Maloney

CNDLS Design Seminar - 2 views

  •  
    The web is no longer just an integral part of our lives; the web significantly defines the way we engage with the world. To be a wholly educated leader, a successful and effective member of an organization or business, and or an engaged citizen, it is now vital to understand web technologies beyond the level of a consumer. Instead of seeing the web as something that "happens behind the computer screen," the liberally educated person must understand how the web works and shapes our lives. This means understanding how data travels, what happens to your personal information on the web, how the definition of privacy is changing, how the web serves as a publishing and authoring platform, how media is shared and remixed, and how an online economy is changing the way we learn. In Spring 2011 we will launch a Design Seminar to begin mapping out integrated academic approaches to the Web, modeling the ways that multiple disciplines and perspectives are necessary to really comprehend the technological and cultural landscape.
Tyler Sax

WikiLeaks - Submissions - 0 views

    • Randall Bass
       
      The Wikileaks postings are meant to be the beginning of a chain of reference. 
  • That is why we have created our novel method of submission based on a suite of security technologies designed to provide anonymity. We have put a great deal of technical and design work into the drop box because we take the journalist-source relationship very seriously.
    • Randall Bass
       
      What is the security architecture of Wikileaks? What makes the drop box secure? (RBass)
  • ...4 more annotations...
  • Communication is secured with SSL encryption.
  • 3.3 High risk postal submissions
  • This is because our journalists write news stories based on the material, and then provide a link to the supporting documentation to prove our stories are true. It’s not news if it has been publicly available elsewhere first, and we are a news organisation.
  • we do not solicit it
    • Tyler Sax
       
      This assertion was certainly challenged when it came to the most recent US government document leaks. Some speculated that Assange (or someone on his "team") helped the US soldier gain access to the documents
1 - 20 of 68 Next › Last »
Showing 20 items per page