Skip to main content

Home/ Groups/ CNDLS Design Seminar
1More

five minutes to speak | The Tor Blog - 4 views

  •  
    Interesting brief talk about Internet security and the role of proxy technologies, esp under repressive regimes. Though check out the comments too. Clearly there are downsides and social hazards to proxy technologies too.

All- Found this event in GU Weekly Events Email - 4 views

started by Lee Stromberg on 27 Apr 11 no follow-up yet

Scope of information. - 3 views

started by Nicholas Adams on 19 Mar 11 no follow-up yet
1More

CNDLS Design Seminar - 2 views

  •  
    The web is no longer just an integral part of our lives; the web significantly defines the way we engage with the world. To be a wholly educated leader, a successful and effective member of an organization or business, and or an engaged citizen, it is now vital to understand web technologies beyond the level of a consumer. Instead of seeing the web as something that "happens behind the computer screen," the liberally educated person must understand how the web works and shapes our lives. This means understanding how data travels, what happens to your personal information on the web, how the definition of privacy is changing, how the web serves as a publishing and authoring platform, how media is shared and remixed, and how an online economy is changing the way we learn. In Spring 2011 we will launch a Design Seminar to begin mapping out integrated academic approaches to the Web, modeling the ways that multiple disciplines and perspectives are necessary to really comprehend the technological and cultural landscape.
2More

Big Pharma caught spying on the WHO - Wikileaks - 2 views

  • Public health advocates reacted strongly to the leaked documents.
    • Tyler Sax
       
      This might be an interesting topic for more research. How have different groups reacted to the leaked documents?
5More

BBC News - Anonymous leaks Bank of America e-mails - 2 views

  • In late 2010, Wikileaks founder Julian Assange said he planned to release documents in early 2011, which could bring down a well known bank.
  • Previously, he had claimed to be in possession of a hard drive containing internal documents from a senior Bank of America official. The Wikileaks release has yet to appear, and it is unclear if those files are the same ones obtained by Anonymous. One of the documents appears to show an employee of Bilboa Insurance asking a colleague to delete certain loan identifying numbers from their computer system.
  • the e-mails form the first part of a series of planned leaks that will prove Bank of America engaged in improper mortgage foreclosure practices.
  • ...2 more annotations...
  • Subsequently, sites mirroring the content have sprung up and the documents have also been released through peer-to-peer networks.
  • Anonymous members have engaged in a campaign of action against websites and companies that assisted the United States government in its attempt to isolate Wikileaks.
8More

WikiLeaks - About - 2 views

shared by Tyler Sax on 16 Mar 11 - No Cached
  • Our goal is to bring important news and information to the public. We provide an innovative, secure and anonymous way for sources to leak information to our journalists (our electronic drop box).
    • Jaclyn Udell
       
      Do WikiLeaks have a bias/ulterior motive in leaking this information? How can we be certain that the electronic drop box is anonymous and ensures the safety of those submitting the information?
    • Jaclyn Udell
       
      I heard an interview on NPR one time and the people were talking about how authors should reveal their bias in their publications. Since WikiLeaks keeps submitters anonymous how do they expose the bias in their publications?
    • Tom Zorc
       
      While there is a bias in promoting certain data or info over others... a tool commonly used across many media sources, it seems to me that Wikileaks has been determined to release everything credible that comes across their desks, no matter what. (Correct me if I'm wrong.) Not much bias there. Bias on the side of the submitters though, I don't think that's Wikileak's responsibility to uncover... nor a possibility?
  • One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the truth.
    • Jaclyn Udell
       
      Who in the company WikiLeaks is responsible for the repercussions of the information that is exposed? In America we have the right to express ourselves through words, but how does this impose upon other social norms in places where freedom of speech is limited?
    • Tyler Sax
       
      The question about responsibility is a great one. Obviously Julian Assange is taking a lot of heat right now, but he can't be the only one... wikileaks is an organization of paople all around the globe, most of whom work anonymously. 
    • Tom Zorc
       
      Does the responsibility of the repercussions of the content not lie with its creator? The issue of secrecy is interesting here - their communications obviously would have been very different if they *knew* it would be public information. So is secrecy a necessary part of the institution of government? Would the US political engine be designed differently if Wikileaks were a factor from day one? How might it be affected from here on out?
3More

Hacker group releases BofA employee correspondence | Reuters - 1 views

  • Consumer groups have accused major U.S. lenders of foreclosing on many homes without having proper documentation in place.
  • The group's email release also includes correspondence between Anonymous and the former employee, in which the former employee described the bank as a "cult" and said the company is now intent on destroying his career.
  • They saw to that when they showed everyone my picture and labelled me as a terrorist."
2More

WikiLeaks and Tor: Moral use of an amoral system? | Invisible Inkling - 1 views

  • Before launching the site, Assange needed to show potential contributors that it was viable. One of the WikiLeaks activists owned a server that was being used as a node for the Tor network. Millions of secret transmissions passed through it. The activist noticed that hackers from China were using the network to gather foreign governments’ information, and began to record this traffic. Only a small fraction has ever been posted on WikiLeaks, but the initial tranche served as the site’s foundation, and Assange was able to say, “We have received over one million documents from thirteen countries.”
    • Tom Zorc
       
      So China's hacking the Tor network to obtain the docs that Assange is going to release anyways...? 
2More

Plaintext over Tor is still plaintext | The Tor Blog - 1 views

  • I write to remind our users, and people in search of privacy enhancing technology, that good software is just one part of the solution.
  • We hear from the Wikileaks folks that the premise behind these news articles is actually false -- they didn't bootstrap Wikileaks by monitoring the Tor network.
1More

American Power: WikiLeaks 'Collateral Murder' is Left's Latest Attempt to Criminalize U... - 1 views

  •  
    A severe criticism of the Wikileaks for releasing a video on collateral murder of iraqi civilians - undermines the very validity of wikileaks and criticizes the editor for attacking the US intelligence. Shows how much government pressure and control wikileaks is under.
2More

Will the Rise of Wikileaks Competitors Make Whistleblowing Resistant to Censorship? | E... - 1 views

  • When payment providers, service providers and even visualization software services cut off services, Wikileaks struggled to keep their site online, going down for periods of time and reducing the content they carry. But while the availability of Wikileaks content was restricted, the demand from readers and media organizations to access that information stayed strong. Now a new generation of Wikileaks-inspired websites is populating the Internet — decentralizing the concept of whistleblowing and making it harder to shut down speech merely by cutting off services to one site.
  •  
    Short but very interesting article that touches on the phenomenon of multiple other websites similar to wikileaks springing up when wikileaks is attacked. Wikileaks has created a demand for such information and when the website is attacked by payment and service providers, other websites have stepped up to fill the void. Also, lots of interesting links built into this piece.
2More

WikiLeaks Worse for SEC Than Bank of America - TheStreet - 1 views

  • "Why hasn't the SEC done something about this?"
    • Ihsaan Patel
       
      Interesting perspective on the potential wikileaks bank of america leak. The author predicts that the leak will hurt the government more than any other organization. Wikileaks seems to have declare war against both the government and corporations, how can it survive attakcs by both?
1More

Julian Assange tells students that the web is the greatest spying machine ever - 1 views

  •  
    The WikiLeaks founder says he believes the internet is not a technology that favors freedom of speech but rather spying. Assange disagrees with reports that Facebook and Twitter play a role in the unrest in the Middle East. He offers his reasoning why revolts cannot be started via Facebook, Twitter, or other social networking sites: they can all be used to round-up principal participants, so that they may be beaten, interrogated or incarcerated. Perhaps most disturbingly, he blames leaked diplomatic cables for the unrest currently in the Middle-East being that the United States had decided that in a necessary event, they would militarily back the Tunisian military over the political regime and would mobilize against neighboring countries if need be. There were further cables that also led to US disapproval of Mubarak in Egypt.
6More

EDITORIAL - The Abuse of Private Manning - Editorial - NYTimes.com - 1 views

  • And every morning he is required to stand outside his cell, naked, until he passes inspection and is given his clothes back.
  • Forced nudity is a classic humiliation technique. During the early years of the Bush administration's war on terror, C.I.A. interrogators regularly stripped prisoners to break down barriers of resistance, increase compliance and extract information.
  • Philip Crowley, a State Department spokesman, committed the classic mistake of a Washington mouthpiece by telling the truth about Private Manning to a small group (including a blogger): that the military's treatment of Private Manning was ''ridiculous and counterproductive and stupid.'' He resigned on Sunday.
  • ...2 more annotations...
  • Far more troubling is why President Obama, who has forcefully denounced prisoner abuse, is condoning this treatment.
    • Randall Bass
       
      shows the abusive techniques of his captors
  •  
    "President Obama, who has forcefully denounced prisoner abuse, is condoning the abusive treatment to Manning. 
2More

The Impact of Wikileaks and the Federal Pay Freeze: Today's Q's for O's WH - 11/29/2010... - 1 views

  •   And I wouldn't rule anything out. 
    • Nicole Wallace
       
      It's is interesting here that even with the release of the documents the government is still trying to keep the public in the dark. Gibbs speaks in very general statements.
1More

Google Labs Books Ngram Viewer - 1 views

  •  
    Google's Book Viewer being used by the Cultural Genome Project.
1 - 20 Next › Last »
Showing 20 items per page