Skip to main content

Home/ Groups/ CNDLS Design Seminar
Duncan Gillespie

Top 10 revelations from WikiLeaks cables - Yahoo! News - 0 views

  • On Sunday, five international news outlets published a selection of more than 250,000 U.S. diplomatic cables, provided by the website WikiLeaks.
    • Duncan Gillespie
       
      The scope of "calbegate" is massive. It would be interesting to learn how a news agency would pour through such a enourmous repository of documents.
  • According to one cable, King Abdullah of Saudi Arabia has repeatedly asked the U.S. to "cut off the head of the snake"
  • 3. The Obama administration offered sweeteners to try to get other countries to take Guantanamo detainees, as part of its (as yet unsuccessful) effort to close the prison. Slovenia, for instance, was offered a meeting with President Obama, while the island nation of Kiribati was offered incentives worth millions.
  • ...1 more annotation...
  • 7. The State Department labeled Qatar the worst country in the region for counterterrorism efforts. The country's security services were "hesitant to act against known terrorists out of concern for appearing to be aligned with the U.S. and provoking reprisals," according to one cable.
  •  
    Helpful to get a breakdown of the overall takeaways from some of the Wikileaks documents that an individual wouldn't be able to do on one's own.
Randall Bass

L. Gordon Crovitz: From WikiLeaks to OpenLeaks | Full Comment | National Post - 0 views

  •  
    Another good piece on the differences between WikiLeaks and OpenLeaks. This one also emphasizes that distribution of responsibility for vetting documents, checking validity, and making determinations about security breaches, etc. to the publishers. The notion of distributed intelligence and distribute responsibility is a key Web concept that has many manifestations. But this is an interesting and important version of it. "Distributed intelligence" is also one of those concepts that has both social and technological implications. 
Adam Rosenfeld

WikiLeaks diplomatic documents put educators in a quandary - Page 2 - Philly.com - 0 views

  • "There is an ethical and moral dimension here that cannot be ignored," he says. "Some people have suffered because of this [leak]; they may even be dead." Danspeckgruber says there is evidence that a number of foreign sources cited in the cables have been punished, perhaps even executed, for passing on information to U.S. diplomats.
    • Adam Rosenfeld
       
      This professor touches on the ethical dilemma of even reading the documents
  • "It has been made clear by the government," she says by e-mail, "that it would be unwise for those who will need security clearances to avail themselves of the cables."Vladeck lays it out: "The government routinely asks potential employees whether they have had access to classified information in the past."If you've read the WikiLeaks material, he says, "you'd either have to say yes, and admit you've broken the law, or you'd have to lie." Not advisable, given the screening process, which often includes a polygraph test.
  • few weeks later," says Meunier, "one student in the [college military program] ROTC found out from his chain of command that reading the actual cables could prevent one from getting a security clearance."
Adam Rosenfeld

WikiLeaks diplomatic documents put educators in a quandary - Philly.com - 0 views

  • "I personally think what Assange did was reprehensible," says Frank Plantan, codirector of the international-relations program at the University of Pennsylvania, echoing all the scholars with whom we spoke. "However, I do not see an ethical issue in using the materials once leaked. . . . There is nothing better than real-world examples."
    • Adam Rosenfeld
       
      First two highlights get into using the leaks as an educational tool...this section begins to address the ethical issue surrounding such use of leaked confidential documents
  • "Strictly speaking, even the most innocent, well-intentioned educators" may be prosecuted for "disseminating classified materials," he says. "But it's a long shot whether the government would decide to prosecute."
    • Adam Rosenfeld
       
      Legal implications. (Educational, ethical, and legal addressed in this article)
  • Christina Paxson, dean of Princeton University's Woodrow Wilson School of Public and International Affairs, says universities should foster the free exchange of ideas."We feel strongly that faculty should have a lot of discretion for what is appropriate for their classes," she says.
Ihsaan Patel

Facing WikiLeaks Threat, Bank of America Plays Defense - NYTimes.com - 0 views

  • WikiLeaks has taken on private companies in the past, including leaking documents from Barclays of Britain and Bank Julius Baer of Switzerland, but neither disclosure drew nearly as much attention.
    • Ihsaan Patel
       
      Why didn't it affect these companies as much as it affected Bank of America?
  • WikiLeaks has taken on private companies in the past, including leaking documents from Barclays of Britain and Bank Julius Baer of Switzerland, but neither disclosure drew nearly as much attention.
Ihsaan Patel

Facing WikiLeaks Threat, Bank of America Plays Defense - NYTimes.com - 0 views

  • take down” a major American bank and
    • Ihsaan Patel
       
      It is interesting to see the ability that wikileaks has to move markets and its impact on the world of finance, where information is king. Is it possible that wikileaks could help huge financial firms because it provides information that was previously unavailable?
  • That Mr. Assange might shift his attention to a private company — especially one as politically unpopular as Bank of America or any of its rivals, which have been stained by taxpayer-financed bailouts and the revelation of improper foreclosure practices — raises a new kind of corporate threat, combining elements of law, technology, public policy, politics and public relations
  • reveal an “ecosystem of corruption” with a cache of data from an executive’s hard drive. With Bank of America’s share price falling on the widely held suspicion that the hard drive was theirs
chaeyouncho91

WikiLeaks VIDEO Exposes 2007 'Collateral Murder' In Iraq - 0 views

  •  
    Especially note the media's fast reaction to the video release on wikileaks - the next day, The New York Times released an official cover story of the clip. Based on a US counterintelligence investigation into Wikileaks, the report determined that Wikileaks "represents a potential force protection, counterintelligence, operational security (OPSEC), and information security (INFOSEC) threat to the US Army." (see highlighted)
chaeyouncho91

Wikileaks reveals video showing US air crew shooting down Iraqi civilians | World news ... - 0 views

  •  
    Article on the Petagon's reaction to the release of the video by wikileaks, and declaring it as "a threat against national security"
Tyler Sax

WikiLeaks Was Launched With Documents Intercepted From Tor | Threat Level | Wired.com - 0 views

  • WikiLeaks, the controversial whistleblowing site that exposes secrets of governments and corporations, bootstrapped itself with a cache of documents obtained through an internet eavesdropping operation by one of its activists, according to a new profile of the organization’s founder. The activist siphoned more than a million documents as they traveled across the internet through Tor, also known as “The Onion Router,” a sophisticated privacy tool that lets users navigate and send documents through the internet anonymously.
    • Tyler Sax
       
      This is an interesting note about something that isn't taled about very often -- where did Wikileaks come from in the first place?
  • The siphoned documents, supposedly stolen by Chinese hackers or spies who were using the Tor network to transmit the data, were the basis for WikiLeaks founder Julian Assange’s assertion in 2006 that his organization had already “received over one million documents from 13 countries” before his site was launched, according to the article in The New Yorker.
  •  
    (This article seems to have been debunked by another I bookmarked)
  •  
    (This article seems to have been debunked by another I bookmarked)
Tom Zorc

WikiLeaks and Julian Paul Assange : The New Yorker - 0 views

  • The edited film, which was eighteen minutes long, began with a quote from George Orwell that Assange and M had selected: “Political language is designed to make lies sound truthful and murder respectable, and to give the appearance of solidity to pure wind.”
    • Tom Zorc
       
      And how fitting is it that Assange is concerned with political language, and how it is "designed." Maybe I'm just stuck on this idea at the moment...  But the connotations language has upon its effect is incredibly powerful.
Tom Zorc

WikiLeaks and Julian Paul Assange : The New Yorker - 0 views

  • Assange is an international trafficker, of sorts. He and his colleagues collect documents and imagery that governments and other institutions regard as confidential and publish them on a Web site called WikiLeaks.org.
    • Tom Zorc
       
      interesting take on it
  • extensive catalogue
    • Tom Zorc
       
      the new yorker's agenda seems to support assange through a tone that on a certain level undermines criticism / makes the documents seem "less serious" ...as compared to the response of other relevant parties 
  • The secretiveness stems from the belief that a populist intelligence operation with virtually no resources, designed to publicize information that powerful institutions do not want public, will have serious adversaries.
    • Tom Zorc
       
      same tone here
  • ...1 more annotation...
  • Assange calls the site “an uncensorable system for untraceable mass document leaking and public analysis,” and a government or company that wanted to remove content from WikiLeaks would have to practically dismantle the Internet itself. So far, even though the site has received more than a hundred legal threats, almost no one has filed suit.
  •  
    *process of learning note* As I explore a certain aspect of a topic, I find myself opening the several links an article references in multiple tabs, reading those articles fully, and doing the same.  Each piece offers a slightly different perspective or take on the issue, yet rounds out the perspective.
Tom Zorc

WikiLeaks and Tor: Moral use of an amoral system? | Invisible Inkling - 0 views

  • Reading the New Yorker’s piece on WikiLeaks, it’s hard to decide whether I’m reading about freedom fighters, skilled propagandists, or as is often the case, both.
  • The Tor Project blog responds, pointing out that Tor doesn't magically encrypt text, it simply allows for the anonymous transfer of files. So if you use unsecure connections and send data in plain text, it's just as safe as writing down the information on a piece of paper, folding it into an airplane, and throwing it across the street.
Hadley Stein

From Facebook to WikiLeaks: Addressing privacy and security | EHR Watch - 0 views

  • One can argue whether the privacy provisions were weakened or not. In the case of the WikiLeaks, Twila Brase, president of the Citizens' Council for Health Freedom, got to the heart of the matter when she said, "What WikiLeaks shows you is how security information is all about the integrity of individuals." The bottom line is that someone in the State Dept. leaked the documents. No iron-clad privacy provision in the world can protect against a person leaking information - whether it's paper based or computerized. Brase went on to say, "Once you get information on any kind of electronic format, it is very easy to take it, to access it, to share it, to download it."
  • The silver lining in the WikiLeaks scandal is that it puts a laser focus on privacy and security issues, which are things we need to keep working on to make it right.
  •  
    An interesting view of WikiLeaks through the perspective of health care and privacy information. Argues that security information relies on integrity of individuals.
Duncan Gillespie

Collateral Murder - 0 views

  • WikiLeaks wants to ensure that all the leaked information it receives gets the attention it deserves. In this particular case, some of the people killed were journalists that were simply doing their jobs: putting their lives at risk in order to report on war.
    • Duncan Gillespie
       
      Wikileaks emphasizes its overall mission
  • Update: On July 6, 2010, Private Bradley Manning, a 22 year old intelligence analyst with the United States Army in Baghdad, was charged with disclosing this video (after allegedly speaking to an unfaithful journalist)
    • Duncan Gillespie
       
      One of the most famous and graphic files released by wikileaks.
  • The Apache crew and those behind the cover up depicted in the video have yet to be charged.
  • ...1 more annotation...
  • He is currently imprisoned in Kuwait.
Jaclyn Udell

Mirror (computing) - Wikipedia, the free encyclopedia - 0 views

  • In computing, a mirror is an exact copy of a data set. On the Internet, a mirror site is an exact copy of another Internet site. Mirror sites are most commonly used to provide multiple sources of the same information, and are of particular value as a way of providing reliable access to large downloads. Mirroring is a type of file synchronization. A live mirror is automatically updated as soon as the original is changed.
  • To provide access to otherwise unavailable information. For example, when the popular Google search engine was banned in 2002 by the People's Republic of China, the mirror elgooG was used as a way of effectively circumventing the ban.
Shida Zhang

mirror site from FOLDOC - 0 views

shared by Shida Zhang on 15 Mar 11 - No Cached
  • networking> An archive site or website which keeps a copy of some or all files at another site so as to make them more quickly available and to reduce the load on the source site. It is generally best to use the mirror that is physically closest to you as this will usually give the fastest download.
  •  
    Definition for mirror sites
Tyler Sax

WikiLeaks - Submissions - 0 views

    • Randall Bass
       
      The Wikileaks postings are meant to be the beginning of a chain of reference. 
  • That is why we have created our novel method of submission based on a suite of security technologies designed to provide anonymity. We have put a great deal of technical and design work into the drop box because we take the journalist-source relationship very seriously.
    • Randall Bass
       
      What is the security architecture of Wikileaks? What makes the drop box secure? (RBass)
  • ...4 more annotations...
  • Communication is secured with SSL encryption.
  • 3.3 High risk postal submissions
  • This is because our journalists write news stories based on the material, and then provide a link to the supporting documentation to prove our stories are true. It’s not news if it has been publicly available elsewhere first, and we are a news organisation.
  • we do not solicit it
    • Tyler Sax
       
      This assertion was certainly challenged when it came to the most recent US government document leaks. Some speculated that Assange (or someone on his "team") helped the US soldier gain access to the documents
chaeyouncho91

Military's Killing of 2 Journalists in Iraq Detailed in New Book - washingtonpost.com - 0 views

  •  
    Shows how even the media is under control. The article also states that the Wikileak release of video questions the accountability of publicized (and unrevealed) investigations by the US forces and calls for more transparency in order to prevent such incidents in the future.
chaeyouncho91

Grim truths of Wikileaks Iraq video | Douglas Haddow | Comment is free | guardian.co.uk - 0 views

  •  
    About yet another stakeholder of wikileaks - how it forces the readers to face the 'grim truths' of reality
Tyler Sax

How Nuclear Reactors Work, And How They Fail | Popular Science - 0 views

  •  
    This article is completely irrelevant to what we're talking about...Yet at the same time, I find something relevant about it. It's an article written by Pop Sci about the basics of how nuclear reactors work, in light of the current situation in Japan. The key line (in the subtitle) is: "Here's what you need to know to understand the news, as it happens" As soon as I read this I, of course, though of our approach to the seminar. Not everyone can be an expert in web technologies (or in nuclear engineering) but there is definite value in understanding the web (or nuclear reactors) at a deeper level than the average news-reader/consumer/global citizen. This article is proof of that.   
  •  
    I completely agree!
« First ‹ Previous 41 - 60 Next ›
Showing 20 items per page