Skip to main content

Home/ New Media Ethics 2009 course/ Group items tagged Secrecy

Rss Feed Group items tagged

Weiye Loh

Arianna Huffington: The Media Gets It Wrong on WikiLeaks: It's About Broken Trust, Not ... - 0 views

  • Too much of the coverage has been meta -- focusing on questions about whether the leaks were justified, while too little has dealt with the details of what has actually been revealed and what those revelations say about the wisdom of our ongoing effort in Afghanistan. There's a reason why the administration is so upset about these leaks.
  • True, there hasn't been one smoking-gun, bombshell revelation -- but that's certainly not to say the cables haven't been revealing. What there has been instead is more of the consistent drip, drip, drip of damning details we keep getting about the war.
  • It's notable that the latest leaks came out the same week President Obama went to Afghanistan for his surprise visit to the troops -- and made a speech about how we are "succeeding" and "making important progress" and bound to "prevail."
  • ...16 more annotations...
  • The WikiLeaks cables present quite a different picture. What emerges is one reality (the real one) colliding with another (the official one). We see smart, good-faith diplomats and foreign service personnel trying to make the truth on the ground match up to the one the administration has proclaimed to the public. The cables show the widening disconnect. It's like a foreign policy Ponzi scheme -- this one fueled not by the public's money, but the public's acquiescence.
  • The second aspect of the story -- the one that was the focus of the symposium -- is the changing relationship to government that technology has made possible.
  • Back in the year 2007, B.W. (Before WikiLeaks), Barack Obama waxed lyrical about government and the internet: "We have to use technology to open up our democracy. It's no coincidence that one of the most secretive administrations in our history has favored special interest and pursued policy that could not stand up to the sunlight."
  • Not long after the election, in announcing his "Transparency and Open Government" policy, the president proclaimed: "Transparency promotes accountability and provides information for citizens about what their Government is doing. Information maintained by the Federal Government is a national asset." Cut to a few years later. Now that he's defending a reality that doesn't match up to, well, reality, he's suddenly not so keen on the people having a chance to access this "national asset."
  • Even more wikironic are the statements by his Secretary of State who, less than a year ago, was lecturing other nations about the value of an unfettered and free internet. Given her description of the WikiLeaks as "an attack on America's foreign policy interests" that have put in danger "innocent people," her comments take on a whole different light. Some highlights: In authoritarian countries, information networks are helping people discover new facts and making governments more accountable... technologies with the potential to open up access to government and promote transparency can also be hijacked by governments to crush dissent and deny human rights... As in the dictatorships of the past, governments are targeting independent thinkers who use these tools. Now "making government accountable" is, as White House spokesman Robert Gibbs put it, a "reckless and dangerous action."
  • ay Rosen, one of the participants in the symposium, wrote a brilliant essay entitled "From Judith Miller to Julian Assange." He writes: For the portion of the American press that still looks to Watergate and the Pentagon Papers for inspiration, and that considers itself a check on state power, the hour of its greatest humiliation can, I think, be located with some precision: it happened on Sunday, September 8, 2002. That was when the New York Times published Judith Miller and Michael Gordon's breathless, spoon-fed -- and ultimately inaccurate -- account of Iraqi attempts to buy aluminum tubes to produce fuel for a nuclear bomb.
  • Miller's after-the-facts-proved-wrong response, as quoted in a Michael Massing piece in the New York Review of Books, was: "My job isn't to assess the government's information and be an independent intelligence analyst myself. My job is to tell readers of The New York Times what the government thought about Iraq's arsenal." In other words, her job is to tell citizens what their government is saying, not, as Obama called for in his transparency initiative, what their government is doing.
  • As Jay Rosen put it: Today it is recognized at the Times and in the journalism world that Judy Miller was a bad actor who did a lot of damage and had to go. But it has never been recognized that secrecy was itself a bad actor in the events that led to the collapse, that it did a lot of damage, and parts of it might have to go. Our press has never come to terms with the ways in which it got itself on the wrong side of secrecy as the national security state swelled in size after September 11th.
  • And in the WikiLeaks case, much of media has again found itself on the wrong side of secrecy -- and so much of the reporting about WikiLeaks has served to obscure, to conflate, to mislead. For instance, how many stories have you heard or read about all the cables being "dumped" in "indiscriminate" ways with no attempt to "vet" and "redact" the stories first. In truth, only just over 1,200 of the 250,000 cables have been released, and WikiLeaks is now publishing only those cables vetted and redacted by their media partners, which includes the New York Times here and the Guardian in England.
  • The establishment media may be part of the media, but they're also part of the establishment. And they're circling the wagons. One method they're using, as Andrew Rasiej put it after the symposium, is to conflate the secrecy that governments use to operate and the secrecy that is used to hide the truth and allow governments to mislead us.
  • Nobody, including WikiLeaks, is promoting the idea that government should exist in total transparency,
  • Assange himself would not disagree. "Secrecy is important for many things," he told Time's Richard Stengel. "We keep secret the identity of our sources, as an example, take great pains to do it." At the same time, however, secrecy "shouldn't be used to cover up abuses."
  • Decentralizing government power, limiting it, and challenging it was the Founders' intent and these have always been core conservative principles. Conservatives should prefer an explosion of whistleblower groups like WikiLeaks to a federal government powerful enough to take them down. Government officials who now attack WikiLeaks don't fear national endangerment, they fear personal embarrassment. And while scores of conservatives have long promised to undermine or challenge the current monstrosity in Washington, D.C., it is now an organization not recognizably conservative that best undermines the political establishment and challenges its very foundations.
  • It is not, as Simon Jenkins put it in the Guardian, the job of the media to protect the powerful from embarrassment. As I said at the symposium, its job is to play the role of the little boy in The Emperor's New Clothes -- brave enough to point out what nobody else is willing to say.
  • When the press trades truth for access, it is WikiLeaks that acts like the little boy. "Power," wrote Jenkins, "loathes truth revealed. When the public interest is undermined by the lies and paranoia of power, it is disclosure that takes sanity by the scruff of its neck and sets it back on its feet."
  • A final aspect of the story is Julian Assange himself. Is he a visionary? Is he an anarchist? Is he a jerk? This is fun speculation, but why does it have an impact on the value of the WikiLeaks revelations?
Weiye Loh

Cut secrecy down to a minimum - 0 views

  • This is not an anarchist call for the ransacking of government files, in the manner of Julian Assange. WikiLeaks has raised the issue of whether the unauthorised and anarchic acquisition and leaking of government records is legally or ethically defensible. I don't wish to embark on that debate. I believe it is a distraction from a much more important debate about how to enhance the quality of political and public deliberation while drastically reducing secrecy.
  • If public policy is sound, it must be possible for the grounds of such policy to be made public without caveat and to withstand public scrutiny. We should not be left guessing, as we too commonly are; and deploring the evasions of politicians and their minions.
Weiye Loh

Secrecy in the age of WikiLeaks - 1 views

  •  
    As government agencies look to leverage new technologies to communicate with the public, move more citizen services online, share services amongst agencies, share intelligence for national security purposes and collaborate with other nations and private industry, they will need to take a more open stance to secrecy and information sharing. But to mitigate risks, they need to take a more solid security stance at the same time. It is imperative for leaders at all levels within government (agencies, departments, contractors, etc.) to weigh the risks and benefits of making information more accessible and, once decided, put strong safeguards in place to ensure only those who need access can get access. Information leaks imply failures across multiple areas, particularly risk management, access control and confidentiality. The ongoing WikiLeaks exposé clearly shows that the threat is not always from external groups; it can be far more insidious when it stems from trusted individuals within an organisation.
Weiye Loh

Real-name Weibo, for the good of all - China Media Project - 0 views

  • According to my own research, real-name registration for the internet is done by many countries around the world. But first it requires a basis in the law. In the mobile phone sector now we’re only at about 58 percent real-name registered, and about 40 percent of the market remains unregistered. This is a process, and it has to be explained. The trials with real-name registration on the Weibo are for the sake of the orderly and healthy development of the internet — in order to protect the privacy and secrecy of individuals, corporations and the nation.
  •  
    real-name registration on China's social media platforms, a policy formally taking effect on March 16, was meant to ensure "the privacy and secrecy of individuals, corporations and the nation."
Weiye Loh

How We Know by Freeman Dyson | The New York Review of Books - 0 views

  • Another example illustrating the central dogma is the French optical telegraph.
  • The telegraph was an optical communication system with stations consisting of large movable pointers mounted on the tops of sixty-foot towers. Each station was manned by an operator who could read a message transmitted by a neighboring station and transmit the same message to the next station in the transmission line.
  • The distance between neighbors was about seven miles. Along the transmission lines, optical messages in France could travel faster than drum messages in Africa. When Napoleon took charge of the French Republic in 1799, he ordered the completion of the optical telegraph system to link all the major cities of France from Calais and Paris to Toulon and onward to Milan. The telegraph became, as Claude Chappe had intended, an important instrument of national power. Napoleon made sure that it was not available to private users.
  • ...27 more annotations...
  • Unlike the drum language, which was based on spoken language, the optical telegraph was based on written French. Chappe invented an elaborate coding system to translate written messages into optical signals. Chappe had the opposite problem from the drummers. The drummers had a fast transmission system with ambiguous messages. They needed to slow down the transmission to make the messages unambiguous. Chappe had a painfully slow transmission system with redundant messages. The French language, like most alphabetic languages, is highly redundant, using many more letters than are needed to convey the meaning of a message. Chappe’s coding system allowed messages to be transmitted faster. Many common phrases and proper names were encoded by only two optical symbols, with a substantial gain in speed of transmission. The composer and the reader of the message had code books listing the message codes for eight thousand phrases and names. For Napoleon it was an advantage to have a code that was effectively cryptographic, keeping the content of the messages secret from citizens along the route.
  • After these two historical examples of rapid communication in Africa and France, the rest of Gleick’s book is about the modern development of information technolog
  • The modern history is dominated by two Americans, Samuel Morse and Claude Shannon. Samuel Morse was the inventor of Morse Code. He was also one of the pioneers who built a telegraph system using electricity conducted through wires instead of optical pointers deployed on towers. Morse launched his electric telegraph in 1838 and perfected the code in 1844. His code used short and long pulses of electric current to represent letters of the alphabet.
  • Morse was ideologically at the opposite pole from Chappe. He was not interested in secrecy or in creating an instrument of government power. The Morse system was designed to be a profit-making enterprise, fast and cheap and available to everybody. At the beginning the price of a message was a quarter of a cent per letter. The most important users of the system were newspaper correspondents spreading news of local events to readers all over the world. Morse Code was simple enough that anyone could learn it. The system provided no secrecy to the users. If users wanted secrecy, they could invent their own secret codes and encipher their messages themselves. The price of a message in cipher was higher than the price of a message in plain text, because the telegraph operators could transcribe plain text faster. It was much easier to correct errors in plain text than in cipher.
  • Claude Shannon was the founding father of information theory. For a hundred years after the electric telegraph, other communication systems such as the telephone, radio, and television were invented and developed by engineers without any need for higher mathematics. Then Shannon supplied the theory to understand all of these systems together, defining information as an abstract quantity inherent in a telephone message or a television picture. Shannon brought higher mathematics into the game.
  • When Shannon was a boy growing up on a farm in Michigan, he built a homemade telegraph system using Morse Code. Messages were transmitted to friends on neighboring farms, using the barbed wire of their fences to conduct electric signals. When World War II began, Shannon became one of the pioneers of scientific cryptography, working on the high-level cryptographic telephone system that allowed Roosevelt and Churchill to talk to each other over a secure channel. Shannon’s friend Alan Turing was also working as a cryptographer at the same time, in the famous British Enigma project that successfully deciphered German military codes. The two pioneers met frequently when Turing visited New York in 1943, but they belonged to separate secret worlds and could not exchange ideas about cryptography.
  • In 1945 Shannon wrote a paper, “A Mathematical Theory of Cryptography,” which was stamped SECRET and never saw the light of day. He published in 1948 an expurgated version of the 1945 paper with the title “A Mathematical Theory of Communication.” The 1948 version appeared in the Bell System Technical Journal, the house journal of the Bell Telephone Laboratories, and became an instant classic. It is the founding document for the modern science of information. After Shannon, the technology of information raced ahead, with electronic computers, digital cameras, the Internet, and the World Wide Web.
  • According to Gleick, the impact of information on human affairs came in three installments: first the history, the thousands of years during which people created and exchanged information without the concept of measuring it; second the theory, first formulated by Shannon; third the flood, in which we now live
  • The event that made the flood plainly visible occurred in 1965, when Gordon Moore stated Moore’s Law. Moore was an electrical engineer, founder of the Intel Corporation, a company that manufactured components for computers and other electronic gadgets. His law said that the price of electronic components would decrease and their numbers would increase by a factor of two every eighteen months. This implied that the price would decrease and the numbers would increase by a factor of a hundred every decade. Moore’s prediction of continued growth has turned out to be astonishingly accurate during the forty-five years since he announced it. In these four and a half decades, the price has decreased and the numbers have increased by a factor of a billion, nine powers of ten. Nine powers of ten are enough to turn a trickle into a flood.
  • Gordon Moore was in the hardware business, making hardware components for electronic machines, and he stated his law as a law of growth for hardware. But the law applies also to the information that the hardware is designed to embody. The purpose of the hardware is to store and process information. The storage of information is called memory, and the processing of information is called computing. The consequence of Moore’s Law for information is that the price of memory and computing decreases and the available amount of memory and computing increases by a factor of a hundred every decade. The flood of hardware becomes a flood of information.
  • In 1949, one year after Shannon published the rules of information theory, he drew up a table of the various stores of memory that then existed. The biggest memory in his table was the US Library of Congress, which he estimated to contain one hundred trillion bits of information. That was at the time a fair guess at the sum total of recorded human knowledge. Today a memory disc drive storing that amount of information weighs a few pounds and can be bought for about a thousand dollars. Information, otherwise known as data, pours into memories of that size or larger, in government and business offices and scientific laboratories all over the world. Gleick quotes the computer scientist Jaron Lanier describing the effect of the flood: “It’s as if you kneel to plant the seed of a tree and it grows so fast that it swallows your whole town before you can even rise to your feet.”
  • On December 8, 2010, Gleick published on the The New York Review’s blog an illuminating essay, “The Information Palace.” It was written too late to be included in his book. It describes the historical changes of meaning of the word “information,” as recorded in the latest quarterly online revision of the Oxford English Dictionary. The word first appears in 1386 a parliamentary report with the meaning “denunciation.” The history ends with the modern usage, “information fatigue,” defined as “apathy, indifference or mental exhaustion arising from exposure to too much information.”
  • The consequences of the information flood are not all bad. One of the creative enterprises made possible by the flood is Wikipedia, started ten years ago by Jimmy Wales. Among my friends and acquaintances, everybody distrusts Wikipedia and everybody uses it. Distrust and productive use are not incompatible. Wikipedia is the ultimate open source repository of information. Everyone is free to read it and everyone is free to write it. It contains articles in 262 languages written by several million authors. The information that it contains is totally unreliable and surprisingly accurate. It is often unreliable because many of the authors are ignorant or careless. It is often accurate because the articles are edited and corrected by readers who are better informed than the authors
  • Jimmy Wales hoped when he started Wikipedia that the combination of enthusiastic volunteer writers with open source information technology would cause a revolution in human access to knowledge. The rate of growth of Wikipedia exceeded his wildest dreams. Within ten years it has become the biggest storehouse of information on the planet and the noisiest battleground of conflicting opinions. It illustrates Shannon’s law of reliable communication. Shannon’s law says that accurate transmission of information is possible in a communication system with a high level of noise. Even in the noisiest system, errors can be reliably corrected and accurate information transmitted, provided that the transmission is sufficiently redundant. That is, in a nutshell, how Wikipedia works.
  • The information flood has also brought enormous benefits to science. The public has a distorted view of science, because children are taught in school that science is a collection of firmly established truths. In fact, science is not a collection of truths. It is a continuing exploration of mysteries. Wherever we go exploring in the world around us, we find mysteries. Our planet is covered by continents and oceans whose origin we cannot explain. Our atmosphere is constantly stirred by poorly understood disturbances that we call weather and climate. The visible matter in the universe is outweighed by a much larger quantity of dark invisible matter that we do not understand at all. The origin of life is a total mystery, and so is the existence of human consciousness. We have no clear idea how the electrical discharges occurring in nerve cells in our brains are connected with our feelings and desires and actions.
  • Even physics, the most exact and most firmly established branch of science, is still full of mysteries. We do not know how much of Shannon’s theory of information will remain valid when quantum devices replace classical electric circuits as the carriers of information. Quantum devices may be made of single atoms or microscopic magnetic circuits. All that we know for sure is that they can theoretically do certain jobs that are beyond the reach of classical devices. Quantum computing is still an unexplored mystery on the frontier of information theory. Science is the sum total of a great multitude of mysteries. It is an unending argument between a great multitude of voices. It resembles Wikipedia much more than it resembles the Encyclopaedia Britannica.
  • The rapid growth of the flood of information in the last ten years made Wikipedia possible, and the same flood made twenty-first-century science possible. Twenty-first-century science is dominated by huge stores of information that we call databases. The information flood has made it easy and cheap to build databases. One example of a twenty-first-century database is the collection of genome sequences of living creatures belonging to various species from microbes to humans. Each genome contains the complete genetic information that shaped the creature to which it belongs. The genome data-base is rapidly growing and is available for scientists all over the world to explore. Its origin can be traced to the year 1939, when Shannon wrote his Ph.D. thesis with the title “An Algebra for Theoretical Genetics.
  • Shannon was then a graduate student in the mathematics department at MIT. He was only dimly aware of the possible physical embodiment of genetic information. The true physical embodiment of the genome is the double helix structure of DNA molecules, discovered by Francis Crick and James Watson fourteen years later. In 1939 Shannon understood that the basis of genetics must be information, and that the information must be coded in some abstract algebra independent of its physical embodiment. Without any knowledge of the double helix, he could not hope to guess the detailed structure of the genetic code. He could only imagine that in some distant future the genetic information would be decoded and collected in a giant database that would define the total diversity of living creatures. It took only sixty years for his dream to come true.
  • In the twentieth century, genomes of humans and other species were laboriously decoded and translated into sequences of letters in computer memories. The decoding and translation became cheaper and faster as time went on, the price decreasing and the speed increasing according to Moore’s Law. The first human genome took fifteen years to decode and cost about a billion dollars. Now a human genome can be decoded in a few weeks and costs a few thousand dollars. Around the year 2000, a turning point was reached, when it became cheaper to produce genetic information than to understand it. Now we can pass a piece of human DNA through a machine and rapidly read out the genetic information, but we cannot read out the meaning of the information. We shall not fully understand the information until we understand in detail the processes of embryonic development that the DNA orchestrated to make us what we are.
  • The explosive growth of information in our human society is a part of the slower growth of ordered structures in the evolution of life as a whole. Life has for billions of years been evolving with organisms and ecosystems embodying increasing amounts of information. The evolution of life is a part of the evolution of the universe, which also evolves with increasing amounts of information embodied in ordered structures, galaxies and stars and planetary systems. In the living and in the nonliving world, we see a growth of order, starting from the featureless and uniform gas of the early universe and producing the magnificent diversity of weird objects that we see in the sky and in the rain forest. Everywhere around us, wherever we look, we see evidence of increasing order and increasing information. The technology arising from Shannon’s discoveries is only a local acceleration of the natural growth of information.
  • . Lord Kelvin, one of the leading physicists of that time, promoted the heat death dogma, predicting that the flow of heat from warmer to cooler objects will result in a decrease of temperature differences everywhere, until all temperatures ultimately become equal. Life needs temperature differences, to avoid being stifled by its waste heat. So life will disappear
  • Thanks to the discoveries of astronomers in the twentieth century, we now know that the heat death is a myth. The heat death can never happen, and there is no paradox. The best popular account of the disappearance of the paradox is a chapter, “How Order Was Born of Chaos,” in the book Creation of the Universe, by Fang Lizhi and his wife Li Shuxian.2 Fang Lizhi is doubly famous as a leading Chinese astronomer and a leading political dissident. He is now pursuing his double career at the University of Arizona.
  • The belief in a heat death was based on an idea that I call the cooking rule. The cooking rule says that a piece of steak gets warmer when we put it on a hot grill. More generally, the rule says that any object gets warmer when it gains energy, and gets cooler when it loses energy. Humans have been cooking steaks for thousands of years, and nobody ever saw a steak get colder while cooking on a fire. The cooking rule is true for objects small enough for us to handle. If the cooking rule is always true, then Lord Kelvin’s argument for the heat death is correct.
  • the cooking rule is not true for objects of astronomical size, for which gravitation is the dominant form of energy. The sun is a familiar example. As the sun loses energy by radiation, it becomes hotter and not cooler. Since the sun is made of compressible gas squeezed by its own gravitation, loss of energy causes it to become smaller and denser, and the compression causes it to become hotter. For almost all astronomical objects, gravitation dominates, and they have the same unexpected behavior. Gravitation reverses the usual relation between energy and temperature. In the domain of astronomy, when heat flows from hotter to cooler objects, the hot objects get hotter and the cool objects get cooler. As a result, temperature differences in the astronomical universe tend to increase rather than decrease as time goes on. There is no final state of uniform temperature, and there is no heat death. Gravitation gives us a universe hospitable to life. Information and order can continue to grow for billions of years in the future, as they have evidently grown in the past.
  • The vision of the future as an infinite playground, with an unending sequence of mysteries to be understood by an unending sequence of players exploring an unending supply of information, is a glorious vision for scientists. Scientists find the vision attractive, since it gives them a purpose for their existence and an unending supply of jobs. The vision is less attractive to artists and writers and ordinary people. Ordinary people are more interested in friends and family than in science. Ordinary people may not welcome a future spent swimming in an unending flood of information.
  • A darker view of the information-dominated universe was described in a famous story, “The Library of Babel,” by Jorge Luis Borges in 1941.3 Borges imagined his library, with an infinite array of books and shelves and mirrors, as a metaphor for the universe.
  • Gleick’s book has an epilogue entitled “The Return of Meaning,” expressing the concerns of people who feel alienated from the prevailing scientific culture. The enormous success of information theory came from Shannon’s decision to separate information from meaning. His central dogma, “Meaning is irrelevant,” declared that information could be handled with greater freedom if it was treated as a mathematical abstraction independent of meaning. The consequence of this freedom is the flood of information in which we are drowning. The immense size of modern databases gives us a feeling of meaninglessness. Information in such quantities reminds us of Borges’s library extending infinitely in all directions. It is our task as humans to bring meaning back into this wasteland. As finite creatures who think and feel, we can create islands of meaning in the sea of information. Gleick ends his book with Borges’s image of the human condition:We walk the corridors, searching the shelves and rearranging them, looking for lines of meaning amid leagues of cacophony and incoherence, reading the history of the past and of the future, collecting our thoughts and collecting the thoughts of others, and every so often glimpsing mirrors, in which we may recognize creatures of the information.
Weiye Loh

Wikileaks and the Long Haul « Clay Shirky - 0 views

  • Citizens of a functioning democracy must be able to know what the state is saying and doing in our name, to engage in what Pierre Rosanvallon calls “counter-democracy”*, the democracy of citizens distrusting rather than legitimizing the actions of the state. Wikileaks plainly improves those abilities.
  • On the other hand, human systems can’t stand pure transparency. For negotiation to work, people’s stated positions have to change, but change is seen, almost universally, as weakness. People trying to come to consensus must be able to privately voice opinions they would publicly abjure, and may later abandon. Wikileaks plainly damages those abilities. (If Aaron Bady’s analysis is correct, it is the damage and not the oversight that Wikileaks is designed to create.*)
  • we have a tension between two requirements for democratic statecraft, one that can’t be resolved, but can be brought to an acceptable equilibrium. Indeed, like the virtues of equality vs. liberty, or popular will vs. fundamental rights, it has to be brought into such an equilibrium for democratic statecraft not to be wrecked either by too much secrecy or too much transparency.
  • ...5 more annotations...
  • As Tom Slee puts it, “Your answer to ‘what data should the government make public?’ depends not so much on what you think about data, but what you think about the government.”* My personal view is that there is too much secrecy in the current system, and that a corrective towards transparency is a good idea. I don’t, however, believe in total transparency, and even more importantly, I don’t think that independent actors who are subject to no checks or balances is a good idea in the long haul.
  • The practical history of politics, however, suggests that the periodic appearance of such unconstrained actors in the short haul is essential to increased democratization, not just of politics but of thought. We celebrate the printers of 16th century Amsterdam for making it impossible for the Catholic Church to constrain the output of the printing press to Church-approved books*, a challenge that helped usher in, among other things, the decentralization of scientific inquiry and the spread of politically seditious writings advocating democracy. This intellectual and political victory didn’t, however, mean that the printing press was then free of all constraints. Over time, a set of legal limitations around printing rose up, including restrictions on libel, the publication of trade secrets, and sedition. I don’t agree with all of these laws, but they were at least produced by some legal process.
  • I am conflicted about the right balance between the visibility required for counter-democracy and the need for private speech among international actors. Here’s what I’m not conflicted about: When authorities can’t get what they want by working within the law, the right answer is not to work outside the law. The right answer is that they can’t get what they want.
  • The Unites States is — or should be — subject to the rule of law, which makes the extra-judicial pursuit of Wikileaks especially nauseating. (Calls for Julian’s assassination are even more nauseating.) It may be that what Julian has done is a crime. (I know him casually, but not well enough to vouch for his motivations, nor am I a lawyer.) In that case, the right answer is to bring the case to a trial.
  • Over the long haul, we will need new checks and balances for newly increased transparency — Wikileaks shouldn’t be able to operate as a law unto itself anymore than the US should be able to. In the short haul, though, Wikileaks is our Amsterdam. Whatever restrictions we eventually end up enacting, we need to keep Wikileaks alive today, while we work through the process democracies always go through to react to change. If it’s OK for a democracy to just decide to run someone off the internet for doing something they wouldn’t prosecute a newspaper for doing, the idea of an internet that further democratizes the public sphere will have taken a mortal blow.
Olivia Chang

Boys in blue raid Perth's Sunday Times - 2 views

Story URL: http://www.somebodythinkofthechildren.com/boys-in-blue-raid-perths-sunday-times/ Summary of the article: In February, a Sunday Times reporter Paul Lampathakis wrote an article about a ...

censorship free press

started by Olivia Chang on 02 Sep 09 no follow-up yet
Weiye Loh

In Europe, sharp criticism of US reaction to WikiLeaks - The Boston Globe - 0 views

  • Washington’s fierce reaction to the flood of secret diplomatic cables released by WikiLeaks displays imperial arrogance and hypocrisy, indicating a post-9/11 obsession with secrecy that contradicts American principles.
  • John Naughton, writing in the same British paper, deplored the attack on the openness of the Internet and the pressure on companies such as Amazon and eBay to evict the WikiLeaks site. “The response has been vicious, coordinated and potentially comprehensive,’’ he said, and presents a “delicious irony’’ that “it is now the so-called liberal democracies that are clamoring to shut WikiLeaks down.’’
  • A year ago, he noted, Clinton made a major speech about Internet freedom, interpreted as a rebuke to China’s cyberattack on Google. “Even in authoritarian countries,’’ she said, “information networks are helping people to discover new facts and making governments more accountable.’’ To Naughton now, “that Clinton speech reads like a satirical masterpiece.’’
  • ...4 more annotations...
  • The Russians seemed to take a special delight in tweaking Washington over its reaction to the leaks, suggesting the Americans are being hypocritical. “If it is a full-fledged democracy, then why have they put Assange away in jail? You call that democracy?’’ Prime Minister Vladimir V. Putin said during a news briefing with the French prime minister, Francois Fillon.
  • Even The Financial Times Deutschland (independent of the English-language Financial Times), said that “the already damaged reputation of the United States will only be further tattered with Assange’s new martyr status.’’ It added that “the openly embraced hope of the US government that along with Assange, WikiLeaks will disappear from the scene, is questionable.’’
  • Assange is being hounded, the paper said, “even though no one can explain what crimes Assange allegedly committed with the publication of the secret documents, or why publication by WikiLeaks was an offense, and in The New York Times, it was not.’’
  • But Renaud Girard, a respected reporter for the center-right Le Figaro, said he was impressed by the generally high quality of the American diplomatic corps. “What is most fascinating is that we see no cynicism in US diplomacy,’’ he said. “They really believe in human rights in Africa and China and Russia and Asia. They really believe in democracy and human rights. People accuse the Americans of double standards all the time. But it’s not true here. If anything, the diplomats are almost naive.’
Weiye Loh

WikiLeaks is delinquent and anti-democratic - Telegraph - 0 views

  • The frenzied hyperbole generated by the latest WikiLeaks episode – an anarchic, but so far remarkably ineffectual, spasm of delinquency – seems peculiarly weak in its understanding of the basic concepts with which its rhetoric is larded. It is, in fact, the precise opposite of what its apologists claim it to be: with its unilateral programme of revealing confidential information, which it boasts is unstoppable and accountable to no one, it is profoundly anti-democratic.
  • In its self-contradictory maintenance of its own untraceable operations, it effectively declares itself to be the only agency in the world that is entitled to secrecy. Its insistence that it is somehow a voice of open and transparent “freedom of expression” is simply absurd: there is no issue here of any individual or group openly expressing an opinion that would otherwise have been suppressed.
  • the leaked material has been almost entirely unsurprising, apart from one rather spectacular own goal in WikiLeaks terms: it turns out that a number of Gulf states have been urging the US to strike at Iran before it succeeds in producing nuclear weapons, and that the US has been resisting this pressure. This tends to undermine both the image of America as trigger-happy warmonger and the idea that the entire Muslim world is united in hatred and distrust of the Great Satan.
  • ...2 more annotations...
  • But there was one document that did include information of a sensational kind: a list of soft targets (places that could be expected to be less well-protected) that the US considered vital to its national security. Many of these were non‑military, including European centres for the manufacture of smallpox vaccine.
  • there is nothing democratic about this at all. It is an arrogant, defiant provocation of international conventions by a tiny handful of unidentifiable people that involved no consultation or popular mandate. Who are they? Apart from their self-publicising editor, Julian Assange, they are nameless and faceless. To whom could a society or an electorate – even if it was overwhelmingly opposed to such actions – protest or present its arguments?
Weiye Loh

Johann Hari: The Pope, the Prophet, and the religious support for evil - Johann Hari, C... - 0 views

  • What can make tens of millions of people – who are in their daily lives peaceful and compassionate and caring – suddenly want to physically dismember a man for drawing a cartoon, or make excuses for an international criminal conspiracy to protect child-rapists? Not reason. Not evidence. No. But it can happen when people choose their polar opposite – religion.
  • people can begin to behave in bizarre ways when they decide it is a good thing to abandon any commitment to fact and instead act on faith. It has led some to regard people accused of the attempted murders of the Mohamed cartoonists as victims, and to demand "respect" for the Pope, when he should be in a police station being quizzed about his role in covering up and thereby enabling the rape of children.
  • One otherwise liberal newspaper ran an article saying that since the cartoonists had engaged in an "aggressive act" and shown "prejudice... against religion per se", so it stated menacingly that no doubt "someone else is out there waiting for an opportunity to strike again".
  • ...3 more annotations...
  • if religion wasn't involved – would be so obvious it would seem ludicrous to have to say them out loud. Drawing a cartoon is not an act of aggression. Trying to kill somebody with an axe is. There is no moral equivalence between peacefully expressing your disagreement with an idea – any idea – and trying to kill somebody for it. Yet we have to say this because we have allowed religious people to claim their ideas belong to a different, exalted category, and it is abusive or violent merely to verbally question them. Nobody says I should "respect" conservatism or communism and keep my opposition to them to myself – but that's exactly what is routinely said about Islam or Christianity or Buddhism. What's the difference?
  • By 1962, it was becoming clear to the Vatican that a significant number of its priests were raping children. Rather than root it out, they issued a secret order called "Crimen Sollicitationis"' ordering bishops to swear the victims to secrecy and move the offending priest on to another parish. This of course meant they raped more children there, and on and on, in parish after parish.
  • when Ratzinger was Archbishop of Munich in the 1980s, one of his paedophile priests was "reassigned" in this way. He claims he didn't know. Yet a few years later he was put in charge of the Vatican's response to this kind of abuse and demanded every case had to be referred directly to him for 20 years. What happened on his watch, with every case going to his desk? Precisely this pattern, again and again. The BBC's Panorama studied one of many such cases. Father Tarcisio Spricigo was first accused of child abuse in 1991, in Brazil. He was moved by the Vatican four times, wrecking the lives of children at every stop. He was only caught in 2005 by the police, before he could be moved on once more.
  •  
    This enforced 'respect' is a creeping vine: it soon extends from ideas to institutions
Weiye Loh

Valerie Plame, YES! Wikileaks, NO! - English pravda.ru - 0 views

  • n my recent article Ward Churchill: The Lie Lives On (Pravda.Ru, 11/29/2010), I discussed the following realities about America's legal "system": it is duplicitous and corrupt; it will go to any extremes to insulate from prosecution, and in many cases civil liability, persons whose crimes facilitate this duplicity and corruption; it has abdicated its responsibility to serve as a "check-and-balance" against the other two branches of government, and has instead been transformed into a weapon exploited by the wealthy, the corporations, and the politically connected to defend their criminality, conceal their corruption and promote their economic interests
  • it is now evident that Barack Obama, who entered the White House with optimistic messages of change and hope, is just as complicit in, and manipulative of, the legal "system's" duplicity and corruption as was his predecessor George W. Bush.
  • the Obama administration has refused to prosecute former Attorney General John Ashcroft for abusing the "material witness" statute; refused to prosecute Ashcroft's successor (and suspected perjurer) Alberto Gonzales for his role in the politically motivated firing of nine federal prosecutors; refused to prosecute Justice Department authors of the now infamous "torture memos," like John Yoo and Jay Bybee; and, more recently, refused to prosecute former CIA official Jose Rodriquez Jr. for destroying tapes that purportedly showed CIA agents torturing detainees.
  • ...11 more annotations...
  • thanks to Wikileaks, the world has been enlightened to the fact that the Obama administration not only refused to prosecute these individuals itself, it also exerted pressure on the governments of Germany and Spain not to prosecute, or even indict, any of the torturers or war criminals from the Bush dictatorship.
  • we see many right-wing commentators demanding that Assange be hunted down, with some even calling for his murder, on the grounds that he may have endangered lives by releasing confidential government documents. Yet, for the right-wing, this apparently was not a concern when the late columnist Robert Novak "outed" CIA agent Valerie Plame after her husband Joseph Wilson authored an OP-ED piece in The New York Times criticizing the motivations for waging war against Iraq. Even though there was evidence of involvement within the highest echelons of the Bush dictatorship, only one person, Lewis "Scooter" Libby, was indicted and convicted of "outing" Plame to Novak. And, despite the fact that this "outing" potentially endangered the lives of Plame's overseas contacts, Bush commuted Libby's thirty-month prison sentence, calling it "excessive."
  • Why the disparity? The answer is simple: The Plame "outing" served the interests of the military-industrial complex and helped to conceal the Bush dictatorship's lies, tortures and war crimes, while Wikileaks not only exposed such evils, but also revealed how Obama's administration, and Obama himself, are little more than "snake oil" merchants pontificating about government accountability while undermining it at every turn.
  • When the United States Constitution was being created, a conflict emerged between delegates who wanted a strong federal government (the Federalists) and those who wanted a weak federal government (the anti-Federalists). Although the Federalists won the day, one of the most distinguished anti-Federalists, George Mason, refused to sign the new Constitution, sacrificing in the process, some historians say, a revered place amongst America's founding fathers. Two of Mason's concerns were that the Constitution did not contain a Bill of Rights, and that the presidential pardon powers would allow corrupt presidents to pardon people who had committed crimes on presidential orders.
  • Mason's concerns about the abuse of the pardon powers were eventually proven right when Gerald Ford pardoned Richard Nixon, when Ronald Reagan pardoned FBI agents convicted of authorizing illegal break-ins, and when George H.W. Bush pardoned six individuals involved in the Iran-Contra Affair.
  • Mason was also proven right after the Federalists realized that the States would not ratify the Constitution unless a Bill of Rights was added. But this was done begrudgingly, as demonstrated by America's second president, Federalist John Adams, who essentially destroyed the right to freedom of speech via the Alien and Sedition Acts, which made it a crime to say, write or publish anything critical of the United States government.
  • Most criminals break laws that others have created, and people who assist in exposing or apprehending them are usually lauded as heroes. But with the "espionage" acts, the criminals themselves have actually created laws to conceal their crimes, and exploit these laws to penalize people who expose them.
  • The problem with America's system of government is that it has become too easy, and too convenient, to simply stamp "classified" on documents that reveal acts of government corruption, cover-up, mendacity and malfeasance, or to withhold them "in the interest of national security." Given this web of secrecy, is it any wonder why so many Americans are still skeptical about the "official" versions of the John F. Kennedy or Martin Luther King Jr. assassinations, or the events surrounding the attacks of September 11, 2001?
  • I want to believe that the Wikileaks documents will change America for the better. But what undoubtedly will happen is a repetition of the past: those who expose government crimes and cover-ups will be prosecuted or branded as criminals; new laws will be passed to silence dissent; new Liebermans will arise to intimidate the corporate-controlled media; and new ways will be found to conceal the truth.
  • What Wikileaks has done is make people understand why so many Americans are politically apathetic and content to lose themselves in one or more of the addictions American culture offers, be it drugs, alcohol, the Internet, video games, celebrity gossip, text-messaging-in essence anything that serves to divert attention from the harshness of reality.
  • the evils committed by those in power can be suffocating, and the sense of powerlessness that erupts from being aware of these evils can be paralyzing, especially when accentuated by the knowledge that government evildoers almost always get away with their crimes
Weiye Loh

God hates hackers: Anonymous warns Westboro Baptist Church, 'stop now, or else' - 0 views

  • Vigilante “hacktivist” group Anonymous has a new target: Westboro Baptist Church. In an open letter to the notorious Kansas-based church, Anonymous promises “vicious” retaliation against the organization if they do not “cease & desist” their protest activities.
  • Led by pastor Fred Phelps, Westboro Baptist has become infamous for picketing the funerals of US soldiers — events know as “Love Crusades” — and for their display of signs bearing inflammatory messages, like “God hates fags.” The church has long argued that their Constitutionally-protected right to freedom of speech allows them to continue their derogatory brand of social activism.
  • Anonymous also considers itself an “aggressive proponent” of free speech, having recently launched attacks on organizations they consider to be enemies of that right: Companies like PayPal, Visa and Master Card, who stopped processing donations to WikiLeaks after the anti-secrecy organization released a massive cache of US embassy cables; and the government of Egypt, which attempted to cut off its
  • ...1 more annotation...
  • Other Anonymous targets include the Church of Scientology and, most recently, cyber-security company HBGary, which attempted to infiltrate Anonymous. In response, the lose-knit hacker group released 71,800 HBGary emails, which revealed highly dubious activities by the company, almost instantaneously destroying HBGary’s reputation and potentially setting it on a path to financial ruin.
Weiye Loh

DenialDepot: A word of caution to the BEST project team - 0 views

  • 1) Any errors, however inconsequential, will be taken Very Seriously and accusations of fraud will be made.
  • 2) If you adjust the raw data we will accuse you of fraudulently fiddling the figures whilst cooking the books.3) If you don't adjust the raw data we will accuse you of fraudulently failing to account for station biases and UHI.
  • 7) By all means publish all your source code, but we will still accuse you of hiding the methodology for your adjustments.
  • ...10 more annotations...
  • 8) If you publish results to your website and errors are found, we will accuse you of a Very Serious Error irregardless of severity (see point #1) and bemoan the press release you made about your results even though you won't remember making any press release about your results.
  • 9) With regard to point #8 above, at extra cost and time to yourself you must employ someone to thoroughly check each monthly update before is is published online, even if this delays publication of the results till the end of the month. You might be surprised at this because no-one actually relies on such freshly published data anyway and aren't the many eyes of blog audit better than a single pair of eyes? Well that's irrelevant. See points #1 and #810) If you don't publish results promptly at the start of the month on the public website, but instead say publish the results to a private site for checks to be performed before release, we will accuse you of engaging in unscientific-like secrecy and massaging the data behind closed doors.
  • 14) If any region/station shows a warming trend that doesn't match the raw data, and we can't understand why, we will accuse you of fraud and dismiss the entire record. Don't expect us to have to read anything to understand results.
  • 15) You must provide all input datasets on your website. It's no good referencing NOAAs site and saying they "own" the GHCN data for example. I don't want their GHCN raw temperatures file, I want the one on your hard drive which you used for the analysis, even if you claim they are the same. If you don't do this we will accuse you of hiding the data and preventing us checking your results.
  • 24. In the event that you comply with all of the above, we will point out that a mere hundred-odd years of data is irrelevant next to the 4.5 billion year history of Earth. So why do you even bother?
  • 23) In the unlikely event that I haven't wasted enough of your time forcing you to comply with the above rules, I also demand to see all emails you have sent or will send during the period 1950 to 2050 that contain any of these keywords
  • 22) We don't need any scrutiny because our role isn't important.
  • 17) We will treat your record as if no alternative exists. As if your record is the make or break of Something Really Important (see point #1) and we just can't check the results in any other way.
  • 16) You are to blame for any station data your team uses. If we find out that a station you use is next to an AC Unit, we will conclude you personally planted the thermometer there to deliberately get warming.
  • an article today by Roger Pielke Nr. (no relation) that posited the fascinating concept that thermometers are just as capricious and unreliable proxies for temperature as tree rings. In fact probably more so, and re-computing global temperature by gristlecone pines would reveal the true trend of global cooling, which will be in all our best interests and definitely NOT just those of well paying corporate entities.
  •  
    Dear Professor Muller and Team, If you want your Berkley Earth Surface Temperature project to succeed and become the center of attention you need to learn from the vast number of mistakes Hansen and Jones have made with their temperature records. To aid this task I created a point by point list for you.
1 - 13 of 13
Showing 20 items per page