SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
WikipediaLeaks
 
[object Object],[object Object],WHAT IS WIKILEAKS GOAL?
HOW IT WORKS ,[object Object],[object Object]
WHY IS WIKILEAKS IMPORTANT?
MEDIA AND DEMOCRACY
Why is this important? ,[object Object],[object Object]
IMPORTANT LEAKS ,[object Object],[object Object],[object Object]
DANGERS OF WIKILEAKS
DANGERS OF WIKILEAKS ,[object Object],[object Object]
T H E TECHNIQUE BEHIND ,[object Object]
BREAKING NEWS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT CAN YOU DO? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cybercrime
CybercrimeCybercrime
CybercrimeAvinash
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsSrun Sakada
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Introduction to Anonymous
Introduction to AnonymousIntroduction to Anonymous
Introduction to AnonymousTom Tresser
 
The Dark Web
The Dark WebThe Dark Web
The Dark WebJan Siy
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 

Tendances (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Terrorism
TerrorismTerrorism
Terrorism
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Dark Web
Dark WebDark Web
Dark Web
 
Espionage
EspionageEspionage
Espionage
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Data breach
Data breachData breach
Data breach
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
Introduction to Anonymous
Introduction to AnonymousIntroduction to Anonymous
Introduction to Anonymous
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 

Similaire à Wikileaks

ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingMichael Heron
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Julian Assange Research Paper
Julian Assange Research PaperJulian Assange Research Paper
Julian Assange Research PaperTrina Jackson
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script043cyeung
 
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadEmily Blegvad
 
Med312 spies and whistleblowers lecture
Med312 spies and whistleblowers lectureMed312 spies and whistleblowers lecture
Med312 spies and whistleblowers lectureRob Jewitt
 
In “Assessing The First Amendment As A Defense For Wikileaks
In “Assessing The First Amendment As A Defense For WikileaksIn “Assessing The First Amendment As A Defense For Wikileaks
In “Assessing The First Amendment As A Defense For WikileaksTrina Jackson
 
Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018JErickPPTs
 
Advantages Of Wikileaks And Whistleblowers
Advantages Of Wikileaks And WhistleblowersAdvantages Of Wikileaks And Whistleblowers
Advantages Of Wikileaks And WhistleblowersJessica Oatis
 
Information Literacy Paper
Information Literacy PaperInformation Literacy Paper
Information Literacy Papershelbyard2
 
Mass Surveillance Pros And Cons
Mass Surveillance Pros And ConsMass Surveillance Pros And Cons
Mass Surveillance Pros And ConsChristina Santos
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docxwrite5
 
Mass Surveillance In America
Mass Surveillance In AmericaMass Surveillance In America
Mass Surveillance In AmericaShannon Williams
 
India legal 15 december 2015
India legal 15 december 2015India legal 15 december 2015
India legal 15 december 2015ENC
 

Similaire à Wikileaks (20)

ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Julian Assange Research Paper
Julian Assange Research PaperJulian Assange Research Paper
Julian Assange Research Paper
 
Mass Media
Mass MediaMass Media
Mass Media
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
 
Med312 spies and whistleblowers lecture
Med312 spies and whistleblowers lectureMed312 spies and whistleblowers lecture
Med312 spies and whistleblowers lecture
 
In “Assessing The First Amendment As A Defense For Wikileaks
In “Assessing The First Amendment As A Defense For WikileaksIn “Assessing The First Amendment As A Defense For Wikileaks
In “Assessing The First Amendment As A Defense For Wikileaks
 
Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018
 
Advantages Of Wikileaks And Whistleblowers
Advantages Of Wikileaks And WhistleblowersAdvantages Of Wikileaks And Whistleblowers
Advantages Of Wikileaks And Whistleblowers
 
Information Literacy Paper
Information Literacy PaperInformation Literacy Paper
Information Literacy Paper
 
Wikileaks Ethics
Wikileaks EthicsWikileaks Ethics
Wikileaks Ethics
 
Mass Surveillance Pros And Cons
Mass Surveillance Pros And ConsMass Surveillance Pros And Cons
Mass Surveillance Pros And Cons
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docx
 
Mass Surveillance In America
Mass Surveillance In AmericaMass Surveillance In America
Mass Surveillance In America
 
India legal 15 december 2015
India legal 15 december 2015India legal 15 december 2015
India legal 15 december 2015
 
Wikileaks
WikileaksWikileaks
Wikileaks
 

Dernier

Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 

Dernier (20)

Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 

Wikileaks