SlideShare une entreprise Scribd logo
1  sur  28
WikiLeaks & Information Ethics Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee zimmerm@uwm.edu cipr.uwm.edu
www.wikileaks.ch
Origin Launched in 2006 (wikileaks.org) Originally launched as traditional “wiki” where users make live edits and commentary Later changed to more traditional format where people can submit information, but editors decide what to publish Founded by “Chinese dissidents, journalists, mathematicians and start-up company technologists, from the US, Taiwan, Europe, Australia and South Africa” Julian Assange, an Australian Internet activist, is generally described as its director
Purpose Original "primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we also expect to be of assistance to people of all regions who wish to reveal unethical behaviour in their governments and corporations.” http://web.archive.org/ Current “The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history.” http://www.wikileaks.ch/About.html
Early Releases Apparent Somali assassination order Guantanamo Bay operating procedures Secret 'bibles' of Scientology Sarah Palin's Yahoo email account contents Climategate emails Internet censorship lists for Australia, Denmark, Thailand 570,000 intercepts of pager messages sent on 9/11 http://en.wikipedia.org/wiki/Information_published_by_WikiLeaks
Somali assassination order First document shared by WikiLeaks December 2006 Uncertain as to its authenticity, WikiLeaks hoped by posting it online, someone could analyze and possibly authenticate it Never resolved, but this first leak brought media attention to WikiLeaks
Guantanamo Bay operating procedures
Secret “Bibles” of Scientology WikiLeaks published what they referred to as “the collected secret ‘bibles’ of Scientology” Church of Scientology claimed copyright infringement, threatened to sue, and sought the identity of who leaked the documents In response, WikiLeaks released several thousand additional pages
Sarah Palin's Yahoo email account
“Climategate” emails Controversial documents and e-mail correspondence between climate scientists, were released (allegedly after being illegally obtained) WikiLeaksprovided access, but wasn’t the original recipient of the leak Notably, the emails were potentially damaging to the pro-environmental movement
Internet Censorship Blacklists Internet censorship lists for Australia, Denmark, Thailand Some reveal websites that appear to be beyond the scope of proposed censorship/filtering laws  Not just child pornography or terrorism related
9/11 Pager Messages WikiLeaks released 570,000 pager messages sent on the day of the September 11 attacks "the archive is a completely objective record of the defining moment of our time. We hope that its revelation will lead to a more nuanced understanding of the event and its tragic consequences." According to Bradley Manning, they came from NSA database – thus, possibly intercepted by government through illegal surveillance
Recent Releases Video of Baghdad airstrike – “Collateral Murder” Afghanistan and Iraq war logs Diplomatic cables
July 12, 2007 Baghdad airstrike www.collateralmurder.com
Afghan and Iraq War Logs 92,000 documents related to the war in Afghanistan 400,000 documents relating to the Iraq war Mostly raw field intelligence reports, detailing Mundane status reports, but also Civilian & friendly-fire casualties War crimes, psy-ops Influence of outside forces
United States diplomatic cables leak Starting in Nov 2010, daily release (~80 per day) of detailed correspondence between the U.S. State Department and its diplomatic missions around the world Over 250,000 documents, detailing international affairs from 300 embassies dated from 1966–2010 containing diplomatic analysis of world leaders, assessments of host countries, discussions about international and domestic issues Leaked from the U.S. SIPRNet, the U.S. Department of Defense’s classified version of the civilian internet
Reaction to “Cablegate” WikiLeaks experienced distributed denial of service attacks, attempting to bring down its website Various service providers cut ties DNS provider (making “wikileaks.org” inoperable) Amazon stopped providing hosting services PayPal, MasterCard, and Visa stopped processing donations Air Force personnel were blocked from accessing website, others warned Twitter accounts subpoenaed “Anonymous” counter-attacked websites which were involved in censorship/disruption of Wikileaks
Summary, so far WikiLeaks receives submissions and provides (secure, anonymous) access Rarely, if ever, digs up information itself Sometimes the information is originally obtained illegally Protects sources, as best it can Divulges secrets, exposes power relationships,  disrupts global politics (and media) Has limited accountability or regulability
Ethics We use ethics as a means to support (some set of) broader social values Maximizing the greater good Avoiding harm Being fair Respecting human dignity Ensuring justice 19
Information Ethics How the pursuit of these values can be supported through the production, storage, distribution, and use of information, as well as the related information systems, infrastructures, policies, and professional duties	 Broader ethical concerns embedded within issues such as: Information access & control Information security & privacy Intellectual freedom
Information Access & Control WikiLeaks supports access, diminishes control Belief that the greater good is served through openness, transparency Fights strict intellectual property enforcement Encourages whistle blowing But, WikiLeaks is increasingly engaging in control tactics Limiting the release of diplomatic cables Negotiating preferred access with media Editing/annotating content prior to release Withholding an “insurance file” in case something happens to Assange
Information Security & Privacy WikiLeaks has been accused of threatening security & privacy Leaking secret government information threatens national security Leaking names of special ops personnel and informants threatens their safety (and their families) But, there are some positives WikiLeaks is now scrubbing (some) leaks to remove (some) personal information Exposing ease of access to “secure” systems can lead to improved security procedures
Intellectual Freedom WikiLeaks presents unique challenges regarding intellectual freedom ALA / AALL / SLA ethical codes & principles urge providing full access to information to satisfy the unique needs of all patrons What is our ethical responsibility as information professionals?
Intellectual Freedom “Materials should not be excluded because of the origin, background, or views of those contributing to their creation” But what if the materials were originally obtained illegally? “Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment” Does this allow resistance to government secrecy? “Libraries should cooperate with all persons and groups concerned with resisting abridgment of free expression and free access to ideas.” To what extent should a library cooperate with WikiLeaks, or similar organizations? (ALA Library Bill of Rights)
Resolution on Access to and Classification of Government Information (ALA OIF/COL) WHEREAS, public access to information by and about the government is a basic tenet of a democratic society and crucial to the public’s ability to hold the government accountable for its actions WHEREAS, libraries are essential to the free flow of ideas and to insuring the public’s right to know WHEREAS, a democratic society needs to balance the fundamental right to access government information with the necessity to withhold certain information essential to security …WHEREAS, WikiLeaks’ ongoing disclosure of large numbers of classified and unclassified United States government documents has renewed debate about access to, and classification of government information 25
Resolution on Access to and Classification of Government Information (ALA OIF/COL) Urges the [government] to defend the inalienable right of the press and citizens to disseminate information to the public about national security issues and to refrain from initiatives that impair these rights Affirms the principle that government information made public within the boundaries of U.S. law should be available through libraries and the press without restriction 				(emphasis added) 26
Information Ethics & WikiLeaks “Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment.” 					 (ALA Bill of Rights) “The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history.”  	  								(WikiLeaks) “Government information made public within the boundaries of U.S. law should be available through libraries and the press without restriction”  			         (OIF/COL Resolution)
WikiLeaks & Information Ethics Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee zimmerm@uwm.edu cipr.uwm.edu

Contenu connexe

Tendances

What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?
Joris Berthelot
 
Why we protest
Why we protestWhy we protest
Why we protest
anonzudok
 
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
mysociety
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
Positive Hack Days
 

Tendances (20)

Présentation WikiLeaks
Présentation WikiLeaksPrésentation WikiLeaks
Présentation WikiLeaks
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaks
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Spilling+Secrets
Spilling+SecretsSpilling+Secrets
Spilling+Secrets
 
Why we protest
Why we protestWhy we protest
Why we protest
 
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
 
Wikileaks brochure
Wikileaks brochureWikileaks brochure
Wikileaks brochure
 
Mass Media
Mass MediaMass Media
Mass Media
 
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's Privacy
 
Women Who Tech Video Activism
Women Who Tech Video ActivismWomen Who Tech Video Activism
Women Who Tech Video Activism
 
Keynote - Cindy Cohn
Keynote - Cindy CohnKeynote - Cindy Cohn
Keynote - Cindy Cohn
 
Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation
 
Paris k net-5th
Paris k net-5thParis k net-5th
Paris k net-5th
 

En vedette

Bradley manning
Bradley manningBradley manning
Bradley manning
Ty171
 
Social CRM Watsons Club + (Eng)
Social CRM Watsons Club + (Eng)Social CRM Watsons Club + (Eng)
Social CRM Watsons Club + (Eng)
HOSHVA PR
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 

En vedette (17)

WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Inside the Wikileaks Headquarters
 Inside the Wikileaks Headquarters Inside the Wikileaks Headquarters
Inside the Wikileaks Headquarters
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Bradley manning
Bradley manningBradley manning
Bradley manning
 
Essay on Bradley Manning
Essay on Bradley ManningEssay on Bradley Manning
Essay on Bradley Manning
 
Information Leaks and New Media
Information Leaks and New Media Information Leaks and New Media
Information Leaks and New Media
 
Social CRM Watsons Club + (Eng)
Social CRM Watsons Club + (Eng)Social CRM Watsons Club + (Eng)
Social CRM Watsons Club + (Eng)
 
What wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan SempleWhat wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan Semple
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
The Law of Whistleblowing
The Law of WhistleblowingThe Law of Whistleblowing
The Law of Whistleblowing
 
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
 
Wikileaks: the hacker's game
Wikileaks: the hacker's gameWikileaks: the hacker's game
Wikileaks: the hacker's game
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 

Similaire à Information Ethics & WikiLeaks

ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
arnit1
 
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
Emily Blegvad
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
Jenny O'Meara
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
raghuarr
 

Similaire à Information Ethics & WikiLeaks (15)

Zimmer wikileaks
Zimmer wikileaksZimmer wikileaks
Zimmer wikileaks
 
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
Critical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent MediaCritical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent Media
 
Behind Closed Doors by Michael Streeter.pdf
Behind Closed Doors by Michael Streeter.pdfBehind Closed Doors by Michael Streeter.pdf
Behind Closed Doors by Michael Streeter.pdf
 
5 minutes translation (4)
5 minutes translation  (4)5 minutes translation  (4)
5 minutes translation (4)
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docx
 
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
 
Information Ethics: Privacy, Property, and Power
Information Ethics: Privacy, Property, and PowerInformation Ethics: Privacy, Property, and Power
Information Ethics: Privacy, Property, and Power
 
PIAFinalPaper
PIAFinalPaperPIAFinalPaper
PIAFinalPaper
 
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
Wikileak’s Prosecution or Persecution:  Is this Western Democracy?Wikileak’s Prosecution or Persecution:  Is this Western Democracy?
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
 
Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 

Plus de Michael Zimmer

The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
Michael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
Michael Zimmer
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011
Michael Zimmer
 

Plus de Michael Zimmer (20)

Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular Media
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through Films
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in Action
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books project
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 Era
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011
 
Cpw webinar 2011-mz
Cpw webinar 2011-mzCpw webinar 2011-mz
Cpw webinar 2011-mz
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries if
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2
 
A2K4 Workshop Slides
A2K4 Workshop SlidesA2K4 Workshop Slides
A2K4 Workshop Slides
 
Zimmer CSCW 2010
Zimmer CSCW 2010Zimmer CSCW 2010
Zimmer CSCW 2010
 

Dernier

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Information Ethics & WikiLeaks

  • 1. WikiLeaks & Information Ethics Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee zimmerm@uwm.edu cipr.uwm.edu
  • 3. Origin Launched in 2006 (wikileaks.org) Originally launched as traditional “wiki” where users make live edits and commentary Later changed to more traditional format where people can submit information, but editors decide what to publish Founded by “Chinese dissidents, journalists, mathematicians and start-up company technologists, from the US, Taiwan, Europe, Australia and South Africa” Julian Assange, an Australian Internet activist, is generally described as its director
  • 4. Purpose Original "primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we also expect to be of assistance to people of all regions who wish to reveal unethical behaviour in their governments and corporations.” http://web.archive.org/ Current “The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history.” http://www.wikileaks.ch/About.html
  • 5. Early Releases Apparent Somali assassination order Guantanamo Bay operating procedures Secret 'bibles' of Scientology Sarah Palin's Yahoo email account contents Climategate emails Internet censorship lists for Australia, Denmark, Thailand 570,000 intercepts of pager messages sent on 9/11 http://en.wikipedia.org/wiki/Information_published_by_WikiLeaks
  • 6. Somali assassination order First document shared by WikiLeaks December 2006 Uncertain as to its authenticity, WikiLeaks hoped by posting it online, someone could analyze and possibly authenticate it Never resolved, but this first leak brought media attention to WikiLeaks
  • 8. Secret “Bibles” of Scientology WikiLeaks published what they referred to as “the collected secret ‘bibles’ of Scientology” Church of Scientology claimed copyright infringement, threatened to sue, and sought the identity of who leaked the documents In response, WikiLeaks released several thousand additional pages
  • 9. Sarah Palin's Yahoo email account
  • 10. “Climategate” emails Controversial documents and e-mail correspondence between climate scientists, were released (allegedly after being illegally obtained) WikiLeaksprovided access, but wasn’t the original recipient of the leak Notably, the emails were potentially damaging to the pro-environmental movement
  • 11. Internet Censorship Blacklists Internet censorship lists for Australia, Denmark, Thailand Some reveal websites that appear to be beyond the scope of proposed censorship/filtering laws Not just child pornography or terrorism related
  • 12. 9/11 Pager Messages WikiLeaks released 570,000 pager messages sent on the day of the September 11 attacks "the archive is a completely objective record of the defining moment of our time. We hope that its revelation will lead to a more nuanced understanding of the event and its tragic consequences." According to Bradley Manning, they came from NSA database – thus, possibly intercepted by government through illegal surveillance
  • 13. Recent Releases Video of Baghdad airstrike – “Collateral Murder” Afghanistan and Iraq war logs Diplomatic cables
  • 14. July 12, 2007 Baghdad airstrike www.collateralmurder.com
  • 15. Afghan and Iraq War Logs 92,000 documents related to the war in Afghanistan 400,000 documents relating to the Iraq war Mostly raw field intelligence reports, detailing Mundane status reports, but also Civilian & friendly-fire casualties War crimes, psy-ops Influence of outside forces
  • 16. United States diplomatic cables leak Starting in Nov 2010, daily release (~80 per day) of detailed correspondence between the U.S. State Department and its diplomatic missions around the world Over 250,000 documents, detailing international affairs from 300 embassies dated from 1966–2010 containing diplomatic analysis of world leaders, assessments of host countries, discussions about international and domestic issues Leaked from the U.S. SIPRNet, the U.S. Department of Defense’s classified version of the civilian internet
  • 17. Reaction to “Cablegate” WikiLeaks experienced distributed denial of service attacks, attempting to bring down its website Various service providers cut ties DNS provider (making “wikileaks.org” inoperable) Amazon stopped providing hosting services PayPal, MasterCard, and Visa stopped processing donations Air Force personnel were blocked from accessing website, others warned Twitter accounts subpoenaed “Anonymous” counter-attacked websites which were involved in censorship/disruption of Wikileaks
  • 18. Summary, so far WikiLeaks receives submissions and provides (secure, anonymous) access Rarely, if ever, digs up information itself Sometimes the information is originally obtained illegally Protects sources, as best it can Divulges secrets, exposes power relationships, disrupts global politics (and media) Has limited accountability or regulability
  • 19. Ethics We use ethics as a means to support (some set of) broader social values Maximizing the greater good Avoiding harm Being fair Respecting human dignity Ensuring justice 19
  • 20. Information Ethics How the pursuit of these values can be supported through the production, storage, distribution, and use of information, as well as the related information systems, infrastructures, policies, and professional duties Broader ethical concerns embedded within issues such as: Information access & control Information security & privacy Intellectual freedom
  • 21. Information Access & Control WikiLeaks supports access, diminishes control Belief that the greater good is served through openness, transparency Fights strict intellectual property enforcement Encourages whistle blowing But, WikiLeaks is increasingly engaging in control tactics Limiting the release of diplomatic cables Negotiating preferred access with media Editing/annotating content prior to release Withholding an “insurance file” in case something happens to Assange
  • 22. Information Security & Privacy WikiLeaks has been accused of threatening security & privacy Leaking secret government information threatens national security Leaking names of special ops personnel and informants threatens their safety (and their families) But, there are some positives WikiLeaks is now scrubbing (some) leaks to remove (some) personal information Exposing ease of access to “secure” systems can lead to improved security procedures
  • 23. Intellectual Freedom WikiLeaks presents unique challenges regarding intellectual freedom ALA / AALL / SLA ethical codes & principles urge providing full access to information to satisfy the unique needs of all patrons What is our ethical responsibility as information professionals?
  • 24. Intellectual Freedom “Materials should not be excluded because of the origin, background, or views of those contributing to their creation” But what if the materials were originally obtained illegally? “Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment” Does this allow resistance to government secrecy? “Libraries should cooperate with all persons and groups concerned with resisting abridgment of free expression and free access to ideas.” To what extent should a library cooperate with WikiLeaks, or similar organizations? (ALA Library Bill of Rights)
  • 25. Resolution on Access to and Classification of Government Information (ALA OIF/COL) WHEREAS, public access to information by and about the government is a basic tenet of a democratic society and crucial to the public’s ability to hold the government accountable for its actions WHEREAS, libraries are essential to the free flow of ideas and to insuring the public’s right to know WHEREAS, a democratic society needs to balance the fundamental right to access government information with the necessity to withhold certain information essential to security …WHEREAS, WikiLeaks’ ongoing disclosure of large numbers of classified and unclassified United States government documents has renewed debate about access to, and classification of government information 25
  • 26. Resolution on Access to and Classification of Government Information (ALA OIF/COL) Urges the [government] to defend the inalienable right of the press and citizens to disseminate information to the public about national security issues and to refrain from initiatives that impair these rights Affirms the principle that government information made public within the boundaries of U.S. law should be available through libraries and the press without restriction (emphasis added) 26
  • 27. Information Ethics & WikiLeaks “Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment.” (ALA Bill of Rights) “The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history.” (WikiLeaks) “Government information made public within the boundaries of U.S. law should be available through libraries and the press without restriction” (OIF/COL Resolution)
  • 28. WikiLeaks & Information Ethics Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee zimmerm@uwm.edu cipr.uwm.edu

Notes de l'éditeur

  1. Launched in 2006www.wikileaks.ch(was wikileaks.org…more later)Over 1.2 million documents within first yearOriginally launched as traditional “wiki” where users make live edits and commentaryLater changed to more traditional format where people can submit information, but editors decide what to publish
  2. Apparent Somali assassination orderGuantanamo Bay operating proceduresSecret 'bibles' of ScientologySarah Palin's Yahoo email account contentsClimategate emailsInternet censorship lists for Australia, Denmark, Thailand570,000 intercepts of pager messages sent on 9/11
  3. First document shared by WikiLeaksDecember 2006Uncertain as to its authenticity, WikiLeaks hoped by posting it online, someone could analyze and possibly authenticate itNever resolved, but this first leak brought media attention to WikiLeaks
  4. WikiLeaks released a copy of the internal operating procedures of the U.S. Army at the Guantanamo Bay detention campRevealed some of the restrictions placed over detainees at the campincluding the designation of some prisoners as off-limits to the Red Cross, something that the U.S. military had in the past repeatedly denied
  5. WikiLeaks published what they referred to as “the collected secret ‘bibles’ of Scientology”Church of Scientology claimed copyright infringement, threatened to sue, and sought the identity of who leaked the documentsIn response, WikiLeaks released several thousand additional pages
  6. During 2008 presidential campaign, Palin’s personal email account was hacked by member of “Anonymous”Screenshots and some content posted online, including at WikiLeaks
  7. Controversial documents and e-mail correspondence between climate scientists, were released (allegedly after being illegally obtained)WikiLeaks provided access, but wasn’t the original recipient of the leakNotably, the emails were potentially damaging to the pro-environmental movement
  8. Internet censorship lists for Australia, Denmark, ThailandSome reveal websites that appear to be beyond the scope of proposed censorship/filtering laws Not just child pornography or terrorism related
  9. Series of three air-to-ground attacks conducted by a team of United States Army AH-64 Apache helicoptersNine men were killed, including two members of the media, who’s cameras were mistaken as weaponsTwo versions released:Full 39-minute versionEdited 17-minute version, titled “Collateral Murder”
  10. 92,000 documents related to the war in Afghanistan400,000 documents relating to the Iraq warMostly raw field intelligence reports, detailingMundane status reports, but alsoCivilian & friendly-fire casualtiesWar crimes, psy-opsInfluence of outside forcesCriticized for endangering lives of local informants, as well as military personnel
  11. Starting in Nov 2010, daily release (~80 per day) of detailed correspondence between the U.S. State Department and its diplomatic missions around the worldOver 250,000 documents, detailing international affairs from 300 embassies dated from 1966–2010containing diplomatic analysis of world leaders, assessments of host countries, discussions about international and domestic issuesLeaked from the U.S. SIPRNet, the U.S. Department of Defense’s classified version of the civilian internet
  12. EXPANND ON THESENOTE TENSION
  13. 1.4 GB “insurance file” of “embarrassing secret documents”