SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
INF 2181, Overview of presentation


    Introduction

    WikiLeaks and Braman

    WikiLeaks and Schon & Rein

    WikiLeaks and Hacker

    Conclusion
                                 1
WikiLeaks

    What is WikiLeaks?
    “WikiLeaks is an international public service that allows whistleblowers and journalists to
    get suppressed information out in the public domain as safely as possible.” (wikileaks.org)




    Who is Julian Assange?

    Editor in Chief / Spokesman for WikiLeaks

    Former hacker / internet activist

    Cryptography expertise




                                                                                 2
Information as a constitutive force


    “Information is not just affected by its environment, but affects its environment as
    well.” (Braman)




    Assange: “We want to get as much substantive information as possible into the
    historical record, keep it accessible and provide incentives for people to turn it into
    something that will achieve political reform.” (Nystedt)




    Gates: “The battlefield consequences of the release of these documents are
    potentially severe and dangerous for our troops, our allies and Afghan partners,
    and may well damage our relationships and reputation in that key part of the
    world.” (Savage)



                                                                              3
Braman's forms of power




                          4
Instrumental power altered


    Regarding the sources of WikiLeaks
    documents, a Taliban spokesperson said:

    “We will investigate through our own secret
    service whether the people mentioned are
    really spies working for the U.S. If they are
    U.S. spies, then we know how to punish
    them.” (Wikipedia)


                                             5
Instrumental power altered 2


    Private Bradley Manning leaked “Collateral
    Murder” video

    This disturbing video may inhibit the
    recklessness of US troops




                                            6
Instrumental power altered 3


    In response to leaked military documents:

    “Defense Secretary Robert Gates has said the
    breach probably will lead the Pentagon to limit
    the distribution of such material. Although that
    could help prevent future leaks, it could also
    restrict the flow of potentially lifesaving
    information to soldiers.” (Now Magazine)


                                            7
Structural power altered


    WikiLeaks dismantles security
    measures/protocols of the US government

    WikiLeaks challenges the authority of the
    media. Verification not of sources but of
    documents

    Assange: “[journalists are] a craven sucking
    up to official sources to imbue the eventual
    story with some kind of official basis.” (New
    Yorker)
                                            8
Symbolic power altered


    WikiLeaks exposes American propaganda in
    Afghan media

    12 hours of PSYOP (psychological
    operations) Radio Programming on two
    stations in the province of Ghazni (Yahoo!
    News)

    This could potentially lead to the diminishment
    of American PSYOP
                                            9
Policy discourse


    “Normal discourse proceeds under a shared set of rules, assumptions,
    conventions, criteria, and beliefs, all of which tell us how disagreements can be
    settled, in principle, over time...” (Schon & Rein)




    Gates: “My attitude on [WikiLeaks] is that there are two areas of culpability. One is
    legal culpability. And that's up to the Justice Department and others. That's not my
    arena. But there's also a moral culpability. And that's where I think the verdict is
    guilty on WikiLeaks.” (Miller)




    Economist.com poster: “Exposure of government documents, particularly those
    related to war, is simply the right thing to do. Any individuals made vulnerable by
    these exposures were aware that their choice to involve themselves in
    international conflict places them in danger. That is the unfortunate result of their
    choices.”
                                                                             10
Constitutional disputes


    “As Kant and many philosophers after him have argued, questions of rights and
    duties are not reducible to an analysis of the consequences of action.” (Schon &
    Rein)




    “WikiLeaks would argue that, no matter the language in the statute, it would enjoy
    First Amendment protection from all prosecutions.” (Light)




    ... but history has shown that the First Amendment right has been reduced to
    consequentialist arguments over the years by courts using the Espionage Act of
    1917...




                                                                          11
Espionage Act of 1917


    “It prohibited any attempt to interfere with military operations, support America's
    enemies during wartime, to promote insubordination in the military, or interfere
    with military recruitment.” (Wikipedia)




                                                                             12
First Amendment contradictions


    Schenck vs United States, 1919: “clear and present danger”




    Brandenburg vs Ohio, 1969: “imminent lawless action”




    As of 2010, “imminent lawless action” under the 1917 Espionage Act is still the test
    applied to First Amendment cases.




                                                                           13
Espionage Act and WikiLeaks


    “The Washington Post reported that the US Justice Department is considering use
    of the Espionage Act to prevent WikiLeaks founder Julian Assange from posting
    the remaining 15,000 secret war documents.” (OneIndia)




    News headline: “Pentagon seeks basis to use Espionage Act against WikiLeaks”
    (Daily Conservative)




    “The WikiLeaks case highlights the central flaw in espionage laws, namely that
    they are grossly outdated, drafted in an age when all information was tangible and
    not electronic. The laws never envisioned anything like the Secure Internet
    Protocol Router network (SIPRnet) that thousands of government personnel
    across the globe routinely use to access troves of classified documents.” (Light)


                                                                          14
Policy drift


    “Changes in the operation or effect of policies that occur without significant
    changes in those policies’ structure. The major cause of drift in the social welfare
    field is a shift in the social context of policies, such as the rise of new or newly
    intensified social risks with which existing programs are poorly equipped to
    grapple.” (Hacker)




    Espionage Act poorly equipped to handle new risks posed by WikiLeaks.




    Why is the “drift” largely benefiting WikiLeaks?




                                                                             15
More drift...


    “The question for policymakers becomes whether and how to respond to the
    growing gap between the original aims of a policy and the new realities that
    shifting social conditions have fostered.” (Hacker)




    Original aims: punishing foreign spies and/or dissenters within the country who
    are deemed to be harming the government.




    New realities: 1917 didn’t anticipate cyberspace and virtual organizations,
    Assange/WikiLeaks not even based in any one country, and the information was
    voluntarily supplied by citizens to WikiLeaks.




                                                                          16
...so what can policymakers do?


    Ensign: “My legislation will extend the legal protections for government
    informants, such as the Iraqis named in this latest document dump, and will
    prevent an organization such as WikiLeaks from hiding like a coward behind a
    computer mainframe while putting lives in jeopardy.” (Chatterjee)




    “Formal policy change depends principally on whether the basic political structure
    and partisan context privileges the status quo.” (Hacker)




                                                                           17
Democrats against WikiLeaks




    “It's not the content as much as it is the names, operations, logistics, sources -- all
    of that information out in the public has the potential to do harm.” (Raddatz et al.)




    “We should condemn in the most clear terms the disclosure of any classified
    information by individuals and organizations which puts the lives of United States
    and partner service members and civilians at risk.” (YouTube)




                                                                               18
Prominent supporters of WikiLeaks


    American Civil Liberties Union




    Electronic Frontier Foundation




    Reporters Committee for Freedom of the Press




    In 2008, these stakeholders were successful in having the Bank Julius Baer
    lawsuit decision against WikiLeaks overturned. (Wikipedia)




                                                                         19
Hacker's 4 modes of policy change




                             20
Not drifting much longer?


    “When the political barriers have declined in response to favorable electoral or
    political winds, conservatives have successfully layered new policies that embody
    new goals on top of existing change-resistant programs.” (Hacker)




    They're leaning away from the drift




                                                                          21
Conclusions...


    A balance to be struck?




    “The global environment for the governance of media and communication is based
    on the interaction and interdependence of a wide array of actors and processes
    taking place in dispersed policy venues.” (Raboy & Padovani)




                                                                      22
Questions


    Global media policy is about promoting “the recognition of principles and the
    evolution of norms that inform state-based policy-making, as well as non-state
    based standard setting self-governing arrangements.” (Raboy & Padovani) So
    keeping in mind the potential damage that WikiLeaks has caused and that it is
    next to impossible for any one country to impose regulations on the organization,
    should a “global media policy” be developed that has more power over non-state
    based organizations such as WikiLeaks?



    Where do you draw the line between government documents that should be kept
    secret and those that should be exposed?




                                                                          23

Contenu connexe

Tendances

What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?
Joris Berthelot
 
Why we protest
Why we protestWhy we protest
Why we protest
anonzudok
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
Kati Mccarthy
 
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
mysociety
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
wookyluvr
 
The Patriot Act
The Patriot ActThe Patriot Act
The Patriot Act
austinace
 

Tendances (20)

What's New About Wikileaks
What's New About WikileaksWhat's New About Wikileaks
What's New About Wikileaks
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaks
 
What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Spilling+Secrets
Spilling+SecretsSpilling+Secrets
Spilling+Secrets
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Why we protest
Why we protestWhy we protest
Why we protest
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
 
Mass Media
Mass MediaMass Media
Mass Media
 
GOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCEGOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCE
 
WCC COMM 101-Chapter #10 Focus
WCC COMM 101-Chapter #10 FocusWCC COMM 101-Chapter #10 Focus
WCC COMM 101-Chapter #10 Focus
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's Privacy
 
Mea#4 1.1
Mea#4 1.1Mea#4 1.1
Mea#4 1.1
 
blind to threats
blind to threatsblind to threats
blind to threats
 
The Patriot Act
The Patriot ActThe Patriot Act
The Patriot Act
 

En vedette

2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 
Report ethics in government service
Report ethics in government serviceReport ethics in government service
Report ethics in government service
Louie Medinaceli
 

En vedette (15)

Wikileaks: the hacker's game
Wikileaks: the hacker's gameWikileaks: the hacker's game
Wikileaks: the hacker's game
 
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
Wikileak’s Prosecution or Persecution:  Is this Western Democracy?Wikileak’s Prosecution or Persecution:  Is this Western Democracy?
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
Entrevista a José Socrates
Entrevista a José SocratesEntrevista a José Socrates
Entrevista a José Socrates
 
What wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan SempleWhat wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan Semple
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaks
 
The Law of Whistleblowing
The Law of WhistleblowingThe Law of Whistleblowing
The Law of Whistleblowing
 
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
 
Report ethics in government service
Report ethics in government serviceReport ethics in government service
Report ethics in government service
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Sócrates
SócratesSócrates
Sócrates
 

Similaire à WikiLeaks and Information Policy

Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
RepentSinner
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
AnonDownload
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
raghuarr
 
Usa patriot act
Usa patriot actUsa patriot act
Usa patriot act
esounds
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
EvonCanales257
 
Security council topic a, b and committee background
Security council topic a, b and committee backgroundSecurity council topic a, b and committee background
Security council topic a, b and committee background
Gera Morton
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
OllieShoresna
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
Emily Blegvad
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
bagotjesusa
 
2-3 Pages APA Style FormatThere’s an old adage that says that .docx
2-3 Pages APA Style FormatThere’s an old adage that says that .docx2-3 Pages APA Style FormatThere’s an old adage that says that .docx
2-3 Pages APA Style FormatThere’s an old adage that says that .docx
avaforman16457
 

Similaire à WikiLeaks and Information Policy (20)

Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Usa patriot act
Usa patriot actUsa patriot act
Usa patriot act
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Information Literacy Paper
Information Literacy PaperInformation Literacy Paper
Information Literacy Paper
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
 
Security council topic a, b and committee background
Security council topic a, b and committee backgroundSecurity council topic a, b and committee background
Security council topic a, b and committee background
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Zimmer wikileaks
Zimmer wikileaksZimmer wikileaks
Zimmer wikileaks
 
Wikileaks anzca 11 6 july_flew and liu
Wikileaks anzca 11 6 july_flew and liuWikileaks anzca 11 6 july_flew and liu
Wikileaks anzca 11 6 july_flew and liu
 
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
On A Trajectory of Revelations
On A Trajectory of RevelationsOn A Trajectory of Revelations
On A Trajectory of Revelations
 
2-3 Pages APA Style FormatThere’s an old adage that says that .docx
2-3 Pages APA Style FormatThere’s an old adage that says that .docx2-3 Pages APA Style FormatThere’s an old adage that says that .docx
2-3 Pages APA Style FormatThere’s an old adage that says that .docx
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docx
 

Dernier

Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
PsychicRuben LoveSpells
 

Dernier (20)

Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
02052024_First India Newspaper Jaipur.pdf
02052024_First India Newspaper Jaipur.pdf02052024_First India Newspaper Jaipur.pdf
02052024_First India Newspaper Jaipur.pdf
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 

WikiLeaks and Information Policy

  • 1. INF 2181, Overview of presentation  Introduction  WikiLeaks and Braman  WikiLeaks and Schon & Rein  WikiLeaks and Hacker  Conclusion 1
  • 2. WikiLeaks  What is WikiLeaks? “WikiLeaks is an international public service that allows whistleblowers and journalists to get suppressed information out in the public domain as safely as possible.” (wikileaks.org)  Who is Julian Assange?  Editor in Chief / Spokesman for WikiLeaks  Former hacker / internet activist  Cryptography expertise 2
  • 3. Information as a constitutive force  “Information is not just affected by its environment, but affects its environment as well.” (Braman)  Assange: “We want to get as much substantive information as possible into the historical record, keep it accessible and provide incentives for people to turn it into something that will achieve political reform.” (Nystedt)  Gates: “The battlefield consequences of the release of these documents are potentially severe and dangerous for our troops, our allies and Afghan partners, and may well damage our relationships and reputation in that key part of the world.” (Savage) 3
  • 5. Instrumental power altered  Regarding the sources of WikiLeaks documents, a Taliban spokesperson said: “We will investigate through our own secret service whether the people mentioned are really spies working for the U.S. If they are U.S. spies, then we know how to punish them.” (Wikipedia) 5
  • 6. Instrumental power altered 2  Private Bradley Manning leaked “Collateral Murder” video  This disturbing video may inhibit the recklessness of US troops 6
  • 7. Instrumental power altered 3  In response to leaked military documents: “Defense Secretary Robert Gates has said the breach probably will lead the Pentagon to limit the distribution of such material. Although that could help prevent future leaks, it could also restrict the flow of potentially lifesaving information to soldiers.” (Now Magazine) 7
  • 8. Structural power altered  WikiLeaks dismantles security measures/protocols of the US government  WikiLeaks challenges the authority of the media. Verification not of sources but of documents  Assange: “[journalists are] a craven sucking up to official sources to imbue the eventual story with some kind of official basis.” (New Yorker) 8
  • 9. Symbolic power altered  WikiLeaks exposes American propaganda in Afghan media  12 hours of PSYOP (psychological operations) Radio Programming on two stations in the province of Ghazni (Yahoo! News)  This could potentially lead to the diminishment of American PSYOP 9
  • 10. Policy discourse  “Normal discourse proceeds under a shared set of rules, assumptions, conventions, criteria, and beliefs, all of which tell us how disagreements can be settled, in principle, over time...” (Schon & Rein)  Gates: “My attitude on [WikiLeaks] is that there are two areas of culpability. One is legal culpability. And that's up to the Justice Department and others. That's not my arena. But there's also a moral culpability. And that's where I think the verdict is guilty on WikiLeaks.” (Miller)  Economist.com poster: “Exposure of government documents, particularly those related to war, is simply the right thing to do. Any individuals made vulnerable by these exposures were aware that their choice to involve themselves in international conflict places them in danger. That is the unfortunate result of their choices.” 10
  • 11. Constitutional disputes  “As Kant and many philosophers after him have argued, questions of rights and duties are not reducible to an analysis of the consequences of action.” (Schon & Rein)  “WikiLeaks would argue that, no matter the language in the statute, it would enjoy First Amendment protection from all prosecutions.” (Light)  ... but history has shown that the First Amendment right has been reduced to consequentialist arguments over the years by courts using the Espionage Act of 1917... 11
  • 12. Espionage Act of 1917  “It prohibited any attempt to interfere with military operations, support America's enemies during wartime, to promote insubordination in the military, or interfere with military recruitment.” (Wikipedia) 12
  • 13. First Amendment contradictions  Schenck vs United States, 1919: “clear and present danger”  Brandenburg vs Ohio, 1969: “imminent lawless action”  As of 2010, “imminent lawless action” under the 1917 Espionage Act is still the test applied to First Amendment cases. 13
  • 14. Espionage Act and WikiLeaks  “The Washington Post reported that the US Justice Department is considering use of the Espionage Act to prevent WikiLeaks founder Julian Assange from posting the remaining 15,000 secret war documents.” (OneIndia)  News headline: “Pentagon seeks basis to use Espionage Act against WikiLeaks” (Daily Conservative)  “The WikiLeaks case highlights the central flaw in espionage laws, namely that they are grossly outdated, drafted in an age when all information was tangible and not electronic. The laws never envisioned anything like the Secure Internet Protocol Router network (SIPRnet) that thousands of government personnel across the globe routinely use to access troves of classified documents.” (Light) 14
  • 15. Policy drift  “Changes in the operation or effect of policies that occur without significant changes in those policies’ structure. The major cause of drift in the social welfare field is a shift in the social context of policies, such as the rise of new or newly intensified social risks with which existing programs are poorly equipped to grapple.” (Hacker)  Espionage Act poorly equipped to handle new risks posed by WikiLeaks.  Why is the “drift” largely benefiting WikiLeaks? 15
  • 16. More drift...  “The question for policymakers becomes whether and how to respond to the growing gap between the original aims of a policy and the new realities that shifting social conditions have fostered.” (Hacker)  Original aims: punishing foreign spies and/or dissenters within the country who are deemed to be harming the government.  New realities: 1917 didn’t anticipate cyberspace and virtual organizations, Assange/WikiLeaks not even based in any one country, and the information was voluntarily supplied by citizens to WikiLeaks. 16
  • 17. ...so what can policymakers do?  Ensign: “My legislation will extend the legal protections for government informants, such as the Iraqis named in this latest document dump, and will prevent an organization such as WikiLeaks from hiding like a coward behind a computer mainframe while putting lives in jeopardy.” (Chatterjee)  “Formal policy change depends principally on whether the basic political structure and partisan context privileges the status quo.” (Hacker) 17
  • 18. Democrats against WikiLeaks  “It's not the content as much as it is the names, operations, logistics, sources -- all of that information out in the public has the potential to do harm.” (Raddatz et al.)  “We should condemn in the most clear terms the disclosure of any classified information by individuals and organizations which puts the lives of United States and partner service members and civilians at risk.” (YouTube) 18
  • 19. Prominent supporters of WikiLeaks  American Civil Liberties Union  Electronic Frontier Foundation  Reporters Committee for Freedom of the Press  In 2008, these stakeholders were successful in having the Bank Julius Baer lawsuit decision against WikiLeaks overturned. (Wikipedia) 19
  • 20. Hacker's 4 modes of policy change 20
  • 21. Not drifting much longer?  “When the political barriers have declined in response to favorable electoral or political winds, conservatives have successfully layered new policies that embody new goals on top of existing change-resistant programs.” (Hacker)  They're leaning away from the drift 21
  • 22. Conclusions...  A balance to be struck?  “The global environment for the governance of media and communication is based on the interaction and interdependence of a wide array of actors and processes taking place in dispersed policy venues.” (Raboy & Padovani) 22
  • 23. Questions  Global media policy is about promoting “the recognition of principles and the evolution of norms that inform state-based policy-making, as well as non-state based standard setting self-governing arrangements.” (Raboy & Padovani) So keeping in mind the potential damage that WikiLeaks has caused and that it is next to impossible for any one country to impose regulations on the organization, should a “global media policy” be developed that has more power over non-state based organizations such as WikiLeaks?  Where do you draw the line between government documents that should be kept secret and those that should be exposed? 23