SlideShare una empresa de Scribd logo
1 de 12
WikiLeaks :History & Context Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee
www.wikileaks.ch
Origin Launched in 2006 (wikileaks.org) Originally launched as traditional “wiki” where users make live edits and commentary Later changed to more traditional format where people can submit information, but editors decide what to publish Founded by “Chinese dissidents, journalists, mathematicians and start-up company technologists, from the US, Taiwan, Europe, Australia and South Africa” Julian Assange, an Australian Internet activist, is generally described as its director Over 1.2 million documents in its first year
Purpose Original "primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we also expect to be of assistance to people of all regions who wish to reveal unethical behaviour in their governments and corporations.” http://web.archive.org/web/20080314204422/http://www.wikileaks.org/wiki/Wikileaks:About Current “The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history.” http://www.wikileaks.ch/About.html
Selected Releases Dec 2006:  Apparent Somali assassination order Hoped that users would verify authenticity….never happened Guantanamo Bay operating procedures Secret 'bibles' of Scientology Scientology claimed copyright infringement; in response, WikiLeaks released several thousand additional pages Sarah Palin's Yahoo email account contents Climategateemails Internet censorship lists for Australia, Denmark, Thailand Bilderberg Group meeting reports http://en.wikipedia.org/wiki/Information_published_by_WikiLeaks
July 12, 2007 Baghdad airstrike Series of three air-to-ground attacks conducted by a team of United States Army AH-64 Apache helicopters Nine men were killed, including two members of the media, who’s cameras were mistaken as weapons Two versions released: Full 39-minute version Edited 17-minute version, titled “Collateral Murder”
Afghan and Iraq War Logs 92,000 documents related to the war in Afghanistan 400,000 documents relating to the Iraq war Mostly raw field intelligence reports, detailing Mundane status reports, but also Civilian & friendly-fire casualties War crimes, psy-ops Influence of outside forces Criticized for endangering lives of local informants, as well as military personnel
United States diplomatic cables leak Starting in Nov 2010, daily release (80 per day) of detailed correspondence between the U.S. State Department and its diplomatic missions around the world Over 250,000 documents, detailing international affairs from 300 embassies dated from 1966–2010 containing diplomatic analysis of world leaders, an assessment of host countries, and a discussion about international and domestic issues Leaked from the U.S. SIPRNet, the U.S. Department of Defense’s classified version of the civilian internet
Reaction to “Cablegate” WikiLeaks experienced distributed denial of service attacks, attempting to bring down its website Various service providers cut ties DNS provider (making “wikileaks.org” unoperable) Amazon stopped hosting its website PayPal, MasterCard, and Visa stopped processing donations Air Force personnel were blocked from accessing website Twitter accounts subpoenaed “Anonymous” counter-attacked websites which were involved in censorship/disruption of Wikileaks
Challenge to Power WikiLeaks provides evidence of the exercise – and abuses – of power Exposes how power operates in the real world, on the ground Exposes hidden power relationships, and disrupts them Both in politics, and in media Protects sources from normal sanctions Has limited accountability or regulability
WikiLeaks is Not Neutral Has its own ideologies and motivations The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history. But not all data is automatically made public Evaluates, parses, edits, and not transparently Negotiates relationships with (particular) media outlets Attempts to manage information flow Embroiled in own controversies re: Assange 1.4 GB “insurance file” of “embarrassing secret documents”
WikiLeaks :History & Context Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee

Más contenido relacionado

Similar a Zimmer wikileaks

Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docxarnit1
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script043cyeung
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...wookyluvr
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Wiki leaks-an enigma of information sensation sans accountability
Wiki leaks-an enigma of information sensation sans accountabilityWiki leaks-an enigma of information sensation sans accountability
Wiki leaks-an enigma of information sensation sans accountabilityAlexander Decker
 
11.wiki leaks-an enigma of information sensation sans accountability
11.wiki leaks-an enigma of information sensation sans accountability11.wiki leaks-an enigma of information sensation sans accountability
11.wiki leaks-an enigma of information sensation sans accountabilityAlexander Decker
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaksgorin2008
 
Critical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent MediaCritical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent MediaKamil Mehmet Özkan
 
WikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docxWikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docxgauthierleppington
 
WikiLeaks Presentation
WikiLeaks PresentationWikiLeaks Presentation
WikiLeaks PresentationEmily Blegvad
 
Behind Closed Doors by Michael Streeter.pdf
Behind Closed Doors by Michael Streeter.pdfBehind Closed Doors by Michael Streeter.pdf
Behind Closed Doors by Michael Streeter.pdfJulijaeh1
 
Poem Explication Essay Example. How to write an essay on a poem analysis - Wr...
Poem Explication Essay Example. How to write an essay on a poem analysis - Wr...Poem Explication Essay Example. How to write an essay on a poem analysis - Wr...
Poem Explication Essay Example. How to write an essay on a poem analysis - Wr...Caitlin Adams
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global cultureBill Kovarik
 

Similar a Zimmer wikileaks (20)

Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Mass Media
Mass MediaMass Media
Mass Media
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
WikiLeaks and Information Policy
WikiLeaks and Information PolicyWikiLeaks and Information Policy
WikiLeaks and Information Policy
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Wiki leaks-an enigma of information sensation sans accountability
Wiki leaks-an enigma of information sensation sans accountabilityWiki leaks-an enigma of information sensation sans accountability
Wiki leaks-an enigma of information sensation sans accountability
 
11.wiki leaks-an enigma of information sensation sans accountability
11.wiki leaks-an enigma of information sensation sans accountability11.wiki leaks-an enigma of information sensation sans accountability
11.wiki leaks-an enigma of information sensation sans accountability
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaks
 
Critical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent MediaCritical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent Media
 
WikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docxWikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docx
 
WikiLeaks Presentation
WikiLeaks PresentationWikiLeaks Presentation
WikiLeaks Presentation
 
Behind Closed Doors by Michael Streeter.pdf
Behind Closed Doors by Michael Streeter.pdfBehind Closed Doors by Michael Streeter.pdf
Behind Closed Doors by Michael Streeter.pdf
 
Poem Explication Essay Example. How to write an essay on a poem analysis - Wr...
Poem Explication Essay Example. How to write an essay on a poem analysis - Wr...Poem Explication Essay Example. How to write an essay on a poem analysis - Wr...
Poem Explication Essay Example. How to write an essay on a poem analysis - Wr...
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global culture
 

Más de Michael Zimmer

Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsMichael Zimmer
 
Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaMichael Zimmer
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookMichael Zimmer
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Michael Zimmer
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsMichael Zimmer
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionMichael Zimmer
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...Michael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsMichael Zimmer
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012Michael Zimmer
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectMichael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 EraMichael Zimmer
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Michael Zimmer
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries ifMichael Zimmer
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slidesMichael Zimmer
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2Michael Zimmer
 

Más de Michael Zimmer (20)

Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
 
Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular Media
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through Films
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in Action
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books project
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 Era
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011
 
Cpw webinar 2011-mz
Cpw webinar 2011-mzCpw webinar 2011-mz
Cpw webinar 2011-mz
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries if
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2
 
A2K4 Workshop Slides
A2K4 Workshop SlidesA2K4 Workshop Slides
A2K4 Workshop Slides
 

Último

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 

Último (20)

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 

Zimmer wikileaks

  • 1. WikiLeaks :History & Context Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee
  • 3. Origin Launched in 2006 (wikileaks.org) Originally launched as traditional “wiki” where users make live edits and commentary Later changed to more traditional format where people can submit information, but editors decide what to publish Founded by “Chinese dissidents, journalists, mathematicians and start-up company technologists, from the US, Taiwan, Europe, Australia and South Africa” Julian Assange, an Australian Internet activist, is generally described as its director Over 1.2 million documents in its first year
  • 4. Purpose Original "primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we also expect to be of assistance to people of all regions who wish to reveal unethical behaviour in their governments and corporations.” http://web.archive.org/web/20080314204422/http://www.wikileaks.org/wiki/Wikileaks:About Current “The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history.” http://www.wikileaks.ch/About.html
  • 5. Selected Releases Dec 2006: Apparent Somali assassination order Hoped that users would verify authenticity….never happened Guantanamo Bay operating procedures Secret 'bibles' of Scientology Scientology claimed copyright infringement; in response, WikiLeaks released several thousand additional pages Sarah Palin's Yahoo email account contents Climategateemails Internet censorship lists for Australia, Denmark, Thailand Bilderberg Group meeting reports http://en.wikipedia.org/wiki/Information_published_by_WikiLeaks
  • 6. July 12, 2007 Baghdad airstrike Series of three air-to-ground attacks conducted by a team of United States Army AH-64 Apache helicopters Nine men were killed, including two members of the media, who’s cameras were mistaken as weapons Two versions released: Full 39-minute version Edited 17-minute version, titled “Collateral Murder”
  • 7. Afghan and Iraq War Logs 92,000 documents related to the war in Afghanistan 400,000 documents relating to the Iraq war Mostly raw field intelligence reports, detailing Mundane status reports, but also Civilian & friendly-fire casualties War crimes, psy-ops Influence of outside forces Criticized for endangering lives of local informants, as well as military personnel
  • 8. United States diplomatic cables leak Starting in Nov 2010, daily release (80 per day) of detailed correspondence between the U.S. State Department and its diplomatic missions around the world Over 250,000 documents, detailing international affairs from 300 embassies dated from 1966–2010 containing diplomatic analysis of world leaders, an assessment of host countries, and a discussion about international and domestic issues Leaked from the U.S. SIPRNet, the U.S. Department of Defense’s classified version of the civilian internet
  • 9. Reaction to “Cablegate” WikiLeaks experienced distributed denial of service attacks, attempting to bring down its website Various service providers cut ties DNS provider (making “wikileaks.org” unoperable) Amazon stopped hosting its website PayPal, MasterCard, and Visa stopped processing donations Air Force personnel were blocked from accessing website Twitter accounts subpoenaed “Anonymous” counter-attacked websites which were involved in censorship/disruption of Wikileaks
  • 10. Challenge to Power WikiLeaks provides evidence of the exercise – and abuses – of power Exposes how power operates in the real world, on the ground Exposes hidden power relationships, and disrupts them Both in politics, and in media Protects sources from normal sanctions Has limited accountability or regulability
  • 11. WikiLeaks is Not Neutral Has its own ideologies and motivations The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history. But not all data is automatically made public Evaluates, parses, edits, and not transparently Negotiates relationships with (particular) media outlets Attempts to manage information flow Embroiled in own controversies re: Assange 1.4 GB “insurance file” of “embarrassing secret documents”
  • 12. WikiLeaks :History & Context Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee

Notas del editor

  1. Launched in 2006www.wikileaks.ch(was wikileaks.org…more later)Over 1.2 million documents within first yearOriginally launched as traditional “wiki” where users make live edits and commentaryLater changed to more traditional format where people can submit information, but editors decide what to publish
  2. Climategate – WikiLeaks hosted the material, but wasn’t the original source. Notably, the emails were potentially damaging to the pro-environmental movement, which is contrary to what you might suspect is a liberal leaning of the WikiLeaks organization.