netwit 2.01

#WIKILEAKS #Zizek #leftpol #leftphil [http://bit.ly/dQjnKV] ~ Good Manners in the Age of WikiLeaks



Good Manners in the Age of WikiLeaks


by


Slavoj Žižek



Advertisements

January 13, 2011 Posted by | Bank of America, diplomatic cables, MasterCard, PayPal, Slavoj Žižek, Visa, WikiLeaks, Zizek | Leave a comment

#WIKILEAKS# #julianassange #assangevideo #pithynews [http://bit.ly/eytttT][http://bit.ly/dX3Zzl] ~ Julian Assange in 47 Seconds







January 13, 2011 Posted by | Sarah Palin, WikiLeaks | Leave a comment

#WIKILEAKS [@ioerror #tweetecology] #Tor #cyberprivacy ~ Wikileaks volunteer detained and searched (again) by US agents [12 Jan 2011]



Wikileaks volunteer detained and searched (again) by US agents


refs:

Jacob Applebaum Twitter @ioerror – search down the tweets for where the story starts and follow the tweets out into the tweet ecology (as it were…).

Tor

* One key point – Tor is used both by individuals and by organisations

Graphics to illustrate how Tor works

wiki:Virtual Private networks (VPN)


From http://fengnet.com/book/icuna/ch11lev1sec12.html:


There are several different places where encryption can be built in to an existing network infrastructure, corresponding to the different protocol layers:

1. On the network level— Packets traveling between hosts on the network are encrypted. The encryption engine is placed near the driver, which sends and receives packets. An implementation is found in CIPE.
2. On the socket level— A logical connection between programs running on different hosts (TCP connection; transport or session layer in OSI) is encrypted. The encryption engine intercepts or proxies connections. SSH and SSL work this way.
3. On the application level— Applications contain their own encryption engine and encrypt data themselves. The best-known example is PGP for encrypting mail.


January 13, 2011 Posted by | anonymity online, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberspace, cypherpunk, data leakage, data security, Electronic Frontier Foundation (EFF), encryption, hacker culture, Indentity Ecosystem Framework, insider security, insider threats, Internet, internet activism, Network security, Peer-to-Peer, Pretty Good Privacy (PGP), privacy, Tor, Virtual Private Network (VPN), virtual tunnel, Web 2.0 | Leave a comment

#WIKILEAKS #mediadebate #datajournalism #isassangeajournalist ~ The Frontline Club “On the Media” debate, 11 January 2011 [http://bit.ly/evOlDB]


We never know for certain what another person is really thinking. Even if they chose to tell us, we can never know whether they’re telling the truth, or the whole truth. And by the same token nobody can can know our thoughts as we can know them.



Ralph Messenger, Director Centre for Cognitive Science, ‘The University of Gloucester’ – David Lodge’s novel “…Thinks.”



Frontline Club “On the Media: WikiLeaks Holding a mirror to journalism” discussion in association with BBC College of Journalism held 11 Jan 2011.


Hosted by Richard Gizbert – presenter, Al Jazeera English


Panel


Ian Katz – Guardian, deputy editor
David Aaronovitch – Times columnist (homepage)
Gavin MacFayden – director of The Centre for Investigative Journalism
Mark Stephens – media lawyer, currently on the Assange team



January 13, 2011 Posted by | "Collateral Murder" video, Afghanistan documents, anonymous whistleblowing, citizen journalism, Daniel Ellsberg, data journalism, data leakage, data security, data-dump journalism, Frontline Club, Guardian, investigative journalism, Iraq War 2003, Iraq war logs, Israel Shamir, New York Times, Shell/Nigeria, Twitter, U.S. diplomatic cables, U.S.Embassy cables, WikiLeaks, Yemen | Leave a comment

#INTERNET #WEB #WIKILEAKS #politics #media #Guardian ~ The Man Who Spilled the Secrets [http://bit.ly/ghH31j]


The ideal role of a journalistic outlet, in Assange’s view, is to be a passive conduit for reality, or at least for slivers of reality, with as little intervention as possible—no editing, no contextualizing, no explanations, no thinking, no weighing of one person’s claims against another’s, no regard for consequences. The technology that Assange has worked on for most of his career possesses immense capabilities, and cannot be controlled by a single institution or voice. It is perhaps for this reason that WikiLeaks—ultimately replaceable by the next technologically savvy anarchist—is so disturbing to so many.



The Man Who Spilled the Secrets


by


Sarah Ellison, Vanity Fair, Feb 2011

January 13, 2011 Posted by | "Collateral Murder" video, 1917 Espionage Act, Afghanistan documents, Alan Rusbridger, Amnesty International, Bradley Manning, citizen journalism, crowd sourcing, Daniel Domscheit-Berg, Daniel Ellsberg, Der Spiegel, El País, Eric Holder, Guantánamo, Hrafnsson, Iraq war logs, Le Monde, media, New York Times, Pentagon Papers, redaction, Reporters Without Borders, Smári McCarthy, U.S. diplomatic cables, U.S.Embassy cables, Unique Personality Organisation [UPO], Wau Holland, Web 2.0, WikiLeaks | Leave a comment