netwit 2.01

WikiLeaks, Journalism and Modern-Day Muckraking



WikiLeaks, Journalism and Modern-Day Muckraking



National Conference for Media Reform panel discussion moderated by Amy Goodwin of Democracy Now, Friday 8 April 2011.

Panelists:


Greg Mitchell – author of “The Age of WikiLeaks: From Collateral Murder to Cablegate (and Beyond)” and a more recent one on Bradley Manning. @gregmitch
Micah Sifry – author of “WikiLeaks and the Age of Transparency” @mlsif personaldemocracy.com
Emily Bell @emilybell
Glenn Greenwald @ggreenwald
Christopher Warren at Alliance Online



April 24, 2011 Posted by | Anonymous, Bradley Manning, cyber attacks, cyber warfare, Daniel Ellsberg, Denial of Service, investigative journalism, WikiLeaks | Leave a comment

#SOCIALMEDIA #cyber-utopianism #internet-centrism #BBCNewsnight [http://bit.ly/fNrj7i] @evgenymorozov ~ The Power of the Internet, Not?



Eugeny Morozov{ EM about}, author of The Net Delusion, will be on Newsnight 17 Jan 2011.



January 17, 2011 Posted by | "Collateral Murder" video, actor-network theory, Afghanistan documents, anonymity online, anonymous whistleblowing, Birgitta Jónsdóttir, Bradley Manning, Canberra cyber security centre, China, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberpunk, cyberspace, Cyberspace Policy Review, cypherpunk, Daniel Domscheit-Berg, Daniel Ellsberg, data journalism, data leakage, data security, data-dump journalism, Defence Signals Directorate (DSD, Department of Homeland Security, Der Spiegel, digital forensics, digital journalism, diplomatic cables, Echelon spy system, Electronic Frontier Foundation (EFF), encryption, Evgeny Morozov, FaceBook, FGI, free government information [FGI], Frontline Club, Government 2.0, hacker culture, Hrafnsson, Indentity Ecosystem Framework, info-war, information silos, insider security, insider threats, Internet, internet activism, internet-centrism, investigative journalism, Iraq War 2003, Iraq war logs, Jaron Lanier, Jónsdóttir, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, network theory, NSA, on-line rights, ontology, Open data, open source, organisational network analysis, P2P, P2P Foundation, Peer-to-Peer, Phorm, Pretty Good Privacy (PGP), privacy, Protecting Cyberspace as a National Asset Act (PCNAA), rogue employee, Semantic Web, silo effect, Single Person Organisation [SPO], social media, social networks, social semantic web, social silos, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, Tor, trust, trust models, Twitter, Virtual Private Network (VPN), virtual tunnel, visualisation, Web 2.0, WikiLeaks | Leave a comment

#TUNISIA #WIKILEAKS #socialmedia #twitrev ~ Was What Happened in Tunisia a Twitter Revolution?



Was What Happened in Tunisia a Twitter Revolution?


Mathew Ingram, 14 Jan 2011



January 15, 2011 Posted by | actor-network theory, diplomatic cables, info-war, Internet, internet activism, investigative journalism, Iraq war logs, Julian Assange, net neutrality, network theory, on-line rights, Open data, P2P, Twitter, U.S. diplomatic cables, U.S.Embassy cables, WikiLeaks | Leave a comment

#TUNISIA #WIKILEAKS #socialmedia #twitrev ~ Twitter revolution and the new Arab Media Space?



Tunisia and the New Arab Media Space
Marc Lynch, Foreign Policy, 15 Jan 2011


Tunisia: Can We Please Stop Talking About ‘Twitter Revolutions’
Luke Allnutt, Tanglered Web blog, 15 Jan 2011




The WDIK column
Twitter is proving to be important. It wouldn’t be so important if there were no mobile feeds into the system.

The Tunisian authorities, it is reported, had the Internet as tight as a gnats bottom – as China has. Though the news is that just before he flew the coop to Malta/France/Saudi Arabia (probably right now sitting down by the poolside with an ice-cool Carlesberg, evoking for me the iconic Heinekin scene at the end of Ice Cold in Alex…oh, perhaps not, it’s a dry country),



Internet Ali removed some of the filters. Or – as we’ll learn sooner than later – the current regime did, in order to reduce the pressure.



January 15, 2011 Posted by | actor-network theory, anonymity online, anonymous whistleblowing, China, Citizen 2.0, citizen journalism, connective knowledge, connectivism, cyber security, cyber-utopianism, cyberspace, data journalism, data leakage, data security, data-dump journalism, digital journalism, diplomatic cables, Government 2.0, Govt 3.0, Indentity Ecosystem Framework, info-war, insider security, insider threats, Internet, internet activism, internet-centrism, investigative journalism, Julian Assange, Manning, media, net neutrality, Network security, network theory, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, privacy, Single Person Organisation [SPO], social media, social networks, techno-libertarianism, Tim Burners-Lee, trust, trust models, Twitter, U.S. diplomatic cables, U.S.Embassy cables, Web 2.0, Web 3.0, WikiLeaks, WikiLeaks vs. The Yes Men | Leave a comment

#WIKILEAKS A capacity for trust model




CEOs say creativity most important in next 5 years





Both from The Practice of Leadership blog by George Ambler.



January 15, 2011 Posted by | actor-network theory, anonymity online, anonymous whistleblowing, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, conspiracy, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, data leakage, data security, digital forensics, Electronic Frontier Foundation (EFF), encryption, Government 2.0, Govt 3.0, hacker culture, Indentity Ecosystem Framework, info-war, insider security, Internet, internet activism, investigative journalism, Julian Assange, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, network e-discovery, Network security, network theory, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, Semantic Web, social media, social networks, social semantic web, trust, trust models, Twitter, Web 2.0, WikiLeaks | Leave a comment

#WIKILEAKS #mediadebate #datajournalism #isassangeajournalist ~ The Frontline Club “On the Media” debate, 11 January 2011 [http://bit.ly/evOlDB]


We never know for certain what another person is really thinking. Even if they chose to tell us, we can never know whether they’re telling the truth, or the whole truth. And by the same token nobody can can know our thoughts as we can know them.



Ralph Messenger, Director Centre for Cognitive Science, ‘The University of Gloucester’ – David Lodge’s novel “…Thinks.”



Frontline Club “On the Media: WikiLeaks Holding a mirror to journalism” discussion in association with BBC College of Journalism held 11 Jan 2011.


Hosted by Richard Gizbert – presenter, Al Jazeera English


Panel


Ian Katz – Guardian, deputy editor
David Aaronovitch – Times columnist (homepage)
Gavin MacFayden – director of The Centre for Investigative Journalism
Mark Stephens – media lawyer, currently on the Assange team



January 13, 2011 Posted by | "Collateral Murder" video, Afghanistan documents, anonymous whistleblowing, citizen journalism, Daniel Ellsberg, data journalism, data leakage, data security, data-dump journalism, Frontline Club, Guardian, investigative journalism, Iraq War 2003, Iraq war logs, Israel Shamir, New York Times, Shell/Nigeria, Twitter, U.S. diplomatic cables, U.S.Embassy cables, WikiLeaks, Yemen | Leave a comment

INTERNET WEB National Strategy for Trusted Identities in Cyberspace #NSTIC



National Strategy for Trusted Identities in Cyberspace

– Creating Options for Enhanced Online Security and Privacy

June 25, 2010

 

* Department of Home Security draft paper

*  Proposal for an Indentity Ecosystem Framework

* Appendix of terms



January 10, 2011 Posted by | cypherpunk, data journalism, data leakage, Department of Homeland Security, digital journalism, encryption, Government 2.0, hacker culture, Indentity Ecosystem Framework, info-war, insider security, insider threats, Internet, internet activism, investigative journalism, Julian Assange, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, network theory, NSA, NSTIC, Open data, open source | Leave a comment

WIKILEAKS Twelve theses on WikiLeaks



Twelve theses on WikiLeaks
By Geert Lovink and Patrice Riemens

Vindictive, politicized, conspiratorial, reckless: one need not agree with WikiLeaks’ modus operandi to acknowledge its service to democracy. Geert Lovink and Patrice Riemens see in WikiLeaks indications of a new culture of exposure beyond the traditional politics of openness and transparency.

Eurozine, August 2010



 

January 3, 2011 Posted by | citizen journalism, encryption, Friedrich Kittler, hacker culture, info-war, internet activism, investigative journalism, OPSEC [operations security], post-representational networks, Reality Distortion Field, Single Person Organisation [SPO], social media, tactical media, techno-libertarianism, Unique Personality Organisation [UPO], WikiLeaks | Leave a comment