SlideShare a Scribd company logo
1 of 23
Download to read offline
INF 2181, Overview of presentation


    Introduction

    WikiLeaks and Braman

    WikiLeaks and Schon & Rein

    WikiLeaks and Hacker

    Conclusion
                                 1
WikiLeaks

    What is WikiLeaks?
    “WikiLeaks is an international public service that allows whistleblowers and journalists to
    get suppressed information out in the public domain as safely as possible.” (wikileaks.org)




    Who is Julian Assange?

    Editor in Chief / Spokesman for WikiLeaks

    Former hacker / internet activist

    Cryptography expertise




                                                                                 2
Information as a constitutive force


    “Information is not just affected by its environment, but affects its environment as
    well.” (Braman)




    Assange: “We want to get as much substantive information as possible into the
    historical record, keep it accessible and provide incentives for people to turn it into
    something that will achieve political reform.” (Nystedt)




    Gates: “The battlefield consequences of the release of these documents are
    potentially severe and dangerous for our troops, our allies and Afghan partners,
    and may well damage our relationships and reputation in that key part of the
    world.” (Savage)



                                                                              3
Braman's forms of power




                          4
Instrumental power altered


    Regarding the sources of WikiLeaks
    documents, a Taliban spokesperson said:

    “We will investigate through our own secret
    service whether the people mentioned are
    really spies working for the U.S. If they are
    U.S. spies, then we know how to punish
    them.” (Wikipedia)


                                             5
Instrumental power altered 2


    Private Bradley Manning leaked “Collateral
    Murder” video

    This disturbing video may inhibit the
    recklessness of US troops




                                            6
Instrumental power altered 3


    In response to leaked military documents:

    “Defense Secretary Robert Gates has said the
    breach probably will lead the Pentagon to limit
    the distribution of such material. Although that
    could help prevent future leaks, it could also
    restrict the flow of potentially lifesaving
    information to soldiers.” (Now Magazine)


                                            7
Structural power altered


    WikiLeaks dismantles security
    measures/protocols of the US government

    WikiLeaks challenges the authority of the
    media. Verification not of sources but of
    documents

    Assange: “[journalists are] a craven sucking
    up to official sources to imbue the eventual
    story with some kind of official basis.” (New
    Yorker)
                                            8
Symbolic power altered


    WikiLeaks exposes American propaganda in
    Afghan media

    12 hours of PSYOP (psychological
    operations) Radio Programming on two
    stations in the province of Ghazni (Yahoo!
    News)

    This could potentially lead to the diminishment
    of American PSYOP
                                            9
Policy discourse


    “Normal discourse proceeds under a shared set of rules, assumptions,
    conventions, criteria, and beliefs, all of which tell us how disagreements can be
    settled, in principle, over time...” (Schon & Rein)




    Gates: “My attitude on [WikiLeaks] is that there are two areas of culpability. One is
    legal culpability. And that's up to the Justice Department and others. That's not my
    arena. But there's also a moral culpability. And that's where I think the verdict is
    guilty on WikiLeaks.” (Miller)




    Economist.com poster: “Exposure of government documents, particularly those
    related to war, is simply the right thing to do. Any individuals made vulnerable by
    these exposures were aware that their choice to involve themselves in
    international conflict places them in danger. That is the unfortunate result of their
    choices.”
                                                                             10
Constitutional disputes


    “As Kant and many philosophers after him have argued, questions of rights and
    duties are not reducible to an analysis of the consequences of action.” (Schon &
    Rein)




    “WikiLeaks would argue that, no matter the language in the statute, it would enjoy
    First Amendment protection from all prosecutions.” (Light)




    ... but history has shown that the First Amendment right has been reduced to
    consequentialist arguments over the years by courts using the Espionage Act of
    1917...




                                                                          11
Espionage Act of 1917


    “It prohibited any attempt to interfere with military operations, support America's
    enemies during wartime, to promote insubordination in the military, or interfere
    with military recruitment.” (Wikipedia)




                                                                             12
First Amendment contradictions


    Schenck vs United States, 1919: “clear and present danger”




    Brandenburg vs Ohio, 1969: “imminent lawless action”




    As of 2010, “imminent lawless action” under the 1917 Espionage Act is still the test
    applied to First Amendment cases.




                                                                           13
Espionage Act and WikiLeaks


    “The Washington Post reported that the US Justice Department is considering use
    of the Espionage Act to prevent WikiLeaks founder Julian Assange from posting
    the remaining 15,000 secret war documents.” (OneIndia)




    News headline: “Pentagon seeks basis to use Espionage Act against WikiLeaks”
    (Daily Conservative)




    “The WikiLeaks case highlights the central flaw in espionage laws, namely that
    they are grossly outdated, drafted in an age when all information was tangible and
    not electronic. The laws never envisioned anything like the Secure Internet
    Protocol Router network (SIPRnet) that thousands of government personnel
    across the globe routinely use to access troves of classified documents.” (Light)


                                                                          14
Policy drift


    “Changes in the operation or effect of policies that occur without significant
    changes in those policies’ structure. The major cause of drift in the social welfare
    field is a shift in the social context of policies, such as the rise of new or newly
    intensified social risks with which existing programs are poorly equipped to
    grapple.” (Hacker)




    Espionage Act poorly equipped to handle new risks posed by WikiLeaks.




    Why is the “drift” largely benefiting WikiLeaks?




                                                                             15
More drift...


    “The question for policymakers becomes whether and how to respond to the
    growing gap between the original aims of a policy and the new realities that
    shifting social conditions have fostered.” (Hacker)




    Original aims: punishing foreign spies and/or dissenters within the country who
    are deemed to be harming the government.




    New realities: 1917 didn’t anticipate cyberspace and virtual organizations,
    Assange/WikiLeaks not even based in any one country, and the information was
    voluntarily supplied by citizens to WikiLeaks.




                                                                          16
...so what can policymakers do?


    Ensign: “My legislation will extend the legal protections for government
    informants, such as the Iraqis named in this latest document dump, and will
    prevent an organization such as WikiLeaks from hiding like a coward behind a
    computer mainframe while putting lives in jeopardy.” (Chatterjee)




    “Formal policy change depends principally on whether the basic political structure
    and partisan context privileges the status quo.” (Hacker)




                                                                           17
Democrats against WikiLeaks




    “It's not the content as much as it is the names, operations, logistics, sources -- all
    of that information out in the public has the potential to do harm.” (Raddatz et al.)




    “We should condemn in the most clear terms the disclosure of any classified
    information by individuals and organizations which puts the lives of United States
    and partner service members and civilians at risk.” (YouTube)




                                                                               18
Prominent supporters of WikiLeaks


    American Civil Liberties Union




    Electronic Frontier Foundation




    Reporters Committee for Freedom of the Press




    In 2008, these stakeholders were successful in having the Bank Julius Baer
    lawsuit decision against WikiLeaks overturned. (Wikipedia)




                                                                         19
Hacker's 4 modes of policy change




                             20
Not drifting much longer?


    “When the political barriers have declined in response to favorable electoral or
    political winds, conservatives have successfully layered new policies that embody
    new goals on top of existing change-resistant programs.” (Hacker)




    They're leaning away from the drift




                                                                          21
Conclusions...


    A balance to be struck?




    “The global environment for the governance of media and communication is based
    on the interaction and interdependence of a wide array of actors and processes
    taking place in dispersed policy venues.” (Raboy & Padovani)




                                                                      22
Questions


    Global media policy is about promoting “the recognition of principles and the
    evolution of norms that inform state-based policy-making, as well as non-state
    based standard setting self-governing arrangements.” (Raboy & Padovani) So
    keeping in mind the potential damage that WikiLeaks has caused and that it is
    next to impossible for any one country to impose regulations on the organization,
    should a “global media policy” be developed that has more power over non-state
    based organizations such as WikiLeaks?



    Where do you draw the line between government documents that should be kept
    secret and those that should be exposed?




                                                                          23

More Related Content

What's hot

What's New About Wikileaks
What's New About WikileaksWhat's New About Wikileaks
What's New About WikileaksPOLIS LSE
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaksSachin sharma
 
What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?Joris Berthelot
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script043cyeung
 
Why we protest
Why we protestWhy we protest
Why we protestanonzudok
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsKati Mccarthy
 
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)mysociety
 
GOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCEGOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCEYusuf Qadir
 
WCC COMM 101-Chapter #10 Focus
WCC COMM 101-Chapter #10 FocusWCC COMM 101-Chapter #10 Focus
WCC COMM 101-Chapter #10 Focusprofluther
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...wookyluvr
 
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyKavitha Gupta, CIPP-Asia
 
The Patriot Act
The Patriot ActThe Patriot Act
The Patriot Actaustinace
 

What's hot (20)

What's New About Wikileaks
What's New About WikileaksWhat's New About Wikileaks
What's New About Wikileaks
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaks
 
What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Spilling+Secrets
Spilling+SecretsSpilling+Secrets
Spilling+Secrets
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Why we protest
Why we protestWhy we protest
Why we protest
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
 
Mass Media
Mass MediaMass Media
Mass Media
 
GOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCEGOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCE
 
WCC COMM 101-Chapter #10 Focus
WCC COMM 101-Chapter #10 FocusWCC COMM 101-Chapter #10 Focus
WCC COMM 101-Chapter #10 Focus
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's Privacy
 
Mea#4 1.1
Mea#4 1.1Mea#4 1.1
Mea#4 1.1
 
blind to threats
blind to threatsblind to threats
blind to threats
 
The Patriot Act
The Patriot ActThe Patriot Act
The Patriot Act
 

Viewers also liked

Wikileaks: the hacker's game
Wikileaks: the hacker's gameWikileaks: the hacker's game
Wikileaks: the hacker's gamemjneutel
 
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
Wikileak’s Prosecution or Persecution:  Is this Western Democracy?Wikileak’s Prosecution or Persecution:  Is this Western Democracy?
Wikileak’s Prosecution or Persecution: Is this Western Democracy?Thesigan Nadarajan
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaksdanna16
 
The Law of Whistleblowing
The Law of WhistleblowingThe Law of Whistleblowing
The Law of WhistleblowingKathleen Clark
 
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...Kathleen Clark
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingMichael Heron
 
Report ethics in government service
Report ethics in government serviceReport ethics in government service
Report ethics in government serviceLouie Medinaceli
 

Viewers also liked (15)

Wikileaks: the hacker's game
Wikileaks: the hacker's gameWikileaks: the hacker's game
Wikileaks: the hacker's game
 
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
Wikileak’s Prosecution or Persecution:  Is this Western Democracy?Wikileak’s Prosecution or Persecution:  Is this Western Democracy?
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
Entrevista a José Socrates
Entrevista a José SocratesEntrevista a José Socrates
Entrevista a José Socrates
 
What wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan SempleWhat wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan Semple
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaks
 
The Law of Whistleblowing
The Law of WhistleblowingThe Law of Whistleblowing
The Law of Whistleblowing
 
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
 
Report ethics in government service
Report ethics in government serviceReport ethics in government service
Report ethics in government service
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Sócrates
SócratesSócrates
Sócrates
 

Similar to WikiLeaks and Information Policy

Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseRepentSinner
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseAnonDownload
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense David Sweigert
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Usa patriot act
Usa patriot actUsa patriot act
Usa patriot actesounds
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
Information Literacy Paper
Information Literacy PaperInformation Literacy Paper
Information Literacy Papershelbyard2
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?Crystal Miller
 
Security council topic a, b and committee background
Security council topic a, b and committee backgroundSecurity council topic a, b and committee background
Security council topic a, b and committee backgroundGera Morton
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Wikileaks anzca 11 6 july_flew and liu
Wikileaks anzca 11 6 july_flew and liuWikileaks anzca 11 6 july_flew and liu
Wikileaks anzca 11 6 july_flew and liuTerry Flew
 
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadEmily Blegvad
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxbagotjesusa
 
On A Trajectory of Revelations
On A Trajectory of RevelationsOn A Trajectory of Revelations
On A Trajectory of RevelationsGegham Vardanyan
 
2-3 Pages APA Style FormatThere’s an old adage that says that .docx
2-3 Pages APA Style FormatThere’s an old adage that says that .docx2-3 Pages APA Style FormatThere’s an old adage that says that .docx
2-3 Pages APA Style FormatThere’s an old adage that says that .docxavaforman16457
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docxwrite5
 

Similar to WikiLeaks and Information Policy (20)

Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Usa patriot act
Usa patriot actUsa patriot act
Usa patriot act
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Information Literacy Paper
Information Literacy PaperInformation Literacy Paper
Information Literacy Paper
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
 
Security council topic a, b and committee background
Security council topic a, b and committee backgroundSecurity council topic a, b and committee background
Security council topic a, b and committee background
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Zimmer wikileaks
Zimmer wikileaksZimmer wikileaks
Zimmer wikileaks
 
Wikileaks anzca 11 6 july_flew and liu
Wikileaks anzca 11 6 july_flew and liuWikileaks anzca 11 6 july_flew and liu
Wikileaks anzca 11 6 july_flew and liu
 
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
On A Trajectory of Revelations
On A Trajectory of RevelationsOn A Trajectory of Revelations
On A Trajectory of Revelations
 
2-3 Pages APA Style FormatThere’s an old adage that says that .docx
2-3 Pages APA Style FormatThere’s an old adage that says that .docx2-3 Pages APA Style FormatThere’s an old adage that says that .docx
2-3 Pages APA Style FormatThere’s an old adage that says that .docx
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docx
 

Recently uploaded

Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 

Recently uploaded (13)

Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 

WikiLeaks and Information Policy

  • 1. INF 2181, Overview of presentation  Introduction  WikiLeaks and Braman  WikiLeaks and Schon & Rein  WikiLeaks and Hacker  Conclusion 1
  • 2. WikiLeaks  What is WikiLeaks? “WikiLeaks is an international public service that allows whistleblowers and journalists to get suppressed information out in the public domain as safely as possible.” (wikileaks.org)  Who is Julian Assange?  Editor in Chief / Spokesman for WikiLeaks  Former hacker / internet activist  Cryptography expertise 2
  • 3. Information as a constitutive force  “Information is not just affected by its environment, but affects its environment as well.” (Braman)  Assange: “We want to get as much substantive information as possible into the historical record, keep it accessible and provide incentives for people to turn it into something that will achieve political reform.” (Nystedt)  Gates: “The battlefield consequences of the release of these documents are potentially severe and dangerous for our troops, our allies and Afghan partners, and may well damage our relationships and reputation in that key part of the world.” (Savage) 3
  • 5. Instrumental power altered  Regarding the sources of WikiLeaks documents, a Taliban spokesperson said: “We will investigate through our own secret service whether the people mentioned are really spies working for the U.S. If they are U.S. spies, then we know how to punish them.” (Wikipedia) 5
  • 6. Instrumental power altered 2  Private Bradley Manning leaked “Collateral Murder” video  This disturbing video may inhibit the recklessness of US troops 6
  • 7. Instrumental power altered 3  In response to leaked military documents: “Defense Secretary Robert Gates has said the breach probably will lead the Pentagon to limit the distribution of such material. Although that could help prevent future leaks, it could also restrict the flow of potentially lifesaving information to soldiers.” (Now Magazine) 7
  • 8. Structural power altered  WikiLeaks dismantles security measures/protocols of the US government  WikiLeaks challenges the authority of the media. Verification not of sources but of documents  Assange: “[journalists are] a craven sucking up to official sources to imbue the eventual story with some kind of official basis.” (New Yorker) 8
  • 9. Symbolic power altered  WikiLeaks exposes American propaganda in Afghan media  12 hours of PSYOP (psychological operations) Radio Programming on two stations in the province of Ghazni (Yahoo! News)  This could potentially lead to the diminishment of American PSYOP 9
  • 10. Policy discourse  “Normal discourse proceeds under a shared set of rules, assumptions, conventions, criteria, and beliefs, all of which tell us how disagreements can be settled, in principle, over time...” (Schon & Rein)  Gates: “My attitude on [WikiLeaks] is that there are two areas of culpability. One is legal culpability. And that's up to the Justice Department and others. That's not my arena. But there's also a moral culpability. And that's where I think the verdict is guilty on WikiLeaks.” (Miller)  Economist.com poster: “Exposure of government documents, particularly those related to war, is simply the right thing to do. Any individuals made vulnerable by these exposures were aware that their choice to involve themselves in international conflict places them in danger. That is the unfortunate result of their choices.” 10
  • 11. Constitutional disputes  “As Kant and many philosophers after him have argued, questions of rights and duties are not reducible to an analysis of the consequences of action.” (Schon & Rein)  “WikiLeaks would argue that, no matter the language in the statute, it would enjoy First Amendment protection from all prosecutions.” (Light)  ... but history has shown that the First Amendment right has been reduced to consequentialist arguments over the years by courts using the Espionage Act of 1917... 11
  • 12. Espionage Act of 1917  “It prohibited any attempt to interfere with military operations, support America's enemies during wartime, to promote insubordination in the military, or interfere with military recruitment.” (Wikipedia) 12
  • 13. First Amendment contradictions  Schenck vs United States, 1919: “clear and present danger”  Brandenburg vs Ohio, 1969: “imminent lawless action”  As of 2010, “imminent lawless action” under the 1917 Espionage Act is still the test applied to First Amendment cases. 13
  • 14. Espionage Act and WikiLeaks  “The Washington Post reported that the US Justice Department is considering use of the Espionage Act to prevent WikiLeaks founder Julian Assange from posting the remaining 15,000 secret war documents.” (OneIndia)  News headline: “Pentagon seeks basis to use Espionage Act against WikiLeaks” (Daily Conservative)  “The WikiLeaks case highlights the central flaw in espionage laws, namely that they are grossly outdated, drafted in an age when all information was tangible and not electronic. The laws never envisioned anything like the Secure Internet Protocol Router network (SIPRnet) that thousands of government personnel across the globe routinely use to access troves of classified documents.” (Light) 14
  • 15. Policy drift  “Changes in the operation or effect of policies that occur without significant changes in those policies’ structure. The major cause of drift in the social welfare field is a shift in the social context of policies, such as the rise of new or newly intensified social risks with which existing programs are poorly equipped to grapple.” (Hacker)  Espionage Act poorly equipped to handle new risks posed by WikiLeaks.  Why is the “drift” largely benefiting WikiLeaks? 15
  • 16. More drift...  “The question for policymakers becomes whether and how to respond to the growing gap between the original aims of a policy and the new realities that shifting social conditions have fostered.” (Hacker)  Original aims: punishing foreign spies and/or dissenters within the country who are deemed to be harming the government.  New realities: 1917 didn’t anticipate cyberspace and virtual organizations, Assange/WikiLeaks not even based in any one country, and the information was voluntarily supplied by citizens to WikiLeaks. 16
  • 17. ...so what can policymakers do?  Ensign: “My legislation will extend the legal protections for government informants, such as the Iraqis named in this latest document dump, and will prevent an organization such as WikiLeaks from hiding like a coward behind a computer mainframe while putting lives in jeopardy.” (Chatterjee)  “Formal policy change depends principally on whether the basic political structure and partisan context privileges the status quo.” (Hacker) 17
  • 18. Democrats against WikiLeaks  “It's not the content as much as it is the names, operations, logistics, sources -- all of that information out in the public has the potential to do harm.” (Raddatz et al.)  “We should condemn in the most clear terms the disclosure of any classified information by individuals and organizations which puts the lives of United States and partner service members and civilians at risk.” (YouTube) 18
  • 19. Prominent supporters of WikiLeaks  American Civil Liberties Union  Electronic Frontier Foundation  Reporters Committee for Freedom of the Press  In 2008, these stakeholders were successful in having the Bank Julius Baer lawsuit decision against WikiLeaks overturned. (Wikipedia) 19
  • 20. Hacker's 4 modes of policy change 20
  • 21. Not drifting much longer?  “When the political barriers have declined in response to favorable electoral or political winds, conservatives have successfully layered new policies that embody new goals on top of existing change-resistant programs.” (Hacker)  They're leaning away from the drift 21
  • 22. Conclusions...  A balance to be struck?  “The global environment for the governance of media and communication is based on the interaction and interdependence of a wide array of actors and processes taking place in dispersed policy venues.” (Raboy & Padovani) 22
  • 23. Questions  Global media policy is about promoting “the recognition of principles and the evolution of norms that inform state-based policy-making, as well as non-state based standard setting self-governing arrangements.” (Raboy & Padovani) So keeping in mind the potential damage that WikiLeaks has caused and that it is next to impossible for any one country to impose regulations on the organization, should a “global media policy” be developed that has more power over non-state based organizations such as WikiLeaks?  Where do you draw the line between government documents that should be kept secret and those that should be exposed? 23