SlideShare ist ein Scribd-Unternehmen logo
1 von 28
WikiLeaks & Information Ethics Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee zimmerm@uwm.edu cipr.uwm.edu
www.wikileaks.ch
Origin Launched in 2006 (wikileaks.org) Originally launched as traditional “wiki” where users make live edits and commentary Later changed to more traditional format where people can submit information, but editors decide what to publish Founded by “Chinese dissidents, journalists, mathematicians and start-up company technologists, from the US, Taiwan, Europe, Australia and South Africa” Julian Assange, an Australian Internet activist, is generally described as its director
Purpose Original "primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we also expect to be of assistance to people of all regions who wish to reveal unethical behaviour in their governments and corporations.” http://web.archive.org/ Current “The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history.” http://www.wikileaks.ch/About.html
Early Releases Apparent Somali assassination order Guantanamo Bay operating procedures Secret 'bibles' of Scientology Sarah Palin's Yahoo email account contents Climategate emails Internet censorship lists for Australia, Denmark, Thailand 570,000 intercepts of pager messages sent on 9/11 http://en.wikipedia.org/wiki/Information_published_by_WikiLeaks
Somali assassination order First document shared by WikiLeaks December 2006 Uncertain as to its authenticity, WikiLeaks hoped by posting it online, someone could analyze and possibly authenticate it Never resolved, but this first leak brought media attention to WikiLeaks
Guantanamo Bay operating procedures
Secret “Bibles” of Scientology WikiLeaks published what they referred to as “the collected secret ‘bibles’ of Scientology” Church of Scientology claimed copyright infringement, threatened to sue, and sought the identity of who leaked the documents In response, WikiLeaks released several thousand additional pages
Sarah Palin's Yahoo email account
“Climategate” emails Controversial documents and e-mail correspondence between climate scientists, were released (allegedly after being illegally obtained) WikiLeaksprovided access, but wasn’t the original recipient of the leak Notably, the emails were potentially damaging to the pro-environmental movement
Internet Censorship Blacklists Internet censorship lists for Australia, Denmark, Thailand Some reveal websites that appear to be beyond the scope of proposed censorship/filtering laws  Not just child pornography or terrorism related
9/11 Pager Messages WikiLeaks released 570,000 pager messages sent on the day of the September 11 attacks "the archive is a completely objective record of the defining moment of our time. We hope that its revelation will lead to a more nuanced understanding of the event and its tragic consequences." According to Bradley Manning, they came from NSA database – thus, possibly intercepted by government through illegal surveillance
Recent Releases Video of Baghdad airstrike – “Collateral Murder” Afghanistan and Iraq war logs Diplomatic cables
July 12, 2007 Baghdad airstrike www.collateralmurder.com
Afghan and Iraq War Logs 92,000 documents related to the war in Afghanistan 400,000 documents relating to the Iraq war Mostly raw field intelligence reports, detailing Mundane status reports, but also Civilian & friendly-fire casualties War crimes, psy-ops Influence of outside forces
United States diplomatic cables leak Starting in Nov 2010, daily release (~80 per day) of detailed correspondence between the U.S. State Department and its diplomatic missions around the world Over 250,000 documents, detailing international affairs from 300 embassies dated from 1966–2010 containing diplomatic analysis of world leaders, assessments of host countries, discussions about international and domestic issues Leaked from the U.S. SIPRNet, the U.S. Department of Defense’s classified version of the civilian internet
Reaction to “Cablegate” WikiLeaks experienced distributed denial of service attacks, attempting to bring down its website Various service providers cut ties DNS provider (making “wikileaks.org” inoperable) Amazon stopped providing hosting services PayPal, MasterCard, and Visa stopped processing donations Air Force personnel were blocked from accessing website, others warned Twitter accounts subpoenaed “Anonymous” counter-attacked websites which were involved in censorship/disruption of Wikileaks
Summary, so far WikiLeaks receives submissions and provides (secure, anonymous) access Rarely, if ever, digs up information itself Sometimes the information is originally obtained illegally Protects sources, as best it can Divulges secrets, exposes power relationships,  disrupts global politics (and media) Has limited accountability or regulability
Ethics We use ethics as a means to support (some set of) broader social values Maximizing the greater good Avoiding harm Being fair Respecting human dignity Ensuring justice 19
Information Ethics How the pursuit of these values can be supported through the production, storage, distribution, and use of information, as well as the related information systems, infrastructures, policies, and professional duties	 Broader ethical concerns embedded within issues such as: Information access & control Information security & privacy Intellectual freedom
Information Access & Control WikiLeaks supports access, diminishes control Belief that the greater good is served through openness, transparency Fights strict intellectual property enforcement Encourages whistle blowing But, WikiLeaks is increasingly engaging in control tactics Limiting the release of diplomatic cables Negotiating preferred access with media Editing/annotating content prior to release Withholding an “insurance file” in case something happens to Assange
Information Security & Privacy WikiLeaks has been accused of threatening security & privacy Leaking secret government information threatens national security Leaking names of special ops personnel and informants threatens their safety (and their families) But, there are some positives WikiLeaks is now scrubbing (some) leaks to remove (some) personal information Exposing ease of access to “secure” systems can lead to improved security procedures
Intellectual Freedom WikiLeaks presents unique challenges regarding intellectual freedom ALA / AALL / SLA ethical codes & principles urge providing full access to information to satisfy the unique needs of all patrons What is our ethical responsibility as information professionals?
Intellectual Freedom “Materials should not be excluded because of the origin, background, or views of those contributing to their creation” But what if the materials were originally obtained illegally? “Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment” Does this allow resistance to government secrecy? “Libraries should cooperate with all persons and groups concerned with resisting abridgment of free expression and free access to ideas.” To what extent should a library cooperate with WikiLeaks, or similar organizations? (ALA Library Bill of Rights)
Resolution on Access to and Classification of Government Information (ALA OIF/COL) WHEREAS, public access to information by and about the government is a basic tenet of a democratic society and crucial to the public’s ability to hold the government accountable for its actions WHEREAS, libraries are essential to the free flow of ideas and to insuring the public’s right to know WHEREAS, a democratic society needs to balance the fundamental right to access government information with the necessity to withhold certain information essential to security …WHEREAS, WikiLeaks’ ongoing disclosure of large numbers of classified and unclassified United States government documents has renewed debate about access to, and classification of government information 25
Resolution on Access to and Classification of Government Information (ALA OIF/COL) Urges the [government] to defend the inalienable right of the press and citizens to disseminate information to the public about national security issues and to refrain from initiatives that impair these rights Affirms the principle that government information made public within the boundaries of U.S. law should be available through libraries and the press without restriction 				(emphasis added) 26
Information Ethics & WikiLeaks “Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment.” 					 (ALA Bill of Rights) “The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history.”  	  								(WikiLeaks) “Government information made public within the boundaries of U.S. law should be available through libraries and the press without restriction”  			         (OIF/COL Resolution)
WikiLeaks & Information Ethics Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee zimmerm@uwm.edu cipr.uwm.edu

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Présentation WikiLeaks
Présentation WikiLeaksPrésentation WikiLeaks
Présentation WikiLeaks
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaks
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Spilling+Secrets
Spilling+SecretsSpilling+Secrets
Spilling+Secrets
 
Why we protest
Why we protestWhy we protest
Why we protest
 
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
 
Wikileaks brochure
Wikileaks brochureWikileaks brochure
Wikileaks brochure
 
Mass Media
Mass MediaMass Media
Mass Media
 
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's Privacy
 
Women Who Tech Video Activism
Women Who Tech Video ActivismWomen Who Tech Video Activism
Women Who Tech Video Activism
 
Keynote - Cindy Cohn
Keynote - Cindy CohnKeynote - Cindy Cohn
Keynote - Cindy Cohn
 
Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation
 
Paris k net-5th
Paris k net-5thParis k net-5th
Paris k net-5th
 

Andere mochten auch

Inside the Wikileaks Headquarters
 Inside the Wikileaks Headquarters Inside the Wikileaks Headquarters
Inside the Wikileaks HeadquartersNubia **
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaksdanna16
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingMichael Heron
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsMichael Zimmer
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Bradley manning
Bradley manningBradley manning
Bradley manningTy171
 
Information Leaks and New Media
Information Leaks and New Media Information Leaks and New Media
Information Leaks and New Media Tyler Gayheart
 
Social CRM Watsons Club + (Eng)
Social CRM Watsons Club + (Eng)Social CRM Watsons Club + (Eng)
Social CRM Watsons Club + (Eng)HOSHVA PR
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
The Law of Whistleblowing
The Law of WhistleblowingThe Law of Whistleblowing
The Law of WhistleblowingKathleen Clark
 
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...Kathleen Clark
 
Wikileaks: the hacker's game
Wikileaks: the hacker's gameWikileaks: the hacker's game
Wikileaks: the hacker's gamemjneutel
 

Andere mochten auch (17)

WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Inside the Wikileaks Headquarters
 Inside the Wikileaks Headquarters Inside the Wikileaks Headquarters
Inside the Wikileaks Headquarters
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Bradley manning
Bradley manningBradley manning
Bradley manning
 
Essay on Bradley Manning
Essay on Bradley ManningEssay on Bradley Manning
Essay on Bradley Manning
 
Information Leaks and New Media
Information Leaks and New Media Information Leaks and New Media
Information Leaks and New Media
 
Social CRM Watsons Club + (Eng)
Social CRM Watsons Club + (Eng)Social CRM Watsons Club + (Eng)
Social CRM Watsons Club + (Eng)
 
What wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan SempleWhat wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan Semple
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
The Law of Whistleblowing
The Law of WhistleblowingThe Law of Whistleblowing
The Law of Whistleblowing
 
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
 
Wikileaks: the hacker's game
Wikileaks: the hacker's gameWikileaks: the hacker's game
Wikileaks: the hacker's game
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 

Ähnlich wie Information Ethics & WikiLeaks

ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docxarnit1
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
 
Critical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent MediaCritical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent MediaKamil Mehmet Özkan
 
Behind Closed Doors by Michael Streeter.pdf
Behind Closed Doors by Michael Streeter.pdfBehind Closed Doors by Michael Streeter.pdf
Behind Closed Doors by Michael Streeter.pdfJulijaeh1
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docxwrite5
 
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadEmily Blegvad
 
Information Ethics: Privacy, Property, and Power
Information Ethics: Privacy, Property, and PowerInformation Ethics: Privacy, Property, and Power
Information Ethics: Privacy, Property, and Powerrarumoz
 
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
Wikileak’s Prosecution or Persecution:  Is this Western Democracy?Wikileak’s Prosecution or Persecution:  Is this Western Democracy?
Wikileak’s Prosecution or Persecution: Is this Western Democracy?Thesigan Nadarajan
 
Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018JErickPPTs
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 

Ähnlich wie Information Ethics & WikiLeaks (15)

Zimmer wikileaks
Zimmer wikileaksZimmer wikileaks
Zimmer wikileaks
 
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
Critical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent MediaCritical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent Media
 
Behind Closed Doors by Michael Streeter.pdf
Behind Closed Doors by Michael Streeter.pdfBehind Closed Doors by Michael Streeter.pdf
Behind Closed Doors by Michael Streeter.pdf
 
5 minutes translation (4)
5 minutes translation  (4)5 minutes translation  (4)
5 minutes translation (4)
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docx
 
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
 
Information Ethics: Privacy, Property, and Power
Information Ethics: Privacy, Property, and PowerInformation Ethics: Privacy, Property, and Power
Information Ethics: Privacy, Property, and Power
 
PIAFinalPaper
PIAFinalPaperPIAFinalPaper
PIAFinalPaper
 
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
Wikileak’s Prosecution or Persecution:  Is this Western Democracy?Wikileak’s Prosecution or Persecution:  Is this Western Democracy?
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
 
Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 

Mehr von Michael Zimmer

Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaMichael Zimmer
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookMichael Zimmer
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Michael Zimmer
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsMichael Zimmer
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionMichael Zimmer
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...Michael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsMichael Zimmer
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012Michael Zimmer
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectMichael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 EraMichael Zimmer
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Michael Zimmer
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries ifMichael Zimmer
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slidesMichael Zimmer
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2Michael Zimmer
 

Mehr von Michael Zimmer (20)

Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular Media
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through Films
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in Action
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books project
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 Era
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011
 
Cpw webinar 2011-mz
Cpw webinar 2011-mzCpw webinar 2011-mz
Cpw webinar 2011-mz
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries if
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2
 
A2K4 Workshop Slides
A2K4 Workshop SlidesA2K4 Workshop Slides
A2K4 Workshop Slides
 
Zimmer CSCW 2010
Zimmer CSCW 2010Zimmer CSCW 2010
Zimmer CSCW 2010
 

Kürzlich hochgeladen

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Kürzlich hochgeladen (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Information Ethics & WikiLeaks

  • 1. WikiLeaks & Information Ethics Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee zimmerm@uwm.edu cipr.uwm.edu
  • 3. Origin Launched in 2006 (wikileaks.org) Originally launched as traditional “wiki” where users make live edits and commentary Later changed to more traditional format where people can submit information, but editors decide what to publish Founded by “Chinese dissidents, journalists, mathematicians and start-up company technologists, from the US, Taiwan, Europe, Australia and South Africa” Julian Assange, an Australian Internet activist, is generally described as its director
  • 4. Purpose Original "primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we also expect to be of assistance to people of all regions who wish to reveal unethical behaviour in their governments and corporations.” http://web.archive.org/ Current “The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history.” http://www.wikileaks.ch/About.html
  • 5. Early Releases Apparent Somali assassination order Guantanamo Bay operating procedures Secret 'bibles' of Scientology Sarah Palin's Yahoo email account contents Climategate emails Internet censorship lists for Australia, Denmark, Thailand 570,000 intercepts of pager messages sent on 9/11 http://en.wikipedia.org/wiki/Information_published_by_WikiLeaks
  • 6. Somali assassination order First document shared by WikiLeaks December 2006 Uncertain as to its authenticity, WikiLeaks hoped by posting it online, someone could analyze and possibly authenticate it Never resolved, but this first leak brought media attention to WikiLeaks
  • 8. Secret “Bibles” of Scientology WikiLeaks published what they referred to as “the collected secret ‘bibles’ of Scientology” Church of Scientology claimed copyright infringement, threatened to sue, and sought the identity of who leaked the documents In response, WikiLeaks released several thousand additional pages
  • 9. Sarah Palin's Yahoo email account
  • 10. “Climategate” emails Controversial documents and e-mail correspondence between climate scientists, were released (allegedly after being illegally obtained) WikiLeaksprovided access, but wasn’t the original recipient of the leak Notably, the emails were potentially damaging to the pro-environmental movement
  • 11. Internet Censorship Blacklists Internet censorship lists for Australia, Denmark, Thailand Some reveal websites that appear to be beyond the scope of proposed censorship/filtering laws Not just child pornography or terrorism related
  • 12. 9/11 Pager Messages WikiLeaks released 570,000 pager messages sent on the day of the September 11 attacks "the archive is a completely objective record of the defining moment of our time. We hope that its revelation will lead to a more nuanced understanding of the event and its tragic consequences." According to Bradley Manning, they came from NSA database – thus, possibly intercepted by government through illegal surveillance
  • 13. Recent Releases Video of Baghdad airstrike – “Collateral Murder” Afghanistan and Iraq war logs Diplomatic cables
  • 14. July 12, 2007 Baghdad airstrike www.collateralmurder.com
  • 15. Afghan and Iraq War Logs 92,000 documents related to the war in Afghanistan 400,000 documents relating to the Iraq war Mostly raw field intelligence reports, detailing Mundane status reports, but also Civilian & friendly-fire casualties War crimes, psy-ops Influence of outside forces
  • 16. United States diplomatic cables leak Starting in Nov 2010, daily release (~80 per day) of detailed correspondence between the U.S. State Department and its diplomatic missions around the world Over 250,000 documents, detailing international affairs from 300 embassies dated from 1966–2010 containing diplomatic analysis of world leaders, assessments of host countries, discussions about international and domestic issues Leaked from the U.S. SIPRNet, the U.S. Department of Defense’s classified version of the civilian internet
  • 17. Reaction to “Cablegate” WikiLeaks experienced distributed denial of service attacks, attempting to bring down its website Various service providers cut ties DNS provider (making “wikileaks.org” inoperable) Amazon stopped providing hosting services PayPal, MasterCard, and Visa stopped processing donations Air Force personnel were blocked from accessing website, others warned Twitter accounts subpoenaed “Anonymous” counter-attacked websites which were involved in censorship/disruption of Wikileaks
  • 18. Summary, so far WikiLeaks receives submissions and provides (secure, anonymous) access Rarely, if ever, digs up information itself Sometimes the information is originally obtained illegally Protects sources, as best it can Divulges secrets, exposes power relationships, disrupts global politics (and media) Has limited accountability or regulability
  • 19. Ethics We use ethics as a means to support (some set of) broader social values Maximizing the greater good Avoiding harm Being fair Respecting human dignity Ensuring justice 19
  • 20. Information Ethics How the pursuit of these values can be supported through the production, storage, distribution, and use of information, as well as the related information systems, infrastructures, policies, and professional duties Broader ethical concerns embedded within issues such as: Information access & control Information security & privacy Intellectual freedom
  • 21. Information Access & Control WikiLeaks supports access, diminishes control Belief that the greater good is served through openness, transparency Fights strict intellectual property enforcement Encourages whistle blowing But, WikiLeaks is increasingly engaging in control tactics Limiting the release of diplomatic cables Negotiating preferred access with media Editing/annotating content prior to release Withholding an “insurance file” in case something happens to Assange
  • 22. Information Security & Privacy WikiLeaks has been accused of threatening security & privacy Leaking secret government information threatens national security Leaking names of special ops personnel and informants threatens their safety (and their families) But, there are some positives WikiLeaks is now scrubbing (some) leaks to remove (some) personal information Exposing ease of access to “secure” systems can lead to improved security procedures
  • 23. Intellectual Freedom WikiLeaks presents unique challenges regarding intellectual freedom ALA / AALL / SLA ethical codes & principles urge providing full access to information to satisfy the unique needs of all patrons What is our ethical responsibility as information professionals?
  • 24. Intellectual Freedom “Materials should not be excluded because of the origin, background, or views of those contributing to their creation” But what if the materials were originally obtained illegally? “Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment” Does this allow resistance to government secrecy? “Libraries should cooperate with all persons and groups concerned with resisting abridgment of free expression and free access to ideas.” To what extent should a library cooperate with WikiLeaks, or similar organizations? (ALA Library Bill of Rights)
  • 25. Resolution on Access to and Classification of Government Information (ALA OIF/COL) WHEREAS, public access to information by and about the government is a basic tenet of a democratic society and crucial to the public’s ability to hold the government accountable for its actions WHEREAS, libraries are essential to the free flow of ideas and to insuring the public’s right to know WHEREAS, a democratic society needs to balance the fundamental right to access government information with the necessity to withhold certain information essential to security …WHEREAS, WikiLeaks’ ongoing disclosure of large numbers of classified and unclassified United States government documents has renewed debate about access to, and classification of government information 25
  • 26. Resolution on Access to and Classification of Government Information (ALA OIF/COL) Urges the [government] to defend the inalienable right of the press and citizens to disseminate information to the public about national security issues and to refrain from initiatives that impair these rights Affirms the principle that government information made public within the boundaries of U.S. law should be available through libraries and the press without restriction (emphasis added) 26
  • 27. Information Ethics & WikiLeaks “Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment.” (ALA Bill of Rights) “The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history.” (WikiLeaks) “Government information made public within the boundaries of U.S. law should be available through libraries and the press without restriction” (OIF/COL Resolution)
  • 28. WikiLeaks & Information Ethics Michael Zimmer, PhD Center for Information Policy Research School of Information Studies UW-Milwaukee zimmerm@uwm.edu cipr.uwm.edu

Hinweis der Redaktion

  1. Launched in 2006www.wikileaks.ch(was wikileaks.org…more later)Over 1.2 million documents within first yearOriginally launched as traditional “wiki” where users make live edits and commentaryLater changed to more traditional format where people can submit information, but editors decide what to publish
  2. Apparent Somali assassination orderGuantanamo Bay operating proceduresSecret 'bibles' of ScientologySarah Palin's Yahoo email account contentsClimategate emailsInternet censorship lists for Australia, Denmark, Thailand570,000 intercepts of pager messages sent on 9/11
  3. First document shared by WikiLeaksDecember 2006Uncertain as to its authenticity, WikiLeaks hoped by posting it online, someone could analyze and possibly authenticate itNever resolved, but this first leak brought media attention to WikiLeaks
  4. WikiLeaks released a copy of the internal operating procedures of the U.S. Army at the Guantanamo Bay detention campRevealed some of the restrictions placed over detainees at the campincluding the designation of some prisoners as off-limits to the Red Cross, something that the U.S. military had in the past repeatedly denied
  5. WikiLeaks published what they referred to as “the collected secret ‘bibles’ of Scientology”Church of Scientology claimed copyright infringement, threatened to sue, and sought the identity of who leaked the documentsIn response, WikiLeaks released several thousand additional pages
  6. During 2008 presidential campaign, Palin’s personal email account was hacked by member of “Anonymous”Screenshots and some content posted online, including at WikiLeaks
  7. Controversial documents and e-mail correspondence between climate scientists, were released (allegedly after being illegally obtained)WikiLeaks provided access, but wasn’t the original recipient of the leakNotably, the emails were potentially damaging to the pro-environmental movement
  8. Internet censorship lists for Australia, Denmark, ThailandSome reveal websites that appear to be beyond the scope of proposed censorship/filtering laws Not just child pornography or terrorism related
  9. Series of three air-to-ground attacks conducted by a team of United States Army AH-64 Apache helicoptersNine men were killed, including two members of the media, who’s cameras were mistaken as weaponsTwo versions released:Full 39-minute versionEdited 17-minute version, titled “Collateral Murder”
  10. 92,000 documents related to the war in Afghanistan400,000 documents relating to the Iraq warMostly raw field intelligence reports, detailingMundane status reports, but alsoCivilian & friendly-fire casualtiesWar crimes, psy-opsInfluence of outside forcesCriticized for endangering lives of local informants, as well as military personnel
  11. Starting in Nov 2010, daily release (~80 per day) of detailed correspondence between the U.S. State Department and its diplomatic missions around the worldOver 250,000 documents, detailing international affairs from 300 embassies dated from 1966–2010containing diplomatic analysis of world leaders, assessments of host countries, discussions about international and domestic issuesLeaked from the U.S. SIPRNet, the U.S. Department of Defense’s classified version of the civilian internet
  12. EXPANND ON THESENOTE TENSION
  13. 1.4 GB “insurance file” of “embarrassing secret documents”