S Guide to Protecting Electronic Devices and Data at the U.S. Border. Amid recent reports that security researchers have experienced difficulties at the United States border after traveling abroad, we realized that it's been awhile since we last discussed how to safeguard electronic devices and digital information during border searches.
So just in time for holiday travel and the 27th Chaos Communication Congress in Berlin, here's EFF's guide for protecting your devices and sensitive data at the United States border. The Government Has Broad Legal Authority to Search Laptops, Phones, Cameras, and Other Devices at the U.S. Border. The Fourth Amendment to the United States Constitution prohibits unreasonable government searches and seizures. This generally means that the government has to get a warrant to search a location or item in which you have a reasonable expectation of privacy. A manifesto for the simple scribe – my 25 commandments for journalists. I wrote these 25 commandments as a panic response 15 or more years ago to an invitation to do some media training for a group of Elsevier editors.
I began compiling them because I had just asked myself what was the most important thing to remember about writing a story, and the answer came back loud and clear: "To make somebody read it. " Ultimately, there's no other reason for writing. Journalists write to support democracy, sustain truth, salute justice, justify expenses, see the world and make a living, but to satisfactorily do any of these things you have to have readers. Fairness and accuracy are of course profoundly important.
Culture Clash: Journalism?s ideology vs blog culture. If you read the literature on journalism’s professional ideology – or just follow any argument about journalists-versus-the-rest-of-the-world – you’ll notice particular themes recurring.
Like any profession, journalism separates itself from other fields of work through articulating how it is different. Reading Mark Deuze’s book Media Work recently I was struck by how a similar, parallel, ideology is increasingly articulated by bloggers. And I wanted to sketch that out. Why Facebook Is Not the Cure For Bad Comments: Tech News and Analysis « There’s been a lot of discussion recently about Facebook-powered comments, which have been implemented at a number of major blogs and other publishers (including here at GigaOM) over the past couple of weeks.
Supporters argue that using Facebook comments cuts down on “trolling” and other forms of bad behavior, because it forces people to use their real names, while critics say it gives the social network too much power. But the reality is that when it comes to improving blog comments, anonymity really isn’t the issue — the biggest single factor that determines the quality of comments is whether the authors of a blog take part in them. According to TechCrunch’s MG Siegler, the addition of Facebook comments seems to have improved the quality of the comments that blog receives, but has reduced the overall number of them, which he says may not be a good thing — since some people may be declining to comment via Facebook as a result of concerns about their privacy, etc. Attacks on the Press in 2010. Why the Internet Weakens the Authority of the Press. January 12, 2009 Audience Atomization Overcome: Why the Internet Weakens the Authority of the Press In the age of mass media, the press was able to define the sphere of legitimate debate with relative ease because the people on the receiving end were atomized-- connected "up" to Big Media but not across to each other.
And now that authority is eroding. I will try to explain why. It’s easily the most useful diagram I’ve found for understanding the practice of journalism in the United States, and the hidden politics of that practice.
Inside Story - The WikiLeaks copycats. Wikileaks team "cloned" version of. Spinoff wikileaks. Klokkenluideronline. Wie doet er mee met Leugens.nl? Leugens.nl, op zoek naar de waarheid. Daniel Elsberg. OWNI.fr Digital Journalism Home. IMMI Icelandic Modern Media Initiative. Press release // The Internet, February 28th, 2013 // For immediate release Today, a group of forty security, privacy and human rights advocates and organizations from around the world released an open letter to Ögmundur Jónasson, Icelandic minister of interior, regarding the ongoing discussions on the possibility of establishing Internet pornography censorship in Iceland.
The group, consisting of individuals and organizations from 19 countries, including Germany, Poland, the United Kingdom, Palestine, Argentina, Peru, Guatemala, Egypt, Tunisia, Morocco, Jordan, and the United States, objects to the manner in which the discussion has been carried forth, saying that “it is tempting to regard filtering the internet as a quick and easy way to restrict unwanted speech, opinions, or media, which the government regards as harmful for either them or the people. Obama signs US legislation to stymie Britain's libel law. President Obama yesterday signed into US law legislation aimed at protecting American authors, journalists and academics from Britain's libel laws.
The Securing the Protection of our Enduring and Established Constitutional Heritage Act, known as the SPEECH Act, makes libel judgments against US writers in foreign territories unenforceable if they are perceived to counter the First Amendment right to free speech. The British-based Libel Reform Campaign has expressed concern that Britain's reputation is being damaged internationally due to what it calls "our restrictive, archaic and costly libel laws, which cost 140 times the European equivalent. " The SPEECH Act is inspired by the Libel Terrorism Protection Act passed by the New York State assembly in February 2008, after American academic Dr Rachel Ehrenfeld was sued in London by an Arab businessman Sheikh Khalid bin Mahfouz.
Freedom of Expression inEU wikileaks-1.01. ALEV] Freedom of Expression in Europe. GAP Government Accountability Project. The Reykjavik Grapevine Features / Information Without Borders? HackInTheBox A'dam1-2 July2010 keep knowl. I will be delivering a welcome address at a really cool computer security conference in Amsterdam on Thursday July 1st. The conference is called “Hack In The Box”, which originates from Malaysia and is run by really knowledgeable, nice and friendly people. It’s two days, so July 1st and 2nd. There’s a special hacker community deal, and the program is jam-packed with interesting talks. Hack In The Box (hackinthebox) Rop.gonggri.jp. Rop Gonggrijp (rop_g) Rop Gonggrijp. Rop Gonggrijp in 2010.
PART 1/6 Rop Gonggrijp - Frank Rieger - We lost the war - 22nd Chaos Communication Congress. PART 2/6 Rop Gonggrijp - Frank Rieger - We lost the war - 22nd Chaos Communication Congress. My keynote at 27C3. Right here exactly five years ago Frank Rieger and myself held a lecture that was called “We lost the war”.
It was about how we felt the fight over privacy and wider civil rights was going. For those of you who weren’t there: it wasn’t a very happy story. ICFJ International Center for Journalists. ICFJ. 5 Innovative Websites That Could Reshape the News. This series is supported by The Poynter Institute’s Mobile Media blog – your guide to the intersection of mobile and media.
Sign up to receive the blog in newsletter format and be entered into a drawing to win an iPad at Poynter.org/ipadgiveaway. Few industries are experiencing greater upheaval at the hands of technological progress than the news media. New ideas are popping up every day, so we've collected five of the most interesting ones for your consideration. The previous generation of sites that redefined the news birthed several household names — Twitter, YouTube and Digg, to name a few. It's no secret that newspapers have struggled as blogs and social networking sites have grown in prominence, but in the rapidly changing worlds of mobile and web technology, the distribution methods for news information are once again shifting. The Bureau of Investigative Journalism. TBIJ (TBIJ) Iain Overton (iainoverton)
RSF / RWB (RSF_RWB) MIT Comm-Forum. Knightfdn. Knight Foundation Hands Out Grants to 12 Groups, but Not WikiLea. The Knight Foundation announced on Wednesday 12 winners of its News Challenge grants, projects costing a total of $2.74 million that will use new technology to spread information in local areas. The winners included a platform for collaborating to report local news and a plan to spread virtual town halls across Vermont. WikiLeaks: Knight grants $2.74Mio to... Networks and Engaged Communities: Beginning a Conversation about Knight Foundation Research.
There has been increasing interest around the world in the role that inclusive businesses, which engage and benefit the global poor, can play in the fight against the problems of poverty. Working Wikily (WorkingWikily) Cij Center of Investigative Journalism. Global Investigative (gijn) Vrijspraak voor AIVD'ers. Online, news archives never die, nor do they fade away. Two state judges in Pennsylvania recently ordered newspapers to take down online stories about criminal cases after charges against the defendants were expunged.
The newspapers refused, citing the First Amendment’s prohibition against the government restricting the freedom of the press. Championing Independent Journalism. Frontline Club. Ushahidi in 3G: How media outlets could extend the mapping platform beyond crisis communications. Since its launch in early 2008, the crowdsourced mapping platform Ushahidi has been used to monitor elections in Burundi, to track violence in Pakistan, to coordinate aid in Haiti. Its platform has been downloaded nearly 4,000 times; its mobile platform, more than 3,700. It’s now been six months since Haiti’s earthquake; and Patrick Meier, Ushahidi’s director of crisis mapping and strategic partnerships, was on hand to discuss his work at Harvard’s Berkman Center earlier this week as part of the center’s regular luncheon series.
Julian Assange: The end of secrets? - opinion - 16 August 2010. Read full article. Society of Professional Journalists. Press Freedom Online. CPJ (pressfreedom) A World of Opportunities in News Media. IJNet (IJNet) Z Communications. Cryptome. Website for Leaked Data Shines Spotlight on WikiLeaks. Wikileaks Website to Be Abandoned.
15 July 2010. Columbia University Graduate School of Journalism. Newstweek: news modification demonstration. 2011-01-07-device-distorts-news-on-wireless-neworks. Hidden device distorts news at hotspots Security researchers from Berlin-based firm, Critical Engineering, uncover the technology behind a small, seemingly harmless device that's causing havoc at hotspots throughout Europe. Wolfgang Buechner (wbuechner) WAN-IFRA (NewspaperWorld) To Host World Press Freedom Day in 2011. World Press Freedom (WPFD2011)
Chaîne de WPFD2011. Biography of Irina BOKOVA. Newseum Home. Newseum (Newseum) Philip J. Crowley (PJCrowley) The seven deadly sins of journalism companies. Clay Shirky predicts widespread disruptions for syndication. Credit where credit is due. Jonathanstray: @chsirky predicts that the... New rule: Cover what you do best. Link to the rest ? BuzzMachine. Syndication. Vertical Acuity. Cartoon Movement Launches. How to Crack the New York Times Most-Emailed List. All the President's Men. All the President's Men (film) 6 Corporate Media Giants Control Majority of Mainstream News. Independent News Organizations & Media. News Corporation. News Corporation (NWScorp) News Corporation.
Murdoch onder druk door nieuwe ‘phone hacking’-onthullingen « De nieuwe reporter. Journalism at City University London - City University London. CityJournalism (cityjournalism) Why the NYT will lose to HuffPo. Who reads the papers? - Yes, Prime Minister - BBC comedy.