A reminder about WikiLeaks “Just in time to spoil the celebration of the 40th anniversary of the publication of the Pentagon Papers, the Obama Justice Department is trying to do what Richard Nixon couldn’t: indict a media organization. . . . Charging Julian Assange with ‘conspiracy to commit espionage’ would effectively be setting a precedent with a charge that more accurately could be characterized as ‘conspiracy to commit journalism‘” — James Goodale, General Counsel of The New York Times during its Pentagon Papers fight with the Nixon administration, writing in The Daily Beast, June 12, 2011. When, many years ago, I first read about the Nixon administration’s infamous break-in to the office of Daniel Ellberg’s psychiatrist as a means to discredit the Pentagon Papers leak, I was baffled by the motivation.
mashable Rebecca Levey is a co-founder of KidzVuz.com, a video review site by and for tweens. She writes about technology and education at Beccarama and is a White House Champion of Change for Education. Follow her at @beccasara. On the face of it, my 10-year-old twin daughters are the poster girls for the "digital natives" generation. They've had a Leapster since age 4, and have been online since they were 5 — first playing on Webkinz, then Club Penguin, Moshi Monsters, and other online virtual worlds. They can navigate PowerPoint, Microsoft Word and Photoshop like pros.
Confessions Of A Teenage Xbox Hacker You know, it really pissed me off that people can just fuck with other people, and never be held accountable for it. Worse, still, that they can willfully give themselves a sense of justification (although in some cases, like some guy ripping your friend off, is understandable). I mean, on one hand, I suppose I can understand the appeal; to have a sense of power, in a society that really doesn't let people have power unless they have money or are in office. To tackle the spread of misinformation online we must first understand it Last summer the World Economic Forum (WEF) invited its 1,500 council members to identify the main issues the world faces, and what should be done about them. The WEF consists of 80 councils covering a wide range of issues including social media. Members come from academia, industry, government, international organisations and wider civil society. The top three issues highlighted for 2014 concerned rising societal tensions in the Middle East and north Africa; widening income disparities; and persistent structural unemployment. Perhaps surprisingly, in tenth place was a concern over the rapid spread of misinformation online, and specifically social media's role in this. With a value of 3.35 on a scale of 1-5 this was seen as "somewhat to very significant".
Everyone who attended #OWS with a cell phone had their identity logged, says security expert Please note that by playing this clip YouTube and Google will place a long term cookie on your computer. While we in the civil liberties community disagree strongly with private investigator Steven Rambam's admonition to "Get Over It," after listening to him describe electronic surveillance powers it's hard to disagree with the first part of the title of his talk: "Privacy Is Dead." (Part two of the talk is below.) "Where you work, what your salary is, your criminal history, all the lawsuits you've been involved in, real property...everything you've ever purchased, everywhere you've ever been...Your information is worth money. Stratfor, WikiLeaks and the Obama administration's war against truth WikiLeaks founder Julian Assange attends a press conference in London, 27 February 2012, about the release of more than 5m emails from private intelligence firm Stratfor. Photograph: Kerim Okten/EPA WikiLeaks, the whistleblower website, has again published a massive trove of documents, this time from a private intelligence firm known as Stratfor. The source of the leak was the hacker group Anonymous, which took credit for obtaining more than 5m emails from Stratfor's servers. Anonymous obtained the material on 24 December 2011, and provided it to WikiLeaks, which, in turn, partnered with 25 media organizations globally to analyze the emails and publish them.
Jenny Luca - Toorak College Information Fluency Program Toorak College Information Fluency ProgramCC BY-NC-SAAttribution-NonCommercial-ShareAlikeAt Toorak College the teaching and learning of information fluency skills is embedded in the dissemination of an integrated curriculum. The Information Fluency Program recognises the importance of preparing and skilling students to be active, productive and collaborative contributors in an increasingly global society. The Program is based on the standards developed by the International Society for Technology in Education(ISTE®) and compatible with the General Capabilities identified by ACARA (Australian Curriculum, Assessment and Reporting Authority) in the Australian Curriculum. It outlines, at each year level, relevant skills, learning tasks and applications that reflect 21st century learning and living. The Australian Curriculum includes seven general capabilities:
FinSpy Software Is Tracking Political Dissidents What they found was the widespread use of sophisticated, off-the-shelf computer espionage software by governments with questionable records on human rights. While the software is supposedly sold for use only in criminal investigations, the two came across evidence that it was being used to target political dissidents. The software proved to be the stuff of a spy film: it can grab images of computer screens, record Skype chats, turn on cameras and microphones and log keystrokes. The two men said they discovered mobile versions of the spyware customized for all major mobile phones.