Free Essay

Wiki Leaks

In:

Submitted By kwilder
Words 1539
Pages 7
The purpose of this paper is to gain useful information on what Wikileaks is about. This paper will give you information on who founded Wikileaks and several findings that Wikileaks published for the public to view.
Wikileaks is a non-profit organization that’s put together by several people. The purpose if wikileaks is to bring important news and information to the public “We provide an innovative, secure and anonymous way for sources to leak information to our journalists (our electronic drop box). One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the truth. We are a young organization that has grown very quickly, relying on a network of dedicated volunteers around the globe. Since 2007, when the organization was officially launched, WikiLeaks has worked to report on and publish important information. We also develop and adapt technologies to support these activities.” (www.wikileaks.org)
In one month, the Wikileaks submitted over 400,000 secret military logs that were tied to the operation in Iraq. This gave every death in Iraq and across the boarder in Iran to be mapped. Wikileaks released 76,900 documents about the war in Afghanistan that was not available to the public. In April 2011, Wilileaks began publishing files that had to do with secret information relating to prisoners. One might ask how they get away with posting and airing such information. Wikileaks had overcome many legal pursuits to stop the website from publishing such information. They are encouraged by freedom of speech. “In particular, Article 19 inspires the work of our journalists and other volunteers. It states that everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. We agree, and we seek to uphold this and the other Articles of the Declaration.” (www.wikileaks.org)
The front man and editor of Wikileaks is Julian Assange. Julian is am Australian publisher. He is also a journalist and internet activist. Julian founded Wikileaks in 2006. The same year Julian wrote two essays giving the purpose of Wikileaks. "To radically shift regime behavior we must think clearly and boldly for if we have learned anything, it is that regimes do not want to be changed. We must think beyond those who have gone before us and discover technological changes that embolden us with ways to act in which our forebears could not. In his blog he wrote, "the more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. Since unjust systems, by their nature, induce opponents, and in many places barely have the upper hand, mass leaking leaves them exquisitely vulnerable to those who seek to replace them with more open forms of governance.” (www.wikileaks.org) At a young age, Julian became a speaker and strong believer on freedom of the press. In November 2010, Wikileaks began publishing U.S. diplomatic cables. Some Nominations and awards that Julian received are the Readers Choice Award, and the Amnesty International media award. Although Assange doesn’t call himself the founder of Wikileaks, he does describe himself as the editor in chief. The Wikileaks team consists of five people working fulltime and around 800 people that work every now and then that did not get paid.

When looking at the website, Wikileaks is very organized in the way that they except information and share information. Currently they are improving their website and are not receiving submissions. They also regularly have a chat line on their website where people share information and chat about their findings and what they think about them. “Wikileaks will accept restricted or censored material of political, ethical, diplomatic or historical significance. We do not accept rumor, opinion, and other kinds of first hand accounts or material that is publicly available elsewhere. This is because our journalists write news stories based on the material, and then provide a link to the supporting documentation to prove our stories are true. It’s not news if it has been publicly available elsewhere first, and we are a news organization. However, from time to time, the editors may re-publish material that has been made public previously elsewhere if the information is in the public interest but did not have proper news analysis when first released.” (www.wikileaks.org). This information is very organized and well thought of. The research needed to collect such materials is studied and submitted with caution to avoid lawsuits. I located the wikileaks chat room and found that they were closed down for maintenance. But it did still list that the chat rooms are safe and secure. If you wanted to send a response in the chat room, you can be sure that your email address and other information is safe and secure from others, including the IRC operator, that are in the chat room. Your real name, as well as your user name, is confidential as well. Wikileaks uses a confidential drop box where people submit their information.

Of course some people use Wikileaks for entertainment purposes, Educational purposes, and others think Wikileaks is not a good site and should be shut down for airing the information of others that they thinks should be confidential.
Nearly 143,000 out of the 251,999 cables that were submitted by Wikileaks last year have been published. This last article that I found is from a website where Wikileaks posted some videos as well. Please feel free to watch the videos. Please be aware before you view this website that the video does contain certain language that is disturbing as well as people being shot at. “On July 6, 2010, Private Bradley Manning, a 22 year old intelligence analyst with the United States Army in Baghdad, was charged with disclosing this video (after allegedly speaking to an unfaithful journalist). The whistleblower behind the Pentagon Papers, Daniel Ellsberg, has called Mr. Manning a 'hero'. He is currently imprisoned in Kuwait. The Apache crew and those behind the cover up depicted in the video have yet to be charged. 5th April 2010 10:44 EST WikiLeaks has released a classified US military video depicting the indiscriminate slaying of over a dozen people in the Iraqi suburb of New Baghdad -- including two Reuter’s news staff. Reuters has been trying to obtain the video through the Freedom of Information Act, without success since the time of the attack. The video, shot from an Apache helicopter gun-sight, clearly shows the unprovoked slaying of a wounded Reuters employee and his rescuers. Two young children involved in the rescue were also seriously wounded. The military did not reveal how the Reuters staff were killed, and stated that they did not know how the children were injured. After demands by Reuters, the incident was investigated and the U.S. military concluded that the actions of the soldiers were in accordance with the law of armed conflict and its own "Rules of Engagement". Consequently, WikiLeaks has released the classified Rules of Engagement for 2006, 2007 and 2008, revealing these rules before, during, and after the killings. WikiLeaks has released both the original 38 minutes video and a shorter version with an initial analysis. Subtitles have been added to both versions from the radio transmissions. WikiLeaks obtained these video as well as supporting documents from a number of military whistleblowers. WikiLeaks goes to great lengths to verify the authenticity of the information it receives. We have analyzed the information about this incident from a variety of source material. We have spoken to witnesses and journalists directly involved in the incident. WikiLeaks wants to ensure that all the leaked information it receives gets the attention it deserves. In this particular case, some of the people killed were journalists that were simply doing their jobs: putting their lives at risk in order to report on war. Iraq is a very dangerous place for journalists: from 2003- 2009, 139 journalists were killed while doing their work.” (http://www.wikileaks.ch/) This submission by Wikileaks makes you really wonder how these videos were obtained and how this information was sent to the public without consequences. But it also is amazing that it was caught on tape. But if those brave people would not have posted the videos and revealed the information then we would not know what went on and who was in charge of this terrible act. In conclusion I feel that WikiLeaks is very beneficial to the community due to the fact that the information that is being spread is news that we really need to know so that we can keep our community and world safe and informed on current things that are happening. In some cases, this information detrimental to the armed forces, because some of the things that are being leaked out can harm us if other countries are getting the inside scoop on what our country is planning. Overall the website is very informative and I gathered a lot of information that I was not knowledgeable of before.

Similar Documents

Free Essay

Wiki Leaks Exposed

...Debate with your learning team whether Wikipedia is a credible and valid source of information. Resource: Learning team debate and Ch. 9 Writing from Sources Option I Develop your own argument based on the debate outcomes. Use the four steps for fairly presenting arguments indentified in Ch. 9 of Writing from Sources to guide your writing. What are the four steps for fairly presenting arguments identified in Ch.9: 1. Present both sides of the argument. One way of shading an argument to suit your own ends is to misrepresent the strength of the opposition. Let us assume that you are working PRESENTING ARGUMENTS FAIRLY 4 1 3 negative view image of attack image of disease 0-312-62992-3 (c) Bedford/St. Martin's / bedfordstmartins.com with a number of articles, all of which are effectively presented and worth citing. Some clearly support your point of view; others are openly opposed; and a few avoid taking sides, emphasizing related but less controversial topics. If your essay cites only the favorable and neutral articles, and avoids any reference to the views of the opposition, you have presented the issue falsely. A one-sided presentation will make you appear to be either biased or sloppy in your research. If the sources are available and if their views are pertinent, they should be represented and, if you wish, refuted in your essay. 2. Provide a complete account of the argument. Sometimes, distortions occur accidentally, because you have presented ...

Words: 1065 - Pages: 5

Premium Essay

Groupware

...When looking for software that helps bring a company together you need something that allows each part of the company to talk share idea and gather data in a timely matter. You also want to make sure that the medium you try to use is also secure and stable so that you don’t have to worry about the system crashing around you and when company need this they look to groupware to get the job done. Groupware refers to programs that help people work together collectively while located remotely from each other. Programs that enable real time collaboration are called synchronous groupware. Groupware services can include the sharing of calendars, collective writing, e-mail handling, shared database access, electronic meetings with each person able to see and display information to others, and other activities. (Senior, 2009) Sometimes called collaborative software, groupware is an integral component of a field of study known as Computer-Supported Cooperative Work or CSCW. When know many of the good points of groupware we can get emails from all over the company and we can even access our email at home or different computer around the work site. We can bring are team together and they have vital information and you can view the work in progress. No need to worry about carrying your customer, employee or partner's information with you. All your personal and corporate contacts are all in one place and can be accessed with a few keystrokes. Contacts in Outlook or other databases can...

Words: 1100 - Pages: 5

Premium Essay

Company

...Nurse Educator Nurse Educator Vol. 34, No. 5, pp. 209-213 Copyright ! 2009 Wolters Kluwer Health | Lippincott Williams & Wilkins Wikis and Blogs Tools for Online Interaction Jane S. Grassley, PhD, RN Robin Bartoletti, MS Online education requires nursing faculty to learn teaching strategies that encourage students’ interaction with the course content, their peers, the faculty, and the technology. The Web 2.0 technologies of wikis and blogs can help faculty direct online learning activities that encourage peer support, collaboration, and dialogue. The authors discuss these tools and how they were used to engage students in a nursing research course. ince the mid-1990s, increasing numbers of people have come to rely on the Internet as a convenient source of information and education. In nursing, the growing need for convenient and nontraditional learning strategies fostered a proliferation of Web-based nursing education programs. Since teaching online requires faculty to use strategies that differ from those used in face-to-face classrooms, nurse researchers have investigated characteristics of online education environments that facilitate students’ engagement with learning.1-3 Thurmond concluded,3(p237) ‘‘Good teaching practices are deeply rooted in the concept of interaction.’’ MancusoMurphy4(p257) identified interaction among faculty and students as ‘‘the core element of an effective online environment.’’ Researchers determined that peer support, collaboration, and...

Words: 3701 - Pages: 15

Premium Essay

Cita Project

...service, a new digital device, network services). You are free to use any rich text editor that you choose (it can be as simple as Microsoft Word). You cannot use a template and just fill in your content. Do not use an online service that allows you to just use a template and fill in your information. If you have a question if you can use specific software, ASK. Your web pages must satisfy several technical specifications that may require the use of other applications to create graphs and software to create aesthetic visuals. Remember that you have an audience to appeal to and should showcase your pages as such. Details • Research a topic using at least three resources (your text book, other books, and web references permitted—not a wiki [like Wikipedia]). • Build at least five web pages. One of these pages could be a list of references. Your content should be distributed among the four (or more) pages in a thoughtful way. • Document your references on the web pages using MLA Style. Graphics must also be cited completely—just going to Google and grabbing a picture is not acceptable. • Construct navigation that is used on all your web pages. The navigation permits the viewer to move from any one of your pages to the others. The navigation may be a row or column of buttons (or words arranged in a table) that appears in a common location on each page. • Display an image of a graph/chart you created—it can be a simple graph/chart that you create in Excel or Word...

Words: 635 - Pages: 3

Free Essay

Essay

...BONUS ASSIGMENT BUSI 3040U: INFORMATION SYSTEMS PRIVACY VIOLATIONS AND THEIR RAMIFICATIONS ADEDAMOLA MAKINDE S/N 100367804 EI fraud investigator axed for leaking “quota” details This is the story of a private information leak by an employee of Service Canada. In February, Ms. Therrien went directly to the press and provided documents that were not authorized for public disclosure. Ms. Therrien leaked documents exposing a conservative crackdown on those receiving EI. The documents showed that EI investigators had been told to crackdown on about $485,000 in EI fraud each year. She further disclosed to the press that “fraud quotas” were just one of a culture in her office that encouraged benefits from as many recipients as possible to save money. As initial investigation was going on, she was suspended from her Job without pay from February 2013 until October 2013 when she was finally fired from the job. The letter sent on behalf of Employment and Social development Canada stated that she no longer met the conditions of her job. Certain control measures could have been taken to prevent this leak. The lady told the press that she felt bad that the government was not doing a good job by cutting down on EI payments. Her intention was good from what she told the press. In other words, these were private documents that involve government files and private files. There is no right for her to disclose any document that she is not authorized. Her Job does not permit her to...

Words: 1246 - Pages: 5

Premium Essay

Economic

...System is defined as, “an economic model that counts the goods and services exchanged domestically and between nations.” (Words of Wisdom, 2012) An example of an open system is a business that gets its labor and products from foreign economies. The inner and outer flows of a closed system; includes and pertains to business to home markets from Good and Services from a Business to a Household and an Household that works at the Business for Land (Household) Labor and Capital and vice versa. It’s a constant flow of a closed system. A prime example would a person who works at a Wal-Mart and also shops there. The inner and out flows of an open system; includes and pertains to the same flow from a closed system but sometimes/most times it leaks into and from other foreign markets. You may get goods and services from a Business but they may have outside (foreign) laborers and that business might also gain capital from foreign households as well. This...

Words: 530 - Pages: 3

Free Essay

Scrib Doc

...THE FOLLOWING VIDEO WILL SOW YOU HOW TO EMBED A SCRIBD DOCUMENTE In your wiki page. First go to the wiki page where you want to embed the documente. Click on the edit button. Then with the cursor mark exactly where you want the documente to display on the wiki page. Go up to the gray edit tool bar at the top of the page and select “WIDGET”. On the left side colum select the “document” and then choose scribd for the option. You will see a brief set of instruction numbered 1 throug 4. now you have to complete those steps 1. Go to any scribd.com document Then go the the right hand side of the page and clik the option for embe document. If you click on “embed option it wil dispay a set of different characteristics for the display of the document in the page. Lets select the autosize and for the view style select slideshow. Leave the bos for including a link unchecked. You can play around with the different fuctions and once you have decided wich oone you want to use. Copy the Standard HTMLby Click on the button that says “copy. Then go back the the wiki edit page and paste Standard HTMl. Next hit the preview button , and save your work. Check that he widget is in the right place and then you can hit preview and save 2. Click on the "Embed" button. 3. Copy the Standard HTML and paste it in the box below. 4. Click Preview to preview the document or click...

Words: 265 - Pages: 2

Free Essay

The End of Email

...the volume of constant e-mailing is literally overwhelming no matter if it is business or personal. We don’t have a lot of time to read or to respond back to coworkers, communication between people who are in our groups to discuss or review projects by e-mail tend to get lost in e-mail shuffle, notification of interoffice schedule meetings sometimes will be missed due to too much e-mailing, and at home we just may not have the time to even look at our e-mail because of our family obligations once we are home. In this article, Tom Biro shares his thoughts about a possible new way of saving time and keeping track of how we communicate by using the “wiki” software to create webpages that can be used on the Internet or in the company’s Intranet. After reading this article, I agree that e-mail as we now use it will be replaced by this Wiki software and it will hopefully help in communicating in a timely, effective, and efficient manner whether on the job or at home. Tom Biro, director of new media strategies for the MWW Group, a public relations and marketing firm of East Rutherford, NJ. The company employees 200 people across eight states which in my opinion may help shed...

Words: 1558 - Pages: 7

Premium Essay

Dirt Bikes

...Dirt Bike’s Internet Tools Ann Isaacs IT205 – Management of Information Systems November 10, 2013 Karen Cann Communication is a key element in the success of any business and an intranet is just the way to help your business accomplish this task. The use of intranets within an organization such as Dirt Bikes will prove to be beneficial in increasing sales, communication between employees, vendors, suppliers and provide up-to-date information to all types of customers. Human Resources, Sales and Marketing, Manufacturing and Production are all teams that can benefit from this service. The Intranet enables the company to incorporate information from customers and vendors in an effort to find their own business process, resulting in finding the best solution for each. Employees can access company information from anywhere, not just at the office. The ease of use is very promising and unlike older systems everyone can be on the same system. Sales and Marketing departments can benefit from intranets, providing accurate and quick access of reports, marketing initiatives, product information, and competitor’s offers or sales. Very different from the internet, an intranet is an internal system within a company that all employees can access. The intranet will serve the purpose of provoking organization, communication and process simplification. The intranet will provide a company and its employees first hand access to advertising and marketing, company...

Words: 815 - Pages: 4

Free Essay

Benefits of Wiki

...Wiki as a Delivery Tool in Organizations Student’s name Instructor’s name Course Date Wiki: Definition According to Grace, P. L. (2009), a wiki is a web application that allows for a collaborative modification, deletion and extension of stricture and content. In a typical type of wiki, a text is written by using a simplified markup language or a rich text editor. With a wiki being a type of a content management system, it tends to differ from blogs or other systems of the same type. The difference comes in where the content of a blog is created without a specific leader or owner. For a wiki, it has a little implicit structure. Its implicit structure allows it allows the structure to come out in a way in which the user needs it to be. Even though wikis have existed for so long, they have started to take off in organizations and businesses recently. Just like the Web did after creating its place in the corporate world, wikis have gone through a period of fierce competition, wild growth, and inappropriate usage. Despite all that, wikis have been used widely in organizations. Wikis have been used by organizations as the simplest online databases. The wiki software is basically created with a purpose of managing the site contents of an organization. Product that allows for creation of a wiki The recent innovations in sensor and mobile technologies have allowed for the creation of a digital representation of any physical entity as well as its parameters...

Words: 673 - Pages: 3

Free Essay

Student

...[pic] [pic] [pic] [pic] Data Loss and Misuse [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] Question: The service provider shall provide Client Based Data Leakage Services necessary to provide services and support for Data Loss Protection (DLP) with the following activities: a) Deploy the Clinet endpoint agent (XEA) to all new client machines. b) Deploy the XEA to at least 95% of existing in-scope client machines within 90 days of its initial release. c) Deploy any patches or updates to the XEA out to 95% of existing XEA-equipped machines (both clients and servers) within 45 days of those patches or updates being released from testing with approval to deploy. d) Monitor, investigate and remediate instances where the XEA ceases to function on any machine (client or server) that is still connecting to the XGI. e) Monitor, initiate investigation, and escalate alerts generated by the DLP system indicating mishandling of Clinet classified data. f) Distribute reports and data extracts as required. g) Support Tier I and II help-desk end-users’ and server application support questions arising from the XEA. Can you meet this requirement? Please explain below. ORGANIZATION understanding of Requirements: Clinet is looking for Client Based Data Leakage Services necessary to provide services and support for Data...

Words: 1129 - Pages: 5

Premium Essay

Ilm3 M3.11

................... District Manager. ................... clean water contract. Repair and Maintenance. Introduction. I am predominantly based in ????????, but also reside at one of our satellite depots in Ninfield, East Sussex due to the size of the area covered. I am a District Manager on the SEW Clean Water R&M contract across two counties; Sussex and Kent. As a District Manager, I am responsible for approximately 33 members off staff, these include; 3 Supervisors, 12 gangs consisting of 2 operatives, 3 grab lorry drivers and 3 support drivers. The main focus of my work is to support my Supervisors in ensuring the safe and efficient running of each of their individual areas while trying to meet the client and company KPI's. Monitoring and detailed reporting of all aspects of the business including HS&E and Cost and Productivity. Concise and clear communication with the client and upper management. I have been a District Manager for 5 years, working for Clancy a combined period of 10 years going from a General Operative to my current position. (In-between a TUPE transfer, in the industry for nearly 15 years) Q: Describe the factors that will influence the choice of leadership styles or behaviours in workplace situations There are several factors that can influence leadership styles. Some...

Words: 406 - Pages: 2

Free Essay

Business Report

...mandatory PPE for working in process areas required. Additional PPE may be required as per Refinery Standards and applicable Material Safety Data Sheets (MSDS). | | | References: | LDAR – OLT SWP Initiating Procedure LDAR – Monitoring ProcedureLDAR – Repair Attempts Log in FEMS ProcedureLDAR – Work Notification Entry Procedure | | | * * * PREREQUISITENA | * | * PROCEDURE INSTRUCTIONS | 1.0 | Manage First Attempt Repairs | 1.1 | * Immediately following the completion of fugitive emission monitoring in a unit, gather all the leaking equipment info into a spreadsheet format from the Integra monitoring technicians. The data should include the following: sub area, Tag ID, Description, Equipment, Size, Leak Source, PPM, Leak Tag #, Drawing # and Comments. Create a “Master List of Leakers” to compile all of the data. Please use this document as a guide. * ADD LINK | | | 1.2 | * Create the list of leakers for first attempt repairs in each unit using the template. The list should only include block valves and connections (drains, vents, etc) as operators do not attempt to fix flanges, control valves, or pump seals. \\file203\Environment\Records\Air\LDAR\Templates\1st Attempt Repairs Schedule - sample.xlsx - Update LINK | | | 1.3 | * Enter an FE work notification for these repairs (one notification per unit) to be performed by operators. Follow the “LDAR – Work Notification Entry Procedure. In addition, the list of leakers for 1st...

Words: 1736 - Pages: 7

Free Essay

Case Paper 2

...Singhquaverton Maden COSC 3325 4/5/13 Jie Arrendell Case 2: Raymond James Financial, BCD Travel, Houston Texans, and Others: Worrying about What Goes Out, Not What Comes In I think the reason why employees don't realize the dangers is because the events which are less sensitive to the management of the company's employees are not important in regulating confidentiality of data and information systems. As we can see from the case there are several examples of the proposed event where there's less rigorous regulation in the supervision of information systems within the company. Most of the issues described in the case are simple little issues such as emailing customer credit card numbers and such but I would have definitely have seen these issues but the lapse of these company have cost them security wise. The best way for organizations to strike the right balance between monitoring and invading their employees' privacy would be to evaluate each employees based on their activities. Have each employee make a report of their activities while the company is monitoring them as well the companies should put trust in their employees to report everything they're doing and when it is time to evaluate them cross compare what has been monitored and what the employees have reported. The consequence biased to one side would be if the company were to engage in just invading employee privacy there could be massive repercussions such as the company being sued etc...

Words: 343 - Pages: 2

Free Essay

Raymond James Financial Bcd Travel, Houston Texans and Others

...I think the reason why employees don't realize the dangers is because the events which are less sensitive to the management of the company's employees are not important in regulating confidentiality of data and information systems. As we can see from the case there are several examples of the proposed event where there's less rigorous regulation in the supervision of information systems within the company. Most of the issues described in the case are simple little issues such as emailing customer credit card numbers and such but I would have definitely have seen these issues but the lapse of these company have cost them security wise. The best way for organizations to strike the right balance between monitoring and invading their employees' privacy would be to evaluate each employees based on their activities. Have each employee make a report of their activities while the company is monitoring them as well the companies should put trust in their employees to report everything they're doing and when it is time to evaluate them cross compare what has been monitored and what the employees have reported. The consequence biased to one side would be if the company were to engage in just invading employee privacy there could be massive repercussions such as the company being sued etc. The other components are people security, establishing ethical behavior in the company, and managers taking the initiative to stop any leakage in the company. The human factor in is the stronger...

Words: 300 - Pages: 2