James Goodale has a message for journalists: Wake up. In his new book, Fighting for the Press (CUNY Journalism Press, 2013), Goodale, chief counsel to The New York Times when its editors published the Pentagon Papers in 1971, argues that President Obama is worse for press freedom than former President Richard Nixon was.
The Obama administration has prosecuted more alleged leakers of national security information under the 1917 Espionage Act than all previous administrations combined, a course critics say is overly aggressive. Former New York Times executive editor Bill Keller wrote in a March op-ed that the administration “has a particular, chilling intolerance” for those who leak. If the Obama administration indicts WikiLeaks founder Julian Assange for conspiracy to violate the Espionage Act, Goodale argues, the president will have succeeded where Nixon failed by using the act to “end-run” the First Amendment.
Goodale spoke with CJR about why he chose to write about the Pentagon Papers now and what he sees as the key threats to press freedom today. The conversation has been condensed and edited for length and clarity. Fighting for the Press comes out on April 30.
Unibrow discrimination is a very real, very measurable problem. While I don’t condone unibrow discrimination, if you’re blessed with a single follicular faceband, you may consider a browectomy, if just to avoid being some rando a Facebook post.
Bruce Schneier’s a security specialist with his own Internet meme. And while most people believe that technology elevates, improves things, Schneier holds that technology magnifies, makes things bigger, good and bad:
Whether it’s Syria using Facebook to help identify and arrest dissidents or China using its “Great Firewall” to limit access to international news throughout the country, repressive regimes all over the world are using the Internet to more efficiently implement surveillance, censorship, propaganda, and control. They’re getting really good at it, and the IT industry is helping. We’re helping by creating business applications — categories of applications, really — that are being repurposed by oppressive governments for their own use:
What is called censorship when practiced by a government is content filtering when practiced by an organization. Many companies want to keep their employees from viewing porn or updating their Facebook pages while at work. In the other direction, data loss prevention software keeps employees from sending proprietary corporate information outside the network and also serves as a censorship tool. Governments can use these products for their own ends.
Propaganda is really just another name for marketing. All sorts of companies offer social media-based marketing services designed to fool consumers into believing there is “buzz” around a product or brand. The only thing different in a government propaganda campaign is the content of the messages.
Surveillance is necessary for personalized marketing, the primary profit stream of the Internet. Companies have built massive Internet surveillance systems designed to track users’ behavior all over the Internet and closely monitor their habits. These systems track not only individuals but also relationships between individuals, to deduce their interests so as to advertise to them more effectively. It’s a totalitarian’s dream.
Control is how companies protect their business models by limiting what people can do with their computers. These same technologies can easily be co-opted by governments that want to ensure that only certain computer programs are run inside their countries or that their citizens never see particular news programs.
What goes unsaid in his essay is that the leader of the tech industry, and the most heavily-equipped to use IT — and therefor IT for oppression — is a lot closer to home. (more…)
During Israel’s Operation Pillar of Defense against Palestinians in Gaza last November, Anonymous hackers launched a mass attack on Israeli government websites. In response to the eight day assault that killed 133 Palestinians, Anonymous’ #OpIsrael defaced thousands of Israeli sites and provided information for Gazans facing Internet and communications blackouts. 60 million hacking attempts were reportedly made.
Last week, Israeli airstrikes once again hit targets in Gaza, officially breaking a ceasefire established last November (although cross-border clashes have informally breached the ceasefire in recent months, leaving four Palestinians dead). In retaliation, Anonymous relaunched #OpIsrael this weekend, and according to an Anonymous spokesperson offering a partial damage report, 60,000 websites, 40,000 Facebook pages, 5,000 twitter accounts and 30,000 Israeli bank accounts got hacked, causing an estimated $3-plus billion damage, the hacker collective claim. “Not bad for 24 hours,” Anonymous noted.
On a hot day in June 2004, the Pashtun tribesman was lounging inside a mud compound in South Waziristan, speaking by satellite phone to one of the many reporters who regularly interviewed him on how he had fought and humbledPakistan’s army in the country’s western mountains. He asked one of his followers about the strange, metallic bird hovering above him.
Less than 24 hours later, a missile tore through the compound, severing Mr. Muhammad’s left leg and killing him and several others, including two boys, ages 10 and 16. A Pakistani military spokesman was quick to claim responsibility for the attack, saying that Pakistani forces had fired at the compound.
That was a lie.
Mr. Muhammad and his followers had been killed by theC.I.A., the first time it had deployed a Predator drone in Pakistan to carry out a “targeted killing.” The target was not a top operative of Al Qaeda, but a Pakistani ally of theTaliban who led a tribal rebellion and was marked by Pakistan as an enemy of the state. In a secret deal, the C.I.A. had agreed to kill him in exchange for access to airspace it had long sought so it could use drones to hunt down its own enemies.
That back-room bargain, described in detail for the first time in interviews with more than a dozen officials in Pakistan and the United States, is critical to understanding the origins of a covert drone war that began under the Bush administration, was embraced and expanded by President Obama, and is now the subject of fierce debate. The deal, a month after a blistering internal report about abuses in the C.I.A.’s network of secret prisons, paved the way for the C.I.A. to change its focus from capturing terrorists to killing them, and helped transform an agency that began as a cold war espionage service into a paramilitary organization.
That being said, the Karambit’s different. You have to hold it differently because that’s the way it draws. And boy does it draw, check this out:
The Karambit’s not cheap but when it comes to tactical operator EDC emergency wire ops backup blade kit blades at $240 including a trainer, but it’s not astronomical for a solid TOEEWOBBKB option either.
Bruce Schneier’s a security specialist with his own Internet meme. And while most people believe that technology elevates, improves things, Schneier holds that technology magnifies, makes things bigger, good and…