<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2013/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Just+Johnny</id>
	<title>Technologies of Politics and Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2013/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Just+Johnny"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/Special:Contributions/Just_Johnny"/>
	<updated>2026-05-20T06:14:12Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy&amp;diff=8713</id>
		<title>Internet and Democracy</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy&amp;diff=8713"/>
		<updated>2012-05-14T05:27:32Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;March 27&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital tools are seen as playing a major part in political activities and revolutions around the world from the Green Revolution in Iran to the recent events in the Middle East and North Africa.  In this class, we&#039;ll explore the role of the Internet  in political organizing, social movements and popular protests, and the potential impact of digital tools on governance.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-03-27.pdf Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/11/a-new-theory-for-the-foreign-policy-frontier-collaborative-power/249260/ Anne-Marie Slaughter, A New Theory for the Foreign Policy Frontier: Collaborative Power]&lt;br /&gt;
&lt;br /&gt;
* [http://technosociology.org/?p=566INSERT Zeynep Tufekci, The #freemona Perfect Storm: Dissent and the Networked Public Sphere]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2012/exploring_russian_cyberspace Alexanyan et al, Exploring Russian Cyberspace: Digitally-Mediated Collective Action and the Networked Public Sphere]&lt;br /&gt;
&lt;br /&gt;
* [http://technosociology.org/?p=904 Zeynep Tufekci, #Kony2012, Understanding Networked Symbolic Action &amp;amp; Why Slacktivism is Conceptually Misleading]&lt;br /&gt;
&lt;br /&gt;
* [http://blog.socialflow.com/post/7120244932/data-viz-kony2012-see-how-invisible-networks-helped-a-campaign-capture-the-worlds-attention Gilad Lotan, KONY2012: See How Invisible Networks Helped a Campaign Capture the World’s Attention]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell Malcolm Gladwell, Why the revolution will not be tweeted.] &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf Etling, Kelly, Faris and Palfrey,  Mapping the Arabic Blogosphere: Politics, Culture and Dissent]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public Etling and Kelly, Mapping Iran&#039;s Online Public]&lt;br /&gt;
&lt;br /&gt;
* [http://ui04e.moit.tufts.edu/forum/archives/pdfs/32-2pdfs/Faris-Etling_32-2.pdf Faris, Etling, Madison and the Smart Mob: The Promise and Limitations of the Internet for Democracy]&lt;br /&gt;
&lt;br /&gt;
* [http://rosebellkagumire.com/2012/03/08/kony2012-my-response-to-invisible-childrens-campaign/ Rosebell Kagumire, Kony2012; My response to Invisible Children’s campaign]&lt;br /&gt;
&lt;br /&gt;
* [http://www.truthdig.com/report/item/a_letter_from_uganda_on_kony2012_20120315/  Sara Weschler, A Letter From Uganda on #Kony2012]&lt;br /&gt;
&lt;br /&gt;
* A few more Kony 2012-related resources:&lt;br /&gt;
** Sam Gregory, [http://advocacy.globalvoicesonline.org/2012/03/21/advocacy-audience-and-agency-in-kony-2012-moving-from-critique-to-action/ Advocacy, Audience and Agency in Kony 2012: Moving from Critique to Action]&lt;br /&gt;
** Ethan Zuckerman, [http://www.ethanzuckerman.com/blog/2012/03/14/useful-reads-on-kony-2012/ Useful reads on Kony 2012]&lt;br /&gt;
** Xeni Jardin, [http://boingboing.net/2012/03/08/african-voices-respond-to-hype.html African voices respond to hyper-popular Kony 2012 viral campaign]&lt;br /&gt;
** Kate Cronin-Furman and Amanda Taub, [http://www.theatlantic.com/international/archive/2012/03/solving-war-crimes-with-wristbands-the-arrogance-of-kony-2012/254193/ Solving War Crimes With Wristbands: The Arrogance of &#039;Kony 2012&#039;]&lt;br /&gt;
** Norbert Mao, [http://blog.foreignpolicy.com/posts/2012/03/21/guest_post_ive_met_joseph_kony_and_kony_2012_isnt_that_bad I&#039;ve met Joseph Kony and Kony 2012 isn&#039;t that bad]&lt;br /&gt;
** Radio Berkman, [http://blogs.law.harvard.edu/mediaberkman/2012/03/23/rb-195-can-100-million-viewers-save-a-child/ RB 195: Can 100 Million Viewers Save a Child?]&lt;br /&gt;
** [http://www.youtube.com/watch?v=QWACLKaOC08 Invisible Children Global Night Commute Musical] (2006)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
March 27: Internet and Democracy&lt;br /&gt;
&lt;br /&gt;
In Slaughter&#039;s article, there are quite a few many interesting points being addressed.  Namely, Nye&#039;s notion towards resource power is interesting when examining websites such as Facebook and Twitter.  While many users simply use these sites for aesthetic, or mass cultural appeal, many are simply unaware of their potential for power and control.  &lt;br /&gt;
&lt;br /&gt;
There is also quite clearly a distinct political agenda within both of these websites.  Facebook, for example, was funded by InQTtel and radical republican organizations.  So, there are obvious political motivations behind sites such as Facebook.  It is an unavoidable Trojan horse, it is veiled Darwinism.  Although, broad based prosperity within the United States has always come from a strong middle class.  Strengthened regions across the United States all add to the reform.  Billy Bob is improved by Wal-Mart, and is a good for all.  By using these platforms for this function, a stronger more polished middle class may be achieved.  In addition, the added benefit of espionage, mass surveillance, and invalidating adversarial world views is seen as plausible as more people continue to use these platforms.  Extending this benefit across the globe is also a benefit, as there are many regions which desire what we take for granted.  &lt;br /&gt;
&lt;br /&gt;
Yet, not everything is quite that obvious, either.  More recently, the brash outburst of political protests exemplified part of the natural process that occurs within most democratic societies.  However, there was something not quite organic about it.  What started these protests, and why?  The first idea that comes to mind is that those occupy protests were staged as a controlled necessary evil as part of the democratic process.  Aside from this, a way to test how everything is coming along while singling out potential trouble makers.  It reminded me of a clip I watched on television the other night with the republican candidate Rick Santorum.  In the clip, Mr. Santorum was upset with a supposed reporter.  He was stern with him, while being dangerously clean.  No matter how hard I tried, I could not shake the realization that the clip was staged and probably paid to be put on the news to give Mr. Santorum the appearance of a man in charge, a made up flaw with a specific purpose.  &lt;br /&gt;
&lt;br /&gt;
So, is it really revolt or just conversion and progress?  It’s just people doing what they’ve always done before.  &lt;br /&gt;
&lt;br /&gt;
So, this is really nothing all that new to democracy.  The first thing I usually ask when I read something, or watch something is: why is this here?  We see things staged all of the time.  And, most of the time we don&#039;t really realize what it&#039;s for in a greater significance.  &lt;br /&gt;
&lt;br /&gt;
After reading about Mona El Tahawy, what I started to think about is how these sites like Facebook work to extend pro-American style liberal democracy into less liberated societies.  There are many regions of the world that desire what many Americans take for granted in their daily lives.  And when an American is away in another country, how can they shout for help?  &lt;br /&gt;
&lt;br /&gt;
So we are adding in this idea of social media a part of the dialogue.  &lt;br /&gt;
&lt;br /&gt;
“In the 21st century, no regime worth its salt will ignore social media; those who do will find themselves looking for places to retire” (Zeynep Tufekci).  &lt;br /&gt;
&lt;br /&gt;
What I find interesting about this is that we are adding in concepts of democracy that were not there before.  When we mention social media, it is distinctly an American concept.  It&#039;s like going over to Egypt and setting up a McDonald&#039;s and a Wal-Mart and then getting everyone to shop there.  If everyone uses Facebook, Microsoft, and so on, we are speaking a cultural language.  &lt;br /&gt;
&lt;br /&gt;
Although, very interesting to see how these sites are working to keep people engaged in the democratic process.  It seems that as long as there are people willing to fight for freedom, then it will continue to grow.  &lt;br /&gt;
&lt;br /&gt;
I think that as we continue to talk and communicate on these sites, the greater the chance that we will begin to see a more level playing field across the board.  That is to say that hopefully things will become more equal for everyone.  After all, that is one of the core ideas of democracy.  Men, women, and children, all living better lives.  And it looks like it&#039;s going to be okay.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:11, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great analysis in the Social Flow Blog about the Kony2012 campaign. This reading made me realize the two powerful ingredients for the skyrocketing spread of an online message: pre-existing networks and  philanthropy tactics. I had seen the video a few weeks ago and felt inclined to participate. I think anything that has to do with children is touching for the people, also for me; but at the same time I was wondering how this campaign, and no others--because injustice is present in a number of cases around the world--succeeded in the gathering of all that people, and these two ingredients led me to the Eureka solution. I think it&#039;s very interesting from the marketing point of view, and for sure marketers have analyzed the Kony2012 campaign, as they have done in the social networks.&lt;br /&gt;
&lt;br /&gt;
As for the Russian reading, What most interested me about it was the networked public sphere phenomenon in practice, in which when an issue is considered to be from public importance online activists take action—like the Khimki forest campaign, the drivers’ movement and the Anti-Seliger protests. From my point of view this will continually help in the building of real democracies in which people can participate and their voices are heard. In the Russian case, this shift is happening and having success due to the low level of support that the people have for institutions, and it is something to be expected not only in Russia but also around the world. Not far away, this situation led the Middle East towards the Arab Spring, in which social networks participation was crucial to detonate the revolutions.[[User:Fabiancelisj|Fabiancelisj]] 22:09, 26 March 2012 (UTC) @Fabiancelisj: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I think it is interesting to note from this week’s readings that collective action, through organizing online, is faster, easier (in that there is less physical barriers), allows for more collaboration of ideas globally, and is less expensive than traditional offline methods. Taking advantage of social media, Mona was quickly released after tweeting about her arrest by Egyptian police. In most cases, social media through Facebook, YouTube, and Twitter are faster than mainstream media such as TV and radio. The internet has allowed for sharing of information as quickly and as simple as a click, for example, the “share” button on Facebook. The internet and social media have allowed for new ideas to generate online and then carried out offline. However, as evident in the Russia study, there is a disparity in internet use, which is more available to “city dwellers and younger and richer people.” Another example is the Kony 2012 video on Youtube, which people can easily share on Facebook, is “popular among youths.” In Russia, people mostly expressed anti-government ideas through the blogosphere. While the government fought back using twitter and DDoS attacks and offline methods, such as inflicting harm to journalists.[[User:Qdang|Qdang]] 18:05, 27 March 2012 (UTC) @Qdang: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)   &lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
I had read the Gladwell article before and just seeing his name in the list of readings lead me back to it first (who doesn&#039;t always want to read a Gladwell piece?).  I also generally agree with his conclusions about the limitations of social media and had arrived at roughly the same place in some of our earlier class discussions.  As a result, I feel like my reading of the other materials was mostly through that skeptical lens.  I very much agree that the degree of effort, true commitment, and genuine impact is extremely different on Twitter vs. in real life, and while that should be quite obvious it sometimes seems like it gets disregarded during our current age of adoration of social media and Twitter in particular.  His explanation of how strong vs weak social connections play into that difference in true commitment was an interesting next step in understanding protest and activism both through social media and in our physical daily lives.&lt;br /&gt;
&lt;br /&gt;
That all being said, I still was very impressed by the #freeMona campaign and its results.  I like that the various pieces we read on it acknowledged that it was more or less a perfect storm of connected individuals and important relationships along with Twitter and that Twitter was not the be-all end-all savior in a vacuum, but it still seemed undeniable that this was the power of Twitter in action.  The main point to me is that Twitter was used as the connective piece; a hashtag alone did not free her.  What it did was inform and motivate a large group of people, and included in that group were a few with the existing power and connections to allow them to call the state department, arrange to send help, etc., and in the end that freed her.  [[User:AlexLE|AlexLE]] 13:31, 26 March 2012 (UTC) @AlexLE: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Just wanted to share this &#039;&#039;New York Times&#039;&#039; article - &amp;quot;[http://www.nytimes.com/2012/03/26/business/media/hashtag-activism-and-its-limits.html?src=recg Hashtag Activism, and Its Limits]&amp;quot; - since it complemented the discussion last week about barriers to entry for digital activism. [[User:Aditkowsky|Aditkowsky]] 00:03, 27 March 2012 (UTC) @Aditkowsky: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
I liked Zynep&#039;s article and the term &amp;quot;slacktivists.&amp;quot; I believe Kony 2012 was a large group of non-activists taking symbolic action. I had heard of Invisible Children before the Kony 2012 youtube video and had done some research on the organization. Full disclosure I am not a huge fan of the organization but I admit I still jumped on the Kony 2012 bandwagon for one reason - a genius PR/Marketing campaign. There is a lot to learn from this organization and how an effective Twitter campaign can sustain... if only for a short time. I look forward to our discussion in tonight&#039;s class.--[[User:Hds5|Hds5]] 14:03, 27 March 2012 (UTC) @Hds5: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Social media (and Twitter for our discussions, has two affects when it comes to the user communicating a sentiment or action (versus any particular target government responding to such communications or actions). Either it creates a new cultural/political/geopolitical phenomenon that otherwise would not have existed in its identity without the existence of social media or that these transactions and movements have already existed for years but has allowed for “quicker” responses and actions as Zeynep points out. &lt;br /&gt;
&lt;br /&gt;
Besides rapidity, I also think that social media has empowered individuals to become more politically active, which I believe is somewhat independent of the “quicker” hypothesis. While the example of Mona and the massive Twitter movement between journalists and state officials was sped up through almost instantaneous communications through Twitter, I surmise that those communications may have occurred to some degree (but in different modalities). But the Egyptian uprising is an example of people becoming more empowered through social media by reading or writing Twitter feeds as the events unfolded and therefore forming “complex, diverse and ad hoc networks” as Zeynep indicates as “dynamics of a global campaign.” But the formation of those networks relies not necessarily on the collective entity but of a collection of individuals empowered to join and participate in those networks.  --[[User:Jimmyh|Jimmyh]] 16:43, 27 March 2012 (UTC) @Jimmyh: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great readings this week - looking forward to our discussion in class and very much interested in your perspectives as this week&#039;s topic fits right in with my project.  I attended a conference yesterday hosted by Digital Democracy and the New American Tavern titled, &amp;quot;The Impact of KONY2012&amp;quot; with a couple representatives from Invisible Children and additional experts.  I&#039;ll share with you what was discussed where the focus was mostly with: lessons we can learn from what worked about Kony2012, critiques of the campaign, the film, IC, and the larger issues they point to, what it means moving forward for non-profits, etc.[[User:JennLopez|JennLopez]] 17:51, 27 March 2012 (UTC) @JennLopez: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Slaughter’s Article&#039;&#039;&#039;Relational Power: 1. COMMANDING CHANGE = getting people or groups to do things they don&#039;t want to do. 2. “CONTROLLING AGENDAS” = framing &amp;quot;agendas for action that make others&#039; preferences seem irrelevant or out of bounds.&amp;quot; 3. “SHAPING PREFERENCES”= using &amp;quot;ideas, beliefs, and culture to shape basic beliefs, perceptions and preferences.&amp;quot;&lt;br /&gt;
Please explain how Dec. of Independence is soft power? This is a government document, handed down as law. I interpreted soft power as the draw that led to hard power, which is what I thought the Declaration would be considered.&lt;br /&gt;
“power with” vs “power over” = difference in collaborative power. This was the difference I noted in (something we discussed last class) but wasn’t highlighted&lt;br /&gt;
Relational vs collaborative powers = force vs choice?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;freemona&#039;&#039;&#039;Debate over released (mentioned in above article): I would think that the twitter campaign had a huge impact on the result. Side question: how did she tweet she was beaten and detained? Someone else for her?&lt;br /&gt;
My takeaway: another extension of users leveraging technology (or perhaps the ability of technology to travel with people) into other countries with less technology to be used as news. &lt;br /&gt;
Cause/Effect Debate: Connected Users creating their own news versus topdown traditional newspapers (last class discussion)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alexanyan/Professor/Others&#039;&#039;&#039;Russian Politics and Twitter, Blogosphere, etc: “The Russian political blogosphere supports more cross-linking debate than others we have studied (including the U.S. and Iranian), and appears less subject to the formation of self-referential ‘echo chambers”&lt;br /&gt;
“The online ‘news diet’ of Russian bloggers is more independent, international, and oppositional than that of Russian Internet users overall, and far more so than that of non-Internet users, who are more reliant upon state-controlled federal TV channels”&lt;br /&gt;
“Popular political YouTube videos focus on corruption and abuse of power by elites, the government, and the police”&lt;br /&gt;
These findings seem to support that Russia is embracing democracy and the old guard (which still apparently has a presence according to U.S. Media) is losing strength.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Kony2012&#039;&#039;&#039;Author: “Further, all human societies operate in a world of socially-constructed norms and ideals” ---- no mention of architecture&lt;br /&gt;
I may argue that slacktivism does contain some harms ---it seems the author doesn’t want to answer any criticisms of it, but just purely defend the symbolic nature of slacktivism even if the information is not accurate. Boy who cried wolf? I think it’s important for information to be accurate. I think people demand the truth, and more importantly are infuriated when they find out facts are different after they’ve went along with something (Iraq). We are pulling out of Iraq (long term view has yet to decide if this will be adverse or not).&lt;br /&gt;
As for Kony itself, we all know what its currently known for due to incident with leader arrest --- which further gives discussion to the effects of activism turned slacktivism.  Going back to why we have the phrase slacktivism is because of “mistakes” made in the original reporting.&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 17:45, 27 March 2012 (UTC) @Brendanlong: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The articles I read for this week’s class were very intriguing and fascinating, especially since my final project deals with this argument to some extent. The first article was very interesting in general but it really got me thinking about the recent middle eastern and African dictatorships which have been overthrown by the people who gained access to mass media and communication systems to finally change an unpleasant system. The second article as well was very interesting and powerful in demonstrating the importance of the media and in this specific case social networks like Twitter. The article concerning Russia was fascinating in one sense but sad in another. I know for certain that what happens in Russia (politically speaking) is only a mask of what really happens and what people really think about the Government. Although it may seem that there is a certain freedom in the use of the internet, the truth is very far from this, the only difference is that what really happens is kept a secret most of the time, and those very few who are able to escape torture, prison and political assassinations, are able to flee and tell the world about their experiences. I really enjoyed Zeynep Tufekci’s article on Kony 2012 and I do agree with her totally for what concerns getting people to pay attention to what really is important and not just mundane activities but I feel that for the majority of the population at least now that is not the case nor will it be in the near future. It is often hard to convince the average person that there are extremely important issues out there which apparently don’t touch him but in order to change the system, should. The last article on Kony 2012 was also very interesting but my personal view on this matter is that I don’t believe that simply “sharing” or “liking” the campaign video will actually do anything to change the situation. Clicking “share” in my opinion is just a way of saying: ok, I saw it! But the question is: now what are you going to do? And the answer in my opinion is: nothing, just going to continue tweeting or posting about the next sport event etc. I might seem a bit too skeptical but this is my personal, and perhaps wrong, opinion on the matter at hand. [[User:Emanuele|Emanuele]] 18:05, 27 March 2012 (UTC) @Emanuele: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
There is a lot to be learned from KONY and #fremona. Collective action channeled through mediums like Twitter are more rapid and can reach a larger, more diverse swath of the population. These mediums are big and useful tools in these types of collective action campaigns. KONY helped those who are not typically involved in political activism (the younger age groups listed in the article) to get more involved/become more aware, and did so very quickly. I think that is one of the biggest strengths of social media. This is also evident in the article about Russian Twitter users. These people can now make their voices heard (although Tufekci points out the &amp;quot;rich get richer&amp;quot; phenomenon). The Gladwell article shows another perspective. I think it&#039;s important to not discount the masses who organize on the ground (the Moldovan protestors, Tehran protestors, etc), but to also keep in mind that social media platforms do play an important role and the dynamics of protests, campaigns, and collaborative efforts have changed. And, I think, for the better.&lt;br /&gt;
&lt;br /&gt;
I, too, wonder how Mona tweeted? I noticed in the article&#039;s comments that someone pointed out how &amp;quot;99%&amp;quot; of Egyptians don&#039;t have the technology (phone, apps, network connection) nor are they bilingual (can&#039;t as easily reach an international crowd) and they use word of mouth, therefore the article isn&#039;t representative. But both Mona and Trufekci qualify the powerful use of Twitter by saying most jailed Egyptians don&#039;t have that option. At the very least, Mona shed more light on the &amp;quot;languishing&amp;quot; plight of the jailed Egyptians/protestors, and she did so in a big way. [[User:Aberg|Aberg]] 19:47, 27 March 2012 (UTC) @Aberg: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All of these articles were quite informative, and all together interesting regarding the nature of activism and social media.  However, I found one thing lacking in each of these articles; namely, popularity.  Zeynep began to touch on the subject when he addressed #Kony2012 activists, naming them slactivists.  His insight to the inactivity of those interested in activist movements was an exceptional read.  But I wish he would have taken it a step further and addressed the issue of popularity.  To analyze this you really have to analyze human behavior, which I won’t do here, but I’ll address it.  Regardless of the nature of the subject, what will trend through social media, whether it be activist causes or cat videos, will be what individuals find to be most appealing to their interests at that time based upon the knowledge they have on the particular nature of that subject.  In other words, if it sounds appealing to the individual, then it will retain that individual’s attention, and in retaining that attention, that individual will either seek other sources of information about that subject, or promote the information he just read.  &lt;br /&gt;
&lt;br /&gt;
This is simple trending, and simple mass appeal that all marketing firms know of and manipulate.  It’s clearly evident that this is also what has taken place through #Mona and #Kony.  Both of these trends became popular because they were able to pique the interest of so many, rather than actually meaning something.  I’m not trying to say that they didn’t mean something, but Zeynep was on to something when he mentioned all the other world problems that we ignore.  These subjects became popular, and eventually their popularity alone drew in many others to contribute to its popularity; and this is a trait that is special to social media.  I have not seen the Kony video, however, if I were to watch it, its view count would increase, and in effect, move up the ladder of trending topics, regardless of my interest.  An example of what I mean is the Rebecca Black song “Friday”.  The original version has 26 million views, and not all that watch it really likes that song; it has 5 times as many dislikes as likes.  But because it trends, more people are apt to watch the video, which adds to its count and adds it to the trend.&lt;br /&gt;
&lt;br /&gt;
The principle of my argument it that while social media does help these causes, as Zeynep states, it also follows popularity contests, which are subject to causes that are not congruous with the activist cause.  The greatest example is President Franklin Pierce.  He won the presidential election of 1852 in a landslide victory with virtually no political experience.  He was the most popular, not the greatest politician.  This came to light throughout his presidency, and to this day is the only incumbent president not to be re-nominated by his own party for reelection.  He became unpopular.  He was a fleeting trend that individuals promoted without knowing the actual nature of the trend, and once the nature of the trend is known, it falls into disfavor.  Zeynep points this out in Kony, and the Mona issue seems no different.  They trend because they seem appealing at the time, rather than actually being the issue that is assumed by those who popularize it.  I’m not saying that this is a bad thing, or that the topics are inherently inferior, but rather they won the popularity contest.[[User:Nthib|Nthib]] 21:03, 27 March 2012 (UTC) @Nthib: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the KONY article to be the most interesting of the bunch for this class.  In particular, I had many questions answered as to how that particular campaign went so viral while others for similiar causes have floundered.  It seems that &amp;quot;having pre-existing networks in place helped the initial spread of their message.&amp;quot; Apparently, laying the foundation with clusters of youth or other tech-savv demographics is paramount to a succesful online campaign.  Secondly, they used &amp;quot;attention philanthropy tactics&amp;quot; which mens they had high-profile celebrities increase their visibility substantially. I would argue that a third lever activated such a viral campaign in that the press came out and covered the spread of the campaign (both positively and negatively) which then spurred further dissemination.  That level of tv and print media coverage then drew in those who were not tech-savvy to begin with or may use it for other reasons than tweeting, facebook, etc. [[User:Cfleming27|Cfleming27]] 11:34, 28 March 2012 (UTC) @Cfleming27: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
About Anne-Marie Slaughter’s article, it’s truly something to reflect on.  There is a power, which has been latent, but is no more latent.  That is the power of individual and collective opinion.  I say it was previously latent, because although some people are more outspoken than others, most people tend to remain silent, when they think it will cost them much to speak up about injustice or needed change, or if they feel they can do nothing about the situation.  Modern technology has put this human tendency into a new context, removing, at least in part, some of that “costliness” barrier.  It’s easy to send a tweet, and become, as Slaughter put it, another drop of water that can form a “tsunami”.  Although some places do their best to stop the rain of water drops, and manage to stop many drops, they can never stop them all, clouds condense in new places, and rain is bound to fall.  Modern technology is facilitating this new avenue for the torrents of water to form and flow, so the power is no longer latent.[[User:Mike|Mike]] 18:31, 28 March 2012 (UTC) @Mike: [[User:Just Johnny|Just Johnny]] 01:27, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class 9 Internet and Democracy (March 27)&#039;&#039;&#039; Posted on March 29, 2012 1:30pm EST [[User: Harvard212|Harvard212]]&lt;br /&gt;
I&#039;m sad that I missed this class discussion, but I&#039;m sure it was good. Of the reading that we scaled this week, I found the FreeMona piece exceptionally powerful. It awoke my understanding of &amp;quot;going viral&amp;quot; in a manner that is meaningful and powerful. FreeMona also made me realize the impact of social media and what expedited communication could look like in the matters (and aid) of critical situations. Indeed, this class has long left the safe haven of talking loftily about law/internet/society in theory, but an active agent. Even something as &amp;quot;small&amp;quot; as Twitter. Needless to say, this is not the first time I was floored by the grandiose of our studies packaged in this little room and live-stream. However, this week&#039;s focus highlights the importance of free internet and sheds light on the previous conversation around internet laws and cross-cultural acceptance (and relevance). Free speech is something that is still challenged in many countries.&lt;br /&gt;
&lt;br /&gt;
Further, I am impressed by the KONY inclusion into this week&#039;s reading. Once again, the under radar communication proves itself powerful. And perhaps we really need to look at citizen journalism through refreshed (and solemn) lens.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Collective_Action_and_Decision-making&amp;diff=8712</id>
		<title>Collective Action and Decision-making</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Collective_Action_and_Decision-making&amp;diff=8712"/>
		<updated>2012-05-14T05:24:27Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;March 20&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Mass collaboration and the aggregation of information enable potentially profound changes in business and politics. In this class, we will compare and contrast the transformations in economic life and collective decision-making processes brought on the information revolution.  The discussions will also explore the role of open information systems on business and the scope for greater transparency and participation in government, politics and public life.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-03-20.pdf Slides]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* James Surowiecki, [http://www.randomhouse.com/features/wisdomofcrowds/excerpt.html Wisdom of Crowds (excerpt)]&lt;br /&gt;
**[http://www.nytimes.com/2004/05/22/books/review/0523books-mclemee.html?ex=1400644800&amp;amp;en=43bc95eb638bfed2&amp;amp;ei=5007&amp;amp;partner=USERLAND NYT Review]&lt;br /&gt;
* [http://ethanzuckerman.com/blog/?p=1125 Ethan Zuckerman&#039;s blog review of Infotopia] Great summary of the issues in the book.&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;ved=0CCYQFjAA&amp;amp;url=http%3A%2F%2Fciteseer.ist.psu.edu%2Fviewdoc%2Fdownload%3Fdoi%3D10.1.1.59.9009%26rep%3Drep1%26type%3Dpdf&amp;amp;ei=IHRnT8TLOe-00QHH5YSHCA&amp;amp;usg=AFQjCNERO0GwXWc7DLWZwSaqnjjjMTWMYg Divided They Blog] - a paper showing trackbacks between political blogs, mentioned by Ethan Zuckerman in his review of Cass Sunstein&#039;s Infotopia&lt;br /&gt;
* On a similar topic: [http://webuse.org/p/a22/ Cross-Ideological Discussions among Conservative and Liberal Bloggers], by Eszter Hargittai, et al.&lt;br /&gt;
**Abstract: With the increasing spread of information technologies and their potential to filter content, some have argued that people will abandon the reading of dissenting political opinions in favor of material that is closely aligned with their own ideological position. We test this theory empirically by analyzing both quantitatively and qualitatively Web links among the writings of top conservative and liberal bloggers. Given our use of novel methods, we discuss in detail our sampling and data collection methodologies. We find that widely read political bloggers are much more likely to link to others who share their political views. However, we find no increase in this pattern over time. We also analyze the content of the links and find that while many of the links are based on straw-man arguments, bloggers across the political spectrum also address each others writing substantively, both in agreement and disagreement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
March 20: Collective Action and Decision-making&lt;br /&gt;
&lt;br /&gt;
James Surowiecki&#039;s excerpt on the wisdom of crowds presents some really compelling ideas.  &lt;br /&gt;
&lt;br /&gt;
It would seem that crowds are more likely to arrive at collective decisions that are closer to the hole than individuals would be to do on the whole.  For the most part, this makes me think of how crowds are manipulated through mass consumerism, media and so forth.  The collective mind, so to speak, is plugged in and then guided towards certain suggestions.  They are told continually to purchase something, or to do something.  So we are part of a slow conditioning process as is witnessed through orchestrated mass consumerism.  This seems to be a beneficial thing for the perpetuation of free market exchange, as many western societies have not had to resort to communism.  Who wants to be a millionaire when money flows through the collective already?  In this sense, we are collectively rich as a society.  Whatever a citizen may need is available to them if they want it.  Just as the long tail profits, the newness is there when you need it.  &lt;br /&gt;
&lt;br /&gt;
I don&#039;t know if I completely agree with Sunstein or Surowiecki&#039;s suggestions entirely, though.  I think that in certain situations leaders develop and then it simply becomes a game of following the leader for the group.  And that isn&#039;t necessarily a bad thing.  I think that, collectively society is becoming a much richer place to engage in and is not just exposing someone to something they might not otherwise know about.  And I witness this shift primarily across generations with knowledge differences.  For example, something I may assume is common within pop culture knowledge is unheard of by my mother and her generation.  &lt;br /&gt;
&lt;br /&gt;
I do think that Habermas adds an interesting idea in that it is the quality of the idea which is more important than the individual.  To a certain degree, this is mostly how I conduct myself when people ask me my opinion about a certain topic.  I will contend for an idea.  I’m not interested in what I believe in, more so than the idea.  Primarily, as a student I am concerned with exploring ideas, and then there is the style placed on top of that – which is what I think many people have a hard time discerning.  Sometimes I will play the devil’s advocate on a subject of debate, because I understand that an idea is not about me – I am just a transporter of that knowledge, which has nothing to do with me personally.  For example, most of my work here at Harvard has been based around ideas, not my personal beliefs.  I could care less what I actually believe about a subject.  What I am concerned about is ideas.  Personally, I have no personal beliefs about what it is I&#039;m working on.  I work on a project, using the idea as the base and then overlay a style.  Aesthetics are really a lot of fun to play around with.  That is not to say that I am not interested in generating my own original ideas.  However, as a student my role is primarily to learn the material.  Although, I do think that ideas do not always become common knowledge amongst the collective.  This is because crowds can be influenced by the leader.  In the case of mass media, MTV will dictate the idea, and then teenagers will simply follow it.  Then individuals fit into simple categorical groupings.  &lt;br /&gt;
&lt;br /&gt;
Zuckerman&#039;s comments on Republic.com seem to suggest that collective decision making, through mass consumerism, is a good thing in that it makes people feel more connected.  &lt;br /&gt;
&lt;br /&gt;
Here is an interesting quote relating to this: “Sunstein seizes on this possibility and offers a strong caution: if we can choose our own media, it’s possible we will use this power to insulate ourselves in an information cocoon, where we systematically avoid dissenting voices and have increasingly less common experience with our fellow citizens. Sunstein worries that a society of these isolated individuals will have difficulty participating in a democracy because citizens need a) some exposure to materials they would not have sought out and b) some common experience as a precursor for joint decisionmaking.”  &lt;br /&gt;
&lt;br /&gt;
What I also think is interesting here is this notion of increasingly broadened scope of exchange of information.  Whether it is through blogs, or controlled means such as Wikipedia, what we are seeing is a collective that is becoming seemingly more connected and more able than before.  &lt;br /&gt;
&lt;br /&gt;
So this is interesting how both Zuckerman and Surowiecki seem to go back to this metaphor of a collective consensus on the number of jelly beans in a jar.  It’s like asking how many neurons are in a person’s head that collectively allow that person to make a decision.  Collective decision making is like this.  &lt;br /&gt;
&lt;br /&gt;
The only thing that I think might interfere would be over-socialization and government intervention with this form of trade that Hayek seems to touch on.  And this is also interesting, because as people become more connected and able they are more likely to form more direct democracies.  For example, there are protesters who use cell phones and websites to announce when and where a protest will take place.  So I think that governments will want to make sure than even protesters remain within the architecture that is already in place.  As everyone knows, too many protesters demanding a state of anarchy could potentially overthrow a state just as easily as when monarchies were overthrown throughout most of Europe and Russia.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:11, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The question whether a group will take a better  or a worse solution is an interesting one in the context of Internet, social media, etc. I am thinking also in terms of real world with presidential election or death penalty. Is the group decision the best? How the process is different from online decision making? As for Internet, I think we can do more than Amazone, Facebook, that we did not explore all the capacities of mass decision or decision making. I am wondering about a world republic...--[[User:Sab|Sab]] 22:43, 20 March 2012 (UTC) @Sab: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
In the Johnson’s experiment of the maze, I like the idea that the group had discovered the optimal solution, and it would be interesting to demonstrate that it applies to the real world and not only in laboratory settings and classrooms. I think it would be even more interesting to analyze the relation with the phenomenon of the social networks, in which the mass decision and participation primes over a handful of people making what they think is better for the society. I think this experiment has more sense than the Victorian notions that humanity, as a group, is just a dumb herd. I don’t think this is a correct statement, nevertheless experiments like Sustein’s in which was demonstrated that people find it difficult to defy the will of a group, and may polarize to avoid interpersonal conflict are facts that should be carefully thought. The question is if in fact this applies also for Internet communities, in which there’s no personal contact and people feel freer to express whatever they want without fearing opposition and being different. In any case, what I like more in the Ethan Zuckerman Blog review of Infotopia is that in some cases the predictions are proven wrong, like the Sunstein’s predictions that if we can choose our own media we will isolate ourselves in an information cocoon. Therefore, deliberation could be proven to be an effective way to accumulate information.[[User:Fabiancelisj|Fabiancelisj]] 20:25, 20 March 2012 (UTC) @Fabiancelisj: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Even though group intelligence is more difficult to measure than individual intelligence, I do believe that a crowd can outsmart a genius. Imagine for example, if a very intelligent physicist is isolated and only surrounded by other physicists, he/she maybe outstanding in this field, but is limited to what he/she can do. However, when allowed to collaborate with cell and molecular biologists, chemists, mechanical and electrical engineers, medical doctors, veterinarians, etc… a physicist learns to conduct cell mechanics, biophysics, molecular and biochemical experiments, and has the potential to solve health problems, such as coming up with a drug to relax airway smooth muscle cells during an asthma attack. When a group of diverse individuals collaborate, they can solve problems that they otherwise cannot solve individually. The internet has allowed this collaboration to increase globally through technologies such as Skype and E-mail. In some instances, group intelligence depends on its structure and dynamics. For example, Megan Garber, from Nieman Lab, reported that MIT researchers found that “[g]roup intelligence is correlated…with emotional intelligence, http://www.niemanlab.org/2011/05/mit-management-professor-tom-malone-on-collective-intelligence-and-the-genetic-structure-of-groups/. The researchers concluded that a group is more intelligent and is more likely to solve difficult problems when there are more women in it. Simply placing very smart individuals together in a group does not make a group smarter.&lt;br /&gt;
When I think of a very intelligent individual or genius, I think of my lab principal investigator, who has the ability to lead his lab members and make important decisions. However, he would have not made an informed decision without hearing the lab members deliberate. [[User:Qdang|Qdang]] 15:52, 19 March 2012 (UTC) @Qdang: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Qdang raised an interesting idea of group intelligence. At the same time, group think can be counter-productive. The question to ask is how to move forward with collective speed and vigor, yet not work the group into isolated silos that are irrelevant to surrounds or reality. [[User: Harvard212|Harvard212]] 15:18, 8 May 2012 EST @Harvard212: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
I like the connection between the reality of crowd intelligence in &amp;quot;Who Wants to Be a Millionaire&amp;quot; or marble-jar guessing and the concept of blog aggregates and online communities.  It seems like this is a good argument against the dangers of cocooning at some levels.  While a given blog/website community is likely there because they all subscribe to a certain set of interests or views, at least you know that if you&#039;re going to a big one you&#039;re probably getting the very best and most cohesive expression of those concepts.  It may not make them right, but it adds value to them as a tool for educating yourself.  Aggregates also will provide a balance to the problem that 1 or 2 of every group of 50 people will actually be more accurate than the group at guessing the number of marbles... but only in that one specific trial.  If you follow one blogger religiously you are susceptible to their blind spots and moments where they were simply wrong.  If you follow a collection of sites and blogs you will be exposed to the correct answers to most questions; whether you realize which is the correct answer is up to you haha. [[User:AlexLE|AlexLE]] 14:04, 19 March 2012 (UTC) @AlexLE: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The level of expertise and information distributed through these channels of information is a consideration. In addition, cultural norms may also stand against the validity and movement towards adopting thoughts. For instance, a group of trained skeptics may be much more wary of early information that has not be substantiated. Whereas another group that relates to each other on a more communicative or trust-base dynamics may adopt &#039;truths&#039; on the simple notion that one or two group members have accepted these &#039;facts&#039; as &#039;truths&#039;. I almost feel like to be ethically solid, blogs should have disclaimers and opinion makers should remind their audience, they are voicing their opinion -- just to maintain neutrality and fairness of information filtering. Might get cumbersome though. [[User: Harvard212|Harvard212]] 15:23, 8 May 2012 EST @ Harvard212: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The articles that we had to read for this week were very interesting to me. I really enjoyed how the first article focused on statistics regarding various experiments and “Who wants to be a millionaire”, a program which I personally loved watching. Even though I respect and find very interesting the point made regarding the percentages being higher and closer to the correct answer for groups and less accurate for individuals, I don’t agree. Math and Statistics aren’t my field and I must admit that I’m not very good at any of them but I feel off the top of my head that it is quite obvious that a group would obtain a higher and more accurate score than an individual because the general population or “average Joe” is likely to get fairly close to the right answer which can be higher or lower but of course adding all the higher scores to the lower ones, I find it to be mathematically obvious that we shall obtain an approximately correct average score. Therefore this being said I find the “Condorcet Jury Theorem”, mentioned in the third article to pretty much respect my personal opinion on the subject. In conclusion I very much enjoyed these articles and I find that in some way these theories emphasizing on group work and force are exactly what Democracy is about. [[User:Emanuele|Emanuele]] 18:12, 19 March 2012 (UTC) @Emanuele: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Collective action affects us everyday (or at least those of us that read news, shop, or blog online). For instance, if you use Reddit, most likely you&#039;re reading posts on the front page that were up-voted--a form of collective action. Zuckerman&#039;s article also points out &amp;quot;Amazon&#039;s collaborative filtering recs and Google&#039;s page rank algorithm.&amp;quot; This had a huge effect on business (as we read in the long tail article, for example).&lt;br /&gt;
&lt;br /&gt;
Sunstein has a valid point with ideological cocoons, but does seem flawed. I agree with Zuckerman and the others who labeled his idea as &amp;quot;alarmist.&amp;quot; While it&#039;s entirely possible (as &amp;quot;Divided they Blog&amp;quot; suggests) for people to seek out news and sites with similar ideologies and have their beliefs continually reinforced, that is not necessarily the way most people &#039;read the news.&#039; Greater exposure to new ideas or newspapers/news from far away, like the readings said, is a benefit that far outweighs the risk of people forming an ideological cocoon.  [[User:Aberg|Aberg]] 18:24, 20 March 2012 (UTC) @Aberg: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I realize we&#039;ll probably dig deeper into the topics of collective action and decision-making in the &amp;quot;Internet and Democracy&amp;quot; classes but I&#039;d love to have a longer reading list on this topic. If anyone has any additional recommendations, please share. Thanks! [[User:Aditkowsky|Aditkowsky]] 13:17, 20 March 2012 (UTC) @Aditkowsky: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;There is a certain notion of rationality that starts from the assumption that each of us is, in essence, a monad designed to maximize profit and pleasure.&amp;quot; For me this quote by Scott McLemee (NYT Review) summed up the concept of collective action and decision-making communities have on the internet. This brings up the concept of &#039;public good&#039; again and reminds me of why Wiki remains so successful - we, as an internet society/community, are acting collectively to produce the most &#039;public good&#039;. --[[User:Hds5|Hds5]] 21:04, 20 March 2012 (UTC) @Hds5: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
I wonder what the limitation is of this type of input from a group compared to a crowd. There will be a limitation if this is applied towards democracy when the overall good of the people may not affect the desired motives of the individual voter. Overall in the general studies referenced in the article it&#039;s not too surprising these results occurred but I was surprised at the accuracy of the averages. I will research limitations of these practices (or downfalls) and see what effects they may have on the digital world and it&#039;s users. I&#039;m guessing the advantages outweigh the negatives, but imagine there must be some. [[User:Brendanlong|Brendanlong]] 21:15, 20 March 2012 (UTC) @Brendanlong: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
That is very compelling evidence for group intelligence, but I see it play out in my own work.  I usually work in groups, and most decisions have to be taken by counsel and vote, because we’ve found it’s safer that way.  We’ve also noticed that when the group is together to discuss something, it is important to listen, to pay attention to opposing opinions, and that sometimes there is one person who has “bucked the tide” of the majority opinion, but that person turns out to be right.  We later realized that the majority had influenced itself so that each individual was not thinking for himself or herself.&lt;br /&gt;
Applied to the internet, the mathematics of the mean having a good chance to be right, makes sense, and because not everyone knows each other on the internet, and no one is looking at you, people might feel more free to express what they really think because they can be anonymous, avoiding the peer pressure effect.  The majority has a better chance to be right.[[User:Mike|Mike]] 21:46, 20 March 2012 (UTC) @Mike: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Finding knowledge through the collective crowd is an interesting question to pose given that there will usually be polarizing figures in any collective argument who will sway the &amp;quot;middle&amp;quot; (a group which should constitute the heavy majority of the crowd and which does not automatically invoke polarizing arguments) and which leads to mixed results much of the time (since they do not constitute anything more than a sophistication of passionate arguments). I agree with Sunstein that public debates and this polarization often leads to a distortion of the &amp;quot;middle&amp;quot; consensus (which is quite evident in the political sphere). The direction of constructive collective knowledge must come through a middle-of-the-road movement in which the polarized voices are either dampened in respect to their numbers, or received with a certain level of skepticism that comes with some challenge from the opposing side of the argument during its reception. Collective knowledge must only come from those who can separate a charismatic or loud argument from the polarized voices which can dictate the debate through techniques common to winning all types of debates...--[[User:Jimmyh|Jimmyh]] 00:20, 21 March 2012 (UTC) @Jimmyh: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The article, &amp;quot;The Wisdom of Crowds&#039;: Problem Solving Is a Team Sport&amp;quot;, painted an excellent picture of the contrast between certain views that crowds may have &amp;quot;mob mentality&amp;quot; or may be sources of true wisdom.  Crowdsourcing is clearly and excellent resource for gaining data, extracting innovative ideas and for engaging the public at large for collaborative projects. All of which may yield greater results than certain activities or projects performed in isolation. Others question, however, the limits of crowdsourcing regarding certain projects or sectors. Foreign policy and politics have become recent areas for debate as to whether crowd sourcing would be effective and reliable.  In certain instances, some argue that crowd sourcing would add great value in that the population, and not a select few, would influence policy and action.  In other instances, like those which require in depth knwoledge of highly sensitive data, others have argued that crowdsourcing may be unreliable because crowds may not have the level of understanding of complex issues.  Time will tell as to how our generation best harnesses the power of crowdsourcing so that it may be best utilized to provide reliable, effective input for policy. [[User:Cfleming27|Cfleming27]] 11:33, 28 March 2012 (UTC) @Cfleming27: [[User:Just Johnny|Just Johnny]] 01:24, 14 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Cybersecurity_and_Cyberwarfare&amp;diff=8711</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Cybersecurity_and_Cyberwarfare&amp;diff=8711"/>
		<updated>2012-05-14T05:16:33Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;May 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary] [http://www.chathamhouse.org/sites/default/files/public/Research/International%20Security/r1110_cyberwarfare.pdf]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Whitehouse.gov, [http://www.whitehouse.gov/cybersecurity Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review]&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]&lt;br /&gt;
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.]&lt;br /&gt;
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
May 1: Cybersecurity and Cyberwarfare&lt;br /&gt;
Alright, where did all my comments go ... ?&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:14, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Cybersecurity_and_Cyberwarfare&amp;diff=8710</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Cybersecurity_and_Cyberwarfare&amp;diff=8710"/>
		<updated>2012-05-14T05:05:04Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;May 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary] [http://www.chathamhouse.org/sites/default/files/public/Research/International%20Security/r1110_cyberwarfare.pdf]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Whitehouse.gov, [http://www.whitehouse.gov/cybersecurity Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review]&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]&lt;br /&gt;
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.]&lt;br /&gt;
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
May 1: Cybersecurity and Cyberwarfare&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:14, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8698</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8698"/>
		<updated>2012-05-09T08:14:55Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: BSK342&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Alternative Online Destinations: A Sample Review and Empirical Analysis.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Alternative_Online_Destinations_-_A_Sample_Review_and_Empirical_Analysis.pdf&lt;br /&gt;
[[User:BSK342|BSK342]] 14:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Stefan C&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Convergence of Social Media and Finance&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Assignment_4_Open_Finance_and_StockTwits_2%281%29.docx‎&lt;br /&gt;
[[User:Scheplick|Scheplick]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Abby Bergman&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Pinterest: Image Appropriation Norms&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Bergman_Pinterest_Final_Project.pdf‎&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:Aberg|Aberg]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samantha Zakuto&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Conduct Unbecoming: Four Case Studies on the Use of Facebook by Public Educators&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:SamanthaZakutoFinalProject.pdf&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 11:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Harvard212&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Believability: In Evolving Communication Dynamics&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/LSTUFinalSGunawan.pdf&lt;br /&gt;
--[[User:Harvard212|Harvard212]] 12:23EST, 8 May 2012&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Carl Fleming&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Khan Academy: Will Online Education Revolutionize (Or Simply Marginalize)&lt;br /&gt;
Education for Developing Nations&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Carl_Fleming_Final_Project.docx&lt;br /&gt;
--[[User:Cfleming27|Cfleming27]] 17:12, 6 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: James Harris  &lt;br /&gt;
Title: “Decentralization of Grassroots Movements in the Internet Age”   &lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2013/File:James_Harris_Final_Project_FINAL.pdf&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 13:01, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jeff Kimble&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Amazon Awaits Your Feedback&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/JK_Final_Paper2.docx [[User:JeffKimble|JeffKimble]] 22:32, 7 May 2012 (EDT&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Emanuele Dominici&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: America&#039;s Indirect Support of Terrorism: Jihadi Websites&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Emanuele_LSTU_E-120_Final_Paper.pdf&lt;br /&gt;
--[[User:Emanuele|Emanuele]] 07:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Alex Lloyd-Evans&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Social Structure and Hierarchy on the Cracked.com Writer’s Forums&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Alex_LE_Final_Paper.docx    Data Tables: http://cyber.law.harvard.edu/is2013/File:AlexLE_Research_Paper_Stats.xlsx  [[User:AlexLE|AlexLE]] 13:40, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Louis Celli&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Android Revolution - Will Consumers Continue to be Satisfied Living in a Box?&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Assignment_4_CELLI_Final.pdf&lt;br /&gt;
[[User:Louiscelli|Louiscelli]] 13:59, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Just Johnny&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Social Network: Growing Diversity - Architecture of social media and participation.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Just_Johnny_Final.pdf&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 04:01, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jennifer Lopez&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The New Era of Online Activism: Why The Future of Power Is Us&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_JenniferWLopez_FINAL_THESIS.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:JennLopez|JennLopez]] 14:56, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Manny Valerio&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Internet Fame&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Final_Project_Internet_Fame.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Mvalerio|Mvalerio]] 16:05, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Sharing and Collaboration on Pinterest&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/sites/is2013/images/Spring2012-Berkman-Assignment5-DitkowskyAlexis.doc &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 14:42, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Your Membership is: (ANONYMOUS)&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Thibodeau_Final_Project.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 16:08, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Christopher Mejo&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Online Education 411: Key Issues in Open Course Ware&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://ocw.drupalgardens.com/ &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:chrism|chrism]] 16:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Julia Brav&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Moderator Behavior on Ask MetaFilter&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:JBrav_LSTU_E-120_Final_Paper.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
(Please ignore all the extra uploads. Sorry!)&lt;br /&gt;
[[User:Jlynnping|Jlynnping]] 16:33, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Hope Solomon&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt;Twitter: How Local Leaders Reach Constituents &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Hope_Solomon_Final_1..pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Hds5|Hds5]] 16:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: Mike Brant&lt;br /&gt;
Title: Do Online Movements Really Move Youth Movements?&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2013/File:Mike_Brant_Are_Youth_Movements_Moved_by_Online_Communities_Final_Project.doc[[User:Mike|Mike]] 17:28, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Yerzhan Temirbulatov&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Takedown of Megaupload and endless war on piracy&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Yerzhan_TemirbulatovFINAL.docx&lt;br /&gt;
[[User:Erzhik|Erzhik]] 17:31, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;:   Gregorian Hawke &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;:  Twentymine: The Making of a Successful Gaming Computer &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;:   http://cyber.law.harvard.edu/is2013/File:Final_v1.0_%28-Gregorian%29.odt &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time&amp;lt;/b&amp;gt;: 22:00, May 8 2012 (EST)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: David Taber &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: BYO Coffee: Creating Space for Local Conversations on the World-Wide Web&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_project_draft.odt&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:David Taber|David Taber]] 22:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Brendan Long and Quynh Dang &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: Comparing Q&amp;amp;A Websites: WikiAnswers &amp;amp; Yahoo! Answers&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_Project_-_Long_and_Dang.doc&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 23:58, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Fabian Celis J &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: The Open University Online Community&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:FabianCelisJ_Final_Project_LSTU_E-120.pdf &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 00:11, 9 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8697</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8697"/>
		<updated>2012-05-09T08:03:47Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Just Johnny&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Social Network: Growing Diversity - Architecture of social media and participation.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Just_Johnny_Final.pdf&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 04:01, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: BSK342&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Alternative Online Destinations: A Sample Review and Empirical Analysis.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Alternative_Online_Destinations_-_A_Sample_Review_and_Empirical_Analysis.pdf&lt;br /&gt;
[[User:BSK342|BSK342]] 14:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Stefan C&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Convergence of Social Media and Finance&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Assignment_4_Open_Finance_and_StockTwits_2%281%29.docx‎&lt;br /&gt;
[[User:Scheplick|Scheplick]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Abby Bergman&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Pinterest: Image Appropriation Norms&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Bergman_Pinterest_Final_Project.pdf‎&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:Aberg|Aberg]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samantha Zakuto&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Conduct Unbecoming: Four Case Studies on the Use of Facebook by Public Educators&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:SamanthaZakutoFinalProject.pdf&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 11:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Harvard212&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Believability: In Evolving Communication Dynamics&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/LSTUFinalSGunawan.pdf&lt;br /&gt;
--[[User:Harvard212|Harvard212]] 12:23EST, 8 May 2012&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Carl Fleming&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Khan Academy: Will Online Education Revolutionize (Or Simply Marginalize)&lt;br /&gt;
Education for Developing Nations&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Carl_Fleming_Final_Project.docx&lt;br /&gt;
--[[User:Cfleming27|Cfleming27]] 17:12, 6 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: James Harris  &lt;br /&gt;
Title: “Decentralization of Grassroots Movements in the Internet Age”   &lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2013/File:James_Harris_Final_Project_FINAL.pdf&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 13:01, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jeff Kimble&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Amazon Awaits Your Feedback&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/JK_Final_Paper2.docx [[User:JeffKimble|JeffKimble]] 22:32, 7 May 2012 (EDT&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Emanuele Dominici&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: America&#039;s Indirect Support of Terrorism: Jihadi Websites&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Emanuele_LSTU_E-120_Final_Paper.pdf&lt;br /&gt;
--[[User:Emanuele|Emanuele]] 07:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Alex Lloyd-Evans&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Social Structure and Hierarchy on the Cracked.com Writer’s Forums&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Alex_LE_Final_Paper.docx    Data Tables: http://cyber.law.harvard.edu/is2013/File:AlexLE_Research_Paper_Stats.xlsx  [[User:AlexLE|AlexLE]] 13:40, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Louis Celli&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Android Revolution - Will Consumers Continue to be Satisfied Living in a Box?&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Assignment_4_CELLI_Final.pdf&lt;br /&gt;
[[User:Louiscelli|Louiscelli]] 13:59, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jennifer Lopez&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The New Era of Online Activism: Why The Future of Power Is Us&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_JenniferWLopez_FINAL_THESIS.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:JennLopez|JennLopez]] 14:56, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Manny Valerio&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Internet Fame&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Final_Project_Internet_Fame.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Mvalerio|Mvalerio]] 16:05, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Sharing and Collaboration on Pinterest&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/sites/is2013/images/Spring2012-Berkman-Assignment5-DitkowskyAlexis.doc &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 14:42, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Your Membership is: (ANONYMOUS)&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Thibodeau_Final_Project.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 16:08, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Christopher Mejo&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Online Education 411: Key Issues in Open Course Ware&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://ocw.drupalgardens.com/ &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:chrism|chrism]] 16:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Julia Brav&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Moderator Behavior on Ask MetaFilter&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:JBrav_LSTU_E-120_Final_Paper.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
(Please ignore all the extra uploads. Sorry!)&lt;br /&gt;
[[User:Jlynnping|Jlynnping]] 16:33, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Hope Solomon&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt;Twitter: How Local Leaders Reach Constituents &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Hope_Solomon_Final_1..pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Hds5|Hds5]] 16:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: Mike Brant&lt;br /&gt;
Title: Do Online Movements Really Move Youth Movements?&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2013/File:Mike_Brant_Are_Youth_Movements_Moved_by_Online_Communities_Final_Project.doc[[User:Mike|Mike]] 17:28, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Yerzhan Temirbulatov&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Takedown of Megaupload and endless war on piracy&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Yerzhan_TemirbulatovFINAL.docx&lt;br /&gt;
[[User:Erzhik|Erzhik]] 17:31, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;:   Gregorian Hawke &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;:  Twentymine: The Making of a Successful Gaming Computer &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;:   http://cyber.law.harvard.edu/is2013/File:Final_v1.0_%28-Gregorian%29.odt &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time&amp;lt;/b&amp;gt;: 22:00, May 8 2012 (EST)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: David Taber &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: BYO Coffee: Creating Space for Local Conversations on the World-Wide Web&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_project_draft.odt&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:David Taber|David Taber]] 22:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Brendan Long and Quynh Dang &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: Comparing Q&amp;amp;A Websites: WikiAnswers &amp;amp; Yahoo! Answers&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_Project_-_Long_and_Dang.doc&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 23:58, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Fabian Celis J &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: The Open University Online Community&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:FabianCelisJ_Final_Project_LSTU_E-120.pdf &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 00:11, 9 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8696</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8696"/>
		<updated>2012-05-09T08:03:24Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Just Johnny&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Growing Diversity - Architecture of social media and participation.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Just_Johnny_Final.pdf&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 04:01, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: BSK342&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Alternative Online Destinations: A Sample Review and Empirical Analysis.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Alternative_Online_Destinations_-_A_Sample_Review_and_Empirical_Analysis.pdf&lt;br /&gt;
[[User:BSK342|BSK342]] 14:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Stefan C&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Convergence of Social Media and Finance&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Assignment_4_Open_Finance_and_StockTwits_2%281%29.docx‎&lt;br /&gt;
[[User:Scheplick|Scheplick]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Abby Bergman&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Pinterest: Image Appropriation Norms&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Bergman_Pinterest_Final_Project.pdf‎&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:Aberg|Aberg]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samantha Zakuto&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Conduct Unbecoming: Four Case Studies on the Use of Facebook by Public Educators&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:SamanthaZakutoFinalProject.pdf&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 11:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Harvard212&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Believability: In Evolving Communication Dynamics&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/LSTUFinalSGunawan.pdf&lt;br /&gt;
--[[User:Harvard212|Harvard212]] 12:23EST, 8 May 2012&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Carl Fleming&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Khan Academy: Will Online Education Revolutionize (Or Simply Marginalize)&lt;br /&gt;
Education for Developing Nations&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Carl_Fleming_Final_Project.docx&lt;br /&gt;
--[[User:Cfleming27|Cfleming27]] 17:12, 6 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: James Harris  &lt;br /&gt;
Title: “Decentralization of Grassroots Movements in the Internet Age”   &lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2013/File:James_Harris_Final_Project_FINAL.pdf&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 13:01, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jeff Kimble&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Amazon Awaits Your Feedback&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/JK_Final_Paper2.docx [[User:JeffKimble|JeffKimble]] 22:32, 7 May 2012 (EDT&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Emanuele Dominici&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: America&#039;s Indirect Support of Terrorism: Jihadi Websites&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Emanuele_LSTU_E-120_Final_Paper.pdf&lt;br /&gt;
--[[User:Emanuele|Emanuele]] 07:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Alex Lloyd-Evans&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Social Structure and Hierarchy on the Cracked.com Writer’s Forums&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Alex_LE_Final_Paper.docx    Data Tables: http://cyber.law.harvard.edu/is2013/File:AlexLE_Research_Paper_Stats.xlsx  [[User:AlexLE|AlexLE]] 13:40, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Louis Celli&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Android Revolution - Will Consumers Continue to be Satisfied Living in a Box?&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Assignment_4_CELLI_Final.pdf&lt;br /&gt;
[[User:Louiscelli|Louiscelli]] 13:59, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jennifer Lopez&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The New Era of Online Activism: Why The Future of Power Is Us&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_JenniferWLopez_FINAL_THESIS.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:JennLopez|JennLopez]] 14:56, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Manny Valerio&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Internet Fame&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Final_Project_Internet_Fame.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Mvalerio|Mvalerio]] 16:05, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Sharing and Collaboration on Pinterest&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/sites/is2013/images/Spring2012-Berkman-Assignment5-DitkowskyAlexis.doc &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 14:42, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Your Membership is: (ANONYMOUS)&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Thibodeau_Final_Project.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 16:08, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Christopher Mejo&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Online Education 411: Key Issues in Open Course Ware&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://ocw.drupalgardens.com/ &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:chrism|chrism]] 16:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Julia Brav&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Moderator Behavior on Ask MetaFilter&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:JBrav_LSTU_E-120_Final_Paper.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
(Please ignore all the extra uploads. Sorry!)&lt;br /&gt;
[[User:Jlynnping|Jlynnping]] 16:33, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Hope Solomon&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt;Twitter: How Local Leaders Reach Constituents &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Hope_Solomon_Final_1..pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Hds5|Hds5]] 16:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: Mike Brant&lt;br /&gt;
Title: Do Online Movements Really Move Youth Movements?&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2013/File:Mike_Brant_Are_Youth_Movements_Moved_by_Online_Communities_Final_Project.doc[[User:Mike|Mike]] 17:28, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Yerzhan Temirbulatov&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Takedown of Megaupload and endless war on piracy&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Yerzhan_TemirbulatovFINAL.docx&lt;br /&gt;
[[User:Erzhik|Erzhik]] 17:31, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;:   Gregorian Hawke &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;:  Twentymine: The Making of a Successful Gaming Computer &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;:   http://cyber.law.harvard.edu/is2013/File:Final_v1.0_%28-Gregorian%29.odt &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time&amp;lt;/b&amp;gt;: 22:00, May 8 2012 (EST)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: David Taber &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: BYO Coffee: Creating Space for Local Conversations on the World-Wide Web&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_project_draft.odt&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:David Taber|David Taber]] 22:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Brendan Long and Quynh Dang &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: Comparing Q&amp;amp;A Websites: WikiAnswers &amp;amp; Yahoo! Answers&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_Project_-_Long_and_Dang.doc&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 23:58, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Fabian Celis J &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: The Open University Online Community&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:FabianCelisJ_Final_Project_LSTU_E-120.pdf &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 00:11, 9 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8695</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8695"/>
		<updated>2012-05-09T08:03:02Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Just Johnny&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Growing Diversity - Architecture of social media and participation.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Just_Johnny_Final.pdf&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 04:01, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: BSK342&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Alternative Online Destinations: A Sample Review and Empirical Analysis.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Alternative_Online_Destinations_-_A_Sample_Review_and_Empirical_Analysis.pdf&lt;br /&gt;
[[User:BSK342|BSK342]] 14:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Stefan C&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Convergence of Social Media and Finance&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Assignment_4_Open_Finance_and_StockTwits_2%281%29.docx‎&lt;br /&gt;
[[User:Scheplick|Scheplick]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Abby Bergman&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Pinterest: Image Appropriation Norms&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Bergman_Pinterest_Final_Project.pdf‎&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:Aberg|Aberg]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samantha Zakuto&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Conduct Unbecoming: Four Case Studies on the Use of Facebook by Public Educators&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:SamanthaZakutoFinalProject.pdf&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 11:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Harvard212&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Believability: In Evolving Communication Dynamics&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/LSTUFinalSGunawan.pdf&lt;br /&gt;
--[[User:Harvard212|Harvard212]] 12:23EST, 8 May 2012&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Carl Fleming&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Khan Academy: Will Online Education Revolutionize (Or Simply Marginalize)&lt;br /&gt;
Education for Developing Nations&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Carl_Fleming_Final_Project.docx&lt;br /&gt;
--[[User:Cfleming27|Cfleming27]] 17:12, 6 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: James Harris  &lt;br /&gt;
Title: “Decentralization of Grassroots Movements in the Internet Age”   &lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2013/File:James_Harris_Final_Project_FINAL.pdf&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 13:01, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jeff Kimble&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Amazon Awaits Your Feedback&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/JK_Final_Paper2.docx [[User:JeffKimble|JeffKimble]] 22:32, 7 May 2012 (EDT&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Emanuele Dominici&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: America&#039;s Indirect Support of Terrorism: Jihadi Websites&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Emanuele_LSTU_E-120_Final_Paper.pdf&lt;br /&gt;
--[[User:Emanuele|Emanuele]] 07:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Alex Lloyd-Evans&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Social Structure and Hierarchy on the Cracked.com Writer’s Forums&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Alex_LE_Final_Paper.docx    Data Tables: http://cyber.law.harvard.edu/is2013/File:AlexLE_Research_Paper_Stats.xlsx  [[User:AlexLE|AlexLE]] 13:40, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Louis Celli&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Android Revolution - Will Consumers Continue to be Satisfied Living in a Box?&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Assignment_4_CELLI_Final.pdf&lt;br /&gt;
[[User:Louiscelli|Louiscelli]] 13:59, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jennifer Lopez&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The New Era of Online Activism: Why The Future of Power Is Us&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_JenniferWLopez_FINAL_THESIS.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:JennLopez|JennLopez]] 14:56, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Manny Valerio&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Internet Fame&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Final_Project_Internet_Fame.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Mvalerio|Mvalerio]] 16:05, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Sharing and Collaboration on Pinterest&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/sites/is2013/images/Spring2012-Berkman-Assignment5-DitkowskyAlexis.doc &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 14:42, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Your Membership is: (ANONYMOUS)&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Thibodeau_Final_Project.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 16:08, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Christopher Mejo&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Online Education 411: Key Issues in Open Course Ware&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://ocw.drupalgardens.com/ &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:chrism|chrism]] 16:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Julia Brav&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Moderator Behavior on Ask MetaFilter&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:JBrav_LSTU_E-120_Final_Paper.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
(Please ignore all the extra uploads. Sorry!)&lt;br /&gt;
[[User:Jlynnping|Jlynnping]] 16:33, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Hope Solomon&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt;Twitter: How Local Leaders Reach Constituents &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Hope_Solomon_Final_1..pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Hds5|Hds5]] 16:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: Mike Brant&lt;br /&gt;
Title: Do Online Movements Really Move Youth Movements?&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2013/File:Mike_Brant_Are_Youth_Movements_Moved_by_Online_Communities_Final_Project.doc[[User:Mike|Mike]] 17:28, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Yerzhan Temirbulatov&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Takedown of Megaupload and endless war on piracy&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Yerzhan_TemirbulatovFINAL.docx&lt;br /&gt;
[[User:Erzhik|Erzhik]] 17:31, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;:   Gregorian Hawke &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;:  Twentymine: The Making of a Successful Gaming Computer &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;:   http://cyber.law.harvard.edu/is2013/File:Final_v1.0_%28-Gregorian%29.odt &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time&amp;lt;/b&amp;gt;: 22:00, May 8 2012 (EST)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: David Taber &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: BYO Coffee: Creating Space for Local Conversations on the World-Wide Web&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_project_draft.odt&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:David Taber|David Taber]] 22:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Brendan Long and Quynh Dang &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: Comparing Q&amp;amp;A Websites: WikiAnswers &amp;amp; Yahoo! Answers&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_Project_-_Long_and_Dang.doc&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 23:58, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Fabian Celis J &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: The Open University Online Community&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:FabianCelisJ_Final_Project_LSTU_E-120.pdf &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 00:11, 9 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8694</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8694"/>
		<updated>2012-05-09T08:02:34Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Just Johnny&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Growing Diversity - Architecture of social media and participation.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Just_Johnny_Final.pdf&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 04:01, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: BSK342&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Alternative Online Destinations: A Sample Review and Empirical Analysis.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Alternative_Online_Destinations_-_A_Sample_Review_and_Empirical_Analysis.pdf&lt;br /&gt;
[[User:BSK342|BSK342]] 14:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Stefan C&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Convergence of Social Media and Finance&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Assignment_4_Open_Finance_and_StockTwits_2%281%29.docx‎&lt;br /&gt;
[[User:Scheplick|Scheplick]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Abby Bergman&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Pinterest: Image Appropriation Norms&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Bergman_Pinterest_Final_Project.pdf‎&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:Aberg|Aberg]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samantha Zakuto&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Conduct Unbecoming: Four Case Studies on the Use of Facebook by Public Educators&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:SamanthaZakutoFinalProject.pdf&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 11:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Harvard212&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Believability: In Evolving Communication Dynamics&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/LSTUFinalSGunawan.pdf&lt;br /&gt;
--[[User:Harvard212|Harvard212]] 12:23EST, 8 May 2012&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Carl Fleming&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Khan Academy: Will Online Education Revolutionize (Or Simply Marginalize)&lt;br /&gt;
Education for Developing Nations&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Carl_Fleming_Final_Project.docx&lt;br /&gt;
--[[User:Cfleming27|Cfleming27]] 17:12, 6 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: James Harris  &lt;br /&gt;
Title: “Decentralization of Grassroots Movements in the Internet Age”   &lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2013/File:James_Harris_Final_Project_FINAL.pdf&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 13:01, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jeff Kimble&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Amazon Awaits Your Feedback&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/JK_Final_Paper2.docx [[User:JeffKimble|JeffKimble]] 22:32, 7 May 2012 (EDT&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Emanuele Dominici&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: America&#039;s Indirect Support of Terrorism: Jihadi Websites&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Emanuele_LSTU_E-120_Final_Paper.pdf&lt;br /&gt;
--[[User:Emanuele|Emanuele]] 07:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Alex Lloyd-Evans&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Social Structure and Hierarchy on the Cracked.com Writer’s Forums&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Alex_LE_Final_Paper.docx    Data Tables: http://cyber.law.harvard.edu/is2013/File:AlexLE_Research_Paper_Stats.xlsx  [[User:AlexLE|AlexLE]] 13:40, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Louis Celli&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Android Revolution - Will Consumers Continue to be Satisfied Living in a Box?&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Assignment_4_CELLI_Final.pdf&lt;br /&gt;
[[User:Louiscelli|Louiscelli]] 13:59, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jennifer Lopez&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The New Era of Online Activism: Why The Future of Power Is Us&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_JenniferWLopez_FINAL_THESIS.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:JennLopez|JennLopez]] 14:56, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Manny Valerio&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Internet Fame&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Final_Project_Internet_Fame.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Mvalerio|Mvalerio]] 16:05, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Sharing and Collaboration on Pinterest&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/sites/is2013/images/Spring2012-Berkman-Assignment5-DitkowskyAlexis.doc &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 14:42, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Your Membership is: (ANONYMOUS)&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Thibodeau_Final_Project.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 16:08, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Christopher Mejo&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Online Education 411: Key Issues in Open Course Ware&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://ocw.drupalgardens.com/ &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:chrism|chrism]] 16:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Julia Brav&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Moderator Behavior on Ask MetaFilter&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:JBrav_LSTU_E-120_Final_Paper.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
(Please ignore all the extra uploads. Sorry!)&lt;br /&gt;
[[User:Jlynnping|Jlynnping]] 16:33, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Hope Solomon&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt;Twitter: How Local Leaders Reach Constituents &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Hope_Solomon_Final_1..pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Hds5|Hds5]] 16:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: Mike Brant&lt;br /&gt;
Title: Do Online Movements Really Move Youth Movements?&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2013/File:Mike_Brant_Are_Youth_Movements_Moved_by_Online_Communities_Final_Project.doc[[User:Mike|Mike]] 17:28, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Yerzhan Temirbulatov&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Takedown of Megaupload and endless war on piracy&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Yerzhan_TemirbulatovFINAL.docx&lt;br /&gt;
[[User:Erzhik|Erzhik]] 17:31, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;:   Gregorian Hawke &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;:  Twentymine: The Making of a Successful Gaming Computer &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;:   http://cyber.law.harvard.edu/is2013/File:Final_v1.0_%28-Gregorian%29.odt &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time&amp;lt;/b&amp;gt;: 22:00, May 8 2012 (EST)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: David Taber &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: BYO Coffee: Creating Space for Local Conversations on the World-Wide Web&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_project_draft.odt&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:David Taber|David Taber]] 22:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Brendan Long and Quynh Dang &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: Comparing Q&amp;amp;A Websites: WikiAnswers &amp;amp; Yahoo! Answers&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_Project_-_Long_and_Dang.doc&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 23:58, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Fabian Celis J &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: The Open University Online Community&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:FabianCelisJ_Final_Project_LSTU_E-120.pdf &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 00:11, 9 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8692</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=8692"/>
		<updated>2012-05-09T08:01:37Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Just Johnny&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Growing Diversity - Architecture of social media and participation.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Alternative_Online_Destinations_-_A_Sample_Review_and_Empirical_Analysis.pdf&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 04:01, 9 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: BSK342&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Alternative Online Destinations: A Sample Review and Empirical Analysis.&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Alternative_Online_Destinations_-_A_Sample_Review_and_Empirical_Analysis.pdf&lt;br /&gt;
[[User:BSK342|BSK342]] 14:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Stefan C&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Convergence of Social Media and Finance&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Assignment_4_Open_Finance_and_StockTwits_2%281%29.docx‎&lt;br /&gt;
[[User:Scheplick|Scheplick]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Abby Bergman&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Pinterest: Image Appropriation Norms&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Bergman_Pinterest_Final_Project.pdf‎&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:Aberg|Aberg]] 17:11, 8 May 2012 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samantha Zakuto&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Conduct Unbecoming: Four Case Studies on the Use of Facebook by Public Educators&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:SamanthaZakutoFinalProject.pdf&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 11:35, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Harvard212&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Believability: In Evolving Communication Dynamics&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/LSTUFinalSGunawan.pdf&lt;br /&gt;
--[[User:Harvard212|Harvard212]] 12:23EST, 8 May 2012&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Carl Fleming&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Khan Academy: Will Online Education Revolutionize (Or Simply Marginalize)&lt;br /&gt;
Education for Developing Nations&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Carl_Fleming_Final_Project.docx&lt;br /&gt;
--[[User:Cfleming27|Cfleming27]] 17:12, 6 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: James Harris  &lt;br /&gt;
Title: “Decentralization of Grassroots Movements in the Internet Age”   &lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2013/File:James_Harris_Final_Project_FINAL.pdf&lt;br /&gt;
--[[User:Jimmyh|Jimmyh]] 13:01, 7 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jeff Kimble&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Amazon Awaits Your Feedback&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/sites/is2013/images/JK_Final_Paper2.docx [[User:JeffKimble|JeffKimble]] 22:32, 7 May 2012 (EDT&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Emanuele Dominici&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: America&#039;s Indirect Support of Terrorism: Jihadi Websites&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Emanuele_LSTU_E-120_Final_Paper.pdf&lt;br /&gt;
--[[User:Emanuele|Emanuele]] 07:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Alex Lloyd-Evans&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Social Structure and Hierarchy on the Cracked.com Writer’s Forums&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Alex_LE_Final_Paper.docx    Data Tables: http://cyber.law.harvard.edu/is2013/File:AlexLE_Research_Paper_Stats.xlsx  [[User:AlexLE|AlexLE]] 13:40, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Louis Celli&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The Android Revolution - Will Consumers Continue to be Satisfied Living in a Box?&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: Paper: http://cyber.law.harvard.edu/is2013/File:Assignment_4_CELLI_Final.pdf&lt;br /&gt;
[[User:Louiscelli|Louiscelli]] 13:59, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Jennifer Lopez&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: The New Era of Online Activism: Why The Future of Power Is Us&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_JenniferWLopez_FINAL_THESIS.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:JennLopez|JennLopez]] 14:56, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Manny Valerio&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Internet Fame&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Final_Project_Internet_Fame.pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Mvalerio|Mvalerio]] 16:05, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Alexis Ditkowsky&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Sharing and Collaboration on Pinterest&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/sites/is2013/images/Spring2012-Berkman-Assignment5-DitkowskyAlexis.doc &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Aditkowsky|Aditkowsky]] 14:42, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Your Membership is: (ANONYMOUS)&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Thibodeau_Final_Project.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 16:08, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Christopher Mejo&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Online Education 411: Key Issues in Open Course Ware&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://ocw.drupalgardens.com/ &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:chrism|chrism]] 16:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Julia Brav&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Moderator Behavior on Ask MetaFilter&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:JBrav_LSTU_E-120_Final_Paper.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
(Please ignore all the extra uploads. Sorry!)&lt;br /&gt;
[[User:Jlynnping|Jlynnping]] 16:33, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Hope Solomon&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt;Twitter: How Local Leaders Reach Constituents &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link:&amp;lt;/b&amp;gt; http://cyber.law.harvard.edu/is2013/File:Hope_Solomon_Final_1..pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Hds5|Hds5]] 16:51, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name: Mike Brant&lt;br /&gt;
Title: Do Online Movements Really Move Youth Movements?&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2013/File:Mike_Brant_Are_Youth_Movements_Moved_by_Online_Communities_Final_Project.doc[[User:Mike|Mike]] 17:28, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Yerzhan Temirbulatov&lt;br /&gt;
&#039;&#039;&#039;Title&#039;&#039;&#039;: Takedown of Megaupload and endless war on piracy&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/File:Yerzhan_TemirbulatovFINAL.docx&lt;br /&gt;
[[User:Erzhik|Erzhik]] 17:31, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;:   Gregorian Hawke &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;:  Twentymine: The Making of a Successful Gaming Computer &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;:   http://cyber.law.harvard.edu/is2013/File:Final_v1.0_%28-Gregorian%29.odt &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time&amp;lt;/b&amp;gt;: 22:00, May 8 2012 (EST)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: David Taber &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: BYO Coffee: Creating Space for Local Conversations on the World-Wide Web&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_project_draft.odt&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:David Taber|David Taber]] 22:11, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Brendan Long and Quynh Dang &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: Comparing Q&amp;amp;A Websites: WikiAnswers &amp;amp; Yahoo! Answers&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:Final_Project_-_Long_and_Dang.doc&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Brendanlong|Brendanlong]] 23:58, 8 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Name&amp;lt;/b&amp;gt;: Fabian Celis J &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt;: The Open University Online Community&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link&amp;lt;/b&amp;gt;: http://cyber.law.harvard.edu/is2013/File:FabianCelisJ_Final_Project_LSTU_E-120.pdf &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 00:11, 9 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8599</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8599"/>
		<updated>2012-05-07T16:35:10Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 1.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade.&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2013/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;b&amp;gt;Just Johnny&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;The Social Network&amp;lt;/i&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Final Project Extra Credit Assignment [http://cyber.law.harvard.edu/is2013/File:Just_Johnny_Extra_Credit_Assignment.pdf]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Final Project Link to website [http://harvardgovernment.com harvardgovernment.com]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Just Johnny|Just Johnny]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;/b&amp;gt;Stefan C. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Interview with StockTwits Executive Editor Philip Pearlman on Social Media and Finance &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Podcast on Sound Cloud [http://soundcloud.com/stocktwits/stefan-cheplick-and-philip]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Scheplick|Scheplick]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Blake Geno &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Employer use of Facebook: Legitimate Behavior or an Unacceptable Invasion? &amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present this in class, as a brief discussion with accompanying illustrations on power point. &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 23:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Fabian Celis &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; The Open University Online Community &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the Podcast:&amp;lt;/b&amp;gt; [http://archive.org/details/TheOpenUniversityOnlineCommunity]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 22:34, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Sab &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Free Online High-Quality Education: The Next Revolution on Internet? The Blue Ocean Strategy &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the screencast:&amp;lt;/b&amp;gt; [http://www.screenr.com/7EC8]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Sab|Sab]] 18:44, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Samantha Zakuto &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; A Turkish Teacher&#039;s Perspective to School Administrators Limiting Facebook Usage &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7cfjKSdV8hE&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 14:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Emanuele Dominici&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; America’s Aid to Terrorism: Supporting Jihadi Websites &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Extra Credit Link:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_Extra_Credit.pptx ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=Ppk9sGu-zf8&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Julia Brav&amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present my paper on May 8. I&#039;ll be discussing my paper by using visual examples of situations on AskMetaFilter. [[User:Jlynnping|Jlynnping]] 10:22, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Your Membership is:(ANONYMOUS)How Anonymous&#039; Organization Enables Its Philosophy&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7Oyb-9fKNAg]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 04:29, 2 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;You Hwa Hsiao&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Why do we need to say no to ACTA?&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video: [http://www.youtube.com/watch?v=Qu8P4JFrc_I&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:YHHsiao|YHHsiao]] 05:58, 3 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8598</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8598"/>
		<updated>2012-05-07T16:34:42Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 1.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade.&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2013/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;b&amp;gt;Just Johnny&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;The Social Network&amp;lt;/i&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Final Project Extra Credit Assignment [http://cyber.law.harvard.edu/is2013/File:Just_Johnny_Extra_Credit_Assignment.pdf]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Final Project Link to website [harvardgovernment.com http://harvardgovernment.com]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Just Johnny|Just Johnny]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;/b&amp;gt;Stefan C. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Interview with StockTwits Executive Editor Philip Pearlman on Social Media and Finance &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Podcast on Sound Cloud [http://soundcloud.com/stocktwits/stefan-cheplick-and-philip]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Scheplick|Scheplick]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Blake Geno &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Employer use of Facebook: Legitimate Behavior or an Unacceptable Invasion? &amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present this in class, as a brief discussion with accompanying illustrations on power point. &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 23:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Fabian Celis &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; The Open University Online Community &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the Podcast:&amp;lt;/b&amp;gt; [http://archive.org/details/TheOpenUniversityOnlineCommunity]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 22:34, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Sab &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Free Online High-Quality Education: The Next Revolution on Internet? The Blue Ocean Strategy &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the screencast:&amp;lt;/b&amp;gt; [http://www.screenr.com/7EC8]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Sab|Sab]] 18:44, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Samantha Zakuto &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; A Turkish Teacher&#039;s Perspective to School Administrators Limiting Facebook Usage &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7cfjKSdV8hE&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 14:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Emanuele Dominici&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; America’s Aid to Terrorism: Supporting Jihadi Websites &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Extra Credit Link:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_Extra_Credit.pptx ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=Ppk9sGu-zf8&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Julia Brav&amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present my paper on May 8. I&#039;ll be discussing my paper by using visual examples of situations on AskMetaFilter. [[User:Jlynnping|Jlynnping]] 10:22, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Your Membership is:(ANONYMOUS)How Anonymous&#039; Organization Enables Its Philosophy&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7Oyb-9fKNAg]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 04:29, 2 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;You Hwa Hsiao&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Why do we need to say no to ACTA?&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video: [http://www.youtube.com/watch?v=Qu8P4JFrc_I&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:YHHsiao|YHHsiao]] 05:58, 3 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8596</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8596"/>
		<updated>2012-05-07T16:21:59Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 1.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade.&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2013/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;b&amp;gt;Just Johnny&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;The Social Network&amp;lt;/i&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Final Project Extra Credit [http://cyber.law.harvard.edu/is2013/File:Just_Johnny_Extra_Credit_Assignment.pdf]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Final Project Link to website [http://harvardgovernment.com]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Just Johnny|Just Johnny]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;/b&amp;gt;Stefan C. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Interview with StockTwits Executive Editor Philip Pearlman on Social Media and Finance &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Podcast on Sound Cloud [http://soundcloud.com/stocktwits/stefan-cheplick-and-philip]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Scheplick|Scheplick]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Blake Geno &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Employer use of Facebook: Legitimate Behavior or an Unacceptable Invasion? &amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present this in class, as a brief discussion with accompanying illustrations on power point. &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 23:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Fabian Celis &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; The Open University Online Community &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the Podcast:&amp;lt;/b&amp;gt; [http://archive.org/details/TheOpenUniversityOnlineCommunity]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 22:34, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Sab &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Free Online High-Quality Education: The Next Revolution on Internet? The Blue Ocean Strategy &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the screencast:&amp;lt;/b&amp;gt; [http://www.screenr.com/7EC8]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Sab|Sab]] 18:44, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Samantha Zakuto &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; A Turkish Teacher&#039;s Perspective to School Administrators Limiting Facebook Usage &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7cfjKSdV8hE&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 14:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Emanuele Dominici&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; America’s Aid to Terrorism: Supporting Jihadi Websites &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Extra Credit Link:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_Extra_Credit.pptx ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=Ppk9sGu-zf8&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Julia Brav&amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present my paper on May 8. I&#039;ll be discussing my paper by using visual examples of situations on AskMetaFilter. [[User:Jlynnping|Jlynnping]] 10:22, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Your Membership is:(ANONYMOUS)How Anonymous&#039; Organization Enables Its Philosophy&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7Oyb-9fKNAg]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 04:29, 2 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;You Hwa Hsiao&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Why do we need to say no to ACTA?&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video: [http://www.youtube.com/watch?v=Qu8P4JFrc_I&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:YHHsiao|YHHsiao]] 05:58, 3 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8595</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8595"/>
		<updated>2012-05-07T16:21:22Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 1.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade.&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2013/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;b&amp;gt;Just Johnny&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;The Social Network&amp;lt;/i&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Final Project Extra Credit [http://cyber.law.harvard.edu/is2013/File:Just_Johnny_Extra_Credit_Assignment.pdf]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Final Project Link to website [http://harvardgovernment.com]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Just Johnny|Just Johnny]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;/b&amp;gt;Stefan C. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Interview with StockTwits Executive Editor Philip Pearlman on Social Media and Finance &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Podcast on Sound Cloud [http://soundcloud.com/stocktwits/stefan-cheplick-and-philip]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Scheplick|Scheplick]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Blake Geno &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Employer use of Facebook: Legitimate Behavior or an Unacceptable Invasion? &amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present this in class, as a brief discussion with accompanying illustrations on power point. &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 23:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Fabian Celis &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; The Open University Online Community &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the Podcast:&amp;lt;/b&amp;gt; [http://archive.org/details/TheOpenUniversityOnlineCommunity]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 22:34, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Sab &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Free Online High-Quality Education: The Next Revolution on Internet? The Blue Ocean Strategy &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the screencast:&amp;lt;/b&amp;gt; [http://www.screenr.com/7EC8]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Sab|Sab]] 18:44, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Samantha Zakuto &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; A Turkish Teacher&#039;s Perspective to School Administrators Limiting Facebook Usage &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7cfjKSdV8hE&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 14:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Emanuele Dominici&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; America’s Aid to Terrorism: Supporting Jihadi Websites &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Extra Credit Link:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_Extra_Credit.pptx ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=Ppk9sGu-zf8&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Julia Brav&amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present my paper on May 8. I&#039;ll be discussing my paper by using visual examples of situations on AskMetaFilter. [[User:Jlynnping|Jlynnping]] 10:22, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Your Membership is:(ANONYMOUS)How Anonymous&#039; Organization Enables Its Philosophy&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7Oyb-9fKNAg]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 04:29, 2 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;You Hwa Hsiao&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Why do we need to say no to ACTA?&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video: [http://www.youtube.com/watch?v=Qu8P4JFrc_I&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:YHHsiao|YHHsiao]] 05:58, 3 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8591</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8591"/>
		<updated>2012-05-03T23:11:33Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 1.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade.&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2013/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;b&amp;gt;Just Johnny&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;The Social Network&amp;lt;/i&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Final Project Extra Credit Link to website [http://www..com]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Just Johnny|Just Johnny]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;/b&amp;gt;Stefan C. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Interview with StockTwits Executive Editor Philip Pearlman on Social Media and Finance &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Podcast on Sound Cloud [http://soundcloud.com/stocktwits/stefan-cheplick-and-philip]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Scheplick|Scheplick]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Blake Geno &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Employer use of Facebook: Legitimate Behavior or an Unacceptable Invasion? &amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present this in class, as a brief discussion with accompanying illustrations on power point. &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 23:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Fabian Celis &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; The Open University Online Community &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the Podcast:&amp;lt;/b&amp;gt; [http://archive.org/details/TheOpenUniversityOnlineCommunity]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 22:34, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Sab &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Free Online High-Quality Education: The Next Revolution on Internet? The Blue Ocean Strategy &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the screencast:&amp;lt;/b&amp;gt; [http://www.screenr.com/7EC8]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Sab|Sab]] 18:44, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Samantha Zakuto &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; A Turkish Teacher&#039;s Perspective to School Administrators Limiting Facebook Usage &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7cfjKSdV8hE&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 14:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Emanuele Dominici&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; America’s Aid to Terrorism: Supporting Jihadi Websites &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Extra Credit Link:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_Extra_Credit.pptx ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=Ppk9sGu-zf8&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Julia Brav&amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present my paper on May 8. I&#039;ll be discussing my paper by using visual examples of situations on AskMetaFilter. [[User:Jlynnping|Jlynnping]] 10:22, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Your Membership is:(ANONYMOUS)How Anonymous&#039; Organization Enables Its Philosophy&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7Oyb-9fKNAg]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 04:29, 2 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;You Hwa Hsiao&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Why do we need to say no to ACTA?&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video: [http://www.youtube.com/watch?v=Qu8P4JFrc_I&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:YHHsiao|YHHsiao]] 05:58, 3 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8590</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8590"/>
		<updated>2012-05-03T23:10:17Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 1.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade.&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2013/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;b&amp;gt;Just Johnny&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;The Social Network&amp;lt;/i&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Final Project Extra Credit [http://www..com]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Just Johnny|Just Johnny]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;/b&amp;gt;Stefan C. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Interview with StockTwits Executive Editor Philip Pearlman on Social Media and Finance &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Podcast on Sound Cloud [http://soundcloud.com/stocktwits/stefan-cheplick-and-philip]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Scheplick|Scheplick]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Blake Geno &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Employer use of Facebook: Legitimate Behavior or an Unacceptable Invasion? &amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present this in class, as a brief discussion with accompanying illustrations on power point. &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 23:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Fabian Celis &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; The Open University Online Community &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the Podcast:&amp;lt;/b&amp;gt; [http://archive.org/details/TheOpenUniversityOnlineCommunity]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 22:34, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Sab &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Free Online High-Quality Education: The Next Revolution on Internet? The Blue Ocean Strategy &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the screencast:&amp;lt;/b&amp;gt; [http://www.screenr.com/7EC8]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Sab|Sab]] 18:44, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Samantha Zakuto &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; A Turkish Teacher&#039;s Perspective to School Administrators Limiting Facebook Usage &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7cfjKSdV8hE&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 14:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Emanuele Dominici&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; America’s Aid to Terrorism: Supporting Jihadi Websites &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Extra Credit Link:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_Extra_Credit.pptx ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=Ppk9sGu-zf8&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Julia Brav&amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present my paper on May 8. I&#039;ll be discussing my paper by using visual examples of situations on AskMetaFilter. [[User:Jlynnping|Jlynnping]] 10:22, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Your Membership is:(ANONYMOUS)How Anonymous&#039; Organization Enables Its Philosophy&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7Oyb-9fKNAg]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 04:29, 2 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;You Hwa Hsiao&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Why do we need to say no to ACTA?&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video: [http://www.youtube.com/watch?v=Qu8P4JFrc_I&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:YHHsiao|YHHsiao]] 05:58, 3 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8589</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8589"/>
		<updated>2012-05-03T23:09:40Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 1.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade.&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2013/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;b&amp;gt;Just Johnny&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; The Social Network &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;b&amp;gt;Final Project Extra Credit [http://www..com]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Just Johnny|Just Johnny]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;/b&amp;gt;Stefan C. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Interview with StockTwits Executive Editor Philip Pearlman on Social Media and Finance &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Podcast on Sound Cloud [http://soundcloud.com/stocktwits/stefan-cheplick-and-philip]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Scheplick|Scheplick]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Blake Geno &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Employer use of Facebook: Legitimate Behavior or an Unacceptable Invasion? &amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present this in class, as a brief discussion with accompanying illustrations on power point. &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 23:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Fabian Celis &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; The Open University Online Community &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the Podcast:&amp;lt;/b&amp;gt; [http://archive.org/details/TheOpenUniversityOnlineCommunity]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 22:34, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Sab &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Free Online High-Quality Education: The Next Revolution on Internet? The Blue Ocean Strategy &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the screencast:&amp;lt;/b&amp;gt; [http://www.screenr.com/7EC8]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Sab|Sab]] 18:44, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Samantha Zakuto &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; A Turkish Teacher&#039;s Perspective to School Administrators Limiting Facebook Usage &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7cfjKSdV8hE&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 14:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Emanuele Dominici&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; America’s Aid to Terrorism: Supporting Jihadi Websites &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Extra Credit Link:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_Extra_Credit.pptx ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=Ppk9sGu-zf8&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Julia Brav&amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present my paper on May 8. I&#039;ll be discussing my paper by using visual examples of situations on AskMetaFilter. [[User:Jlynnping|Jlynnping]] 10:22, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Your Membership is:(ANONYMOUS)How Anonymous&#039; Organization Enables Its Philosophy&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7Oyb-9fKNAg]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 04:29, 2 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;You Hwa Hsiao&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Why do we need to say no to ACTA?&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video: [http://www.youtube.com/watch?v=Qu8P4JFrc_I&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:YHHsiao|YHHsiao]] 05:58, 3 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8588</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=8588"/>
		<updated>2012-05-03T23:08:46Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 1.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade.&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2013/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;/b&amp;gt;Just Johnny&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; The Social Network &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Final Project Extra Credit [http://www..com]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name:&amp;lt;/b&amp;gt;Stefan C. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Interview with StockTwits Executive Editor Philip Pearlman on Social Media and Finance &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Podcast on Sound Cloud [http://soundcloud.com/stocktwits/stefan-cheplick-and-philip]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Scheplick|Scheplick]] 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Blake Geno &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Employer use of Facebook: Legitimate Behavior or an Unacceptable Invasion? &amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present this in class, as a brief discussion with accompanying illustrations on power point. &amp;lt;br&amp;gt;&lt;br /&gt;
[[User:BlakeGeno|BlakeGeno]] 23:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;Fabian Celis &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; The Open University Online Community &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the Podcast:&amp;lt;/b&amp;gt; [http://archive.org/details/TheOpenUniversityOnlineCommunity]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Fabiancelisj|Fabiancelisj]] 22:34, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Sab &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Free Online High-Quality Education: The Next Revolution on Internet? The Blue Ocean Strategy &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to the screencast:&amp;lt;/b&amp;gt; [http://www.screenr.com/7EC8]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Sab|Sab]] 18:44, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Samantha Zakuto &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; A Turkish Teacher&#039;s Perspective to School Administrators Limiting Facebook Usage &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7cfjKSdV8hE&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Szakuto|Szakuto]] 14:39, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Emanuele Dominici&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; America’s Aid to Terrorism: Supporting Jihadi Websites &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Extra Credit Link:&amp;lt;/b&amp;gt;[http://cyber.law.harvard.edu/is2013/File:LSTU_E-120_Extra_Credit.pptx ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=Ppk9sGu-zf8&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Julia Brav&amp;lt;br&amp;gt;&lt;br /&gt;
I would like to present my paper on May 8. I&#039;ll be discussing my paper by using visual examples of situations on AskMetaFilter. [[User:Jlynnping|Jlynnping]] 10:22, 1 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt; Nicholas Thibodeau &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Your Membership is:(ANONYMOUS)How Anonymous&#039; Organization Enables Its Philosophy&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video:&amp;lt;/b&amp;gt; [http://www.youtube.com/watch?v=7Oyb-9fKNAg]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Nthib|Nthib]] 04:29, 2 May 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Name:&amp;lt;/b&amp;gt;You Hwa Hsiao&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Project Title:&amp;lt;/b&amp;gt; Why do we need to say no to ACTA?&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Link to YouTube Video: [http://www.youtube.com/watch?v=Qu8P4JFrc_I&amp;amp;feature=youtu.be]&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:YHHsiao|YHHsiao]] 05:58, 3 May 2012 (EDT)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8550</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8550"/>
		<updated>2012-04-29T03:38:58Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, http://www.bodog.com which is a Canadian poker website.  See: http://www.michaelgeist.ca/content/view/6348/196/.  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... I wouldn&#039;t pull your leg. [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know, I respect freedom of expression.  Zittrain really nails this aspect of corporate responsibility, as this is becoming more of a central component with respect to the Internet.  Of course, when it comes to the Internet, we are beginning to see that corporations – and not really governments – are controlling consumers in a much broader and farther reaching scope than before.  So it is corporations that can transmit messages to consumers, by way of the media as well as through other means, sidestepping governments, to intimidate or control citizens to adhere to a social order.  So ethics plays a very large component in this, because the combination of a multitude of messages could constitute a violation of the law, as outlined in the quote above.  For example: “It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person.”  Now, if I am bombarded by a company through television, Internet adverts, email, phone calls, radio, and so on and so forth to do something, it could be grounds for harassment and damage claims.  [[User:Just Johnny|Just Johnny]] 23:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  I really think it comes down to pull.  Many of these countries, such as Egypt/Syria/Iran simply do not have the resources to compete with superpowers such as the United States, or emerging superpowers such as China, or Russia.  So, essentially, I think what it comes down to is whether or not these nations have the pull to compete.  What I think is interesting is how take downs are really going to work as laws adapt across the globe.  There is a lot of tug and pull from China, or Russia, for example.  So even if we have people in Egypt using Twitter, we are still going to have to deal with the authorities clamping down on people for posting a Tweet.  [[User:Just Johnny|Just Johnny]] 23:26, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  Interesting article.  I think that governments and corporations ideally try to cooperate.  Although, I still am not sure whether or not petitions actually make a difference – or, if they are like voting?  Anyways, always good to keep people engaged in the idea of the process – like starting a piggy bank for kids.  [[User:Just Johnny|Just Johnny]] 23:31, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg:  Interesting point about the tunneling.  I&#039;m sure there&#039;s a way for freedom to ring, even in China.  So it&#039;s good to know that users have that option.  I&#039;m sure much of the media is streamlined everywhere else in China, though.  So it is a very complicated situation when companies such as Google are providing information to repressive governments.  And somewhat dangerous.  [[User:Just Johnny|Just Johnny]] 23:36, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Mike:  Yes, it&#039;s true.  Everybody wants to rule the world.  [[User:Just Johnny|Just Johnny]] 23:38, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8549</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8549"/>
		<updated>2012-04-29T03:36:12Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, http://www.bodog.com which is a Canadian poker website.  See: http://www.michaelgeist.ca/content/view/6348/196/.  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... I wouldn&#039;t pull your leg. [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know, I respect freedom of expression.  Zittrain really nails this aspect of corporate responsibility, as this is becoming more of a central component with respect to the Internet.  Of course, when it comes to the Internet, we are beginning to see that corporations – and not really governments – are controlling consumers in a much broader and farther reaching scope than before.  So it is corporations that can transmit messages to consumers, by way of the media as well as through other means, sidestepping governments, to intimidate or control citizens to adhere to a social order.  So ethics plays a very large component in this, because the combination of a multitude of messages could constitute a violation of the law, as outlined in the quote above.  For example: “It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person.”  Now, if I am bombarded by a company through television, Internet adverts, email, phone calls, radio, and so on and so forth to do something, it could be grounds for harassment and damage claims.  [[User:Just Johnny|Just Johnny]] 23:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  I really think it comes down to pull.  Many of these countries, such as Egypt/Syria/Iran simply do not have the resources to compete with superpowers such as the United States, or emerging superpowers such as China, or Russia.  So, essentially, I think what it comes down to is whether or not these nations have the pull to compete.  What I think is interesting is how take downs are really going to work as laws adapt across the globe.  There is a lot of tug and pull from China, or Russia, for example.  So even if we have people in Egypt using Twitter, we are still going to have to deal with the authorities clamping down on people for posting a Tweet.  [[User:Just Johnny|Just Johnny]] 23:26, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  Interesting article.  I think that governments and corporations ideally try to cooperate.  Although, I still am not sure whether or not petitions actually make a difference – or, if they are like voting?  Anyways, always good to keep people engaged in the idea of the process – like starting a piggy bank for kids.  [[User:Just Johnny|Just Johnny]] 23:31, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg:  Interesting point about the tunneling.  I&#039;m sure there&#039;s a way for freedom to ring, even in China.  So it&#039;s good to know that users have that option.  I&#039;m sure much of the media is streamlined everywhere else in China, though.  So it is a very complicated situation when companies such as Google are providing information to repressive governments.  And somewhat dangerous.  [[User:Just Johnny|Just Johnny]] 23:36, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8548</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8548"/>
		<updated>2012-04-29T03:31:02Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, http://www.bodog.com which is a Canadian poker website.  See: http://www.michaelgeist.ca/content/view/6348/196/.  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... I wouldn&#039;t pull your leg. [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know, I respect freedom of expression.  Zittrain really nails this aspect of corporate responsibility, as this is becoming more of a central component with respect to the Internet.  Of course, when it comes to the Internet, we are beginning to see that corporations – and not really governments – are controlling consumers in a much broader and farther reaching scope than before.  So it is corporations that can transmit messages to consumers, by way of the media as well as through other means, sidestepping governments, to intimidate or control citizens to adhere to a social order.  So ethics plays a very large component in this, because the combination of a multitude of messages could constitute a violation of the law, as outlined in the quote above.  For example: “It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person.”  Now, if I am bombarded by a company through television, Internet adverts, email, phone calls, radio, and so on and so forth to do something, it could be grounds for harassment and damage claims.  [[User:Just Johnny|Just Johnny]] 23:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  I really think it comes down to pull.  Many of these countries, such as Egypt/Syria/Iran simply do not have the resources to compete with superpowers such as the United States, or emerging superpowers such as China, or Russia.  So, essentially, I think what it comes down to is whether or not these nations have the pull to compete.  What I think is interesting is how take downs are really going to work as laws adapt across the globe.  There is a lot of tug and pull from China, or Russia, for example.  So even if we have people in Egypt using Twitter, we are still going to have to deal with the authorities clamping down on people for posting a Tweet.  [[User:Just Johnny|Just Johnny]] 23:26, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  Interesting article.  I think that governments and corporations ideally try to cooperate.  Although, I still am not sure whether or not petitions actually make a difference – or, if they are like voting?  Anyways, always good to keep people engaged in the idea of the process – like starting a piggy bank for kids.  [[User:Just Johnny|Just Johnny]] 23:31, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8547</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8547"/>
		<updated>2012-04-29T03:26:44Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, http://www.bodog.com which is a Canadian poker website.  See: http://www.michaelgeist.ca/content/view/6348/196/.  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... I wouldn&#039;t pull your leg. [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know, I respect freedom of expression.  Zittrain really nails this aspect of corporate responsibility, as this is becoming more of a central component with respect to the Internet.  Of course, when it comes to the Internet, we are beginning to see that corporations – and not really governments – are controlling consumers in a much broader and farther reaching scope than before.  So it is corporations that can transmit messages to consumers, by way of the media as well as through other means, sidestepping governments, to intimidate or control citizens to adhere to a social order.  So ethics plays a very large component in this, because the combination of a multitude of messages could constitute a violation of the law, as outlined in the quote above.  For example: “It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person.”  Now, if I am bombarded by a company through television, Internet adverts, email, phone calls, radio, and so on and so forth to do something, it could be grounds for harassment and damage claims.  [[User:Just Johnny|Just Johnny]] 23:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  I really think it comes down to pull.  Many of these countries, such as Egypt/Syria/Iran simply do not have the resources to compete with superpowers such as the United States, or emerging superpowers such as China, or Russia.  So, essentially, I think what it comes down to is whether or not these nations have the pull to compete.  What I think is interesting is how take downs are really going to work as laws adapt across the globe.  There is a lot of tug and pull from China, or Russia, for example.  So even if we have people in Egypt using Twitter, we are still going to have to deal with the authorities clamping down on people for posting a Tweet.  [[User:Just Johnny|Just Johnny]] 23:26, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8546</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8546"/>
		<updated>2012-04-29T03:18:10Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, http://www.bodog.com which is a Canadian poker website.  See: http://www.michaelgeist.ca/content/view/6348/196/.  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... I wouldn&#039;t pull your leg. [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know, I respect freedom of expression.  Zittrain really nails this aspect of corporate responsibility, as this is becoming more of a central component with respect to the Internet.  Of course, when it comes to the Internet, we are beginning to see that corporations – and not really governments – are controlling consumers in a much broader and farther reaching scope than before.  So it is corporations that can transmit messages to consumers, by way of the media as well as through other means, sidestepping governments, to intimidate or control citizens to adhere to a social order.  So ethics plays a very large component in this, because the combination of a multitude of messages could constitute a violation of the law, as outlined in the quote above.  For example: “It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person.”  Now, if I am bombarded by a company through television, Internet adverts, email, phone calls, radio, and so on and so forth to do something, it could be grounds for harassment and damage claims.  [[User:Just Johnny|Just Johnny]] 23:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8545</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8545"/>
		<updated>2012-04-29T03:16:34Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, http://www.bodog.com which is a Canadian poker website.  See: http://www.michaelgeist.ca/content/view/6348/196/.  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... I wouldn&#039;t pull your leg. [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know, I respect freedom of expression.  Zittrain really nails this aspect of corporate responsibility, as this is becoming more of a central component with respect to the Internet.  Of course, when it comes to the Internet, we are beginning to see that corporations – and not really governments – are controlling consumers in a much broader and farther reaching scope than before.  So it is corporations that can transmit messages to consumers, by way of the media as well as through other means, sidestepping governments, to intimidate or control citizens to adhere to a social order.  So ethics plays a very large component in this, because the combination of a multitude of messages could constitute a violation of the law, as outlined in the quote above.  For example: “It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person.”  Now, if I am bombarded by a company through television, Internet adverts, email, phone calls, radio, and so on and so forth to do something, it could  be grounds for damage claims.  [[User:Just Johnny|Just Johnny]] 23:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8544</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8544"/>
		<updated>2012-04-29T03:01:47Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, http://www.bodog.com which is a Canadian poker website.  See: http://www.michaelgeist.ca/content/view/6348/196/.  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... I wouldn&#039;t pull your leg. [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8543</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8543"/>
		<updated>2012-04-29T03:00:45Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, bodog.com [http://www.bodog.com] which is a Canadian poker website.  See: http://www.michaelgeist.ca/content/view/6348/196/ [http://www.michaelgeist.ca/content/view/6348/196/]  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... I wouldn&#039;t pull your leg. [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8542</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8542"/>
		<updated>2012-04-29T02:59:34Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, bodog.com [bodog.com] which is a Canadian poker website.  See: [http://www.michaelgeist.ca/content/view/6348/196/]  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... I wouldn&#039;t pull your leg. [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8541</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8541"/>
		<updated>2012-04-29T01:32:05Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, bodog.com which is a Canadian poker website.  See: [http://www.michaelgeist.ca/content/view/6348/196/]  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... I wouldn&#039;t pull your leg. [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8540</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8540"/>
		<updated>2012-04-29T01:27:16Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, bodog.com which is a Canadian poker website.  See: [http://www.michaelgeist.ca/content/view/6348/196/]  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is no ordinary argument.  We&#039;re talking a b o u t a c o m m u n I c a t I o n b r e a k d o w n ... [[User:Just Johnny|Just Johnny]] 21:27, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8539</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8539"/>
		<updated>2012-04-29T01:18:33Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, bodog.com which is a Canadian poker website.  See: [http://www.michaelgeist.ca/content/view/6348/196/]  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… &#039;&#039;Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8538</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8538"/>
		<updated>2012-04-29T01:16:58Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, bodog.com which is a Canadian poker website.  See: [http://www.michaelgeist.ca/content/view/6348/196/]  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Emanuele:  As is clearly stated in the Viacom v. YouTube article: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;In the adolescence of the Internet, we are seeing complex business models that may combine Grokster-like purpose with other, ostensibly benign functionalities. Services seeking to capitalize on the draw of infringing goods may exhibit superficial respect for copyright concerns—by implementing a takedown program, for instance—yet rest secure in the knowledge that their users will continue to supply the content on which they depend in limitless quantities.&lt;br /&gt;
… Courts must resist the invitation to oversimplify reality by arbitrarily dividing the Internet world into “true pirates” and everyone else. Not every pirate is holed up in a garage, has a name ending in “-ster” or spells “wares” with a “z.” Some dress in expensive clothing and have MBAs. Courts need to sort through the facts without prejudging them, and beware pirates in disguise.&lt;br /&gt;
&#039;&#039;&lt;br /&gt;
So, I think that anonymity is somewhat possible on the Internet – even though IP addresses may be traceable, whoever is logging on can not always be verified.  However, when it comes to the content itself, there is always an option for discussion.  [[User:Just Johnny|Just Johnny]] 21:16, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8537</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8537"/>
		<updated>2012-04-29T01:07:37Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, bodog.com which is a Canadian poker website.  See: [http://www.michaelgeist.ca/content/view/6348/196/]  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  What is really interesting about Facebook, and other American websites is that they are part of a cultural language.  They are, in a sense, born to be free and wild.  They resonate as part of this cultural landscape.  So, the problem that many of these repressive governments have with them is that they are communicating this language.  Which, in turn affects culture directly.  So there is no doubt that repressive governments would want to stop users from gaining access to these websites from within these countries.  Social norms, in particular, are already beginning to shift in many regions as a result of social media.  However, as with laws, this is an organic process.  [[User:Just Johnny|Just Johnny]] 21:07, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8536</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8536"/>
		<updated>2012-04-29T01:00:17Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, bodog.com which is a Canadian poker website.  See: [http://www.michaelgeist.ca/content/view/6348/196/]  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  It is quite understandable that China is accustomed to Chinese websites.  There is the obvious reason of a language barrier for one thing.  Although, personally I prefer Facebook over Chinese websites.  To each their own, though.  I do think that engaging China in free-trade with the rest of the world is one way in which China can begin to be more free and open.  So it is a slow and eventual process.  And it a good thing.  So long as the lines of communication remain open, then social norms may be able to be shifted.  And this is all part of the evolving cultural landscape of the Internet.  As far as I know there is a way for Chinese to use Facebook, and other American websites.  So, hopefully as more people use them then these societies can be opened up in productive ways that perhaps repressive governments could not.  [[User:Just Johnny|Just Johnny]] 21:00, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8535</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8535"/>
		<updated>2012-04-28T18:43:56Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, bodog.com which is a Canadian poker website.  See: [http://www.michaelgeist.ca/content/view/6348/196/]  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  Then all we&#039;ve got to really worry about is corruption of governments.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8534</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8534"/>
		<updated>2012-04-28T18:41:10Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, bodog.com which is a Canadian poker website.  See: [http://www.michaelgeist.ca/content/view/6348/196/]  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8533</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=8533"/>
		<updated>2012-04-28T18:33:52Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2013/sites/is2013/images/IS2012-04-10.pdf Slides (PDF)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control Roberts et al. Evolving Landscape of Internet Control]&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf Jill York, Policing Content in the Quasi-public Sphere]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability_Limitation_Act DMCA 512 - the safe harbor provision]&lt;br /&gt;
* [https://www.eff.org/takedowns EFF&#039;s Hall of Shame]&lt;br /&gt;
* [http://www.copyhype.com/2012/04/viacom-v-youtube-the-second-circuits-decision/ Copyhype on Viacom v. YouTube: The Second Circuit’s Decision]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 10: Internet and Democracy: The Sequel&lt;br /&gt;
&lt;br /&gt;
The DMCA does seem like a great way for websites to remain in business, while also allowing for a reasonable amount of growth to sustain in the information technology universe.  For example, many websites would not even grow to the scale in which they now exist without some kind of protection to continue to operate.  If YouTube was being sued left and right before it ever became popular, then the site would have been shut down and the world would never have been able to have witnessed … YouTube.  In this regard the DMCA is great.  However, it is not perfect from protecting websites from legal action.  It is more like a handshake, or a general rule that can be bent.  Nevertheless, at least it is something.  Looking at it from another aspect, it is quite easy to abuse the DMCA.  For example, anyone who wishes to report some kind of copyright infringement may do so very easily, causing many problems.  Look at https://www.eff.org/takedowns.  So, there is massive potential for abuse, or things like blackmail/extortion to occur.  Many of these DMCA conditions are quite uncertain.  The knowledge aspect is stipulation, as is willful blindness.  Leaving users to control their own material is one way to protect the website – however, and then there is the storage aspect.  Even if users have control of their own material, because the content is being stored on the website could be arguable for a lawsuit.  So, there really doesn’t seem to be any real way to protect a website from being sued.  If anything, the DMCA does allow for some leeway in overseeing operation.  This allows websites to function without being taken down in a crude way.  [[User:Just Johnny|Just Johnny]] 17:12, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is interesting is not so much the difference between democratic and non democratic treatment of the information coming from Internet but the way democratic countries tries to deal with democratic values and non democratic thought coming from Internet. The difference between France and US is interesting regarding the Yahoo case about nazi websites. I have always though that to preserve democratie and republic, non democratic ou republicann ideas should be forbiden. Exactly like in non democratic countries where ideas that defend democatry are forbidden. Internet does not changer this order. &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 20:31, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Sab: Interesting that you mention the differences between democratic and non-democratic nations, as you put it.  Mind you, democracy is a fleeting concept.  Even in so called democratic nations, the use of the internet is being regulated in ways that could be construed as borderline non-democratic ideology.  Regulations, as we see in the &amp;lt;u&amp;gt;Evolving Landscape of Internet Control&amp;lt;/u&amp;gt;[http://cyber.law.harvard.edu/publications/2011/Evolving_Landscape_Internet_Control] are shifting in ways that are separating traditional democratic values with near totalitarian substitution.  For example, this notion of “local” and the enforcement and surveillance of the local is a challenging concept.  Still, it comes down to the fact that you want me to pay you for what?  Sure, civil unrest must be prevented in order to maintain the democratic process.  However, many corporations are pushing to change social norms and laws.  Unblemished and happy people should not be ignored, or automatically thrown under the bus on the journey of continual progress amid the information superhighway.  [[User:Just Johnny|Just Johnny]] 05:53, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was surprised by the numbers from the &amp;quot;Evolving Landscape...&amp;quot; reading as far as how normal people use the internet in restrictive countries.  We tend to think of the internet as this powerful tool to access multicultural views and information, especially if you live in a censorious society.  This neglects the fact that around 80% of the websites I use/read/visit commonly are based out of the U.S., and 99% are English-language, so why would that be substantially different for someone from China?  Part of our assumption that this resource is so valuable is that people would want to read the same info we are, because it is presumably the best (and to be fair it at least quite often is, as far as the areas it actually covers).  But that often is not the info most relevant to those readers.&lt;br /&gt;
&lt;br /&gt;
The shockingly low % (1% at a guess by the reading) of people in China, for example, who are using circumvention tools makes a lot more sense when you realize that internal Chinese sites like youku fill the vast majority of their internet needs, and that specifically Chinese concepts and constructs like microblogging avoid censors through a much more realistic approach to political censorship for the average internet user there.  This is troubling in light of the conclusion that censoring technologies may now be outstripping circumvention technologies/abilities of average internet users to avoid censorship/attack/tracking.  The solution of aggressively empowering a small group of activists, who would then spread messages through the local networks, seems to me to be a good one.  It does place those activists at even more risk by further singling them out though, and obviously detracts from the crowd-sourcing type benefits that are at the heart of the internet&#039;s value.&lt;br /&gt;
&lt;br /&gt;
I&#039;m looking forward to discussing in class the balance of an international company&#039;s responsibility to its shareholders to create profit and remain competitive v. its responsibility to its original nation&#039;s norms/laws/etc. v. its responsibility to to an international &amp;quot;human rights&amp;quot; type code for the internet, regardless of where it comes from or where it&#039;s serving.  &lt;br /&gt;
&lt;br /&gt;
There are always arguments to be made for profit above all else, and what if trying too hard to be moral lowers your profits to where an 100% immoral (in relation to these internet issues) company corners the market? Then your idealism ruined you AND actively hurt online rights, since you left the door open for someone far worse than yourself to control that chunk of the web. [[User:AlexLE|AlexLE]] 17:03, 9 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  You know, it never seems to amaze me how ignorant people can be of other cultures.  There is a lot going on out there in the world.  What becomes difficult about globalization is agreeing on and then enforcing a one world government.  Should the FBI be able to take down any .com domain?  While the United States does have a lot of influence and control over the Internet, there is a bit of a power struggle going on between other countries and regions.  Russia, China, and Europe, for example.  China&#039;s circumvention tools are particular to the government and laws in China.  Although, I do not think many American&#039;s would be in agreement with China enforcing a take down of, say, Facebook from within the United States.  But, that is exactly what the FBI is doing with websites that are based out of the country using .com domains.  Take, for instance, bodog.com which is a Canadian poker website.  [[http://www.michaelgeist.ca/content/view/6348/196/]]  The FBI took down bodog.com – so, the company was forced to move to a .ca domain.  So, perhaps this trend will continue as websites are forced to become more local to their region.  That way local governments can enforce laws as applicable to that particular website and domain.  [[User:Just Johnny|Just Johnny]] 14:33, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the reading The Evolving Landscape of Internet Control I agree with AlexLE that the numbers are astonishing. Besides the statistics that AlexLE already mentioned, I found it very interesting the case that China’s most effective form of Internet control has been not only shutting out foreign sites but mainly within China. The three reasons exposed there (aggressive blockage, high quality of Chinese websites and linguistic reasons, and pride and desire to use local products) make sense to me, and I really like the comparison between China and Russia about their ASNs and IP addresses, because it shows the level of control that each country has. Although compared to Russia it seems that China has a vast major control over the Internet, Russia has other types of exerting control, including the offline one, which is the particular Russia’s type of control.  &lt;br /&gt;
&lt;br /&gt;
I also felt dismayed with the more or less conclusion that the Governments are winning the battle in exerting control over the usage of the Internet. Nonetheless, I like the recommendations that the Berkman Center’s offers to promote open Internet and freedom of speech. I think one of these recommendations mirrors the success of the Kony2012 campaign, because when it says “focus on circumvention tools for activists” it means to me that if we want to win the battle we need to seek hubs, like in the Kony2012 campaign.[[User:Fabiancelisj|Fabiancelisj]] 20:03, 10 April 2012 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is interesting this week to learn about the different technologies and measures the government takes to control the internet and the circumvention tools people take to by-pass filtering and blockage. Internet control is manageable in certain countries such as China and Russia due to the effectiveness of DDoS attacks and personal attacks that leave people fear retribution for speaking up against the government, and due to the challenges of circumvention tools, such as lack of access and language barrier.&lt;br /&gt;
I also find it interesting that Facebook’s approach to online policing is through user reporting of spam and blocking. I agree that it is difficult to bring Facebook’s content elsewhere since it is so comprehensive and generative, because its platform contains sharing images and videos, groups, and social-networking. In a way, it is a combination of Flikr, YouTube, and Twitter, which I personally so addictive.[[User:Qdang|Qdang]] 18:22, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first article for this week’s class was concise yet powerful and true. The internet has definitely become a very important battlefield and it can become a powerful weapon if used in certain ways. We can simply think of the number of people who read newspapers these days compared to blogs, forums and other online discussion boards where information can be, and it is very often, distorted. Other than this, the article was very useful for understanding  political implications concerning the use of the internet, especially the ones that take place in Countries where freedom of speech is often denied by dictatorial governments.  The Zittrain/Palfrey article was very interesting especially when depicting a hypothetical yet realistic situation at the beginning. For us westerners it is very hard to imagine what it would be like to be censored for futile reasons, or be controlled by governments and even be at risk of incarceration for writing something so harmless but fundamental like “democracy” in China.  The third article was also very interesting and I personally could identify myself only with Facebook because I don’t use any other social network. What has been said is true but I believe that it can be very easy to avoid detection on Facebook if something against the rules were to take place. As the article has already said, anonymity is a very common practice on Facebook and I personally think that the Facebook staff doesn’t really spend that much time searching for irregularities, especially since they have created the “flag” option where users become a sort of citizen watch to report violations themselves. The ONI blog revealed some very attention-grabbing news about the internet but my attention was directed to the headline regarding CISPA and how people think it will become a new SOPA or PIPA. I have personally read the entire bill and I don’t think it can be considered similar at all. There have been a number of emails sent around the internet asking to sign a petition against CISPA for a series of reasons which turn out to be completely untrue, therefore one can really understand how emails, blogs and other internet tools can provide misinformation and make people believe something that isn’t true. I agree on the creation of the Safe Harbor Provision but I still think that ISPs or OSPs should also be vigilant 24/7 on what material is posted on their sites and take adequate countermeasures to stop illegal activity without waiting to actually be caught by the government or law enforcement agencies. The hall of shame was perhaps the most interesting website this week because it shows something which I am writing about in my research paper for this class and that is: Shaming ISPs in an attempt to stop illegal activities. The Viacom v. YouTube case was and still is very interesting. At first the court ruled in favor of YouTube but during the appeal it seems that both Viacom and YouTube can consider themselves victorious even though both losing something. It will be very interesting to see what happens next to this important case. [[User:Emanuele|Emanuele]] 10:47, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found an interesting article on the ONI Blog titled &amp;quot;Iran Plans to Implement &#039;Clean Internet&#039; by August 2012.&amp;quot;  That article summarizes, essentially, how the Ministry of Information and Communications Technology in Iran plans to soon &amp;quot;install an Intranet that will block Gmail, Facebook, and many other websites in attempts to create a &#039;clean Internet&#039;.&amp;quot;  Some have named this an &amp;quot;electronic curtain.&amp;quot;  In lieu of the aforementioned popular western Internet tools, the government will instead replace them with Iran Mail and Iran Search Engine. I just found it fascinating that such a large scale crackdown on western internet tools would be carried out and implemented so quickly.  It appears as if they are targeting a 5 month timeframe for completion. [[User:Cfleming27|Cfleming27]] 10:52, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
The readings raise frightful questions about internet censorship that almost certainly will never be resolved if we expect corporations to “regulate” themselves and establish a code of ethics as Ziittrain and Palfrey explore.  The whole core belief of the free market is that all corporations enjoy benefits and focus solely on profits, meaning that profits generated through ethical sacrifices will be a leading problem unless, as was suggested, the United Nations becomes involved or countries conform. &lt;br /&gt;
&lt;br /&gt;
From the ONI website, the Iranian censorship campaign is quite disturbing. Yet many countries of the world have strong business ties with this regime and therefore outside pressures to encourage free speech are essentially a moot point. &lt;br /&gt;
&lt;br /&gt;
The Arizona law mentioned on the ONI website is particularly troubling because of its ambiguous language.  The controversial heart of the bill reads as follows (http://articles.cnn.com/2012-04-04/tech/tech_web_internet-trolls-arizona-law_1_bill-internet-trolls-hateful-comments?_s=PM:TECH):&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
While threats and intimidation may fall into the category of bullying, such broad language raises concerns on how law enforcement can, in fact, outwardly censor the internet at their own discretion. I don’t think you have to be a civil libertarian to find the ambiguity of this bill to be troubling.--[[User:Jimmyh|Jimmyh]] 16:34, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fascinating stuff in all of the articles and blog site. Very interesting how China uses 4 chokepoints to filter 240m IP addresses versus Russia&#039;s use of 19 for 30 million. Makes sense to see the more authoritarian country the less that seems to be required. In Russia which is seen as democratic there appears to be more effort required to censor/filter the public (youth groups, hacking). Regarding workaround tools, I would simply be afraid to even USE one in a country like China out of fear of being detected and violating law. With Iran looking to completely cut itself from the world come August, will be interesting to see what the reaction is from the public. &lt;br /&gt;
Regarding companies doing international business, I see the other half of the coin (even though disturbing). I can understand how a company like Google censors information for the people of China because it&#039;s services are just an extension of offline information that was regulated in the same way. The troublesome part is handing over data which leads to arrests and other &amp;quot;human rights violations&amp;quot; as we Americans see it (per the article). I think there needs to be responsibility by the party using the service and knowing when trying to circumvent the service or use it for locally known laws that there can be some persecution. Ethics go both ways when following the law. I&#039;d like to know how countries like Egypt/Syria/Iran compare to China in terms of authoritarianism/&amp;quot;human rights&amp;quot; violations against it&#039;s people. Looking forward to discussion and any input on this board. [[User:Brendanlong|Brendanlong]] 18:03, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great readings this week especially the latest with the Viacom/YT ruling. Thought this was pretty relevant for this week&#039;s discussion.  Also received a petition notice about it in my inbox: [[http://truthfrequencynews.com/mpaa-chairman-chris-dodd-wants-to-resurrect-sopa-confirms-secret-negotiations/ Dodd Wants To Resurrect SOPA]][[User:JennLopez|JennLopez]] 22:28, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
Until this week&#039;s readings, I didn&#039;t realize how much the &amp;quot;playing field&amp;quot; had changed in the area of online censorship and circumvention. When I visited China for a month in late 2010, I primarily stayed in Yunnan province (generally in the NW). One of the hostels I stayed at was run by a westerner who &amp;quot;tunneled&amp;quot; in super fast internet from Hong Kong (that&#039;s what he told us, anyways). I could easily and quickly access various social media sites and the web content appeared unfiltered. Most other internet connections I used while in China were SO slow, I guess because of all the filtering/censoring. Typically, I couldn&#039;t access Facebook or Blogger unless I used one of these &amp;quot;tunneled&amp;quot; connections, although I could use the Facebook app on my iPhone! While in Cairo a couple weeks prior to the protests in Tahrir square, I had no trouble accessing Blogger or Facebook. This has probably changed in light of Arab Spring, though. I imagine that a comparison of authoritarian countries would produce varied differences in cyber control, presumably having to do with how some of these countries&#039; cyber censorship fluctuates depending on events at home. I&#039;m sure China will implement even more austere measures this fall in anticipation of protests during the CCP&#039;s once in a decade regime change.&lt;br /&gt;
&lt;br /&gt;
I am also alarmed at how willingly (according to the OpenNet article) companies like Google and Skype give information to repressive authorities. I wonder what could be done about this. It&#039;s a very complicated situation and I don&#039;t know enough about it to make a legitimate judgment.  [[User:Aberg|Aberg]] 19:48, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Aberg I was also in China not long ago and noticed the difference in Internet speed and what sites you were able to access depending on what location you were logging in from. After the readings for this week I will be more aware of what information I access or post during international travel. --[[User:Hds5|Hds5]] 21:06, 10 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
In response to Corporate Ethic on a Filtered Internet, I feel that this whole subject raises even deeper questions, which are only mirrored in the internet conflict.  Some nation states are more peaceful than others.  Some are more aggressive.  Some feel they should intervene in other nations’ affairs.  Some feel they shouldn’t.  Governments don’t seem to always be looking out for the best interests of their people, but rather just seek to keep a certain group of people in power.  Some corporations are coming to hold more real power and influence than traditional nation states and their governments.  Through it all, many people are still oppressed, abused, neglected, or manipulated.  What we see in a struggle for internet control reflects these broader struggles.  Can overarching laws in the true interests of human beings, in general, be constructed and enforced?  What international bodies, if any, could be appropriate to outline such laws and enforce them?  It would seem we need more internationally agreed upon codes of conduct, in general, but it seems beyond human grasp.  If there were an overarching international organism to regulate things like internet, might we just be making a new “Frankenstein” with yet more power, potentially useful for the wrong purposes?  These are farther reaching questions, but ones that I see coming up, as we proceed down this road of internet ethics.[[User:Mike|Mike]] 05:45, 12 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8532</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8532"/>
		<updated>2012-04-28T18:04:32Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  Let&#039;s also remember DSK at the IMF was also used very close to this.  So it&#039;s a technique that works, but shouldn&#039;t be overused because the public may catch on.  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Sure, soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about a well funded, and well organized military force.  It is somewhat similar to letting everyone know that there is a guard standing on the street with a gun.  If the patrol man is armed and is doing his/her job, then who cares if everyone knows that they are standing there in public.  But, this is really just silly.  Now, lets talk about the end of two wars.  Just keep that number in mind.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is also part of the reason why I am skeptical about this case.  The impact is far reaching and much too fast to have been orchestrated by merely five individuals.  Although revolutionary, I think there is something more behind this.  It is just far too large.  However, as I stated before, I am not even going to bother decompressing the misinformation that is out there.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Erzhik:  No data is ever secure.  Interesting that you bring up this question of corporate versus government.  Whereas Amazon is more secure, government websites are seemingly easier to break into.  And yes I also believe that it should be the other way around.  Although, I am a bit skeptical of the whole thing altogether.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  This is interesting that you mention social norms on the Internet.  And I think that this is a really important point.  When it comes to the on-line world, do we really see the same kind of norms applying as we see in the real world?  Maybe not so much.  At least not in as relatively as a consistent way as we see in the real world.  However, also interesting is the real world implications and realizations of these data streams.  WikiLeaks spawned the Arab Spring?  Maybe.  Maybe not.  Did it spawn Occupy Wall Street?  Maybe.  Maybe not.  However, what we are witnessing is a definite shift in collective decision making.  What does concern me is this ECPA nonsense.  Now if the FBI wants into your account, perhaps it should also be the other way around.  The public should have access to those FBI files as well.  So, I too am looking forward to the lectures.  [[User:Just Johnny|Just Johnny]] 00:49, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Aditkowsky:  I&#039;m sure it is different around the globe.  However, in the case of WikiLeaks we see that there are ways around things.  For instance, even though Julian Assange was in Europe his Swiss bank account was revoked.  I&#039;m sure that had something to do with international pressure.  Again, we are seeing the convergence between on-line and off-line worlds.  So, I really think that this is interesting.  I remember a few years ago there was an American journalist in North Korea who was detained who was eventually released.  So, I agree that journalists do need to be protected.  [[User:Just Johnny|Just Johnny]] 00:52, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Mike:  These are some interesting questions.  When I can&#039;t sleep, here&#039;s what I usually do: I turn the pillow over.  It&#039;s a winner every time.  I am looking forward to class to see what Saint Rob has to say about the WikiLeaks case.  [[User:Just Johnny|Just Johnny]] 00:57, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8531</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8531"/>
		<updated>2012-04-28T05:16:32Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about one of the most powerful military forces on the planet.  Now, lets talk about the end of two wars.  Just keep that number in mind.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is also part of the reason why I am skeptical about this case.  The impact is far reaching and much too fast to have been orchestrated by merely five individuals.  Although revolutionary, I think there is something more behind this.  It is just far too large.  However, as I stated before, I am not even going to bother decompressing the misinformation that is out there.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Erzhik:  No data is ever secure.  Interesting that you bring up this question of corporate versus government.  Whereas Amazon is more secure, government websites are seemingly easier to break into.  And yes I also believe that it should be the other way around.  Although, I am a bit skeptical of the whole thing altogether.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  This is interesting that you mention social norms on the Internet.  And I think that this is a really important point.  When it comes to the on-line world, do we really see the same kind of norms applying as we see in the real world?  Maybe not so much.  At least not in as relatively as a consistent way as we see in the real world.  However, also interesting is the real world implications and realizations of these data streams.  WikiLeaks spawned the Arab Spring?  Maybe.  Maybe not.  Did it spawn Occupy Wall Street?  Maybe.  Maybe not.  However, what we are witnessing is a definite shift in collective decision making.  What does concern me is this ECPA nonsense.  Now if the FBI wants into your account, perhaps it should also be the other way around.  The public should have access to those FBI files as well.  So, I too am looking forward to the lectures.  [[User:Just Johnny|Just Johnny]] 00:49, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Aditkowsky:  I&#039;m sure it is different around the globe.  However, in the case of WikiLeaks we see that there are ways around things.  For instance, even though Julian Assange was in Europe his Swiss bank account was revoked.  I&#039;m sure that had something to do with international pressure.  Again, we are seeing the convergence between on-line and off-line worlds.  So, I really think that this is interesting.  I remember a few years ago there was an American journalist in North Korea who was detained who was eventually released.  So, I agree that journalists do need to be protected.  [[User:Just Johnny|Just Johnny]] 00:52, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Mike:  These are some interesting questions.  When I can&#039;t sleep, here&#039;s what I usually do: I turn the pillow over.  It&#039;s a winner every time.  I am looking forward to class to see what Saint Rob has to say about the WikiLeaks case.  [[User:Just Johnny|Just Johnny]] 00:57, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8530</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8530"/>
		<updated>2012-04-28T05:15:42Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about one of the most powerful military forces on the planet.  Now, lets talk about the end of two wars.  Just keep that number in mind.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is also part of the reason why I am skeptical about this case.  The impact is far reaching and much too fast to have been orchestrated by merely five individuals.  Although revolutionary, I think there is something more behind this.  It is just far too large.  However, as I stated before, I am not even going to bother decompressing the misinformation that is out there.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Erzhik:  No data is ever secure.  Interesting that you bring up this question of corporate versus government.  Whereas Amazon is more secure, government websites are seemingly easier to break into.  And yes I also believe that it should be the other way around.  Although, I am a bit skeptical of the whole thing altogether.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  This is interesting that you mention social norms on the Internet.  And I think that this is a really important point.  When it comes to the on-line world, do we really see the same kind of norms applying as we see in the real world?  Maybe not so much.  At least not in as relatively as a consistent way as we see in the real world.  However, also interesting is the real world implications and realizations of these data streams.  WikiLeaks spawned the Arab Spring?  Maybe.  Maybe not.  Did it spawn Occupy Wall Street?  Maybe.  Maybe not.  However, what we are witnessing is a definite shift in collective decision making.  What does concern me is this ECPA nonsense.  Now if the FBI wants into your account, perhaps it should also be the other way around.  The public should have access to those FBI files as well.  So, I too am looking forward to the lectures.  [[User:Just Johnny|Just Johnny]] 00:49, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Aditkowsky:  I&#039;m sure it is different around the globe.  However, in the case of WikiLeaks we see that there are ways around things.  For instance, even though Julian Assange was in Europe his Swiss bank account was revoked.  I&#039;m sure that had something to do with international pressure.  Again, we are seeing the convergence between on-line and off-line worlds.  So, I really think that this is interesting.  I remember a few years ago there was an American journalist in North Korea who was detained who was eventually released.  So, I agree that journalists do need to be protected.  [[User:Just Johnny|Just Johnny]] 00:52, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Mike:  These are some interesting questions.  I am looking forward to class to see what Saint Rob has to say about the WikiLeaks case.  When I can&#039;t sleep, here&#039;s what I usually do: I turn the pillow over.  It&#039;s a winner every time.  [[User:Just Johnny|Just Johnny]] 00:57, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=8529</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=8529"/>
		<updated>2012-04-28T05:01:10Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Just Johnny|Assignment 4: Rough Draft|http://cyber.law.harvard.edu/is2013/Image:Just_Johnny_Assignment_4_Draft_1.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In this paper, Brandon skillfully guides a detailed tour of open source licenses. The composition&#039;s robust structure ably contains the fine points of the subject matter. There is enough information here for several projects. One possible new work would be a more generalized overview of open source licenses for the layman. Even in the paper&#039;s current format, a summary table comparing the basic aspects of the individual licenses would be useful. --[[User:SCL|SCL]] 18:07, 1 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your excellent advice! I have incorporated a visual representation of license content into the next draft.[[User:BrandonAndrzej|BrandonAndrzej]] 01:25, 2 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 3.0:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v3.0.doc&lt;br /&gt;
Theoretical framework is up; barring any major errors, this should be the final draft of the long form version - now I have to condense it into 10 pages... suggestions very much appreciated!&lt;br /&gt;
&lt;br /&gt;
Brandon A. Cernaowicz&lt;br /&gt;
Final Draft (long version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses.doc&lt;br /&gt;
This is the completed long version. Abridged version to follow shortly.&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 1.0 (short version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28short%29_v1.0.doc&lt;br /&gt;
This is a rough draft of the abridged version. The sourcing needs to be completely redone. (Also still a little long...)[[User:BrandonAndrzej|BrandonAndrzej]] 18:31, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 1.1 (short)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28short%29_v1.1.doc&lt;br /&gt;
Sourcing fixed. This should be the final product, barring any feedback. &lt;br /&gt;
- [[User:BrandonAndrzej|BrandonAndrzej]] 23:18, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
-- Brandon, sorry had fully intended to give your paper a comprehensive read, just couldn&#039;t find the time. Best of luck in you travels! --[[User:Gclinch|Gclinch]] 21:31, 10 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf   Internet infiltration to Nigeria:  burden of cyber-crime to e-commerce]&lt;br /&gt;
&lt;br /&gt;
Onyema, this is a very interesting topic, but I would suggest for an academic paper you need to footnote in your paper information you have found from third party sources.  Although you have original ideas, it gives  your paper credibility to cite third party information you have used to develop the conclusions in your paper. [[[[User:Sjennings|sjennings]] 16:39, 5 May 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Onyema , All in all very interesting paper.  May I suggest that you elaborate about the problems you refer to when you say, “SAT3 submarine cable system that is connecting Africa to India( of which both have had a significant problems).” Do you mean technology, social, political …? I suggest you be more explicit which will help as you lay out your arguments later in the paper. &lt;br /&gt;
&lt;br /&gt;
Also, I saw a typo in your title, “The role National Law is plying.” I think you want “Playing.”&lt;br /&gt;
&lt;br /&gt;
Thanks for the early preview. --[[User:Gclinch|Gclinch]] 20:17, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Guy&lt;br /&gt;
Title: The Transition to Next Generation 9-1-1 in North America &lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28draft_May_6%29.pdf Link:]&lt;br /&gt;
Note: I am still working on my conclusions and I need to clean up endnotes, references etc.. I&#039;ll appreciate any comments. Thanks TGIF! --[[User:Gclinch|Gclinch]] 23:17, 6 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Getting closer. [http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28draft_May_7%29.pdf Click here for May 7] version of my paper. &lt;br /&gt;
Good Luck everybody. --[[User:Gclinch|Gclinch]] 20:17, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
-- Guy: Of negligable importance, I know, but don&#039;t you find the roman numerals to be a bit unwieldy? - [[User:BrandonAndrzej|BrandonAndrzej]] 23:23, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
--Brandon. Thank you. Yes. A friend of mine likes to say that, “if you want to seem smart, use Latin in your presentations.”  ;- ) Not so in footnote numbering, they are just a pain. I&#039;ve switched to regular numerals and improved my paper. Thanks! --[[User:Gclinch|Gclinch]] 19:32, 8 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I found the use of visuals very helpful, but the detail about the survey responses to individual questions made the paper long.  I know it helps support your point, but I did find it distracting.  Very interesting information which I felt motivated to share with my family.  Also great in class presentation.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:06, 9 May 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
-- Susan, thank you for your suggestion and compliment. I have taken your advice and lightened up the research section before submitting my final draft. --[[User:Gclinch|Gclinch]] 03:11, 9 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Guy: this is really a great paper. Looks so professional! Few minor minor things:&lt;br /&gt;
-pg 4 typo: under &amp;quot;Current State&amp;quot; section, first sentence&amp;quot;...one answers at to one&amp;quot; unless i&#039;m reading that wrong.&lt;br /&gt;
-pgs 5-6 and 9: inconsistent with footnote format, some are before parenthesis and periods, and others are after. [[User:Myra|Myra]] 20:25, 9 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Myra&#039;s Draft--I know we&#039;re down to the 11th hour, but any feedback would be greatly appreciated! Thx in advance:http://cyber.law.harvard.edu/is2011/Image:Garza.M._5.Draft.doc&lt;br /&gt;
[[User:Myra|Myra]] 20:25, 9 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
@Myra: Funny, and entertaining project.  Fantastic.  So are you saying that people who use the internet are nerds?  [[User:Just Johnny|Just Johnny]] 06:30, 16 April 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
-- Hi Myra, Thank you for the help with my paper. I got a chance to look at your paper this morning. Sorry I couldn’t get to it sooner (busy day at work yesterday).  Very interesting material presented in an informative way. Just a couple of suggestions: I’ve heard from Alex a couple of style points. One is that the profs are looking for 10 pages of double spaced text. I know that this is a bit of &amp;quot;do as I say, not as I do,&amp;quot; since (excluding graphics) my paper is about 15 pages of text, but you may want to consider thinking about any information in the text that could be summarized or moved to the foot/end notes (I took Susan’s great suggestion on this topic and improved the readability from one of my earlier drafts). Also you may want to reformat to double spaced text. One other suggestion is that in sections such as the one that begins with, “For example, one contributor, Brandy, was …” you may want to present the items that follow in a bulleted list. This will make the information easier to digest and make some of the lengthier paragraphs a little easier on the reader. Thanks for sharing your paper. It’s a topic I haven’t thought much about since I was younger. I knew many friends and acquaintances who would have benefitted from this type of social support when I was in my teens and twenties had this existed at that time. Best of luck! --[[User:Gclinch|Gclinch]] 11:12, 10 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Excellent--thanks so much, Guy! I will gladly take your advice about the formatting, etc. Good luck as well! :) [[User:Myra|Myra]] 12:17, 10 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mike Brant&lt;br /&gt;
Assignment 4 Rough Draft&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/Image:Mike_Brant_Assignment_4_Rough_Draft.doc[[User:Mike|Mike]] 08:14, 18 April 2012 (UTC)&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8528</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8528"/>
		<updated>2012-04-28T04:57:08Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about one of the most powerful military forces on the planet.  Now, lets talk about the end of two wars.  Just keep that number in mind.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is also part of the reason why I am skeptical about this case.  The impact is far reaching and much too fast to have been orchestrated by merely five individuals.  Although revolutionary, I think there is something more behind this.  It is just far too large.  However, as I stated before, I am not even going to bother decompressing the misinformation that is out there.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Erzhik:  No data is ever secure.  Interesting that you bring up this question of corporate versus government.  Whereas Amazon is more secure, government websites are seemingly easier to break into.  And yes I also believe that it should be the other way around.  Although, I am a bit skeptical of the whole thing altogether.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  This is interesting that you mention social norms on the Internet.  And I think that this is a really important point.  When it comes to the on-line world, do we really see the same kind of norms applying as we see in the real world?  Maybe not so much.  At least not in as relatively as a consistent way as we see in the real world.  However, also interesting is the real world implications and realizations of these data streams.  WikiLeaks spawned the Arab Spring?  Maybe.  Maybe not.  Did it spawn Occupy Wall Street?  Maybe.  Maybe not.  However, what we are witnessing is a definite shift in collective decision making.  What does concern me is this ECPA nonsense.  Now if the FBI wants into your account, perhaps it should also be the other way around.  The public should have access to those FBI files as well.  So, I too am looking forward to the lectures.  [[User:Just Johnny|Just Johnny]] 00:49, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Aditkowsky:  I&#039;m sure it is different around the globe.  However, in the case of WikiLeaks we see that there are ways around things.  For instance, even though Julian Assange was in Europe his Swiss bank account was revoked.  I&#039;m sure that had something to do with international pressure.  Again, we are seeing the convergence between on-line and off-line worlds.  So, I really think that this is interesting.  I remember a few years ago there was an American journalist in North Korea who was detained who was eventually released.  So, I agree that journalists do need to be protected.  [[User:Just Johnny|Just Johnny]] 00:52, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Mike:  These are some interesting questions.  I am looking forward to class to see what Saint Rob has to say about the WikiLeaks case.  [[User:Just Johnny|Just Johnny]] 00:57, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8527</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8527"/>
		<updated>2012-04-28T04:52:52Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about one of the most powerful military forces on the planet.  Now, lets talk about the end of two wars.  Just keep that number in mind.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is also part of the reason why I am skeptical about this case.  The impact is far reaching and much too fast to have been orchestrated by merely five individuals.  Although revolutionary, I think there is something more behind this.  It is just far too large.  However, as I stated before, I am not even going to bother decompressing the misinformation that is out there.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Erzhik:  No data is ever secure.  Interesting that you bring up this question of corporate versus government.  Whereas Amazon is more secure, government websites are seemingly easier to break into.  And yes I also believe that it should be the other way around.  Although, I am a bit skeptical of the whole thing altogether.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  This is interesting that you mention social norms on the Internet.  And I think that this is a really important point.  When it comes to the on-line world, do we really see the same kind of norms applying as we see in the real world?  Maybe not so much.  At least not in as relatively as a consistent way as we see in the real world.  However, also interesting is the real world implications and realizations of these data streams.  WikiLeaks spawned the Arab Spring?  Maybe.  Maybe not.  Did it spawn Occupy Wall Street?  Maybe.  Maybe not.  However, what we are witnessing is a definite shift in collective decision making.  What does concern me is this ECPA nonsense.  Now if the FBI wants into your account, perhaps it should also be the other way around.  The public should have access to those FBI files as well.  So, I too am looking forward to the lectures.  [[User:Just Johnny|Just Johnny]] 00:49, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Aditkowsky:  I&#039;m sure it is different around the globe.  However, in the case of WikiLeaks we see that there are ways around things.  For instance, even though Julian Assange was in Europe his Swiss bank account was revoked.  I&#039;m sure that had something to do with international pressure.  Again, we are seeing the convergence between on-line and off-line worlds.  So, I really think that this is interesting.  I remember a few years ago there was an American journalist in North Korea who was detained who was eventually released.  So, I agree that journalists do need to be protected.  [[User:Just Johnny|Just Johnny]] 00:52, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8526</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8526"/>
		<updated>2012-04-28T04:49:11Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about one of the most powerful military forces on the planet.  Now, lets talk about the end of two wars.  Just keep that number in mind.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is also part of the reason why I am skeptical about this case.  The impact is far reaching and much too fast to have been orchestrated by merely five individuals.  Although revolutionary, I think there is something more behind this.  It is just far too large.  However, as I stated before, I am not even going to bother decompressing the misinformation that is out there.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Erzhik:  No data is ever secure.  Interesting that you bring up this question of corporate versus government.  Whereas Amazon is more secure, government websites are seemingly easier to break into.  And yes I also believe that it should be the other way around.  Although, I am a bit skeptical of the whole thing altogether.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Fabiancelisj:  This is interesting that you mention social norms on the Internet.  And I think that this is a really important point.  When it comes to the on-line world, do we really see the same kind of norms applying as we see in the real world?  Maybe not so much.  At least not in as relatively as a consistent way as we see in the real world.  However, also interesting is the real world implications and realizations of these data streams.  WikiLeaks spawned the Arab Spring?  Maybe.  Maybe not.  Did it spawn Occupy Wall Street?  Maybe.  Maybe not.  However, what we are witnessing is a definite shift in collective decision making.  What does concern me is this ECPA nonsense.  Now if the FBI wants into your account, perhaps it should also be the other way around.  The public should have access to those FBI files as well.  So, I too am looking forward to the lectures.  [[User:Just Johnny|Just Johnny]] 00:49, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8525</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8525"/>
		<updated>2012-04-28T04:28:11Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about one of the most powerful military forces on the planet.  Now, lets talk about the end of two wars.  Just keep that number in mind.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Cfleming27:  This is also part of the reason why I am skeptical about this case.  The impact is far reaching and much too fast to have been orchestrated by merely five individuals.  Although revolutionary, I think there is something more behind this.  It is just far too large.  However, as I stated before, I am not even going to bother decompressing the misinformation that is out there.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Erzhik:  No data is ever secure.  Interesting that you bring up this question of corporate versus government.  Whereas Amazon is more secure, government websites are seemingly easier to break into.  And yes I also believe that it should be the other way around.  Although, I am a bit skeptical of the whole thing altogether.  [[User:Just Johnny|Just Johnny]] 00:28, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8524</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8524"/>
		<updated>2012-04-28T04:18:18Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about one of the most powerful military forces on the planet.  Now, lets talk about the end of two wars.  Just keep that number in mind.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8523</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8523"/>
		<updated>2012-04-28T04:17:14Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about one of the most powerful military forces on the planet.  Now, lets talk about the end of two wars.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8522</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8522"/>
		<updated>2012-04-28T04:16:20Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about one of the most powerful military forces on the planet.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8521</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8521"/>
		<updated>2012-04-28T04:14:44Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Hds5:  You know, this is very interesting to think that this could be a Hollywood movie.  However, how much damage was actually done by the information revealed?  Soldiers could have been put in danger.  But, let&#039;s be realistic for a moment.  Really?  Come on.  Do you really expect anyone to believe this?  We are talking about one of the most powerful military forces on the planet.  Give me a break.  [[User:Just Johnny|Just Johnny]] 00:14, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8520</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8520"/>
		<updated>2012-04-28T04:09:09Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Brendanlong:  His character is very much reminiscent of the commonwealth.  Outwardly, there is an air of engagement, openness, and old world class regalement.  In terms of appearances, it seems as though there is a sense that nations must do more to become better than what they are doing.  I really think we need to look at the bigger picture, though.  Especially when we are discussing 9/11 and the Iraq/Afghanistan wars.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang:  Good question.  You know, I am not going to delve too much into this, because I could probably end up writing a book at this point about it.  However, I will state that there is a lot of misinformation out there.  I am not completely sold on all of it either.  I am a bit skeptical.  Usually when I see something, my first response is always:  why is this here, or why am I seeing this?  So, I have to get past that initial question first.  Usually, I am quite skeptical of the media.  Everything I see on television, for instance, I see as placed there for a specific purpose that sometimes I am not always aware of at that point in time.  However, later on I begin to piece things together.  So, we shall probably see in this instance regarding WikiLeaks.  As is stated in the reading, the information was released to the public by anonymous leaks.  So, I don&#039;t necessarily think that WikiLeaks is responsible for the information necessarily.  At least no more so than the New York Times or the Guardian would be for not revealing its sources.  [[User:Just Johnny|Just Johnny]] 00:09, 28 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8519</id>
		<title>The Wikileaks Case</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Wikileaks_Case&amp;diff=8519"/>
		<updated>2012-04-28T03:56:22Z</updated>

		<summary type="html">&lt;p&gt;Just Johnny: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;April 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will address many of the issues surrounding the Wikileaks case.  We will explore the technical, legal, regulatory, ethical and normative elements of the events leading up to and following the massive leak of US government documents made available via Wikileaks. The case touches upon and exemplifies many of the concepts and questions that are presented in the course and will offers us the opportunity to reflect, refine and consolidate the changes and challenges of digital media.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2013/sites/is2013/images/TheWikiLeaksIncident.pdf Case Study: The Wikileaks Incident]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
April 24: The Wikileaks Case&lt;br /&gt;
&lt;br /&gt;
Invariably when we speak about the Internet and we speak about globalization then we should also speak about freedom of the press – and, in this instance WikiLeaks.  &lt;br /&gt;
&lt;br /&gt;
So, how should we view WikiLeaks?  Is it a benefit, or a detriment to democratic societies around the globe?  &lt;br /&gt;
&lt;br /&gt;
When I think about the world we live in today, everything started from an idea.  The United States, for example, started from an idea.  That idea grew into what we now see as modern day America.  &lt;br /&gt;
&lt;br /&gt;
So, can WikiLeaks change the world?  Perhaps it can.  Everything has to start from an idea.  &lt;br /&gt;
&lt;br /&gt;
Yet, it is globalization already in motion.  &lt;br /&gt;
&lt;br /&gt;
So, there are many things that we have covered in this course that apply towards WikiLeaks.  Freedom of the press is one of them.  Although, WikiLeaks has certainly raised the bar for whistler blower organizations beyond anything before or since it was introduced.  &lt;br /&gt;
&lt;br /&gt;
While WikiLeaks may be rather harsh in revealing data about the wild west, readers should also keep in mind the notion of freedom of the press.  With this we should mention that the press has a responsibility of keeping governments in line.  Part of this is helping to make governments to become more accountable as well as open in free societies.  It is kind of an archaic concept to consider the thought that anything would have to be made private or confidential in a governmental organization.  Otherwise, what are they doing that they must hide?  &lt;br /&gt;
&lt;br /&gt;
We must also include the notion of globalization in recent world history.  While corporations are becoming more powerful, they are increasingly sidestepping governments in this move towards a more global marketplace.  &lt;br /&gt;
&lt;br /&gt;
One of the arguments is that the U.S. data is private and confidential.  Whereas, an argument would state that governments not only need to be more transparent but that they should also be more accountable.  So, WikiLeaks is a step forward in terms of worldwide progress.  &lt;br /&gt;
&lt;br /&gt;
Is WikiLeaks anti-American, or will it take down the United States?  Probably not.  Nor do I think it is meant to, more so than to add to the general climate of globalization already in progress.  &lt;br /&gt;
&lt;br /&gt;
If people were telepathic, then they would not need the press.  However, empathy for one another is something which allows people to feel more connected.  &lt;br /&gt;
&lt;br /&gt;
So, it should also be noted that whistle blower organizations are there as an important part of any democratic society to keep governments in check.  &lt;br /&gt;
&lt;br /&gt;
Although they do need better protection.  &lt;br /&gt;
&lt;br /&gt;
So, there is this question of government trustworthiness.  We see an almost too obvious framing of Julian Assange.  I will not delve into the complexity of misinformation surrounding WikiLeaks.  However, the magic of this technique is that it works 100% of the time, every time.  Call it operation “you might as well face it you&#039;re addicted to love.”  So, does this make us trust government less or more?  &lt;br /&gt;
&lt;br /&gt;
What is perhaps interesting of all is that right after WikiLeaks released the data, the end of the Iraq and Afghanistan wars followed within months.  &lt;br /&gt;
&lt;br /&gt;
[[User:Just Johnny|Just Johnny]] 17:13, 15 February 2012 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have enjoyed reading this case. I did not know about the all thing,letters,etc. It is interesting to queston abouut which model is the best perfect free information or controlled or totally kept secret. For Assange, the only limit seems to be the life of people involved. However, the question further : in what are they involved. Is the cause fair? And then comes a moral judgement, non objective and maybe dangerous. &lt;br /&gt;
&lt;br /&gt;
The other question is: Is the disclosure very interesting for most of the human being on earth? Does that really matter? &lt;br /&gt;
&lt;br /&gt;
--[[User:Sab|Sab]] 15:38, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Sab:  I would have to say that Mr. Assange is a rather perfect candidate to be a front man for WikiLeaks.  He has everything one would need for the aesthetic.  He is the front man for a reason.  Just as Mark Zuckerberg is the front man for Facebook.  I do not think it would work with anyone of another temperament.  The very success of the project depends largely on the face of the project.  So, Assange fits the part.  Aside from this, the personal letters are a nice touch which adds to the dimension of the character that is Julian Assange.  He is very much on par with a presidential candidate in a United States election.  Or, a Knight at a round table maintaining composure amidst a crowd of hecklers.  [[User:Just Johnny|Just Johnny]] 23:18, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fascinating reading, really looking forward to our discussion in class.  Also great to see a step-by-step description of the chain of events that took place and tying in Anonymous&#039; efforts of pro-wikileaks internet activism especially in the case of Aaron Barr/HB Gary Federal.  Brutal! On a side note, noticed Anonymous publicly posting a decompiled research copy of the Stuxnet virus was discussed.  I&#039;m sure many of you might have already seen/heard of the following story on 60 Minutes however, thought it was quite intriguing and will post here for you all to review [[http://www.cbsnews.com/video/watch/?id=7400904n&amp;amp;tag=mncol;lst;10 Stuxnet: Computer Worm Opens New Era of Warfare]][[User:JennLopez|JennLopez]] 12:19, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@JennLopez:  The interesting thing about Anonymous is that it is just that.  Whereas, WikiLeaks has a face and a name that can be attacked.  Very brave of Mr. Assange.  Although, as I stated earlier I am not going to get into decompiling the mass of disinformation that surrounds WikiLeaks.  Needless to say, it is brutal – whatever is going on behind the scenes.  Again, we are seeing the convergence of on-line and off-line worlds.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The WikiLeaks case gained my immediate attention the day it started publishing secret material and therefore reading about it again is still fascinating in my opinion. I choose to look at the WIkiLeaks case in two different ways: on one side it is amazing how so much top secret information concerning the entire world was able to be publicly shared, and the entire legal process with its jurisdictional problems following the release of such information, and on the other side the incompetence on America’s part in giving access to top secret information to a clearly mentally ill soldier and then not being able to track the source until a convicted hacker in touch with Manning reported the information to the FBI. What I found to be really interesting and positive of the whole scandal was the part concerning the democratic rebellions following the leak of sensitive information concerning Arab countries. Its only thanks to public information that citizens of Tunisia, Egypt, Morocco, Libya etc. were able to understand that it was time to change the way they were ruled and overturn the tyrannical regimes. Information is indeed the future and the same Assange stated that the reason for releasing the information on his part was because  “a race commenced between the governments who need to be reformed and the people who can reform them using the material.” [[User:Emanuele|Emanuele]] 12:10, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@ Emanuele:  I really think the interesting question about protection of information – especially when concerning governments – is whether or not this is absolutely necessary.  As WikiLeaks has demonstrated, there are easier ways towards peacemaking.  I think we need to step back and really take a look at the impact and scope of what WikiLeaks has accomplished.  [[User:Just Johnny|Just Johnny]] 23:28, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
@JennLopez I completely agree, I thought the organization and explanation of the Wikileaks case was great. I particularly enjoyed the letters between Julian Assange and the Department of State. @Emanuele I also agree that the section about the Arab countries was interesting- to think that Assange in some way helped start the Arab Spring is incredible. Looking forward listening to the class discussion as well.--[[User:Szakuto|Szakuto]] 12:39, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The Wikileaks case poses the interesting question of reporting versus national security, a question that I doubt would have been nearly as incendiary prior to 9/11. While reporters of the past have committed themselves to providing the public with all information they learn of (and therefore it is no mystery that Assange likens himself as a reporter), the turbulent nature of foreign policy (particularly in the Middle East) does raise ethical questions on what content should be published, and whether the consequences of publishing such information will lead to innocents or government officials being harmed. What was particularly problematic is that there was anecdotal evidence that Assange had originally decided on publishing the Manning files without redactions, and that his co-workers had to convince him otherwise. For a single man to have that much power to affect the lives of many agents in the field is disconcerting. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the “insurance file” that Assange had, and which he would publish if he was the subject of an investigation, added a new wrinkle to the concept of reporters relying on the dissemination of information rather than using information as legal protection that could jeopardize national security. &lt;br /&gt;
&lt;br /&gt;
In terms of moral responsibility and security implications, Wikileaks reminds me of the photos that were taken a couple years ago of American soldiers photographing the body parts of dead Afghan soldiers. Given the hostile reaction to the Koran book-burning scandal, the news outlet who released these pictures almost certainly would have expected that additional American soldiers would be killed from outrage and reprisal and that those soldiers may otherwise have been spared had those photos not been released. These ethical problems are why wikileaks and Assange continue to be controversial.--[[User:Jimmyh|Jimmyh]] 12:44, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Jimmyh:  You know I can&#039;t help but go back to my first post about the importance of protection for whistle-blowers.  Assange is quite literally putting his neck out on the line for other people, and is taking the heat for it.  Whereas, many bloggers and reporters do not even think of taking half that risk.  Now you have to ask yourself: What is a free and democratic society when the media is afraid to report on something?  It is no longer a democracy.  When corporations and government control the media, as well as everything that is put on it, then we are taking a step backwards in terms of progress.  So, I see WikiLeaks as an enforcer of responsibility just as any other media should be.  However, WikiLeaks is a real wake up call to other media institutions.  No doubt we are beginning to see progress sweep across these developing regions that otherwise conventional means would not ever consider as possible until something like this came into play.  So it is quite controversial.  Is this the operation of simply a few people?  We may probably never know.  However, we do see the real world implications.  [[User:Just Johnny|Just Johnny]] 23:40, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What a great summary of the Wikileaks events, really interesting.  Assange&#039;s devotion to his own personal power/personality definitely made the supposedly altruistic nature of his releases a lot more suspect and worrisome.  Reading through these events again I was reminded how impressed I was with the NYTimes, the Guardian, and the other major papers in how they handled this.  They really seem to have done the best they could at thinking through an extremely difficult situation and attempting to both honor their responsibilities as journalists and maintain a sense of responsibility for the results of their actions.  This is definitely something we lose when the anonymous internet becomes the method of disseminating controversial information or news; no specially trained journalists are thinking through the implications of releasing each part of a story.  That lack of filter can have serious consequences. [[User:AlexLE|AlexLE]] 13:05, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@AlexLE:  This certainly is an interesting recounting of the events that led up to the WikiLeaks incident.  Interesting how the New York Times and the Guardian come into play – almost as WikiLeaks dangling that the truth is superior to either British imperialism or Western capitalism.  Also, interesting how you note about the anonymity of the Internet and the repercussions it is beginning to demonstrate.    I think that this is interesting because this not only just applies to citizens, but to government as well.  If governments are expecting us to open up and just give every piece of information about ourselves and our lives, then the government also has to follow this idea.  As is clearly stated in the reading: “Step by gradual step, the diplomatic cables have slipped from secrecy into the public sphere. Every&lt;br /&gt;
attempt to control or redact them, regardless whether by the US government, WikiLeaks, corporations,&lt;br /&gt;
or the mainstream media, ultimately failed.&lt;br /&gt;
”  So, once the information is out there, it is out there.  Now I don&#039;t believe that this should apply to everything.  Corporations should shred digital/information on a regular rolling schedule in accordance with laws.  However, in this instance, we see what is happening with this awakening of the convergence of power play and the public.  It is very much the ruler on the high horse being thrown off of it by the people.  In a sense, it is democratic in idea.  [[User:Just Johnny|Just Johnny]] 23:56, 27 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interesting study on the Wikileaks events. I wonder what Assange&#039;s intent truly was with the letter to the State Department? Would he really remove per their request? Was it maneuvering for the U.S. to mistakenly give up the rest of the information. I&#039;m guessing Saudi intentions to bomb Iran put people in harm&#039;s way on a more national scale --- more than just individual people. [[User:Brendanlong|Brendanlong]] 13:33, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
It just amazes me how vulnerable and insecure data can be, as evidenced by Anonymous’s hacking and humiliation of HBGary Federal and Aaron Barr. The incident also proved to be embarrassing to the US government as well, as it was clearly ill-equipped to stop WikiLeaks, hacktivists, and jounals from publicizing sensitive data. Is this the way it must be to have open information and transparent government? @ Emanuele I also find it interesting that WikiLeaks allowed for revolutions to occur in Tunisia, Egypt, and Libya. [[User:Qdang|Qdang]] 14:01, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great article summarizing the WikiLeaks timeline of events. As someone with a Top Secret clearance I found the information on Manning’s background really disturbing. The military has an obligation to monitor those with access to classified material. The reading also magnified the discontent between an editor-in-chief for a newspaper vs. online journalism in regards to releasing sensitive information that could potentially cause harm to individuals. Do online journalists have less of an obligation to protect sources? Looking forward to our discussion in class tonight. &lt;br /&gt;
I also saw this article on CNN: Manning switches lawyers http://www.cnn.com/2012/04/24/justice/manning-military-hearing/index.html?hpt=hp_t2    --[[User:Hds5|Hds5]] 14:04, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
@Qdang I agree, data is extremely vulnerable. The Government has to take into account retaliation from hackers when trying to impose rules and regulations.--[[User:Hds5|Hds5]] 14:34, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great &amp;quot;step-by-step&amp;quot; breakdown of events. I found the part on the use of ECPA important, and wonder if the law will be changed. The power struggles surrounding Assange, as well as his personality in general, helped to cast doubt on his intentions (as @AlexLE mentioned). &lt;br /&gt;
&lt;br /&gt;
@Hds5 -- I think that online journalists don&#039;t necessarily hold themselves to the same &amp;quot;rules&amp;quot; as print journalists. Perhaps it&#039;s something to do with legal ambiguity of the web. [[User:Aberg|Aberg]] 16:02, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Very interesting case study.  It is great to have the players, timeline and full summary of events in one place to truly see the imapact of this event.  Of greatest interest to me (like Qdang mentioned above) is the fact that WikiLeaks appears to have helped set the stage for revolutions to occur in northern Africa and the Middle East. I look forward to the discussion.  [[User:Cfleming27|Cfleming27]] 14:45, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Great article and great summary of events as they occurred. While I was aware of many things that occurred that time, I wasn&#039;t aware of few aspects on Wiki until now. Also, I am surprised how easy Top Secret information like that can be leaked and hacked into, which raises questions of how secure data like that is. I was also surprised that that out of all these websites including government ones, Amazon was the only one that could not be hacked. This also raises questions why US government websites can be so easily hacked when compared to Amazon. Shouldn&#039;t it be the other way round? While the material did spread, I think US government did a decent job at suppressing that information from going all out. The article also showed great difference between paper journalism and internet journalism. Given that many Wikileaks employees didn&#039;t like Assange&#039;s stand of releasing such information, it seems that Assange was doing everything possible to get as much media attention as possible even if it meant his own downfall. Great article, and looking forward to class discussions.&lt;br /&gt;
[[User:Erzhik|Erzhik]] 15:23, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
Besides the very good explanation of the facts in a brief and concise way in this article, what I most like from the Wikileaks case is that it covers many topics we have been discussing in class. We saw the importance of redacting online when we addressed regulation speech online.  I agree when the article explains that The New York Times and The Guardian newspapers blamed Wikileaks for releasing the cables without revising how they should be written, putting at risk several people, including the US forces. This was the reason Jester did hacktivism for good, in order to support the privacy of the people. Also we can see how important normativity is on the Internet, and in this case we see another example of these regulations: the ECPA Subpoenas the government has used to access the accounts of important implicated persons in the Wikileaks problem. Finally, we covered collective decision and democracy in past classes, and what more impressed me from the case was that the Tunisia protests began due to some of the Wikileaks’ cables about the Tunisian government. Therefore, as it is stated in the article, part of the Arab Spring was triggered by the information spread through the cables of Wikileaks. Unbelievable! Looking forward to discussing this case[[User:Fabiancelisj|Fabiancelisj]] 15:58, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
I&#039;m really looking forward to discussing the issues raised by the readings this week, particularly the different strategies for attacking online foes. I&#039;d also love to hear more about how these tactics are used by other governments (e.g. Russia) to respond to hackers/journalists who publish critical opinions and private documents. [[User:Aditkowsky|Aditkowsky]] 17:27, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
The case brings up some deeper and broader questions, I feel, yet nothing we don’t know.  Real life has no 100% “saints” most of the time, most situations are not all black and white, but rather several shades of gray, and we can please some of the people all of the time, all of the people some of the time, but we cannot please all of the people all of the time.  A government is supposed to protect people, but then comes the question, which people?  Whose interests are being protected?  Who is actually behind the government?  News agencies are run and own by human people and economic interests, and some of these care more about ideals and humanity than others.  Some care, as long as it doesn’t cost them anything.  Well intentioned crusaders also have to watch out for pride and ambition, and some succumb to those faults.  The truth can and does set us free, yet some things spoken to the wrong people at the wrong time can bring hurtful results to innocent people, so much discretion and objective responsibility must be applied.  All sides claim to be trying to use those attributes, of course.  Maybe the best we can hope for, when dealing with humanity, is a balance of power, a check and balance system, which doesn’t always get everything right, but helps to keep things in general from going too wrong.  Too much control can easily be misused, and no control invites misuse of freedom.  Even though Wiki-links seems to have helped to bring about a change, for example, in Egypt, some feel that the outcome has simply been to exchange an old evil for a new one.  I include myself in the “sinning-saint” category, meaning that sometimes even when I’m well intentioned, I don’t end up performing the right thing, like most of us, I suppose.  It seems humans and human organizations need some external help and auditing when it comes to moral guidelines and freedoms, some sort of absolute “Golden rule for dummies” which is easy enough to follow and persuasive enough to help at least most of us to want to follow it.[[User:Mike|Mike]] 21:08, 24 April 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Just Johnny</name></author>
	</entry>
</feed>