Iran Election Guide

Donate to EAWV





Or, click to learn more

Search

Entries in Journalism & Media (7)

Monday
Mar292010

Iran's Nukes: False Alarm Journalism (Sick)

Gary Sick follows up our Sunday analysis of the exaggerated "news" in The New York Times, penned by David Sanger and William Broad, of an impending threat from Iran's nuclear programme:

I was struck by two things in this newly breathless and alarmist front-page NYT report.

UPDATED Iran’s Nukes: The Dangerous News of The New York Times


First, it says its information is based on the word of officials who “insisted on anonymity because the search involves not only satellite surveillance, but also intelligence gleaned from highly classified operations.” Yet the only hard, new information is based on the public statement of the head of the Iranian Atomic Energy Organization [Ali Akhbar Salehi] — all that ultra-classified stuff is by their own admission nothing more than pure speculation.


Second, the other revelation is that no new centrifuges have been added to the Natanz site, which may mean that these are destined for the two new “secret” (but publicly announced) sites. Let’s see, Iran has publicly declared its Qom facility, which is under inspection, and they say that they are going to install 3000 centrifuges there. But the site is not ready, so a less sensational interpretation would be that they are holding their new centrifuges to go there when the site is ready. It’s also not surprising that they are not adding new centrifuges to the Natanz site since more than 50% of the 9000 centrifuges installed at Natanz are not actually producing enriched uranium. Why add to the non-working total?

Why do Sanger and Broad insist on spinning a conspiratorial scenario when there are perfectly rational alternatives? I guess that doesn’t qualify as a scoop, so it doesn’t deserve front-page treatment, and it makes the word of unnamed officials with access to unmentionable intelligence look pretty foolish.

Given the NYT experience with faithfully reproducing sensational and highly selective leaks prior to the Iraq war, which proved to be false and which helped get the US into a war that was initiated on false premises, it is truly difficult for me to believe that the NYT editors still continue to put out this kind of unsourced, circular, prejudicial, and logically challenged reporting — and always on the front page!
Thursday
Mar182010

UPDATED Info & Cyber-Battles: US Army v. Wikileaks

UPDATE 18 March: The New York Times has discovered the story, "Pentagon Sees a Threat From Online Muckrakers".



---
For those of us looking for the story behind the story, Wikileaks has been a valuable source since 2007. Its revelations are not limited to one Government or case; rather, in the name of openness, it has been a site for exposure of the misdeeds and manipulations of those in power from China to the US to the United Nations.


In its latest scoop, Wikileaks reveals how the US Government tried to cripple the activities of....Wikileaks. The website summarises a 32-page classified (Secret/No Foreign Dissemination) report from the US Army:

Linking to Wikileaks in Australia? The Fine is A$11,000



The report recommends, “The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistleblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site.”....As an odd justificaton for the plan, the report claims that “several foreign countries including China, Israel, North Korea, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the Wikileaks.org website”.

The opening of the report:

EXECUTIVE SUMMARY
(S//NF) Wikileaks.org, a publicly accessible Internet Web site, represents a potential force protection, counterintelligence, operational security (OPSEC), and information security (INFOSEC) threat to the US Army.


The intentional or unintentional leaking and posting of US Army sensitive or classified information to Wikileaks.org could result in increased threats to DoD [Department of Defense] personnel, equipment, facilities, or installations. The leakage of sensitive and classified DoD information also calls attention to the insider threat, when a person or persons motivated by a particular cause or issue wittingly provides information to domestic or foreign personnel or

organizations to be published by the news media or on the Internet. Such information could be of value to foreign intelligence and security services (FISS), foreign military forces, foreign insurgents, and foreign terrorist groups for collecting information or for planning attacks against US forces, both within the United States and abroad.

(S//NF) The possibility that a current employee or mole within DoD or elsewhere in the US government is providing sensitive information or classified information to Wikileaks.org cannot be ruled out. Wikileaks.org claims that the "leakers"or "whistleblowers" of sensitive or classified DoD documents are former US government employees. These claims are highly suspect, however, since Wikileaks.org states that the anonymity and protection of the leakers or whistleblowers is one of its primary goals. Referencing of leakers using codenames and providing incorrect employment information, employment status, and other contradictory information by Wikileaks.org are most likely rudimentary OPSEC [operational security] measures designed to protect the identity of the current or former insiders who leaked the information. On the other hand, one cannot rule out the possibility that some of the contradictions in describing leakers could be inadvertent OPSEC errors by the authors, contributors, or Wikileaks.org staff personnel with limited experience in protecting the identity of their sources.

(U) The stated intent of the Wikileaks.org Web site is to expose unethical practices, illegal behavior, and wrongdoing within corrupt corporations and oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa, and the Middle East. To do so, the developers of the Wikileaks.org Web site want to provide a secure forum to where leakers, contributors, or whistleblowers from any country can anonymously post or send documentation and other

information that exposes corruption or wrongdoing by governments or corporations. The developers believe that the disclosure of sensitive or classified information involving a foreign government or corporation will eventually result in the increased accountability of a democratic, oppressive, or corrupt the government to its citizens.

(S//NF) Anyone can post information to the Wikileaks.org Web site, and there is no editorial review or oversight to verify the accuracy of any information posted to the Web site. Persons accessing the Web site can form their own opinions regarding the accuracy of the information posted, and they are allowed to post comments. This raises the possibility that the Wikileaks.org Web site could be used to post fabricated information; to post misinformation, disinformation, and propaganda; or to conduct perception management and influence operations designed to convey a negative message to those who view or retrieve information from the Web site.

(U) Diverse views exist among private persons, legal experts, advocates for open government and accountability, law enforcement, and government officials in the United States and other countries on the stated goals of Wikileaks.org. Some contend that the leaking and posting of information on Wikileaks.org is constitutionally protected free speech, supports open society and open government initiatives, and serves the greater public good in such a manner that outweighs any illegal acts that arise from the posting of sensitive or classified government or business information. Others believe that the Web site or persons associated with Wikileaks.org will face legal challenges in some countries over privacy issues, revealing sensitive or classified government information, or civil lawsuits for posting information that is wrong, false, slanderous, libelous, or malicious in nature.

For example, the Wikileaks.org Web site in the United States was shutdown on 14 February 2008 for 2 weeks by court order over the publishing of sensitive documents in a case involving charges of money laundering, grand larceny, and tax evasion by the Julius Bare Bank in the Cayman Islands and Switzerland. The court case against Wikileaks.org was dropped by Julius Bare Bank, the US court order was lifted and the Web site was restored in the United States. Efforts by some domestic and foreign personnel and organizations to discredit the Wikileaks.org Web site include allegations that it wittingly allows the posting of uncorroborated information, serves as an instrument of propaganda, and is a front organization of the US Central Intelligence Agency (CIA).

(S//NF) The governments of China, Israel, North Korea, Russia, Thailand, Zimbabwe, and several other countries have blocked access to Wikileaks.org-type Web sites, claimed they have the right to investigate and prosecute Wikileaks.org and associated whistleblowers, or insisted they remove false, sensitive, or classified government information, propaganda, or malicious content from the Internet. The governments of China, Israel, and Russia claim the right to remove objectionable content from, block access to, and investigate crimes related to the posting of documents or comments to Web sites such as Wikileaks.org. The governments of these countries most likely have the technical skills to take such action should they choose to do so.

(S//NF) Wikileaks.org uses trust as a center of gravity by assuring insiders, leakers, and whistleblowers who pass information to Wikileaks.org personnel or who post information to the Web site that they will remain anonymous. The identification, exposure, or termination of employment of or legal actions against current or former insiders, leakers, or whistleblowers could damage or destroy this center of gravity and deter others from using Wikileaks.org to make such information public.
Monday
Mar082010

EA's Photos of the Decade: Your Turn

OK, over to you. Liam Kennedy of the Clinton Institute for American Studies has presented his 10 nominations for Photo of the Decade, from Palestinians fleeing tear gas in 2000 to the death of Neda Agha Soltan in 2009. But his is just one opinion. We invite readers to present their own choice from the 10 photographs or submit their own nominations.


Click on the images below to view them in full.


[nggallery id=1]

Thursday
Mar042010

EA's New Partner: Welcome to the Outpost!

We're excited to hear about the official launch of Outpost, a blog on Irish-American relations by our colleagues at University College Dublin's Clinton Institute. Martin, Geoff and team explain:
The purpose of this blog is to offer dynamic and wide-ranging coverage of American politics, culture and society from Irish and European perspectives. Ireland is situated in an unique position to foster a greater understanding of America’s role in the world, it’s relationship with Europe and how the United States is perceived by both the media and public.

Working within this frame Outpost will publish innovative analysis concerning significant diplomatic, economic and cultural developments. This will include expert commentary on the continuing US presence in Northern Ireland. As Ireland enters a new economic framework traditional discourses require reassesment. The Outpost will consistently address shifting paradigms in economics and politics in an innovative and engaging manner.

Recent posts include reports on the closure of Guantánamo, Obama's healthcare plans, the Irish peace process, and PIGS. Visit the Outpost.
Wednesday
Mar032010

EA Photo Special: New York Times Caption of Day (Month...Year...Century)

From today's New York Times website (at least until someone noticed what they had done). Click on the screenshot: