Ellsberg: With Wikileaks, Google, Facebook must take a stand
IDG News Service - The Silicon Valley companies that store our personal data have a growing responsibility to protect it from government snooping, according to Daniel Ellsberg, the man who leaked the Pentagon Papers.
Discussing the growing role of Internet companies in the public sphere, Ellsberg said companies such as Google, Facebook and Twitter need to take a stand and push back on excessive requests for personal data.
"You're on the spot," he told a roomful of Silicon Valley executives at a Churchill Club event in Santa Clara, California, Wednesday night. "You are facing a challenge at this moment of profound implications for our democracy."
Ellsberg was on a panel talking about Wikileaks and the relationship between the U.S. government -- eager to shut it down -- and corporations such as Amazon, eBay, Visa and Mastercard -- who all recently severed ties with Wikileaks in response to government pressure.
Ellsberg's take: If companies don't push back, the government will get too much power as more and more of our private lives -- logged in photo uploads, status updates or online check-ins -- is recorded online.
As the government fights to keep its own secrets, it wants to know as much as possible about our lives, said Ellsberg, who was himself targeted by government investigators after he began leaking classified military documents that described what the U.S. government knew as it escalated its war in Vietnam.
"Facebook, Google, Twitter: Put them all together. If they're all working together, their ability to manipulate us, to know [about us], this is absolutely antithetical to democracy," he said. "People in this audience have the ability to decide that they are ready to take a risk in their lives to fight to preserve democracy in this country and to preserve us from total transparency to our executive branch."
On Thursday, the Electronic Frontier Foundation published 13 electronic guidebooks, from companies such as Facebook and MySpace, used to explain to law enforcement how it should go about requesting sensitive information from those websites. The guidebooks "show that social-networking sites have struggled to develop consistent, straightforward policies to govern how and when they will provide private user information to law enforcement agencies," the EFF said.
The issue came up recently when Twitter fought a gag order that prohibited the company from telling users associated with Wikileaks that their Twitter messages had been subpoenaed by the U.S. Department of Justice. The gag orders are typically used to keep criminals from knowing that they are under investigation, but in the case of Wikileaks, Twitter's lawyers fought the order and won -- allowing the existence of the subpoenas to be made public.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security
- Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- Magic Quadrant for Data Masking Technology
- IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Read the full report to learn about IBM.
- Best Practices for Securing Hadoop
- Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges
- Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks... All Government IT White Papers
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- Charting Your Analytical Future - "Making predictive analytics part of your business processes" Webinar This session will show how predictive analytics can be used throughout the organization by anyone looking for answers and how organizations can make...
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success!
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt.
- All Government IT Webcasts