Ellsberg: With Wikileaks, Google, Facebook must take a stand
IDG News Service - The Silicon Valley companies that store our personal data have a growing responsibility to protect it from government snooping, according to Daniel Ellsberg, the man who leaked the Pentagon Papers.
Discussing the growing role of Internet companies in the public sphere, Ellsberg said companies such as Google, Facebook and Twitter need to take a stand and push back on excessive requests for personal data.
"You're on the spot," he told a roomful of Silicon Valley executives at a Churchill Club event in Santa Clara, California, Wednesday night. "You are facing a challenge at this moment of profound implications for our democracy."
Ellsberg was on a panel talking about Wikileaks and the relationship between the U.S. government -- eager to shut it down -- and corporations such as Amazon, eBay, Visa and Mastercard -- who all recently severed ties with Wikileaks in response to government pressure.
Ellsberg's take: If companies don't push back, the government will get too much power as more and more of our private lives -- logged in photo uploads, status updates or online check-ins -- is recorded online.
As the government fights to keep its own secrets, it wants to know as much as possible about our lives, said Ellsberg, who was himself targeted by government investigators after he began leaking classified military documents that described what the U.S. government knew as it escalated its war in Vietnam.
"Facebook, Google, Twitter: Put them all together. If they're all working together, their ability to manipulate us, to know [about us], this is absolutely antithetical to democracy," he said. "People in this audience have the ability to decide that they are ready to take a risk in their lives to fight to preserve democracy in this country and to preserve us from total transparency to our executive branch."
On Thursday, the Electronic Frontier Foundation published 13 electronic guidebooks, from companies such as Facebook and MySpace, used to explain to law enforcement how it should go about requesting sensitive information from those websites. The guidebooks "show that social-networking sites have struggled to develop consistent, straightforward policies to govern how and when they will provide private user information to law enforcement agencies," the EFF said.
The issue came up recently when Twitter fought a gag order that prohibited the company from telling users associated with Wikileaks that their Twitter messages had been subpoenaed by the U.S. Department of Justice. The gag orders are typically used to keep criminals from knowing that they are under investigation, but in the case of Wikileaks, Twitter's lawyers fought the order and won -- allowing the existence of the subpoenas to be made public.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers
- Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services
- Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud
- This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America
- Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market All Government IT White Papers
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- Charting Your Analytical Future - "Making predictive analytics part of your business processes" Webinar This session will show how predictive analytics can be used throughout the organization by anyone looking for answers and how organizations can make...
- All Government IT Webcasts