Ellsberg: With Wikileaks, Google, Facebook must take a stand
IDG News Service - The Silicon Valley companies that store our personal data have a growing responsibility to protect it from government snooping, according to Daniel Ellsberg, the man who leaked the Pentagon Papers.
Discussing the growing role of Internet companies in the public sphere, Ellsberg said companies such as Google, Facebook and Twitter need to take a stand and push back on excessive requests for personal data.
"You're on the spot," he told a roomful of Silicon Valley executives at a Churchill Club event in Santa Clara, California, Wednesday night. "You are facing a challenge at this moment of profound implications for our democracy."
Ellsberg was on a panel talking about Wikileaks and the relationship between the U.S. government -- eager to shut it down -- and corporations such as Amazon, eBay, Visa and Mastercard -- who all recently severed ties with Wikileaks in response to government pressure.
Ellsberg's take: If companies don't push back, the government will get too much power as more and more of our private lives -- logged in photo uploads, status updates or online check-ins -- is recorded online.
As the government fights to keep its own secrets, it wants to know as much as possible about our lives, said Ellsberg, who was himself targeted by government investigators after he began leaking classified military documents that described what the U.S. government knew as it escalated its war in Vietnam.
"Facebook, Google, Twitter: Put them all together. If they're all working together, their ability to manipulate us, to know [about us], this is absolutely antithetical to democracy," he said. "People in this audience have the ability to decide that they are ready to take a risk in their lives to fight to preserve democracy in this country and to preserve us from total transparency to our executive branch."
On Thursday, the Electronic Frontier Foundation published 13 electronic guidebooks, from companies such as Facebook and MySpace, used to explain to law enforcement how it should go about requesting sensitive information from those websites. The guidebooks "show that social-networking sites have struggled to develop consistent, straightforward policies to govern how and when they will provide private user information to law enforcement agencies," the EFF said.
The issue came up recently when Twitter fought a gag order that prohibited the company from telling users associated with Wikileaks that their Twitter messages had been subpoenaed by the U.S. Department of Justice. The gag orders are typically used to keep criminals from knowing that they are under investigation, but in the case of Wikileaks, Twitter's lawyers fought the order and won -- allowing the existence of the subpoenas to be made public.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Logicalis eBook: SAP HANA: The Need for Speed
- Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report
- For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study
- This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data
- With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate... All Government IT White Papers
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control.
Enhance Your Virtualization Infrastructure With IBM and Vmware
Date: Wednesday, May 14, 2014, 1:00 PM EDT
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage...
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- All Government IT Webcasts