SlideShare uma empresa Scribd logo
1 de 6
WikiLeaks and
The Legitimacy of the Fifth Estate
By: Emily Blegvad
What is WikiLeaks?
• Claims to: “specialize in the analysis and
publication of large datasets of
censored or otherwise restricted official
materials involving war, spying and
corruption.”
● What is being analyzed about it’s
authenticity?
The actual legitimacy and correctness of
the organization.
● Authenticity = Truthfulness in
documents released.
Founder of WikiLeaks, Julian
Assange
How and why is WikiLeaks contested?
● Is WikiLeaks the outcome of Julian Assange’s personal vendetta? To many, it is.
● “Even as he [Assange] portrays himself as a radical transparency activist, Assange’s
actions belie a fierce commitment to protecting his own privacy”
- Daniel Domscheit-Berg
Guantanamo Files: Revealed inner workings of
controversial prison including information
about how inmates were mistreated/tortured.
Afghan War Diaries (Collateral Murder):
The reports describe the majority of lethal military
actions involving the United States military.
DNC Email Hack:
This collection included
19,000 emails and 8,000
attachments from the
DNC, the governing
body of the Democratic
Party.
Podesta Emails: Revealed that the Clinton
campaign gained insider information on debate
questions and tactics.
Why is WikiLeaks contested?
● WikiLeaks seeks to be an entity that eventually eliminates itself through exposing
corrupt individuals and governments.
● WikiLeaks is contested because it is believed that WikiLeaks and its leader, Julian
Assange, are corrupt as well, and have their own agendas while hiding behind the
mask of being an organization dedicated to radical transparency worldwide.
Why does the authenticity of WikiLeaks matter?
• The legitimacy or truthfulness of information provided by WikiLeaks furthers the
public’s consensus on many of the largest issues our world faces.
• WikiLeaks is so powerful and has a lot of the public’s trust, it can easily
manipulate the information and consensus that many people have.
• WikiLeaks is deemed authentic or inauthentic because it is claiming its
authenticity of information, yet it is doing so in a specific way to hurt certain
people, not all people.
“He who controls the Internet servers controls the intellectual record
of mankind, and by controlling that, controls our perceptions of who
we are, and by controlling that, controls what laws and what
regulations we make in society.”
- Julian Assange

Mais conteúdo relacionado

Mais procurados

1950s American Culture
1950s American Culture1950s American Culture
1950s American Culturectawes
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Andrew Morris
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesAkshay Kurhade
 
The secret order of the illuminati
The secret order of the illuminatiThe secret order of the illuminati
The secret order of the illuminatiRiaz Zalil
 
Getting started with Splunk
Getting started with SplunkGetting started with Splunk
Getting started with SplunkSplunk
 
Sojourner Truth - Angelea S
Sojourner Truth - Angelea SSojourner Truth - Angelea S
Sojourner Truth - Angelea Sshimeallspeeps
 
What slide dimensions should you use for your presentations?
What slide dimensions should you use for your presentations?What slide dimensions should you use for your presentations?
What slide dimensions should you use for your presentations?Presentitude
 
Fake news and how to combat it
Fake news and how to combat itFake news and how to combat it
Fake news and how to combat itSanjana Hattotuwa
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
Nixon and the watergate scandal
Nixon and the watergate scandalNixon and the watergate scandal
Nixon and the watergate scandalRCB78
 
Salem Witch Trials
Salem Witch TrialsSalem Witch Trials
Salem Witch Trialssmccune
 

Mais procurados (20)

Ku Klux Klan
Ku Klux KlanKu Klux Klan
Ku Klux Klan
 
1950s American Culture
1950s American Culture1950s American Culture
1950s American Culture
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
 
13 satanic bloodlines
13 satanic bloodlines13 satanic bloodlines
13 satanic bloodlines
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Cracking guide
Cracking guideCracking guide
Cracking guide
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
 
Digital Storytelling & Interactive Media
Digital Storytelling & Interactive MediaDigital Storytelling & Interactive Media
Digital Storytelling & Interactive Media
 
THOR Apt Scanner
THOR Apt ScannerTHOR Apt Scanner
THOR Apt Scanner
 
The secret order of the illuminati
The secret order of the illuminatiThe secret order of the illuminati
The secret order of the illuminati
 
Getting started with Splunk
Getting started with SplunkGetting started with Splunk
Getting started with Splunk
 
Sojourner Truth - Angelea S
Sojourner Truth - Angelea SSojourner Truth - Angelea S
Sojourner Truth - Angelea S
 
What slide dimensions should you use for your presentations?
What slide dimensions should you use for your presentations?What slide dimensions should you use for your presentations?
What slide dimensions should you use for your presentations?
 
Fake news and how to combat it
Fake news and how to combat itFake news and how to combat it
Fake news and how to combat it
 
Fake news
Fake newsFake news
Fake news
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Nixon and the watergate scandal
Nixon and the watergate scandalNixon and the watergate scandal
Nixon and the watergate scandal
 
Nur3052 ch5
Nur3052 ch5Nur3052 ch5
Nur3052 ch5
 
FIGHTING FAKE NEWS
FIGHTING FAKE NEWS FIGHTING FAKE NEWS
FIGHTING FAKE NEWS
 
Salem Witch Trials
Salem Witch TrialsSalem Witch Trials
Salem Witch Trials
 

Destaque

What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?Joris Berthelot
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaksSachin sharma
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Wikileaks e as correntes do Direito
Wikileaks e as correntes do DireitoWikileaks e as correntes do Direito
Wikileaks e as correntes do DireitoCarina Derschum
 
O wikileaks e o direito à informação
O wikileaks e o direito à informaçãoO wikileaks e o direito à informação
O wikileaks e o direito à informaçãoWalter Aranha Capanema
 
WikiLeaks e o novo jornalismo investigativo
WikiLeaks e o novo jornalismo investigativoWikiLeaks e o novo jornalismo investigativo
WikiLeaks e o novo jornalismo investigativoWander Veroni Maia
 
Jornalismo de Dados, Panamá Papers e Wikileaks
Jornalismo de Dados, Panamá Papers e WikileaksJornalismo de Dados, Panamá Papers e Wikileaks
Jornalismo de Dados, Panamá Papers e WikileaksHaydee Svab
 
Wikileaks
WikileaksWikileaks
WikileaksAri L M
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaksdanna16
 

Destaque (20)

Wikileaks
WikileaksWikileaks
Wikileaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Présentation WikiLeaks
Présentation WikiLeaksPrésentation WikiLeaks
Présentation WikiLeaks
 
What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaks
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Wikileaks e as correntes do Direito
Wikileaks e as correntes do DireitoWikileaks e as correntes do Direito
Wikileaks e as correntes do Direito
 
O wikileaks e o direito à informação
O wikileaks e o direito à informaçãoO wikileaks e o direito à informação
O wikileaks e o direito à informação
 
WikiLeaks e o novo jornalismo investigativo
WikiLeaks e o novo jornalismo investigativoWikiLeaks e o novo jornalismo investigativo
WikiLeaks e o novo jornalismo investigativo
 
Jornalismo de Dados, Panamá Papers e Wikileaks
Jornalismo de Dados, Panamá Papers e WikileaksJornalismo de Dados, Panamá Papers e Wikileaks
Jornalismo de Dados, Panamá Papers e Wikileaks
 
What wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan SempleWhat wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan Semple
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Espionagem nos EUA
Espionagem nos EUAEspionagem nos EUA
Espionagem nos EUA
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaks
 
Wikileaks presentacion pp
Wikileaks presentacion ppWikileaks presentacion pp
Wikileaks presentacion pp
 
(Webinar Slides) Legal and Investigative Research on a Budget
(Webinar Slides) Legal and Investigative Research on a Budget(Webinar Slides) Legal and Investigative Research on a Budget
(Webinar Slides) Legal and Investigative Research on a Budget
 

Semelhante a WikiLeaks Presentation

WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadEmily Blegvad
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingMichael Heron
 
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
Wikileak’s Prosecution or Persecution:  Is this Western Democracy?Wikileak’s Prosecution or Persecution:  Is this Western Democracy?
Wikileak’s Prosecution or Persecution: Is this Western Democracy?Thesigan Nadarajan
 
Critical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent MediaCritical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent MediaKamil Mehmet Özkan
 
Leaks and whistleblowing
Leaks and whistleblowingLeaks and whistleblowing
Leaks and whistleblowingDan Kennedy
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docxwrite5
 
Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018JErickPPTs
 
9694 thinking skills wikileaks
9694 thinking skills wikileaks9694 thinking skills wikileaks
9694 thinking skills wikileaksmayorgam
 
Wikileaks qr
Wikileaks qrWikileaks qr
Wikileaks qrmayorgam
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks3GL1314
 
Wiki leaks-an enigma of information sensation sans accountability
Wiki leaks-an enigma of information sensation sans accountabilityWiki leaks-an enigma of information sensation sans accountability
Wiki leaks-an enigma of information sensation sans accountabilityAlexander Decker
 
11.wiki leaks-an enigma of information sensation sans accountability
11.wiki leaks-an enigma of information sensation sans accountability11.wiki leaks-an enigma of information sensation sans accountability
11.wiki leaks-an enigma of information sensation sans accountabilityAlexander Decker
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaksgorin2008
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Presentation 6 b (1).pptx
Presentation 6 b (1).pptxPresentation 6 b (1).pptx
Presentation 6 b (1).pptxRebecca Blount
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script043cyeung
 

Semelhante a WikiLeaks Presentation (20)

WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily BlegvadWikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
 
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
Wikileak’s Prosecution or Persecution:  Is this Western Democracy?Wikileak’s Prosecution or Persecution:  Is this Western Democracy?
Wikileak’s Prosecution or Persecution: Is this Western Democracy?
 
Critical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent MediaCritical Approach Wikileaks Make More Transparent Media
Critical Approach Wikileaks Make More Transparent Media
 
Leaks and whistleblowing
Leaks and whistleblowingLeaks and whistleblowing
Leaks and whistleblowing
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docx
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018
 
9694 thinking skills wikileaks
9694 thinking skills wikileaks9694 thinking skills wikileaks
9694 thinking skills wikileaks
 
Spilling+Secrets
Spilling+SecretsSpilling+Secrets
Spilling+Secrets
 
Wikileaks qr
Wikileaks qrWikileaks qr
Wikileaks qr
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
Wiki leaks-an enigma of information sensation sans accountability
Wiki leaks-an enigma of information sensation sans accountabilityWiki leaks-an enigma of information sensation sans accountability
Wiki leaks-an enigma of information sensation sans accountability
 
11.wiki leaks-an enigma of information sensation sans accountability
11.wiki leaks-an enigma of information sensation sans accountability11.wiki leaks-an enigma of information sensation sans accountability
11.wiki leaks-an enigma of information sensation sans accountability
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaks
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Presentation 6 b (1).pptx
Presentation 6 b (1).pptxPresentation 6 b (1).pptx
Presentation 6 b (1).pptx
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 

WikiLeaks Presentation

  • 1. WikiLeaks and The Legitimacy of the Fifth Estate By: Emily Blegvad
  • 2. What is WikiLeaks? • Claims to: “specialize in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying and corruption.” ● What is being analyzed about it’s authenticity? The actual legitimacy and correctness of the organization. ● Authenticity = Truthfulness in documents released. Founder of WikiLeaks, Julian Assange
  • 3. How and why is WikiLeaks contested? ● Is WikiLeaks the outcome of Julian Assange’s personal vendetta? To many, it is. ● “Even as he [Assange] portrays himself as a radical transparency activist, Assange’s actions belie a fierce commitment to protecting his own privacy” - Daniel Domscheit-Berg
  • 4. Guantanamo Files: Revealed inner workings of controversial prison including information about how inmates were mistreated/tortured. Afghan War Diaries (Collateral Murder): The reports describe the majority of lethal military actions involving the United States military. DNC Email Hack: This collection included 19,000 emails and 8,000 attachments from the DNC, the governing body of the Democratic Party. Podesta Emails: Revealed that the Clinton campaign gained insider information on debate questions and tactics.
  • 5. Why is WikiLeaks contested? ● WikiLeaks seeks to be an entity that eventually eliminates itself through exposing corrupt individuals and governments. ● WikiLeaks is contested because it is believed that WikiLeaks and its leader, Julian Assange, are corrupt as well, and have their own agendas while hiding behind the mask of being an organization dedicated to radical transparency worldwide.
  • 6. Why does the authenticity of WikiLeaks matter? • The legitimacy or truthfulness of information provided by WikiLeaks furthers the public’s consensus on many of the largest issues our world faces. • WikiLeaks is so powerful and has a lot of the public’s trust, it can easily manipulate the information and consensus that many people have. • WikiLeaks is deemed authentic or inauthentic because it is claiming its authenticity of information, yet it is doing so in a specific way to hurt certain people, not all people. “He who controls the Internet servers controls the intellectual record of mankind, and by controlling that, controls our perceptions of who we are, and by controlling that, controls what laws and what regulations we make in society.” - Julian Assange