Letter to the Editor: Law School Right to Affirm Commitment to Free Expression – Daily Cardinal

In the past week, there has been considerable controversy in the University of Wisconsin Law School community surrounding whether an organization opposed to trans-gender rights should be permitted to participate in the Wisconsin Public Interest Interview Program organized by the law school. While the organization adheres to the law schools non-discrimination policy in its hiring, Womens Liberation Front (WLF) embraces positions rejected by many law students, most notably its opposition to anti-discrimination protections based on gender identity.

On January 30, the law school issued a statement reiterating its opposition to discrimination based on gender identity. However, the law school argues that such disagreement does not justify excluding WLF as an employer, which would constitute viewpoint discrimination contrary to the First Amendment. Various student groups, including QLaw and the Student Bar Association, have responded in writing by characterizing WLF as a hate group and protesting the law schools refusal to remove the organization as a prospective employer.

While it may be an unpopular minority opinion within the law school, I agree with Dean Daniel Tokaji and the law school administration's position and handling of the matter. The law school only needs to ensure that no discrimination exists in employer hiring practices. It would be inappropriate for the law school to censor the political activities of prospective employers.

The University of WisconsinMadison is a public institution, and since Gitlow v. New York (1925), the First Amendment to the United States Constitution has extended to the states under the 14th Amendment. Excluding an employer from the recruiting event in question, based solely on political viewpoint, would be constitutionally impermissible under the First Amendment.

The answer to speech that some may find intolerable, I argue, is more speech, not less. Accordingly, the law school and various student groups have voiced their opposition and disagreement with the positions taken by WLF. I genuinely applaud these efforts.

Hateful ideas and bigoted speech (including, in this instance, calls for government-imposed discrimination that current constitutional law forbids) are just as protected under the First Amendment as other ideas and speech, unless they constitute "fighting words," threats of illegal conduct, incitement intended to and likely to produce imminent lawless action, or some other narrow exception not protected by the First Amendment.

Discomfort or distaste is the price that we pay for the constitutional protections of the First Amendment. This should be especially true in law schools given that our study of the law is a time to explore the many aspects of becoming an adult and professional, including developing an independent voice and the willingness to confront authority and different perspectives with respectful debate. Central to the First Amendment is the recognition that dissent by its nature can be messy and uncomfortable. More tolerance, not less, is needed under these circumstances.

Alfred E. Tsai is a JD candidate at the University of Wisconsin-Madison Law School. Do you agree that disagreement and dissent are tenets of open discussion and free expression? Send all comments to opinion@dailycardinal.com.

The Daily Cardinal has been covering the University and Madison community since 1892. Please consider giving today.

Read more here:

Letter to the Editor: Law School Right to Affirm Commitment to Free Expression - Daily Cardinal

The POWER Interview: The Importance of AI and Machine Learning – POWER magazine

Artificial intelligence (AI) and machine learning (ML) are becoming synonymous with the operation of power generation facilities. The increased digitization of power plants, from equipment to software, involves both thermal generation and renewable energy installations.

Both AI and ML will be key elements for the design of future energy systems, supporting the growth of smart grids and improving the efficiency of power generation, along with the interaction among electricity customers and utilities.

The technology group Wrtsil is a global leader in using data to improve operations in the power generation sector. The company helps generators make better asset management decisions, which supports predictive maintenance. The company uses AI, along with advanced diagnostics, and its deep equipment expertise greatly to enhance the safety, reliability, and efficiency of power equipment and systems.

Luke Witmer, general manager, Data Science, Energy Storage & Optimization at Wrtsil, talked with POWER about the importance of AI and ML to the future of power generation and electricity markets.

POWER: How can artificial intelligence (AI) be used in power trading, and with regard to forecasts and other issues?

Witmer: Artificial intelligence is a very wide field. Even a simple if/else statement is technically AI (a computer making a decision). Forecasts for price and power are generated by AI (some algorithm with some historic data set), and represent the expected trajectory or probability distribution of that value.

Power trading is also a wide field. There are many different markets that span different time periods and different electricity (power) services that power plants provide. Its more than just buying low and selling high, though that is a large piece of it. Forecasts are generally not very good at predicting exactly when electricity price spikes will happen. There is always a tradeoff between saving some power capacity for the biggest price spikes versus allocating more of your power for marginal prices. In the end, as a power trader, it is important to remember that the historical data is not a picture of the future, but rather a statistical distribution that can be leveraged to inform the most probable outcome of the unknown future. AI is more capable at leveraging statistics than people will ever be.

POWER: Machine learning and AI in power generation rely on digitalization. As the use of data becomes more important, what steps need to be taken to support AI and machine learning while still accounting for cybersecurity?

Witmer: A lot of steps. Sorry for the lame duck answer here. Regular whitehat penetration testing by ethical hackers is probably the best first step. The second step should be to diligently and quickly address each critical issue that is discovered through that process. This can be done by partnering with technology providers who have the right solution (cyber security practices, certifications, and technology) to enable the data flow that is required.

POWER: How can the power generation industry benefit from machine learning?

Witmer: The benefit is higher utilization of the existing infrastructure. There is a lot of under-utilized intrastructure in the power generation industry. This can be accomplished with greater intelligence on the edges of the network (out at each substation and at each independent generation facility) coupled with greater intelligence at the points of central dispatch.

POWER: Can machines used in power generation learn from their experiences; would an example be that a machine could perform more efficiently over time based on past experience?

Witmer: Yes and no. It depends what you mean by machines. A machine itself is simply pieces of metal. An analogy would be that your air conditioner at home cant learn anything, but your smart thermostat can. Your air conditioner needs to just operate as efficiently as possible when its told to operate, constrained by physics. Power generation equipment is the same. The controls however, whether at some point of aggregation, or transmission intersection, or at a central dispatch center, can certainly apply machine learning to operate differently as time goes on, adapting in real time to changing trends and conditions in the electricity grids and markets of the world.

POWER: What are some of the uses of artificial intelligence in the power industry?

Witmer: As mentioned in the response to question 1, I think it appropriate to point you at some definitions and descriptions of AI. I find wikipedia to be the best organized and moderated by experts.

In the end, its a question of intelligent control. There are many uses of AI in the power industry. To start listing some of them is insufficient, but, to give some idea, I would say that we use AI in the form of rules that automatically ramp power plants up/down by speeding up or slowing down their speed governors, in the form of neural networks that perform load forecasting based on historic data and the present state data (time of day, metering values, etc.), in the form of economic dispatch systems that leverage these forecasts, and in the form of reinforcement learning for statistically based automated bid generation in open markets. Our electricity grids combined with their associated controls and markets are arguably the most complex machines that humans have built.

POWER: How can AI benefit centralized generation, and can it provide cost savings for power customers?

Witmer: Centralized power systems continue to thrive from significant economies of scale. Centralized power systems enable equal access to clean power at the lowest cost, reducing economic inequality. I view large renewable power plants that are owned by independent power producers as centralized power generation, dispatched by centralized grid operators. Regardless of whether the path forward is more or less centralized, AI brings value to all parties. Not only does it maximize revenue for any specific asset (thus the asset owner), it also reduces overall electricity prices for all consumers.

POWER: How important is AI to smart grids? How important is AI to the integration of e-mobility (electric vehicles, etc.) to the grid?

Witmer: AI is very important to smart grids. AI is extremely important to the integration of smart charging of electric vehicles, and leveraging of those mobile batteries for grid services when they are plugged into the grid (vehicles to grid, or V2G). However, the more important piece is for the right market forces to be created (economics), so that people can realize the value (actually get paid) for allowing their vehicles to participate in these kinds of services.

The mobile batteries of EVs will be under-utilized if we do not integrate the controls for charging/discharging this equipment in a way that gives both the consumers the ability to opt in/out of any service but also for the centralized dispatch to leverage this equipment as well. Its less a question of AI, and more a question of economics and human behavioral science. Once the economics are leveraged and the right tools are in place, then AI will be able to forecast the availability and subsequent utility that the grid will be able to extract from the variable infrastructure of plugged in EVs.

POWER: How important is AI to the design and construction of virtual power plants?

Witmer: Interesting question. On one level, this is a question that raises an existential threat to aspects of my own job (but thats a good thing because if a computer can do it, I dont want to do it!). Its a bit of a chicken-and-egg scenario. Today, any power plant (virtual or actual), is designed through a process that involves a lot of modeling, or simulations of what-if scenarios. That model must be as accurate as possible, including the controls behavior of not only the new plant in question, but also the rest of the grid and/or markets nearby.

As more AI is used in the actual context of this new potential power plant, the model must also contain a reflection of that same AI. No model is perfect, but as more AI gets used in the actual dispatch of power plants, more AI will be needed in the design and creation process for new power plants or aggregations of power generation equipment.

POWER: What do you see as the future of AI and machine learning for power generation / utilities?

Witmer: The short-term future is simply an extension of what we see today. As more renewables come onto the grids, we will see more negative price events and more price volatility. AI will be able to thrive in that environment. I suspect that as time goes on, the existing market structures will cease to be the most efficient for society. In fact, AI is likely going to be able to take advantage of some of those legacy features (think Enron).

Hopefully the independent system operators of the world can adapt quickly enough to the changing conditions, but I remain skeptical of that in all scenarios. With growing renewables that have free fuel, the model of vertically integrated utilities with an integrated resource planning (IRP) process will likely yield the most economically efficient structure. I think that we will see growing inefficiencies in regions that have too many manufactured rules and structure imposed by legacy markets, designed around marginal costs of operating fossil fuel-burning plants.

Darrell Proctor is associate editor for POWER (@POWERmagazine).

Read more here:
The POWER Interview: The Importance of AI and Machine Learning - POWER magazine

Books in Brief: The Mysterious Disappearance of Aidan S.; Permanent Record, The Power of Yet – Buffalo News

The Mysterious Disappearance of Aidan S. (as told to his brother) by David Levithan; Knopf Books for Young Readers, 224 pages ($16.99) Ages 8 to 12.

Best-selling author David Levithan ("Someday," "Nick and Nora's Infinite Playlist," with Rachel Cohn) offers a fascinating twist on a familiar genre in this compelling novel, of a portal to a fantasy world, a boy who goes missing and his parents' and friends' hostile reaction to his account of his whereabouts.

12-year-old Aidan has been missing for six days, with the whole town searching for him, when his 11-year-old brother Lucas hears a noise in the attic and finds Aidan there with a bright blue leaf in his hair and an unbelievable tale of his sojourn in another world called Aveinieu, a place reached through an old dresser in the attic, a place where he wanted to stay.

Lucas narrates the tale, revealing only small glimpses of Aidan's experience of this other world and putting the focus on the reaction to his reappearance, the police questioning, the media spotlight, the bullying at school, the family tensions, even the treachery of a friend.

Lucas has been fooled so many times by Aidan's storytelling that he isn't prepared to believe him this time, but as Aidan grieves for the world he has lost and faces the frustration and disbelief of his parents (who insist he see a psychiatrist), and the hostility of the community at large, Lucas moves toward empathetic, loving support of his brother, even trying to concoct a more plausible explanation of Aidan's disappearance just to shut everyone up.

Go here to read the rest:
Books in Brief: The Mysterious Disappearance of Aidan S.; Permanent Record, The Power of Yet - Buffalo News

Permanent Record: How One Man Exposed the Truth about Government Spying and Digital Security – Morning Star Online

PERMANENT Record, Edward Snowdens 2019 memoir, full of the seamy details of state corruption that can get a whistleblower in trouble, has just been released in a young readersedition.

Its squarely aimed at a young readership and has all the stuff they love in a book adventure, fighting tyrants, young love, righteous parental moral homilies, unspeakable mum and dad divorce, ideals turned dystopic along with with a fascistic capitalism portrayed as a nearly indestructible cyborg.

The book follows Snowdens childhood years through to September 11 terror attacks wake-up and how he became a whistleblower.

Growing up, he loved Bulfinchs Mythology, Aesops Fables and, of course, the tales of King Arthurs court.

Of particular interest was the story of the tyrannical Welsh king Rhitta Gawr, who refused to accept that the age of his reign had passed and that in the future the world would be ruled by human kings, he writes.

When King Arthur puts an end to Gawrs tyranny on Mount Snaw Dun, the young Snowden is delighted: I remember the feeling of encountering my last name in this context it was thrilling and the archaic spelling gave me my first sense that the world was older than I was, even older than my parents were.

Snowden describes how at at school, he skirted the rules to do minimal work in history class, only to be scolded by the teacher and told he must mind that such cleverness could become part of his permanent record.

This heralds the main theme of the book, that we all,unwittingly, have permanent records that the government and its partners Google, Amazon, Facebook keep on us, and are willing to lie about.

Arbitrarily, the government could one day use the information gathered against anyone in the future, perhaps even retroactively.

This brings to mind the warning of Congressman Frank Church in 1975, way before the internets arrival, thatthe technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back.

All agencies that possess this technology [must] operate within the law and under proper supervision so that we never cross over that abyss from which there is no return.

Some say we have already crossed the abyss but Snowden seems to have a modicum of hope left for the next generation to reverse this negativity.

He contends that the US government let the US people down before and after September 11 before, by ignoring warnings about an imminent threat and after, by taking the gloves off and creating a colossal surveillance state that threatens to eviscerate human privacy and with it consciousness and the ability to free think.

And he reveals the existence of homo contractus, a term used to describe government employees with top-secret clearance being poached by private companies to do the same espionage work for the same organisations the CIA and NSA subsidised by more taxpayers money and with no public scrutiny.

The mainstream media, Snowden argues, is in cahoots with the government, hiding what they are up to. Nine years before his whistleblowing revelations, the NYT quashed Pulitzer Prize-winning journalist James Risens article just before the 2004 presidential election that would have shown the Bush administrations order to vacuum up US cyber data without a court order.

The programme was known as Stellar Wind and when Snowden learned of it and others such as Xkeyscore and Prism, he was inspired to reveal what he knew about the secret and unconstitutional malfeasance of his government.

Snowdens concluding message to the heroes-in-waiting the future class of democracy-lovers and whistleblowers is explicit: If we dont reclaim our data now, future generations might not be able to do so We cant let the godlike surveillance were under be used to predictour criminal activity.

An excellent book, for children and parents alike.

Published by Pan, 9.99. This is an edited review of an article that first appeared in Counterpunch, counterpunch.org.

Visit link:
Permanent Record: How One Man Exposed the Truth about Government Spying and Digital Security - Morning Star Online

Former NSA official explains how the agency ran offensive operations – Business Insider

Philip Quade has simple advice for cybersecurity teams across the world: Move fast to avoid breaking things.

Quade, former special assistant for cyber to the director of the National Security Agency, believes most security teams undervalue speed as part of their day-to-day operations and could benefit by adopting the NSA's "pedal to the metal" approach.

Now the chief information security officer at the security firm Fortinet, Quade is aiming to impart his strategy on private sector players. He discussed the guiding principals behind his approach as well as common cybersecurity pitfalls during an online panel hosted by AT&T cybersecurity director Theresa Lanowitz on Wednesday.

"NSA put the pedal to the metal, meaning it did things strategically," Quade told Lanowitz. "It was all fundamentally built around the philosophy of doing things very, very quickly."

Quade's three decades of experience at NSA gives him a unique perspective: As the agency's top-ranking cybersecurity official during the Obama administration, Quade oversaw both defensive and offensive operations, gaining insight into both sides of cyberwarfare.

The NSA's adherence to moving quickly powered its intelligence-gathering operations during those years, Quade said. Most people became familiar with the details of those operations in 2013 when Edward Snowden, an NSA subcontractor, leaked documents showing that the agency was collecting millions of Americans' mobile phone call records in search of terrorists. A subsequent federal law discontinued the practice.

"Everything that NSA did was completely authorized by the President, the courts and the Congress ... and ultimately when some of those things became more widely known, it scared the public a little bit and in the courts and Congress and the White House kind of recalibrated to be consistent with public interests," Quade said Wednesday. "But one of the fundamental strategies of NSA was being able to do things at speed and scale."

Three problems have proven particularly hard to solve for most cybersecurity teams: authenticating people's identities online, training their organizations' staff on cybersecurity basics, and patching vulnerabilities. Prioritizing speed in all three areas can be a useful framework for improving defenses, Quade said.

"If we could have solved what has solved the authentication problem from the beginning, we wouldn't be in business today. And what I mean is that lack of trustworthy authentication is the root cause of nearly all cybersecurity problems," Quade said.

Fortinet CISO and former special assistant for cyber to the director of the NSA Phil Quade Fortinet

One way to build speedier authentication defenses is to protect against "known unknowns" by adopting tools that detect unusual behavior on their networks like an employee attempting to log in at an unusual time or unfamiliar location and automatically shutting down the attempt.

Quade added that organizations should update software as often as possible to throw off attackers, noting that software patches posed an obstacle to the NSA's offensive operations when he worked there.

"As a person who was authorized by our overseers to do offensive operations against others, it was relatively easy to find vulnerabilities and develop exploits," he said. "But what made it really, really hard was when the systems were patched or when the systems changed."

Quade and Lanowitz both predict that security teams will increasingly adopt a "zero trust" model that assumes any device or account on its networks could be compromised at any times and builds in security checks accordingly. Fortinet announced a new suite of zero trust capabilities for its cybersecurity software on Thursday.

"Your network would be perfect if it wasn't for these carbon-based lifeforms that have to live on top of it," Lanowitz said.

Companies are more likely to need to prioritize zero trust in their security systems now in the wake of the COVID-19 pandemic, Lanowitz added. Employees are working from their home networks, which often lack the protections of corporate systems.

Read more here:
Former NSA official explains how the agency ran offensive operations - Business Insider

Washington Post Executive Editor Marty Baron On Retiring, Objectivity And The State Of Journalism – Here And Now

One of the most consequential journalists of our time is calling it a career.

Washington Post executive editor Marty Baron may be best known to the public through the actor who played him in the Oscar-winning film Spotlight" about The Boston Globe's investigation into clergy sex abuse in the Catholic Church. The Globe went on to write many more stories and win a Pulitzer Prize, one of 17 Baron has contributed to.

After a journalism career spanning 45 years, Baron says nows the right time to retire. The Post is in a good place, he says, adding retirement will finally give him a much-needed break after almost five decades in the newsroom.

In a note to The Post staff, Baron listed some of the biggest stories of his career. He was top editor at the Miami Herald when the Bush v. Gore Supreme Court ruling was underway in Florida. Under his leadership, The Post revealed the National Security Agencys sweeping surveillance program through documents leaked by Edward Snowden in 2013.

But a lesser-known story 5-year-old Elin Gonzlezs return to Cuba in 2000 stuck with him, Baron says. As a young boy, Gonzlez was picked up at sea after his mother, who drowned attempting to flee Cuba, tried to escape the country and join relatives in Miami.

The boys father wanted him back, promoting an international custody battle that pulled at the heartstrings of many Cuban Americans living in Florida. Ultimately, Gonzlez was returned to his father.

Baron says looking back, covering the story taught him lessons hed carry through his career. At the time, he and others at the Miami Herald could have listened more closely to the Cuban American community as the story was unfolding.

They felt as if this boy had somehow gotten over the equivalent of the wall in Berlin and had made it to freedom and that it made no sense and it was unjust to return him to Cuba, he says. Agree or disagree, it was our obligation as journalists to listen and listen closely to what they were saying and why they were saying that. We did that. I still think that we might have done better.

In the coming decade, the journalism industry, specifically local newsrooms, will have to wrestle with a glut of challenges, he says. Maintaining strong local journalism is vital if we intend to have strong communities at both the state and local level, he says.

The most consequential hurdle journalism faces today is society's refusal to agree on a common set of facts, he says. He argues Sen. Daniel Patrick Moynihans famous 1983 quote Everyone is entitled to his own opinion, but not his own facts no longer exists.

These days, people believe that they are entitled to their own facts, Baron says. Those so-called facts may be disconnected from reality. They may not be supported by evidence, but people continue to hold onto them because they reinforce their preexisting points of view.

A society that denies facts presents obstacles to both the press an imperfect arbiter of fact and American democracy itself, he argues.

How do we have a functioning democracy if we cannot agree on a common set of facts? And how do we have journalism if people will not accept our role as an arbiter of facts? he says. ... That is a huge challenge for journalism today and a huge challenge for democracy.

On the tense relationship between the press and politicians

There's always going to be tension between politicians and the media. I think certainly during the Trump administration, it was at a very low point. I hope we don't go lower than that. Look, he described us as enemies of the people, as traitors, as garbage scum. The administration, in many instances, treated us that way. And then its followers, whether they were politicians or ordinary citizens, started to treat the press that way. I hope that we're beyond that. I think that there will always be tensions between the press and government officials, but it needs to be respectful. And I think we're going to get back to that. There will be tensions with the Biden administration. There's no question about that.

There's an assumption with people who lean to the right ideologically that we had a warm, cozy relationship with the Obama administration at The Washington Post we did not. We were consistently denied interviews with President Obama in the final two years of his presidency, despite continually asking for one. And they said no repeatedly because they didn't see us as a place where they would go unchallenged. And that's OK, because they should be challenged regardless of whether they are in the Democratic Party or the Republican Party, regardless of who they are.

On enforcing journalistic notions of objectivity on social media platforms

Well, first of all, I don't tweet anymore because I've grown to dislike Twitter as a forum for a sophisticated discussion of the issues of the day. But we allow people to participate in social media. Of course, that's fine. They can have a social media presence, but we try to take great care with what we publish. And we have layers of editors who review what we intend to publish to ensure that they meet the standards and principles and core values of The Post. We want to hear the voices of people who come from different life experiences, people of different identities, people who see the world differently. We want them to share those perspectives internally. We want to see it manifested in the journalism that we practice. But we need to make sure that when people are on social media that they are meeting the standards that we try to enforce in our journalism and in other forums as well.

On defining objectivity in journalism

We need to understand what objectivity is and what the origin of that term was. The origin really dates back 100 years to Walter Lippmann when he wrote about it. And I think people have routinely mischaracterized what objectivity is. It's not neutrality. It's not both sides-ism. It's not so-called balance. It is that a recognition, in fact, that all of us have preconceptions and that when we go about our reporting that we need to approach stories in an open-minded, fair, honest way and do our reporting and do it really thoroughly and do our research and the most rigorous possible way. And when we've done that, the notion of objectivity is that we will then report what we find in a direct, forthright, unflinching way.

The idea of objectivity was to counter the propaganda of the era during the Woodrow Wilson administration. So I think it's a good concept, and I don't think the alternatives are terribly good. And the alternative is that in a newsroom that every individual should be able to say whatever he or she wants, however he or she wants to. And I don't think that really works terribly well. And it has the effect of undermining the reputation of the institution. And I think it's important to point out that we are an institution. We are not just a collection of individuals. We as an institution stand for the practice of journalism in a certain way. In fact, our principles were set down in 1935. They are on the wall as you walk into our newsroom. They've served us well all these years, and I think they continue to serve us well.

Jill Ryanproduced and edited this interview for broadcast withTinku Ray.Serena McMahonadapted it for the web.

The rest is here:
Washington Post Executive Editor Marty Baron On Retiring, Objectivity And The State Of Journalism - Here And Now

Seeing the Pentagon Papers in a New Light – ProPublica

This column was originally published in Not Shutting Up, a newsletter about the issues facing journalism and democracy. Sign up for it here.

On Jan. 7, The New York Times published an obituary for Neil Sheehan, the veteran foreign correspondent who broke the story of the Pentagon Papers, the U.S. Department of Defenses deeply critical secret history of Americas involvement in Vietnam. The obituary was accompanied by an article, which Sheehan insisted be published only after his death, that purported to reveal for the first time Sheehans account of the greatest journalistic catch of a generation: how Sheehan had obtained the top secret documents from Daniel Ellsberg, a Rand Corporation analyst who had turned against the war.

Contrary to what is generally believed, the story reported, Mr. Ellsberg never gave the papers to The Times, Mr. Sheehan emphatically said. Mr. Ellsberg told Mr. Sheehan that he could read them but not make copies. So Mr. Sheehan smuggled the papers out of the apartment in Cambridge, Mass., where Mr. Ellsberg had stashed them; then he copied them illicitly, just as Mr. Ellsberg had done, and took them to The Times.

Subscribe to the Big Story newsletter.

The story was mostly lost in the frenzy following the assault on the U.S. Capitol on Jan. 6, but it seemed like a perfect subject for this column. I planned to explore questions about journalistic ethics and whether the ends of getting a scoop that might change history and save lives can ever justify lying to a source.

I set out on the journey that every ProPublica reporter undertakes on every story, the work of verifying the basic facts. And thats when the column I had already written in my head began to fall apart.

I reached a former Times colleague who knew the Pentagon Papers story. He told me that Sheehans account was both old news and disputed. He said that Ellsberg, who is still alive, had replied to the Times story online. A quick search brought me to Ellsbergs website, where on Jan. 12 he had posted passages from his 2002 book Secrets: A Memoir of Vietnam and the Pentagon Papers.

In the book, Ellsberg recounted how he stashed a copy of the top secret documents in a Cambridge, Mass. apartment and gave Sheehan a key in March 1971. He said he told Sheehan he could take notes but not make his own copy of the papers unless and until someone high up there had decided the newspaper was ready to publish, and to publish large quantities of them.

Soon after, Ellsberg wrote, Sheehan and his wife Susan, a New Yorker writer, came to Cambridge on a weekend when he knew Ellsberg would be out of town, removed the full set of papers from the apartment, and took them to a copy shop in Medford.

A 1980 book by Harrison Salisbury, a former Times editor, draws from what the author describes as repeated interviews with Ellsberg and Sheehan to tell much the same story, noting that a couple identifying themselves as Mr. and Mrs. Thompson" (Neil and Susan Sheehan) checked in to the Treadway Motor Inn in Cambridge on March 19, 1971, entered the apartment, stuffed 60 pounds of classified documents into shopping bags, and headed to a copy shop.

The notion of centering my column on new revelations about the origins of the Pentagon Papers seemed to be collapsing. I reached out to Janny Scott, who conducted the posthumously published 2015 interview with Sheehan and wrote his obituary and the accompanying piece for the Times, to ask how to square the historical record with her framing of the story. She acknowledged that many parts of the story had already been told, but argued that Sheehans own account of his cloak and dagger pursuit of the papers was new and fascinating. [He] had been interviewed at length hundreds of times over the years, she wrote in an email, and went to some lengths to keep the details of his actions obscure.

As I often tell reporters at ProPublica, one door closes, another opens. Sheehans revelations might not have been as fresh as I first thought, but that didnt prevent me from exploring the ethics and history of the Pentagon Papers as we near the 50th anniversary of their publication in June. I found contact information for Ellsberg and we agreed to meet by Zoom.

The Ellsberg of 2021 bears a strong resemblance to the brilliant, dashing character at the center of one of the most pivotal moments in legal and journalistic history. The shock of black hair that jumps out of 1970s photos is thinning and white he is now nearly 90 but Ellsberg retains the precise, detailed recall of events, memos and history that made him a top analyst at the Rand Corporation.

I asked him about how he felt all these years later about Sheehans duplicity. His answer was surprisingly equanimous. Then and now, who better understands that there are very strong procedural, moral and ethical rules that have to be re-examined and in some circumstances violated?" he told me.

Sheehan, he said, was a good guy and it all came out all right in the end."

The high-stakes dealings between source and reporter are frequently complicated. People who turn over secret documents are taking enormous risks, and they often want assurances that the revelations will have the largest possible impact. Ellsberg said he understood that Sheehan and his editors couldnt make binding promises, but he wanted to push the Times to make the Pentagon Papers more than a one-day story. The papers were a 47-volume history that documented how a succession of presidential administrations from the 1940s to 1968 had misled and lied to the American people about the war. Ellsberg hoped that the release of the documents in their proper context would lead to Congressional hearings in which the key players would be grilled on national television, creating pressure for President Richard Nixon to end the war.

In his posthumously released interview with the Times, Sheehan asserted that he had to do what he did because Ellsberg was behaving recklessly and sharing the papers with a widening circle of other people. It was just luck that he didnt get the whistle blown on the whole thing, he told Scott.

Ellsberg vigorously disputed that point, saying it was Sheehans lies to him that made him begin to look for other possible ways to make the material public. According to Ellsberg, in the weeks after Sheehan smuggled out the papers, he falsely told Ellsberg that the Times was moving slowly, that he was being given other assignments, and that he could only work on the blockbuster story on nights and weekends. (In fact, the Times had rented rooms at a Hilton near its 229 W. 43rd St. newsroom and put dozens of reporters and editors on producing what was planned as a multi-day series.)

Ellsberg said he ultimately gave Sheehan a copy of the papers he had in a New York apartment in April. (The Salisbury book based on late 1970s interviews with the two protagonists says Sheehan obtained that set of the papers open and above board in May, a date Ellsberg acknowledged might be correct.) Sheehan continued to provide misleading cues on the Times slow progress on the story, prompting Ellsberg to step up efforts to find a member of Congress who would make the material public.

Ellsberg contacted multiple legislators, but none would play ball. On June 12, 1971, Ellsberg received a panicked call from a Times editor to whom he had given a portion of the papers for a book the editor was writing on the Gulf of Tonkin incident that had precipitated Americas deeper involvement in the war. The editor was correctly worried that his book, which was not slated to come out for weeks, would be overshadowed by the imminent publication of a massive series of stories on the papers, including their revelations about the Gulf of Tonkin incident. He told Ellsberg the Times was on high alert, expecting the FBI to raid the building at any moment.

Ellsberg had heard nothing from Sheehan and frantically called him. Theyre expecting the FBI any moment and Neil hasnt mentioned that to me; he hasnt given me any warning over the last week or the last month or, for Christs sake, this morning! Ellsberg wrote in his book. According to Salisburys account, Sheehan did not attempt to return the call until the next day, and only after 100,000 copies of the paper had been printed.

The publication of the papers had enormous consequences, but hardly any of the ones intended by those involved. They did not prompt Congressional hearings; Ellsberg speculates that the Democrats who controlled Congress quickly realized that the bulk of the lies documented in the study had been told by Presidents Lyndon B. Johnson and John F. Kennedy.

A federal judge halted the papers multi-part series after the Nixon administration alleged that further disclosures posed a grave threat to national security. The Washington Post and 17 other newspapers obtained their own set of the papers from Ellsberg and continued to publish as federal prosecutors dashed from city to city in a futile effort to obtain injunctions that would stop the presses.

Amazingly, Ellsberg and his wife evaded the FBI for 11 days, spreading copies of the Pentagon Papers across the country through a network of activists. He eventually turned himself in and faced federal charges that could have brought a sentence of more than 100 years in prison. Ellsberg was acquitted only after the Nixon administration was forced to reveal its extensive misconduct, including a burglary of Ellsbergs psychiatrists office by the same group of 'plumbers' who were later caught breaking into the Watergate Hotel.

As for the papers themselves, the Supreme Court ruled that the judges could not impose prior restraint on news organizations without extraordinary justification, a decision that made possible countless subsequent investigations into government misconduct under the cloak of secrecy, from Seymour Hershs famed exposes of the CIA to Edward Snowdens leaks of National Security Agency documents to reporters writing for The Guardian and Washington Post.

The questions about the ethics of Sheehans dealings with Ellsberg linger. Every major news organization, including ProPublica, has a written ethics policy that lays out broad rules. Dont lie to readers or pose as someone else to sources. Dont pay for interviews or accept money from people or industries you cover. Dont advocate for political candidates or parties. Give everyone a chance to respond to stories about them.

In that regard, Ellsberg has a new bone to pick with the Times. The piece on Sheehan concludes with an anecdote told by Sheehan in which he described bumping into Ellsberg on the streets of Manhattan and discussing what had happened.

So you stole it, like I did," he recalled Mr. Ellsberg saying.

No, Dan, I didnt steal it," Mr. Sheehan said he had answered. And neither did you. Those papers are the property of the people of the United States. They paid for them with their national treasure and the blood of their sons, and they have a right to it."

Once again, Ellsberg lamented not receiving a phone call from the Times before the Sheehan story was published. Had he been asked, he would have said the story was untrue and that he would never have said Sheehan stole the papers. His view then and now is that it wasnt theft; Sheehan simply copied them. Why didnt they call me?" he wondered.

Scott said she wrote the story with the understanding that it would be confidential until Sheehans death. For that reason, she did not feel she could interview Ellsberg or anyone else about Sheehans statements. The decision to post the story without further comment, she said, was one for editors."

Speaking only for myself," Scott said. I think that in retrospect I should have asked that the piece be held."

Dealing with sources is not as rigidly defined as some aspects of journalism ethics, but it remains a crucial aspect of our business. Fifty years later, it seems easy, and a bit unfair, to render judgments on Sheehan, a superlative but tormented reporter who had come to passionately oppose a war he knew was fueled by government lies.

For me, I find it very hard if not impossible to imagine ever allowing a ProPublica reporter to copy documents in defiance of a confidential sources wishes.

Of course, investigative reporting involves ambiguities. If a government official places a juicy document on her desk and says shell be out of the office for the next hour but feel free to stay as long as you need, can you put the document in your backpack and walk out? (I would say yes; she clearly wants you to take it.) If an official glances down at a document and you have learned the art of reading upside down, is it fair to look? (I would say yes again, although of course anything you see is just a tip that needs to be checked out and verified.)

Lying is lying. If an official or legislator is an off the record source for our story, should we quote that person on the record as having said no comment? No. In fact, hell no.

To say otherwise when the stakes are high is to adopt the least morally defensible excuse of the people and institutions we investigate: The ends justify the means. At a time when one survey found 56% of Americans agree with the statement "journalists and reporters are purposely trying to mislead people by saying things they know are false or gross exaggerations, it is imperative that we think through our ethics and be prepared to offer a cogent explanation for our decisions when they become known.

Can the ends justify the means? Not for me.

Here is the original post:
Seeing the Pentagon Papers in a New Light - ProPublica

Types of Insider Threats: What Are They and How to Guard Against Them – FedTech Magazine

The Cybersecurity and Infrastructure Security Agency notes that insider threats can be expressed in several different ways. Source: CISA

For example, it might be a user in accounting who suddenly goes for the first time ever into the file directory that has top-secret information onan agencys high-value assets, according to Kovar. Or, perhaps the information is not top-secret but is something that has nothing to do with the users normal work.

If there is a user who normallydoesinteract with high-value assets and information, an unusual aspect or behavior might be that the IT security team has detected the user has downloaded the information to the desktop and put it on a USB drive for the first time.

This behavioral monitoring requires the agency to map out the baseline of normal behavior for users, Kovar notes.

We can condense through peer group analysis, and say, Hey, this person does this thing every single day. Why are they accessing these folders or this email directory for the first time ever? Kovar says.

Insiders are much more likely to use physical exfiltration, such a printing out documents, copying information on local hard drives and accessing data via USB drives and ZIP disks, Kovar says.

Other behavioral indicators of insider threats that CISA notes include observable resentment with plans of retribution; excessive or unexplained use of data copy equipment (scanner, copy machine, cameras); bringing personal equipment into high security areas; disgruntlement toward peers due to perceived injustice; and excessive volunteering that elevates access to sensitive systems, networks, facilities, people or data.

Technical indicators of insider threats noted by CISA include email messages with abnormally large attachments or amounts of data, Domain Name System queries associated with dark web activities, the use of activity masking tools such as VPNs, connecting an unauthorized device to the network, downloading or installing prohibited software, unexpected activity outside of normal working hours and attempts to bypass or disable malware protection tools or security controls.

READ MORE:Learn why agencies should take a new approach to data security in 2021.

CISA lays out the ground rules for creating an effective insider threat mitigation program. They include the ability to identify and focus on those critical assets, data, and services that the organization defines as valuable.

The program must also monitor user behavior to detect and identify trusted insiders who breach the organizations trust. Another key element is that the program assesses threats to determine the individual level of risk of identified persons of concern.

An effective program must also manage the entire range of insider threats, including implementing strategies focused on the person of concern, potential victims, and/or parts of the organization vulnerable to or targeted by an insider threat.

Solid programs, CISA states, must also engage individual insiders who are potentially on the path to a hostile, negligent, or damaging act to deter, detect, and mitigate.

Link:
Types of Insider Threats: What Are They and How to Guard Against Them - FedTech Magazine

Julian Assange Remains Safe From Extradition After Judge Rules He Is a Suicide Risk – The Organization for World Peace

Julian Assange, the Australian founder of the infamous website WikiLeaks, appeared in a British court in early January to attend a hearing as to whether he would be extradited to the United States. The United States has been rather adamant on his extradition, trial, and near certain conviction for his involvement in publishing American military related documents which violated espionage-related laws. Assange has spent much of his recent life in either prison or in self-imposed confinement in the Ecuadorian embassy thereby making extradition a diplomatic nightmare. Citing the past decades worth of mentally debilitating living situations as well as numerous thoughts of suicide already, Reuters reports that Judge Vanessa Baraitser denied the American request for extradition on the grounds that suicide would be more likely than not for Assange given the almost certain nature of his future imprisonment should extradition occur.

Assanges case is a pinnacle example of where freedom of speech and freedom of the press can ride a fine line for governments when the freedom to speech can directly lead to the endangerment of others. For Assange, the publication in question is a 2010 report of American military action that occurred in 2007, where Apache helicopters opened fire in Baghdad killing a dozen people, including two innocent Reuters news staff. Due to the lack of reporting on this event, WikiLeaks and Assange took it upon themselves to make this public, as well as thousands of other classified intelligence documents, thus violating espionage laws and endangering American soldiers.

The polarizing nature of weighing freedom of speech against military intelligence, as is present in the Assange case, has led to inconsistent policy on what to do about Assange. This story began during Barack Obamas presidency to which he determined that America would not seek to prosecute Assange due to the dangerous precedent it could set for freedom of speech and investigative journalism, as reported by Reuters. However, under the Trump administration America has been actively pursuing extradition since 2019, and Judge Baraitsers ruling to not extradite Assange will be appealed by America.

Trumps stance on WikiLeaks appears to be one of the most dangerous parts of this story due to the ever-changing rhetoric about the company. In 2016, Trump praised WikiLeaks for leaking thousands of emails regarding general election opponent Hillary Clinton. This is dangerous when paired with the reality of the active pursuit of Assange juxtaposed to praise of the company; it creates the sentiment of illegal-activity-is-okay-when-it-suits-me, which can arguably encapsulate the whole Trump administration. It will be important to watch as to whether or not the Biden administrations policy returns to Obamas non-prosecution stance.

Assange has been receiving more and more support from various nations saying that his work was essential to freedom of speech, with even Mexican president Andres Manuel Lopez Obrador offering Assange political asylum which would end the extradition saga should he go to Mexico.

Judge Baraitsers assessment that Assange would be at an even greater risk of suicide should he be extradited to America is correct. The reality of Assanges future is laid out by Reuters where they speculate that a trial would not be fair and would result in Assange being placed in near isolation in a maximum-security prison. This takes a toll on even the strongest of minds let alone the one that has already been living in self-imposed isolation. If it is Assanges life that must be considered first and foremost, then stopping the relentless pursuit of him would be the best step forward. The documents that were published are no longer relevant and no longer pose a threat to American soldiers or other covert operations, as such the precedent set would be that justice will be given under any circumstances even after ten years.

This is a dangerous path to go down for a country that has been built under the supposition of free speech. As such, the best path forward would to be to return to the Obama-era policy where prosecution will not be pursued. Should WikiLeaks violate espionage laws again a better path forward may be to go after the site and not the founder through the court system to ensure legitimacy.

Continued here:
Julian Assange Remains Safe From Extradition After Judge Rules He Is a Suicide Risk - The Organization for World Peace

What Assange and WikiLeaks said about Australia – Sydney Morning Herald

He has been called truth-telling hero, evil and perverted traitor, heroic, trickster, mythical reviled. Robert Manne called him the most consequential Australian of the present time. The new US President has called him a high-tech terrorist.

The protean narratives of Julian Assange, who will be 50 in July, have been brewing since 2010, when his website published The Afghan War Diaries, Iraq War Logs and Collateral Murder, a video showing the US military killing two Reuters employees in Iraq.

Supporters of Julian Assange outside Londons Old Bailey during his extradition hearing.Credit:Leon Neal

December marked 10 years since Assange has been arbitrarily detained in Britain, according to Felicity Ruby and Peter Cronau in their introduction to A Secret Australia a collection of 18 essays that survey the impact WikiLeaks has had on Australias media landscape and the consequences of our governments attraction towards Americas intelligence and military empire.

The potpourri of authors and thinkers includes Julian Burnside, Antony Loewenstein, Scott Ludlam and Helen Razer, who critique the powers opposed to openness and transparency and examine the evidence, not the likelihoods, the probabilities, the suspicions, and assumptions around the subversive, technology-based publishing house.

Read the original post:
What Assange and WikiLeaks said about Australia - Sydney Morning Herald