{"id":779,"date":"2014-01-24T18:51:55","date_gmt":"2014-01-24T18:51:55","guid":{"rendered":"http:\/\/www.opensource.im\/?p=779"},"modified":"2014-01-24T18:51:55","modified_gmt":"2014-01-24T18:51:55","slug":"terabyte-leaks-and-political-legitimacy-in-the-u-s-and-china","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/terabyte-leaks-and-political-legitimacy-in-the-u-s-and-china.php","title":{"rendered":"Terabyte Leaks and Political Legitimacy in the U.S. and China"},"content":{"rendered":"<p><p>    The leaking of information is a time-honored tactic to    undermine the legitimacy of a political opponent or a policy.    Sir Winston Churchill relied on it during the run-up to World    War II to attack what he saw as weak British responses to    German rearmament.  <\/p>\n<p>    Ever the master of using information and disinformation, he    would use question time in the parliament to reveal morsels of    secret information. As part of an embarrassment strategy, these    were drawn from UK intelligence assessments of Germanys    military build-up and from UK policy planning documents.  <\/p>\n<p>    At another level, the sustained control of information has    always been viewed as central to political power. The    totalitarian governments of the 20th century were among the    best practitioners. The term propaganda came to symbolize this    technique of political control of information.  <\/p>\n<p>    In such a governance frame, the idea of a strategic leak has    always been one of a slow trickle of pieces of information.    Meanwhile, the event itself or the process in question was    unlikely to undermine the power of a determined state    propaganda machine.  <\/p>\n<p>    But now the old style of a steady flow of bit-by-bit leaks    may be passing into history. Welcome to the brave new world of    avalanche-like leaks, where the unauthorized release of secrets    has moved from a trickle to a virtual flood.  <\/p>\n<p>    And now, that flood has even biblical proportions. Wikileaks    has been a manifestation of the changing times. All that is    required is having a suitable platform to release those    occasional floods of secret information.  <\/p>\n<p>    In publishing 251,287 diplomatic cables from the U.S.    government, the Wikileaks website provided a sustained    embarrassment to the United States.  <\/p>\n<p>    While there were temporary setbacks, the leaks did not shake    the government to its core  or bring about the end of any    political career. The total file size of the entire package of    leaked cables was less than two gigabytes (2 billion bytes).  <\/p>\n<p>    But Wikileaks is passing into history. By comparison, on some    estimates, Edward Snowden took from the NSA 2,000 times as much    information (4 terabytes, or 8 trillion bytes).  <\/p>\n<p>    This did shake the United States government to the core. It did    so not because Snowden revealed unusual activities that were    not previously contemplated. The surprise lay in the scale of    activity for which the U.S. government was fingered. That    stunned people around the globe, foreigners first and,    remarkably, American citizens later.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here: <\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.theglobalist.com\/terabyte-leaks-political-legitimacy-u-s-china\/\" title=\"Terabyte Leaks and Political Legitimacy in the U.S. and China\">Terabyte Leaks and Political Legitimacy in the U.S. and China<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The leaking of information is a time-honored tactic to undermine the legitimacy of a political opponent or a policy. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-779","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/779"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=779"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/779\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}