Wiki Revolution: Difference between revisions
Jump to navigation
Jump to search
mNo edit summary |
Florez4747 (talk | contribs) No edit summary |
||
Line 20: | Line 20: | ||
"what is set forth in these proposal... quite possibly constitutes serious crimes. Manufacturing and submitting fake documents with the intent they be published likely constitutes forgery and fraud. Threatening the careers of journalists and activists in order to force them to be silent is possibly extortion and, depending on the specific means to be used, constitutes other crimes as well. Attacking WikiLeaks' computer infrastructure in an attempt to compromise their sources undoubtedly violates numerous cyber laws."<ref>http://www.salon.com/news/opinion/glenn_greenwald/2011/02/11/campaigns/index.html</ref> | "what is set forth in these proposal... quite possibly constitutes serious crimes. Manufacturing and submitting fake documents with the intent they be published likely constitutes forgery and fraud. Threatening the careers of journalists and activists in order to force them to be silent is possibly extortion and, depending on the specific means to be used, constitutes other crimes as well. Attacking WikiLeaks' computer infrastructure in an attempt to compromise their sources undoubtedly violates numerous cyber laws."<ref>http://www.salon.com/news/opinion/glenn_greenwald/2011/02/11/campaigns/index.html</ref> | ||
= Sources = |
Latest revision as of 19:33, 30 June 2023
Wikileaks
War Crimes Reporting
Bush Administration | Fox News:
https://www.foxnews.com/opinion/why-do-we-keep-ignoring-the-wikileaks-threat
War on Wikileaks
"what is set forth in these proposal... quite possibly constitutes serious crimes. Manufacturing and submitting fake documents with the intent they be published likely constitutes forgery and fraud. Threatening the careers of journalists and activists in order to force them to be silent is possibly extortion and, depending on the specific means to be used, constitutes other crimes as well. Attacking WikiLeaks' computer infrastructure in an attempt to compromise their sources undoubtedly violates numerous cyber laws."[1]