*The live streams have been set to private for unknown reasons. The Centre for Investigative Journalism hosted the event so I assume they are the ones who did it. They said they will be posting the videos in the coming week, LeakSource will update this post when they do so. In the meantime you can complain to them here.
The 2014 Logan Symposium brings together key figures in the fight against invasive surveillance and secrecy.
Organized by the Centre for Investigative Journalism and generously funded by The Reva and David Logan Foundation, this year’s inaugural event features leading journalists and hacktivists. They form a natural alliance committed to a world free of authoritarian invasions of individual privacy and free speech.
Seeking common ground, journalists offer hacktivists a social and political context, as well as expertise in evidence-based storytelling. Hacktivists, expert in accessing, exposing and protecting critical evidence-based material, bring their own set of formidable skills.
Joined by artists, lawyers and whistleblowers, these communities will offer each other, and the general public, charged, highly informed debate. Now that the Snowden disclosures have sunk in, it’s time for uncensored talk about the immediate threats we face.
Day 1 – December 5th
(@47m50s) INTRODUCING THE FIGHT
Surveillance, censorship and secrecy exists throughout history. It is only the methods which change in different eras and different cultures. To investigate the dominant power structures, demands knowledge, courage, rigour and smart use of sources and technologies. Being an investigative journalist is a dangerous profession.
(@2h26m33s) SYSTEMS OF SURVEILLANCE
Current IT technologies are operating at a pace and scale faster than ever before. As a result, governments have been developing systems of surveillance that are intruding deeply into the lives of millions of people. Many people are not aware of this. Speakers at the LoganCIJ Symposium are addressing specific surveillance systems in Europe, USA and India.
(@5h03m10s) WHAT WE DO NOT SEE
As citizens we do not see or hear most of what is going on behind the scenes in current media and technology developments. Today, in war zones, free investigation and honest reporting is hardly possible anymore. Journalists are often embedded in the army, which results in them becoming part of a propaganda campaign. Interfaces to the internet and mobile networks also veil the implications of the use of these technologies. When many secrets are exposed, as in the Snowden case, how do mainstream media select and favour certain facts over others? Ownership of media and deep connections between governments and media affect what the public gets to see.
Are there systems we can think of that do not allow for mass spying and intrusion of millions of people?
INVESTIGATIVE JOURNALISM AND PROPAGANDA – John Pilger
INVISIBLE USERS – Olia Lialina
WORKING WITH THE SNOWDEN REVELATIONS – Andy Müller-Maguhn
SYSTEMS WE NEED – Ross Anderson
Moderator: Gavin MacFadyen
(@8h04m08s) HACKING EUROPE
Since the 1980’s in Europe, and in other parts of the world as well, hackers united and started to ‘hack’ to show how global systems were being developed with massive spying capacity. This had promised to be safe and trustworthy, but despite assurances, the systems were not safe and trustworthy at all. To be a hacker, someone who is capable of making a smart intervention in the system, one has skills and intentions that involve serious responsibilities. In the Chaos Computer Club the debate on ‘hacker ethics’ has been vital since the CCC was founded in 1987. This session in the symposium starts with a theatre play that is based on the transcription of a conversation in 1989 between Wau Holland, one of CCC’s founders, and a young hacker called Pengo, who had just collaborated with the KGB.
The book Hacking Europe is also presented in this session which gives us for the first time an overview about different ‘hacking practices’ in different European countries over the last few decades; including for example, events that happened during the Yugoslav war (1991-1999). This history of resistance against the emerging surveillance society is more diverse than is often realised.
Given the rich history of hacking in Europe and in particular the history of the CCC, what future of the CCC can be envisioned?
(9h19m57s) THE SNOWDEN EXAMPLE
Laura Poitras will discuss how the Snowden revelations were orchestrated. She is the documentary filmmaker whom Edward Snowden contacted after having collected the NSA material. She then contacted the journalist Glenn Greenwald to make his disclosures public. Poitras made the film CITIZENFOUR about all these events, which will be shown Sunday morning.
(@10h13m18s) DOING LEAKS JUSTICE
How to publish large data collections of leaked documents for global impact? What does full source protection really mean? How to publish documents to allow for justice to be brought and history to be preserved? From the publisher that paved the way in publishing more secret documents than the rest of the world’s media combined there are a number of lessons to be learnt in the battles they have fought. WikiLeaks Investigations Editor, Sarah Harrison will examine the issues they have faced and the methods they have used to survive in the face of the largest investigation into a publisher ever seen.
(@10h39m09s) ROLL CALL OF PERSECUTED JOURNALISTS AND HACKERS
In countries around the world investigative journalists and hackers are persecuted and put in jail for telling the truth. Often isolated in their fight, CIJ is an invaluable resource for support and intelligence gathering for these fighters and for young journalists who are learning how to fight.
Read by Francis Magee
DAY 2 – December 6th
When someone who is working in an organization finds out about things that are going wrong and are being covered up, it is not easy to decide to become a whistleblower. When you do, former colleagues can turn against you and those in power will do anything to prevent a whistleblower from telling their story. Whistleblowers face considerable hardship, public exposure, and many threats. Whether a hospital nurse or laboratory technician or a high official in the security services, their legal defence requires rigorous investigations and it is often hard to get proof. In this session both the choice to become a whistleblower as well as the legal defence of whistleblowers are discussed.
(@1h31m07s) METHODS FOR INVESTIGATION
Being an investigative journalist in the era of ubiquitous technology requires special skills in protecting sources and working with whistleblowers. The Internet is a source for surveillance and secrecy, as it is a source for investigation. Especially in the alliance between investigative journalists and hackers, mayhem and mishap can be exposed.
(@4h21m33s) VISION OF TIMES TO COME
Big data monitors the behaviour of millions of people; secrecy in business networks is beyond public perception; nation states put large scale smart surveillance systems in place and we have 24/7 media everywhere.
What happens to the truth? In this fast pace of global information flows, what legal futures can we envisage? The law is contained in nation states so far, and for example, multinational corporations move globally to where opportunity emerges and there is little transparency or accountability.
How can investigative journalists of the future unveil the expanding networks of secrecy? Can the dark Internet be better understood?
(@6h44m43s) STRATEGIES FOR SURVIVAL
When involved in any activity that those in power consider dangerous, strategies for safe communication are vital. Old school tactics are less known these days, but can save lives in the era of omnipresent technology. On the other hand, we also need new communication systems; we need new operating systems in which individuals remain in control of their own data and data flows.
OPERATIONAL SECURITY – Annie Machon
SECURITY DILEMMAS IN PUBLISHING LEAKS – Sander Venema
ANONYMITY – Jacob Appelbaum via video link
ADVERSARY RESISTANT COMPUTING – David Mirza Ahmad
Moderator: Gavin MacFadyen
(@8h11m43s) KEYNOTE: FUNDAMENTAL RIGHTS
In the Cypherpunks book (PDF/6MB) and conversations that were broadcast by Russian TV, Julian Assange argues that fundamental rights underlying our human rights are in jeopardy because of today’s all pervasive systems of surveillance and power alliances. Under threat are our freedom to communicate, our freedom of movement and our right to do transactions.
BIG DATA POETRY (VIDEO UNAVAILABLE)
Big Data Poetry is an audiovisual live performance by Geert Mul (Images) and Michel Banabila (Sound). Samples, vowels and consonants of various linguistic systems are formed into soundscapes by Michel Banabila, while millions of random downloaded images are stitched into stop motion animations by Geert Mul. During the performance Mul and Banabila are led by the flow of the moment, manipulating sound and image in relation to each other. In an increasingly globalizing world this performance generates variations and diversity, in a new, poetic and sometimes intimidating audiovisual data-based language.
DAY 3 – December 7th
(5:30AM EST) MEET, LEARN AND UNITE
These morning sessions offer participants the opportunity to engage in deeper and longer conversations on specific issues. Surveillance and censorship around the world is well organised. Countering these forces demands that we meet, learn and unite.
Auditorium – FILM – CITIZENFOUR
Room 1 – FIGHTING FOR NEW LAWS (SHOWN ON LIVE STREAM)
How do legal systems need to adapt and be transformed in the era of mass surveillance in which privacy and freedom of speech are becoming less and less respected as the foundations of the democracies we live in.
Room 3 – FREE SOFTWARE AND YOUR FREEDOM
This session is dedicated to the concept of free software. Free software gives users the freedom to run the software for any purpose as well as to study, modify, and distribute the original software and the adapted versions. This concept is the basis of almost all security solutions we are likely to use.
Room 5 – HACKING MAINSTREAM MEDIA
When the Wikileaks cables and after the Snowden revelations were gathered, there were for a while journalistic processes through which main stream media played a significant role, including Der Spiegel, Le Monde, El País, The New York Times, The Guardian, CNN, RTV, and many national newspapers around the globe participated in publishing this material. How does such a process work now? What are the do’s and don’ts? How can such a process be orchestrated effectively in the digital age?
(8:00AM EST) VISUAL INVESTIGATIONS
We are living in an increasingly visual culture. Many people are making images and films as part of their day-to-day experience. But how does truth emerge through this? Investigative filmmakers and investigative journalists and photographers face specific issues in being able to circulate the results of their investigation via mainstream media. New technologies are offering new ways of researching and on-line publishing of investigations. Seemingly neutral, these technologies represent structures of power. Forensic media and big data can significantly change the way we perceive the discourse of truth-telling.
(10:30 AM EST) FUTURE ALLIANCES
Building an alliance against surveillance censorship and secrecy requires new ways of exchanging knowledge and establishing trust between journalists and hacker/ technologists and anonymous sources. How can such alliances be built? What are the requirements for such alliances to be productive?