How Can Your Digital Privacy Get Violated?

Introduction

Social media has changed the way we communicate by allowing us to connect with others around the world , quickly an efficiently but with that came the concept of Digital Privacy, the notion of “how can your digital privacy be violated?”. People can share their opinions, information, experiences, and feelings with others and participate in the exchange of ideas and information.  At the same time, social media and personal blogs have increased the power of free speech, allowing people to express themselves on a global scale. Using the phrase freedom of speech as a cornerstone of democratic societies promotes open dialogue, critical thinking, and the exchange of diverse ideas. In the meantime, the concept of digital privacy or digital information privacy becomes more meaningful. This blog will break down the effect of social media on communication, privacy, and globalization.

What effect does social media have on communication? 

Irrefutably, man has always been known as a social being, and communication with others is one of his basic needs. Today, with the advancement of technology and the emergence of social media, this social need is realized in a new way in the online environment. The main slogan of the social media concept is „communication“, and this slogan seems to match reality to some extent. Mass media such as radio, television, and press still have a significant place in society and attract a wide audience. (Araceli Galiano-Coronil, 8 September 2021) 
Since the emergence of the Internet, which is known as a platform for online media, there have been significant changes in the media. These changes show the transformation in persons‘ interactions and communication with the media. 
The dynamic spirit and excitement in social media are created through the creation and sharing of content. This dynamic creates an active and interactive environment where people can share their experiences, opinions, and ideas. One of the issues raised in the context of the impact of social networks on people’s relationships is the reduction of real interactions and their impact on social relationships. This may be caused by excessive attention to virtual interactions and time spent in the virtual environment. People who are interested in social networks and spend a lot of time in these environments may benefit from real interactions in real groups less because of virtual motivations and entertainment. (Winstone, 24 September 2021) 

This can lead to reduced daily interactions with friends, family, and colleagues. For example, in the middle of a friendly or family meeting, the desire to interact with others in the virtual environment may lead to fewer real interactions. This may cause a feeling of isolation and loss of real connections. 
In fact, social media can never replace real, face-to-face communication with others. Face-to-face interactions with others are needed to get the positive effects created by stress hormones that reduce stress and make you feel healthy, happy, and fulfilled. 

Image from the Irish Times

One of the important factors in increasing mental health and improving social interactions is face-to-face contact with people in the surrounding environment. In fact, direct contact and interaction with people in real environments can release hormones of happiness and relaxation in the body. Also, these connections can foster positive emotions and create a human connection. (Dwivedi, October, 2022) 

However, one should use social media wisely and avoid spending too much time in these environments. Excessive interaction with social media can lead to feelings of loneliness and isolation. This situation can aggravate psychological problems such as increased anxiety and depression

In addition, genuine interactions can have a positive impact on human relationships. In real environments, people can use each other’s body language, voice, and positive energy, which helps strengthen communication and create a sense of closeness. These factors are completely absent in the virtual environment and this can have a negative effect on social relationships. 
The main differences between social media and mass media are in the way of communication with the audience and the type of content. In mass media, communication is one-way and the audience receives information from news sources. But in social media, audiences not only consume content but also create or share content through their activities and contribute to content creation through their comments and feedback. (Winstone, Social media use and social connectedness among adolescents in the United Kingdom: a qualitative exploration of displacement and stimulation., 24 September 2021) 

Privacy in Social Networks

Digital privacy means preserving personal information and personal information in online and digital environments. This includes information such as name, address, phone number, email, date of birth, banking information, and other personal information that any individual submits or shares while using online tools, services, and social networks. 

Breach of digital privacy means the intrusion, unauthorized access, or inappropriate use of one’s personal information by other individuals or organizations. These violations can occur as follows:

The destruction of privacy in social networks may lead to the instability of personal relationships. People may avoid deeper interactions with others and refrain from sharing their experiences and feelings online due to concerns about sharing their personal information. This can cause a decrease in social connections and a sense of self-esteem in people. (Ünver, 2018) 

When people cannot carefully maintain their privacy online, they are likely to engage in fewer social interactions due to concerns about revealing their personal information. This may cause them to be cautious in their social interactions and avoid sharing experiences and feelings. This behavior can reduce social connections and the depth of personal relationships. 

Also, refraining from sharing experiences online may make people feel more alone and isolated. Because social interactions and sharing experiences can help create closer and deeper connections with others. On the other hand, the feeling of not being able to share can lead to a decrease in self-esteem and self-confidence. 

How to Protect Digital Privacy

Two Types of Digital Privacy Violations

  • Data Mining/Fake Information
  • Data Breach/Ransomware

There are two types of privacy violations in social networks: in the first type, Data Mining/Fake Info Spreading, the user is a member of a social network but is attacked by one of the members or an attacker who is not a member of that group through the use of their information to threaten or spreading fake information about them, and therefore the person must take measures.In this type of threat, the violation of digital privacy occurs indirectly through the interactions of people within social groups, and it is important to preserve privacy in these interactions. 

In the second type, which is Data Breach/Ransomeware people’s private information is stored by social network databases and gets breached or ransomwared to be shared publicly for different purposes. In this case, it is important to pay attention to privacy policies and settings from the users, as well as transparency and discipline from the information storage centers. Unwanted publication of personal information can lead to threatening life situations or reputation damage of either individuals or companies.

In a situation where social users are communicating with each other and freely disseminate information and do not apply measures to protect their privacy, there is a possibility of these types of threats and their consequences. To avoid these problems, it is important to pay attention to the information we share and trust our privacy policies and settings. (Yuchong Li, November 26, 2021) 

Network Security Rules

As a broad term includes a variety of technologies, equipment, and processes. The concept of network security refers to a set of rules and settings designed to protect the integrity, confidentiality, and access to computer networks and data using software and hardware technologies. The main goal of network security is to prevent attacks and security threats, protect valuable data and resources, and ensure the correct operation and efficiency of the network. These efforts ensure that sensitive information and important resources are not accessible to unauthorized people and the security of users and organizations is maintained in the digital space. Unauthorized users and devices do not have access to the network. Also, if you sometimes need some forced access, you should provide them with limited resources so that they cannot create a breach in network security. Maintaining strict control over access to sensitive resources and information can prevent security threats. (Harrington, 2005) 

In this regard, be sure to carefully manage access and access levels. Each user and device should have access to only those resources that are necessary to perform their tasks. Also, the levels of access to sensitive and important information should be carefully determined and managed to prevent unauthorized access. 

Always remember not to grant administrative-level network access to just anyone. Access to the network management level requires responsibility and technical knowledge and should only be granted to those who qualify. (Vacca, 2010) 

Use access control and identity management tools to effectively determine which users and devices can access various resources and information. These actions will help you prevent potential threats and improve network security. Data Loss Prevention (DLP) is a series of measures and technologies aimed at protecting sensitive information and preventing its loss. This DLP process prevents users from transferring important and sensitive network information to other locations, from printing them, and from uploading sensitive files. These measures can be considered as insurance for the protection of information. 

One of the main methods of DLP is to set detailed rules and policies to prevent the transfer and sharing of sensitive information. These rules can determine the level of access to information, permission to send emails containing sensitive information, restrictions on file sharing, and similar things. Also, content monitoring and control tools can be used to detect and prevent the transfer of sensitive information. 

In this process, you can set policies on what kind of information users can send outside the network and what kind of information they must keep inside the network. Also, deciding on the amount of access users have to sensitive information and conducting training related to information security users plays an important role in the successful implementation of DLP. 

Finally, choosing and implementing the right DLP solutions can help you prevent the loss of sensitive information and ensure network security. (Ethan James, 2023-01-09) 

Digital Privacy Protection Tools

  •  Firewall software: This software is capable of managing network traffic, preventing unauthorized access, and restricting access based on established policies.
  • Intrusion Prevention Systems (IPS): These tools dynamically monitor network traffic and block or prevent any type of threat or attack if detected. (Scarfone, 2007) 
  • Threat Detection Software: By analyzing network traffic and detecting unusual patterns and threats, these tools help you to quickly become aware of various threats and take preventive measures. 
  • Identity and Access Management (IAM) software: These tools help you manage the authentication process and manage users‘ access to network resources in the best way and prevent unauthorized access. 
  • Threat Intelligence Software: These tools collect and analyze current threat information to help you make the best security decisions. 
  • Information security management software (Security Information and Event Management. These tools monitor and manage events and security information in the network in order to identify threats and attacks and deal with them in time. (McGraw, April 2004) 
  • Advanced Threat Management Software: Using algorithms and artificial intelligence, these tools detect complex and advanced threats and provide appropriate responses. 

Conclusion

People can share their opinions, information, experiences and feelings with others and participate in the exchange of ideas and information. 
One of the issues raised in the context of the impact of social networks on people’s relationships is the reduction of real interactions and its impact on social relationships. This may be due to excessive attention to virtual interactions and time spent in the virtual environment. People who are interested in social networks and spend a lot of time in these environments may benefit less from real interactions in real groups due to virtual motivations and entertainment. 


Also, refraining from sharing experiences online may make people feel more alone and isolated. Because social interactions and sharing experiences can help create closer and deeper connections with others. On the other hand, feeling unable to share can lead to low self-esteem and self-confidence. 
Therefore, network security prevents any unnecessary damage to the set of rules and regulations designed to protect the integrity, confidentiality, and access of computer networks and data using software and hardware technologies. The main goal of network security is to prevent violated attacks and security threats, protect valuable Digital privacy, data and resources, and ensure the correct operation and efficiency of the network. These efforts ensure that sensitive information and important resources are not accessible to unauthorised persons. Also, if you occasionally need to force access, you should give them limited resources so they can’t breach network security. Maintaining strict control over access to sensitive resources and information can prevent security threats. 

In this regard, be sure to carefully manage access and access levels. Each user and device should only have access to the resources necessary to perform their tasks. Also, the levels of access to sensitive and important information must be carefully determined and managed to prevent unauthorized access. 

Access to the network management level requires responsibility and technical knowledge and should only be granted to those who are qualified. 

Use access control and identity management tools to effectively determine which users and devices can access various resources and information. These actions will help you prevent potential threats and improve network security. 

References

Araceli Galiano-Coronil, G. J.-M.-P. (8 September 2021). Communication, Social Networks and Sustainable Development Goals: A Reflection From the Perspective of Social Marketing and Happiness Management in the General Elections in Spain. Frontiers in Psychology. 
Dwivedi, Y. K.-N. (October, 2022). Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management (IJIM), Volume 66,. 
Ethan James, F. R. (2023-01-09). Fortifying the IoT Landscape: Strategies to Counter Security. Tensorgate Journal of Sustainable Technology and Infrastructure for Developing Countries. 
Harrington, J. L. (2005). Network Security: A Practical Approach. San Francisco, : Elsevier. 
McGraw, G. (April 2004). Software security,. IEEE Security & Privacy. 
Scarfone, K. &. (2007). Guide to intrusion detection and prevention systems (idps). National Institute. 
Ünver, H. A. (2018). Politics of Digital Surveillance, National Security and Privacy. Centre for Economics and Foreign Policy Studies. 
Vacca, J. R. (2010). Network and System Security. (J. R. Vacca, Ed.) Oxford, Boulevard, Langford Lane, Kidlingto: Elsevier. 
Waleed Bul’ajoul, A. J. (2015). Improving network intrusion detection system performance through quality of service configuration and parallel technology,. Journal of Computer and System Sciences,. 
Winstone, L. M. (24 September 2021). Social media use and social connectedness among adolescents in the United Kingdom: a qualitative exploration of displacement and stimulation. BMC Public Health. 
Winstone, L. M. (24 September 2021). Social media use and social connectedness among adolescents in the United Kingdom: a qualitative exploration of displacement and stimulation. BMC Public Health 21,. 
Yuchong Li, Q. L. ( 26 November 2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports. 


Caught in the controversial world of whistleblowing…the darkness within.

From the beginning, what is a whistleblower?

Transparency International. Whistleblowing

A whistleblower is a person who finds information about individuals or organizations involved in corrupt affairs or who are believed to be able to commit acts to the detriment of the public or specific organizations/persons. According to „Transparency International“, an organization that is fighting for the protection of „whistleblowers“, one of the most effective ways to bring the above individuals to justice is through the denunciation to the relevant bodies. This is one of the most constructive ways to prevent corruption or different forms of crime. the role played by a whistleblower is best seen in the results it brings in everyday life.  

These results start from various scandals to complicated schemes of money laundering, avoidance of obligations, massive thefts, injustices of various forms, etc. Although a person who chooses to be a signifier or the circumstances force him to be such, he can bring a very positive impact on society, or the other side of the medallion are the risks that these people can be involved in. Many of them, not to say all of them, are before the election if they have to report what they know and take into account the threats, the attacks, the work, the family, the social circle, their life in general, which may not be the same, or choose to remain silent in order to protect what they have, „one with the herd“.

„Transparency International“ lists 3 reasons why people won’t report injustice: 

  1. fear of the consequences (legal, financial, reputational) 
  1. the belief that nothing will be done, that it will not make any difference 
  1. uncertainty about how, where and to whom to report.” 

Another point that is considered important when we mention whistleblowers is how a person who reports on a given situation and shares information regardless of the content of this information or the circumstances of this situation can be considered. (whatever it may be) it is truly considered a dilemma that cannot be „divided with a knife“, if they take the side of the hero or the villain in history. This is because they are often put in the place of a traitor, a spy, from different countries or societies. This remains to be discussed with more concrete cases that will be dealt with below.  

Whistle Blower Julian Assange: „Opening the curtains“,unveiling what stands behind suits and diplomatic meetings…

Image credit: JulianAassangeFreedom Instagram

Julian Assange, a computer programmer, the creator of Wikileaks, an international non-profit organization for whistleblowers, a name that for many years occupied the front page of the news and informative editorial. Assange’s name received international recognition in 2010, when. his organization published classified information related to the interventions carried out by the US military in Afghanistan and Iraq. The information Assange had obtained from a former intelligence analyst of the US army, Chelsea Mannig, who under the Espionage Act of 1917, was sentenced to 35 years in prison. The classified information that went around the world on the web was a video that showed footage of how an American army helicopter had shot and killed Iraqi people and Reuters journalists. Less than a month later, Wikileaks and other media presented to the public about 90,000 documents that provided details on the US occupation of Iraq, the deaths of civilians, al-Qaeda, the Taliban and Afghan leaders, etc. 

Al Jazeera. (2010) Julian Assange: What you need to know about the WikiLeaks founder.

Julian Assange WikiLeaks Cables

In a significant development, a collection of around 250,000 confidential diplomatic cables from the United States, offers a bizarre glimpse into the behind-the-scenes negotiations conducted by embassies worldwide. These cables contain assessments of foreign leaders, discussions on nuclear and terrorist threats, and insights into the Obama administration’s responses to global crises. 

Shane, Scott; W. Lehren, Andrew.(2010)Leaked Cables Offer Raw Look at U.S Diplomacy. The New York Times.

A selection of these cables, has been shared with The New York Times and other news outlets. This information was initially obtained by WikiLeaks at that time, as an organization whose work primary was disclosing confidential documents. WikiLeaks released 220 cables, with certain sections redacted to safeguard diplomatic sources on its website. 

The release of these cables has sent shockwaves throughout the diplomatic community, potentially straining relations with certain countries and introducing unpredictable changes to international affairs. Secretary of State of the time Hillary Clinton and American ambassadors had been in contact with foreign officials to prepare them for the  disclosures while the White House issued a statement strongly condemning the unauthorized release of classified documents and sensitive national security information. 

According to the White House, the distribution of these „stolen cables“ to multiple media outlets constitutes a „reckless and dangerous action.“ It is warned that certain cables, if published in their entirety, could disrupt U.S. operations abroad and jeopardize the safety and identities of confidential sources used by American diplomats. The statement emphasizes that these reports often contain „candid and sometimes incomplete information,“ the exposure of which could have significant repercussions for U.S. foreign policy and the interests of its allies worldwide. 

These cables represent a substantial sample of daily communication between the State Department and approximately 270 embassies and consulates. They provide a confidential record of the United States‘ interactions with the world during a period marked by conflict and terrorism. In the following days,

The Times Description of Revelations Wikileaks cables, including: 

  • A tense standoff with Pakistan over nuclear fuel: Since 2007, the U.S. has been engaged in a covert operation to extract highly enriched uranium from a Pakistani research reactor, which American officials fear could be diverted for illicit nuclear purposes. Ambassador Anne W. Patterson reported in May 2009 that Pakistan was refusing to schedule a visit by American technical experts due to concerns that local media would portray it as the U.S. seizing Pakistan’s nuclear weapons. 
  • Contemplating the collapse of North Korea: American and South Korean officials have explored the possibility of a unified Korea in the event of North Korea’s economic and political instability. South Korea even considered offering economic incentives to China to address its concerns about a reunified Korea aligned with the United States. 
  • Negotiations to empty the Guantánamo Bay prison: U.S. diplomats engaged in talks with other nations to find new homes for detainees. Some countries were given specific conditions, such as Slovenia being told it could meet with President Obama if it accepted a detainee. Kiribati was offered substantial incentives to take in Chinese Muslim detainees. Additionally, the U.S. suggested that Belgium could enhance its prominence in Europe by accepting more prisoners. 
  • Suspicions of corruption in the Afghan government: During a visit to the United Arab Emirates, one of Afghanistan’s vice presidents was found to be carrying $52 million in cash. Local authorities, in collaboration with the Drug Enforcement Administration, discovered this significant sum of money. A cable from the American Embassy in Kabul reported the incident, describing it as „a significant amount.“ However, the Afghan official, Ahmed Zia Massoud, denied taking any money out of Afghanistan.“ 

Here’s the New York Times Description of the “stolen cables scandal”. 

Saudi donors continue to be the primary financiers of Sunni militant groups, including Al Qaeda. Additionally, Qatar, a long-standing host to the American military, has been criticized for its counterterrorism efforts, particularly for hesitating to act against known terrorists out of fear of appearing aligned with the U.S. 

American diplomats in Rome reported in 2009 on an unusually close relationship between Russia’s Prime Minister Vladimir V. Putin and Italy’s Prime Minister and business magnate Silvio Berlusconi. This relationship involved lavish gifts, fruitful energy contracts, and the presence of a mysterious Russian-speaking Italian intermediary. This report suggested that Berlusconi was becoming a mouthpiece for Putin in Europe. It also highlighted the challenge of Putin’s leadership in Russia, where despite his supremacy, an unruly bureaucracy often disregarded his orders. 

Cables describe the U.S.’s struggle to prevent Syria from supplying arms to Hezbollah in Lebanon. Despite assurances from Syrian President Bashar al-Assad that no new arms would be sent to Hezbollah, the U.S. received information indicating the contrary. 

Regarding the rift with Europe over Human Rights 2007, American officials cautioned Germany against enforcing arrest warrants for CIA officers involved in an operation that mistakenly detained an innocent German citizen with the same name as a suspected militant. They emphasized that their intention was not to threaten Germany but to urge careful consideration of the implications for U.S.-Germany relations at every step. 

The source of these 251,287 cables was WikiLeaks, and they were provided to The New York Times anonymously. While most of these cables are unclassified, none are labeled „top secret.“ However, about 11,000 are classified as „secret,“ 9,000 as „noforn“ (not to be shared with foreign governments), and 4,000 are both „secret“ and „noforn.“ 

These cables underscore that, nearly a decade after 9/11, the fight against terrorism continues to shape U.S. global relations. They reveal efforts to determine trustworthy Pakistani partners in the fight against Al Qaeda, add missing Australians in the Middle East to terrorism watch lists, and assess potential surveillance in Lahore, Pakistan. 

The cables also document the challenges posed by China’s ascent and Russia’s retreat from democracy. They detail the ongoing efforts to prevent Iran from acquiring nuclear weapons and concerns about the possibility of an Israeli strike on Iran. 

Even if some of these events were previously known, the cables provide intricate details. For instance, they recount the Yemeni government’s attempts to conceal the American role in missile strikes against Al Qaeda. The cables also capture often humorous moments in diplomatic history, such as Libya’s Colonel Qaddafi’s tantrum over not being allowed to set up his tent in Manhattan. 

Moreover, the cables unveil private remarks behind closed doors. King Abdullah of Saudi Arabia, for example, speaks about the leaders of Iraq and Pakistan. These cables are a unique glimpse into the complex and multifaceted world of international diplomacy, offering insights that were typically only accessible to historians after decades had passed. 

Nonetheless, the authentic reality series in these cables comes from the narratives of diplomatic encounters with foreign figures. They reveal the intricate manoeuvring and negotiations that occur in international diplomacy, often with both sides carefully guarding their intentions. 

https://www.quora.com/Was-Julian-Assange-right-to-do-what-he-did-What-do-you-think, also here you can find people comments and opinions regarding the case of Assange, an insight of their support for him or not.

Espionage Act of 1917, two sides of a medallion.

https://www.loc.gov/exhibitions/world-war-i-american-experiences/about-this-exhibition/over-here/surveillance-and-censorship/sedition-law-passes/

This editorial cartoon depicts a lady symbolizing „Liberty“ being pursued down the stairs of the U.S. Capitol by a man representing „Congress.“ The man wields a whip labeled „Espionage Bill.“ This illustration was released prior to the enactment of the Espionage Act of 1917. This law made it a crime to share information that could harm the U.S. military during the war or help its enemies. 

https://history.iowa.gov/history/education/educator-resources/primary-source-sets/americas-involvement-world-war-i/must-not

  • When German operatives began their activities within the United States, President William Howard Taft took action by enacting the Defense Secrets Act of 1911. This law criminalized not only the gathering of information from military facilities but also the sharing of sensitive data with individuals lacking the necessary security clearances. Subsequently, when the United States entered World War I in June 1917, Congress passed the Espionage Act, an expansion of the 1911 legislation with several significant additions.  

The Espionage Act aimed to suppress activities during wartime that were considered disloyal to the nation. This included efforts to obtain defense-related information with the intent to harm the United States, as well as the acquisition of codebooks, signal books, blueprints, and similar documents for the purpose of passing them to America’s rivals, enemies. Moreover, the Act made it illegal to circulate false statements with the intention of disrupting military operations, inciting insubordination, obstructing troop recruitment, or promoting the success of America’s enemies. Those found guilty of such violations faced severe penalties, including fines of up to $10,000 and imprisonment for twenty years. During wartime, these penalties could escalate to thirty years in prison or even the death penalty.  

Intelligence.gov. The Espionage Act of 1917.

Certain provisions of the Espionage Act, as well as the later amendment known as the Sedition Act of 1918, aimed to suppress any criticism of the government or the war effort. Additionally, these acts granted the Postmaster General the authority to intercept mail containing such critical expressions. These measures stirred controversy, as they appeared to infringe upon Americans‘ First Amendment rights, particularly their freedom of speech.  

The more restrictive Sedition Act was eventually repealed in December 1920, although not before federal prosecutors had filed charges against over two thousand individuals for alleged violations. Importantly, the Espionage Act remains in effect today and has served as the basis for notable espionage convictions over the past century.

Notable Espionage Conviction Cases:

  • Julius and Ethel Rosenberg: These individuals were convicted of espionage in 1951 after spying for the Soviets during World War II. They shared secrets related to the development of the atomic bomb and were executed in 1953, marking the only instance of American citizens being put to death for espionage.  
  • John Walker: Serving as a Navy Chief Warrant Officer, Walker sold U.S. cryptographic material to the Soviets for nearly two decades. His actions provided Soviet handlers with access to critical communications and sensitive information, potentially neutralizing U.S. naval forces in the event of war. He was convicted of espionage in 1985.  
  • Aldrich Ames: As a CIA officer, Ames spied for the Soviets and later the Russians over a span of nine years. His betrayal led to the deaths of nearly a dozen Soviet intelligence officers who had provided secrets to the United States. Ames was convicted of espionage in 1994.  
  • Robert Hanssen: This FBI special agent engaged in espionage for the Soviets and Russians for more than two decades. His actions resulted in the deaths of numerous Soviet agents who had spied for the United States. Hanssen was convicted of espionage in 2001.  

In conclusion, the Espionage Act of 1917, enacted during World War I to safeguard national security, introduced restrictions on freedom of speech. While it aimed to protect the United States from wartime threats, its broad provisions made it possible to curtail free expression, leading to controversy. Although the more restrictive Sedition Act was eventually repealed, the Espionage Act persists today and has been employed in significant espionage cases, raising ongoing questions about the delicate balance between safeguarding national interests and preserving the fundamental right to freedom of speech. The Espionage Act represents a challenge in balancing the need for national security during wartime with the protection of fundamental rights like freedom of speech. It raises questions about how far a government can go in limiting speech to safeguard its interests. 

– Let’s take a simple poll… 

Besides the top two answers being: I would consider it while being discreet/ I would find another solution without facing danger (if possible), there was also someone who shared an opinion while choosing “other”:  

Opinion X student – “My response is influenced by the above 3 factors. First of all, geographical space, where am I. I say this like, am I in a communist state, socialist state, what’s the political environment in this geographical space. I will first about this and then the extent of sensitivity of the issue, how sensitive is this issue, is it so important, life changing important. And then I would look at the people whose being affected, should I blow the whistle, who would be looking out for me, because as I said, if I am not in a very safe space… What do I mean by safe space because they are people in US who blew a source, and they need to run away to Russia. I would depend on these things. If the people who are being affected are some powerful governmental officials who can find me whenever I am and deal with me, I will be sure to protect myself first, I would always think of my head, am I saving myself by doing this? I would not go and speak if I end up losing my life… what’s the point.”  

Basically, this simple poll shows us once more that it is not quite easy to be in the place of someone who holds in the hands such a powerful yet very tricky and dangerous asset as the truth. In the end it’s seems that we really face with a Shakespearian dilemma. 

 

Whistleblowers Protection and Law

Taylor, Catherine. Freedom of the Whistleblowers. NLG Review.

Whistleblowers, as defined by Black’s Law Dictionary, are employees who report their employers‘ wrongdoing to government authorities. In the Whistleblower Protection Act of 1989, they are employees who reasonably believe government actions indicate a violation of laws, mismanagement, waste of funds, abuse of authority, or a danger to public health or safety. However, these protections don’t extend to employees disclosing information prohibited by law or kept secret for national defense.  

Whistleblowers are usually government workers, and when they speak in an official capacity, their First Amendment rights aren’t the same as those of regular citizens. They have a position of trust with the government, especially if they have access to classified information. The Supreme Court has ruled that when they speak as part of their official duties, they’re not protected by the First Amendment.  

This means that government employees with access to classified information can’t disclose it to the press without consequences. Courts have upheld this, emphasizing the high degree of trust such employees hold and the importance of maintaining secrecy in intelligence agencies. Even if whistleblowers believe they’re exposing wrongdoing, they may face legal action.  

Current protections for whistleblowers are limited. The Whistleblower Protection Act doesn’t cover all government employees, and other regulations, like Presidential Policy Directive 19 and the Intelligence Community Whistleblower Protection Act, have limitations. Whistleblowers may still face retaliation within their agencies, making them hesitant to come forward.  

In summary, whistleblowers face legal risks when disclosing classified information, even if they believe they’re exposing wrongdoing. Existing protections are insufficient, and courts have not strongly defended their First Amendment rights, citing the trust they hold as government employees. This leaves whistleblowers in a precarious position when trying to report government misconduct.  

– What can we conclude? 

As in the role of diplomat once Sergei Lavrov said: “I don’t believe in ideology in international relations”, indeed what we see, read, hear in everyday life media coverage compared of what actually happens in the “behind the scenes” of diplomatic relations between states, is truly a masterpiece of sugar-coated hidden truths, closed doors, ultimatums of those in power to obtain and seize in their hands everything that best suits, works for them. This is something that us as the public are used to, considering the once in some decades truths that shows unnoticed and makes us realise once more that this is how the balance of world works, what is behind the curtains will be kept away from the public eye and if that Is considered good or not for the freedom of speech, expression or where to draw the line for the people to know, where to draw the line of “confidential, not to show to the public”, is a controversial discussion and undeniably a heated one.  

BrainyQuotes. Sergei Lavrov

 

– Something extra…

–  The above picture as well as the two others one in the same format, are a depiction of my own imagination using AI tools, showing how I personally have created the image of a whistleblower in my head. Specially this one show hidden representation of person holding around his neck the “whistle” or “the truth/discovery”. The darkness represents the world in general regarding to these people, the behind shadows are “the powerful” who try to capture what this whistleblower holds. The light behind is the true power that “doing the right thing” holds, not forgetting the risk and danger. 

– Bibliography:

  1. Al Jazeera. (2010) Julian Assange: What you need to know about the WikiLeaks founder. https://www.aljazeera.com/news/2020/12/20/julian-assange
  2. BrainyQuotes. Sergei Lavrov. https://www.brainyquote.com/quotes/sergei_lavrov_721168?src=t_international_relations
  3. Intelligence.gov. The Espionage Act of 1917. https://www.intelligence.gov/evolution-of-espionage/world-war-1/america-declares-war/espionage-act#:~:text=The%20Espionage%20Act%20broadly%20sought,with%20the%20intention%20of%20passing
  4. Taylor, Catherine. Freedom of the Whistleblowers. NLG Review. https://www.nlg.org/nlg-review/article/freedom-of-the-whistleblowers-why-prosecuting-government-leakers-under-the-espionage-act-raises-first-amendment-concerns/
  5. Transparency International. Whistleblowing. https://www.transparency.org/en/our-priorities/whistleblowing#:~:text=A%20whistleblower%20discloses%20information%20about,relevant%20authorities%2C%20or%20the%20public.
  6. Quora. Questions related Julian Assange. https://www.quora.com/Was-Julian-Assange-right-to-do-what-he-did-What-do-you-think
  7. Shane, Scott; W. Lehren, Andrew.(2010)Leaked Cables Offer Raw Look at U.S Diplomacy. The New York Times. https://www.nytimes.com/2010/11/29/world/29cables.html

Sensationsgeil: Der Kick der Bad News

Eine Glosse

Ich sitze vor dem Arzt. Der Stuhl ist weich gepolstert und im wohl dossierten Abstand stehen Grünpflanzen, die eine gemütliche Wohnzimmer Atmosphäre vermitteln sollen. Trotzdem habe ich feucht, schwitzige Hände und rutsche nervös auf meinem Stuhl hin und her. „Weswegen sind Sie hier?“, fragt der Arzt.

Ich räuspere mich verlegen, dann beginne ich zu erzählen: „Ich bin hier, weil… Immer wenn ich an der Kasse im Supermarkt stehe, da kann ich nicht wiederstehen. Ich versuche meinen Blick auf das Kassenband zu richten und mich auf den Einkauf zu konzentrieren. Aber sie sind überall. Beim Einkaufen lauern sie gestapelt neben der Kasse. Sie springen mich quasi an, ohne dass ich mich wehren könnte.“

„Wen meinen Sie?“

Ich schlucke hart, dann presse ich gehetzt hervor: „Die Schlagzeilen.“

Der Arzt nickt wissend: „Was Sie beschreiben, kenne ich nur zu gut. Wenige Menschen sprechen offen darüber aber doch ist es ein weitverbreitetes Phänomen. Vielen ist es gar nicht bewusst und sie wissen nicht, dass sie es haben. Dabei ist es die meistverbreitete Volkskrankheit. Ach, was sage ich: Weltkrankheit.“ Er musterte mich mitfühlend, als er die Diagnose verkündete: „Sie sind sensationsgeil.“

Symptomatik

Immer wandert der Blick auf die nächste Schlagzeile, bei Zeitungen im Supermarkt, im Fernsehen, im Internet auf dem Handy. Jeden Tag gibt es neues Futter für den unersättlichen Hunger auf: News. Dabei sind es nicht die schönen Nachrichten, die wir massenweise konsumieren, sondern die Bad News. Massaker, Kriege, Unfälle, Mord und Umweltzerstörung. Falls wir dem Angebot mal überdrüssig werden oder es langweilig wird, weil sich die Berichterstattung wiederholt, gibt es ja zum Glück noch den Gossip. Damit beschäftigen wir uns doch liebend gerne.

Was passiert bei unserer Liaison mit der medialen Berichterstattung? Warum triggern uns vor allem schlechte Neuigkeiten an? Entsprechen wir dem Bild einer immer sensationshungrigen Hydra?

Ursachenforschung: Negativity Bias

Hier sind die Good News. Wir können nichts für unsere Sensationsgeilheit. Tatsächlich liegt es in unseren Genen – eine Erbkrankheit sozusagen.

Back to the Roots: Als wir noch Jäger und Sammler waren, war es für uns lebenswichtig negative Veränderungen zu bemerken. Wenn es irgendwo im Gebüsch verräterisch knackte, weil sich ein Raubtier näherte, mussten wir rennen und zwar um unser Leben. Da waren die leckeren Himbeeren völlig egal. Insofern hat sich eine kognitive Präferenz[1] auf Negatives entwickelt: unser Negativity Bias[2].


So kommt es, dass viele von uns bedrohungsfreie Nachrichten wegfiltern und die Aufmerksamkeit vor allem auf bedrohlich wirkende Informationen richten.“

Gestmann

Diese Fokussierung auf Negatives ist aus evolutionspsychologischer Sicht genial, denn sie sicherte unser Überleben. So hat sich der instinktive Überlebensmechanismus[3] durchgesetzt und bestimmt auch heute noch unser Denken und Handeln.


„Schon für die Steinzeitmenschen war es eine Überlebensfrage, rechtzeitig über potenzielle Gefahren informiert zu sein, auch wenn diese Nachrichten damals nicht per Twitter, SMS oder Snapchat kommuniziert wurden.“

Gestmann

Für einen Großteil der Menschheit besteht allerdings heute nicht mehr die Gefahr von Raubtieren angegriffen zu werden. Selbst die scheinbar real existierende Bedrohung eines herumstreunenden Löwen in Berlin, entpuppte sich letztlich als falscher Alarm.[4] Trotzdem sprachen Millionen von Menschen über nichts anderes und überlegten schon im 500 Kilometer entfernten Fulda vorsorglich lieber im Haus zu bleiben. Falls der Löwe nicht auf Berliner steht.

So werden unsere Gefahren heute im Wesentlichen abstrahiert[5]. Anstatt ihnen in unserer Lebensrealität zu begegnen, werden sie uns in den Medien häppchenweise serviert.


„Wir speichern negative Informationen und potentielle Gefahren nicht nur besser ab und reagieren intensiver auf sie, sondern suchen auch mehr danach.“

Urner

Die „3 K“ Regel: Mediales Narrativ einer schlechten Welt

Die „3 K“ Regel: Kinder. Küche. Kirche.[6] Was im 20. Jahrhundert die konservativ patriarchalischen Traditionalisten frohlocken ließ, hat sich heute im medial geprägten 21. Jahrhundert in „Krieg, Krisen und Katastrophen“[7] transformiert. Mit diesen Themen machen die heutigen Medienschaffenden ihre Umsätze, denn sie wissen, dass die Aufmerksamkeit der Leser*innen auf den Bad News liegt. Die Leser*innen saugen diese negativen Nachrichten förmlich auf. Angezogen von plakativen, im wahrsten Sinne des Wortes „Schlagzeilen“, grapschen die Leser*innen mit einer fast kindlichen Neugierde, gepaart mit einem nach Emotionalität und Sensation gierendem „Ich“ nach den Artikeln und Informationen. Wobei Letztere nachrangig sind. Sie lesen über Intrigen, den Kampf und das Sterben und beenden den Artikel mit einem fast orgasmischen Stöhnen. Dieser Höhepunkt stellt den Kick und den Rausch des Negativen dar. Es ist der Moment, wenn die Leser*innen realisieren, dass die in dem Artikel genannten Personen zwar ihr Hab und Gut und im schlimmsten Fall ihr Leben verloren haben, sie aber gemütlich auf dem Sofa sitzen, am Leben sind und sich nach einer kurzen Pause auf den nächsten sensationsträchtigen Artikel oder Beitrag stürzen können.

Journalistisches Dilemma

Dieses beständige inzwischen schon verselbstständigte, routinierte Wechselspiel zwischen Angebot und Nachfrage sorgt für eine kontinuierliche Weiterfütterung der Rezipienten mit Bad News. Falls es zu einer Übersättigung der medialen Konsumenten kommt, so gibt es noch das Mittel der Breaking News[8]. Dieser mediale Überraschungsmoment ist das Junk Food des Journalismus. Meist kochend heiß aber informativ unausgegoren und nährstoffhaltig gleich null. Kurzkettige Kohlenhydrate, die nach einem kurzandauernden Zuckerschock nach mehr verlangen. Und so werden wir versorgt mit einem neuen triefenden Schmodder aus Bad News.


Wie können wir da objektiven, qualitativ hochwertigen Journalismus erwarten? Selbst wenn die Medienschaffenden über etwas Positives berichten möchten, können sie es sich selten leisten, neutral oder ganz und gar positiv zu schreiben. Wir sind also weit weg von den objektiv aufklärerischen Idealen des Journalismus und ganz und gar der gewünscht-berüchtigten Freedom of Speech. Nicht nur durch staatliche Zensur und Political Correctness, sondern auch durch unser Konsumverhalten verwehren wir teilweise den Medienschaffenden und uns selbst eine positive Berichterstattung.

Negative Inhalte, die unsere „Weltuntergangsstimmung“ befeuern, sind willkommen. Aber die positiven Inhalte, Erfolgsstorys und Good News finden in den Mainstreammedien kaum Absatz. Stattdessen scheinen Life Coaches, Meditationsgurus oder Abnehmfirmen alleinige Patente auf Positives zu erheben. So berichten Mitglieder in Testimonials über wunderbare Erfolge.

Werden wir also erst medial von der bösen Welt zerrissen, um dann mit dem Kauf von Produkten wieder mehr Lebenslust zu bekommen? Neben all den Bad News geben wir noch Geld aus, um Lebensratgeber zu kaufen oder an einem Kurs teilzunehmen, indem uns suggeriert wird: „Think positive.“ Du kannst die Welt durch deine Gedanken formen[9].

Es gibt sie bereits, die Nachrichtenflüchtlinge. Die Zahl der sogenannten Represser[10] ist stetig am Steigen, wie die Oxford University festgestellt hat.[11] Diese Personengruppe, die  nur Good News und positive Nachrichteninhalte mag, neigt zur News-Avoidance. Sie haben es durchschaut, denn sie haben gemerkt, dass der übermäßige Konsum von Bad News zu ernsthaften gesundheitlichen und psychischen Problemen führen kann, die im schlimmsten Fall in einer lethargischen Abkapselung vom gesellschaftlichen Leben enden[12].

Happy End?

Liebe Medienschaffende, habt den Mut uns mit Erfolgsstorys und Good News zu füttern, bevor wir alle in einer „narkotischen Dysfunktion“[13] enden oder in eine medienfreie Zone flüchten. Jetzt, nach jahrelangem Konsum der harten Drogen, wo unsere limitatio attentionis,[14] unsere beengte geistige Aufnahmefähigkeit einem abgemagerten Gerippe gleicht, wäre ein kalter Entzug zu heftig.

Stattdessen könnt ihr euch langsam aber stetig dem konstruktiven Journalismus annähern, da er Lösungsvorschläge enthält. Und wer weiß, mit dem dann von euch proklamierten Pragmatismus, können wir vielleicht echt noch was retten – von dieser (wunder)schönen Erde, die unsere Heimat ist.

Literatur

[1] https://www.anti-bias.eu/biaseffekte/negativitaetsbias-wenn-das-glas-halb-leer-ist/

[2] Umer, Maren: https://www.bildung.sachsen.de/blog/index.php/2021/06/30/negative-nachrichtflut-fuehrt-dazu-dass-sich-menschen-nicht-mehr-beteiligen/

[3] https://www.anti-bias.eu/biaseffekte/negativitaetsbias-wenn-das-glas-halb-leer-ist/

[4] https://www.berliner-kurier.de/berlin/loewin-in-berlin-hinter-der-suche-nach-der-raubkatze-steckt-ein-echter-skandal-li.373030

[5] https://www.anti-bias.eu/biaseffekte/negativitaetsbias-wenn-das-glas-halb-leer-ist/

[6] Gestmann, Michael: Medienpsychologie: „Bad news are good news!“ in tv diskurs 76 (2016)

[7] Paletschek, Sylvia: Kinder, Küche, Kirche. in: Francois, Etienne; Schulze, Hagen (Hrsg.): Deutsche Erinnerungsorte. Bd. 2. Beck, München (2001)

[8] https://lampert-nachhaltigkeit.com/only-bad-news-is-good-news/

[9] https://drjoedispenza.com/

[10] Vitouch, Peter: Wieso wir das Schlechte gut finden. Interview. in: Salzburger Nachrichten vom 05.09.2014

[11] Gestmann, Michael: Medienpsychologie: „Bad news are good news!“ in tv diskurs 76 (2016)

[12] Umer, Maren: https://www.bildung.sachsen.de/blog/index.php/2021/06/30/negative-nachrichtflut-fuehrt-dazu-dass-sich-menschen-nicht-mehr-beteiligen/

[13] Lazarsfeld, Paul; Merton, Robert: Mass Communication, Popular Taste and Organized Social Action. in: Bryson, Lyman (Hrsg.): Problems in the Communication of Ideas. New York (1948)

[14] Gestmann, Michael: Medienpsychologie: „Bad news are good news!“ in tv diskurs 76 (2016)

Bilder: pixabay.com