Razani Base, Waziristan,Aug. 1938, from which British and Indian forces suppressed a local insurrection.
Photo: Brian Harrington Spier, under CC
The Bureau of Investigative Journalism found that drones targeted funeral mourners and rescuers responding to prior strikes. One government official, granted the veil of anonymity by The New York Times, would not deny that it had done so. Instead, he or she suggested that to "malign the efforts" was to "help Al Qaeda succeed."
Glenn Greenwald notes that the New York Times broke its own policies on source anonymity to run the quote.
The Bureau’s journalists and researchers spent months engaged in the painstaking and difficult task of gathering documentation on the effects of the top secret U.S. drone program in Waziristan — producing extraordinary findings — only to find themselves and their sources, many of whom are local villagers whose children have been killed, depicted as Al Qaeda’s witting or unwitting allies the very next day in The New York Times, by some senior government official too frightened to put his name on his accusations and aided (as always) by a newspaper that has repeatedly vowed to stop these practices.
It looks like the price of continued access to "senior counterterrorism officials" is that you must, now and again, launder their dirty political opinions.
Amber Sherlock, a television personality in Australia, was angry that a colleague, Julie Snook, wore clothes almost the same color as her own. On-camera, with the screen split and an increasingly alarmed and discomfited guest looking on—also wearing white!—she insisted Snook change her attire and did not commence the segment until she had done so.
One of the most compelling data visualization projects from this year was Wall Street Journal’s Blue Feed, Red Feed, which lets readers see exactly how divergent social media feeds have become, depending on someone’s media diet. By coincidence, I capped an example that puts Boing Boing in their blue feed column.
The Opennews project has published a set of annotated links to digital operational security tutorials that are relevant to journalists looking to defend themselves against various kinds of attacks, covering two-factor authentication, password managers, phishing, first aid for malware infections, and related subjects. (via 4 Short Links)
Using my iPhone while it’s charging is always a hassle. With tucked-away outlets and the meager length of included lightning cables, comfortable scrolling while plugged in is annoying. These 10-Ft MFi-Certified Lightning Cables are super convenient and probably the best iPhone accessory purchase I’ve made.At over three times the length of normal cables, these reach anywhere you […]
With countless applications for modern life, artificial intelligence (AI) is one of the most in-demand fields of study in tech. Beyond modelling human decision making processes and learning abilities, AI can be used to analyze massive volumes of data and create complex interactive systems.This Machine Learning & AI for Business Bundle made mastering these concepts possible for […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]