Define the term principled leaking

Assignment Help Management Theories
Reference no: EM131451445

Question: Critics are concerned that Birkenfeld's prison sentence will discourage other tax whistle-blowers from coming forward. Is that a valid concern? Why or why not?

WIKILEAKS: PRINCIPLED LEAKING?

Movies like Silkwood and The Insider have portrayed whistle-blowers as lone heroes working against corrupt organizations at great personal risk to their own well-being-secrecy is an absolute must until the story explodes in the media. But what if you took a different approach? What if there was a central site for any and all material that a concerned employee, civil servant, or military staffer could post with the promise of anonymity through encrypted software and the protection of national press secrecy laws? What would that do to the world of corporate and government secrecy? WikiLeaks has become the live experiment to answer all those questions. Though not the fi rst document-leaking Web site ("Cryptome" was started by John Young in 1996), WikiLeaks has become the most prominent as a result of its apparent willingness to post any information, classifi ed or otherwise, in the stated interest of public advocacy.

183_Wikileaks.png

Cofounded by Australian Julian Assange in 2007, Wikileaks was conceived as a safe haven for whistleblowers to reveal their secrets to the world. Its first big story documented how former Kenyan President Daniel Arap Moi had diverted millions of dollars of state funds to overseas accounts, a leak that led to an upset in Kenya's presidential election. Since then there has been a constant stream of government, industry, and military reports published that have brought WikiLeaks and its cofounder both fame and notoriety, including takedown threats and a temporary ban in the United States. The site, which proudly states that it owes no allegiance to any government or group, went on to release Pentagon rules of engagement for troops in Iraq, operating manuals for the U.S. detention facility in Guantanamo Bay, lists of U.S. munitions stores in Iraq (included banned chemical weapons), and a classifi ed operating manual for the U.S. military's guided bombs known as the joint direct attack munitions (JDAM).

Since the JDAM manual also included known weaknesses of the bomb system, military offi cials responded that WikiLeaks was acting irresponsibly in making such information public and putting the lives of American military personnel at risk. It is this willingness to post anything under an apparent hands-off editorial policy that has brought the most criticism of the site. Assange acknowledges that the community fact-checking and editing of posted documents that he envisioned with the "wiki" title of the domain (as in "wikipedia") has not materialized, but he is committed to supporting any and all postings, even if they include such questionable items as an early script for the movie Indiana Jones and the Kingdom of the Crystal Skull and the tax bill for actor Wesley Snipes that included his Social Security number. On July 25, 2010, WikiLeaks released more than 75,000 classifi ed reports about the war in Afghanistan, allegedly provided by an Army intelligence analyst, Bradley Manning. Manning was already under suspicion for allegedly leaking a 38-minute video of a 2007 helicopter attack in Baghdad that killed 12 people, including a reporter and photographer from the news agency Reuters. Publication of the documents was coordinated with The New York Times, The Guardian in Britain, and Der Speigel in Germany to ensure maximum attention (and suitable fact-checking before publication). Professor Jonathan Zittrain of Harvard Law School described the event as, "The Exxon Valdez of intelligence leaks-it's crude and messy, with uncertain implications."

Even with a further 15,000 documents withheld by WikiLeaks in a "harm minimization process," military leadership personnel expressed concern about the revelation of names of Afghans who had helped U.S. forces, potentially endangering them. WikiLeaks clearly represents a new world of whistle-blowing with the potential for immediate broad distribution of potentially devastating material previously considered to be "top secret." However, there is a growing concern that the technology, while protecting the whistle-blowers, will not be suffi cient to stop a more disruptive agenda than simple document leaking. For example, Assange came under direct attack for releasing an edited 17-minute version of the Baghdad helicopter attack, entitled "Collateral Murder," without clarifying that the attack happened during clashes in a Baghdad neighborhood and that one of the men fi red on by the helicopter crew was carrying a rocket-propelled grenade. Critics cite this example as evidence not of whistle-blowing but "information vandalism." With a promise from Assange of "even more controversial documents in the pipeline," it remains to be seen whether the site will achieve its target of achieving transparency for the unethical behavior of governments and corporations around the world, or whether it will be dismissed for "attentioncraving subversion."

Reference no: EM131451445

Questions Cloud

What is the difference between the two histograms : UMUC Data 620 Assignment 1. Write a few sentences - what is the difference between the two histograms? Which one would you use under which circumstances
Are there similarities in the two securities types : Are there similarities in the two securities types? What are the key differences? (Do not focus on any specific investment; rather the category of investment)
Develop a policy for recruiting and hiring employees : The Vice President of HR asked you to develop a policy for recruiting and hiring employees for the hospital. State why these are important from your viewpoint.
Create an employee safety handbook : Create an employee safety handbook.Explain the need for safe work environment.Incorporate employee relations doctrines.
Define the term principled leaking : Movies like Silkwood and The Insider have portrayed whistle-blowers as lone heroes working against corrupt organizations at great personal risk.
What is the best point estimate for the population mean : Discuss the importance of constructing confidence intervals for the population mean. What is the best point estimate for the population mean? Explain.
Evaluate impact of this social issue on delivery of health : Describe your selected social issue, its importance, and pertinent background information.Analyze culturally competent health and human services elements.
Series of future cash flows : Find the net present value (NPV) for the following series of future cash flows,
Describe the ethical principles of whistle-blowing : Critics have argued that WikiLeaks is now attacking secrecy on all fronts, with no concern for the consequences of the information posted on its site.

Reviews

Write a Review

Management Theories Questions & Answers

  Learning in action

Learning contract proposal that will form the basis of your learning contract report.

  Change is the only constant

"Change is the only constant " Evaluate the different types of change that have occurred in Sony.

  How do advertisers try to use group influence

How do advertisers try to use group influence?  Will you find any specific examples and explain the relevant theory of group behavior and influence?

  Case study:saving sony

You have been appointed by Sony as a consultant on change management. Advise Sony on how they could implement the change by using the various theories of change you have learnt.

  How the stock market works

The purpose of this project is to help you to gain an understanding of how the stock market works and of the relationship between theory and practice.

  Find the optimal production quantities

Find not only the optimal production quantities, but also the optimal total cost.

  Describe the management process

Describe the management process and identify the skills required to manage business organizations.

  Case study : bert''s bonsai and aquatic sport museum

Case Study : Bert's Bonsai and Aquatic Sport Museum Prepare a knowledge management system.

  Knowledge management techniques

Demonstrate understanding of the many-sided nature of knowledge management

  Theory of transtheoretical model

Demonstrate understanding of the many-sided nature of knowledge management

  Write a paper on historical trends of management

Write a paper on Historical Trends of Management.

  Theory of reasoned action

Theory of Planned Behavior and Integrated Behaviors Model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd