Die mediale Darstellung von Leaks lässt leicht darauf schließen, dass Leaks ein zwar interessantes, da neues, aber zumindest einheitliches Phänomen im internationalen System darstellen. Christoph Bieber von der Universität Duisburg-Essen bricht mit dieser Vor- und Darstellung, indem er anhand bestimmter vergangener Veröffentlichungen unterschiedliche Arten des Leaking differenziert, und dabei sowohl "Policy-" wie auch "Politics-" Leaks identifiziert.
Data leaks have become one of the most ubiquitous weapons in the arsenal of digital media dissent. However, often such processes of mediation exceed a rational understanding of the information revealed. Acting in the domain of the accident, the mediations of leaks operate in the dimension of the event: an immanent and particular set of relations that is provoked by the encounter and collision of various forces, virtually becoming their productive potential. This article advances the question of how data leaks―as a form of media dissent―operate beyond representation, touching upon the vital realm of affect. Intensively enabling a transformation in the state of the forces at play, affect generates possibilities within the emergent world that is constantly in creation. In this article, I argue that the politics of leaks in contemporary network ecologies works in such an affective register, possessing the capabilities to trigger and activate subjects differentially. Exploring the 2012 leak by Anonymous Italia, consisting of around 3,500 Italian police documents, mostly concerning the NoTav movement, I propose that the mediations of data leaks need to be studied and apprehended via their inductive capacities, as a question of affective politics, or alter-politics.
The article discusses traitors, national security leaks in the U.S., the First Amendment to the nation's Constitution as of March 32014, focusing on the U.S. Espionage Act and criminal penalties for constitutional treason. The alleged whistleblowers Bradley Manning and Edward Snowden are mentioned, along with prosecutions for criminal security leaks in America. Immunity is examined in relation to U.S. government employees and independent contractors. Freedom of speech rights are also assessed.
Die Entdeckung der rechtsextremen Terrorzelle aus Zwickau, die mutmaßlich für die Ermordung von mindestens neun Menschen verantwortlich ist, hat in der Politik und den Massenmedien eine sicherheits- und demokratiepolitisch relevante Frage aufgeworfen: Wie kann es sein, dass drei Neonazis jahrelang mordend durch Deutschland ziehen, diese dabei Kontakte zur Neonazi-Szene und NPD unterhalten haben und der Staat davon nichts bekommen hat? Der in dieser Frage implizit enthaltende Vorwurf der Inkompetenz und Tatenlosigkeit verschärft sich noch, wenn man zur Kenntnis nimmt, dass in den letzten Jahren zahlreiche Interna aus rechtsextremen Internetforen, sogenannte Nazi-Leaks, veröffentlicht wurden.
Die Wirkung von Leaks auf der policy Ebene ist bisher schwer auszumachen. Eine Umfrage zur Veröffentlichung der sogenannten Palestine Papers versuchte eine Annäherung. Im Rahmen einer Forschungsarbeit zur Bedeutung von Geheimnis und Leaking in Friedensverhandlungen wurde eine Expertenbefragung ins Leben gerufen, die die Wirkung der sogenannten Palestine Papers auf den Nahost-Verhandlungsprozess bewerten sollte. Die Ergebnisse zeigten, dass die Hoffnung auf eindeutige Erkenntnisse nicht nur durch die Komplexität des Konfliktes so gut wie aufgegeben werden kann.
Aughie and Nia discuss the recent leak of an opinion out of the U.S. Supreme Court. ; https://scholarscompass.vcu.edu/civil_discourse/1130/thumbnail.jpg
This paper looks at leaks from the perspective of political journalists, in particular, those working in the parliamentary round. This work draws on interviews with journalists in 25 of the 33 mainstream bureaus in the Federal Parliamentary Press Gallery (FFPG). It is based on a view that parliamentary democracy andthe parliamentary journalism round share a co-genesis – that mature representative democracies and principles of press freedoms are twin outcomes of the same gestation that binds parliamentary reporters and parliamentarians in a never-ending contest over information. Further, it is argued the health of this interdependent relationship can be seen as a bellwether for the key tradition of transparency in Westminster-derived democracies. In 2005, one of the longest-serving members of the FPPG, Michelle Grattan described it this way: "It is an old message that media and politicians are both natural adversaries and in a parasitic relationship. Their interests are often at odds. Sometimes they are openly at war, constantly they are engaged in a struggle of wits. What's interesting is how this traditional conflict and cooperation plays out in new circumstances." (Grattan, 2005 p.2) The topic of leaks highlights an important aspect of the contemporary state of play in this many- faceted struggle.
Trabajo presentado a la 3rd Conference on Control and Fault Tolerant Systems, celebrada en Barcelona (España) del 7 al 9 de septiembre de 2016. ; The leak localisation methodologies based on data and models are affected by both uncertainties in the model and in the measurements. This uncertainty should be quantified so that its effect on the localisation methods performance can be estimated. In this paper, a model-based leak localisation methodology is applied to a real District Metered Area using synthetic data. In the generation process of the data, uncertainty in demands is taken into account. This uncertainty was estimated so that it can justify the uncertainty observed in the real measurements. The leak localisation methodology consists, first, in generating the set of possible measurements, obtained by Monte Carlo Simulation under a certain leak assumption and considering uncertainty, and second, in falsifying sets of nodes using the correlation with a leak residual model in order to signal a set of possible leaky nodes. The assessment is done by means of generating the confusion matrix with a Monte Carlo approach. ; This work was partially supported by Spanish Government (MINISTERIO ECNONOMIA Y COMPETITIVIDAD) and FEDER under projects DPI2014-58104-R (HARCRICS), DPI-2013-48243-C2-1-R (ECOCIS), the grant IJCI-2014-2081, the Polytechnic University of Catalunya (UPC), EFFINET grant FP7-ICT-2012-318556 of the European Commission and by the Catalan Agency for Management of University and Research Grants (AGAUR) through the grant 2014PDJ00102. ; Peer Reviewed
Leaks are pervasive in politics. Hence, many committees that nominally operate under secrecy de facto operate under the threat that information might be passed on to outsiders. We study theoretically and experimentally how this possibility affects the behavior of committee members and the decision-making accuracy. Our theoretical analysis generates two major predictions. First, a committee operating under the threat of leaks is equivalent to a formally transparent committee in terms of the probabilities of project implementation as well as welfare (despite differences in individual voting behavior). Second, the threat of leaks causes a committee to recommend rejection of a project whenever precise information has been shared among committee members. As a consequence, a status-quo bias arises. Our laboratory results confirm these predictions despite subjects communicating less strategically than predicted.
This paper presents a method for leak localization in water distribution networks (WDNs) based on Bayesian classifiers. Probability density functions for pressure residuals are calibrated off-line for all the possible leak scenarios by using a hydraulic simulator, and considering the leak size uncertainty, demand uncertainty and sensor noise. A Bayesian classifier is applied on-line to the computed residuals to determine the location of leaks in the WDN. A time horizon based reasoning combined with the Bayesian classifier is also proposed to improve the localization accuracy. Two case studies based on the Hanoi and the Nova Icària networks are used to illustrate the performance of the proposed approach. Simulation results are presented for the Hanoi case study, whereas results for a real leak scenario are shown for the Nova Icària case study. ; This work has been funded by the Ministerio de Economía, Industria y Competitividad (MEINCOP) of the Spanish Government and FEDER through the projects ECOCIS (ref. DPI2013-48243-C2-1-R) and HARCRICS (ref. DPI2014-58104-R) and through the grant IJCI-2014-20801, by the European Commission through contract EFFINET (ref. FP7-ICT2011-8-318556) and by the Catalan Agency for Management of University and Research Grants (AGAUR), the European Social Fund (ESF) and the Secretary of University and Research of the Department of Companies and Knowledge of the Government of Catalonia through the grant FI-DGR 2015 (ref. 2015 FI_B 00591). ; Peer Reviewed
Es tut sich etwas in Folge der Snowden-Leaks: In den USA werden Untersuchungsausschüsse eingesetzt, Vorstöße, die Macht der NSA einzuschränken bzw.transparenter zu gestalten werden stärker – vor allem aber wird es wohl institutionelle Änderungen geben. Und diese hängen an einer Person: Keith Alexander.
Abstract Background: Dengue fever is the world's fastest spreading mosquito borne viral infection. It is prevalent throughout both subtropical and tropical region if the world. The severe form of dengue fever with bleeding manifestations called as dengue hemorrhagic fever. Some of the Dengue fever patients developed capillary leak during critical period of illness. This study aims at determining the frequency of capillary leak syndrome in hospitalized dengue fever patients of tertiary care hospital. Patients and Methods: The study was conducted over a period of one month from 1st October to 30th October 2019 at department of Medicine Federal Government Polyclinic Post Graduate Medical Institute, Islamabad. This cross sectional study comprising 200 consecutive hospitalized (≥14 years of both gender) dengue fever patients. Results: Capillary leak syndrome found in 75 patients of Dengue fever. All of them were Primary Dengue Patients. Both ascites and effusion was present in 31 patients. Ascites only found in 25 patients, Pleural effusion bilateral in 7, Right sided pleural effusion in 11 and Left sided in 1 patient. None of the patient had pericardial effusion. Conclusion: It is concluded that capillary leak syndrome is common in primary dengue fever patients and its early diagnosis helps us in better management during critical phase of illness with better outcome. Key Words: Dengue Fever, Capillary Leak Syndrome, Dengue Shock
In the midst of the COVID-19 pandemic, the Indonesian government is trying to control the spread of COVID-19 in various ways, one of which is through the use of technology. The Indonesian government has built and developed a surveillance application called PeduliLindungi to help the government with tracing and tracking to stop the spread of COVID-19. This application requires personal data and utilizes the bluetooth network in location tracking for tracing contact history with COVID-19 sufferers. The search results will make it easier for the government to identify people who are exposed and need further treatment to stop the spread of COVID-19. But besides that, there are many public concerns about the leakage of personal data from the PeduliLindung application. This research focuses on the leakage of personal data and misuse of personal data from the PeduliLindung application from an information security perspective. This study is a study that aims to analyze data security in the PeduliLindung application
Although people can quarrel about the significance or reliability of Independent Counsel Kenneth Starr's investigative findings, no one can deny that his investigation produced new law. We now know that the attorney-client privilege survives the death of the client, that government lawyers may not rely on that privilege to shield communications from their "client" relating to criminal misconduct, and that there is no "protective function privilege" (at least not yet), While bringing some clarity to certain areas, the Independent Counsel's investigation also highlighted the confused state of the law relating to Rule 6(e)'s grand jury secrecy provisions.
Die Snowden-Leaks an sich, insbesondere die von ihm an die Öffentlichkeit geleakten Powerpoint-Folien, haben es bereits in sich. Leicht zu verstehen sind sie aber nicht immer, es gibt schlicht zu viele Codenamen. Um so interessanter ist daher diese Mitschrift eines Vortrags von William Binney, einem ehemaligen technischen Direktor bei der NSA, der nach 37 Jahren Dienst ausschied und Whistleblower wurde. In diesem Vortrag erklärt Binney, was es mit der Überwachungsinfrastruktur der NSA auf sich hat, was hinter den ganzen Codenamen steckt und welche Implikationen das ganze hat.