Claude Hagège
- Published in print:
- 2010
- Published Online:
- May 2010
- ISBN:
- 9780199575008
- eISBN:
- 9780191722578
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199575008.003.0006
- Subject:
- Linguistics, Syntax and Morphology
This concluding chapter begins with a review of discussions in the preceding chapters. It then discusses adpositions as morpholexical units shedding light on a theory of linguistic categories; ...
More
This concluding chapter begins with a review of discussions in the preceding chapters. It then discusses adpositions as morpholexical units shedding light on a theory of linguistic categories; adpositions as midpoints and images of language leaks and diachronic drifts; and morphology as the most linguistic component of human languages.Less
This concluding chapter begins with a review of discussions in the preceding chapters. It then discusses adpositions as morpholexical units shedding light on a theory of linguistic categories; adpositions as midpoints and images of language leaks and diachronic drifts; and morphology as the most linguistic component of human languages.
Tarek El-Ariss
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9780691181936
- eISBN:
- 9780691184913
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691181936.003.0001
- Subject:
- Literature, Criticism/Theory
This chapter explores leaking as bodily function, tying it to fiction and author function. Engaging the theoretical framework of the leaking body from The Arabian Nights onwards, it examines how ...
More
This chapter explores leaking as bodily function, tying it to fiction and author function. Engaging the theoretical framework of the leaking body from The Arabian Nights onwards, it examines how leaks became WikiLeaks, thereby questioning their framing as an attempt to fix the empire or restore the violated subject of the liberal state whose rights and privacy have been suspended or tampered with. The chapter traces the transformation of the leaker into superstar traitor and hero, and the making of the leak as “true knowledge” or encyclopedic knowledge by adding “Wiki” to “Leaks.” It argues that as leakers occupy liminal states of juridical limbo such as embassies, airports, and solitary confinement, their bodies become marked and their subjectivity undone and reconstituted while simultaneously undoing and reconstituting the law that they purportedly violate.Less
This chapter explores leaking as bodily function, tying it to fiction and author function. Engaging the theoretical framework of the leaking body from The Arabian Nights onwards, it examines how leaks became WikiLeaks, thereby questioning their framing as an attempt to fix the empire or restore the violated subject of the liberal state whose rights and privacy have been suspended or tampered with. The chapter traces the transformation of the leaker into superstar traitor and hero, and the making of the leak as “true knowledge” or encyclopedic knowledge by adding “Wiki” to “Leaks.” It argues that as leakers occupy liminal states of juridical limbo such as embassies, airports, and solitary confinement, their bodies become marked and their subjectivity undone and reconstituted while simultaneously undoing and reconstituting the law that they purportedly violate.
Rahul Sagar
- Published in print:
- 2016
- Published Online:
- October 2017
- ISBN:
- 9780691168180
- eISBN:
- 9781400880850
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691168180.003.0001
- Subject:
- Political Science, Political Theory
This introductory chapter explains that the book explores the question of whether state secrecy threatens the interests of citizens or whether it actually furthers them. It examines a means by which ...
More
This introductory chapter explains that the book explores the question of whether state secrecy threatens the interests of citizens or whether it actually furthers them. It examines a means by which citizens and lawmakers can be—and indeed are—alerted to wrongdoing: unauthorized disclosures of classified information. It argues that the possibility of unauthorized disclosures provides the most effective and credible guarantee that those who have the formal authority over state secrecy cannot systematically use it to their own advantage. The book considers whether the judicial review of state secrecy has been deferential, and, if so, whether such deference can be justified. It also discusses the practice of leaking as a practical means by which officials could alert citizens and lawmakers to wrongdoing. The chapter provides an overview of the chapters that follow.Less
This introductory chapter explains that the book explores the question of whether state secrecy threatens the interests of citizens or whether it actually furthers them. It examines a means by which citizens and lawmakers can be—and indeed are—alerted to wrongdoing: unauthorized disclosures of classified information. It argues that the possibility of unauthorized disclosures provides the most effective and credible guarantee that those who have the formal authority over state secrecy cannot systematically use it to their own advantage. The book considers whether the judicial review of state secrecy has been deferential, and, if so, whether such deference can be justified. It also discusses the practice of leaking as a practical means by which officials could alert citizens and lawmakers to wrongdoing. The chapter provides an overview of the chapters that follow.
Rahul Sagar
- Published in print:
- 2016
- Published Online:
- October 2017
- ISBN:
- 9780691168180
- eISBN:
- 9781400880850
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691168180.003.0002
- Subject:
- Political Science, Political Theory
This chapter examines whether state secrecy is commonly abused in contemporary America. A number of scholars argue that the real and apparent abuses of state secrecy are due not to flaws in the ...
More
This chapter examines whether state secrecy is commonly abused in contemporary America. A number of scholars argue that the real and apparent abuses of state secrecy are due not to flaws in the Constitution but rather to a lack of courage and wisdom on the part of representatives and citizens. The chapter challenges this claim and suggests that the Framers viewed state secrecy as an essential element of statecraft, and that they vested the authority to keep secrets in the executive because they saw it as best suited to exercise this power. It explains how the regulatory mechanisms that have been championed in recent decades, such as the judicial enforcement of the Freedom of Information Act, have proven ineffective at exposing wrongdoing. Meanwhile, the regulatory mechanisms that have proven effective at exposing wrongdoing, whistleblowing and leaking, are condemned as unlawful or undemocratic and therefore illegitimate. The chapter also considers oversight and regulation of state secrecy by Congress.Less
This chapter examines whether state secrecy is commonly abused in contemporary America. A number of scholars argue that the real and apparent abuses of state secrecy are due not to flaws in the Constitution but rather to a lack of courage and wisdom on the part of representatives and citizens. The chapter challenges this claim and suggests that the Framers viewed state secrecy as an essential element of statecraft, and that they vested the authority to keep secrets in the executive because they saw it as best suited to exercise this power. It explains how the regulatory mechanisms that have been championed in recent decades, such as the judicial enforcement of the Freedom of Information Act, have proven ineffective at exposing wrongdoing. Meanwhile, the regulatory mechanisms that have proven effective at exposing wrongdoing, whistleblowing and leaking, are condemned as unlawful or undemocratic and therefore illegitimate. The chapter also considers oversight and regulation of state secrecy by Congress.
Rahul Sagar
- Published in print:
- 2016
- Published Online:
- October 2017
- ISBN:
- 9780691168180
- eISBN:
- 9781400880850
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691168180.003.0007
- Subject:
- Political Science, Political Theory
This chapter explains the practice of leaking as a means by which officials could alert citizens and lawmakers to wrongdoing. It shows that officials are able to disclose classified information ...
More
This chapter explains the practice of leaking as a means by which officials could alert citizens and lawmakers to wrongdoing. It shows that officials are able to disclose classified information anonymously, because they recognize that the executive is often hard-pressed to identify the responsible party. However, it also highlights the fact that officials can—and do—make anonymous disclosures of classified information to advance narrow or partisan agendas by revealing classified information that casts their actions (or those of their adversaries) in a favorable (or unfavorable) light. In light of this danger, the chapter considers whether we might be able to utilize reporters, editors, and publishers to help us detect when anonymity of disclosures is being used to advance narrow or partisan interests.Less
This chapter explains the practice of leaking as a means by which officials could alert citizens and lawmakers to wrongdoing. It shows that officials are able to disclose classified information anonymously, because they recognize that the executive is often hard-pressed to identify the responsible party. However, it also highlights the fact that officials can—and do—make anonymous disclosures of classified information to advance narrow or partisan agendas by revealing classified information that casts their actions (or those of their adversaries) in a favorable (or unfavorable) light. In light of this danger, the chapter considers whether we might be able to utilize reporters, editors, and publishers to help us detect when anonymity of disclosures is being used to advance narrow or partisan interests.
Rahul Sagar
- Published in print:
- 2016
- Published Online:
- October 2017
- ISBN:
- 9780691168180
- eISBN:
- 9781400880850
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691168180.003.0008
- Subject:
- Political Science, Political Theory
This concluding chapter summarizes the book's main findings, beginning with the deep sense of anxiety that pervades contemporary discussions on state secrecy. This anxiety stems not from the concern ...
More
This concluding chapter summarizes the book's main findings, beginning with the deep sense of anxiety that pervades contemporary discussions on state secrecy. This anxiety stems not from the concern that state secrecy is contrary to democracy but rather from the concern that the government can use state secrecy to conceal wrongdoing. The institutions charged with regulating the use of state secrecy, Congress and the courts, have struggled to detect wrongdoing owing to constraints of information and expertise. The book has also explored whether whistleblowing and leaking constitute legitimate means of regulating state secrecy. This chapter outlines some of the means by which we might minimize the downsides of our dependence on unauthorized disclosures of classified information and argues that we need to ensure how executives and those who watch over them will utilize responsibly the discretion they are bound to enjoy.Less
This concluding chapter summarizes the book's main findings, beginning with the deep sense of anxiety that pervades contemporary discussions on state secrecy. This anxiety stems not from the concern that state secrecy is contrary to democracy but rather from the concern that the government can use state secrecy to conceal wrongdoing. The institutions charged with regulating the use of state secrecy, Congress and the courts, have struggled to detect wrongdoing owing to constraints of information and expertise. The book has also explored whether whistleblowing and leaking constitute legitimate means of regulating state secrecy. This chapter outlines some of the means by which we might minimize the downsides of our dependence on unauthorized disclosures of classified information and argues that we need to ensure how executives and those who watch over them will utilize responsibly the discretion they are bound to enjoy.
Filippo De Vivo
- Published in print:
- 2007
- Published Online:
- September 2008
- ISBN:
- 9780199227068
- eISBN:
- 9780191711114
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199227068.003.0003
- Subject:
- History, European Early Modern History
This chapter moves from government to the political arena around it. In the broglio's canvassing and squabbles, written and oral information were tools of political activity. The focus here is on ...
More
This chapter moves from government to the political arena around it. In the broglio's canvassing and squabbles, written and oral information were tools of political activity. The focus here is on elites, defined not so much by census or birth as by proximity to governmental business: patricians, but also secretaries, foreign ambassadors, spies, and writers of avvisi. The chapter starts in the archive — a treasure less secure than many thought — and discusses the private appropriation of public documents by individuals such as Marin Sanudo, Giovan Vincenzo Pinelli, and Claudio Cornelio Frangipane. Leaking documents such as Venice's famous ambassadorial reports (relazioni) was itself an instrument of both power squabbles and commercial transactions, as illustrated by the case study of ambassador Ottaviano Bon's 1619 report disclosure. The chapter also offers a novel understanding of diplomacy and spying as information activities, and it discusses the mechanisms and reach of Venice's thriving manuscript newswriting.Less
This chapter moves from government to the political arena around it. In the broglio's canvassing and squabbles, written and oral information were tools of political activity. The focus here is on elites, defined not so much by census or birth as by proximity to governmental business: patricians, but also secretaries, foreign ambassadors, spies, and writers of avvisi. The chapter starts in the archive — a treasure less secure than many thought — and discusses the private appropriation of public documents by individuals such as Marin Sanudo, Giovan Vincenzo Pinelli, and Claudio Cornelio Frangipane. Leaking documents such as Venice's famous ambassadorial reports (relazioni) was itself an instrument of both power squabbles and commercial transactions, as illustrated by the case study of ambassador Ottaviano Bon's 1619 report disclosure. The chapter also offers a novel understanding of diplomacy and spying as information activities, and it discusses the mechanisms and reach of Venice's thriving manuscript newswriting.
Tarek El-Ariss
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9780691181936
- eISBN:
- 9780691184913
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691181936.003.0002
- Subject:
- Literature, Criticism/Theory
This chapter examines the confrontational practices of Egyptian activist Wael Abbas. Investigating the interplay of leaks and scene-making in Wael's posts and language, which are often decried or ...
More
This chapter examines the confrontational practices of Egyptian activist Wael Abbas. Investigating the interplay of leaks and scene-making in Wael's posts and language, which are often decried or dismissed as vulgar and offensive, the chapter problematizes the charge of qillat adab (uncivil, disrespectful, impolite, rude), exploring it both as practice and performance that is amplified by new media technology yet coincides with, is grounded in, and arises from local, affective models of protest and contestation. Tracing a trail of invectives and bruises, torture videos, and online attacks, it is argued that the activist-blogger is no longer tied to the disciplining project of the liberal state or to the “lonely intellectual” speaking truth to power.Less
This chapter examines the confrontational practices of Egyptian activist Wael Abbas. Investigating the interplay of leaks and scene-making in Wael's posts and language, which are often decried or dismissed as vulgar and offensive, the chapter problematizes the charge of qillat adab (uncivil, disrespectful, impolite, rude), exploring it both as practice and performance that is amplified by new media technology yet coincides with, is grounded in, and arises from local, affective models of protest and contestation. Tracing a trail of invectives and bruises, torture videos, and online attacks, it is argued that the activist-blogger is no longer tied to the disciplining project of the liberal state or to the “lonely intellectual” speaking truth to power.
Tarek El-Ariss
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9780691181936
- eISBN:
- 9780691184913
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691181936.003.0003
- Subject:
- Literature, Criticism/Theory
This chapter focuses on Saudi “tweeter” Mujtahidd, who has been leaking by “showing the inside” of the Saudi government and royal family since 2011. It explores how the leaking subject, the unknown ...
More
This chapter focuses on Saudi “tweeter” Mujtahidd, who has been leaking by “showing the inside” of the Saudi government and royal family since 2011. It explores how the leaking subject, the unknown Mujtahidd or Mujtahidd the “mystery,” constructs himself as an online character (avatar), author, and knower. Drawing on classical Arabic prose genres such as akhbār (anecdotes, news, lore), it reads the fiction of the leak in relation to the genres of serialized novels and TV series. It argues that the collapse between Twitter user and Twitter as such is at work in Mujtahidd's case as well. Mujtahidd fuses with Twitter, reproducing it as function of revelation, writing genre, and machine à scandale.Less
This chapter focuses on Saudi “tweeter” Mujtahidd, who has been leaking by “showing the inside” of the Saudi government and royal family since 2011. It explores how the leaking subject, the unknown Mujtahidd or Mujtahidd the “mystery,” constructs himself as an online character (avatar), author, and knower. Drawing on classical Arabic prose genres such as akhbār (anecdotes, news, lore), it reads the fiction of the leak in relation to the genres of serialized novels and TV series. It argues that the collapse between Twitter user and Twitter as such is at work in Mujtahidd's case as well. Mujtahidd fuses with Twitter, reproducing it as function of revelation, writing genre, and machine à scandale.
Tarek El-Ariss
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9780691181936
- eISBN:
- 9780691184913
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691181936.003.0004
- Subject:
- Literature, Criticism/Theory
This chapter analyzes the works of Rajaa Alsanea (b. 1981) and Khaled Alkhamissi (b. 1962) as the fiction of the leaking subject who wants to reveal it all, mimicking e-mails about the private life ...
More
This chapter analyzes the works of Rajaa Alsanea (b. 1981) and Khaled Alkhamissi (b. 1962) as the fiction of the leaking subject who wants to reveal it all, mimicking e-mails about the private life of individuals turned characters and recording and circulating scenes of abuse and violation on the street through novelistic scenes. It argues that the author, who is traditionally understood as the function of discourse in Foucault or as the object of sacrifice in Barthes, emerges in this new fiction as the scandalous function of the leak that recodes the novel as medium. It explores how literature is reimagined and reaffirmed in instances of greed, exhibitionism, confrontation, and hacking that affectively grab and move readers, marking the emergence of a new literary culture and aesthetics tied to the bestseller and the pursuit of fame.Less
This chapter analyzes the works of Rajaa Alsanea (b. 1981) and Khaled Alkhamissi (b. 1962) as the fiction of the leaking subject who wants to reveal it all, mimicking e-mails about the private life of individuals turned characters and recording and circulating scenes of abuse and violation on the street through novelistic scenes. It argues that the author, who is traditionally understood as the function of discourse in Foucault or as the object of sacrifice in Barthes, emerges in this new fiction as the scandalous function of the leak that recodes the novel as medium. It explores how literature is reimagined and reaffirmed in instances of greed, exhibitionism, confrontation, and hacking that affectively grab and move readers, marking the emergence of a new literary culture and aesthetics tied to the bestseller and the pursuit of fame.
Tarek El-Ariss
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9780691181936
- eISBN:
- 9780691184913
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691181936.003.0005
- Subject:
- Literature, Criticism/Theory
Focusing on the Internet as a space of regression and harassment following the Arab uprisings, this chapter traces the violence perpetrated against Arab authors, activists, and intellectuals online ...
More
Focusing on the Internet as a space of regression and harassment following the Arab uprisings, this chapter traces the violence perpetrated against Arab authors, activists, and intellectuals online to the emergence of fiction as hyperreality principle. Investigating the relation between reading practices and knowledge production, and continuing the examination of the function of the author as leaking subject in the digital age, it focuses on the act of fragmenting the work itself through online campaigns and perverse literary performances. Specifically, it examines a hashtag campaign—in fact, a hashtag ghazwa (tribal raid)—launched on Twitter against a Saudi author, Badriah Albeshr [al-Beshr] (b. 1967), who was accused of apostasy for passages in her novel Hend and the Soldiers (2010).Less
Focusing on the Internet as a space of regression and harassment following the Arab uprisings, this chapter traces the violence perpetrated against Arab authors, activists, and intellectuals online to the emergence of fiction as hyperreality principle. Investigating the relation between reading practices and knowledge production, and continuing the examination of the function of the author as leaking subject in the digital age, it focuses on the act of fragmenting the work itself through online campaigns and perverse literary performances. Specifically, it examines a hashtag campaign—in fact, a hashtag ghazwa (tribal raid)—launched on Twitter against a Saudi author, Badriah Albeshr [al-Beshr] (b. 1967), who was accused of apostasy for passages in her novel Hend and the Soldiers (2010).
Tarek El-Ariss
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9780691181936
- eISBN:
- 9780691184913
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691181936.003.0006
- Subject:
- Literature, Criticism/Theory
This concluding chapter summarizes key themes and presents some final thoughts. Examining literature and social media, activism and politics, the book identified a techno-archaic portal, breaching ...
More
This concluding chapter summarizes key themes and presents some final thoughts. Examining literature and social media, activism and politics, the book identified a techno-archaic portal, breaching the narrative of modernity. The role of the Internet as “public sphere”—a utopian framework that promised an open and nonhierarchal encounter with the other—has given way to pre-Islamic raids and sophisticated hacks, trolling and attack that come from the present and a fantasized past, and jinn-like seers and narrators of akhbār. Both the Internet and the subject of modernity are leaking, unable to contain their enlightenment and liberal narratives, or to control the gushing from a dimension that lies beyond. This leaking is not a techno-salvation, but creates the possibility of change that also involves dangerous processes and openings that risk engulfing authors and activists.Less
This concluding chapter summarizes key themes and presents some final thoughts. Examining literature and social media, activism and politics, the book identified a techno-archaic portal, breaching the narrative of modernity. The role of the Internet as “public sphere”—a utopian framework that promised an open and nonhierarchal encounter with the other—has given way to pre-Islamic raids and sophisticated hacks, trolling and attack that come from the present and a fantasized past, and jinn-like seers and narrators of akhbār. Both the Internet and the subject of modernity are leaking, unable to contain their enlightenment and liberal narratives, or to control the gushing from a dimension that lies beyond. This leaking is not a techno-salvation, but creates the possibility of change that also involves dangerous processes and openings that risk engulfing authors and activists.
Helmuth Spieler
- Published in print:
- 2005
- Published Online:
- September 2007
- ISBN:
- 9780198527848
- eISBN:
- 9780191713248
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780198527848.003.0009
- Subject:
- Physics, Particle Physics / Astrophysics / Cosmology
This chapter discusses pitfalls encountered in bringing detector systems into operation. Common interference mechanisms — e.g., power supply noise, light leaks, RF pickup, and microphonics — are ...
More
This chapter discusses pitfalls encountered in bringing detector systems into operation. Common interference mechanisms — e.g., power supply noise, light leaks, RF pickup, and microphonics — are described together with diagnostic and mitigation techniques. Conventional shielding and low-mass shielding techniques are presented, e.g., field line pinning and ‘self-shielding’ sensors and cables. A detailed discussion of shared current paths (‘ground loops’) illustrates that controlling current paths is much more important than ‘grounding’, which often introduces additional noise. Techniques to control current paths at the system level, in PC board layout, at the circuit level, and through connections to integrated circuits are described. Proper placement of bypass capacitors, series resonance effects, and the choice of appropriate capacitor types and ceramic dielectrics are discussed. External noise can also be suppressed by the choice of pulse shaper, e.g., to attenuate low-frequency interference. In closing, the importance of local referencing is illustrated.Less
This chapter discusses pitfalls encountered in bringing detector systems into operation. Common interference mechanisms — e.g., power supply noise, light leaks, RF pickup, and microphonics — are described together with diagnostic and mitigation techniques. Conventional shielding and low-mass shielding techniques are presented, e.g., field line pinning and ‘self-shielding’ sensors and cables. A detailed discussion of shared current paths (‘ground loops’) illustrates that controlling current paths is much more important than ‘grounding’, which often introduces additional noise. Techniques to control current paths at the system level, in PC board layout, at the circuit level, and through connections to integrated circuits are described. Proper placement of bypass capacitors, series resonance effects, and the choice of appropriate capacitor types and ceramic dielectrics are discussed. External noise can also be suppressed by the choice of pulse shaper, e.g., to attenuate low-frequency interference. In closing, the importance of local referencing is illustrated.
A.G. Noorani
- Published in print:
- 2006
- Published Online:
- October 2012
- ISBN:
- 9780195678291
- eISBN:
- 9780199080588
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195678291.003.0036
- Subject:
- Law, Constitutional and Administrative Law
This chapter focuses on the issues of parliamentary privileges and press leaks in relation to the joint parliamentary committee's (JPC) deliberations on the banks scam. Though JPC chairman Ram Niwas ...
More
This chapter focuses on the issues of parliamentary privileges and press leaks in relation to the joint parliamentary committee's (JPC) deliberations on the banks scam. Though JPC chairman Ram Niwas Mirdha reassured the press and the public that they would not be kept in the dark about the proceedings, he still has the last say and is the judge on what the people are entitled to know. The chapter suggests that Mirdha should be reminded that neither the press nor the people can compromise on their fundamental right to freedom of speech and expression and their right to know. In addition, it is possible that a member of the JPC who is baulked in his attempts to unravel the truth will be provoked to alert the press to the fact and the press for its part will be obliged to publish that information.Less
This chapter focuses on the issues of parliamentary privileges and press leaks in relation to the joint parliamentary committee's (JPC) deliberations on the banks scam. Though JPC chairman Ram Niwas Mirdha reassured the press and the public that they would not be kept in the dark about the proceedings, he still has the last say and is the judge on what the people are entitled to know. The chapter suggests that Mirdha should be reminded that neither the press nor the people can compromise on their fundamental right to freedom of speech and expression and their right to know. In addition, it is possible that a member of the JPC who is baulked in his attempts to unravel the truth will be provoked to alert the press to the fact and the press for its part will be obliged to publish that information.
Eric Arbiter
- Published in print:
- 2020
- Published Online:
- September 2020
- ISBN:
- 9780190919610
- eISBN:
- 9780197554722
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190919610.003.0008
- Subject:
- Music, Performing Practice/Studies
The condition of the bassoon, breath support, cane quality, bocal, and fingerings all affect the success of our reeds; how to get to the primary causes of problems.
The condition of the bassoon, breath support, cane quality, bocal, and fingerings all affect the success of our reeds; how to get to the primary causes of problems.
William M. Alley and Rosemarie Alley
- Published in print:
- 2017
- Published Online:
- September 2017
- ISBN:
- 9780300220384
- eISBN:
- 9780300227550
- Item type:
- chapter
- Publisher:
- Yale University Press
- DOI:
- 10.12987/yale/9780300220384.003.0012
- Subject:
- Environmental Science, Nature
This chapter examines microbial contamination of groundwater that can threaten drinking water supplies and the importance of proper well construction and protection. Case studies are presented of E. ...
More
This chapter examines microbial contamination of groundwater that can threaten drinking water supplies and the importance of proper well construction and protection. Case studies are presented of E. coli poisoning in Walkerton, Ontario and viruses in Wisconsin. The Walkerton incident in 2000 caused Canadian provinces to take a hard look at their drinking water safety through better monitoring, enforcement, training, and source-water protection programs. The Wisconsin case study illustrates the potential for viruses from leaking sewers to contaminant municipal wells.Less
This chapter examines microbial contamination of groundwater that can threaten drinking water supplies and the importance of proper well construction and protection. Case studies are presented of E. coli poisoning in Walkerton, Ontario and viruses in Wisconsin. The Walkerton incident in 2000 caused Canadian provinces to take a hard look at their drinking water safety through better monitoring, enforcement, training, and source-water protection programs. The Wisconsin case study illustrates the potential for viruses from leaking sewers to contaminant municipal wells.
Geoffrey Stone and Lee Bollinger (eds)
- Published in print:
- 2021
- Published Online:
- April 2021
- ISBN:
- 9780197519387
- eISBN:
- 9780197519424
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780197519387.001.0001
- Subject:
- Law, Constitutional and Administrative Law
The United States Supreme Court made a landmark decision in the Pentagon Papers case in 1971, concerning how government should balance its legitimate need to conduct its operations—especially those ...
More
The United States Supreme Court made a landmark decision in the Pentagon Papers case in 1971, concerning how government should balance its legitimate need to conduct its operations—especially those related to national security—in secret, with the public’s right and responsibility to know what its government is doing. The Pentagon Papers decision, though, left many important questions still unresolved and the circumstances that undergirded the system initiated by the decision have changed fundamentally in recent decades. Difficult problems call for a range of different perspectives. In this book, Lee C. Bollinger and Geoffrey R. Stone gather an array of remarkable, wise, and accomplished individuals to share their deep and broad expertise in the national security world, journalism, and academia. Each essay delves into important dimensions of the current system to explain how we should think about them, and to offer as many solutions as possible. A rigorous and serious analysis, this volume examines the incredibly complex and important issues that our nation must continue to address and strive to resolve as we move into the future.Less
The United States Supreme Court made a landmark decision in the Pentagon Papers case in 1971, concerning how government should balance its legitimate need to conduct its operations—especially those related to national security—in secret, with the public’s right and responsibility to know what its government is doing. The Pentagon Papers decision, though, left many important questions still unresolved and the circumstances that undergirded the system initiated by the decision have changed fundamentally in recent decades. Difficult problems call for a range of different perspectives. In this book, Lee C. Bollinger and Geoffrey R. Stone gather an array of remarkable, wise, and accomplished individuals to share their deep and broad expertise in the national security world, journalism, and academia. Each essay delves into important dimensions of the current system to explain how we should think about them, and to offer as many solutions as possible. A rigorous and serious analysis, this volume examines the incredibly complex and important issues that our nation must continue to address and strive to resolve as we move into the future.
Donald A. Ritchie
- Published in print:
- 2021
- Published Online:
- May 2021
- ISBN:
- 9780190067588
- eISBN:
- 9780190067618
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190067588.001.0001
- Subject:
- History, American History: 20th Century, Political History
In the “Washington Merry-Go-Round,” a nationally syndicated newspaper column that appeared in hundreds of papers from 1932 to 1969, as well as on weekly radio and television programs, the ...
More
In the “Washington Merry-Go-Round,” a nationally syndicated newspaper column that appeared in hundreds of papers from 1932 to 1969, as well as on weekly radio and television programs, the investigative journalist Drew Pearson revealed news that public officials tried to suppress. He disclosed policy disputes and political spats, exposed corruption, attacked bigotry, and promoted social justice. He pumped up some political careers and destroyed others. Presidents, prime ministers, and members of Congress repeatedly called him a liar, and he was sued for libel more often than any other journalist, but he won most of his cases by proving the accuracy of his charges. Pearson dismissed most official news as propaganda and devoted his column to reporting what officials were doing behind closed doors. He broke secrets—even in wartime—and revealed classified information. Fellow journalists credited him with knowing more dirt about more people in Washington than even the FBI and compared his efforts to Daniel Ellsberg with the Pentagon Papers or Edward Snowden with WikiLeaks, except that he did it daily. The Columnist examines how Pearson managed to uncover secrets so successfully and why government efforts to find his sources proved so unsuccessful. Drawing on a half century of archival evidence, it assesses his contributions as a muckraker by verifying or refuting both his accusations and his accusers.Less
In the “Washington Merry-Go-Round,” a nationally syndicated newspaper column that appeared in hundreds of papers from 1932 to 1969, as well as on weekly radio and television programs, the investigative journalist Drew Pearson revealed news that public officials tried to suppress. He disclosed policy disputes and political spats, exposed corruption, attacked bigotry, and promoted social justice. He pumped up some political careers and destroyed others. Presidents, prime ministers, and members of Congress repeatedly called him a liar, and he was sued for libel more often than any other journalist, but he won most of his cases by proving the accuracy of his charges. Pearson dismissed most official news as propaganda and devoted his column to reporting what officials were doing behind closed doors. He broke secrets—even in wartime—and revealed classified information. Fellow journalists credited him with knowing more dirt about more people in Washington than even the FBI and compared his efforts to Daniel Ellsberg with the Pentagon Papers or Edward Snowden with WikiLeaks, except that he did it daily. The Columnist examines how Pearson managed to uncover secrets so successfully and why government efforts to find his sources proved so unsuccessful. Drawing on a half century of archival evidence, it assesses his contributions as a muckraker by verifying or refuting both his accusations and his accusers.
Lida Maxwell
- Published in print:
- 2019
- Published Online:
- June 2019
- ISBN:
- 9780190920029
- eISBN:
- 9780190920067
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190920029.001.0001
- Subject:
- Political Science, American Politics, Political Theory
Insurgent Truth argues for the importance of outsider truth-telling to democratic politics and reads Chelsea Manning as an important contemporary outsider truth-teller. Outsider truth-tellers such as ...
More
Insurgent Truth argues for the importance of outsider truth-telling to democratic politics and reads Chelsea Manning as an important contemporary outsider truth-teller. Outsider truth-tellers such as Manning tell or enact unsettling truths from a position of social illegibility. Often dismissed as in-credible by their societies, this book argues that their acts and writings reveal problems with dominant models of truth and truth-telling in politics, which often look to truth to offer a prepolitical stable common ground and align credibility with gendered, classed, and raced traits. Focusing on how outsider truth-tellers reveal this supposedly prepolitical common ground to reflect the power and reality of elites, Insurgent Truth argues that outsider truth-telling enacts an important, if risky democratic role in three ways: 1) revealing oppression and violence that the dominant class would otherwise not see; 2) revealing, in their truth-telling, the possibility of another way of living; and 3) disclosing an alternative form of stability via outsider solidarity. Insurgent Truth develops this argument through reading Chelsea Manning’s actions in conjunction with a cohort of other outsider truth-tellers: especially Virginia Woolf, Bayard Rustin, Audre Lorde, and Anna Julia Cooper.Less
Insurgent Truth argues for the importance of outsider truth-telling to democratic politics and reads Chelsea Manning as an important contemporary outsider truth-teller. Outsider truth-tellers such as Manning tell or enact unsettling truths from a position of social illegibility. Often dismissed as in-credible by their societies, this book argues that their acts and writings reveal problems with dominant models of truth and truth-telling in politics, which often look to truth to offer a prepolitical stable common ground and align credibility with gendered, classed, and raced traits. Focusing on how outsider truth-tellers reveal this supposedly prepolitical common ground to reflect the power and reality of elites, Insurgent Truth argues that outsider truth-telling enacts an important, if risky democratic role in three ways: 1) revealing oppression and violence that the dominant class would otherwise not see; 2) revealing, in their truth-telling, the possibility of another way of living; and 3) disclosing an alternative form of stability via outsider solidarity. Insurgent Truth develops this argument through reading Chelsea Manning’s actions in conjunction with a cohort of other outsider truth-tellers: especially Virginia Woolf, Bayard Rustin, Audre Lorde, and Anna Julia Cooper.
Kathryn Hendley
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9781501705243
- eISBN:
- 9781501708107
- Item type:
- chapter
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501705243.003.0003
- Subject:
- Law, Public International Law
This chapter examines how Russians respond when water leaks into their apartments, a very common problem in Russia. At first glance, law would seem to have little to do with how problems among ...
More
This chapter examines how Russians respond when water leaks into their apartments, a very common problem in Russia. At first glance, law would seem to have little to do with how problems among neighbors are resolved in Russia. Russians are slow to invoke formal law. Litigation or even threats of litigation are the exception, not the rule. The chapter begins with an overview of the role of law in problem solving among neighbors and a conceptual framework for the evolution of disputes between neighbors, including ceiling leaks. It then considers Russians' legal consciousness as well as the problem-solving strategies they employed to deal with damage from home water leaks. Based on the results of focus groups and follow-up interviews, three basic strategies are evident: avoidance strategy, self-help strategy, and third-party intervention.Less
This chapter examines how Russians respond when water leaks into their apartments, a very common problem in Russia. At first glance, law would seem to have little to do with how problems among neighbors are resolved in Russia. Russians are slow to invoke formal law. Litigation or even threats of litigation are the exception, not the rule. The chapter begins with an overview of the role of law in problem solving among neighbors and a conceptual framework for the evolution of disputes between neighbors, including ceiling leaks. It then considers Russians' legal consciousness as well as the problem-solving strategies they employed to deal with damage from home water leaks. Based on the results of focus groups and follow-up interviews, three basic strategies are evident: avoidance strategy, self-help strategy, and third-party intervention.