The leaker doubtless used the modern technique of the copy machine and shoe leather.
FORBES: WikiLeaks Fallout is Bullish for Boeing, Airbus and United-Continental
One legal ethics expert says LaBovick wouldn't have much of a case against the leaker.
This leaker was thought to be a top Bush aide, perhaps even the vice president.
WSJ: Daniel Henninger: George W. Bush and the I. Lewis "Scooter" Libby Pardon
Did a White House leaker compromise the identity of a CIA employee to columnist Robert Novak?
Wikileaks has done an outstanding job protecting leaker privacy but their facilities are currently strained.
According to Grasso, Spitzer is a political grandstander, a serial leaker and a phony.
Daniel Ellsberg, leaker of the Pentagon Papers to the New York Times in 1971.
In the early 1990s, Keyworth was thought to be the unofficial leaker for David Packard himself.
And what if the leaker is determined to siphon out a rarer, seldom-accessed file without flagging network monitoring technologies?
FORBES: My Take On Evgeny Morozov's Review Of My Book, 'This Machine Kills Secrets'
He said he had told Keyworth that the leaker had been identified and then waited for him to confess.
They had received a preliminary report from Hunsaker identifying Keyworth as the leaker.
True, Keyworth is a promiscuous leaker, but he has always been a leaker.
Nixon wanted to use the media to "destroy" the leaker of the papers, Daniel Ellsberg, a former Defense Department official.
The idea is to keep an eye on everything that is happening in a corporate network, and thus to detect a leaker.
Ashcroft appeared to be more optimistic the probe might succeed than President Bush, who has openly expressed doubt the leaker would be discovered.
The disgruntled leaker claimed that the intelligence for this came from only one uncorroborated source one which the Joint Intelligence Committee had been reluctant to validate.
But they cannot typically demonstrate illegal conduct (unless the leaker is dumb enough to disclose the classified information in an email or via a taped conversation).
He said that before the meeting he had spoken to the director who had been identified as the leaker, and the director had admitted speaking to Kawamoto.
After a warts-and-all portrait of Assange appeared on the front page of The Times back in October, the relationship between the paper and the leaker-king soured.
In the end, the relevant players lost sight of a critical facet of human nature--the identity of the leaker is less significant than the board???s fear of the investigation.
And in a large corporation or agency, plenty of the documents a leaker might want to exfiltrate are shared among a crowd of users, all of whom have authorized access.
FORBES: My Take On Evgeny Morozov's Review Of My Book, 'This Machine Kills Secrets'
Bipartisan efforts are needed to identify whoever is responsible for the leaks, involving a cyberwarfare program against Iran and other intelligence matters, and "make sure that leaker goes to jail, " he said.
"Obtaining a broad range of telephone records in order to ferret out a government leaker is an unacceptable abuse of power, " Ben Wizner, the head of the ACLU's Speech, Privacy, and Technology Project, said in a written statement.
In my many years of writing about Washington's politics, I thought that the Plame affair, its long, mad hunt for the leaker, and then the Libby trial, was one of the most fantastic, preposterous events I've ever watched.
WSJ: Daniel Henninger: George W. Bush and the I. Lewis "Scooter" Libby Pardon
The recent revelation that in 2003 Deputy Secretary of State Richard Armitage was the original leaker of the name of a CIA agent has led to an astonishing climax in a case that clearly should never have seen the light of day.
If there had been a general consensus on HP???s board that the leaker should be identified, the simplest approach would have been to ask all directors, again at a face-to-face meeting, to make their telephone and e-mail records available to a third party investigator.
After all, if Jason turned out to be a person of knowledge in this matter, and the individual referencing him as a possible leaker was, in fact, the Speaker of the Assembly, this would certainly give credence to the notion that important people in Wisconsin were taking the story seriously.
But instead of publishing the leaks on its site--a strategy that has made WikiLeaks the target of cyber- and legal attacks since it began posting a quarter-million secret cables from the U.S. State Department last month--OpenLeaks will function as a secure tip box that passes leaked files on to whatever media outlet or NGO the leaker chooses.
应用推荐