The Whistle, October 2008

Total Page:16

File Type:pdf, Size:1020Kb

The Whistle, October 2008 “All that is needed for evil to prosper is for people of good will to do nothing”—Edmund Burke The Whistle NO. 56, OCTOBER 2008 Newsletter of Whistleblowers Australia Media watch Qld: Whistleblowers need were circulated and legal action taken of ethical, political or diplomatic as the company attempted to convince significance. to stand firm: Cooper her to drop her investigation into fraud Wikileaks’ fame has spread rapidly Steve Gray at the Fortune 500 company. in recent weeks, thanks to the release Australian Associated Press, To make her task harder, World- of some headline-grabbing documents. 29 July 2008 Com was based in her Jackson, Missis- These include the design for the sippi, hometown and many of the Hiroshima atomic bomb, a report on Whistleblowers face anxiety, depres- major players were members of the how the UK acquired its nuclear sion and alcoholism but need to stick small community. weapons capability, and hundreds of by their principles, a business forum in She said whistleblowers often lost camera phone pictures of the Tibetan Brisbane has been told. their houses and families were riots. bankrupted, faced alcoholism and In the last fortnight alone it has depression. released 50 documents and it is now Most were not fired outright but hosting more leaks than its global were manoeuvred out of their jobs network of volunteer editors appear within 12 months. able to check. “I had a choice to make,” she said. Thanks to Wikileaks, potential “Either I could let this ruin my life whistle-blowers are now far more or I could step back and re-evaluate it willing to come forward, says John and move forward in a completely Young, who runs the long-standing different direction. site Cryptome.org, which specialises in “That’s exactly what I decided to posting documents on espionage, do, but it was the most difficult thing intelligence and cryptography issues. I’d ever been through in my lifetime.” “We started getting a lot less informa- tion after 9/11 as people became more Cynthia Cooper, who revealed the cautious when law enforcement biggest fraud in US corporate history, agencies got more draconian powers. told the Queensland University of A fail-safe way to So we are very happy to see Wikileaks Technology Business Leaders’ Forum embarrass people doing what they are doing so aggres- today that knowing what you stand for in high places sively.” is not enough. This flood of leaked documents has Whistle-blowers can tell all without “It’s more than that, we need to been made possible by internet being traced, thanks to websites that find our courage,” the WorldCom technology that allows whistle-blowers anonymise their details whistleblower said. to post documents online without Paul Marks “It’s not always easy to find our revealing their identity or IP address. New Scientist, volume 198, courage. The website uses a network called The 10 May 2008, pp. 28-29 “There were times when I literally Onion Router (Tor), to disguise the was scared to death, my hands were origin of documents. Tor routes JUST how accurate are GPS-guided shaking, my heart was pounding and I documents sent to the Wikileaks precision bombs, and what is most had to find a way to push forward in website into a cloud of hundreds of likely to send them off-target? Now the face of fear.” servers, where they bounce randomly you can find out by simply reading the She said her mother’s lessons never between a handful of them, before smart bomb’s tactical manual on the to be intimidated and never be bullied finally landing in one of Wikileaks’ internet. No, the Pentagon didn’t slip had helped her. inboxes (see “The onion will cover up and post the instructions online. Ms Cooper’s revelations about $9 your tracks,” next page). Rather, a whistle-blower leaked the billion worth of fraud at the highest To track where a leaked document, manual via Wikileaks, a website that levels of WorldCom led to the impris- picture or video came from would take uses anonymising technology to dis- onment of five senior executives and the computing power of the US guise the source of leaked information. changes to corporate law across National Security Agency. And it Launched online in early 2007, America. would have to be trained on the right Wikileaks is run by an informal group She was named one of Time servers at the right time, making it of open government and anti-secrecy magazine’s Persons of the Year in virtually impossible to succeed. advocates who want to allow people 2002. Ironically, given the number of living under oppressive regimes, or “Things begin to happen when military documents that are leaked to with something to say in the public you’re a whistleblower,” Ms Cooper Wikileaks and other whistle-blowing interest, to anonymously leak docu- said. “Your life will really change.” websites, the Tor network was ments that have been censored or are She said her career was threatened, originally developed by the US Naval rumours of her being a “scorned lover” PAGE 2 THE WHISTLE, #56, OCTOBER 2008 Research Laboratory, based in lar have very strong anti-censorship bolts onto existing 500 to 2000-pound Washington DC, before becoming an legislation, making Wikileaks a resil- bombs, turning them into individually open source project anybody can use. ient beast. targeted gliders that are accurate to But this does not mean the military has Once a document has been submit- within 3 metres. Eighty JDAMs can a back door into the system, says ted to the website, and before it can be level all the critical infrastructure of a Wikileaks spokesman Julian Assange. published, editors check it for veracity medium-sized city in one B2 bomber “Like the internet, Tor is out of the and assure themselves that it is of flight, says Assange. “This means that hands of those that were once involved compelling public interest. “Anony- posting the manual clearly fits our in crafting it,” he says. mous leaking is an ancient art and editorial policy that the material be of many websites publish documents political, diplomatic or ethical signifi- The onion will cover your tracks from sources they cannot identify,” cance.” No spy movie is complete without an says Steven Aftergood of the Federa- Despite the success of Wikileaks in agent trying to shake off the villain on tion of American Scientists’ (FAS) bringing such documents out into the their tail by taking random twists and Project on Government Secrecy. open, potential whistle-blowers should turns down back alleys and side “What Wikileaks has done is to profes- remain on their guard when posting streets. The Onion Router (Tor) does sionalise the operation. They have documents to any leak site, says the same thing with your digital files, created a standard procedure for Young. Some are in fact run by intelli- and then erases your “footprints”. receiving, processing and publishing gence agencies hoping to catch A Tor network comprises thou- leaks.” whistle-blowers in the act, he says. sands of volunteer users who turn their In 2007, for example, Wikileaks “There are lots of dirty tricks out computers into “onion proxy” servers revealed massive corruption in the there. We always caution against by downloading client software from Kenyan government and made the trusting our site or anybody else’s the Tor website. Then, when you want startling discovery that agents of the because there are so many ‘sting’ sites to send a message, Tor encrypts it Stasi, the former East German secret out there,” he adds. three times in onion-like layers and police, had become members of the Meanwhile, some anti-secrecy forwards a key to each layer to three commission investigating Stasi crimes. advocates in the US criticise proxy servers, chosen at random, in the It also leaked a Pentagon handbook Wikileaks’ editorial policy for being network. revealing that psychological torture too open, as the website does not When the message arrives at the was used against prisoners at the US’s censor sensitive military documents, first server, its outer layer is decrypted Camp Delta in Guantanamo Bay. including potentially dangerous details and so on. By the time the completely So how do Wikileaks’ editors on bombs. decrypted message pops out of the decide which leaks to post? Unlike Assange says there are no third server, it appears to have print editors, Wikileaks’ editors do not documents Wikileaks would not post originated at this server, disguising its reject leaked documents just because on the grounds of military sensitivity. true source. “Imagine a large room they are unlikely to have widespread “It would be quite incorrect for us to jammed full of people in which many appeal. The only rule is that leaks must express any national favouritism,” he of them are passing around envelopes,” be in the public interest, says Assange. says. says computer security expert Bruce And there are few frivolous leaks, he That greatly troubles Aftergood, Schneier. “How would you know says. “Our sources, perhaps inspired who also leaks documents through his where any of them started?” by examples already set, nearly always FAS newsletter Secrecy News and the However, Tor is not completely send in genuine public interest FAS website. “They are essentially an secure. Steven J. Murdoch and col- material. Wikileaks pushes submis- outlaw operation — operating literally leagues at the University of Cambridge sions through a number of questions outside the framework of the law — have shown that it is possible to iden- and only the well-motivated leaks get and they have shown no willingness to tify some onion proxies.
Recommended publications
  • Building a Culture of Empowerment
    BUILDING A CULTURE OF EMPOWERMENT Leading for culture where both employees and business can overcome challenges, reach their highest potential, and truly thrive. WWW.TENFOLDBRAND.COM CONTENTS 03 Does your organization have a culture of empowerment? 04 Why is it so hard? 04 THE TYRANNY OF CONSENSUS 05 STRATEGIC VISION MIA 06 RIGHT CHAIRS, WRONG BUTTS 07 THE COMFORT OF MICROMANAGEMENT 08 Power a culture of empowerment 08 KNOW WHAT YOU’RE UP AGAINST 09 ARTICULATE THE FULL CULTURAL VISION 10 REINFORCE, REINFORCE, REINFORCE 11 Start where you are www.tenfoldbrand.com | @tenfoldbrand 2 DOES YOUR ORGANIZATION HAVE A CULTURE OF EMPOWERMENT? Most leaders would like to answer that question with a resounding “Absolutely.” But many can’t. By our definition, a culture of empowerment is a set of organizational values, norms, policies, and practices marked by the granting of authority, power, and ownership to others across levels. It’s an environment where people routinely step beyond their assigned roles and responsibilities to suggest new ideas and practices or help others with key tasks; where strategic risk-taking is not only encouraged but celebrated; where people offer thoughtful, critical feedback to teammates without prompting, even to the CEO. Importantly, a culture of empowerment creates large benefits for your organization, including higher levels of creativity and innovation, better customer service, stronger morale, and improved hiring and turnover. Companies with cultures marked by high levels of trust and empowerment are more than 2.5 times as likely to be revenue leaders in their industries than others, and to outperform on other important dimensions.1 So why doesn’t every organization have such a culture? Because it’s not easy.
    [Show full text]
  • The Legal and Managerial Aspects of Countering Mobbing As an Organizational Pathology
    THE LEGAL AND MANAGERIAL ASPECTS OF COUNTERING MOBBING AS AN ORGANIZATIONAL PATHOLOGY Jacek Pasieczny1 Paweł Kłobukowski2 Aleksandra Polińska3 Resume Any organizational activity is constantly accompanied by side effects which contribute to the fact that organizational goals are not fully achieved. These phenomena and mechanisms are commonly defined as Using terms such as dysfunctions, pathol- ogies, errors or malfunctions. Management pathology is a long-lasting significant malfunction in organizational management processes. For example, mobbing can be treated as a pathological condition, but also a dysfunctional mechanism leading to organizational malpractice. The aim of this article is to present the latest methods of counteracting organizational pathologies, including mobbing. The main research method was unstructured in-depth interviews. The solution describes specific cases of companies and the reasons for such and not other actions. The author of the legal part will be many years of practice and the creator of similar solutions. Key words: mobbing, pathology, organization. 1. Introduction The objective of this article is to systematization of knowledge about newest ways of countering the organizational pathology known as mobbing as well as ex- 1 University of Warsaw, Faculty of Management / Uniwersytet Warszawski, Wydział Zarządzania, e-mail: [email protected] 2 University of Warsaw, Faculty of Management / Uniwersytet Warszawski, Wydział Zarządzania, e-mail: [email protected] 3 Law Offices of Aleksander Polinska in Płock / Kancelaria Adwokacka Aleksandra Polińska w Płocku, e-mail: [email protected] DOI: 10.19253/reme.201.02.008 106 Jacek Pasieczny, Paweł Kłobukowski, Aleksandra Polińska plaining the reasons behind the application of anti–mobbing programs.
    [Show full text]
  • General Counsel's Decision Tree
    General Counsel’s Decision Tree Internal Investigations Food & Beverage By Smitha Stansbury and Dixie Johnson Building on last year’s initial edition of the General Counsel’s Decision Tree, we have designed this year’s resource to enable in-house teams to understand what factors to consider in internal investigations and to address challenges that may arise in conducting them, including addressing unique and developing considerations that have been introduced by the COVID-19 pandemic. GENERAL COUNSEL’S DECISION TREE 3 rowers, manufacturers, distributors, restaurants, retailers, and other companies in the food and beverage supply chain regularly face challenges that may require an internal G investigation to determine the root cause of an issue in order to evaluate how best to remediate and guard against future occurrences of a potentially harmful event. These range from industry- specific concerns, such as those related to food quality, safety, labeling and promotion in compliance with the U.S. Federal Food, Drug, and A well-planned and executed internal investigation keeps the Cosmetic Act and the U.S. Federal Trade Commission Act, to more exercise focused and organized, general concerns, including Foreign Corrupt Practices Act (FCPA) as well as paving the way for smoother resolution of issues compliance, data breaches, whistleblower complaints, risks introduced internally (e.g., remediation) and, by the use of third parties and human resources issues. While having a if needed, externally (e.g., later resolution with government robust compliance program can help avoid many issues, not all issues authorities or regulators). can be foreseen or avoided. This internal investigations playbook has been designed to facilitate the identification and remediation of issues effectively and consistently and is an important complement to a well- designed and functioning compliance program.
    [Show full text]
  • 5 Proven Strategies to Guide a Successful Acquisition & Integration of a Multifamily Real Estate Deal
    5 Proven Strategies to Guide a Successful Acquisition & Integration of a Multifamily Real Estate Deal Table of Contents Introduction 01 Introduction 02 Collaboratively Build the Plan Source a Team of the Right People 03 Maintain an Infectious Company Culture 04 The Path: A Resilient Yet Flexible Guide 05 The Backbone: Our Platform 06 About Carroll Organization Introduction Carroll Organization cemented its place among the titans of multifamily real estate, with the acquisition of 70 properties over the last two years, adding 23,000 units and 300 employees to an already formidable Southeastern portfolio, and deploying over $1.2 billion in equity over that time. To efficiently execute on such a robust acquisition pipeline, Carroll leveraged its multi-faceted platform to craft a unique process to ensure a successful integration on every transaction. Utilizing a classic business process and modern organizational theory, Carroll represents an innovative force driving the multifamily industry forward. Carroll most recently relied on the process during the acquisition of eight communities comprising approximately 2,800 units in Raleigh in Q4 of 2018, where it faced extraordinary challenges as a hurricane rolled through the area 24 hours before fully committing to the portfolio deal. Still, Carroll successfully closed the deal, integrated the staff (of which 50%+ were new to Carroll) and the residents, and avoided the industry norm “post-acquisition dip” in occupancy. There are 5 key pillars that build on one another, providing a holistic framework for the execution of the strategy. However, as with all strategies, successful implementation requires organizational alignment, diverse talent and flawless execution.
    [Show full text]
  • Institutional Betrayal and Gaslighting Why Whistle-Blowers Are So Traumatized
    DOI: 10.1097/JPN.0000000000000306 Continuing Education r r J Perinat Neonat Nurs Volume 32 Number 1, 59–65 Copyright C 2018 Wolters Kluwer Health, Inc. All rights reserved. Institutional Betrayal and Gaslighting Why Whistle-Blowers Are So Traumatized Kathy Ahern, PhD, RN ABSTRACT marginalization. As a result of these reprisals, whistle- Despite whistle-blower protection legislation and blowers often experience severe emotional trauma that healthcare codes of conduct, retaliation against nurses seems out of proportion to “normal” reactions to work- who report misconduct is common, as are outcomes place bullying. The purpose of this article is to ap- of sadness, anxiety, and a pervasive loss of sense ply the research literature to explain the psychological of worth in the whistle-blower. Literature in the field processes involved in whistle-blower reprisals, which of institutional betrayal and intimate partner violence result in severe emotional trauma to whistle-blowers. describes processes of abuse strikingly similar to those “Whistle-blower gaslighting” is the term that most ac- experienced by whistle-blowers. The literature supports the curately describes the processes mirroring the psycho- argument that although whistle-blowers suffer reprisals, logical abuse that commonly occurs in intimate partner they are traumatized by the emotional manipulation many violence. employers routinely use to discredit and punish employees who report misconduct. “Whistle-blower gaslighting” creates a situation where the whistle-blower doubts BACKGROUND her perceptions, competence, and mental state. These On a YouTube clip,1 a game is described in which a outcomes are accomplished when the institution enables woman is given a map of house to memorize.
    [Show full text]
  • Eight Whistleblower Law Terms You Need to Know
    Eight Whistleblower Law Terms You Need to Know By Adam Herzog February 19, 2016 Here at Katz, Marshall & Banks, we often talk to prospective clients who aren’t sure whether the facts of their case constitute an actionable claim of whistleblower retaliation. The question often boils down to this: I know what occurred to me was wrong, but was it illegal? An understanding of the essential terms surrounding whistleblower retaliation law goes a long way towards providing an answer to this question. This article will set forth some of the most important terms and phrases in whistleblower law so that you can better understand the strength of your whistleblower claim. Here is the list of terms we will discuss. 1. Whistleblower 2. Protected Activity 3. Adverse Action 4. Contributing Factor 5. OSHA 6. Administrative Exhaustion 7. Remedies 8. Qui Tam 1. Whistleblower Any discussion of important whistleblower terminology has to start with the critical term: “whistleblower.” Many people in America have a narrow definition of the term whistleblower, often revolving around one person: Edward Snowden. Whether your impression of Edward Snowden is positive or negative, it is important to understand that the term “whistleblower” encompasses not just national defense whistleblowers like him, but a wide range of actors in both the public and private sectors. Broadly, the term “whistleblower” can be defined as someone who speaks out against perceived wrongdoing. Our representations focus primarily around two types of whistleblowers: 1. Employees who are retaliated against as a result of reporting ethical or legal violations internally. These whistleblowers will be the primary focus of this article.
    [Show full text]
  • The Micromanagement Disease: Symptoms, Diagnosis, and Cure
    The Micromanagement Disease: Symptoms, Diagnosis, and Cure By Richard D. White, Jr., PhD "The best executive is one who has sense enough to pick good men to do what he wants done," Theodore Roosevelt once observed, "and self-restraint enough to keep from meddling with them while they do it."1 Unfortunately, many managers have not heeded TR's century-old advice to practice self restraint, but instead needlessly over-manage, over-scrutinize, and over-frustrate employees. Such meddlesome bosses now are called micromanagers. A micromanager can be much more than just a nuisance in today's complex organization. The bothersome boss who second guesses every decision a subordinate makes, frets about the font size of the latest progress report, or inspects all of his employees emails not only frustrates and demoralizes his harassed workers, but seriously damages the productivity of the organization and, over the long run, may jeopardize the organization's survival. Unfortunately, micromanagement is a fact of management life. Why do so many people hate to be micromanaged, yet so many managers continue to do it? Why have we all worked for micromanagers—but have never been one ourselves? But have we? Maybe the noted management consultant and cartoon icon, Pogo, had it right when he quipped, "We have met the enemy...and he is us."2 Micromanagement now commonly refers to the control of an enterprise in every particular and to the smallest detail, with the effect of obstructing progress and neglecting broader, higher-level policy issues. Micromanagement has been practiced and recognized well before we labeled it as an organizational pathology.
    [Show full text]
  • Generational Growing Pains As Resistance to Feminine Gendering of Organization? an Archival Analysis of Human Resource Management Discourses
    University of Louisville ThinkIR: The University of Louisville's Institutional Repository Faculty Scholarship 2016 Generational growing pains as resistance to feminine gendering of organization? An archival analysis of human resource management discourses Kristen Lucas University of Louisville, [email protected] Suzy D'Enbeau Kent State University Erica P. Heiden College of Saint Mary Follow this and additional works at: https://ir.library.louisville.edu/faculty Part of the Business Administration, Management, and Operations Commons, Gender, Race, Sexuality, and Ethnicity in Communication Commons, and the Organizational Communication Commons Original Publication Information Lucas, Kristen, Suzy D'Enbeau and Erica P. Heiden. "Generational Growing Pains as Resistance to Feminine Gendering of Organization? An Archival Analysis of Human Resource Management Discourses." Journal of Management Inquiry 25(3), pp. 322-337. Copyright © 2016 The Authors. Reprinted by permission of SAGE Publications. http://journals.sagepub.com/doi/abs/10.1177/1056492615616692 This Article is brought to you for free and open access by ThinkIR: The University of Louisville's Institutional Repository. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of ThinkIR: The University of Louisville's Institutional Repository. For more information, please contact [email protected]. 322 Journal of Management Inquiry Volume 25, Issue 3, Pages 322‐227 doi: 10.1177/1056492615616692 URL: http://journals.sagepub.com/doi/abs/10.1177/1056492615616692
    [Show full text]
  • The Travails of Micromanagement
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by DigitalCommons@ILR Cornell University ILR School DigitalCommons@ILR International Publications Key Workplace Documents 3-2011 The Travails of Micromanagement Olivier Serrat Asian Development Bank Follow this and additional works at: https://digitalcommons.ilr.cornell.edu/intl Thank you for downloading an article from DigitalCommons@ILR. Support this valuable resource today! This Article is brought to you for free and open access by the Key Workplace Documents at DigitalCommons@ILR. It has been accepted for inclusion in International Publications by an authorized administrator of DigitalCommons@ILR. For more information, please contact [email protected]. If you have a disability and are having trouble accessing information on this website or need materials in an alternate format, contact [email protected] for assistance. The Travails of Micromanagement Abstract {Excerpt} Micromanagement is mismanagement. What is it that one should decide in the higher echelons of an organization that, given the same data and information, personnel in the lower echelons might not run just as well? Inevitably perhaps given their subject’s compass, publications on management often make recommendations to enrich the discipline and enhance its practice. (Continuing advances ininformation technology and psychology—that, respectively, enable and accelerate globalization and draw from both social neuroscience and databases on billions of individuals’ decisions—will surely broaden the vista.) Startlingly, however, few articles (even less tomes) ever mention micromanagement as an endemic corporate sickness we ought to cure. Our bodies are, to a large degree, a reflectionof our lives: their physical disorders point to what we should look at, for instance, toxic lifestyles (and their workplaces) to which we may be addicted.
    [Show full text]
  • Ten Signs of Micromanagement
    12/7/2015 10 Signs of Micromanagement — Strategies for Dealing With Micromanagers Profile Get Started Resources Ebooks Log In Search, e.g. team building You are here: Home / How to Lead Others / 10 Signs of Micromanagement — Strategies for Dealing With Micromanagers Members Blog Contact About 10 Signs of Micromanagement — Strategies for Dealing With Micromanagers by Martin Webster 399 Facebook Twitter Google+ LinkedIn Evernote SHARES Let’s take a look at the signs of micromanagement. Stick with me and I’ll share some strategies for managing the micromanager. But first, let’s define micromanagement … The Signs of Micromanagement Here are 10 clear signs of micromanagement. Dealing With Micromanagers Are you a micro-manager? Do you know one? Let’s see … Micro-managers lack personal leadership and tend to: 1. Resist delegating work 2. Immerse themselves in the work assigned to others http://www.leadershipthoughts.com/10-signs-of-micromanagement/ 1/15 12/7/2015 10 Signs of Micromanagement — Strategies for Dealing With Micromanagers 3. Look at the detail instead of the big picture 1 4. Discourage others from making decisions 5. Get involved in the work of others without consulting them 6. Monitor what’s least important and expect regular reports on miscellany 7. Push aside the experience and knowledge of colleagues 8. Loose loyalty and commitment 9. Focus on the wrong priorities 10. Have a de-motivated team Micromanagement is Mismanagement Micro-managers are bad news for business and bad news for employees. They dis-empower staff, stifle opportunity and innovation, and give rise to poor performance. 2 Micromanagement is just plain bad management.
    [Show full text]
  • The Micromanagement Myth and Mission Command: Making the Case for Oversight of Military Operations by Christopher J
    STRATEGIC PERSPECTIVES 33 The Micromanagement Myth and Mission Command: Making the Case for Oversight of Military Operations by Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for the Study of Chinese Military Affairs, and Center for the Study of Weapons of Mass Destruction. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the unified combatant commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: General William Westmoreland luncheon meeting with President Lyndon B. Johnson, The White House, April 6, 1968 (Yoichi Okamoto/ Courtesy LBJ Presidential Library/C9391-17A) The Micromanagement Myth and Mission Command The Micromanagement Myth and Mission Command: Making the Case for Oversight of Military Operations By Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 33 Series Editor: Thomas F. Lynch III National Defense University Press Washington, D.C. August 2020 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the State Department, Defense Department, or any other agency of the Federal Government.
    [Show full text]
  • Full Interview by the Republik Journalists
    LETTER SENT AS EMAIL ATTACHMENT FROM [email protected] TO [email protected] ____________________________________________________________________________________ 26 February 2019 Mr. Dennis Bühler Republik Büro Bern Bundesgasse 8 Postfach 491 CH-3003 Bern SWITZERLAND Dear Mr. Bühler: You have requested my comments, from the viewpoint of research on academic mobbing, on the threatened dismissal of Professor Marcella Carollo from the faculty of ETH Zürich, and you have sent me nine specific questions. Here I answer your request as best I can. Assumptions and qualifications My comments are necessarily tentative and preliminary, and this for two reasons. First, I have reviewed only some, not all, of the evidence on the conflict surrounding Professor Carollo. I have read the ETH press releases, the coverage in Neue Zürcher Zeitung and Science, sundry online commentaries by astronomers and physicists, the collective letters respectively supporting and denouncing her, and the statements you sent me, not yet publicly released, by her and her attorney, Martin Farner. Any conclusive analysis of this conflict must await release of all relevant evidence by the parties in dispute; this will presumably occur in the course of eventual adjudication, unless the parties come to some kind of agreement beforehand. The second reason my comments must be taken with caution is that I may miss details and nuance in the documentation of this conflict, on account of my limited facility in German. If my command of your language were stronger, my observations in the paragraphs below would probably be more pointed. With these caveats, I am confident in what I write below. I am not acquainted with any of the people involved in this conflict and have never communicated with any of them.
    [Show full text]