The London School of Economics and Political Science Interception: Law

Total Page:16

File Type:pdf, Size:1020Kb

The London School of Economics and Political Science Interception: Law The London School of Economics and Political Science Interception: Law, Media, and Techniques Bernard Keenan A thesis submitted to the Department of Law of the London School of Economics for the degree of Doctor of Philosophy, London, September 2017 Declaration I certify that the thesis I have presented for examination for the MPhil/PhD degree of the London School of Economics and Political Science is solely my own work. The copyright of this thesis rests with the author. Quotation from it is permitted, provided that full acknowledgement is made. This thesis may not be reproduced without my prior written consent. I warrant that this authorisation does not, to the best of my belief, infringe the rights of any third party. I declare that my thesis consists of 99,962 words. 2 Abstract In 2013, Edward Snowden provided journalists with copies of classified documents detailing the operations of the National Security Agency of the United States and its allies; in particular, the UK’s Government Communications Headquarters. Snowden explained that he hoped to set the conditions for a new technical literacy that would alter understandings of the relationship between digital communications and law. This thesis asks whether or not law is capable of repaying Snowden’s faith. To that end, it offers a media-theoretical genealogy of the interception of communication in the UK. Interception is presented as an effect of different sets of technical operations, mediated and processed by communication devices and networks. The thesis traces interception techniques: from their beginnings in the General Post Office; in their evolution through the operations of technical media; to their reappearance in the operations of digital media that constitute the internet. The authorisation of interception, meanwhile, has always depended upon legal techniques mediated by interception warrants. A genealogy of the interception warrant is presented through an archival study of the distinctly different practices of document production that manufactured and programmed warrants in different media epochs; from the medieval Chancery and paper bureaucracies of state institutions to the graphical user interface, which mediates between interception techniques and law today. Finally, the thesis addresses the function of legislation as it in turn addresses warrants and interception techniques. Law and legislation, it is argued, are incapable of constraining technical operations of interception because, like interception, law is already an effect of media-technical operations. The law operates not by controlling interception, but by processing it, assigning meaning to it, and protecting the secrecy of ongoing interception operations. 3 Acknowledgements I submit this thesis precisely ten years since I moved to London to study a master’s degree at the LSE. It is a good way to end a decade. My thesis supervisors, Alain Pottage and Conor Gearty, taught me that year on topics and theories that are central to this dissertation. Conor’s advice and encouragement gave me the confidence to follow the files wherever they led. Alain patiently read and commented on countless drafts, some barely more than lists of documents, offering corrections, provocations, and drawing connections that would otherwise have been lost. Andrew Murray and Orla Lynskey trusted me to teach their students about law and information systems. Without them, my understanding of digital media would never have advanced beyond the user interface. Rachel Yarham, Linda Mulcahy, and Susan Marks created an intellectual environment at LSE that encourages doctoral students to see themselves as academics-in-training rather than students. Laura Knöpfel, Alex Damianos, Ross McElwain, and Priya Gupta provided friendship, criticism, and detailed comments at vital moments. To all I am very grateful. Thank you also to my parents. Above all, Prudence Ivey’s love and support made this possible. 4 1. INTRODUCTION 9 1.1 TECHNICAL LITERACY 9 1.2 STATING THE LAW 15 1.2.1 PREROGATIVE 1590-1985 15 1.2.2 OBFUSCATION 1985 - 2016 18 1.2.3 TRANSPARENCY 20 1.3 THE QUESTION OF SURVEILLANCE 22 1.3.1 CONTROL SOCIETY 26 1.3.2 MEDIA THEORY 28 1.3.3 FROM TEXT TO TECHNICS 30 1.3.4 THE END OF MEDIA 33 1.3.5 CULTURAL TECHNIQUES 36 1.4 METHOD, STRUCTURE, AND SOURCES 39 1.4.1 THE QUESTION 41 1.4.2 CHAPTER TWO: LETTER INTERCEPTION IN THE POSTAL EPOCH 41 1.4.3 CHAPTER THREE: INTERCEPTION AND TECHNICAL MEDIA 43 1.4.4 CHAPTER FOUR: ISSUING WARRANTS 46 1.4.5 CHAPTER FIVE: SECRECY, PUBLICITY, AND LEGISLATION 48 1.4.6 CHAPTER SIX: CONCLUSION 49 2. LETTER INTERCEPTION IN THE POSTAL EPOCH 50 2.1 INTRODUCTION: POWER RELAYS 50 2.1.1 THE MEANING OF LETTERS 52 2.1.2 MEDIEVAL LETTERS 56 2.1.3 MEDIEVAL NETWORKS 59 2.1.4 ESTABLISHING POSTS 61 2.2 SEVENTEENTH CENTURY: THE BIRTH OF INTERCEPTION 62 2.2.1 MONOPOLISING A MODE OF VISIBILITY 65 2.2.2 INTERCEPTION TECHNIQUES 68 2.2.3 CRYPTOGRAPHIA 71 2.2.4 SETTLING THE POSTS 74 2.2.5 IN THE OFFICE 75 2.2.6 STAMP AND DELIVER 78 2.3 EIGHTEENTH CENTURY: THE FUNCTION OF INTERCEPTION 80 2.3.1 THE POSTAL DISPOSITIF 80 5 2.3.2 POSTAL INTELLIGENCE 84 2.3.3 PROFESSIONAL INTERCEPTION 86 2.3.4 THE DECIPHERING BRANCH 88 2.4 NINETEENTH CENTURY: NORMATIVE CLOSURE 90 2.4.1 POSTAL RECONFIGURATIONS 90 2.4.2 SYSTEMIC CLOSURE 91 2.4.3 ADDRESSING THE NATION 93 2.4.4 INTERCEPTION AS INFRASTRUCTURAL CAPACITY 96 2.5 TWENTIETH CENTURY: MEDIA IN MEDIA 100 2.6 CONCLUSION 103 3. INTERCEPTION AND TECHNICAL MEDIA 106 3.1 INTRODUCTION: THE PROCESSOR IN THE CAGE 106 3.1.1 INTERCEPTION TECHNOLOGY 107 3.2 CABLES AND TELEGRAMS 109 3.2.1 MONOPOLISING TELEGRAPHY 109 3.2.2 TAPPING THE LINE 110 3.2.3 NETWORKED MEMORY 113 3.2.4 EMPIRE CABLES 118 3.2.5 INTERNATIONAL CABLE INTERCEPTION 121 3.3 TELEPHONES 126 3.3.1 OPERATORS 126 3.3.2 AUDIO STORAGE 128 3.3.3 CENTRALISING TAPPING 130 3.3.4 METERING 132 3.4 RADIO 134 3.4.1 COMMON USE OF THE ETHER 134 3.4.2 JURIDICAL INTERCEPTION 137 3.4.3 SHORTWAVE 140 3.4.4 SIGINT, ELINT, COMINT 143 3.5 DIGITAL MEDIA 147 3.5.1 MECHANICAL CODERS 147 3.5.2 CRYPTOLOGICAL MACHINES 152 3.5.3 HARVESTING DATA 155 3.5.4 CABLE ANALYSIS 161 6 3.5.5 EXTRA-TERRESTRIAL INTERCEPTION 164 3.5.6 THE NETWORK OF NETWORKS 168 3.5.7 COLLECT IT ALL 170 3.6 CONCLUSION 173 4. PROGRAMMING WARRANTS 176 4.1 INTRODUCTION: EXECUTION 176 4.2 MEDIEVAL WARRANTS 177 4.2.1 WARRANTS AND THE MAKING OF WRITS 181 4.2.2 SEAL AND PERSONA 187 4.2.3 ADMINISTRATIVE WRITS 189 4.3 THE INTERCEPTION WARRANT 193 4.3.1 COMMAND AND REASON OF STATE 195 4.3.2 THE FUNCTION OF WARRANTS 198 4.3.3 STORAGE PROTOCOLS 201 4.4 OFFICE MEDIA 204 4.4.1 THE LETTER COPYING BOOK 205 4.4.2 REFERENCES AND INDICES 208 4.4.3 MAKING CONNECTIONS 209 4.4.4 LINKING REGISTRIES 211 4.5 WARRANTS AND INTERCEPTION 214 4.5.1 RADIOTELEGRAPHY 215 4.5.2 TELEPHONE WARRANTS 217 4.5.3 STANDARDISATION OF INTERCEPTION WARRANTS 218 4.5.4 PROCEDURAL NORMS 221 4.6 CONCLUSION 225 5. SECRECY AND SURPRISES 227 5.1 THE LAW OF INTERCEPTION WARRANTS 227 5.1.1 THE WARRANT BEFORE THE LAW 227 5.1.2 THE DANGER OF JUDGMENT 229 5.1.3 MATERIALISING POLITICAL SECRECY 231 5.2 RE-PROGRAMMING THE PROBLEM 232 5.2.1 ASSEMBLING A JUDGMENT 235 5.2.2 THE SYMBOLIC MEANING OF AUTHORITY 239 7 5.3 BIRKETT AND PREROGATIVE 241 5.3.1 THE INSTRUMENTAL PAST IN PRINT 244 5.4 LAW AND PUBLICITY 248 5.4.1 WILKES TAKES THE STAGE 249 5.4.2 NEITHER CONFIRM NOR DENY 251 5.4.3 POLICIES OF SECRECY 254 5.4.4 PUBLICITY TRUMPS LAW 258 5.4.5 PUBLICISING SECRETS 260 5.5 MEDIATED REALITY 262 5.5.1 THEORY OF THE MASS MEDIA 263 5.5.2 CONSEQUENCES OF MASS MEDIA 269 5.5.3 BELOW THE WATERLINE WITH THE IPT 270 5.6. CONCLUSION: LEGISLATING AGAINST SURPRISES 274 6. CONCLUSION: SILICON SOVEREIGNTY 280 6.1 DIGITAL WARRANTRY 280 6.1.1 EXTERNAL WARRANTS 284 6.1.2 THE PORTAL 286 6.1.3 INTERNAL WARRANTS 290 6.1.4 LEGALITIES TABLE 292 6.1.5 DISSEMINATION AND AUDIT 294 6.2 CONCLUSION 297 BIBLIOGRAPHY 301 IMAGES 331 8 1. Introduction 1.1 Technical literacy … we need to think of it in terms of literacy, because technology is a new system of communication, it’s a new set of symbols that people have to intuitively understand. It’s like something that you learn … just like how you learn to write letters in school. You’ve learned to use computers and how they interact, how they communicate. And technical literacy in our society is a rare and precious resource.1 In June 2013, The Guardian newspaper began publishing a series of articles based on documents provided by former intelligence contractor Edward Snowden. Similar reports soon appeared in other news outlets in the United States and Germany. All concerned the capabilities and activities of the National Security Agency of the United States (NSA) and allied organisations, particularly the United Kingdom’s Government Communications Headquarters (GCHQ), in relation to the interception and exploitation of data derived from digital communication systems on a planetary scale. Snowden’s aim was to generate the conditions for a new technical literacy that would ultimately encode personal privacy and governmental accountability into law.
Recommended publications
  • This Electronic Thesis Or Dissertation Has Been Downloaded from Explore Bristol Research
    This electronic thesis or dissertation has been downloaded from Explore Bristol Research, http://research-information.bristol.ac.uk Author: Torrible, Clare Title: How do civil actions against the police and police complaints interact and what does this interaction reveal about police legitimacy? General rights Access to the thesis is subject to the Creative Commons Attribution - NonCommercial-No Derivatives 4.0 International Public License. A copy of this may be found at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode This license sets out your rights and the restrictions that apply to your access to the thesis so it is important you read this before proceeding. Take down policy Some pages of this thesis may have been removed for copyright restrictions prior to having it been deposited in Explore Bristol Research. However, if you have discovered material within the thesis that you consider to be unlawful e.g. breaches of copyright (either yours or that of a third party) or any other law, including but not limited to those relating to patent, trademark, confidentiality, data protection, obscenity, defamation, libel, then please contact [email protected] and include the following information in your message: •Your contact details •Bibliographic details for the item, including a URL •An outline nature of the complaint Your claim will be investigated and, where appropriate, the item in question will be removed from public view as soon as possible. How do civil actions against the police and police complaints interact and what does this interaction reveal about police legitimacy? Clare Torrible A dissertation submitted to the University of Bristol in accordance with the requirements for award of the degree of Doctor of Philosophy in the Faculty of Social Sciences and law.
    [Show full text]
  • Development of Surveillance Technology and Risk of Abuse of Economic Information
    SCIENTIFIC AND TECHNOLOGICAL OPTIONS ASSESSMENT STOA DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE OF ECONOMIC INFORMATION Vol 1/5 Presentation and Analysis 1) Presentation of the four studies 2) Analysis: Data protection and human rights in the European Union and the role of the European Parliament. Document de travail pour le Panel STOA Luxembourg, December 1999 PE 168.184/Vol 1/5/EN Cataloguing data: Title: Vol 1/5: Présentation et analyse 1) Présentation des quatre études 2) Analyse: protection des données et Droit de l'Homme dans l'Union Européenne et rôle du Parlement Européen Workplan Ref.: EP/IV/B/STOA/98/1401 Publisher: European Parliament Directorate General for Research Directorate A The STOA Programme Author: Peggy Becker - visiting researcher Under the supervision of Dick Holdsworth Head of the STOA Team Editor: Mr Dick HOLDSWORTH, Head of STOA Unit Date: Octobre 1999 PE number: PE 168.184 Vol 1/5/EN This document is a working Document for the 'STOA Panel'. It is not an official publication of STOA. This document does not necessarily represent the views of the European Parliament C O N T E N T S Page Introduction ................................................................................................................................... 4 Part One: Presentation of the four studies 1. Study One: The state of the art in Communications Intelligence (COMINT) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems and its applicability to COMINT
    [Show full text]
  • The NAMTA Journal
    The NAMTA Journal Back To The Future Volume 45. Number 1 May 2021 Molly OʼShaughnessy Jacqui Miller Kimberlee Belcher-Badal Ph.D. Robyn MilosGregory MacDonald Jennifer ShieldsJacquie Maughan Lena WikramaratneAudrey Sillick Gerard Leonard Kathleen Allen Jim RobbinsDeborah Bricker Dr. Maria Montessori Mario M. Montessori A.M. Joosten Mary Black Verschuur Ph.D. John McNamara David Kahn TABLE OF CONTENTS BACK TO THE FUTURE:WHY MONTESSORI STILL MATTERS …………..………….…….7 Molly O’Shaughnessy THE RETURN TO SCIENTIFIC PEDAGOGY: EMBRACING OUR ROOTS AND RESPONSIBILITIES……………………………………………………………………….33 Jacqui Miller and Kimberlee Belcher-Badal Ph.D. IN REMEMBRANCE………………………………..……………..……………………...53 Deborah Bricker TRIBUTE TO ANNETTE HAINES…………………..……………..……………………....56 Robyn Milos TRIBUTE TO KAY BAKER………………………..……………..…………………….... 59 Gregory MacDonald TRIBUTE TO JOEN BETTMANN………………..………………..………………………..62 Jennifer Shields GUIDED BY NATURE…………….…………..………….……..………………………..66 Jacquie Maughan THE CHILD IN THE WORLD OF NATURE…….………..…………………………..69 Lena Wikramaratne SOWING THE SEEDS OF SCIENCE:OUR GIFT TO THE FUTURE…………………...78 Audrey Sillick EXPERIENCES IN NATURE:RESOLUTE SECOND-PLANE DIRECTIONS……….……...88 TOWARD ERDKINDER Gerard Leonard and Kathleen Allen 2 The NAMTA Journal • Vol. 44, No. 1 • Winter 2020 ECOPSYCHOLOGY:HOW IMMERSION IN NATURE AFFECTS YOUR HEALTH……….107 TOWARD ERDKINDER Jim Robbins SILENCE AND LISTENING ……………………..………………...……..………….…….115 Gerard Leonard ABOUT THE IMPORTANCE AND THE NATURE OF THE SILENCE GAME…………………………………..………………...………………….. 117
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • Conservative Manifesto
    THE SCOTTISH CONSERVATIVE AND UNIONIST PARTY MANIFESTO 2016 THE SCOTTISH CONSERVATIVE AND UNIONIST PARTY MANIFESTO 2016 CHAPTER HEADING A STRONG OPPOSITION - A STRONGER SCOTLAND A STRONG OPPOSITION. A STRONGER SCOTLAND 1 THE SCOTTISH CONSERVATIVE AND UNIONIST PARTY MANIFESTO 2016 Contents RUTH DAVIDSON FOR A STRONG OPPOSITION Foreword ............................................................................................................................................................................................................................................................................................ 2 NO TO A SECOND REFERENDUM The facts ............................................................................................................................................................................................................................................................................................. 6 Why it matters .............................................................................................................................................................................................................................................................................. 7 Our commitment ...................................................................................................................................................................................................................................................................... 7 HOLDING THE SNP TO ACCOUNT Our programme for
    [Show full text]
  • 2003 Iraq War: Intelligence Or Political Failure?
    2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Studies By Dione Brunson, B.A. Georgetown University Washington, D.C. April, 2011 DISCLAIMER THE VIEWS EXPRESSED IN THIS ACADEMIC RESEARCH PAPER ARE THOSE OF THE AUTHOR AND DO NOT REFLECT THE OFFICIAL POLICIES OR POSITIONS OF THE U.S. GOVERNMENT, DEPARTMENT OF DEFENSE, OR THE U.S. INTELLIGENCE COMMUNITY. ALL INFORMATION AND SOURCES FOR THIS PAPER WERE DRAWN FROM OPEN SOURCE MATERIALS. ii 2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? Dione Brunson, B.A. MALS Mentor: Ralph Nurnberger, Ph.D. ABSTRACT The bold U.S. decision to invade Iraq in 2003 was anchored in intelligence justifications that would later challenge U.S. credibility. Policymakers exhibited unusual bureaucratic and public dependencies on intelligence analysis, so much so that efforts were made to create supporting information. To better understand the amplification of intelligence, the use of data to justify invading Iraq will be explored alongside events leading up to the U.S.-led invasion in 2003. This paper will examine the use of intelligence to invade Iraq as well as broader implications for politicization. It will not examine the justness or ethics of going to war with Iraq but, conclude with the implications of abusing intelligence. iii ACKNOWLEDGMENTS Thank you God for continued wisdom. Thank you Dr. Nurnberger for your patience. iv DEDICATION This work is dedicated to Mom and Dad for their continued support.
    [Show full text]
  • Phone-Tapping and the Right to Privacy [Ronald Kakungulu]
    Phone-tapping & the Right to Privacy: A Comparison of the Right to Privacy in Communication in Uganda & Canada R. Kakungulu-Mayambala * Email: [email protected] Table of Contents List of Acronyms................................................................................................2 Abstract ............................................................................................................2 Key Definitions ..................................................................................................3 I. Introduction...................................................................................................4 II. Historical and Legal Conceptions of the Right to Privacy in Uganda. .................5 2.1 History of Phone tapping and Surveillance in Uganda..................................5 III Elemental aspects of the right to privacy in communication in Uganda 1995 - 2008.................................................................................................................7 3.1 The Rationale for the right to privacy in communication..............................7 3.2 Enjoyment of the right to privacy in Uganda for the period 1995 – 2008....9 IV. The Right to Privacy in Communication in Canada and lessons for Uganda.....17 4.1. The Experiences with and approaches to the Right to Privacy in Communication in Canada ............................................................................17 4.2. The Right to Privacy in Communication in Canada and Lessons for Uganda ...................................................................................................................19
    [Show full text]
  • West Midlands Police ,~, "
    eA~If you have issues viewing or accessing this file contact us at NCJRS.gov. '1- Z-9' -& '-- ~t, REPORT OF THE CHIEF CONSTABLE .Report OF THE WEST MIDLANDS POLICE ,~, ", FOR THE OF YEAR 1981 .. 'T':-'f. CHIEF CONSTABLE c::) I o o co I CY") OF THE co , ,-t' ,1' /1 t WEST MIDLANDS POLICE I, ; Chief Constable's Office " Lloyd House ;:, '. .1/' ,.~ Co/more Circus Oueensway i 1 -: , t'l Birmingham B46NO I) ( . 1 \.' ..J. • '''1 '.1 c ; 1", r' , :', L') ~_ " "I 1981 11' Ql'" 1..l' : L_ ;. tf" '+(' t- L :.' (' ll_ :") I ! WEST MIDLANDS POLICE , Police Headquarters Lloyd House Colmore Circus Queensway Telephone No. 021-236 5000 Birmingham B4 6NQ Telex 337321 MEMBERS OF THE POLICE AUTHORITY Chief Constable Deputy Chief Constable Sir Philip Knights CBE QPM Assistant Chief Constables Mr R Broome Chairman: Councillor E T Shore (Birmingham, Sattley) Administration and Supplies Crime Mr L Sharp LL.B Operations Mr D H Gerty LL.B. Mr K J Evans Vice-Chairman: Councillor T J Savage (Birmingham, Erdington) Organisation & Development Mr G E Coles B Jur Personnel & Training Staff Support Mr J B Glynn Mr T Meffen Local Authority Representatives Magistrate Criminal Investigation Department Members Chief Superintendent C W Powell (Operations) Chief Superintendent T Light (Support Services) Ward Chief Administrative Officer Councillor D M Ablett (Dudley, No.6) JD Baker Esq JP FCA ... Chief Superintendent PC J Price MA (Oxon) Councillor D Benny JP (Birmingham, Sandwell) K H Barker Esq Councillor E I Bentley (Meriden, No.1) OBE DL JP FRICS ..;. Personnel Department Councillor D Fysh (Wolverhampton No.4) Captain J E Heydon Chief Superintendent R P Snee Councillor J Hunte (Birmingham,Handsworth) ERD JP i Councillor K RIson (Stourbridge, No.1) J B Pendle Esq JP I.
    [Show full text]
  • OJ Simpson Murder Trial DVD Cataloging Still in Progress
    OJ SIMPSON MURDER TRIAL O.J. Simpson "Bronco Chase" audio CD (full transcript can be seen here) OJ Simpson Murder Trial DVD Collection (each disc is roughly 4 hours) Two hundred 4 hr. DVD's, professionally edited (100% commercial free) - contains virtually every minute of testimony. Recorded from local L.A. television stations, live as the events unfolded. Coverage begins with reports of the murders, till weeks after the verdict - and beyond. "O.J. Simpson - The Whole Story (and then some)" legend: "break" = fade to black, edited commercial break "H/C" = Hard Copy "ET" = Entertainment Tonight * To purchase, or inquire about OJ SImpson Murder Trial DVD duplications, click here * * To download a .pdf file of this OJ SImpson Murder Trial DVD listing, click here (322 KB) * OJ TRIAL #001 DVD (3:53:00) * News reports of the deaths of Nicole Brown Simpson and Ronald Goldman (ABC News, FX) * OJ waiting in truck outside of his house (@ 0:01:10) * Taped earlier: end of freeway chase, to Parker Center, news reports (@ 0:50:00) * Gil Garcetti, Commander Gascon: recap of charges (@ 1:36:48) * OJ's mug shot released on 11 o'clock news (@ 2:23:00), recap of days events * Johnnie Cochran, Al Michaels on "NightLine" (@ 2:51:00) * KNBC Morning News recap of events (@ 2:58:00) * Criminal Courts Bldg. Pre-Trial Preliminary Hearing, KNBC - Judge Kathleen Kennedy-Powell (@ 3:02:00) * Michele Kestler - LAPD Crime Lab (@ 3:18:00), cross-examination (@ 3:49:00), recess (@ 3:52:00) * KNBC news-break. OJ TRIAL #002 DVD (3:58:45) * Live evidence search KNBC news * Michele Kestler cross-examination cont.
    [Show full text]
  • A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985
    Description of document: A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985 Requested date: 15-June-2009 Released date: 03-February-2010 Posted date: 15-February-2010 Source of document: National Security Agency Attn: FOIA/PA Office (DJP4) 9800 Savage Road, Suite 6248 Ft. George G. Meade, MD 20755-6248 Fax: 443-479-3612 Online form: Here The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. A REFERENCE GUIDE TO SELECTED HISTORICAL DOCUMENTS RELATING TO THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1931-1985 (U) SOURCE DOCUMENTS IN Compiled by: CRYPTOLOGIC HISTORY Gerald K.
    [Show full text]
  • Grez Hidalgo2020.Pdf (1.770Mb)
    This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions of use: This work is protected by copyright and other intellectual property rights, which are retained by the thesis author, unless otherwise stated. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. LEGISLATIVE SCRUTINY ON CONSTITUTIONAL GROUNDS IN THE UNITED KINGDOM PARLIAMENT THE CONTRIBUTION OF CONSTITUTIONAL COMMITTEES TO (POLITICAL?) RESPONSIBILITY FOR THE CONSTITUTION PABLO SALVADOR GREZ HIDALGO Presented for the Degree of Doctor of Philosophy The University of Edinburgh 2019 IN MEMORIAM FRANCISCO GREZ MORANDI iii ABSTRACT / LAY SUMMARY This thesis focuses on institutional arrangements designed to strengthen the ability of political institutions to assess the constitutional implications of legislation in the law-making process. It sheds light in the under-developed field of parliamentary constitutional assessments by bringing together disparate constitutional theory literature that discusses or touches upon the distinctiveness of this activity with a view to conceptualise “legislative scrutiny on constitutional grounds” (“LSGC”). The thesis distinguishes three alternative conceptions of LSCG: a legalistic conception, a conception of constitutional deliberation, and a conception of constitutional construction and development.
    [Show full text]
  • 'My Friend the Gazetier': Diplomacy and News in Seventeenth-Century
    chapter 18 ‘My Friend the Gazetier’: Diplomacy and News in Seventeenth-Century Europe Jason Peacey In February 1681, the English government was hunting for information about European newspapers. Its new envoy at The Hague, Thomas Plott, duly obliged by writing that “The printed paper of Leyden … I have never seen”, although he had heard that “such a paper had appeared”, and that “it had been suppressed”. That he knew this much reflected the fact that he had already made a point of getting to know “the French gazetier, who is my friend”, and who had previ- ously been a “pensionary” of the English ambassador, Henry Sidney. Indeed, Plott also added that “what news he has he always communicates to me in a manuscript, but when there is nothing worth writing he only supplies me with his gazettes, so that what intelligence he had, I can always furnish you with”. Plott concluded by adding that I have likewise another intelligencer here who is paid for it, that gives me twice a week what comes to his hands, whose original papers and likewise those of the French gazetier I shall hereafter send you, and when I return for England I shall settle a correspondence between you and them, that you may have a continuance of their news.1 That Plott’s first tasks upon reaching The Hague had included familiarising himself with European print culture, its gazetteers and its intelligencers is highly revealing, and the aim of this piece is explore the significance of this letter, and of the practices to which it alludes.
    [Show full text]