From Cyber-Utopia to Cyber-War. Advocacy Coalitions and the Normative Change in Cyberspace

Total Page:16

File Type:pdf, Size:1020Kb

From Cyber-Utopia to Cyber-War. Advocacy Coalitions and the Normative Change in Cyberspace From Cyber-Utopia to Cyber-War. Normative Change in Cyberspace. Dissertation zur Erlangung des akademischen Grades doctor philosophiae (Dr. phil.) vorgelegt dem Rat der Fakultät für Sozial- und Verhaltenswissenschaften der Friedrich- Schiller-Universität Jena von Matthias Schulze (M.A.) geboren am 28.03.1986 in Weimar 15.03.2017 1 Gutachter 1. Prof. Dr. Rafael Biermann (Friedrich-Schiller Universität Jena) 2. Dr. Myriam Dunn Cavelty (ETH Zürich) 3. Prof. Dr. Georg Ruhrmann (Friedrich-Schiller Universität Jena) Tag der mündlichen Prüfung: 08.08.2017 2 Copyright © 2018 by Matthias Schulze. Some Rights reserved. This work is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. 3 Table of Contents Table of Contents 4 Acknowledgement 7 Abstract 10 List of Abbreviations 11 List of Tables and Graphics 13 1. Introduction 15 1.1 Puzzle & Research Question 18 1.2 Literature Review 22 1.3 Contributions of the Study 27 1.4 Case Selection: The United States 30 1.5 Structure and Logic of the Argument 32 2. Explaining Normative Change 38 2.1 Norms and Theories of Normative Change 39 2.1.1 Norm Diffusion and Norm Entrepreneurs 41 2.1.2 Critique of Deontological Norms 42 2.1.3 Critique of Diffusion Models 44 2.2 Paradigms and Norm-Change 47 2.2.1 Discursive Struggles between Paradigms 53 2.2.2 Framing 59 2.2.3 Degrees of Change 63 2.2.4 Explaining Change 67 2.2.5 Norm Regression and Dark Norms 71 2.2.6 Summary of the Theoretical Mechanism 73 2.3 Technological and Normative Change 81 2.3.1 Theorizing Technology: Traditional Approaches 81 2.3.2 Defining Technology 84 2.3.3 The Politics of Technology Debate 86 2.3.4 The Social Construction of Technology and its Critique 89 2.3.5 Phase Model of Technological Diffusion 95 2.3.5.1 Emergence/Construction 97 2.3.5.2 Stabilization 99 2.3.5.3 Diffusion to the Mainstream 100 2.3.6 Combining the Frameworks 102 2.3.7 Digital Technology: Software and Code 108 2.3.8 Summary 113 3. Methodology & Research Design 116 4. Case Study 125 4.1 Engineering the Internet 126 4.1.1 Background: Cybernetics 128 4.1.2 The Social Construction of the ARPA-Network (1966-1972) 130 4.1.2.1 Ideas 133 4.1.2.2 Norms Shaping the Construction of ARPANET 137 4.1.2.3 Artifact: The Network Control Program 139 4.1.2.4 Co-shaping the Meaning of Networks 142 4.1.3 Constructing the Internet (1972-1991) 147 4.1.3.1 Artifact: Internet Protocols and Norms 149 4.1.3.2 The Diffusion and Dominance of the Internet 154 4.1.3.3 The Internet Backbone 157 4.1.4 Artifact: The World Wide Web (1989-present) 160 4.1.5 Development Blind Spots 165 4 Table of Contents 4.1.6 Summary 167 4.2 The Evolution of Cyber-Utopianism 173 4.2.1 Background: Hacker-ethic and Technical Optimism (1960s) 175 4.2.2 Ideas: Stewart Brand and the Counter-culture (1960-1970) 179 4.2.3 Artifact: Democratizing Technology (1970-1980) 184 4.2.4 Artifact: The WELL and the Social Construction of Cyberspace (1980-1990) 187 4.2.5 Framing Cyberspace as the Electronic Frontier (1990s) 192 4.2.6 The Californian Ideology (1995-2001) 195 4.2.7 Junctures: Dot-com Bubble (2000-2001) 201 4.2.8 Norms and Key Ideas of Cyber-Utopianism 203 4.2.9 Critical Analysis & Blind Spots of Cyber-Utopianism 211 4.2.10 Summary 215 4.3 Cyber-Utopian Liberalism and the Politics of Cyberspace (1990-2000) 223 4.3.1 Background: The Governance of Information Technologies (1970-1990) 224 4.3.2 Politics: Bill Clinton and Albert Gore as Internet Advocates (1992-2000) 226 4.3.3 Ideas: Cyber-Utopia on the Information Superhighway (1993) 228 4.3.3.1 The Hands-off Norm & the American Internet Governance Model 234 4.3.3.2 Global Framing of the Internet 237 4.3.4 Artifacts: Privatizing Control over the Internet 242 4.3.5 Junctures: Policy Attempts to Control the Internet (1993-1996) 244 4.3.5.1 Policy: The Clipper Chip (1993) 244 4.3.5.2 Policy: Wiretapping the Internet with CALEA (1994) 250 4.3.5.3 Policy: Internet Censorship with the Communications Decency Act (1996) 254 4.3.6 Critical Analysis and Paradigm Blind Spots 257 4.3.7 Summary 259 4.4 Information Warfare and the Origin of Cyber-Realism 265 4.4.1 Background: Growing Awareness of Computer Insecurity (1967 - 2011) 267 4.4.2 Ideas: Formation of the Information War Doctrine (1976-2000) 273 4.4.2.1 Optimistic Cyber-Realism: Revolution in Military Affairs (1992-2000) 276 4.4.2.2 Problem Definitions of Cyber-Realism 279 4.4.2.3 Core Ideas: Information Weapons & Digital Battlespace 287 4.4.2.4 Analyzing Emerging Norms of Cyber-Realism 291 4.4.3 Setting the Path: The Institutionalization of Cyber-Realism 294 4.4.4 Politics: Turn to Realism - Critical Infrastructure Initiative (1996-1999) 295 4.4.5 Discourse: Y2K and Critical Infrastructure Failure 301 4.4.6 Preliminary Summary 304 4.4.7 The Politicization of Cyber-Realism with the War on Terror (2000 - 2008) 308 4.4.7.1 Ideas: Cyber-Realism and Counter-Terrorism (2001 - 2007) 311 4.4.7.2 Policy: The Patriot Act and Intelligence Reform (2001 - 2004) 316 4.4.7.3 Artifacts: NSA and the Full-take Norm of Internet Control (2001 - ) 322 4.4.7.4 The Fusion of IW, Surveillance and Cyber-war (2003-2008) 332 4.4.8 The Norm of Internet Control 340 4.4.9 Critical Analysis of Cyber-Realism 342 4.4.10 Summary 346 4.5 From Cyber-Utopia to Cyber-War: The Obama Presidency (2008-2013) 353 4.5.1 Background: The Hybrid Presidency 354 4.5.2 Ideas: Cyber-Utopianism under Obama and Clinton 357 4.5.3 Practice: Professionalization of Offensive Cyber-War & Surveillance 363 4.5.4 Discourse: Cyber-Doom and the Hegemony of Cyber-Realism 371 4.5.5 Artifacts: The Snowden Leaks 376 4.5.6 Juncture: The President's Panel on NSA Practices 383 4.5.7 Outcome: The Dominance of Cyber-Realism 389 5 Table of Contents 4.5.8 Critical Analysis 394 4.4.9 Summary 396 5. Conclusion 401 5.1 Theoretical Findings 405 5.2 Methodological Issues and Alternative Explanations 412 5.3 Discussion and Outlook 416 Bibliography 420 Appendix 449 Quantifying the Internet and the Digital Revolution 449 List of Internet Milestones and Security Incidents 454 Polls on the Dominance of Cyber-Realism 458 2016 Presidential Candidates' Opinion on Cyber-Realist Ideas 464 Intelligence Community Directors 466 Corpora 469 Engineering Corpus 470 Cyber-Utopian Corpus 475 Information Superhighway Corpus 480 Cyber-Realism Corpus 485 Obama Corpus 489 Ehrenwörtliche Erklärung 492 6 Acknowledgement The purpose of this acknowledgement is to clarify my subjective position in front of the reader, as criteria for good qualitative research suggest (Creswell, 2012, p. 51). Since this is a qualitative case study, the subjective position of the researcher always is a potential source for bias. Writing this thesis was a tremendous experience. It allowed me, to scientifically engage with the technology and medium I grew up with. I experienced much of the evolution of the World Wide Web with the eyes of a curious teenager. I became a cyber- utopian believing in the grand vision that the Internet could foster global cooperation, exchange of ideas and democratization. Speaking for the first time with a total stranger from the other side of a globe over the Internet was (and is) a powerful experience. Being able to digitally access almost any written book, music or piece of art within a matter of seconds still is remarkable. We seldom acknowledge the fact that for the first time in human history, we can access almost all human knowledge with a mouse click. I strongly believe that the global communication enabled by the Internet allows us to solve global problems like climate change, pollution or economic inequality. Having said that, I am skeptical of any actor who tries to control or manipulate this global conversation, either via censorship, surveillance, digital-disruption (I.e. cyber-war) or any other means. At the same time, this thesis allowed me to confront my early utopian ideas about cyberspace and reflect upon them more deeply. While researching this thesis and struggling with the problems of hacking, terrorism and inter-state espionage, much of my cyber-utopian euphoria declined. National security actors indeed have a point when they warn about the national security implications of the Internet and this work allowed me to better understand their position. I understand why surveillance of Internet data-streams is a political demand and acknowledge, that it might (!) have some positive effects on catching terrorists. Surveillance is neither good nor bad, but it depends on the political governance, as surveillance scholar David Lyon argues. I do believe that the conduct of intelligence agencies is necessary to protect democracy from outside forces, as long as it is transparent, accountable, proportional and under independent evaluation. "Given the history of abuse by governments, it's right to ask questions about surveillance, particularly as technology is reshaping every aspect of our lives" as President Barack Obama once said (Obama, 2014).
Recommended publications
  • Downloads/Dec2018/Harpercollins, Oops
    oops 20 Life Lessons from the Fiascoes That Shaped America MARTIN J. SMITH and PATRICK J. KIGER To William Leford Smith,M.J.S whose. dimming eyes still see the humor in almost everything To Beastboy P.and J.K his. momster Good judgment is usually the result of experience. And experience is frequently the result of bad judgment. —An attorney in a lawsuit involving Boston’s John Hancock Tower, after the skyscraper’s windows fell out Some said I couldn’t sing, but no one could say I didn’t sing. —Florence Foster Jenkins, widely recognized as the worst opera diva ever contents Introduction The Joy of Oops ix Lesson #1 READ THE FINE PRINT The Eroto- Utopians of Upstate New York John Humphrey Noyes’s sexually adventurous Perfectionist commune was one of the most successful utopian religious groups in 19th-century Amer- ica. Alas, the devil was in the details. { 1 } Lesson #2 ACCENTUATE THE POSITIVE How Thomas Edison Invented Trash Talk Why would one of America’s iconic inventors publicly electrocute a full- grown carnival elephant? The answer reveals a little- known story of ego, failure, and the moment when America began “going negative.” { 13 } Lesson #3 BEWARE SOLUTIONS THAT CREATE NEW PROBLEMS The Global Underarm Deodorant Disaster Thomas Midgley Jr. was among America’s greatest problem solvers. Unfor- tunately, his landmark “Eureka!” moments had an echo that sounded a lot like “Oops!” { 27 } CONTENTS v Lesson #4 BAD RESULTS TRUMP GOOD INTENTIONS Kudzu: A Most Tangled Tale What began as a well- intentioned effort to stop soil erosion in the American South became a dramatic example of what can happen when you mess with Mother Nature.
    [Show full text]
  • War of the Currents
    An Electric Battle A WebQuest for War of the Currents Introduction At the turn of the twentieth century, the War of the Currents had a clear winner—Tesla and his alternating current. However, direct current survived into the twenty-first century. As recently as 2007, some parts of Manhattan were finally converted to alternating current. The transition from direct current to alternating current begin in the late 1920s but took decades, in part, because the foundation of New York City’s energy grid was build by Edison’s company. Task Your task is to research the everyday devices credited to Edison and Tesla. You will compare these inventor’s influences by creating a script for a 5-min mock “debate” between Edison and Tesla in which they debate their influences on today’s and future technology. Process Use the resources listed in the Resources section to begin your research. The Web sites listed are good starting points, but further Internet research will be necessary. Record your answers to the following questions. 1. What was the relationship between Tesla and Edison prior to the War of the Currents? 2. Both Tesla and Edison were prolific inventors. If the two were competing to obtain the most number of patents filed, who wins and by what margin? 3. Did any of Tesla’s or Edison’s inventions build upon one another or work together to bring about new technology? 4. Could direct current make a comeback? Explain your answer. Write a Script Write a script for a 5-min mock debate between Edison and Tesla, in which each tries to convince the audience that he was the more influential inventor.
    [Show full text]
  • War of Currents
    War of Currents In the War of Currents era (sometimes, War of the Currents or Battle of Currents) in the late 1880s, George Westinghouse and Thomas Edison became adversaries due to Edison's promotion of direct current (DC) for electric power distribution over alternating current (AC). Edison's direct-current system generated and distributed electric power at the same voltage as used by the customer's lamps and motors. This meant that the current in transmission was relatively large, and so heavy conductors were required and transmission distances were limited, to about a mile (kilometre); otherwise transmission losses would make the system uneconomical. At the time, no method was practical for changing voltages of DC power. The invention of an efficient transformer allowed high voltage to be used for AC transmission. An AC generating plant could then serve customers at a great distance (tens to hundreds of miles), or could serve more customers within its economical transmission distance. The fewer much larger plants needed for AC would achieve an economy of scale that would lower costs further. The invention of a practical AC motor increased the usefulness of alternating current for powering machinery. Edison's company had invested heavily in DC technology and was vigorously defending its DC based patents. George Westinghouse saw AC as a way to get into the business with his own patented competing system and set up the Westinghouse Electric Company to design and build it. The Westinghouse company also purchased the patents for alternating current devices from inventors in Europe and licensed patents from Nikola Tesla.
    [Show full text]
  • The Evolution of Lisp
    1 The Evolution of Lisp Guy L. Steele Jr. Richard P. Gabriel Thinking Machines Corporation Lucid, Inc. 245 First Street 707 Laurel Street Cambridge, Massachusetts 02142 Menlo Park, California 94025 Phone: (617) 234-2860 Phone: (415) 329-8400 FAX: (617) 243-4444 FAX: (415) 329-8480 E-mail: [email protected] E-mail: [email protected] Abstract Lisp is the world’s greatest programming language—or so its proponents think. The structure of Lisp makes it easy to extend the language or even to implement entirely new dialects without starting from scratch. Overall, the evolution of Lisp has been guided more by institutional rivalry, one-upsmanship, and the glee born of technical cleverness that is characteristic of the “hacker culture” than by sober assessments of technical requirements. Nevertheless this process has eventually produced both an industrial- strength programming language, messy but powerful, and a technically pure dialect, small but powerful, that is suitable for use by programming-language theoreticians. We pick up where McCarthy’s paper in the first HOPL conference left off. We trace the development chronologically from the era of the PDP-6, through the heyday of Interlisp and MacLisp, past the ascension and decline of special purpose Lisp machines, to the present era of standardization activities. We then examine the technical evolution of a few representative language features, including both some notable successes and some notable failures, that illuminate design issues that distinguish Lisp from other programming languages. We also discuss the use of Lisp as a laboratory for designing other programming languages. We conclude with some reflections on the forces that have driven the evolution of Lisp.
    [Show full text]
  • TCM Report, Summer
    Board of Directors Corporate Donors Contributing Members John William Poduska. Sr. Benefactor-$lO.ooo or more Pathway Design. Inc. Patron-$SOO or more Chairman and CEO AFIPS. Inc." PC Magazine Anonymous. Ray Duncan. Tom Eggers. Belmont Computer. Inc. American Exr.ress Foundation Peat. Marwick. Mitchell & Co. Alan E. Frisbie. Tom and Rosemarie American Te ephone & Telegraph Co." Pell. Rudman. Inc. Hall. Andrew Lavien. Nicholas and Gwen Bell. President Apollo Computer. Inc." Pencept. Inc. Nancy Petti nella. Paul R. Pierce. The Computer Museum Bank of America" Polese-Clancy. Inc. Jonathan Rotenberg. Oliver and Kitty Erich Bloch The Boston Globe" Price Waterhouse Selfridge. J. Michael Storie. Bob National Science Foundation ComputerLand" Project Software & Development. Inc. Whelan. Leo R. Yochim Control Data Corporation" Shawmut Corporation David Donaldson Data General Corporation" Standard Oil Corporation Sponsor-$250 Ropes and Gray Digital Equipment Corporation" Teradyne Hewlett-Packard Warner & Stackpole Isaac Auerbach. G. C . Beldon. Jr .. Sydney Fernbach Philip D. Brooke. Richard J. Clayton. Computer Consultant International Data Group" XRE Corporation International Business Machines. Inc." " Contributed to the Capital Campaign Richard Corben. Howard E. Cox. Jr .. C. Lester Hogan The MITRE Corporation" Lucien and Catherine Dimino. Philip H. Fairchild Camera and Instrument NEC Corporation" Darn. Dan L. Eisner. Bob O. Evans. Corporation Raytheon Company Branko Gerovac. Dr. Roberto Guatelli. Sanders Associates M. Ernest Huber. Lawrence J. Kilgallen. Arthur Humphreys The Travelers Companies Core Members Martin Kirkpatrick. Marian Kowalski. ICL Wang Laboratories. Inc." Raymond Kurzweil. Michael Levitt. Carl Theodore G. Johnson Harlan E. and Lois Anderson Machover. Julius Marcus. Joe W .. Charles and Constance Bachman Matthews. Tron McConnell.
    [Show full text]
  • The Last Days of Night
    FEATURE CLE: THE LAST DAYS OF NIGHT CLE Credit: 1.0 Thursday, June 14, 2018 1:25 p.m. - 2:25 p.m. Heritage East and Center Lexington Convention Center Lexington, Kentucky A NOTE CONCERNING THE PROGRAM MATERIALS The materials included in this Kentucky Bar Association Continuing Legal Education handbook are intended to provide current and accurate information about the subject matter covered. No representation or warranty is made concerning the application of the legal or other principles discussed by the instructors to any specific fact situation, nor is any prediction made concerning how any particular judge or jury will interpret or apply such principles. The proper interpretation or application of the principles discussed is a matter for the considered judgment of the individual legal practitioner. The faculty and staff of this Kentucky Bar Association CLE program disclaim liability therefore. Attorneys using these materials, or information otherwise conveyed during the program, in dealing with a specific legal matter have a duty to research original and current sources of authority. Printed by: Evolution Creative Solutions 7107 Shona Drive Cincinnati, Ohio 45237 Kentucky Bar Association TABLE OF CONTENTS The Presenter .................................................................................................................. i The War of the Currents: Examining the History Behind The Last Days of Night .................................................................................................... 1 AC/DC: The Two Currents
    [Show full text]
  • Robert Alan Saunders
    SMITHSONIAN INSTITUTION LEMELSON CENTER FOR THE STUDY OF INVENTION AND INNOVATION Robert Alan Saunders Transcript of an interview conducted by Christopher Weaver at National Museum of American History Washington, D.C., USA on 29 November 2018 with subsequent additions and corrections For additional information, contact the Archives Center at 202-633-3270 or [email protected] All uses of this manuscript are covered by an agreement between the Smithsonian Institution and Robert Alan Saunders dated November 29, 2018. For additional information about rights and reproductions, please contact: Archives Center National Museum of American History Smithsonian Institution MRC 601 P.O. Box 37012 Washington, D.C. 20013-7012 Phone: 202-633-3270 TDD: 202-357-1729 Email: [email protected] Web: http://americanhistory.si.edu/archives/rights-and-reproductions Preferred citation: Robert Alan Saunders, “Interview with Robert Alan Saunders,” conducted by Christopher Weaver, November 29, 2018, Video Game Pioneers Oral History Collection, Archives Center, National Museum of American History, Smithsonian Institution, Washington, DC. Acknowledgement: The Smithsonian’s Lemelson Center for the Study of Invention and Innovation gratefully acknowledges financial support from the Entertainment Software Association and Coastal Bridge Advisors for this oral history project. For additional information, contact the Archives Center at 202-633-3270 or [email protected] Abstract Robert Saunders begins discussing his early family life, education, and early exposure to electrical engineering. He next recounts his time at MIT, recalling members of the Tech Model Railroad Club and his work with the TX-0 and PDP-1 computers. Saunders discusses the contributions of Spacewar! team members to the project and his development of the original PDP-1 game controllers.
    [Show full text]
  • Government Regulations of Shechita (Jewish Religious Slaughter) in the Twenty-First Century: Are They Ethical?
    J Agric Environ Ethics (2012) 25:747–763 DOI 10.1007/s10806-011-9324-4 ARTICLES Government Regulations of Shechita (Jewish Religious Slaughter) in the Twenty-First Century: Are They Ethical? Ari Z. Zivotofsky Accepted: 1 July 2011 / Published online: 15 July 2011 Ó Springer Science+Business Media B.V. 2011 Abstract Human beings have engaged in animal husbandry and have slaughtered animals for food for thousands of years. During the majority of that time most societies had no animal welfare regulations that governed the care or slaughter of animals. Judaism is a notable exception in that from its earliest days it has included such rules. Among the Jewish dietary laws is a prohibition to consume meat from an animal that dies in any manner other than through the rigorously defined method of slaughter known as shechita. In recent decades more and more attempts have been initiated by governments around the world to either outright ban or to control and modify the practice of shechita. This paper presents the requisite background about shechita and then analyzes the ethics of some of the recent legislation. The analysis includes a rebuttal of the assertion that shechita is an inhumane method of slaughter. It further presents the consequences on the Jewish community of legislation to impose pre-slaughter stunning and explains why such legislation is unethical. The actual effect of labeling laws is discussed and it is shown why such laws are also un- ethical. Keywords Animal welfare Á Ethics Á Government regulations Á Religious slaughter Á Shechita Introduction Human beings have historically maintained animals for food production, labor, and companionship.
    [Show full text]
  • June 19 Senior Stroll-10Am
    Enviro-News June 2019 Sponsored by Daemen College’s Global & Local Sustainability Program Newsletter Contents: • Articles- including events, courses, local news, grants, jobs • Upcoming Activities • Tips for the Environment • Volunteer Opportunities, Recycling, CSAs and Farms, Organization links Articles: Erie County Household Hazardous Waste Dropoffs If you have old oil-based paint, fertilizer or pesticides lying around in your basement, garage or shed, 2019 is your lucky year. Erie County Department of Environment and Planning will hold five household hazardous waste collection events throughout the county: June 15 at Erie Community College South Campus in Orchard Park; Aug. 10 at ECC South Campus; Sept. 14 in Concord; and Oct. 5 in Buffalo. Residents will have to preregister online or by phone to participate. Registration opens 30 days before event. Specific locations of the drop-offs will be provided at preregistration. For more info, visit erie.gov/recycling or call 716-858-6800. SUNY/Erie Canal Bicentennial Forum Join a timely discussion by local, state, national and Canadian experts from government, tourism and private enterprise about New York’s new Empire State Trail and what it will mean for the greater Buffalo, the Western New York region and beyond. The June 5th SUNY/Erie Canal Bicentennial Forum is free and will be held from 9am to noon at University at Buffalo School of Architecture and Planning, 3435 Main Street, Buffalo, NY 14214. Please plan to join us free of charge for this SUNY / Erie Canal Bicentennial Forum, including a Networking Luncheon immediately following. register Wine and Wags Join the SPCA on Wednesday, June 5th from 5:30pm-8:00pm for an evening of food, wine and fun for you and your dog right on the grounds of the Erie County SPCA located at 300 Harlem Road, West Seneca.
    [Show full text]
  • Jewish Ritual Slaughter
    Shehitah: Jewish Ritual Slaughter The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Shehitah: Jewish Ritual Slaughter (2005 Third Year Paper) Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:8852091 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA Shehitah: Jewish Ritual Slaughter Ronit Gurtman Class of 2005 April 2005 Combined Course and Third-Year Work Abstract The laws pertaining to shehitah, Jewish ritual slaughter, are explored. The laws derive from the oral law, stemming from the prohibition to eat the flesh of live animals, in combination with the general Biblical obligation for humane treatment of animals. The first part of this paper is an exposition of the origins of shehitah, and the laws for correctly carrying out the process. The second part of this paper addresses the history of the practice of these laws in select European countries and the United States. This history includes a discussion of anti-shehitah campaigns and legislation through modern times. 2 Table of Contents Abstract ................................................................................................................................ 2 Part I: The Laws of Shehitah ..............................................................................................
    [Show full text]
  • Operation Open Arms Founder Honored for Outstanding Service
    http://islandsunnews.com Captain John “GiddyUp” Bunch, Operation Open Arms Founder a veteran of the United States Marine Corps and charter fishing captain out of Honored For Outstanding Service Pine Island, was one of four individuals honored during the September 15 ceremony held at Joint Base Myer- Henderson Hall, Virginia. The Outstanding Civilian Service Award is the third highest honor within the Department of the Army Civilian Awards scheme, that the United States Department of the Army can bestow upon a private citizen. In addition to Bunch, the civilians honored that day included country musician Trace Adkins; Dr. Briana Goff, a researcher of traumatic brain injury; and Spencer Kympton, founder of the nonprofit The Mission Continues. The ceremony was officiated by Chief of Staff of the Army, Gen. Mark A. Milley. “They love those who serve and want to make a true difference, not only for the nation but they want to make a true captain John Bunch, left, is interviewed by difference for our soldiers, our families, Kerry Sanders from NBC's Today Show Gen. Milley said. Captain John “GiddyUp” Bunch, right, a Southwest Florida resident and founder of Since it began in 2005, Operation Open Arms (OOA) has been supported by Operation Open Arms, receiving the Outstanding Civilian Service Award during a more than 150 businesses, associations and individuals in Florida. In addition to September 15 ceremony held in Virginia photos courtesy Rep. Curt Clawson providing vacations for service members, OOA has facilitated over 100 weddings, by Jeff Lysiak paid for counseling services and - most recently - helped a family honor their Marine who died in a helicopter crash.
    [Show full text]
  • Closing the Cloud Factories by Kari Lydersen Acknowledgements
    Closing the Cloud Factories Lessons from the fight to shut down Chicago’s coal plants By Kari Lydersen Published by and ©2014 Midwest Energy News Acknowledgements Warmest thanks to all the activists, organizers, experts and other Chicago residents who took time to speak with me for this book and for my reporting on this issue in general. Special thanks to Kim Wasserman, Ian Viteri, Claudia Ayala, Jerry Mead-Lucero, Dorian Breuer, Jack Ailey, Pam and Lan Richart, Brian Urbaszewski, Tom Shepherd, Howard Learner, Faith Bugel, Henry Henderson, Kelly Mitchell, Christine Nannicelli, Jack Darin, Emily Rosenwasser, Becki Clayborn, David Jakubiak, Edyta Sitko, Debra Michaud and Josh Mogerman for their time and assistance. Thanks also to Douglas McFarlan of Midwest Generation, whom even fierce industry critics acknowledge for his respectful approach to adversaries. And deepest apologies to all those who were inadvertently not mentioned or given due credit here. Many thanks to Midwest Energy News and Ken Paulman for conceiving of, editing and publishing this book, and to the Joyce Foundation and RE-AMP for their generous support. - Kari Lydersen, Chicago, June 2014 Midwest Energy News is an editorially independent online news service published by Fresh Energy and RE-AMP. Cover photo courtesy of Rainforest Action Network Editing/Layout: Ken Paulman Photos by Lloyd DeGrane, Kari Lydersen, Pam Richart, and Greenpeace Cover design by Meher Khan Assistant editor: Jessica Conrad Table of Contents Introduction: 'Suddenly it all made sense' 1: A city built
    [Show full text]