Requester Request Date of Request City Response Date Fulfilled

Total Page:16

File Type:pdf, Size:1020Kb

Requester Request Date of Request City Response Date Fulfilled Requester Request Date of Request City Response Date Fulfilled Surendra Ruhela Property records for 1530 Queensbury Avenue January 1, 2020 No records January 3, 2020 Melissa Hartman, Los All documentation and correspondence available between parties involved in the Peter N. Brewer v. City of January 3, 2020 Granted February 10, 2020 Altos Town Crier Los Altos et all case (no. 19CV355103) Harishwar Pasupu, Ryan 1) Any records showing information regarding depositor names, amounts and dates for all unrefunded cash January 3, 2020 Granted February 5, 2020 LLC escrows, cash deposits, performance or construction bonds which have been deposited that have not been returned or refunded; 2) Any records showing the (i) payee or vendor names, (ii) check issue dates, (iii) check number, and (iv) dollar amounts of every uncashed /stale-dated vendor check that has aged more than (6) months from the date of this letter in an amount equal to or greater than one thousand dollars ($1,000.00); 3) Financial spreadsheet, ledger, or any other accounting record of property tax overpayments, or claimed/unredeemed tax lien certificates which have been refundable for more than (6) months from the date of this letter showing the (i) payee names (ii) check issue dates, (iii) check numbers, and (iv) dollar amounts over $1,000.00 Pat Marriott Number of members on the City's Senior Program January 4, 2020 Granted January 21, 2020 Tina Klabo, Intero Real Property records for 1405 Miravalle Avenue January 6, 2020 Granted January 16, 2020 Estate Nathan George, Remy Records regarding Santa Clara County Superior Court Case No. 19CV359702 January 6, 2020 Granted April 7, 2020 Moose Manley LLP Larry Baron Audio recording from Senior Commission Meeting on January 6, 2020 January 8, 2020 Granted January 9, 2020 Grace Hase, Metro Silicon 1) All email correspondence on personal and city devices between Chris Diaz and Lynette Lee Eng, Chris January 8, 2020 Partially granted June 11, 2020 Valley Diaz and Jan Pepper, Chris Diaz and Jeannie Bruins, Chris Diaz and Neysa Fligor, Chris Diaz and Anita Enander and Chris Diaz and Chris Jordan between between Dec. 9, 2019 and Dec. 21, 2019 2) Emails and text messages on Lynette Lee Eng’s personal and city devices with the mention of “election” or “campaign” from Nov. 15, 2019 to Jan. 8, 2020 and 3) A line item cost of litigation that has involved the city of Los Altos from 2014 to present Requester Request Date of Request City Response Date Fulfilled Janet Corrigan 1) Any and all correspondence or notes of correspondence (electronic or otherwise) between Catherine January 8, 2020 Stansbury and the City Council, City of Los Altos and its commissions, including the Parks and Recreation Commission and any sub-committees; 2) Any documents reflecting any and all meetings Catherine Stansbury has had with any member of the City Council, City of Los Altos representative including any Parks and Recreation Commissioners or its sub-committees to discuss the subject of dog park or related topics; 3) Any and all surveys provided to, created by, or created for the City Council, City of Los Altos and its commissions, including the Parks and Recreation Commission and any sub-committees, concerning dog parks or off-leash hours; 4) Any and all data, spreadsheets, worksheets, etc. created, yielded, or generated by all surveys of Los Altos residents concerning dog parks or off-leash hours including data that includes individual survey responses, identification of IP addresses, identification of email or non-email addresses; 5) Any and all communications reflecting the methodology for how survey respondents were identified, how the survey was distributed, and what was done with the raw data or survey results; 6) Mailing list used for all dog park surveys including the survey sent in October 2017; 7) Documents sufficient to identify the authors, sponsors, in putters, creators, editors, or commentators of all dog park surveys; 8) Documents sufficient to identify who requested, sponsored, suggested, created, commented on, produced, and/or disseminated the dog park survey; 9) Documents sufficient to identify the owner of the google email account used to send the survey using this link in October ink to Los Altos Dog Park Survey: https://goo.gl/ynlp8P; 10) Documents sufficient to show what steps have been taken by the City Council, City of Los Altos and its commissions, including the Parks and. Recreation Commission and any sub-committees, to ensure that all surveys concerning dog parks or off-leash hours met industry standards to eliminate bias, identify and validate the sample source, employ proper controls to eliminate fraud or unreliable data and all other standard practices to ensure reliability of data Osamu Sasaki Building permit records for 1240 Colonial Oaks Drive January 9, 2020 Granted January 16, 2020 Mary Pettyjohn, Andy Real Permit history for 1094 Highlands Circle January 10, 2020 Granted January 21, 2020 Estate, Sereno Group Todd Richardson, Supply Invoices from the following companies, Range: July 2019 thru October 2019; Waxie Sanitary Supply, Starline January 10, 2020 Granted January 23, 2020 Solutions Janitorial, SupplyWorks Linda Ziff, GreenTown How many citations for gas leaf blower violations were given in 2019 January 12, 2020 Granted January 14, 2020 Los Altos Requester Request Date of Request City Response Date Fulfilled Freddie Wheeler 1) Invoices for payment of air conditioning units used in LAYC; 2) Invoices for payment of AV services for January 12, 2020 Granted February 13, 2020 Council meetings in LAYC; 3) Documents related to staff time required to set up Council meetings in Nicholas French, Sereno Permit history for 468 Hawthorne Avenue January 13, 2020 Granted January 21, 2020 Group Tina Klabo, Intero Real Permit history for 920 Damian Way January 13, 2020 Granted January 3, 1900 Estate Sara Tabin, Daily Post All invoices for the past year for any dollar amount for podiums or daises used in/rented for Los Altos January 13, 2020 Granted February 6, 2020 Youth Center Frank Martin For the last three fiscal years: 1) Total Number of off-leash dog complaints? Portion of dog complaints January 14, 2020 granted January 16, 2020 involving aggressive dog behaviors out of this total if know?; 2) Number of fines in the first offense of what is now $100, second offense ($200), and third offense ($500)? Frank Martin For the last three fiscal years: 1) What is the the current published fee to use our park facilities and city January 14, 2020 Granted January 23, 2020 buildings - that is not part of our ongoing parks and recreation programs? For example, the Grant Field? Or, a room at Grant Park?; 2) What are the names, dates, times, and location of the pay to play users for our parks and city buildings?; 3) A detailed list for parks and recreation program programs for our park fields and city facilities by actual name, usage date, time if known, name, and rent or fee collected? Melissa Hartman, Los Police report and related documents in reference to the bicycle vs. car accident that killed bicyclist Stephen January 14, 2020 Denied February 6, 2020 Altos Town Crier Purcell, reported on after the occurrence in March 2019 Michael Lazar, 1) Records concerning credits, overages, or refunds that are due and owing by the city; 2) Called, matured, January 14, 2020 Granted February 10, 2020 MarketSphere Consulting, and/or currently redeemable bonds issued by the city which may include but is not limited to refunds due LLC back to the depositor pertaining to sheriff bonds, construction bonds, or public works related bonds; 3) Any financial spreadsheet, ledger, or other record of the active cash and cash-convertible sureties and escrow accounts maintained by the City for financial instruments posted or deposited with the City by companies to ensure completion of private-sector residential or commercial construction projects; 4) Amounts on deposit with the City that are held in trust for recipients whose whereabouts are unknown including instances where payments were attempted but undeliverable. These amounts may pertain to eminent domain, matured government bonds, tax refunds, tax overpayments, real estate foreclosures, restitution payments, proceeds from public sales of lost property, unsuccessful electronic funds transfers, funds held in escrow, or any other securities; 5) Outstanding and refundable credit balances; 6) Unclaimed, uncashed, undeliverable, staled- dated, voided, overdue and/or outstanding payments or checks/warrants issued by the city Requester Request Date of Request City Response Date Fulfilled MuckRock.com SB1421 records. January 15, 2020 No records January 16, 2020 Sara Tabin, Daily Post Claims attached to cases 3559702, 349845 and 350422. January 16, 2020 No records January 16, 2020 Pat Marriott How the City of Los Altos tracks Public Record Act Requests January 19, 2020 Granted January 21, 2020 Tina Klabo, Intero Real Permit records for 911 Echo Drive and 72 View Street January 21, 2020 Granted January 31, 2020 Estate Betty Leung, Intero Real Permit records for 417 Los Altos Drive January 21, 2020 Granted January 31, 2020 Estate Elisabeth Martin Sesek Permits issued and permits approved for 1505 Oakhurst Avenue January 23, 2020 Granted January 31, 2020 Anthony Minotti, AMM Limited Payability Cancellation Report of refunds and credits of items over $600 and for the last 6 months January 24, 2020 Granted February 6, 2020 Peter Gow, Neopost Information about the City's current mail machine/postage equipment January 27,
Recommended publications
  • Northern California Regional Intelligence Center 450 Golden Gate Avenue, 14Th Floor, San Francisco, CA 94102 [email protected], [email protected]
    VIA EMAIL Daniel J. Mahoney Deputy Director and Privacy Officer Northern California Regional Intelligence Center 450 Golden Gate Avenue, 14th Floor, San Francisco, CA 94102 [email protected], [email protected] March 17, 2021 RE: California Public Records Act Request Dear Mr. Mahoney, This letter constitutes a request under the California Public Records Act Cal. Gov. Code § 6250 et seq. and is submitted by the Electronic Privacy Information Center. EPIC requests records related to the Northern California Regional Information Center’s (NCRIC) monitoring of protests and use of advanced surveillance technologies. Background The summer of 2020 saw large protests across the country in the wake of the killing of George Floyd. Polls conducted between June 4 and June 22, 2020 estimate that between 15 million and 26 million people attended protests nationwide, marking 2020’s protests as the largest in American history.1 2020 was also a high-water mark for police surveillance of protesters, with reports of aerial and drone surveillance, widespread use of video recording and facial recognition, cellular surveillance, and social media surveillance appearing in news stories across the nation.2 Fusion centers played a prominent role in surveilling protesters, providing advanced tools like facial recognition and social media monitoring to local police.3 The BlueLeaks documents, records 1 Larry Buchanan, Quoctrung Bui, and Jugal K. Patel, Black Lives Matter May Be the Largest Movement in U.S. History, N.Y. Times (July 3, 2020), https://www.nytimes.com/interactive/2020/07/03/us/george-floyd- protests-crowd-size.html. 2 See e.g., Zolan Kanno-Youngs, U.S.
    [Show full text]
  • Cyber Securityjuly 2020
    Cyber Security Vol. 5 | IssueNEWS 6 July 2020 Page 2 | Page 3 | Page 4 | Page 5 | News | Challenge | Closing TXDPS Cyber Security Newsletter The Texas Department of Public Safety Cyber Security welcomes you to this month’s Cybersecurity Newsletter. Be- fore diving into this month’s issue, we’d like to take a moment to provide a general overview of ransomware: what it is, why it is important to understand, and how to protect against this very real threat. For example, during Summer 2019, 22 Texas municipalities were compromised with Sodinokibi/REvil ransomware. During that breach, hackers were able to comprise municipal Information Technology (IT) networks by leveraging third party software. The software was being used to remotely manage the network.1 Ransomware is a term used to describe malicious software that is used to extort victims into payment. Payment is usually required to be in cryptocurrency, credit cards or untraceable gift cards. This form of “digital extortion” can be grouped into two different strands and further divided by the systems they are tailored to. The two different forms of ransomware either encrypt, obfuscate, and deny access to files, or restrict access and lock users out of systems.2 An example of this can be seen in the following screenshot of the Goldeneye ransomware. There are different ways that ransomware can make it to workstations. One of them is through email phishing and spam. Users will receive messages that include either a malicious attachment or a link to a malicious or compro- mised website. Another way ransomware can infect systems is by using an exploit kit.
    [Show full text]
  • Reflections on a Revision of the Definition of the EU SME
    Reflections on a Revision of the Definition of the EU SME Crehan, Patrick December 2020 This publication is a report by the Joint Research Centre (JRC), the European Commission’s science and knowledge service. It aims to provide evidence-based scientific support to the European policymaking process. The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use that might be made of this publication. For information on the methodology and quality underlying the data used in this publication for which the source is neither Eurostat nor other Commission services, users should contact the referenced source. The designations employed and the presentation of material on the maps do not imply the expression of any opinion whatsoever on the part of the European Union concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. Contact information Name: James P. Gavigan Address: European Commission, Joint Research Centre, Edificio Expo, Calle Inca Garcilaso, 3, 41092 Seville, Spain Email: [email protected] Tel.: +34 9544 88409 EU Science Hub https://ec.europa.eu/jrc JRC123296 PDF ISBN 978-92-76-28301-0 doi:10.2760/602855 Luxembourg: Publications Office of the European Union, 2020 © European Union, 2020 The reuse policy of the European Commission is implemented by the Commission Decision 2011/833/EU of 12 December 2011 on the reuse of Commission documents (OJ L 330, 14.12.2011, p.
    [Show full text]
  • WEEKLY IT SECURITY BULLETIN 26 June 2020
    On June 24, 2020, the Cyber Threat Level’s explained Threat Alert Level was evaluated • GREEN or LOW indicates a low risk. and is remaining at Blue • BLUE or GUARDED indicates a general risk of increased hacking, virus, or other malicious activity. (Guarded) due to vulnerabilities in Treck, Google and BitDefender • YELLOW or ELEVATED indicates a significant risk due to increased hacking, virus, or other malicious activity that products. compromises systems or diminishes service. • ORANGE or HIGH indicates a high risk of increased hacking, virus, or other malicious cyber activity that targets or compromises core infrastructure, causes multiple service outages, causes multiple system compromises, or compromises critical infrastructure. • RED or SEVERE indicates a severe risk of hacking, virus, or other malicious activity resulting in widespread outages and/or significantly destructive compromises to systems with no known remedy or debilitates one or more critical infrastructure sectors. WEEKLY IT SECURITY BULLETIN 26 June 2020 In The News This Week Social Networking Safety and Security Tips BlueLeaks: Data from 200 US police departments & fusion centers published online Social networking through Facebook, twitter, LinkedIn, Telegram, to name just a few, has become an indispensable and intrinsic part of An activist group has published on Friday the 19th, 296 GB of data they claim have been stolen from US law our lives. So much so that if we lose connection or can’t find a telecom or wi-fi signal, it transcends into this huge crisis in our lives as we enforcement agencies and fusion centers. The files, dubbed BlueLeaks, have been published by Distributed Denial become more and more dependent on this technology and the social interaction it provides.
    [Show full text]
  • Understanding Antifa and Urban Guerrila Warfare
    UNDERSTANDING ANTIFA AND URBAN GUERRILA WARFARE RESTRICTED TO LAW ENFORCEMENT ONLY Introduction This manual is a working manual, i.e., the readers are encouraged to submit their observations, field experiences and opinions regarding what is presented, in the hopes that this will better serve their fellow officers. It is understood that, at this moment, law enforcement is undermanned, underequipped, undertrained, and, under supported by Administrators in their departments and public officials. The one item for which each police officer is not in short supply is their DEDICATION to their jobs and the communities they serve. Each of you must never lose track of the fact that this is not a protest, IT IS A REVOLUTION. The Editors Table of Contents UNDERSTANDING ANTIFA AND URBAN GUERRILA WARFARE The Author’s Experience of Past Revolutions and How These Compare to 6. What You Are Experiencing Now. 1. Riots 2. Bombs 3. Author’s Comments 4. Arson 5. Safe Havens 6. Ambushes 7. Conclusions and Lessons Author’s Comments 14. War for the Cities 18. 1. Fourth Generation Warfare 2. Carlos Marighella, “Mini-Manual for the Urban Guerrllla” 19. 3. Author’s Observations 21. 4. Author’s Suggestions 22. Yellow Vests, Rising Violence – What’s Happening in France? 25. Tactics and methods surrounding the 2019-20 Hong Kong protests 31. Major principles 1.1 Decentralized leadership 1.2 Flexible tactics 1.3 Unity and cohesion 2 Demonstrations 2.1 Black bloc and group defences 2.2 Offensive actions, petrol bombs, and arson 2.3 Vandalism and violence 3 Alternative protests 3.1 Neighborhood Lennon Walls 3.2 Hunger strikes 3.3 Non co-operation movements 3.4 Police station blockades 3.5 Human chain 3.6 Nightly democracy chants 3.7 Petition campaigns 4 Economic protests 4.1 Yellow economic circle 4.2 Boycotts 5 Art and music 6 Technology 6.1 Online activism 6.2 Doxing 6.3 AirDrop broadcast 6.4 Peer-to-peer mesh broadcasting 6.5 Crowdfunding 7 Publicity 7.1 Advertising campaign 7.2 Citizens' press conference 8 References Hand signs of the Hong Kong Protestors 65.
    [Show full text]
  • Newsletter July 2020 Upcoming Events 1St-6Th August Black Hat USA 2020
    Newsletter July 2020 Upcoming Events 1st-6th August Black Hat USA 2020 21th-22nd August The Diana Initiative Cyber Policy, Diplomacy & Legal Framework Examining the Legal and Policy Process Behind India's Ban on Chinese Apps The decision to block access to Chinese apps has significant consequences since a large part of the Indian population accesses those services regularly. TikTok has more than 100 million active users in India. Combined with more affordable internet recently, Tik Tok has brought marginalised people online in a way no other app has been able to. Shrinking Cyber-Universe Cybersecurity problems are tightly included in the new agenda of international relations, which stresses the importance of their comprehensive study, now more relevant than ever. India needs to review its 2013 cyber security policy India is among the top 10 countries facing cyber-attacks. These incidents have increased manifold during the lockdown period — almost three times increase in cases of phishing, spamming and scanning of ICT systems, particularly of critical information infrastructure. Companies up in arms as Brazilian government plans direct recruitment of IT staff Technology companies are not happy about the Brazilian government's plans to directly hire IT specialists to support digital transformation initiatives in the federal government. Through the Digital Economy Secretariat, the Ministry of Economy plans to hire 350 professionals to boost central government's digital transformation expertise, across seven areas of specialism. #SpaceWatchGL Opinion: Estonia’s space policy – prioritizing e-gov, cybersecurity and AI Estonian activities in astronomy go back more than 200 years when the construction of the Observatory by University of Tartu began.
    [Show full text]
  • Tiktok and Wechat Curating and Controlling Global Information Flows
    TikTok and WeChat Curating and controlling global information flows Fergus Ryan, Audrey Fritz and Daria Impiombato Policy Brief Report No. 37/2020 About the authors Fergus Ryan is an Analyst working with the International Cyber Policy Centre at ASPI. Audrey Fritz is a Researcher working with the International Cyber Policy Centre at ASPI. Daria Impiombato is an Intern working with the International Cyber Policy Centre at ASPI. Acknowledgements We would like to thank Danielle Cave and Fergus Hanson for their work on this project. We would also like to thank Michael Shoebridge, Dr Samantha Hoffman, Jordan Schneider, Elliott Zaagman and Greg Walton for their feedback on this report as well as Ed Moore for his invaluable help and advice. We would also like to thank anonymous technically-focused peer reviewers. This project began in 2019 and in early 2020 ASPI was awarded a research grant from the US State Department for US$250k, which was used towards this report. The work of ICPC would not be possible without the financial support of our partners and sponsors across governments, industry and civil society. What is ASPI? The Australian Strategic Policy Institute was formed in 2001 as an independent, non-partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI’s sources of funding are identified in our Annual Report, online at www.aspi.org.au and in the acknowledgements section of individual publications.
    [Show full text]
  • Swinging Pendulum
    SWINGING PENDULUM: Big Tech - Mainstream Media - Liberal Security State with CrimethInc & ItsGoingDown The Final Straw Radio A discussion on the silencing of far right platforms and ac- counts, how similar moves have silenced the anti-author- itarian left, and the importance of building our own plat- forms and infrastructure. First aired on Jan 24, 2021. Page 1 of 18 The main host from the ItsGoingDown Podcast and a comrade from CrimethInc discuss the silencing of far right platforms and accounts, how similar moves have silenced the anti-authoritarian left, and the importance of building our own platforms and infrastructure. As aired on Jan 24, 2021. TFSR: Would you please introduce yourselves as you see fit and whatever projects you affiliate with for the purpose of this chat? CrimethInc: For the purpose of this conversation, I’m just a participant in CrimethInc Ex workers collective associated project. ItsGoingDown: I work on ItsGoingDown.org which is a news media platform and podcasts and radio show, along with CrimethInc, The Final Straw, the Channel Zero Anarchist Podcast Network. TFSR: Since the right wing riot in DC on January 6, many of the larger social media platforms have begun purging accounts affiliat- ed with far right groups and tendencies present at the Capitol and big data has been de-platforming apps like Parler. Can y’all maybe talk about what you’ve seen with this and how you think it bodes for anti-authoritarian projects on the left that challenge the state? IGD: I‘ll start off. I think one thing to point out is that there’s a narrative that this is, like, de-platforming censorship.
    [Show full text]
  • Bibliography-2020-08
    CFFD Bibliography (in progress) Milan Prazak Ilnyckyj August 15, 2020 References 2016RNCPlatform 2016 Republican National Convention. Republican Platform 2016. 2016. url: https://prod-static-ngop-pbl.s3.amazonaws.com/media/ documents / DRAFT _ 12 _ FINAL[1] - ben _ 1468872234 . pdf (visited on 2016-08-02). 350org2018reportGrowingOrganizing 350.org. 2018 Annual Report: Growing + Organizing the Climate Move- ment. 2019. url: https://350.org/2018-annual-report-organizing/ (visited on 2019-05-23). 350ThreePhases2020 | 350 Canada's Plan for the 3 Phases of a Just Recovery. 2020. url: https://youtu.be/qZgd2o1Ca1o (visited on 2020-05-22). 350TenYearTimeline2019 | 350 Celebrates a Decade of Action. 2019. url: https://350.org/10- years/ (visited on 2019-12-26). about350 | 350.org | About. 2019. url: https : / / web . archive . org / web / 20190513130218/https://350.org/about/ (visited on 2019-05-23). 350WhiteSuprem2020 | 350.org Holds Webinar on Dismantling White Supremacy, Calls on Cli- mate Movement to Prioritize Racial Justice and Show Up for Black Lives. 2020. url: https : / / 350 . org / press - release / webinar - climate-m4bl/ (visited on 2020-07-12). About350-2008 | About 350. 2008. url: https://web.archive.org/web/20081021151718/ http://350.org/about (visited on 2020-01-18). 350CampaignStrategyGuide2013 | Campaign Strategy Guide. 2013. url: https://s3.amazonaws.com/ s3.350.org/images/Campaign_Strategy_Guide1.pdf (visited on 2020-06-19). GFFCommitments | Divestment Commitments. 2017. url: https://gofossilfree.org/ divestment/commitments/ (visited on 2020-01-01). 350DivestmentSkillUp | Divestment Skill-up. 2019. url: https://learning.elucidat.com/ course/58f66ad442bc6-58fe796f85a69#! (visited on 2019-12-31). 350FossilFreeGuide | Fossil Free: A Campus Guide to Fossil Fuel Divestment.
    [Show full text]
  • Antifa As Bogeyman Laura Finley and Luigi Esposito
    Volume 14 Number 2 (2020): 105-119 ISSN 2578-6857 http://www.infactispax.org/journal Antifa as Bogeyman Laura Finley and Luigi Esposito Many regard President Donald Trump as a master of whipping up fear to support his political agenda (e.g., Ball 2016). Perhaps like no other president, Trump creates scapegoats and bogeymen to shift direction from his own faults and failings, to ignite his base of supporters, and to garner approval for repressive policies and practices. We’ve seen the president do this with immigrants, spewing and tweeting that they are all criminals who will take Americans’ jobs and soak our social services (e.g., Finley and Esposito 2020). His latest foil, amidst the protests by Black Lives Matter related to the murder of George Floyd and many other Black men, is Antifa. Trump has said “our nation has been gripped by professional anarchists, looters, criminals, antifa and others.” The President has repeatedly vowed to officially label Antifa a terrorist group, putting it on a federal list alongside al- Qaeda and ISIS. This is impossible, as the federal government can only classify foreign groups as terrorist entities and anti-fascism is an ideology, movement, and tactic, not an organization (Feuer 2020). Further, none of Trump’s rhetoric matches reality. Instead, Antifa is a “trumped-up boogeyman for the conservative movement, a totem used to justify their violent ‘law and order’ approach to legitimate demonstrations demanding racial justice’ (Beauchamp 2020). Antifa has been found to have very limited involvement in any of the protests of 2020 (Collins 2020). At the same time they denounce Antifa, Trump and his supporters have been largely silent on violence by far-right groups, especially pertaining to white supremacists (Haltiwanger 2020).
    [Show full text]
  • The Silicon Hills Have Eyes
    TThhee SSiilliiccoonn HHiillllss HHaavvee EEyyeess How ARIC Fusion Center Surveillance Makes Austin Less Safe Acknowledgements Take Back Tech Fellow: Professor Sarah Sherman-Stokes, Clinical Associate Professor of Law at the Boston University School of Law Writers: Daniela Hargus, Cristina Moreno, Kennedy Barber-Fraser— Students from the Boston University School of Law Editors: Bob Libal, Paromita Shah, Bethany Carson, Professor Sarah Sherman-Stokes Research Support: Julie Mao Design: Katya Guzman and Maria Reza July 2021 How ARIC Fusion Center Surveillance Makes Austin Less Safe Table of Contents Executive Summary 4 Introduction 8 Background: The Austin Regional Intelligence Center 9 ARIC Evades Community Accountability 11 ARIC Shares Personal Data With APD 12 ARIC's Spyware 13 ARIC’s Toll on Austin Communities 15 Targeting Activists, including Black Lives Matter 16 Increasing Risk of ICE Enforcement Activity in Austin 17 ARIC facilitates surveillance and criminalization of Students and Youth 18 ARIC Continues Data Mining and Surveillance Despite 19 Community-driven Changes 20 Conclusion & Recommendations Executive summary “Always eyes watching you and the voice enveloping you. Asleep or awake, indoors or out of doors, in the bath or bed—no escape. Nothing was your own except the few cubic centimeters in your skull.” - George Orwell, 1984 On a clear November evening in 2019, a he is surprised to be confronted by several father mails a package of toys to his children in officers who only allow him to leave after he Lebanon from a Lakeway Park Mail store. He shows them his photos of the flowers. What he smiles as he hands over the box to be weighed, doesn’t know is that later that night, police anticipating the video his wife would later send officers would search his Facebook profile and of his children opening their gifts with delight.
    [Show full text]
  • The Role of Anonymous Cyberactivism in the Black Lives Matter Movement in the United States (2014-2020)
    Insignia Journal of International Relations Edisi Khusus, Januari 2021, 1-15 P-ISSN: 2089-1962; E-ISSN: 2597-9868 The Role of Anonymous Cyberactivism in the Black Lives Matter Movement in the United States (2014-2020) Sonya Rino Yonita Department of International Relations, Jenderal Soedirman University Email: [email protected] Arif Darmawan Department of International Relations, Jenderal Soedirman University Email: [email protected] Abstract The practice of racism in the US stems from a long history of slavery. The Emancipation Proclamation and the various laws that the Government had issued in an attempt to regulate the rights of black people did not prevent black discrimination from continuing to this day. This situation triggered the emergence of the Black Lives Matter movement, which is one of the biggest movements in the United States. This research discusses the role of Anonymous as a community using cyberspace during the Black Lives Matter (BLM) movement. This research applies the qualitative method using various kinds of secondary data ranging from books, related journals, government websites, and other online sources aiming to analyze the concept of cyberactivism and the idea of cyber libertarianism regarding the role of Anonymous within the BLM movement. This research shows that based on the cyber libertarianism concept the role of Anonymous is as one of the important information sources within the BLM movement by hacking and then propagating the information to the public. Based on the concept of cyberactivism, Anonymous has helped the Police in raising racism awareness. This racism has been rooted in the existing systems in the United States of America.
    [Show full text]