H.R. 5319, the Deleting Online Predators Act of 2006

Total Page:16

File Type:pdf, Size:1020Kb

H.R. 5319, the Deleting Online Predators Act of 2006 H.R. 5319, THE DELETING ONLINE PREDATORS ACT OF 2006 HEARING BEFORE THE SUBCOMMITTEE ON TELECOMMUNICATIONS AND THE INTERNET OF THE COMMITTEE ON ENERGY AND COMMERCE HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION JULY 11, 2006 Serial No. 109-121 Printed for the use of the Committee on Energy and Commerce Available via the World Wide Web: http://www.access.gpo.gov/congress/house U.S. GOVERNMENT PRINTING OFFICE 30-410PDF WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 COMMITTEE ON ENERGY AND COMMERCE JOE BARTON, Texas, Chairman RALPH M. HALL, Texas JOHN D. DINGELL, Michigan MICHAEL BILIRAKIS, Florida Ranking Member Vice Chairman HENRY A. WAXMAN, California FRED UPTON, Michigan EDWARD J. MARKEY, Massachusetts CLIFF STEARNS, Florida RICK BOUCHER, Virginia PAUL E. GILLMOR, Ohio EDOLPHUS TOWNS, New York NATHAN DEAL, Georgia FRANK PALLONE, JR., New Jersey ED WHITFIELD, Kentucky SHERROD BROWN, Ohio CHARLIE NORWOOD, Georgia BART GORDON, Tennessee BARBARA CUBIN, Wyoming BOBBY L. RUSH, Illinois JOHN SHIMKUS, Illinois ANNA G. ESHOO, California HEATHER WILSON, New Mexico BART STUPAK, Michigan JOHN B. SHADEGG, Arizona ELIOT L. ENGEL, New York CHARLES W. “CHIP” PICKERING, Mississippi ALBERT R. WYNN, Maryland Vice Chairman GENE GREEN, Texas VITO FOSSELLA, New York TED STRICKLAND, Ohio ROY BLUNT, Missouri DIANA DEGETTE, Colorado STEVE BUYER, Indiana LOIS CAPPS, California GEORGE RADANOVICH, California MIKE DOYLE, Pennsylvania CHARLES F. BASS, New Hampshire TOM ALLEN, Maine JOSEPH R. PITTS, Pennsylvania JIM DAVIS, Florida MARY BONO, California JAN SCHAKOWSKY, Illinois GREG WALDEN, Oregon HILDA L. SOLIS, California LEE TERRY, Nebraska CHARLES A. GONZALEZ, Texas MIKE FERGUSON, New Jersey JAY INSLEE, Washington MIKE ROGERS, Michigan TAMMY BALDWIN, Wisconsin C.L. “BUTCH” OTTER, Idaho MIKE ROSS, Arkansas SUE MYRICK, North Carolina JOHN SULLIVAN, Oklahoma TIM MURPHY, Pennsylvania MICHAEL C. BURGESS, Texas MARSHA BLACKBURN, Tennessee BUD ALBRIGHT, Staff Director DAVID CAVICKE, General Counsel REID P. F. STUNTZ, Minority Staff Director and Chief Counsel SUBCOMMITTEE ON TELECOMMUNICATIONS AND THE INTERNET FRED UPTON, Michigan, Chairman MICHAEL BILIRAKIS, Florida EDWARD J. MARKEY, Massachusetts CLIFF STEARNS, Florida Ranking Member PAUL E. GILLMOR, Ohio ELIOT L. ENGEL, New York ED WHITFIELD, Kentucky ALBERT R. WYNN, Maryland BARBARA CUBIN, Wyoming MIKE DOYLE, Pennsylvania JOHN SHIMKUS, Illinois CHARLES A. GONZALEZ, Texas HEATHER WILSON, New Mexico JAY INSLEE, Washington CHARLES W. “CHIP” PICKERING, Mississippi RICK BOUCHER, Virginia VITO FOSSELLA, New York EDOLPHUS TOWNS, New York GEORGE RADANOVICH, California FRANK PALLONE, JR., New Jersey CHARLES F. BASS, New Hampshire SHERROD BROWN, Ohio GREG WALDEN, Oregon BART GORDON, Tennessee LEE TERRY, Nebraska BOBBY L. RUSH, Illinois MIKE FERGUSON, New Jersey ANNA G. ESHOO, California JOHN SULLIVAN, Oklahoma BART STUPAK, Michigan MARSHA BLACKBURN, Tennessee JOHN D. DINGELL, Michigan JOE BARTON, Texas (EX OFFICIO) (EX OFFICIO) (II) CONTENTS Page Testimony of: Abbott, Hon. Greg, Attorney General, Office of the Attorney General, State of Texas... 25 Aftab, Esq., Parry, Executive Director, WiredSafety.org................................................... 31 Collins, Michelle, Director, Exploited Child Unit, National Center for Missing and Exploited Children ......................................................................................................... 90 Davis, Ted, Director, Knowledge Asset Management, IT Department, Fairfax County Public Schools................................................................................................................ 95 Kelly, Chris, Vice President, Corporate Development and Chief Privacy Officer, Facebook ........................................................................................................................ 104 Lenhart, Amanda, Senior Research Specialist, Pew Internet and American Life Project . 111 Yoke, Beth, Executive Director, ALA Young Adult Library Services Association.......... 127 Zellis, David W., First Assistant District Attorney, Office of the Bucks County District Attorney, Commonwealth of Pennsylvania................................................................... 135 Additional material submitted for the record: Racine, Elizabeht, prepared statement of............................................................................ 154 Resnick, Michael A., Associate Executive Director, National School Boards Association, prepared statement of ................................................................................ 158 (III) H.R. 5319, THE DELETING ONLINE PREDATORS ACT OF 2006 TUESDAY, JULY 11, 2006 HOUSE OF REPRESENTATIVES, COMMITTEE ON ENERGY AND COMMERCE, SUBCOMMITTEE ON TELECOMMUNICATIONS AND THE INTERNET, Washington, DC. The subcommittee met, pursuant to notice, at 10:10 a.m., in Room 2123 of the Rayburn House Office Building, Hon. Fred Upton [Chairman] presiding. Members present: Representatives Upton, Gillmor, Whitfield, Cubin, Shimkus, Wilson, Bass, Walden, Terry, Ferguson, Blackburn, Barton [ex officio], Markey, Engel, Wynn, Gonzalez, Inslee, Eshoo, and Stupak. Also Present: Representatives Fitzpatrick and Kirk. Staff Present: Howard Waltzman, Chief Counsel for Telecommunications and Internet; Anh Nguyen, Legislative Clerk; Jaylyn Jensen, Senior Legislative Analyst; Johanna Shelton, Minority Counsel; and David Vogel, Minority Research Assistant. MR. UPTON. Morning, everyone. Today we are holding a hearing on H.R. 5319, the Deleting Online Predators Act of 2006, which was introduced recently by Representatives Fitzpatrick and Kirk. Under the leadership of Chairman Whitfield and Chairman Barton, the Oversight and Investigations Subcommittee has held multiple hearings, exposing the appalling sexual exploitation of children on the Internet. This includes the dark underside of social networking websites, which have become stalking grounds for sexual predators who are preying on children all across the Nation. We have had many such cases in my own State of Michigan, far too many. Federal law enforcement officials have described the sexual abuse and exploitation of our Nation’s youth as an “epidemic” propagated by the unlimited access of the Internet. The statistics are alarming. The FBI has seen a 2,026 percent increase in its caseload of online sexual predators in the last 10 years. Of the estimated 24 million child Internet users, one in five kids has received unwanted sexual solicitations. It is estimated that at any given moment, 50,000 predators are prowling for children online, many of whom are lurking within social networks. At a minimum, what our hearings have taught us is that both children and parents need to become better educated about the dangers of social (1) 2 networking websites, and parents need to police their children’s online use at home to guard against sexual predators. However, to the extent that children are using the Internet outside the home, particularly at school or at the public library, parents are not able to monitor their children’s online use, and that is a situation that H.R. 5319 is designed to address. At its heart, H.R. 5319 would require schools and libraries which receive E-rate funding to restrict minors’ access to commercial social networking websites through which such minors may easily be subject to unlawful sexual advances, unlawful requests for sexual favors, or repeated offensive comments of a sexual nature from adults. The approach taken by H.R. 5319 is not dissimilar to the approach taken by the Children’s Internet Protection Act, through which Congress requires schools and libraries that receive E-rate funding to impose filtering technology to protect kids from online visual depictions of an inappropriate sexual nature. I have long supported and remain a strong supporter of the E-rate. I visit a school every week and I have seen the tremendous educational value which the Internet has brought to students throughout my congressional district, and I recognize the importance of the E-rate in making this a reality. However, as with all technologies, the Internet is a double-edged sword, and Congress has a responsibility to ensure that, to the extent that a Federal program is involved, it is doing all that it can to ensure that kids are protected from online dangers. H.R. 5319 represents yet another step in making our children’s online experience at school or at the library safe. I want to thank our witnesses for being with us today, and I look forward to hearing their views on H.R. 5319, and I yield to the gentlelady from California for an opening statement. [Prepared statement of Hon. Fred Upton follows:] PREPARED STATEMENT OF THE HON. FRED UPTON, CHAIRMAN, SUBCOMMITTEE ON TELECOMMUNICATIONS AND THE INTERNET Good morning. Today we are holding a legislative hearing on H.R. 5319, the “Deleting Online Predators Act of 2006,” which was introduced by Representatives Fitzpatrick and Kirk. Under the leadership of Chairman Whitfield and Chairman Barton, the Oversight and Investigation Subcommittee has held multiple hearings exposing the appalling sexual exploitation of children on the internet. This includes the dark underside of social networking websites, which have become stalking grounds for sexual predators who are preying on children all across the nation. We have had
Recommended publications
  • SRA111: Introduction to Security and Risk Analysis
    SRA111: Introduction to Security and Risk Analysis Course Description SRA 111 is an introductory course with a broad focus, spanning primarily the areas of security, risk, and risk analysis. In addition to familiarizing the student with basic security terminology, it will also touch upon social and legal issues, risk analysis and mitigation, crime intelligence and forensics, and information warfare and assurance. This course will motivate students to understand the requirements for security in any government agency or business organization through the use of case studies. Included in this segment are cases related to cyberterrorism, bioterrorism, and critical infrastructure protection. Some concepts to be covered in the area of information security are: confidentiality, integrity, availability, and non- repudiation. Various methods of safeguarding these security concerns will be discussed, such as: single- and multi-factor authentication, encryption, digital signatures, prevention of denial of service attacks, and so forth. This course also covers social and legal issues related to security, in particular identity theft and social engineering. Topics in this section include identity theft, spam, spyware, and adware. This course also covers the basic principles and the approaches to risk analysis. Here students study vulnerability analysis, crime and intelligence analysis, forensics, techniques for risk assessment and risk mitigation. The course will prepare students for more in-depth courses such as SRA 211, SRA 221 and SRA 311. This course will incorporate collaborative and action-learning experiences wherever appropriate. Emphasis will be placed on developing and practicing writing and speaking skills through application of the concepts that define the course. Course Objectives Upon completion of the course, the student will: • Understand basic security concepts, terminology and possible solutions.
    [Show full text]
  • Constitutional Principles at Work in the Investigative-Journalism Genre
    Vanderbilt Journal of Entertainment & Technology Law Volume 15 Issue 1 Issue 1 - Fall 2012 Article 4 2012 To Catch a Lawsuit: Constitutional Principles at Work in the Investigative-Journalism Genre Michael F. Dearington Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Civil Rights and Discrimination Commons, and the First Amendment Commons Recommended Citation Michael F. Dearington, To Catch a Lawsuit: Constitutional Principles at Work in the Investigative- Journalism Genre, 15 Vanderbilt Journal of Entertainment and Technology Law 117 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol15/iss1/4 This Note is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. To Catch a Lawsuit: Constitutional Principles at Work in the Investigative-Journalism Genre ABSTRACT This Note examines two causes of action, civil rights violations under 42 U.S.C. § 1983 and IIED claims, in the context of lawsuits against investigative journalists. Examining two recent cases in particular, Tiwari v. NBC Universal, Inc. and Conradt v. NBC Universal, Inc., which arise out of NBC's conduct in its primetime series To Catch a Predator, this Note concludes that legal standards governing conduct by investigative journalists are currently unclear. Investigative journalists are not adequately on notice as to when they might be liable under § 1983 for violating a subject's civil rights. And district courts have failed to appreciate journalists'First Amendment rights when analyzing IIED claims.
    [Show full text]
  • Media, Affect, and Queer Sociality
    Chapter One The Virtual Life of Sex in Public In this chapter, I examine various scenes of intimacy’s failure, juxtapos‑ ing recent mass mediated sex scandals with ethnographic research I conducted in Austin, Texas, a city famous both for its high technology aspirations and for its cruising culture. I speculate on the ways vari‑ ous discourses on sex in public and virtually mediated eroticism try to capture and frame different iterations of “sex in public” as failures: the inability to achieve idealized forms of erotic belonging is variously expressed as expectancy, deferral, lack, and as an inability to arrive, achieve, or actualize normative forms of belonging. Located in both specific places and larger circuits of public cul‑ ture, the chapter tracks the ways the practices and discourses that congeal around sex in public position it as a form of virtual intimacy, that is, as a diminished or pathological form of contact whether it happens between two people or many. Whether practiced by com‑ munities of men in Austin, Texas, by putatively straight Republican senators, or by the American “Everyman” of Dateline’s To Catch a Predator, the erotic or affective acts that jump into public consciousness as perversion, scandal, hypocrisy, and predation operate as both the limit of and the ground for normative models of relationality. That is, in these often‑spectacular public failures, the architecture and trajectory of heteronormative aspirations—the chase after and promise of a life realized in the image of the monogamous couple—are arrested and interrupted by those aspirations’ queer excesses. At the same time, these failures operate to police the possible forms intimacy might take; they 17 © 2013 State University of New York Press, Albany 18 / Virtual Intimacies are none‑too‑subtle reminders about what’s inside and what’s outside ideal relational forms (the couple, the family, the nation).
    [Show full text]
  • 17C13b388dbfbe401b6c19ae54
    Sex Panic and the Punitive State The publisher gratefully acknowledges the generous support of the General Endowment Fund of the University of California Press Foundation. Sex Panic and the Punitive State Roger N. Lancaster university of california press Berkeley • Los Angeles • London University of California Press, one of the most distin- guished university presses in the United States, enriches lives around the world by advancing scholarship in the humanities, social sciences, and natural sciences. Its activities are supported by the UC Press Foundation and by philanthropic contributions from individuals and institutions. For more information, visit www .ucpress .edu . University of California Press Berkeley and Los Angeles, California University of California Press, Ltd. London, En gland © 2011 by The Regents of the University of California Library of Congress Cataloging- in-Publication Data Lancaster, Roger N. Sex panic and the punitive state / Roger N. Lancaster. p. cm. Includes bibliographical references and index. isbn 978–0-520–25565–4 (cloth : alk. paper) isbn 978–0-520–26206–5 (pbk. : alk. paper) 1. Sex— United States. 2. Sexual ethics— United States. 3. Sex customs—United States. 4. United States— Social conditions— 20th century. I. Title. hq18u5l35 2011 306.70973'09045—dc22 2010020837 Manufactured in the United States of America 19 18 17 16 15 14 13 12 11 10 10 9 8 7 6 5 4 3 2 1 This book is printed on Cascades Enviro 100, a 100% post consumer waste, recycled, de- inked fi ber. FSC recycled certifi ed and pro cessed chlorine free. It is acid free, Ecologo certifi ed, and manufactured by BioGas energy.
    [Show full text]
  • Virtual Pedophilia
    VIRTUAL PEDOPHILIA SEX OFFENDER PROFILING AND GILLIAN HARKINS / U.S. SECURITY CULTURE VIRTUAL PEDOPHILIA VIRTUAL PEDOPHILIA SEX OFFENDER PROFILING AND U.S. SECURITY CULTURE Gillian Harkins Duke university Press Durham and London 2020 © 2020 Duke university Press All rights reserved Printed in the United States of America on acid- free paper ♾ Designed by Matthew Tauch Typeset in Minion Pro by Tseng Information Systems, Inc. Library of Congress Cataloging- in- Publication Data Names: Harkins, Gillian, author. Title: Virtual pedophilia : sex offender profiling and U.S. security culture / Gillian Harkins. Description: Durham : Duke University Press, 2020. | Includes bibliographical references and index. Identifiers: lccn 2019041100 (print) lccn 2019041101 (ebook) isbn 9781478006831 (hardcover) isbn 9781478008118 (paperback) isbn 9781478009153 (ebook) Subjects: lcsh: Pedophilia—Social aspects—United States. | Pedophilia in mass media—Social aspects—United States. | Online sexual predators—United States. | Computer crimes— Investigation—United States. | Mass media and crime—United States. | Sex offenders—United States. | Internet and children— Social aspects—United States. Classification: lcc hq72.u53 h355 2020 (print) | lcc hq72.u53 (ebook) | DDc 306.77—dc23 lc record available at https://lccn.loc.gov/2019041100 lc ebook record available at https://lccn.loc.gov/2019041101 Cover art: Marga van Oers, Jumping Fox. Courtesy of the artist and StoryTiles. CONTENTS vii AcknowleDgments INTRODUCTION 1 Virtual Pedophilia ONE 29 Monstrous Sexuality and Vile Sovereignty TWO 62 Profiling Virtuality and Pedophilic Data THREE 95 Informational Image and Procedural Tone FOUR 128 Capturing the Past and the Vitality of Crime FIVE 161 Capturing the Future and the Sexuality of Risk CONCLUSION 194 Exceptional Pedophilia and the Everyday Case 209 Notes 229 References 263 InDex ACKNOWLEDGMENTS This book has proven more educating than elucidating.
    [Show full text]
  • Judging Journalism: the Turn Toward Privacy and Judicial Regulation of the Press
    Judging Journalism: The Turn Toward Privacy and Judicial Regulation of the Press Amy Gajdat INTRODUCTION In 2006, Basil Marceaux of Soddy Daisy, Tennessee, filed a lawsuit asserting a "right to dictate what news was published or broadcast by local and national newspapers and television stations."' Marceaux had received some decidedly light-hearted press coverage in his successive campaigns for governor and senator, 2 and was apparently aggrieved that media outlets had declined to publish information he considered "newsworthy." 3 The Tennessee Copyright © 2009 California Law Review, Inc. California Law Review, Inc. (CLR) is a California nonprofit corporation. CLR and the authors are solely responsible for the content of their publications. t Assistant Professor of Journalism, Assistant Professor of Law, University of Illinois; Director, Program in Law and Journalism, University of Illinois College of Law. This paper was selected for presentation at the First Annual Privacy Law Scholars Conference inJune 2008. The paper also benefited from comments at the August 2008 Big Ten Untenured Conference at Indiana University Law School, at the Washington University School of Law Junior Faculty Roundtable in November 2007, and at the Law & Society Association's Censorious Languages, Public Discourses, and Political Speech in Constitutional Law Enforcement panel in Berlin. Special thanks to Danielle Citron, Scott Dodson, Steve Helle, Lee Levine, David Meyer, John Nowak, Larry Ribstein, Neil Richards, Kathy Strandburg, Eugene Volokh, Diane Zimmerman, and the editors of the CaliforniaLaw Review for helpful discussions and comments on earlier drafts. 1. Marceaux v. Painter, No. E2006-0144-COA-R3-CV, 2007 Tenn. App. LEXIS 334, at *2 (Ct.
    [Show full text]
  • Guidelines and Resources for INTERNET SAFETY in Schools
    Guidelines and Resources for Second EditionINTERNET SAFETY in Schools OCTOBER 2007 Guidelines and Resources Developed in Response to Chapter 52 – An Act to Amend and Reenact § 22.1-70.2 of the Code of Virginia, Relating to Internet Safety Instruction in Schools (HB58 – Approved March 7, 2006) Disclaimer This document provides links to Web sites created and maintained by other public and/or private organizations. The Virginia Department of Education provides links to these sites for information purposes only; the presence of a link is not an endorsement of the site. Although every reasonable effort is made to present current and accurate information, Internet content appears, disappears, and changes over time. Please let us know about existing external links that might be inappropriate. Guidelines and Resources for INTERNET SAFETY in Schools First Edition, September 2006 Second Edition, October 2007 Guidelines and Resources for Internet Safety in Schools State Board of Education Dr. Mark E. Emblidge, President Dr. Ella P. Ward, Vice President Dr. Thomas M. Brewster Isis M. Castro David L. Johnson Dr. Gary L. Jones Kelvin L. Moore Andrew J. Rotherham Eleanor B. Saslaw Virginia Department of Education Dr. Billy K. Cannaday, Jr. Superintendent of Public Instruction Division of Technology Lan Neugent Assistant Superintendent Office of Educational Technology Dr. Tammy McGraw Director Contents Acknowledgments . iv Foreword . v Introduction . 1 Legislation . 2 Issues School Divisions Must Address . 4 Integrating Internet Safety into Curriculum Content Instruction . 6 What Students Need to Know . 7 What Parents, Grandparents, and Caregivers Need to Know . 10 What Teachers, Instructional Technology Resource Teachers, Library Media Specialists, Counselors, and Resource Officers Need to Know .
    [Show full text]
  • 2016 September 14
    FLASH REPORT #1 2016 SEPTEMBER 14 NEW SEASON PREMIERES After a summer hiatus for many, switch was for RIGHT THIS MINUTE, punctuated by new concept test shows which is now part of the ABC O&O early and the RIO SUMMER OLYMPICS, the past afternoon line-up paired with WHO few weeks have seen many of the first-run WANTS TO BE A MILLIONAIRE (now talkers back on their sets again. Last week taped in Las Vegas). The newly titled heralded the return of the series in search CRIME WATCH DAILY added with CHRIS of a co-host, LIVE WITH KELLY, along HANSEN (TO CATCH A PREDATOR) and with DR OZ, STEVE HARVEY, WENDY Special Correspondent Elizabeth Smart. WILLIAMS and ELLEN on Tuesday. They As Billy Bush moves east for THE TODAY were joined by MAURY, JERRY and the SHOW, Natalie Morales goes west to other HARVEY at TMZ LIVE. This Monday anchor ACCESS HOLLYWOOD. was the new season premiere for the rest Unlike last fall, where special show of the remaining returnees. As alluded to premieres included ELLEN at Rockefeller earlier, it was a busy summer for testing, Center in New York; STEVE HARVEY especially on the FOX O&O’s with series hosting 150 women questioning 2,000 ranging from TOP 30, PAGE SIX TV and SO men; and lots of attention diverted to ME to JASON SHOW and THE PREACHERS. network late night when Stephen Colbert Test runs in daytime also looked at the took over the Ed Sullivan Theater; this viability of the libraries of KITCHEN September, special attention is likely to be NIGHTMARES and in August, DAYTIME focused on HARRY, the highest profiled DATELINE.
    [Show full text]
  • Virtual Parentalism
    Virtual Parentalism Joshua A.T. Fairfield* Abstract Parents, not laws, ultimately protect children both online and offline. If legislation places adults at legal risk because of the presence of children in virtual worlds, adults will exit those worlds, and children will be isolated into separate spaces. This will not improve safety for children. Instead, this Article suggests that Congress enact measures that encourage filtering technology and parental tools that will both protect children in virtual worlds, and protect free speech online. Table of Contents I. Introduction ................................................................................ 1216 II. Parentalism and Cyberbalkanization ........................................... 1218 A. Cyberbalkanization .............................................................. 1219 B. Speech and Child Protection Online .................................... 1224 C. The Effect of Isolation on Children ..................................... 1231 III. Filtering and Virtual Worlds ....................................................... 1233 A. Basic Chat Filtering ............................................................. 1234 B. Filtering Reality: Instancing and Quest-Phasing ................. 1234 C. Making Filtering Better ....................................................... 1237 D. Commerce, Anonymity, and Filtering ................................. 1239 IV. Necessary Law Enforcement in Virtual Worlds.......................... 1240 V. Conclusion .................................................................................
    [Show full text]
  • Obama Orders Rollback of Government Secrecy
    ISSN 0028-9485 March 2009 Vol. LVIII No. 2 www.ala.org/nif President Barack Obama’s first public act in office January 21 was to formalize strict new limits on lobbyists operating in his White House and peel back presidential decision- making to allow more public scrutiny. Another shift toward openness—Obama’s instruction to federal agencies to be more responsive to requests made under the Freedom of Information Act—was greeted with praise from government watchdogs. Obama made several moves aimed at creating what he called “a new standard of open- ness” about the behind-the-scenes machinations of his White House—and those before it. Chief among them was issuing an order requiring that the White House consult with the attorney general and White House counsel “any time the American people want to know something that I or a former president want to withhold.” “Information will not be withheld just because I say so,” Obama said while attending a ceremony in the Eisenhower Executive Office Building to swear in about two dozen of his most senior aides. “It will be withheld because a separate authority believes my request Obama orders is well grounded in the Constitution.” Obama revoked the executive order issued by President George W. Bush in November rollback of 2001, less than two months after the September 11 terrorist attacks, that allowed past government secrecy presidents to exert executive privilege to keep some of their White House papers private. A federal judge ruled parts of it invalid in 2007, while Obama’s order revoked it entirely.
    [Show full text]
  • Younghee Lee (Msa90) Is a Creative Force at Samsung \ a Comedy Writer Finds Success and Strikes out on His Own \ Medill Remembers Garry Marshall (Bsj56)
    YOUNGHEE LEE (MSA90) IS A CREATIVE FORCE AT SAMSUNG \ A COMEDY WRITER FINDS SUCCESS AND STRIKES OUT ON HIS OWN \ MEDILL REMEMBERS GARRY MARSHALL (BSJ56) FALL 2016 \ ISSUE 94 \ ALUMNI MAGAZINE CONTENTS \ 10 THE CREATIVE 16 THE MAN SEOUL BEHIND WHO BROUGHT SAMSUNG’S DALLAS THE MARKETING NEWS Samsung executive Byron Harris (MSJ72) is 22 NEW SCULPTURE Younghee Lee (MSA90) on enjoying retirement after cultivating a strong bond 40 years as Dallas MIXES MEDIA’S between the technology investigative reporter. PAST AND behemoth and its global consumers. PRESENT 18 VIEW FROM Medill is host to a piece by THE STANDS artist and journalist Lloyd 14 TALES FROM Schermer. Medill congratulates For the editor of the NEW ORLEANS Chicago Cubs fan magazine, alumna, Medill Professor A book about blogging sports journalism is the field 26 MEDILL after Hurricane Katrina of his dreams. reveals changes in the REMEMBERS of Practice and Northwestern medium and its impact GARRY on journalism. 20 HALF FULL MARSHALL University Trustee Christine Comedy writer Matt Bellassai (BSJ12) made a career out of (BSJ56) Brennan (BSJ80, MSJ81), recipient wine, whine and revise. of the 2016 Ann Miller Service Award from the Association of 5 MEDILL NEWS / 24 CLASS NOTES / 26 OBITUARIES / 30 KEEP READING ... Women in Sports Media Cover photo: Younghee Lee (MSA90) is pictured in the McCormick Foundation Center at Medill in Evanston on May 12, 2016 (photo by Jenna Braunstein). ISSUE 93 – CORRECTIONS Page 40: Royal Stewart, Jr. received his BSJ in 1956 and his MSJ in 1966. Medill faculty member Ernest Duplessis is a Medill and Kellogg graduate, 1996 and 2008, respectively.
    [Show full text]
  • The Terrorist and the Pedophile: Exploring the Emergence, Construction and Function of Criminal Figures in a Time of Structural Dissolution
    The Terrorist and the Pedophile: Exploring the Emergence, Construction and Function of Criminal Figures in a Time of Structural Dissolution A Division III By: Alison Bowen Fall 2010 - Spring 2011 Committee Chair: Peter Gilford, Ph.D., Professor of Clinical Psychology Committee Member: Vishnupad, Ph.D., Professor of South Asian Studies Hampshire College 2 I would like to thank my committee, Peter and Vishnupad, for your knowledge, guidance and friendship. I would also like to thank my family and friends, for your love and support. 3 Introduction 4 For the purpose this inquiry, I have chosen to discuss the criminal figures of the terrorist and the pedophile with respect to the putative societal threat their presences pose in current American society. Mainstream America – the government, the public and the media – presumes evil and dehumanizes these figures. In an attempt to offer an understanding alternative to that of the mainstream, I have decided to deconstruct the figures of the terrorist and the pedophile and characterize their positionalities within American society. By positionality I mean how these figures are situated in relation to other social structures such as institutions, ideology, practices, knowledge and history. In Chapter 1, I discuss the case of John Walker Lindh – the 20‐year‐old, White, American Muslim‐convert who the US military captured in Afghanistan while he was fighting with the Taliban shortly after 9/11– as a vehicle for a larger discussion on the figure of the terrorist with respect to the current United States War On Terror. I argue that the construction of the figure of the terrorist and the US War On Terror creates a site of moral positionality – and thus communal anchorage – for America as a whole.
    [Show full text]