Five Eyes Intelligence Alliance Director of International Intelligence Scarlett Robinson Secretary of International Defense Alec Prodger

Total Page:16

File Type:pdf, Size:1020Kb

Five Eyes Intelligence Alliance Director of International Intelligence Scarlett Robinson Secretary of International Defense Alec Prodger EYES ONLY ACCESS Five Eyes Intelligence Alliance Director of International Intelligence Scarlett Robinson Secretary of International Defense Alec Prodger Office of the Queen’s Model United Nations Washington D.C. THIS IS A SECURITY COVER SHEET CLASSIFIED TOP SECRET NO DISSEMINATION OR DECLASSIFICATION The contents of this document are fictional based loosely on the X-Files and will be used for the purposes of an extracurricular event. This document contains information affecting the international defense and security of the English-speaking world. Within the meaning of the Espionage Act ss U.S.C. 35 and 38. Its transmission or revelation of its contents in any manner to any unauthorized persons is prohibited by law. Reproduction in any form or the taking of written or electronically transcribed notes is strictly forbidden. READ AND DESTROY EYES ONLY ACCESS About This Committee On behalf of the Queen’s National Model United Nations conference team, we welcome you to the Five Eyes Intelligence Alliance Committee! In this committee you will be discussing the security and intelligence needs of a secret alliance formed between the United Kingdom, the United States, Canada, Australia, and New Zealand. You, the delegates, will represent the Directors, Chiefs, and Commanders of the security and defense agencies that make up the Five Eyes Alliance in the year 1996, and you will be tasked with guiding your respective countries through difficult security and intelligence issues. The most recent incident involving extraterrestrial activity was the Phoenix Lights incident: the spotting of a group of strange lights in a V formation above Phoenix, Arizona. This committee must succeed in suppressing public knowledge of extraterrestrials while also avoiding attention from Interpol, who are looking to investigate any international suppression of knowledge by a major group such as the Five Eyes, as well as having to deal with new technologies such as the Internet or perhaps even experimental alien tech. The public’s and Interpol’s ability to live their lives without care for alien activity is in your hands, good luck! READ AND DESTROY EYES ONLY ACCESS Letter from the Director Dear Delegates, My name is Scarlett, and I will be one of your crisis directors! I am a fourth year history and economics student, and this is my second year involved with the Queen’s International Affairs Association, the parent association of the Model United Nations team. I want to emphasize that I had an absolute blast writing this committee; growing up I was fascinated by the ideas of cryptids, aliens, and conspiracy theories. My father spent many hours talking about what he really thought about the Moon Landing when I was young (and he acted as my consultant while writing this), and the discovery of the television series The X-Files did nothing but stoke the fires ​ ​ of this fascination. When I started writing this committee all I knew is I wanted to connect it back to The X-Files, and when I discovered ​ ​ the Five Eyes I knew it would be a fantastic vessel by which to explore the world of aliens. Hey all, my name is Alec, and I will be your other crisis director! I am a third year history major in the Concurrent Education program here at Queen’s, and this is my second year involved with the Queen’s Model United Nations team. Though this committee is mainly Scarlett’s brilliant creation, I helped with some of the later elements, mainly some of the fun crisis updates you will get to see! I was also very interested in cryptids, aliens, and anything paranormal as a child - my favourite book for years was called Encyclopedia Horrifica and had all sorts to do with the weird and ​ supernatural. With my love of history to go along with this love of the paranormal, I’m super thankful to be a part of this committee and hope you all have as much fun as we will have with this! Anyways, I really hope you have as much fun with this committee as I did in writing it. I encourage you to be creative, in both your research and your crisis arcs, and to really have fun with this one. Trust No One, Scarlett Robinson and Alec Prodger READ AND DESTROY EYES ONLY ACCESS History of the Five Eyes “All warfare is deception...” Sun Tzu, The Art of War In 1941, five months before the United States decided to enter into the Second World War, the United Kingdom and the United States came together to create and issue the Atlantic Charter, which outlined the goals of the Allies in a post-World War II world. Terms that were agreed to between the two major powers included: no territorial aggrandizement; no territorial changes made against the wishes of the people; restoration of self-government to those deprived of it; reduction of trade restrictions; global cooperation to secure better economic and social conditions for all; freedom from fear and want; freedom of the seas; and abandonment of the use of force, as well as disarmament of aggressor nations. This Charter set the precedent for a series of international agreements, declarations, and alliances between Allied countries that created international bodies such as the United Nations in 1945 to govern international relations and maintain international peace.1 Other, more covert, alliances were also forged out of the Atlantic Charter, with intentions to govern and share security intelligence within the anglophone world to protect the West against the Soviet Union and Eastern Bloc. This included the UKUSA Agreement, formalized in 1946, which formed the basis for cooperation between the United States National Security Agency and the United Kingdom’s Government Communications Headquarters.2 Later, Canada was included in this agreement in 1948, and Australia and New Zealand in 1956, which was eventually formalized to become the Five Eyes Intelligence Alliance, 1 https://www.history.com/topics/world-war-ii/atlantic-charter 2 https://www.nsa.gov/news-features/declassified-documents/ukusa/ READ AND DESTROY EYES ONLY ACCESS or FVEY.3 As a secret supra-national agency, Five Eyes is only known to the highest ranked officers of each involved country, and as such is able to circumvent both national and international laws in intelligence collection, surveillance, and defense implementation. Five Eyes came to play an important role during the Cold War, sharing information concerning the Soviet Union, the People's Republic of China, and several eastern European countries (known as Exotics). A framework to monitor the military and diplomatic communications in Communist-aligned countries in the late 1960’s was eventually formalized into the ECHELON surveillance program in 1971.4 Throughout the 70’s and 80’s ECHELON’s surveillance program evolved beyond explicit military and diplomatic surveillance to include the surveillance of civilians; however, most individual intelligence agencies in Five Eyes had already been involved in civilian surveillance independently. The Five Eyes primarily collects information through national systems and the Upstream system which gathers information directly from the communications of civilians via fiber cables and infrastructure such as data flows. The collected information is then subsequently shared through the RAMPART-A partnership of which the Stone Ghost program is a part of, a sharing program between the Five Eyes countries through the newly-established Intelink-C, a secured intranet network.5 In 1988, Duncan Campbell revealed in the New Statesman the existence of ECHELON, an extension of the UKUSA Agreement on global signals intelligence. The story, 'Somebody's listening,' detailed how the eavesdropping operations were not only being employed in the interests of 'national security,' but were regularly abused for corporate espionage in the service of US business interests. The piece passed largely unnoticed outside of journalism circles. The History of Nuclear Development “Now I am become death, the destroyer of worlds…” 3 https://ukdefencejournal.org.uk/the-five-eyes-the-intelligence-alliance-of-the-anglosphere/ 4 https://www.google.com/amp/s/techcrunch.com/2015/08/03/uncovering-echelon-the-top-secret-nsa-progr am-that-has-been-watching-you-your-entire-life/amp/ 5 https://web.archive.org/web/20180321194414/https://s3.amazonaws.com/s3.documentcloud.org/docume nts/1200864/tssinframpartaoverview-v1-0-redacted-information.pdf READ AND DESTROY EYES ONLY ACCESS The Bhagavad Gita, Veda Vyasa In 1938, less than one year before Germany invaded the Rhineland thus starting World War II, German scientists won the nuclear race and split the first atom, thus discovering fission. Immediately the international scientific community, specifically the United States, realized the implications of such a discovery after such experiments had been worked upon since at least 1919 when New Zealander Ernest Rutherford separated a nitrogen atom from a hydrogen atom. The United States and Canada thus kicked off the project that ended in the dropping of two nuclear bombs on Japan: The Manhattan Project; a race to create and use a nuclear weapon. In 1945, the first nuclear weapon was set off at the Trinity site near Los Alamos. Nuclear testing proceeded to occur around Nevada, Utah, Arizona, and New Mexico. In 1949, the Soviet Union, the US’ main enemy in the Cold War (1947-1991) developed its first nuclear warhead, leading to an arms race between the two superpowers alongside some global great powers. One such power was the United Kingdom, which developed its first nuclear weapon in 1952. Since their first nuclear tests, both the US and UK have each created a sizable arsenal: 10,577 for the US and 522 for the UK by 1995. Alongside nuclear weaponry, nuclear energy has become commonplace, though incidents within the past 20 years such as the Three Mile Island incident and the Chernobyl disaster have led to an increase in public mistrust of nuclear energy as an alternative to fossil fuels.
Recommended publications
  • United Nations Educational, Scientific and Cultural Organization (UNESCO)
    United Nations Educational, Scientific and Cultural Organization UNESCO 2016 Cover The recent large-scale, systematic destruction and looting of cultural heritage has been the dominant theme at UNESCO throughout 2016. One of the Organization’s responses to these attacks on cultural heritage and cultural pluralism is the #Unite4Heritage campaign, a global movement that calls on everyone to harvest the power of culture to bring people together and to celebrate the places, objects and cultural traditions that make the world such a rich and vibrant place. This image produced for the campaign combines past and present, with the head of Buddha Shakyamuni and the face of an Erbore tribe warrior from Ethiopia. © Public Domain LACMA - Los Angeles County Museum of Art/Rod Waddington Published in 2017 by the United Nations Educational, Scientific and Cultural Organization (UNESCO). 7, place de Fontenoy, 75352 Paris 07 SP, France © UNESCO 2017 This publication is available in Open Access under the Attribution-ShareAlike 3.0 IGO (CC-BY-SA 3.0 IGO) license (http://creativecommons.org/licenses/by-sa/3.0/igo/). The present license applies exclusively to the text content of this publication and to images whose copyright belongs to UNESCO. By using the content of this publication, the users accept to be bound by the terms of use of the UNESCO Open Access Repository (http://www.unesco.org/open-access/terms-use-ccbysa-en). The designations employed and the presentation of material throughout this publication do not imply the expression of any opinion whatsoever on the part of UNESCO concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries.
    [Show full text]
  • What Is Xkeyscore, and Can It 'Eavesdrop on Everyone, Everywhere'? (+Video) - Csmonitor.Com
    8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com The Christian Science Monitor ­ CSMonitor.com What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) XKeyscore is apparently a tool the NSA uses to sift through massive amounts of data. Critics say it allows the NSA to dip into people's 'most private thoughts' – a claim key lawmakers reject. This photo shows an aerial view of the NSA's Utah Data Center in Bluffdale, Utah. The long, squat buildings span 1.5 million square feet, and are filled with super­ powered computers designed to store massive amounts of information gathered secretly from phone calls and e­mails. (Rick Bowmer/AP/File) By Mark Clayton, Staff writer / August 1, 2013 at 9:38 pm EDT Top­secret documents leaked to The Guardian newspaper have set off a new round of debate over National Security Agency surveillance of electronic communications, with some cyber experts saying the trove reveals new and more dangerous means of digital snooping, while some members of Congress suggested that interpretation was incorrect. The NSA's collection of "metadata" – basic call logs of phone numbers, time of the call, and duration of calls – is now well­known, with the Senate holding a hearing on the subject this week. But the tools discussed in the new Guardian documents apparently go beyond mere collection, allowing the agency to sift through the www.csmonitor.com/layout/set/print/USA/2013/0801/What-is-XKeyscore-and-can-it-eavesdrop-on-everyone-everywhere-video 1/4 8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com haystack of digital global communications to find the needle of terrorist activity.
    [Show full text]
  • NRO Mission Ground Station Declassification "Questions and Answers"
    , On Octcbor 15, 2008, 1'I!X'r Becames UNCP'SSII'IED • National Reconnaissance Office Mission Ground Station Declassification "Questions and Ansvers" Question 1: (U) Why has the National Reconnaissance Office (NRO ) decided now to acknowledge locations of mission ground stations? Answar 1: (U) Mr. Scott Large, NRO Director, in consultation with the DNI, made the decision to declassify the locations of our mission ground stations as a strategic move in keeping with our need to provide on-demand surveillance for real-time engagement by policy and military decision makers. The intent is to ensure that the NRO can fully support the new technical and policy initiatives developed across the Department of Defense (000) and the Intelligence Community (IC). (U) The NRO has taken great strides this year to transform the organization so that it is best aligned to improve acquisitions and deliver improved intelligence data access, content, and timeliness. Question 2: (U) What is Being Declassified? (S//REL) Acknowledgement of NRO domestic Mission Ground Stations (MGSs) and overseas NRO presence begins on 15 October 2008. (S//'l'K//REL) What has been declassified is the "fact of" the NRO operating MGSs at the following locations: a. Aerospace Data Facility (ADF)--Colorado (ADF-C), located on Buckley Air Force Base, Colorado • On October 15, 2008, TEXT Becomes UNCLASSIFIED • • On October 15, 2008, TEX't Becames UNCI·aSSJ:I'J:BD b. ADF-East (ADF-E ), located on Fort Belvoir, Virginia c. ADF-Southwest (ADF-SW), located at White Sands, New Mexico (SI/~R/fREL ) Also declassified is the -fact of U the NRO having a presence at: a.
    [Show full text]
  • New Ukusa Agree 10May55.Pdf
    ••• 1 / ! i -"----·-·-· TOP SECRET LSIB/J.U/55. lOih l~~ 1955~ caw No. • •• •lt . .... TO Tffii: UKUS.A. AGREEMKNT (TIIIIID EDITION) Please aO.d the follo·.ving liote ai'ter ;iaragre.ph 16 of tbe I · L~troduction to the UKUSA A?pendices (dated 1st June 1951): 1'0n 1st ldBy 1955 USCIE and ~IB agreed th.at a. general revision o£ the .A:~pendices 'Vo.A required. They furtner ag!"eed th.at. as a l"irzt steiJ tO\':B....rC such revision USCIB II ..,ould furnish LSIB, for cowment, detailed proposals v.:1ich are being -prepared by USCJ3. P~ndir,g agreement by both partie'5 on a general revision of the .A:ppendiccs, the Directon;, NSll. a.'ld GCHQ will: (a) determine ,jointly uny changes ·,\'11ich ~ be requi:rec_ in Appendices C, D, E, F, K, L,. and JI. and (b) implement. any suc:i c!'la!lgOS w'nicb they agn~ to be necessary. Although this interim auL.orization enables the Directors, rIBA a.r,d GCHQ, to change or interpret S"f>eCified A1Cpendices by !JlU~.l agreement, it does r.ot require USCIB O'r ISIB to appr"JYe such chP...nge:; o:r: interpret~ tions ?roviiled thcP.c- an: <:titoin tlt" spirit and intt:nt of curren'.;; liKUSA policy. IC ~/.I ~\··· Secretary, Sigint Board. eclassitied and approved for release by NSA on 04-08-2010 pursuant to E .0. 12958, as mended. ST5683LI TOP SECR.E'f , • '=' OGA" ... TOP SECRET EO L .. 4. (·d.)°. TO BE HANDLED IN ACCORDANCE WITH IRSIG .... ... ... ··-.. - .. ,__ ... --.... .,_ ''• ·-----Re'f•· TOP SECRET EmR.
    [Show full text]
  • INDEPENDENT and PEACEFUL AUSTRALIA NETWORK (IPAN) Oct 2016
    Quaker Peace & Legislation Committee WATCHING BRIEF WB 16-8: INDEPENDENT AND PEACEFUL AUSTRALIA NETWORK (IPAN) Oct 2016 As Quakers we seek a world without war. We seek a sustainable and just community. We have a vision of an Australia that upholds human rights and builds peace internationally, with particular focus on our region. In our approach to government we will promote the importance of dialogue, of listening and of seeking that of God in every person. We aim to work for justice and to take away the occasion for war. This Brief provides a summary of IPAN’s aims and activities. Quakers are affiliated to IPAN through QPLC. Recently IPAN held its annual meeting in Alice Springs NT in conjunction with a protest gathering at Pine Gap Base to mark its 50th anniversary. Background IPAN has emerged from the wider peace movement and, according to its website – www.ipan.org.au – is “a network of organisations from all regions of Australia who are united by our support for an independent Australian foreign policy based on peaceful resolution of conflict”. At its first AGM, held in July 2015 and attended by 40 groups, a Brisbane Declaration affirmed: Australia urgently needs an independent foreign policy that de-escalates regional tensions. Australia’s alliance with the USA should be re-assessed in view of US adventurism and drawing Australia into its strategic plans. The US ‘pivot’ to Asia/Pacific increases the likelihood of war. The Australian Government unfettered level of military spending is to be deplored. We will build links with peace movements in our region.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • Ufos Real? to Roswell, New Mexico, and Attended a Conference Explore Eyewitness Accounts, Examine the Put on by the Mutual UFO Network
    HALLS KELLY MILNER HALLS is a full- time author with a passion for unearthing unusual facts about the creatures and the world around her. She loves to dig up the details by interviewing experts and discovering the most up-to-date research on her subjects. In her research for this book, she traveled Are aliens and UFOs real? to Roswell, New Mexico, and attended a conference Explore eyewitness accounts, examine the put on by the Mutual UFO Network. Her previous evidence, and decide for yourself. books include Tales of the Cryptids: Mysterious Creatures That May or May Not Exist, Mysteries of the Mummy Kids, Saving the Baghdad Zoo, and In Search of Sasquatch. Halls lives with her two daughters in Spokane, Washington. You can find out more about IMAGINE . INVESTIGATION her and her books at www.kellymilnerhalls.com. you’re in the woods after dark. Eerie green lights appear in the distance. Then there’s a sudden flash and everything is dark again. You decide to take a closer look. You come upon a saucer-shaped craft hovering silently just above the ground. You reach out to touch it, but the object suddenly shoots up into the sky. Have you just seen a UFO? Some people say they have had experiences like “Through her outstanding research O phenomena and her clear and on UF this. Are they telling the truth? To find out, Kelly understandable writing style, Kelly Milner Milner Halls investigated stories of eyewitnesses Halls has skillfully revealed the detailsO ofs.” from around the world. She explored UFO sightings, some of the most famous and important UFO cases in the world.
    [Show full text]
  • Nursing in Japanese American Incarceration Camps, 1942-1945
    Nursing in Japanese American Incarceration Camps, 1942-1945 Rebecca Ann Coffin Staunton, Virginia BSN, Georgetown University, 1989 MSN, St. Joseph’s College of Maine, 2008 A Dissertation presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Doctor of Philosophy Department of Nursing University of Virginia May, 2016 © Copyright by Rebecca A. Coffin All Rights Reserved May 2016 i Abstract Japanese Americans living in west coast states had been a marginalized group long before the attack against Pearl Harbor, Hawaii on December 7, 1941 by the Empire of Japan, which accelerated the maelstrom of hysteria and hatred against them. As a result, President Franklin Delano Roosevelt issued Executive Order 9066, authorizing Secretary of War Stimson and designated military commanders to prescribe military areas from which any or all persons could be excluded. United States military leaders identified all Japanese Americans in the western portions of Washington, Oregon, and California as potential subversive persons that might rise up and sabotage the United States from within its borders. Over 110,000 Japanese Americans were forcibly removed from their homes and transported to one of ten incarceration camps until their loyalty to the United States could be determined. Roosevelt’s Executive Order 9102 established the War Relocation Authority on March 18, 1942. This civilian agency provided for the shelter, nutrition, education, and medical care of the excluded Japanese Americans as they waited to be redistributed within the interior and eastern United States. Previous literature describing the medical care furnished to the Japanese Americans in the camps concentrated on early system problems related to supplies and sanitation efforts.
    [Show full text]
  • List of Reported UFO Sightings
    List of reported UFO sightings This is a partial list by date of sightings of alleged unidentified flying objects (UFOs), including reports of close encounters and abductions. Contents Second millennium BCE Classical antiquity 16th–17th centuries 19th century 20th century 1901–1949 1950–1974 1975–2000 21st century By location See also Notes and references Second millennium BCE City, Date Name Country Description Sources State According to the disputed Tulli Papyrus, the scribes of the pharaoh Fiery Lower Ancient Thutmose III reported that "fiery disks" were encountered floating over ca. 1440 BCE [2][3] disks Egypt Egypt the skies. The Condon Committee disputed the legitimacy of the Tulli Papyrus stating, "Tulli was taken in and that the papyrus is a fake."[1] Classical antiquity City, Date Name Country Description Sources State Livy's Ab Livy records a number of portents in the winter of this year, including ships in Rome, Roman Urbe 218 BCE navium speciem de caelo adfulsisse ("phantom ships had been seen the sky Italia Republic Condita gleaming in the sky"). Libri[4][5] spark According to Pliny the Elder, a spark fell from a star and grew as it from a Roman 76 BCE unknown descended until it appeared to be the size of the Moon. It then ascended [6][5] falling Republic back up to the heavens and was transformed into a light. star According to Plutarch, a Roman army commanded by Lucullus was about flame- to begin a battle with Mithridates VI of Pontus when "all on a sudden, the like Phrygia, Roman sky burst asunder, and a huge, flame-like body was seen to fall between 74 BCE pithoi [7][5] Asia Republic the two armies.
    [Show full text]
  • Policies for an Equitable and Inclusive Los Angeles Authors
    September 2020 No Going Back POLICIES FOR AN EQUITABLE AND INCLUSIVE LOS ANGELES AUTHORS: 1 Contents Foreword ................................................................................... 3 Land Acknowledgement .......................................................... 8 Acknowledgements ................................................................. 9 Executive Summary ............................................................... 11 Context: Los Angeles and the State Budget ........................ 16 Framing Principle: Infusing Equity into all Policies ............. 19 Policy Section 1: Economic Stress ......................................... 20 Policy Section 2: Black Life in Los Angeles .......................... 39 Policy Section 3: Housing Affordability ................................ 52 Policy Section 4: Homelessness ........................................... 65 Policy Section 5: Healthcare Access .................................... 78 Policy Section 6: Healthcare Interventions ........................86 Policy Section 7: Internet as a Right .................................... 95 Policy Section 8: Education ................................................ 103 Policy Section 9: Child and Family Well-Being .................. 113 Policy Section 10: Mental Health ........................................ 123 Policy Section 11: Youth ....................................................... 133 Policy Section 12: Immigrants .............................................148 Policy Section 13: Alternatives to Incarceration ..............
    [Show full text]
  • A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985
    Description of document: A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985 Requested date: 15-June-2009 Released date: 03-February-2010 Posted date: 15-February-2010 Source of document: National Security Agency Attn: FOIA/PA Office (DJP4) 9800 Savage Road, Suite 6248 Ft. George G. Meade, MD 20755-6248 Fax: 443-479-3612 Online form: Here The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. A REFERENCE GUIDE TO SELECTED HISTORICAL DOCUMENTS RELATING TO THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1931-1985 (U) SOURCE DOCUMENTS IN Compiled by: CRYPTOLOGIC HISTORY Gerald K.
    [Show full text]