Attitudes Toward "The Japanese in Our Midst"

Total Page:16

File Type:pdf, Size:1020Kb

Attitudes Toward HIll . I ... .. ,. ... .;;....... ..-.". ,;\) .'. .. .. ... ..,.." .. .......". ...... )'..;..."... ..." .,. ' .. .'.." (....... ." . ...,. ... ... .. .' ' ...,. ......... .; . ... .-;..: ... .. ........;....... ... ......' ....;. .g, .. ..... .......... ".--.'" .." .." .. ... .."'",. #." . ..... .. .. NT.ENTS Page Suml t . .-.. .. 0 . .. .. Ii " . .. V' .. 1; ,, .. .. Ii . .. " 'I 0 Part I ra the J )Janese in. l'his Country Lo;'a1 pJ!ericans? ........ vlar-'l' ime Opinion .. to 0; 1) 0' q- Q , . (J " 6 .& , (I 12 e; .. 0 0 00 .. ., !J to Loyal or Disloyal .& CI .. II Q .. Co -= 0 Q co ." It c. '" " 0 . .. Go.; . 0 Group Opinions on Issei and Nisei Loyalty . Q', .. Citizenship for Issei? .. It Q f' Q' 05.0 G. () I). oJ.' -0"." Canadian Opinion It . .I f' () '" 3 .. :J '" 0 t '" . iJ . 0 " 0' to :. o . e Part II anes 'Ihis Count Guilty of S"'ying.. Sabotag Were the Japanese Saboteurs . " It.0 0. .- 0 It .. (\ '; 0. -e .. -I '" Q" . 9' & . Were the Japanese Spies? 0 a & . 0 Q . Q What the Experts Say . tW .. .. do Cc . a -I () 0: I, . I/ Gl' OUp Comparisons . s)01 ci 0 0 . c 0)tt 0: . fi . What tile People Say, 00" .. f . 0 . ti . " . 0 . ,; . Related Attitudes (1 . OJio 0 2. 0: t , Ii $' 0 0 . 00 . .. .. - tI If 0. .. " . of I) " Do People Think Consistently? Part III obs and Futures for Japanese Minority ;,;,...-o.;ilf. All Japanese I' ".; "' ... 0. 0. 0-.. .8' ti "".... a. 0- ;. 8' to .:.. ,, ... e Jobs for Nisei and Issei? .. 0 G -0 " .. ti II ft .; , 0- 0 .; ,. 4 . :. .: . .. ii , What the People Say b'; .... .. Nisei .(I".:t....c.o.o'. ..O.' 0.. ir;.",...... o. 4'." . b'o""."..tI.. Iase i 8'1 ..e."'9"O.O"01) 0-.. .9' 'I.. fl.,,, Job Oppottunities for Negroes .1/ , 0 . " -' ., " 0 Nisei and Issei APpraise Their Job Chances Specific Employment Issues 0: . 0 . Ii * . , . f . ., ;) . i " If . .. 0- " Return to the Pac1ficCoast Go.. Q" .. ;, . .. 0 Editorial Comment How 1s a Public Opinion Survey Made? List. of Publicat.ione --' UMMA THE PROBlEM... How do people in the United States appraise the loyalty of the men and women of Japanese birth or Japanese ancestry living in this country? What are the attitudes of the public toward granting citizenship to non- citizens of Japanese birth? What does the future hold for the Japanese in the Uni tad States? TH ANS1\iE IN ONE SENTENCE... Even though the war is over and NORC surveys on the people living in Japan have demonstrated less American antagonism toward the former enemy people. substantial minorities question the loyalty of the people of that race who live in America , a jority believe they spied during the war ) and attitudes of the PUblic suggest a difficult future for Japanese in this country) since a con- siderable feeling ex:!sts that Caucasians should have first chance at all jobs. ORE SPECIFICALLY... The NORC survey results show that: 50% of the people of the United States think the AVERAGE person of Japanese nativity or ancestry living in this country is loyal to the AmerlctJ. government ... wlth half that ma ny 25% -- answering "Disloyal" - Al"ID - 43% believe that the AVEiAGE Japanese alien living in this country should be allowed to become a citizen YET.. 31% of the American public mistaken believe that Japan- ese living in the United states during the war des troyed var materials - AND - 66% believe that Japanese living in this country spied f the Japanese government during the war. MOREOVER. 40% of the publiq would deny an equal chance for jobs in the United States to people of Japanese ancestry who are American citizen - AND - 89% would den;y employment equaJi ty to people of Japanese birth who are not American citizens. - 2 - -- ._- ..,.._._-_..__._ .__. .-. ,_ , _. **************************,--'_.'.-- -"' -'-- ""--'--' -- -- FOR YOUR INFORHATION... Both the Office of War Informtion and the Federal Bureau of Investigation have gone on record that not one single person of Japan,ese ancestry whether alien or citizen living in the United states or Rawaii was con- victed of either spying or sabotage during the wars Of the l27, 000 persons of Japanese birth or ancestry now living in the United States, roughly two-thirds are American c1 tizens almost all of whom are under 40 years of age; the remainder are aliens most of whom have been in the United States since 1924 , when the Exclusion Act went in- to effect. The population includes about 19, 000 citizen men between the ages of 18 and 37. These men who were not already in uniform were eligible for military service by the War Department on January 28, 1943. Evacuat ion of persons of Japanese birth or ancestry began following the President' executive order . issued February 19, 1942 authorizing the Secretary of War or military commnders to designate military areas and to exclude any or all persons from such areas. Ten relocation centers were set up 1.Tlder the supervision of the War Relocation Authority. From April until August, 1942 approximately 107, 000 Nisei and Issei were moved from their former residences in the Pacific Coast areas to the relocation cen- ters. The evacuated area inc luded the entire state of California , the wes- tern half of Washington and Oregon, and the southern third of Arizona. Early in 1942, however the need for manpower resulted in demands to re- lease evacuees for work. In July, 1942 , the War Relocation Authority per- mitted qualified American citizens Nisei to leave the centers to accept jobs. On October 1 , 1942, this policy was applied to aliens Issei as well. Later, indefinite leaves were granted. In December, 1942 permission to take up residence elsewhere was then granted both Nisei and lsse i, if they could meet certa in requirements set up QY the WRA. Arch, 1943, thousands had had their applications to leave approved, and the return o these persons to other residences was well begun. Several years ago the Colorado Council of Churches pUblish- ed an excellent factual pamphlet entitled The Ja;panese in Our Hidst NORC likes the title sowell that it seemed fitting to use it as part of the title of the present re- port which show information and attitudes as related to facts. - 3 - , " ':' ' ~~~~, -~~~ ~~~~~ :: ). Part I ARE 'PIlE JAPANESE: IN THIS COUNTRY LOYAL AMERICANS;" During the w,ar , ruors and misinf6r.ation sharpened attitudes of distrust and suspicion toward people of Japanese birth or ancestl living within the borders of the United States. The status of pUblic sentiment both be- fore and after V-J Day is indicated by results of NORC questions regard- ing the loyalty of Nisei and Issei residents. Nlse!, born in the United States are American citizens of Japanese ancestry. Issei" born in Japan, cannot, according to present la.Ts become American citizens. Before the end of the war about half the public were reasona bly sure of the loyalty of .A.merican citizens of J'apanese ancestry. The following year r". about the same proporti on of people judged the Issei or Nisei to be loyal to the United States. WAR -TIME OPINION In April 1945 -- before either V-E or V-J ray became a reality, an NORC question found that onJ.y 53% of the J!.merican publie believed that mos Japanese -Americans would NOT try to do sometM.ng against the United States if they had an op:portUl1i ty . The quest ion was asked in terms of Ni se j only: II or all the Javanese WHO ARE AMERICAN CTTIZENS about how many do you think would try to do some- th ing aga ins the Un ted States if "bhe y had a chance?11 Practically none of them 19% few of them 53% About half of them Most of them Practically all of them Don f t know 100% I0YAL OR DISIOY:AL? In 1946, with the war over only half the public considered the average Japanese living in this country loyal but the more recent question in eluded both Issei and Nisei: Do yo u, th in the AVERAGE Japanese person who 1 iues in th country is loya.l or disloyal? Loya 1 Disloyal fk!IK32t. r-- Don t know 25% o07b L, When only those persons with definite opinions were considered, NORC found 67% judging the rp,B. Japanese living in this country loyal and 33% judging him disloyal. - 4 - ~~~ ~~~~~~~~~ ~~~.~~~ ~~~~~~~~';~~~~". "'. ;':::'-"- ''\ \._~~~-_.~~~~~~~~~~~~~~~~~~~~~~~~~~,,'\.." '''" .. - ~~~~"""~~~~~~. ""\,,::"\. ~~~ ~~~..",\:':''~~~..\:' ,,,:'::: :.j':': , :::::;:?;::::/:,:,,:;;,;~~~;!::()":'.;';::..':.:. ,.:!' :'::":.,.;..,.,.',",;\:;,:;;", !;:""j:;;'(';(::~~~;;---::?::"""??::=:,%--:.::;! :::: GROUP OPINIONS ON ISSEI AND NISEI IDYALTY On the recent survey, NORC found education the factor responsible for tL0 great.est differences of opinion. Alr..ost twice as J1n,y of the college-edu cated as of pers9ns having no more than an eighth grade education answered Loyal. n Also a smaller percentage of those in the upper education group If Even when the " replied "a: don ' t knmr. fun ' t know tr responses are removed, a significantly higher proportion of the college-'educated are founcl reply- ing that the average Japanese living in this c;ountr;r is Ivyal. Paralleling differences in opinion amor the educational groups are differences among the standard-of-livbg groups and among people of various occupations. :Persons in the younger age group were m.ore like l r to say' " Loyal" than were those in the 40-and-over group. 'mere were only slight variations of opin- ion between Democrats and Republ1cans, but Greater difforences appe1:red between those who voted and those wbo did not vote. Some of the moat interesting compe,risons are shovl'n in the chart below: rIC' lOYAL DISlO J i ALL THOSE 1 NTERV I EWED 7D \S: /25("-i:.FJ:;:;i: C' 25% ATTENDEDCOLLEGE 3%: t;, R:' L/;; ATTENDED Hf H SCHOOL :577b ;:1 :i; iiii ' gi: ::;J: t! EIGHTH . GRADE OR LESS :Jl%, t:,:.:: w::(+ml 32 MlOWEST ij NEW ENGLAND AND MIDDLE r;: ;if mAN'" STATS o; WEST f,,\ 501 ;"ii' 'i;;;; ;;!.r PAC'" C COAST STATS ONL Y c 4IW ";:;;?i!;) ii:M;;; i:r: 18% SOUTH ' , 41% Jl' tHi! ''-L .i.
Recommended publications
  • Tsetusuo Wakabayashi, Revealed
    Tsetusuo Wakabayashi, Revealed By Dwight R. Rider Edited by Eric DeLaBarre Preface Most great works of art begin with an objective in mind; this is not one of them. What follows in the pages below had its genesis in a research effort to determine what, if anything the Japanese General Staff knew of the Manhattan Project and the threat of atomic weapons, in the years before the detonation of an atomic bomb over Hiroshima in August 1945. That project drew out of an intense research effort into Japan’s weapons of mass destruction programs stretching back more than two decades; a project that remains on-going. Unlike a work of art, this paper is actually the result of an epiphany; a sudden realization that allows a problem, in this case the Japanese atomic energy and weapons program of World War II, to be understood from a different perspective. There is nothing in this paper that is not readily accessible to the general public; no access to secret documents, unreported interviews or hidden diaries only recently discovered. The information used in this paper has been, for the most part, available to researchers for nearly 30 years but only rarely reviewed. The paper that follows is simply a narrative of a realization drawn from intense research into the subject. The discoveries revealed herein are the consequence of a closer reading of that information. Other papers will follow. In October of 1946, a young journalist only recently discharged from the US Army in the drawdown following World War II, wrote an article for the Atlanta Constitution, the premier newspaper of the American south.
    [Show full text]
  • Linguistic Mimicry Steganography
    Linguistic Mimicry Steganography A practical implementation and its applications EMIL BERGNER Bachelor of Science Thesis Stockholm, Sweden 2010 Linguistic Mimicry Steganography A practical implementation and its applications EMIL BERGNER Bachelor’s Thesis in Computer Science (15 ECTS credits) at the School of Computer Science and Engineering Royal Institute of Technology year 2010 Supervisor at CSC was Johan Boye Examiner was Mads Dam URL: www.csc.kth.se/utbildning/kandidatexjobb/datateknik/2010/ bergner_emil_K10059.pdf Royal Institute of Technology School of Computer Science and Communication KTH CSC SE-100 44 Stockholm, Sweden URL: www.kth.se/csc ABSTRACT Steganography is the art and science of hiding a message in something ordinary, something that will appear innocuous to an observer. When stegongraphy, as opposed to cryptography, is used, the idea is to hide the fact that something is indeed hidden. This paper examines a particular approach to steganography, linguistic steganography, which means embedding hidden messages in texts. The report starts by giving a background of the state of the current research in linguistic steganography. One technique that is described in the background section is statistical mimicry. Statistical mimicry is a method for mimicking texts and using a clever technique it is possible to embed hidden messages in them. The main contribution of this paper is providing a practical implementation of a statistical mimicry solution and evaluating the suitability of different kinds of cover texts for mimicking.
    [Show full text]
  • Decrypted Secrets
    Decrypted Secrets Methods and Maxims of Cryptology Bearbeitet von Friedrich L Bauer Neuausgabe 2006. Buch. xiv, 525 S. Hardcover ISBN 978 3 540 24502 5 Format (B x L): 15,5 x 23,5 cm Gewicht: 992 g Weitere Fachgebiete > EDV, Informatik > Datenbanken, Informationssicherheit, Geschäftssoftware > Informations- und Kodierungstheorie Zu Inhaltsverzeichnis schnell und portofrei erhältlich bei Die Online-Fachbuchhandlung beck-shop.de ist spezialisiert auf Fachbücher, insbesondere Recht, Steuern und Wirtschaft. Im Sortiment finden Sie alle Medien (Bücher, Zeitschriften, CDs, eBooks, etc.) aller Verlage. Ergänzt wird das Programm durch Services wie Neuerscheinungsdienst oder Zusammenstellungen von Büchern zu Sonderpreisen. Der Shop führt mehr als 8 Millionen Produkte. 1 Introductory Synopsis En cryptographie, aucune r`egle n’est absolue. [In cryptography, no rule is absolute.] Etienne´ Bazeries (1901) 1.1 Cryptography and Steganography We must distinguish between cryptography (Greek kryptos, hidden) and steganography (Greek steganos, covered). The term cryptographia, to mean secrecy in writing, was used in 1641 by John Wilkins, a founder with John Wallis of the Royal Society in London; the word ‘cryptography’ was coined in 1658 by Thomas Browne, a famous English physician and writer. It is the aim of cryptography to render a message incomprehensible to an un- authorized reader: ars occulte scribendi. One speaks of overt secret writing: overt in the sense of being obviously recognizable as secret writing. The term steganographia was also used in this sense by Caspar Schott, a pupil of Athanasius Kircher, in the title of his book Schola steganographia, published in Nuremberg in 1665; however, it had already been used by Trithemius in his first (and amply obscure) work Steganographia, which he began writing in 1499, to mean ‘hidden writing’.
    [Show full text]
  • Espionage Against America from AFIO's the INTELLIGENCER
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com, E-mail: [email protected] Volume 23 • Number 1 • $15 single copy price Summer 2017 ©2017, AFIO Foreign intelligence collectors seek US classified information and technology, especially those with military applications. However, today anything of GUIDE TO THE STUDY OF INTELLigENCE value is a highly prized target for economic espionage, including proprietary information, trade secrets, and R&D data. Prime private sector targets are indus- tries in the information technology, manufacturing, Espionage Against America financial, and pharmaceutical fields. But consumer companies, biological, and medical institutions, and the service sector are increasingly targeted. by David Major and Peter C. Oleson Russia, Cuba, and the People’s Republic of China (PRC), are – and have been – the most aggressive in At the beginning of the 20th century, the United targeting US national security information. Since the States transcended from being an isolated nation Economic Espionage Law of 1996 was passed, 85% of separated by vast oceans and disengaged in world all the economic espionage cases resulting in crimi- events, to becoming a prime espionage target for nal charges have involved spies from Asian countries military, political, intelligence, and economic including the PRC, Taiwan, South Korea, and India, information. with the PRC being the most active. The number one country behind the illegal export of restricted tech- America: The Target nology is Iran, with the PRC the next largest diverter of technology.4 merica’s pivotal role in World War I altered its position in the international arena.
    [Show full text]
  • 2017 Released Items Grade 6 English Language Arts/Literacy Research
    Partnership for Assessment of Readiness for College and Careers Grade 6 English Language Arts/Literacy Research Simulation Task 2017 Released Items English Language Arts/Literacy 2017 Released Items: Grade 6 Research Simulation Task The Research Simulation Task requires students to analyze an informational topic through several articles or multimedia stimuli. Students read and respond to a series of questions and synthesize information from multiple sources in order to write an analytic essay. The 2017 blueprint for PARCC’s grade 6 Research Simulation Task includes Evidence-Based Selected Response/Technology-Enhanced Constructed Response items as well as one Prose Constructed Response prompt. Included in this document: • Answer key and standards alignment • PDFs of each item with the associated text(s) Additional related materials not included in this document: • Sample scored student responses with practice papers • PARCC Scoring Rubric for Prose Constructed Response Items • Guide to English Language Arts/Literacy Released Items: Understanding Scoring 2016 • PARCC English Language Arts/Literacy Assessment: General Scoring Rules for the 2016 Summative Assessment English Language Arts/Literacy PARCC Release Items Answer and Alignment Document ELA/Literacy: Grade 6 Text Type: RST Passage(s): from Navajo Code Talkers / "American Indians in the United States Army" / "What's So Special About Secret Codes?" from Destroy After Reading: The World of Secret Codes Item Code Answer(s) Standards/Evidence Statement Alignment 3872_A Item Type: EBSR
    [Show full text]
  • Separation of Church and Politics?
    Vol. XXVII, Issue 11 March 24, 2006 NN ee ww ss Separation of Church and Politics? By Mark Bannick “Whatever happened to the separation of church Consisting mostly of evangelicals and the orthodox, like Karl Rove, have, since the 1970s, observed the and state?” this conservative bloc could not live with the nec- successes of grassroots politicking among Christian “It’s hanging in there, but I’m afraid the constitu- essary conditions of social thought; that is, they Right. Combined with the soft-money campaign tion doesn’t say anything about the separation of could not differentiate between how one ought to donations by the wealthy business class and the get- church and politics.” act and believe in public, with how one ought to do out-the-vote drive of his political base, George W. “You saying that’s a good thing?” so in private. For them, there was no demarca- Bush had many campaign promises to fulfill in his “I’m saying that’s the way it is: always has been.” tion—the private was public. Even Jimmy Carter, slight victory (loss?) over Al Gore in 2000. “You think a voter really needs to know if I go to an evangelical himself, was renounced by these As it was more important for the President church?” groups for his support of Roe v. Wade (1973). to first achieve his tax-cuts, followed by preemp- “I don’t need to know but then I’m not going to After these beginnings, the Christian Right tively waging a war, he continued to campaign to vote for you anyway.
    [Show full text]
  • Junior Paper Building: Team 1 Room: Junior Paper
    Junior Paper Building: Team 1 Room: Junior Paper Time Entry # Affiliate Title Students Teacher School 8:00 am 10001 Dmitri Polyakov: The Double Agent Brayden Beckering Scott Ross Avail Academy 8:01 am 10002 Fake News How Upton Sinclair Used Fiction and Madeline Fields Huy Nguyen Sunrise Park Middle School Fact to Create Reform 8:02 am 10003 Sputnik: Paving the Way for the Space Race Andrew Gravink Heidi Pitzenberger Kenwood Trail Middle School 8:03 am 10004 Communication in WWI: Cher Ami Saves the Lost Isaiah Miles Scott Ross Avail Academy Battalion 8:04 am 10005 Operation Little Vittles: One Pilot’s Efforts to Bring Anno Will-Anders Rachael Schlee Twin Cities German Immersion Hope to the Children During the Berlin Blockade School 8:05 am 10006 Carrier Pigeons in WWI Carrick Mick Kristen Mast Avail Academy 8:06 am 10007 Operation Anthropoid: The Cost of Communication Luke Marsalek Alex Rome Carondelet Catholic School 8:07 am 10008 The Code Girls of WWII: The American Women Maely Hall Kristen Mast Avail Academy Who Secretly Broke the Axis Communication Codes 8:08 am 10009 Telegraph During the American Civil War: How the Grace Hendrickson Alex Rome Carondelet Catholic School Application of the Device in this War was Revolutionary 8:09 am 10010 The Navajo Code Talkers; How Their Story Affected Lene Jones Catie Jacobs Twin Cities German Immersion One of The Bloodiest Wars in History School 8:10 am 10011 1946 St Paul Teachers’ Strike: How Teachers Mara Booth Matthew Weyers Byron Middle School Communicated the Need For Better Schools 8:11 am
    [Show full text]
  • Steganography
    10/29/2007 Steganography Steganography Dr.Talal Alkharobi 2 Alice and Bob In 1984, Gustavus Simmons illustrated what is now widely known as the prisoners’ problem: Two accomplices in a crime, Alice and Bob, are arrested in separate cells. They want to coordinate an escape plan, but their only means of communication is by way of messages conveyed for them by Wendy the warden. Should Alice and Bob try to exchange messages that are not completely open to Wendy, or ones that seem suspicious to her, they will be put into a high security prison 1 Dr.Talal Alkharobi 10/29/2007 Steganography 3 Alice and Bob Simmons’ solution to the prisoners’ problem is phrased in an interesting way: Alice and Bob “will have to deceive the warden by finding a way of communicating secretly in the exchanges, i.e., of establishing a ‘subliminal channel’ between them in full view of the warden, even though the messages themselves contain no secret (to the warden) information” In other words, Alice is trying to convey a particular piece of information which is represented as a single datagram. 4 Alice and Bob This datagram is available to both Wendy and Bob—but it contains different information to Wendy than to Bob. Informally speaking, a subliminal channel is one that transmits datagrams that have at least two possible interpretations. Each datagram is intentionally given an obvious interpretation (the cover) that is innocuous to Wendy, and a nonobvious interpretation (the secret) that is suspicious to Wendy, and thus cannot be transmitted in plain sight. The security of the stegosystem usually relies on some assumption of an advantage that Bob has over Wendy, when it comes to the interpretation of the message 2 Dr.Talal Alkharobi 10/29/2007 Steganography 5 Alice and Bob Bob can interpret the message with regard to its secret meaning, while Wendy can only interpret the message as the cover.
    [Show full text]
  • The Center for Cryptologic History Calendar
    CCH 2021 THE CENTER FOR CRYPTOLOGIC HISTORY CALENDAR The Autoscritcher was an attempt by the army during World War II to develop an electronic machine to replace the electromechanical bombe in analyzing communications enciphered on the German ENIGMA machine. The Autoscritcher, while a good concept and despite the use of electronic components, was still slower than the bombe. Winter wonderland along Rockenbach Road, 2016. The road leads from the NSA buildings through Fort Meade. Normally, the road is lined with overflow parking spaces for Agency employees. However, in wintertime, it is one of the few convenient dumping sites for snow from the regular parking lots after heavy storms. JANUARY 2021 Sunday Monday Tuesday Wednesday Thursday Friday Saturday 1 2 Lt. Gen. Gordon Blake, USAF, NSA Office of Policy first became DIRNSA, 1962 mandated use of term “Service Cryptologic Element,” 1980 U.S. Army Intelligence and Security Command (INSCOM) established, 1977 New Year’s Day 3 4 5 6 7 8 9 NARA assigned Record Group Major General Gordon Blake Lieutenant (later Captain) Jerzy Rozycki, a Polish Cipher 457 (now “Records of the named Commander, Air Force Laurance Safford named OIC, Bureau mathematician who National Security Agency”) to Security Service, 1957 Navy Cryptographic Branch, helped break ENIGMA, died in a declassified NSA records, 1977 1924 ship sunk off France, 1942 Louis Tordella, longest serving D/DIR (1958-1974), died, 1996 10 11 12 13 14 15 16 First History Today article on NSA BRUSA Agreement–U.S.-UK General Order No. 9 authorized Daily Page, 2003 COMINT relationships during publication of a new War World War II, 1944 Department Telegraphic Code, 1898 Brigadier General Bernard Ardisana, USAF, NSA’s first Operation DESERT STORM Assistant Deputy Director of began, 1991 Operations, died on active duty, 1978 17 18 19 20 21 22 23 Alfred Vail, co-inventor of the Encoded Zimmermann Telegram National Security Decision Intelligence chiefs of U.S.
    [Show full text]
  • Virtual State 2021: First-Round Postings DO NOT SHARE UNTIL
    2021 Minnesota Virtual State Contest First-Round Results Exhibit, Documentary, Performance, Website Congratulations to our State Finalists, whose entries have advanced to the Final-Round of competition in the Virtual State Contest. No additional information is needed for students to participate in Final-Round, which is currently taking place. How were projects selected to move to the final round? All First-Round teams ranked their top three entries. A project’s rank determines which Final-Round team will view it: ● Third Place Finals Team: Views projects that placed 3rd in the First-Round. Selects their top one entry to “move-up” to the Primary Team. ● Second Place Finals Team: Views projects that placed 2nd in the First-Round. Selects their top two entries to “move-up” to the Primary team ● Primary Finals Team: Views projects that placed 1st in the First-Round, and the three additional entries that “move-up” from Second and Third Place teams. The Primary Team will consider all these projects in ranking their top five entries. The top two entries are eligible to participate in the National Contest. Minnesota’s Final-Round judging process allows us to consider not just those entries that ranked 1st in the First-Round, but also those that ranked 2nd or 3rd in the First-Round of competition. Why? First-Round judging pools can be more or less competitive based on computer-generated schedules. On the average year, approximately 20% of Minnesota entries selected to participate in the National Contest didn’t place 1st in the First-Round! More information on Final-Round is available here.
    [Show full text]
  • Rose Mary Sheldon
    1 The Friedman Collection: An Analytical Guide Rose Mary Sheldon 2 In Memoriam David Atlee Phillips ―It‘s a dirty job, but somebody has to do it.‖ 3 Preface and Grateful Acknowledgements No project of this size could be attempted or completed without the help of many other people. First and foremost I must thank Brian Shaw, President of the George C. Marshall Foundation and Paul B. Barron, Director of the Library and Archives for their permission to publish the collection. The staff of the Library, both past and present, was exceedingly helpful in getting the materials to me, especially JoAnn Hartog and Anne Wells, who arranged to have items delivered to the reading room before the Friedman Room itself was open to researchers. Peggy Dillard, now Director of the Woodrow Wilson Library in Staunton, Virginia, granted me unfettered access to the Friedman Collection and facilitated this publication in many ways. I thank my secretary Deneise Shafer for helping with the data input stage and helping to prepare the manuscript. Judy Rogers edited the final manuscript and the accuracy of the text is due entirely to her. Paul B. Barron, in particular, has understood the importance of getting this guide online and out to the interested public. A printed manuscript would not only have been too long to publish, but also too cumbersome to use, not to mention the time it would have taken to index the work. Now, researchers can simply scan the complete catalogue for topics of interest. We plan to update the work if corrections need to be made or if missing items are found.
    [Show full text]
  • Fall CPG 2020
    Cardinal Publishers Group Fall/Winter 2020 Catalog Also available on Edelweiss: CPG Fall Winter 2020 – 2021 Table of Contents Frontlist Business ............................................................................................................3–5 Religion ....................................................................................................................6 Cooking ............................................................................................................. 7–9 Travel ................................................................................................................10–11 Sports ............................................................................................................. 12–13 Fiction ....................................................................................................................14 Games / History ................................................................................................ 15 Juvenile Nonfiction ...................................................................................16–17 Rescheduled from Spring ..................................................................... 18–19 Backlist Featured Adult Backlist ........................................................................20–23 Adult Backlist ........................................................................................... 24–43 Featured Juvenile Backlist ...........................................................................44 Juvenile Backlist ......................................................................................45–46
    [Show full text]