The Problematic of Privacy in the Namespace

Total Page:16

File Type:pdf, Size:1020Kb

The Problematic of Privacy in the Namespace Michigan Technological University Digital Commons @ Michigan Tech Dissertations, Master's Theses and Master's Dissertations, Master's Theses and Master's Reports - Open Reports 2013 The Problematic of Privacy in the Namespace Randal Sean Harrison Michigan Technological University Follow this and additional works at: https://digitalcommons.mtu.edu/etds Part of the Communication Commons Copyright 2013 Randal Sean Harrison Recommended Citation Harrison, Randal Sean, "The Problematic of Privacy in the Namespace", Dissertation, Michigan Technological University, 2013. https://doi.org/10.37099/mtu.dc.etds/666 Follow this and additional works at: https://digitalcommons.mtu.edu/etds Part of the Communication Commons THE PROBLEMATIC OF PRIVACY IN THE NAMESPACE By Randal Sean Harrison A DISSERTATION Submitted in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY In Rhetoric and Technical Communication MICHIGAN TECHNOLOGICAL UNIVERSITY 2013 © 2013 Randal Sean Harrison This dissertation has been approved in partial fulfillment of the requirements for the Degree of DOCTOR OF PHILOSOPHY in Rhetoric and Technical Communication. Department of Humanities Dissertation Advisor: Dr. Jennifer Daryl Slack Committee Member: Dr. Patty Sotirin Committee Member: Dr. Diane Shoos Committee Member: Dr. Charles Wallace Department Chair: Dr. Ronald Strickland I dedicate this work to my family for loving and supporting me, and for patiently bearing with a course of study that has kept me away from home far longer than I’d wished. I dedicate this also to my wife Shreya, without whose love and support I would have never completed this work. 4 Table of Contents Chapter 1. The Problematic of Privacy ........................................................................ 7 1.1 Privacy in Crisis ................................................................................................. 7 1.2 The Emerging Surveillance Society ................................................................. 11 1.3 Conjunctural Analysis and the Problematic of Privacy .................................... 16 1.4 The Namespace ................................................................................................ 19 1.5 Radical Contextualism and Articulation .......................................................... 21 Chapter 2. A New Public Narrative of Privacy .......................................................... 26 2.1 Privacy in the Popular Media ........................................................................... 26 2.2 Ideology and Common Sense .......................................................................... 27 2.3 Privacy in the News .......................................................................................... 31 2.4 Big Brother as Common Sense State ............................................................... 33 2.5 Privacy in Film ................................................................................................. 46 2.6 Privacy in Video Games ................................................................................... 50 Chapter 3. Privacy and Security in the Surveillance State .......................................... 55 3.1 Societies of Control .......................................................................................... 55 3.2 The Snowden Revelations ................................................................................ 59 3.3 Total Information Awareness .......................................................................... 64 3.4 The Nascent Privacy Problematic .................................................................... 69 3.5 Twenty-first Century Statecraft ....................................................................... 74 Chapter 4. Privacy and Convenience in the Information Economy .......................... 84 4.1 Ambient Findability ......................................................................................... 84 4.2 The Information Economy .............................................................................. 88 4.3 Data Brokerages ............................................................................................... 91 4.4 Social Networking ............................................................................................ 93 4.5 The Californian Ideology ................................................................................. 95 Chapter 5. Rearticulating the Namespace .................................................................. 97 5.1 Hegemonic Crisis ............................................................................................ 97 5.2 Individual Praxis ............................................................................................ 100 5.3 Collective Praxis ............................................................................................. 103 5.4 Expert Praxis .................................................................................................. 104 5.5 War of Position .............................................................................................. 106 5.6 Cultural Studies ............................................................................................. 111 References ................................................................................................................ 114 Appendix A .............................................................................................................. 138 5 Acknowledgments I have been blessed by a community of friends and colleagues at Michigan Technological University. There are too many to name individually, but I count myself blessed to have collaborated with them and shared in their lives. Most important to my success in graduate school has been my excellent committee, Dr. Jennifer Slack, Dr. Patricia Sotirin, Dr. Diane Shoos, and Dr. Charles Wallace. I can’t begin to describe my debt to these four scholars. I am exceedingly grateful for the opportunity to work with them. 6 Abstract In the twenty-first century, the issue of privacy—particularly the privacy of individuals with regard to their personal information and effects—has become highly contested terrain, producing a crisis that affects both national and global social formations. This crisis, or problematic, characterizes a particular historical conjuncture I term the namespace. Using cultural studies and the theory of articulation, I map the emergent ways that the namespace articulates economic, juridical, political, cultural, and technological forces, materials, practices and protocols. The cohesive articulation of the namespace requires that privacy be reframed in ways that make its diminution seem natural and inevitable. In the popular media, privacy is often depicted as the price we pay as citizens and consumers for security and convenience, respectively. This discursive ideological shift supports and underwrites the interests of state and corporate actors who leverage the ubiquitous network of digitally connected devices to engender a new regime of informational surveillance, or dataveillance. The widespread practice of dataveillance represents a strengthening of the hegemonic relations between these actors—each shares an interest in promoting an emerging surveillance society, a burgeoning security politics, and a growing information economy—that further empowers them to capture and store the personal information of citizens/consumers. In characterizing these shifts and the resulting crisis, I also identify points of articulation vulnerable to rearticulation and suggest strategies for transforming the namespace in ways that might empower stronger protections for privacy and related civil rights. 7 Chapter 1. The Problematic of Privacy 1.1 Privacy in Crisis In the 1999 episode “The Short List” of the Emmy Award-winning television show The West Wing, U.S. President Bartlet (Martin Sheen) and his advisors are rethinking their initial choice for a Supreme Court nominee based on their discovery that the nominee does not recognize privacy as a guarantee of the United States Constitution. Deputy Communications Director Sam Seaborn (Rob Lowe) argues the importance of nominating a different judge—one with a stronger belief in privacy rights for citizens, particularly in light of the shifting technological landscape: It’s not just about abortion, it’s about the next twenty to thirty years. The twenties and thirties it was about the role of government. The fifties and sixties it was civil rights. The next two decades are going to be privacy. I’m talking about the internet. I’m talking about cell phones. I’m talking about health records and who’s gay and who’s not. And moreover, in a country born on the will of being free, what could be more fundamental than this? What The West Wing so presciently foregrounded is the degree to which changes to privacy law and policy, economic and cultural structures and practices wrought in and through new technologies would become a central concern, for some the central concern, in an increasingly connected, information-dense, global space of networked computer media—in short, a privacy crisis. As Google’s privacy disclaimer, so unwittingly pregnant-with-meaning, recently put it: “We’re changing our privacy policy. This stuff matters.” Of course, if an anxious concern over the too-easy sacrifice of privacy remains a ubiquitous and familiar theme in our modern social imaginaries1, some concept of the importance of privacy has deep historical roots
Recommended publications
  • Debunking Media Hype
    feb. 27, 2015 LYST THE CATATHE INDEPENDENT STUDENT NEWSPAPER OF COLORADO COLLEGE NEWS 2 Opinion 7 SPORTS 9 LIFE 13 FRIDAY WEEK 2 BLOCK 6 EDWARD WOMEN’S DENVER COMEDIAN LACROSSE TO PERFORM AT VOL. 45 SNOWDEN NO. 16 AND AMERICA GETS TOUGH IVYWILD AND GRITTY IN CATALYSTNEWSPAPER.COM MORE: Page 7 SEASON OPENERS MORE: Illustration by Kyle Kallman. Photo courtesy of CC Athletics. Page 9 Photo courtesy of Adam Cayton-Holland. MORE: Page 13 Famed CC student band, Funkdozer, sits down with Jack Burger to discuss BDSM: their best memories as a band, favorite music, and DEBUNKING upcoming shows. MEDIA HYPE MORE: Page 5 FIFTY SHADES: Page 6 INSIDE: The race for Student Trustee ended 280-289 in favor of James Lonergan. Lonergan will step up to the position of Student Trustee with plans for involvement and open communication in hopes of Photo by Richard Forbes. bettering student relations with the Board of Trustees. Student Divestment Committee appeals to Board of Trustees for endowment ANNA KELLY Staff Writer collects donations from alumni that other tactics. MORE: Page 13 are contingent on the Board’s divest- “We have tried to come at this This morning, the Student Divest- ment by 2016. problem from all angles,” said Ben ment Committee (SDC) will ask the Criswell, a junior student leader for Board of Trustees to reconsider di- subject has been brought to the the SDC. “So now we’re trying to talk vesting from fossil fuels. The group board,This butis not this the time �irst the time SDC isthat bring- the in dollars and cents with this initia- INSIDE: will present their most recent stra- ing a carrot instead of a stick.
    [Show full text]
  • Framing Science for Public Action Leah Sprain University of Colorado Boulder, [email protected]
    Iowa State University Summer Symposium on 2013: Ethical Issues in Science Communication: A Science Communication Theory-Based Approach Jan 1st, 12:00 AM Framing Science for Public Action Leah Sprain University of Colorado Boulder, [email protected] Follow this and additional works at: https://lib.dr.iastate.edu/sciencecommunication Part of the Communication Commons Sprain, Leah (2013). Framing Science for Public Action. Jean Goodwin, Michael F. Dahlstrom, and Susanna Priest (Ed.), Ethical Issues in Science Communication: A Theory-Based Approach. https://doi.org/10.31274/sciencecommunication-180809-49 This Event is brought to you for free and open access by the Conferences and Symposia at Iowa State University Digital Repository. It has been accepted for inclusion in Iowa State University Summer Symposium on Science Communication by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Framing Science for Public Action LEAH SPRAIN Department of Communication University of Colorado Boulder Boulder, CO USA [email protected] ABSTRACT: Framing is widely acknowledged to be central to understanding how language constructs public controversies. This paper draws on framing-for-deliberation and framing-for-difference to develop principles for framing science communication. KEYWORDS: framing, deliberation, science communication, public controversy, framing-for-persuasion, framing-for-deliberation, framing-for-difference 1. INTRODUCTION Framing is widely acknowledged to be central to understanding how language constructs public controversies (Gamson & Modigliani, 1989). Studies in science communication often evaluate how the presentation of an issue can produce changes of opinion (Chong & Druckman, 2007), such as how framing climate change in terms of economic benefits (Leiserowitz, 2006), health concerns (Maibach, Nisbit, Baldwin, Akerlof, & Diao, 2011), or stewardship and religious values (Zia & Todd, 2010) appeal to particular audiences.
    [Show full text]
  • Dipartimento Di Impresa E Management Cattedra Di Strategia
    Dipartimento di Impresa e Management Cattedra di Strategia di Impresa CORPORATE VENTURE CAPITAL ED OPEN INNOVATION: MOTORI PER LA CRESCITA INNOVATIVA AZIENDALE RELATORE Prof. Paolo Boccardelli CANDIDATO Carlo Maria Torregrossa Matricola 681361 CORRELATORE Prof. Luca Pirolo ANNO ACCADEMICO 2017/2018 INDICE INTRODUZIONE ............................................................................................................................. 3 CAPITOLO 1 – CORPORATE VENTURE CAPITAL ................................................................ 4 1.1 - Definizione, numeri e classificazione ...................................................................................... 4 1.2 - Principali tipologie di investimento ......................................................................................... 9 1.3 - Modelli e fasi di corporate venture capital ............................................................................ 11 1.4 - Il concetto di open innovation ............................................................................................... 14 CAPITOLO 2 – L’INVESTIMENTO IN INNOVAZIONE ........................................................ 23 2.1 - Start-up e corporate venturing ............................................................................................... 23 2.2 - Il fenomeno delle start-up nel mondo e in Italia .................................................................... 25 2.3 - Valutazione d’azienda: come valutare grandi imprese e start-up .........................................
    [Show full text]
  • Technopopulism: the Emergence of a Discursive Formation
    tripleC 15(2): 441-458, 2017 http://www.triple-c.at Technopopulism: The Emergence of a Discursive Formation Marco Deseriis Northeastern University, Boston, USA, [email protected], http://neu.academia.edu/MarcoDeseriis Abstract: This article contends that technopopulism is a discursive formation that emerges from the convergence of two preexisting discourses: populism and technolibertarianism. Whereas these discourses are historically distinct the 2008 financial crisis and the 2011 wave of struggles precipitated the political conditions for their intersection. Such convergence produces both tensions and possibilities. On the one hand, technopopulism engenders a radically participatory model of democracy, which is ultimately anti-institutional as citizens cooperate and engage in sophisticated decision-making without the mediation of professional politicians. On the other hand, the more electorally successful technopopulist parties are led by charismatic leaders who synthesize the positions that emerge from the netroots to mobi- lize them against the establishment. These two seemingly contradictory aspects precipitate in two variants of technopopulism: a leaderless-technocratic variant, which is derived from the open source mode of governance and from early experiments of the Global Justice Movement in networked self-government; and a leaderist-populist variant, which is more strictly focused on the electoral competition as an intrinsically hegemonic practice. The article concludes with a reflection on the discursive complementarity of these two variants. Keywords: technopopulism, technolibertarianism, populism, electronic democracy, social media activism, Global Justice Movement, Free and Open Source Software, Podemos, Five Star Movement, Occupy Technopopulism is the belief that the “government of the people, by the people, for the people” (Lincoln 1953 [1863]) is achievable by means of information communica- tions technology.
    [Show full text]
  • Uma Análise Da Espionagem Americana E Do Conflito Privacidade-Segurança
    / UNIVERSIDADE ESTADUAL DA PARAÍBA CAMPUS I – CAMPINA GRANDE CENTRO DE CIÊNCIAS JURÍDICAS CURSO DE BACHARELADO EM DIREITO CHARMÊNIA GOMES DE MELO SOBERANIA E DIREITOS HUMANOS NA ERA DIGITAL: uma análise da espionagem americana e do conflito privacidade-segurança CAMPINA GRANDE – PB 2014 CHARMÊNIA GOMES DE MELO SOBERANIA E DIREITOS HUMANOS NA ERA DIGITAL: uma análise da espionagem americana e o conflito privacidade-segurança Trabalho de Conclusão de Curso apresentado ao Curso de Bacharelado em Direito da Universidade Estadual da Paraíba, em cumprimento à exigência para obtenção do grau de Bacharel em Direito. Orientadora: Ms. Milena Barbosa de Melo CAMPINA GRANDE – PB 2014 SOBERANIA E DIREITOS HUMANOS NA ERA DIGITAL: uma análise da espionagem americana e o conflito privacidade-segurança DE MELO, Charmênia Gomes1 RESUMO Percebendo a era digital em que vivemos, este artigo científico tem como escopo, a partir da análise do programa de espionagem americano, refletir sobre o conflito privacidade-segurança, a fim de que se verifiquem as consequências de tal conflito no que concerne à soberania dos países e aos direitos humanos. Inicialmente traça a compreensão do escândalo de espionagem americana, descrevendo-o e elencando fatos importantes para discussão, além disso, apresenta a legislação norte-americana que serve de sustentáculo à espionagem e mostra um breve comparativo tanto de delatores de espionagem governamental estadunidense, como de presidentes que se destacaram por tal prática. Em seguida, discorre sobre o que seja soberania, caracterizando-a como um elemento do Estado, bem como uma característica de governo e direito dos países. Compreendeu-se o conflito do direito a soberania e liberdade frente ao direito de conservação e defesa, tendo como norte o atual programa de espionagem americano, caracterizado a partir da compreensão de como se desenvolve a ciberespionagem e a espionagem econômica.
    [Show full text]
  • Chapter 1 Chapter 2 Chapter 3
    Notes Chapter 1 1. The various threads of the critical analysis of technology are commonly referred to as “science and technology studies” and include the social shaping of technol- ogy, the social construction of technology, and actor-network theory (see, for example, MacKenzie 1996; MacKenzie and Wajcman 1999; Law and Hassard 1999; Latour 2005; and Bijker, Hughes, and Pinch 1989). Chapter 2 1. Since its inaugural issue, Wired has christened McLuhan as its “patron saint.” Chapter 3 1. The article later appeared in an extended book form with the same title (1998). References in the chapter refer to book pages. 2. Throughout this book emphasis is always in the original, unless specified otherwise. 3. By arguing that the digital discourse constructs individual nodes as irrational, I do not mean that the individual nodes are constructed as decidedly antirational, but simply that they are devoid of system-wide, big-picture, theoretical, and abstract rationality. 4. It is worthwhile to point out the rhetorical tool used here in order to legitimize the idea of chaos. It is reminiscent of a joke about a borrowed kettle evoked by Freud (1963)—and recently retold by Žižek (2005)—to account for the nature of logic in dreams. In the joke, the kettle owner accuses his friend of returning the kettle damaged, an accusation to which the friend replies, “I have never borrowed your kettle; I retuned it to you unbroken; it was already broken when I borrowed it.” In a similar fashion, Kelly suggests flux, chaos, and churn- ing (along with their corollary social effects of instability and unpredictability) should not be opposed to or mitigated for three reasons: this cannot be done (flux in the network economy is inevitable; a transfer of a natural phenomenon into the social realm through network technology), it is better not to do it (flux is benevolent, yielding good results for everyone); and it is dangerous to do it (since it will result in knocking the system out of its self-regulating, natural imbalance).
    [Show full text]
  • Drowning in Data 15 3
    BRENNAN CENTER FOR JUSTICE WHAT THE GOVERNMENT DOES WITH AMERICANS’ DATA Rachel Levinson-Waldman Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at NYU School of Law is a nonpartisan law and policy institute that seeks to improve our systems of democracy and justice. We work to hold our political institutions and laws accountable to the twin American ideals of democracy and equal justice for all. The Center’s work ranges from voting rights to campaign finance reform, from racial justice in criminal law to Constitutional protection in the fight against terrorism. A singular institution — part think tank, part public interest law firm, part advocacy group, part communications hub — the Brennan Center seeks meaningful, measurable change in the systems by which our nation is governed. about the brennan center’s liberty and national security program The Brennan Center’s Liberty and National Security Program works to advance effective national security policies that respect Constitutional values and the rule of law, using innovative policy recommendations, litigation, and public advocacy. The program focuses on government transparency and accountability; domestic counterterrorism policies and their effects on privacy and First Amendment freedoms; detainee policy, including the detention, interrogation, and trial of terrorist suspects; and the need to safeguard our system of checks and balances. about the author Rachel Levinson-Waldman serves as Counsel to the Brennan Center’s Liberty and National Security Program, which seeks to advance effective national security policies that respect constitutional values and the rule of law.
    [Show full text]
  • Constructions and Instrumentalization of the Past: a Comparative Study on Memory Management in the Region
    CBEES State of the Region Report 2020 Constructions and Instrumentalization of the Past A Comparative Study on Memory Management in the Region Published with support from the Foundation for Baltic and East European Studies (Östersjstiftelsen) Constructions and Instrumentalization of the Past A Comparative Study on Memory Management in the Region December 2020 Publisher Centre for Baltic and East European Studies, CBEES, Sdertrn University © CBEES, Sdertrn University and the authors Editor Ninna Mrner Editorial Board Joakim Ekman, Florence Frhlig, David Gaunt, Tora Lane, Per Anders Rudling, Irina Sandomirskaja Layout Lena Fredriksson, Serpentin Media Proofreading Bridget Schaefer, Semantix Print Elanders Sverige AB ISBN 978-91-85139-12-5 4 Contents 7 Preface. A New Annual CBEES Publication, Ulla Manns and Joakim Ekman 9 Introduction. Constructions and Instrumentalization of the Past, David Gaunt and Tora Lane 15 Background. Eastern and Central Europe as a Region of Memory. Some Common Traits, Barbara Trnquist-Plewa ESSAYS 23 Victimhood and Building Identities on Past Suffering, Florence Frhlig 29 Image, Afterimage, Counter-Image: Communist Visuality without Communism, Irina Sandomirskaja 37 The Toxic Memory Politics in the Post-Soviet Caucasus, Thomas de Waal 45 The Flag Revolution. Understanding the Political Symbols of Belarus, Andrej Kotljarchuk 55 Institutes of Trauma Re-production in a Borderland: Poland, Ukraine, and Lithuania, Per Anders Rudling COUNTRY BY COUNTRY 69 Germany. The Multi-Level Governance of Memory as a Policy Field, Jenny Wstenberg 80 Lithuania. Fractured and Contested Memory Regimes, Violeta Davoliūtė 87 Belarus. The Politics of Memory in Belarus: Narratives and Institutions, Aliaksei Lastouski 94 Ukraine. Memory Nodes Loaded with Potential to Mobilize People, Yuliya Yurchuk 106 Czech Republic.
    [Show full text]
  • Con-Scripting the Masses: False Documents and Historical Revisionism in the Americas
    University of Massachusetts Amherst ScholarWorks@UMass Amherst Open Access Dissertations 2-2011 Con-Scripting the Masses: False Documents and Historical Revisionism in the Americas Frans Weiser University of Massachusetts Amherst Follow this and additional works at: https://scholarworks.umass.edu/open_access_dissertations Part of the Comparative Literature Commons Recommended Citation Weiser, Frans, "Con-Scripting the Masses: False Documents and Historical Revisionism in the Americas" (2011). Open Access Dissertations. 347. https://scholarworks.umass.edu/open_access_dissertations/347 This Open Access Dissertation is brought to you for free and open access by ScholarWorks@UMass Amherst. It has been accepted for inclusion in Open Access Dissertations by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. CON-SCRIPTING THE MASSES: FALSE DOCUMENTS AND HISTORICAL REVISIONISM IN THE AMERICAS A Dissertation Presented by FRANS-STEPHEN WEISER Submitted to the Graduate School of the University of Massachusetts Amherst in partial fulfillment Of the requirements for the degree of DOCTOR OF PHILOSOPHY February 2011 Program of Comparative Literature © Copyright 2011 by Frans-Stephen Weiser All Rights Reserved CON-SCRIPTING THE MASSES: FALSE DOCUMENTS AND HISTORICAL REVISIONISM IN THE AMERICAS A Dissertation Presented by FRANS-STEPHEN WEISER Approved as to style and content by: _______________________________________________ David Lenson, Chair _______________________________________________
    [Show full text]
  • Deadlands: Our Fans, Our Friends, and Our Families
    CredCred its its Written & Designed by: Shane Lacy Hensley Additional Material by: John Hopler & Matt Forbeck Editing: Matt Forbeck Layout: Matt Forbeck & Shane Lacy Hensley Front Cover Art: Paolo Parente Back Cover Art: Brian Snoddy Logos: Ron “Voice o’ Death” Spencer & Charles Ryan Graphic Design: Hal Mangold & Charles Ryan Interior Art: Thomas Biondolillo, Mike Chen, Jim Crabtree, Kim DeMulder, Paul Daly, Marcus Falk, Mark Dos Santos, Tom Fowler, James Francis, Darren Friedendahl, Tanner Goldbeck, Norman Lao, Ashe Marler, MUTT Studios, Posse Parente, Matt Roach, Jacob Rosen, Mike Sellers, Kevin Sharpe, Jan Michael Sutton, Matt Tice, George Vasilakos & Loston Wallace Advice & Suggestions: Paul Beakley, Barry Doyle, Keith & Ana Eichenlaub, John & Joyce Goff, Michelle Hensley, Christy Hopler, Jay Kyle, Steven Long, Ashe Marler, Jason Nichols, Charles Ryan, Dave Seay, Matt Tice, Maureen Yates, Dave “Coach” Wilson & John Zinser Special Thanks to: All the folks who supported Deadlands: our fans, our friends, and our families. Pinnacle Entertainment Group, Inc. Deadlands, Weird West, Wasted West, Hell on www.peginc.com Earth, the Deadlands logo, the Pinnacle Starburst, and the Pinnacle logo are Trademarks Dedicated to: of Pinnacle Entertainment Group, Inc. Caden. © 1Pinnacle Entertainment Group, Inc. All Rights Who’s raised a little Hell on Earth of his own. Reserved. ™ Table o’ Contents Chapter Chapter Three: Chapter Five: One: The The Stuff Blowin’ Things Prospector’s Heroes Are All to Hell............... 8 1 Story.................................5 Made Of ................... 2 5 Movement ......................................... 84 A History Lesson ........................7 One: Concept ................................ 25 Tests o’ Will ................................... 86 The Last War .................................. 9 Two: Traits ...................................... 28 Shootin’ Things ......................... 87 The Wasted West ....................
    [Show full text]
  • Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual
    RAND-INITIATED RESEARCH CHILD POLICY This PDF document was made available CIVIL JUSTICE from www.rand.org as a public service of EDUCATION the RAND Corporation. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE Jump down to document6 INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit POPULATION AND AGING research organization providing PUBLIC SAFETY SCIENCE AND TECHNOLOGY objective analysis and effective SUBSTANCE ABUSE solutions that address the challenges TERRORISM AND facing the public and private sectors HOMELAND SECURITY TRANSPORTATION AND around the world. INFRASTRUCTURE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND-Initiated Research View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Out of the Ordinary Finding Hidden Threats by Analyzing Unusual Behavior JOHN HOLLYWOOD, DIANE SNYDER, KENNETH McKAY, JOHN BOON Approved for public release, distribution unlimited This research in the public interest was supported by RAND, using discretionary funds made possible by the generosity of RAND's donors, the fees earned on client-funded research, and independent research and development (IR&D) funds provided by the Department of Defense.
    [Show full text]
  • September 11 Attacks
    Chapter 1 September 11 Attacks We’re a nation that is adjusting to a new type of war. This isn’t a conventional war that we’re waging. Ours is a campaign that will have to reflect the new enemy…. The new war is not only against the evildoers themselves; the new war is against those who harbor them and finance them and feed them…. We will need patience and determination in order to succeed. — President George W. Bush (September 11, 2001) Our company around the world will continue to operate in this sometimes violent world in which we live, offering products that reach to the higher and more positive side of the human equation. — Disney CEO Michael Eisner (September 11, 2001) He risked his life to stop a tyrant, then gave his life trying to help build a better Libya. The world needs more Chris Stevenses. — U.S. Secretary of State Hillary Clinton (September 12, 2012) We cannot have a society in which some dictators someplace can start imposing censorship here in the United States because if somebody is able to intimidate us out of releasing a satirical movie, imagine what they start doing once they see a documentary that they don’t like or news reports that they don’t like. That’s not who we are. That’s not what America is about. — President Barack Obama (December 19, 2014) 1.1 September 11, 2001 I was waking up in the sunny California morning on September 11, 2001. Instead of music playing on my radio alarm clock, I was hearing fragments of news broadcast about airplanes crashing into the Pentagon and the twin towers of the World Trade Center.
    [Show full text]