Issue Networks in Online Debate Over the USA Patriot Act
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
NSA Fact Sheet on Section 215 of the PATRIOT
Section 215 Section 215 of the USA PATRIOT Act of 2001, which amended Title V, Section 501 of the Foreign Intelligence Surveillance Act (FISA), “Access to Certain Business Records for Foreign Intelligence and International Terrorism Investigations” (50 U.S.C. sec. 1861) x This program concerns the collection only of telephone metadata. Under this program, the government does not acquire the content of any communication, the identity of any party to the communication, or any cell-site locational information. x This metadata is stored in repositories within secure networks, must be uniquely marked, and can only be accessed by a limited number of authorized personnel who have received appropriate and adequate training. x This metadata may be queried only when there is a reasonable suspicion, based on specific and articulated facts, that the identifier that will be used as the basis for the query is associated with specific foreign terrorist organizations. x The basis for these queries must be documented in writing in advance. x Fewer than two dozen NSA officials may approve such queries. x The documented basis for these queries is regularly audited by the Department of Justice. x Only seven senior officials may authorize the dissemination of any U.S. person information outside of NSA (e.g. to the FBI) after determining that the information is related to and is necessary to understand counterterrorism information, or assess its importance. x Every 30 days, the government must file with the Foreign Intelligence Surveillance Court a report describing the implementation of the program, to include a discussion of the application of the Reasonable Articulable Suspicion (RAS) standard, the number of approved queries and the number of instances that query results that contain U.S. -
The Hidden Costs of Terrorist Watch Lists
University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2013 The Hidden Costs of Terrorist Watch Lists Anya Bernstein Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Anya Bernstein, "The Hidden Costs of Terrorist Watch Lists," 61 Buffalo Law Review 461 (2013). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. BUFFALO LAW REVIEW VOLUME 61 MAY 2013 NUMBER 3 The Hidden Costs of Terrorist Watch Lists ANYA BERNSTEIN† INTRODUCTION The No Fly List, which is used to block suspected terrorists from flying, has been in use for years. But the government still appears “stymied” by the “relatively straightforward question” of what people who “believe they have been wrongly included on” that list should do.1 In recent months, courts have haltingly started to provide their own answer, giving some individuals standing to sue to remove their names or receive additional process.2 This step is particularly important as the No Fly List continues † Bigelow Fellow and Lecturer in Law, The University of Chicago Law School. J.D., Yale Law School; Ph.D., Anthropology, The University of Chicago. Thanks to Daniel Abebe, Ian Ayres, Alexander Boni-Saenz, Anthony Casey, Anjali Dalal, Nicholas Day, Bernard Harcourt, Aziz Huq, Jerry Mashaw, Jonathan Masur, Nicholas Parrillo, Victoria Schwartz, Lior Strahilevitz, Laura Weinrib, Michael Wishnie, and James Wooten for helpful commentary. -
Public Perceptions of Nigeria Police Monetary Bribery in Awka, Nigeria
Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2021 Public Perceptions of Nigeria Police Monetary Bribery in Awka, Nigeria Benjamin Chukwuka Nnadozie Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Administration Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Benjamin Chukwuka Nnadozie has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Ernesto Escobedo, Committee Chairperson, Public Policy and Administration Faculty Dr. Raj Singh, Committee Member, Public Policy and Administration Faculty Dr. Meena Clowes, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer and Provost Sue Subocz, Ph.D. Walden University 2021 Abstract Public Perceptions of Nigeria Police Monetary Bribery in Awka, Nigeria By Benjamin Chukwuka Nnadozie Dissertation Submitted in Partial Fulfullment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University February 2021 Abstract The Nigerian police are often perceived by the Nigerian public as a very corrupt institution due to reports in the media and direct experiences of police brutality, extortion, injustice, and especially monetary bribery. The refusal to pay monetary bribes to the police has led to loss of lives and a lack of trust in the police. -
The Role of the Media, Law, and National Resolve in the War on Terror
Denver Journal of International Law & Policy Volume 33 Number 1 Winter - 2004 Sutton Colloquium Article 10 April 2020 The Role of the Media, Law, and National Resolve in the War on Terror Robert Hardaway Follow this and additional works at: https://digitalcommons.du.edu/djilp Recommended Citation Robert Hardaway, The Role of the Media, Law, and National Resolve in the War on Terror, 33 Denv. J. Int'l L. & Pol'y 104 (2004). This Article is brought to you for free and open access by Digital Commons @ DU. It has been accepted for inclusion in Denver Journal of International Law & Policy by an authorized editor of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. THE ROLE OF THE MEDIA, LAW, AND NATIONAL RESOLVE IN THE WAR ON TERROR ROBERT HARDAWAY* I. INTRODUCTION In the aftermath of the terrorist attacks of September 11, 2001, the govern- ment of the United States took unprecedented steps to protect American lives and property.' Measures imposed included tightened security at nuclear power plants,2 airports,3 and numerous other government and private installations around the United States.4 Debate over an appropriate U.S. response centered on whether there was proof of a foreign state's complicity in the attacks. On September 15, 2001, a New York Times/CBS News poll revealed that eighty-five percent of Americans would Professor of Law, University of Denver Sturm College of Law. 1. See, e.g., Michael R. Gordon, After the Attacks: An Assessment, U.S. Force vs, Terrorists: From Reactive to Active, N.Y. -
The USA PATRIOT Act: Preserving Life and Liberty (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism)
The Department of Justice's first priority is to prevent future terrorist attacks. Since its passage following the September 11, 2001 attacks, the Patriot Act has played a key part - and often the leading role - in a number of successful operations to protect innocent Americans from the deadly plans of terrorists dedicated to destroying America and our way of life. While the results have been important, in passing the Patriot Act, Congress provided for only modest, incremental changes in the law. Congress simply took existing legal principles and retrofitted them to preserve the lives and liberty of the American people from the challenges posed by a global terrorist network. The USA PATRIOT Act: Preserving Life and Liberty (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism) Congress enacted the Patriot Act by overwhelming, bipartisan margins, arming law enforcement with new tools to detect and prevent terrorism: The USA Patriot Act was passed nearly unanimously by the Senate 98-1, and 357-66 in the House, with the support of members from across the political spectrum. The Act Improves Our Counter-Terrorism Efforts in Several Significant Ways: 1. The Patriot Act allows investigators to use the tools that were already available to investigate organized crime and drug trafficking. Many of the tools the Act provides to law enforcement to fight terrorism have been used for decades to fight organized crime and drug dealers, and have been reviewed and approved by the courts. As Sen. Joe Biden (D-DE) explained during the floor debate about the Act, "the FBI could get a wiretap to investigate the mafia, but they could not get one to investigate terrorists. -
Qualitative Research 1
Qualitative research 1 Dr Raqibat Idris, MBBS, DO, MPH Geneva Foundation for Medical Education and Research 28 November 2017 From Research to Practice: Training Course in Sexual and Reproductive Health Research Geneva Workshop 2017 Overview of presentation This presentation will: • Introduce qualitative research, its advantages, disadvantages and uses • Discuss the various approaches to qualitative design Introduction • Qualitative research is a study done to explain and understand the meaning or experience of a phenomenon or social process and the viewpoints of the affected individuals. • Investigates opinions, feelings and experiences. • Understands and describes social phenomena in their natural occurrence- holistic approach. • Does not test theories but can develop theories. Mason, 2002 Features of qualitative research • Exploratory • Fluid and flexible • Data-driven • Context sensitive • Direct interaction with affected individuals Mason, 2002 Advantages and disadvantages Advantages: • Richer information • Deeper understanding of the phenomenon under study Disadvantages: • Time consuming • Expensive • Less objective • Findings cannot be generalized Mason, 2002 Uses of qualitative studies Exploratory or pilot study: • Precedes a quantitative study to help refine hypothesis • Pilot study to examine the feasibility of a program/ project implementation • Designing survey questionnaires • To improve the reliability, validity and sensibility of new or existing survey instruments in a new population Green, 2013 Uses of qualitative studies To explain quantitative data findings: • Can follow a quantitative research to help provide a deeper understanding of the results. For example, the use of ethnography to explain the social context in which mortality and birth rate data are produced. • Parallel studies in a mixed qualitative and quantitative design to provide greater understanding of a phenomenon under study. -
Tom Eagleton and the "Curse to Our Constitution"
TOM EAGLETON AND THE “CURSE TO OUR CONSTITUTION” By William H. Freivogel Director, School of Journalism, Southern Illinois University Carbondale Associate Professor, Paul Simon Public Policy Institute This paper is scheduled for publication in St. Louis University Law Journal, Volume 52, honoring Sen. Eagleton. Introduction: If my friend Tom Eagleton had lived a few more months, I’m sure he would have been amazed – and amused in a Tom Eagleton sort of way - by the astonishing story of Alberto Gonzales’ late night visit to John Aschroft’s hospital bed in 2004 to persuade the then attorney general to reauthorize a questionable intelligence operation related to the president’s warrantless wiretapping program. No vignette better encapsulates President George W. Bush’s perversion of the rule of law. Not since the Saturday Night Massacre during Watergate has there been a moment when a president’s insistence on having his way resulted in such chaos at the upper reaches of the Justice Department. James Comey, the deputy attorney general and a loyal Republican, told Congress in May, 2007 how he raced to George Washington hospital with sirens blaring to beat Gonzeles to Ashcroft’s room.1 Comey had telephoned FBI Director Robert S. Mueller to ask that he too come to the hospital to back up the Justice Department’s view that the president’s still secret program should not be reauthorized as it then operated.2 Ashcroft, Comey and Mueller held firm in the face of intense pressure from White House counsel Gonzales and Chief of Staff Andrew Card. Before the episode was over, the three were on the verge of tendering their resignations if the White House ignored their objections; the resignations were averted by some last-minute changes in the program – changes still not public.3 Before Eagleton’s death, he and I had talked often about Bush and Ashcroft’s overzealous leadership in the war on terrorism. -
Current Issues in Qualitative Data Analysis Software (QDAS): a User and Developer Perspective
The Qualitative Report Volume 23 Number 13 Article 5 3-6-2018 Current Issues in Qualitative Data Analysis Software (QDAS): A User and Developer Perspective Jeanine C. Evers Erasmus University of Rotterdam, [email protected] Follow this and additional works at: https://nsuworks.nova.edu/tqr Part of the Law Commons, Quantitative, Qualitative, Comparative, and Historical Methodologies Commons, and the Social Statistics Commons Recommended APA Citation Evers, J. C. (2018). Current Issues in Qualitative Data Analysis Software (QDAS): A User and Developer Perspective. The Qualitative Report, 23(13), 61-73. https://doi.org/10.46743/2160-3715/2018.3205 This Article is brought to you for free and open access by the The Qualitative Report at NSUWorks. It has been accepted for inclusion in The Qualitative Report by an authorized administrator of NSUWorks. For more information, please contact [email protected]. Current Issues in Qualitative Data Analysis Software (QDAS): A User and Developer Perspective Abstract This paper describes recent issues and developments in Qualitative Data Analysis Software (QDAS) as presented in the opening plenary at the KWALON 2016 conference. From a user perspective, it reflects current features and functionality, including the use of artificial intelligence and machine learning; implications of the cloud; user friendliness; the role of digital archives; and the development of a common exchange format. This user perspective is complemented with the views of software developers who took part in the “Rotterdam Exchange Format Initiative,” an outcome of the conference. Keywords Qualitative Data Analysis Software, QDAS, Artificial Intelligence, Machine Learning, TLA AS.ti, Cassandre, Dedoose, f4analyse, MAXQDA, NVivo, QDA Miner, Quirkos, Transana, Exchange format, Interoperability, Qualitative Data Analysis, Learning Curve QDAS, Textual Data Mining, Cloud services. -
The Value of CAQDAS for Systematising Literature Reviews
BY DR. CHRISTINA SILVER, [email protected] RESEARCH FELLOW, UNIVERSITY OF SURREY The value of CAQDAS for systematising literature reviews Software designed to facilitate qualitative and mixed methods research is collectively known as CAQDAS Undertaking a literature review is similar to con- (Computer Assisted Qualitative Data AnalysiS). ducting a qualitative data analysis (QDA) in terms Available since the 1980s it provides tools designed of the analytic activities involved (Table 2.). Specific to support a range of analytic activities across disci- analytic requirements should drive the way tools are plines and sectors. Using references from bibliographic used rather than the availability of product features software (e.g. Endnote, Zotero, Mendeley) enables systematic literature reviewing, integrated with data Table 2. analysis. This article outlines some possibilities, high- Analytic activities supported by CAQDAS lighting considerations in planning a literature review for librarians and others. Integration revy revy • Bring together all relevant material into one “workspace” • Quantify qualitative data / qualify quantitative data 01 2016 01 What CAQDAS packages “do”? Organisation The acronym “CAQDAS” is misleading because • Manage facts about data (metadata, socio-demo- these programs do not “do” analysis; users remain in graphics etc.) control of and responsible for everything. It’s there- • Represent ideas that form the basis of analysis fore better to think of them as project management tools. Harnessing CAQDAS powerfully involves their Exploration use from start to finish, whether for an academic • Familiarise with data study, service evaluation, public consultation, liter- • Access and mark inherent structure ature review, or anything else. Each program has a suite of features, too many to list here. -
The Coding Manual for Qualitative Researchers for Manual Coding The
2E Second Edition The Coding Manual for Qualitative Researchers ‘This book fills a major gap in qualitative research methods courses. Saldaña has accomplished what has not been done before - creating a text that clearly identifies the many choices one has in coding their data. I wish I had this book when I started conducting qualitative research. It should be required reading for all.’ Mark Winton, Criminal Justice Instructor, University of Central Florida ‘An excellent handbook that helps demystify the coding process with a comprehensive assessment of different coding types, examples and exercises. As such it is a valuable teaching resource and it will also be of use to anyone undertaking qualitative analysis.’ Kevin Meethan, Associate Professor in Sociology, Plymouth University The ‘The Coding Manual describes the qualitative coding process with clarity and expertise. Its wide array of strategies, from the more straightforward to the more complex, are skillfully explained and exemplified. This extremely usable manual is a must-have resource for qualitative researchers at all levels.’ Coding Manual for Tara M. Brown, Assistant Professor of Education, Brandeis University The second edition of Johnny Saldaña’s international bestseller provides an in-depth guide to the Qualitative Researchers multiple approaches available for coding qualitative data. Fully up-to-date, it includes new chapters, more coding techniques and an additional glossary. Clear, practical and authoritative, the book: • Describes how coding initiates qualitative data analysis • Demonstrates the writing of analytic memos • Discusses available analytic software • Suggests how best to use The Coding Manual for Qualitative Researchers for particular studies In total, 32 coding methods are profiled that can be applied to a range of research genres from grounded theory to phenomenology to narrative inquiry. -
U.S. Individuals' Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act Floyd Edwards Walden University
Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2018 U.S. Individuals' Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act Floyd Edwards Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Floyd Alexander Edwards has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Patricia Ripoll, Committee Chairperson, Public Policy and Administration Faculty Dr. Kathleen Schulin, Committee Member, Public Policy and Administration Faculty Dr. James Mosko, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2017 Abstract U.S. Individuals’ Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act by Floyd Edwards MS, Troy State University, 2000 BS, Troy State University, 1996 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University February 2018 Abstract Since the implementation of the USA Patriot Act in October 2001, public trust in the U.S. federal government to protect individuals’ right to privacy has been affected negatively. -
Working with Feeds, RSS, and Atom
CHAPTER 4 Working with Feeds, RSS, and Atom A fundamental enabling technology for mashups is syndication feeds, especially those packaged in XML. Feeds are documents used to transfer frequently updated digital content to users. This chapter introduces feeds, focusing on the specific examples of RSS and Atom. RSS and Atom are arguably the most widely used XML formats in the world. Indeed, there’s a good chance that any given web site provides some RSS or Atom feed—even if there is no XML-based API for the web site. Although RSS and Atom are the dominant feed format, other formats are also used to create feeds: JSON, PHP serialization, and CSV. I will also cover those formats in this chapter. So, why do feeds matter? Feeds give you structured information from applications that is easy to parse and reuse. Not only are feeds readily available, but there are many applications that use those feeds—all requiring no or very little programming effort from you. Indeed, there is an entire ecology of web feeds (the data formats, applications, producers, and consumers) that provides great potential for the remix and mashup of information—some of which is starting to be realized today. This chapter covers the following: * What feeds are and how they are used * The semantics and syntax of feeds, with a focus on RSS 2.0, RSS 1.0, and Atom 1.0 * The extension mechanism of RSS 2.0 and Atom 1.0 * How to get feeds from Flickr and other feed-producing applications and web sites * Feed formats other than RSS and Atom in the context of Flickr feeds * How feed autodiscovery can be used to find feeds * News aggregators for reading feeds and tools for validating and scraping feeds * How to remix and mashup feeds with Feedburner and Yahoo! Pipes Note In this chapter, I assume you have an understanding of the basics of XML, including XML namespaces and XML schemas.