La Vigilancia Y El Control De La Población a Través De La Gestión, La Conservación Y La Explotación De Datos Masivos

Total Page:16

File Type:pdf, Size:1020Kb

La Vigilancia Y El Control De La Población a Través De La Gestión, La Conservación Y La Explotación De Datos Masivos LA VIGILANCIA Y EL CONTROL DE LA POBLACIÓN A TRAVÉS DE LA GESTIÓN, LA CONSERVACIÓN Y LA EXPLOTACIÓN DE DATOS MASIVOS Autora: Eva Mejias Alonso Director del trabajo: Joan Soler Jiménez Curso 2015/2016 Máster en Archivística y Gestión Documental Escola Superior d’Arxivística i Gestió de Documents Colección: Trabajos fin de máster y de postgrado Vigilancia de la población a través de la gestión, conservación y explotación de datos masivos / 2 Cómo citar este artículo: Mejias Alonso, Eva. (2016) La vigilancia y el control de la población a través de la gestión, la conservación y la explotación de datos masivos. Trabajo de investigación del Máster de Archivística y Gestión de Documentos de l’Escola Superior d'Arxivística i Gestió de Documents. (Trabajos fin de Máster y de postgrado). Http://... (Consultado el...) Esta obra está sujeta a licencia Creative Commons Reconocimiento-NoComercial-SinObraDerivada 3.0 España (http://creativecommons.org/licenses/by-nc-nd/3.0/es/legalcode.ca). Se permite la reproducción total o parcial y la comunicación pública de la obra, siempre que no sea con fines comerciales y siempre que se reconozca la autoría de la obra original. No se permite la creación de obras derivadas. Eva Mejias Alonso / 3 Resumen Este trabajo analiza cómo es la gestión documental en un data center desde una óptica archivística, teniendo en cuenta los sistemas y tecnologías que intervienen en la recopilación, gestión, conservación y análisis de datos masivos. Así mismo, reflexiona acerca de las consecuencias que ello supone en la privacidad de los datos y refleja cómo la gestión documental puede ser, en este caso, una potente herramienta de vigilancia masiva. Para ello, toma como estudio de caso los data centers de algunas de las agencias de inteligencia de Estados Unidos y de la Unión Europea y los data centers de las principales empresas de Internet y telecomunicaciones. Palabras clave: [Big Data, Vigilancia masiva, Data center, Gestión documental, Agencias de inteligencia, NSA, Datos masivos, Centro de datos, Control social, Bases de datos] Title: Population monitoring through the management, conservation and exploitation of massive data Abstract This dissertation examines the archival perspective of how record management is developed in a data center, focusing on how the system and technology are involved in massive data collection, management, conservation and analysis. This paper reflects how record management can be a powerful tool of mass surveillance and also, the consequences of non-privacy. To develop and delve into the theories, we have taken as a case study some American and European intelligence agencies’ data centers and major Internet and telecommunication company’s data centers. Keywords: [Big Data, Mass surveillance, Data center, Record management, Intelligence agencies, NSA, Massive data, Social control, Data bases] Vigilancia de la población a través de la gestión, conservación y explotación de datos masivos / 4 Sumario 1 Introducción .................................................................................................................... 7 1.1 Objetivos del trabajo e hipótesis .............................................................................. 8 1.2 Metodología ............................................................................................................ 9 1.3 Estado de la cuestión .............................................................................................10 2 Conceptos básicos ........................................................................................................12 2.1 Big Data .................................................................................................................12 2.1.1 Definición ........................................................................................................12 2.1.2 Funcionamiento ...............................................................................................16 2.1.3 Utilidades ........................................................................................................24 2.2 Data Centers ..........................................................................................................29 3 Los data centers de Silicon Valley .................................................................................33 3.1 ¿De qué data centers hablamos?...........................................................................33 3.2 Entrada y recopilación de datos .............................................................................37 3.2.1 Datos susceptibles de interés ..........................................................................38 3.2.2 Entrada y recopilación de datos ......................................................................40 3.2.3 Almacenamiento .............................................................................................42 3.3 Análisis de los datos...............................................................................................47 3.4 Explotación de los datos ........................................................................................52 4 Los data centers de la vigilancia masiva .......................................................................54 4.1 El informe Moraes ..................................................................................................55 4.2 ¿De qué países y agencias hablamos? ..................................................................57 4.3 Entrada y recopilación de datos .............................................................................61 4.3.1 Datos susceptibles de interés ..........................................................................61 4.3.2 Mecanismos de recopilación ...........................................................................67 4.4 Procesamiento, almacenamiento y análisis de datos ........................................... 104 4.4.1 De la extracción al almacenamiento .............................................................. 105 4.4.2 Análisis de los datos ..................................................................................... 115 4.5 Explotación de los datos ...................................................................................... 121 5 Legislación .................................................................................................................. 127 6 Conclusiones ............................................................................................................... 132 7 Bibliografía .................................................................................................................. 135 Eva Mejias Alonso / 5 Índice de figuras Tabla 1. Tag cloud. (McKinsey Global Institute, 2011) ..........................................................19 Tabla 2. Clustergram. (McKinsey Global Institute, 2011) ......................................................20 Tabla 3. Flujo historial. (McKinsey Global Institute, 2011) ....................................................20 Tabla 4. Flujo de información espacial. (McKinsey Global Institute, 2011)............................21 Tabla 5. Ejemplo de infografía. (Olberg Sanz, 2013) ............................................................22 Tabla 6. Patrones del tráfico en Singapur. (Tableau Software, 2016) ...................................23 Tabla 7. Visualización de los datos en Qlik Sense. (Qlik, 2016) ...........................................24 Tabla 8. Utilidad de Big Data por sectores. (Oracle 2014). ...................................................27 Tabla 9. Sala fría del data center de Google en Council Bluffs, Iowa. (Google, 2012) ..........31 Tabla 10. Edificio del data center de Google de Hamina, Finlandia. (Google 2012) .............32 Tabla 11. Proveedores de datos del programa PRISM. (The Guardian, 2013) .....................34 Tabla 12. Preguntas frecuentes sobre la segmentación de los anuncios. (Facebook, 2014) 39 Tabla 13. Proceso de un ETL. (Channelbiz, 2015) ...............................................................42 Tabla 14. Base de datos Key-Value. (Telefónica, 2014) .......................................................43 Tabla 15. Base de datos documental. (Telefónica, 2014) .....................................................44 Tabla 16. Base de datos de grafos. (Telefónica, 2014).........................................................46 Tabla 17. Aliados de la NSA. (EdwardSnowden.com, 2015) ................................................58 Tabla 18. Clasificación de los países aliados de EEUU. (EdwardSnowden.com, 2015) .......59 Tabla 19. Nueva postura de recolección en los Cinco Ojos. (EdwardSnowden.com, 2015) .61 Tabla 20. Metadatos procedentes de llamadas telefónicas. (EdwardSnowden.com, 2015) ..63 Tabla 21. ¿Contenido o metadato? Guía de categorización. (EdwardSnowden.com, 2015) .66 Tabla 22. PRISM, proveedores y datos recibidos. (EdwardSnowden.com, 2015) .................70 Tabla 23. Características de PRISM. (EdwardSnowden.com, 2015) ....................................71 Tabla 24. PRISM, cadena de mando. (EdwardSnowden.com, 2015) ...................................72 Tabla 25. PRISM, ejemplos de casos. (EdwardSnowden.com, 2015) ..................................73 Tabla 26. Jerarquía en XKeyScore. (EdwardSnowden.com, 2015) ......................................74 Tabla 27. Fuentes de información de XKeyScore. (EdwardSnowden.com, 2015) ................75 Tabla 28. Interfaz de búsqueda de XKeyScore. (EdwardSnowden.com, 2015) ....................77
Recommended publications
  • Mutual Watching and Resistance to Mass Surveillance After Snowden
    Media and Communication (ISSN: 2183-2439) 2015, Volume 3, Issue 3, Pages 12-25 Doi: 10.17645/mac.v3i3.277 Article “Veillant Panoptic Assemblage”: Mutual Watching and Resistance to Mass Surveillance after Snowden Vian Bakir School of Creative Studies and Media, Bangor University, Bangor, LL57 2DG, UK; E-Mail: [email protected] Submitted: 9 April 2015 | In Revised Form: 16 July 2015 | Accepted: 4 August 2015 | Published: 20 October 2015 Abstract The Snowden leaks indicate the extent, nature, and means of contemporary mass digital surveillance of citizens by their intelligence agencies and the role of public oversight mechanisms in holding intelligence agencies to account. As such, they form a rich case study on the interactions of “veillance” (mutual watching) involving citizens, journalists, intelli- gence agencies and corporations. While Surveillance Studies, Intelligence Studies and Journalism Studies have little to say on surveillance of citizens’ data by intelligence agencies (and complicit surveillant corporations), they offer insights into the role of citizens and the press in holding power, and specifically the political-intelligence elite, to account. Atten- tion to such public oversight mechanisms facilitates critical interrogation of issues of surveillant power, resistance and intelligence accountability. It directs attention to the veillant panoptic assemblage (an arrangement of profoundly une- qual mutual watching, where citizens’ watching of self and others is, through corporate channels of data flow, fed back into state surveillance of citizens). Finally, it enables evaluation of post-Snowden steps taken towards achieving an equiveillant panoptic assemblage (where, alongside state and corporate surveillance of citizens, the intelligence-power elite, to ensure its accountability, faces robust scrutiny and action from wider civil society).
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Citizen Snowden
    International Journal of Communication 11(2017), 843–857 1932–8036/20170005 Citizen Snowden ENGIN ISIN1 Queen Mary University of London, UK EVELYN RUPPERT Goldsmiths University of London, UK What kind of citizenship has Snowden performed? Apparently, it is not American citizenship because American authorities attempted to try him for treason and he became a stateless fugitive. After requesting political asylum in 21 countries, he was eventually granted temporary asylum in Russia. Neither states nor international organizations recognized his act as an act of citizenship. Did Snowden perform a citizenship that is yet to come? Did he perform an international citizenship? The issue of rights usually recognized in the literature on the debate about Snowden’s act concerns its content such as the practices of states spying on their citizens. This article focuses on the act itself as making digital rights claims that do not yet exist in law. We argue that just as Snowden’s act disrupted surveillance practices that evermore traverse national borders, it also called for digital rights and responsibilities that traverse national legal orders. Keywords: citizenship, performativity, international politics, digital rights I believe in the principle declared at Nüremberg in 1945: “Individuals have international duties which transcend the national obligations of obedience. Therefore individual citizens have the duty to violate domestic laws to prevent crimes against peace and humanity from occurring.” —Edward Snowden, Moscow Declaration2 Engin Isin: [email protected] Evelyn Ruppert: [email protected] Date submitted: 2016–03–29 1 We would like to thank two anonymous reviewers for their two rounds of comments that were incredibly helpful for strengthening our argument.
    [Show full text]
  • SURVEILLE NSA Paper Based on D2.8 Clean JA V5
    FP7 – SEC- 2011-284725 SURVEILLE Surveillance: Ethical issues, legal limitations, and efficiency Collaborative Project This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 284725 SURVEILLE Paper on Mass Surveillance by the National Security Agency (NSA) of the United States of America Extract from SURVEILLE Deliverable D2.8: Update of D2.7 on the basis of input of other partners. Assessment of surveillance technologies and techniques applied in a terrorism prevention scenario. Due date of deliverable: 31.07.2014 Actual submission date: 29.05.2014 Start date of project: 1.2.2012 Duration: 39 months SURVEILLE WorK PacKage number and lead: WP02 Prof. Tom Sorell Author: Michelle Cayford (TU Delft) SURVEILLE: Project co-funded by the European Commission within the Seventh Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Commission Services) Executive summary • SURVEILLE deliverable D2.8 continues the approach pioneered in SURVEILLE deliverable D2.6 for combining technical, legal and ethical assessments for the use of surveillance technology in realistic serious crime scenarios. The new scenario considered is terrorism prevention by means of Internet monitoring, emulating what is known about signals intelligence agencies’ methods of electronic mass surveillance. The technologies featured and assessed are: the use of a cable splitter off a fiber optic backbone; the use of ‘Phantom Viewer’ software; the use of social networking analysis and the use of ‘Finspy’ equipment installed on targeted computers.
    [Show full text]
  • A Level Film Studies Candidate Style Answers
    Qualification Accredited A LEVEL Candidate Style Answers FILM STUDIES H410 For first teaching in 2017 H410/02 Critical approaches to film Version 1 www.ocr.org.uk/filmstudies A Level Film Studies Candidate Style Answers Contents Introduction 3 Section A Question 2: Level 5 answer 4 Commentary 6 Section A Question 2: Level 3 answer 7 Commentary 7 Section B Question 4: Level 5 answer 8 Commentary 10 Section B Question 4: Level 3 answer 11 Commentary 11 Section C Question 5: Level 5 answer 12 Commentary 14 Section C Question 5: Level 3 answer 15 Commentary 16 Section C Question 7: Level 5 answer 17 Commentary 19 Section C Question 7: Level 3 answer 20 Commentary 21 Section C Question 10: Level 5 answer 22 Commentary 24 Section C Question 10: Level 3 answer 25 Commentary 25 2 © OCR 2018 A Level Film Studies Candidate Style Answers Introduction Please note that this resource is provided for advice and guidance only and does not in any way constitute an indication of grade boundaries or endorsed answers. Whilst a senior examiner has provided a possible level for each Assessment Objective when marking these answers, in a live series the mark a response would get depends on the whole process of standardisation, which considers the big picture of the year’s scripts. Therefore the level awarded here should be considered to be only an estimation of what would be awarded. How levels and marks correspond to grade boundaries depends on the Awarding process that happens after all/most of the scripts are marked and depends on a number of factors, including candidate performance across the board.
    [Show full text]
  • Journey to the Academy Awards: an Investigation of Oscar-Shortlisted and Nominated Documentaries (2014-2016) PRELIMINARY KEY
    Journey to the Academy Awards: An Investigation of Oscar-Shortlisted and Nominated Documentaries (2014-2016) PRELIMINARY KEY FINDINGS By Caty Borum Chattoo, Co-Director, Center for Media & Social Impact American University School of Communication | Washington, D.C. February 2016 OVERVIEW For a documentary filmmaker, being recognized by the Academy of Motion Picture Arts & Sciences for an Oscar nomination in the Best Documentary Feature category is often the pinnacle moment in a career. Beyond the celebratory achievement, the acknowledgment can open up doors for funding and opportunities for next films and career opportunities. The formal recognition happens in three phases: It begins in December with the Academy’s announcement of a shortlist—15 films that advance to a formal nomination for the Academy’s Best Documentary Feature Award. Then, in mid-January, the final list of five official nominations is announced. Finally, at the end of February each year, the one winner is announced at the Academy Awards ceremony. Beyond a film’s narrative and technical prowess, the marketing campaigns that help a documentary make it to the shortlist and then the final nomination list are increasingly expensive and insular, from advertisements in entertainment trade outlets to lavish events to build buzz among Academy members and industry influencers. What does it take for a documentary film and its director and producer to make it to the top—the Oscars shortlist, the nomination and the win? Which film directors are recognized—in terms of race and gender?
    [Show full text]
  • Documentary Movies
    Libraries DOCUMENTARY MOVIES The Media and Reserve Library, located in the lower level of the west wing, has over 9,000 videotapes, DVDs and audiobooks covering a multitude of subjects. For more information on these titles, consult the Libraries' online catalog. 10 Days that Unexpectedly Changed America DVD-2043 56 Up DVD-8322 180 DVD-3999 60's DVD-0410 1-800-India: Importing a White-Collar Economy DVD-3263 7 Up/7 Plus Seven DVD-1056 1930s (Discs 1-3) DVD-5348 Discs 1 70 Acres in Chicago: Cabrini Green DVD-8778 1930s (Discs 4-5) DVD-5348 Discs 4 70 Acres in Chicago: Cabrini Green c.2 DVD-8778 c.2 1964 DVD-7724 9/11 c.2 DVD-0056 c.2 1968 with Tom Brokaw DVD-5235 9500 Liberty DVD-8572 1983 Riegelman's Closing/2008 Update DVD-7715 Abandoned: The Betrayal of America's Immigrants DVD-5835 20 Years Old in the Middle East DVD-6111 Abolitionists DVD-7362 DVD-4941 Aboriginal Architecture: Living Architecture DVD-3261 21 Up DVD-1061 Abraham and Mary Lincoln: A House Divided DVD-0001 21 Up South Africa DVD-3691 Absent from the Academy DVD-8351 24 City DVD-9072 Absolutely Positive DVD-8796 24 Hours 24 Million Meals: Feeding New York DVD-8157 Absolutely Positive c.2 DVD-8796 c.2 28 Up DVD-1066 Accidental Hero: Room 408 DVD-5980 3 Times Divorced DVD-5100 Act of Killing DVD-4434 30 Days Season 3 DVD-3708 Addicted to Plastic DVD-8168 35 Up DVD-1072 Addiction DVD-2884 4 Little Girls DVD-0051 Address DVD-8002 42 Up DVD-1079 Adonis Factor DVD-2607 49 Up DVD-1913 Adventure of English DVD-5957 500 Nations DVD-0778 Advertising and the End of the World DVD-1460
    [Show full text]
  • The National Security Agency: Missions, Authorities, Oversight and Partnerships
    9 August 2013 National Security Agency The National Security Agency: Missions, Authorities, Oversight and Partnerships ³7KDW¶VZK\LQWKH\HDUVWRFRPHZHZLOOKDYHWRNHHSZRUNLQJKDUGWRVWULNHWKHDSSURSULDWH balance between our need for security and preserving those freedoms that make us who we are. That means reviewing the authorities of law enforcement, so we can intercept new types of communication, but also build in privacy protections to prevent abuse´ --President Obama, May 23, 2013 In his May 2013 address at the National Defense University, the President made clear that we, as a Government, need to review the surveillance authorities used by our law enforcement and intelligence community professionals so that we can collect information needed to keep us safe and ensure that we are undertaking the right kinds of privacy protections to prevent abuse. In the wake of recent unauthorized disclosures about some of our key intelligence collection programs, President Obama has directed that as much information as possible be made public, while mindful of the need to protect sources, methods and national security. Acting under that guidance, the Administration has provided enhanced transparency on, and engaged in robust public discussion about, key intelligence collection programs undertaken by the National Security Agency (NSA). This is important not only to foster the kind of debate the President has called for, but to correct inaccuracies that have appeared in the media and elsewhere. This document is a step in that process, and is aimed at providing a VXFFLQFWGHVFULSWLRQRI16$¶V mission, authorities, oversight and partnerships. Prologue After the al-4D¶LGDDWWDFNVRQWKH:RUOG7UDGH&HQWHUDQGWKH3HQWDJRQWKH&RPPLVVLRQ found that the U.S. Government had failed to identify and connect the many ³dots´ of information that would have uncovered the planning and preparation for those attacks.
    [Show full text]
  • Production Notes
    Production Notes ABOUT THE FILM Timed to the 50th anniversary of NASA’s celebrated Apollo 11 mission, Apollo 11: First Steps Edition is a thrilling cinematic experience that showcases the real-life moments of humankind’s first steps on the Moon. In this special giant screen edition of Todd Douglas Miller’s (Dinosaur 13) critically acclaimed Apollo 11 documentary, the filmmakers reconstruct the exhilarating final moments of preparation, liftoff, landing, and return of this historic mission—one of humanity’s greatest achievements, and the first to put humans on the Moon. It seems impossible, but this project was possible because of the discovery of a trove of never-before-seen 70mm footage and uncatalogued audio recordings—which allowed the filmmakers to create a 47-minute version of the film tailored exclusively for IMAX® and giant screen theaters in science centers and museums. Apollo 11: First Steps Edition is produced by Statement Pictures in partnership with CNN Films. The film is presented by Land Rover, and distributed by MacGillivray Freeman Films. “The Apollo 11 mission was humanity’s greatest adventure and we’re pleased to be bringing this edition to science centers and museums everywhere,” says director Todd Douglas Miller. “This film was designed to take full advantage of the immersive quality of IMAX and giant screen theaters.” But how did it happen? How did this one-in-a-lifetime batch of footage remain undiscovered for fifty years? Miller explains that as his team was working closely with NASA and the National Archives (NARA) to locate all known Apollo 11 footage, NARA staff members simply discovered reels upon reels of 70mm, large-format Apollo footage.
    [Show full text]
  • Citizenfour Jimena Reyes Jimena Reyes, a Lawyer from the Paris Bar, Has Been FIDH's Director for the Americas Since June 2003
    Citizenfour Jimena Reyes Jimena Reyes, a lawyer from the Paris Bar, has been FIDH's director for the Americas since June 2003. Since then, she has investigated human rights viola- tions and public policies of 17 countries in the Americas, and she has also con- tributed to the the drafting of more than 30 human rights reports. In 2009, she investigated the scandal of illegal activities of the Colombian secret services that eventually led to its closing in 2011. Ms. Reyes has also coordinated a case relat- ed to illegal interception of NGO communcation in Belgium. She has been very active in the promotion of a new UN mandate on the right to privacy following the events of the Edward Snowden scandal. Ferran Josep Lloveras Ferran J. Lloveras, political scientist and international development expert, joined OHCHR in August 2014, where he works on external relations and co- operation, as well as focussing on civil and political rights. Previously he worked for the European Commission, on Education in development cooperation. Be- fore that he held several positions in UNESCO, where he worked on Education in Emergencies in Palestine (2011-2012), and on Strategic Planning, Education and UN reform at the Headquarters in Paris and on several field assignments (2005-2011). He also worked for the General Secretariat for Youth of the gov- ernment of Catalonia (2002-2005), and for the European Bureau for Conscien- tious Objection, to defend the human right to conscientious objection to mili- tary service (1999-2002). Afsané Bassir-Pour Director of the United Nations Regional Information Centre for Western Eu- rope (UNRIC) in Brussels since 2006, Ms Bassir-Pour was the diplomatic corre- spondent of the French daily Le Monde from 1988 to 2006.
    [Show full text]
  • 35 Years of Nominees and Winners 36
    3635 Years of Nominees and Winners 2021 Nominees (Winners in bold) BEST FEATURE JOHN CASSAVETES AWARD BEST MALE LEAD (Award given to the producer) (Award given to the best feature made for under *RIZ AHMED - Sound of Metal $500,000; award given to the writer, director, *NOMADLAND and producer) CHADWICK BOSEMAN - Ma Rainey’s Black Bottom PRODUCERS: Mollye Asher, Dan Janvey, ADARSH GOURAV - The White Tiger Frances McDormand, Peter Spears, Chloé Zhao *RESIDUE WRITER/DIRECTOR: Merawi Gerima ROB MORGAN - Bull FIRST COW PRODUCERS: Neil Kopp, Vincent Savino, THE KILLING OF TWO LOVERS STEVEN YEUN - Minari Anish Savjani WRITER/DIRECTOR/PRODUCER: Robert Machoian PRODUCERS: Scott Christopherson, BEST SUPPORTING FEMALE MA RAINEY’S BLACK BOTTOM Clayne Crawford PRODUCERS: Todd Black, Denzel Washington, *YUH-JUNG YOUN - Minari Dany Wolf LA LEYENDA NEGRA ALEXIS CHIKAEZE - Miss Juneteenth WRITER/DIRECTOR: Patricia Vidal Delgado MINARI YERI HAN - Minari PRODUCERS: Alicia Herder, Marcel Perez PRODUCERS: Dede Gardner, Jeremy Kleiner, VALERIE MAHAFFEY - French Exit Christina Oh LINGUA FRANCA WRITER/DIRECTOR/PRODUCER: Isabel Sandoval TALIA RYDER - Never Rarely Sometimes Always NEVER RARELY SOMETIMES ALWAYS PRODUCERS: Darlene Catly Malimas, Jhett Tolentino, PRODUCERS: Sara Murphy, Adele Romanski Carlo Velayo BEST SUPPORTING MALE BEST FIRST FEATURE SAINT FRANCES *PAUL RACI - Sound of Metal (Award given to the director and producer) DIRECTOR/PRODUCER: Alex Thompson COLMAN DOMINGO - Ma Rainey’s Black Bottom WRITER: Kelly O’Sullivan *SOUND OF METAL ORION LEE - First
    [Show full text]
  • Documentary Version 1
    Qualification Accredited A LEVEL Delivery Guide FILM STUDIES H410 For first teaching in 2017 Component 2 – Section B: Documentary Version 1 www.ocr.org.uk/filmstudies A Level Film Studies Delivery Guide A LEVEL FILM STUDIES This guide outlines approaches and ideas, including learner activities for the Section B of Component 2: Documentary. Delivery guides are designed to represent a body of knowledge about teaching a particular topic and contain: • Content: A clear outline of the content covered by the delivery guide; • Thinking Conceptually: Expert guidance on the key concepts involved, common difficulties students may have, approaches to teaching that can help students understand these concepts and how this topic links conceptually to other areas of the subject; • Thinking Contextually: A range of suggested teaching activities using a variety of Introduction themes so that different activities can be selected which best suit particular classes, learning styles or teaching approaches. If you have any feedback on this Delivery Guide or suggestions for other resources you would like OCR to develop, please email [email protected] Curriculum Content 3 Thinking Conceptually 4 Thinking Contextually 8 Learner Resources – Activities 9 DISCLAIMER This resource was designed using the most up to date information from the specification at the time it was published. Specifications are updated over time, which means there may be contradictions between the resource and the specification, therefore please use the information on the latest specification at all times. If you do notice a discrepancy please contact us on the following email address: [email protected] 2 © OCR 2017 A Level Film Studies Delivery Guide A brief contextual history of documentary film The Documentary component is designed to engage learners in the close study of documentary film.
    [Show full text]