Periodic Employee Colloquia, Brown Bag Lunch Talks, and Employee Seminar Discussions Held at NSA Headquarters, 2006-2008

Total Page:16

File Type:pdf, Size:1020Kb

Periodic Employee Colloquia, Brown Bag Lunch Talks, and Employee Seminar Discussions Held at NSA Headquarters, 2006-2008 Description of document: Periodic employee colloquia, brown bag lunch talks, and employee seminar discussions held at NSA Headquarters, 2006-2008 Requested date: 12-August-2008 Released date: 30-September-2011 Posted date: 19-December-2011 Source of document: National Security Agency Attn: FOIA/PA Office (DJP4) 9800 Savage Road, Suite 6248 Ft. George G. Meade, MD 20755-6248 Fax: 443-479-3612 (ATTN: FOIA/PA Office) Online FOIA Form The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 56905B 30 September 2011 This is the final response to your Freedom of Information Act (FOIA) request of 12 August 2008, which was received by this office on 22 August 2008, for "the list(s) of periodic employee colloquia, brown bag lunch talks, and employee seminar discussions held at NSA HQ in 2006, 2007, and 2008, preferably including at minimum their title/subject, the speaker and the date." A copy of your request is enclosed. Your request has been processed under the FOIA, and the last two documents responsive to your request are enclosed. Certain information, however, has been deleted from the enclosures. Some of the information deleted from the documents was found to be currently and properly classified in accordance with Executive Order 13526, as amended. This information meets the criteria for classification as set forth in Subparagraph (c) of Section 1.4 and remains classified TOP SECRET as provided in Section 1.2 of the Executive Order. The information is classified because its disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Because the information is currently and properly classified, it is exempt from disclosure pursuant to the first exemption of the FOIA (5 U.S.C. Section 552(b)(l)). In addition, this Agency is authorized by various statutes to protect certain information concerning its activities. We have determined that such information exists in these documents. Accordingly, those portions are exempt from disclosure pursuant to the third exemption of the FOIA which provides for the withholding of information specifically protected from disclosure by statute. The specific statutes applicable in this case are Title 18 U.S. Code 798; Title 50 U.S. Code 403-1(i); and Section 6, Public Law 86-36 (50 U.S. Code 402 note). The Initial Denial Authority for NSA information is the Deputy Associate Director for Policy and Records, Diane M. Janosek. Since these deletions may be construed as a partial denial of your request, you are hereby advised of this FOIA Case: 569058 Agency's appeal procedures. Any person denied access to information, may file an appeal to the NSA/CSS Freedom of Information Act Appeal Authority. The appeal must be postmarked no later than 60 calendar days from the date of the initial denial letter. The appeal shall be in writing addressed to the NSA/CSS FOIA Appeal Authority (DJP4), National Security Agency, 9800 Savage Road STE 6248, Fort George G. Meade, MD 20755-6248. The appeal shall reference the initial denial of access and shall contain, in sufficient detail and particularity, the grounds upon which the requester believes release of the information is required. The NSA/ CSS Appeal Authority will endeavor to respond to the appeal within 20 working days after receipt, absent any unusual circumstances. The CIA has asked that we protect information pursuant to FOIA (b)(3). The FBI and Secret Service have asked that we protect information pursuant to (b)(6) and (b)(7)(C). In addition, the names of another agencies' employees have been protected pursuant to (b)(6). Those deletions have been marked with the code OGA (Other Government Agency). Any appeal of the denial of that information should be directed to the appropriate agency. Sincerely, PAMELA N. PHILLIPS Chief FOIA/PA Office Encls: ajs DOCID: 3907586 DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS 'fOP s BCRB'f I I eetn:It'f 1L--------------------__.I IDEP Seminar :c; ( 1) :12) (3)-1:·.~. f'S-..)0 DOCID: 3907566 7/30/0811:09 am- .d._ ____,~ (U/ /FOUO) August 7 IDEP Seminar (U) You are invited to attend the August IDEP Seminar. (U/ ~) NOTE: The talk will be compartmented EaiL-----..J (U) As usual, refreshments will be seJVed. Speake1....__ _ __,1 S31222/IDEP Title: (U) Experiences with SAGE and Python When: Thursday, AilgUSt 7 at 2:30 Where: FANX 1 Auditorium, FX1S22/FX1S32 Classification of Talk.~EaD Abstract: (U) SAGE is an open-source mathematical software package with functionality similar to Magma, Mathematica, and MA1LAB. Unlike these progrnms, SAGE uses an established programming language--- Python--- as its programming language. (U/ ~Internally, SAGE can be downloaded from ( f:·) ( 1: (b): 3) -F. r.. ':lb-.3(" ffltfflfCT ·· · I This talk will be EcQ (b: ( 1) ,~. (.5--F._.. 86-3r5 (i:}: (3)-5(1 usc 4(1~~ (b) (31-P.L. 8G-J6 (I:: (3)-l:'.L. 1)6-36 DOCID: 3907566 If you are interested in giving a talk, please contact._ ________,rnote that we will be changing guards soon.) {_j)-f'.L. l:-'6-.315 6/17I 08 11:11 am - ~L----.~lJuiy IDEP Seminar (U)There is a mandatory IDE P-all meeting following the seminar. (U) You are invited to attend the July IDEP Seminar. As usual, refreshments will be served. If there are anyone who is interested in giving a talk, let us know! We want to hear from you, and make you famous! Speaker: (U/ ~~ IDEP/Rl/Pod 47 Title: (U//FeBe}" cmprsn vs fOdSzqujpo ~ *unless you can decompress/decrypt, then it is I.'J', .JIL._J When: Thursday, July 10 at 2:30 (b) ( lj (b) ( '3) -;;,:; ~·:-;-::: 4C<) Where: FANX 1 Auditoriwn, FX1S22/FX1S3~ ·i r 1 i 1 1 (bl (3)-P.~. tlG-jG (t,) '13)-P.L. 86-36 Oassification of Talk: "'f'Sffflo ·.... ./ L..,___(=_·{'fflfflt/c-y-~-=--=-=====1 DOCID: 3907586 . (U) IDEP seminar jownal page: I (U/ tfeHet If vou are interested in giving a talk. please contact. ~ 6/12/08 03:32pm- JJ ~ (U) May IDEP Seminar ---(U) Forall}Qu time travelers out there, please checkout the Mayseminarl , _ 131 _ 2 .~. 8 5 30 Speakers! Tttle:(U)~RSm-A~cs~ru~ere""""nre~z~oo~s~--------~ When: Thursday May 29, at 2:30 Where: FANX 1 Auditorium, FX1S22/FX1S32 Classification of Talk: UNClASSIFIED Abstract: (U) Every year, RSA Security hosts a cuning edge computer security and cryptology conference in San Francisco. Many big names in the industry anend and give talks, including Ron Rivest (the R in RSA!Q, Whit Diffie, and Bruce Schneier, and several security companies are represented, including Microsoft, Google, and Symantec. Come learn about the latest developments in security-- including anempts at defining Web 2.0 and 3.0, and what's bugging AI Gore lately! There might be pictures. Gurent Mood: 'i almost friday DOCID: 3907586. 4/9/08 08:23am· .QI.,.'....__ _ ___.~ (U) Seminar rescheduled! (l1) The talk is rescheduled! See below for late§t info. You are invited to attend the April IDEP Seminar. Note the UNUSUAL DAY and TIME- WED 4/23 at 1:30 As usual, refreshments will be served. Speakers! IMEPP Director an<ll:-io::n:!"'!-----'1 WiMS Outreach Title: Outreach 0pportwlities in Math with NSA When: **Wednesday**, April23 at **1:30** Where: FANX 1 Auditorium, FX1S22/FX1S32 Classification of Talk: UNa.ASSIFIED Abstract: (U) The Mathematic Education Partnership Program (MEPP) is a :NSA outreach program to promote mathematics and science education at non-profit educational institutions (typically grades K-12). · (U) The goal of WIMS outreach is to enhance the recruitment of Agency mathematicians and to address the under-representation of women in mathematics. Our target audience is primarily undergraduate and graduate students interested in or studying mathematics. If ~ are interested in giving a talk, please contact DOCID: 3907586 4/2/08 10:52 am - _,,gl....._ _ ___,l (U) Outreach Opportunities in Math with NSA (U) The talk scheduled for April10, "Outreach Opportunities in Math with NSA" is postponed. There is no talk on AprillO. We will let )OU know when it is rescheduled. - .(i::l (3)-P.::.... 86-36 You are invited to attend the April IDEP Seminar. This month's talk will describe some opponunities available to )OU to talk about mathematics to students ranging from Kindergarten to Graduate school As usual, refreshments will be served. Speakers1 ~pp and.,_l.......-:-l"""l:"''~---'fwiMS Outreach Tttle: Outreach upponunities in Math With NSA When: Thursday, April10 at 2:30 Where: FANX 1 Auditorium, FX1S22/FX1S32 Classification of Talk: UN<1ASSIFIED Abstract: (U) The Mathematic Education Pannership Program (MEPP) is a NSA outreach program to promote mathematics and science education at non-profit educational institutions (typically grades K-12).
Recommended publications
  • What Is Xkeyscore, and Can It 'Eavesdrop on Everyone, Everywhere'? (+Video) - Csmonitor.Com
    8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com The Christian Science Monitor ­ CSMonitor.com What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) XKeyscore is apparently a tool the NSA uses to sift through massive amounts of data. Critics say it allows the NSA to dip into people's 'most private thoughts' – a claim key lawmakers reject. This photo shows an aerial view of the NSA's Utah Data Center in Bluffdale, Utah. The long, squat buildings span 1.5 million square feet, and are filled with super­ powered computers designed to store massive amounts of information gathered secretly from phone calls and e­mails. (Rick Bowmer/AP/File) By Mark Clayton, Staff writer / August 1, 2013 at 9:38 pm EDT Top­secret documents leaked to The Guardian newspaper have set off a new round of debate over National Security Agency surveillance of electronic communications, with some cyber experts saying the trove reveals new and more dangerous means of digital snooping, while some members of Congress suggested that interpretation was incorrect. The NSA's collection of "metadata" – basic call logs of phone numbers, time of the call, and duration of calls – is now well­known, with the Senate holding a hearing on the subject this week. But the tools discussed in the new Guardian documents apparently go beyond mere collection, allowing the agency to sift through the www.csmonitor.com/layout/set/print/USA/2013/0801/What-is-XKeyscore-and-can-it-eavesdrop-on-everyone-everywhere-video 1/4 8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com haystack of digital global communications to find the needle of terrorist activity.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • I,St=-Rn Endorsedb~ Chief, Policy, Information, Performance, and Exports
    NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY 2-4 Issue Date: IO May 20 I 9 Revised: HANDLING OF REQUESTS FOR RELEASE OF U.S. IDENTITIES PURPOSE AND SCOPE This policy, developed in consultation with the Director of National Intelligence (DNI), the Attorney General, and the Secretary of Defense, implements Intelligence Community Policy Guidance I 07 .1 , "Requests for Identities of U.S. Persons in Disseminated Intelligence Reports" (Reference a), and prescribes the policy, procedures, and responsibilities for responding to a requesting entity, other than NSA/CSS, for post-publication release and dissemination of masked US person idenlity information in disseminated serialized NSA/CSS reporting. This policy applies exclusively to requests from a requesting entity, other than NSA/CSS, for post-publication release and dissemination of nonpublic US person identity information that was masked in a disseminated serialized NSA/CSS report. This policy does not apply in circumstances where a U.S. person has consented to the dissemination of communications to, from, or about the U.S. person. This policy applies to all NSA/CSS personnel and to all U.S. Cryptologic System Government personnel performing an NSA/CSS mission. \ This policy does not affect any minimization procedures established pursuant to the Foreign Intelligence Surveillance Act of 1978 (Reference b), Executive Order 12333 (Reference £), or other provisions of law. This policy does not affect the requirements established in Annex A, "Dissemination of Congressional Identity Information," of Intelligence Community Directive 112, "Congressional Notification" (Reference d). ~A General, U.S. Army Director, NSA/Chief, CSS i,st=-rn Endorsedb~ Chief, Policy, Information, Performance, and Exports NSA/CSS Policy 2-4 is approved for public release.
    [Show full text]
  • Utah Data Center, As Well As Any Search Results Pages
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84688A 2 May 2017 JOHN GREENEWALD Dear Mr. Greenewald : This responds to your Freedom of Information Act (FOIA) request of 14 June 2016 for Intellipedia pages on Boundless Information and/or BOUNDLESS INFORMANT and/or Bull Run and/or BULLRUN and/or Room 641A and/ or Stellar Wind and/ or Tailored Access Operations and/ or Utah Data Center, as well as any search results pages. A copy of your request is enclosed. As stated in our previous response, dated 15 June 2016, your request was assigned Case Number 84688. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]
  • Ensuring Language Capability in the Intelligence Community What Factors Affect the Best Mix of Military, Civilians, and Contractors?
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation technical report series. Reports may include research findings on a specific topic that is limited in scope; present discussions of the methodology employed in research; provide literature reviews, survey instru- ments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports un- dergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
    [Show full text]
  • Jus Algoritmi: How the NSA Remade Citizenship
    Extended Abstract Jus Algoritmi: How the NSA Remade Citizenship John Cheney-Lippold 1 1 University of Michigan / 500 S State St, Ann Arbor, MI 48109, United States of America / [email protected] Introduction It was the summer of 2013, and two discrete events were making analogous waves. First, Italy’s Minister for Integration, Cécile Kyenge was pushing for a change in the country’s citizenship laws. After a decades-long influx of immigrants from Asia, Africa, and Eastern Europe, the country’s demographic identity had become multicultural. In the face of growing neo-nationalist fascist movements in Europe, Kyenge pushed for a redefinition of Italian citizenship. She asked the state to abandon its practice of jus sanguinis, or citizenship rights by blood, and to adopt a practice of jus soli, or citizenship rights by landed birth. Second, Edward Snowden fled the United States and leaked to journalists hundreds of thousands of classified documents from the National Security Agency regarding its global surveillance and data mining programs. These materials unearthed the classified specifics of how billions of people’s data and personal details were being recorded and processed by an intergovernmental surveillant assemblage. These two moments are connected by more than time. They are both making radical moves in debates around citizenship, though one is obvious while the other remains furtive. In Italy, this debate is heavily ethnicized and racialized. According to jus sanguinis, to be a legitimate part of the Italian body politic is to have Italian blood running in your veins. Italian meant white. Italian meant ethnic- Italian. Italian meant Catholic.
    [Show full text]
  • SURVEILLE NSA Paper Based on D2.8 Clean JA V5
    FP7 – SEC- 2011-284725 SURVEILLE Surveillance: Ethical issues, legal limitations, and efficiency Collaborative Project This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 284725 SURVEILLE Paper on Mass Surveillance by the National Security Agency (NSA) of the United States of America Extract from SURVEILLE Deliverable D2.8: Update of D2.7 on the basis of input of other partners. Assessment of surveillance technologies and techniques applied in a terrorism prevention scenario. Due date of deliverable: 31.07.2014 Actual submission date: 29.05.2014 Start date of project: 1.2.2012 Duration: 39 months SURVEILLE WorK PacKage number and lead: WP02 Prof. Tom Sorell Author: Michelle Cayford (TU Delft) SURVEILLE: Project co-funded by the European Commission within the Seventh Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Commission Services) Executive summary • SURVEILLE deliverable D2.8 continues the approach pioneered in SURVEILLE deliverable D2.6 for combining technical, legal and ethical assessments for the use of surveillance technology in realistic serious crime scenarios. The new scenario considered is terrorism prevention by means of Internet monitoring, emulating what is known about signals intelligence agencies’ methods of electronic mass surveillance. The technologies featured and assessed are: the use of a cable splitter off a fiber optic backbone; the use of ‘Phantom Viewer’ software; the use of social networking analysis and the use of ‘Finspy’ equipment installed on targeted computers.
    [Show full text]
  • NSA) Office of Inspector General (OIG), 2003-2006
    Description of document: Semi-annual reports for Congress produced by the National Security Agency (NSA) Office of Inspector General (OIG), 2003-2006 Requested date: 14-April-2008 Release date: 09-March-2020 Posted date: 30-March-2020 Source of document: FOIA Request National Security Agency Attn: FOIA/PA Office 9800 Savage Road, Suite 6932 Ft. George G. Meade, MD 20755-6932 Fax: 443-479-3612 Online FOIA Request Form The governmentattic.org web site (“the site”) is a First Amendment free speech web site, and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. ,. NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE I~ FORT GEORGE G.
    [Show full text]
  • National Security Agency
    Coordinates: 39°6′32″N 76°46′17″W National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United National Security Agency States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its Seal of the National Security Agency mission, the majority of which are clandestine.[10] Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become the largest of the U.S. intelligence organizations in terms of Flag of the National Security Agency personnel and budget.[6][11] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[12] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[13][14] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a NSA Headquarters, Fort Meade, Maryland highly classified intelligence team) inserts eavesdropping devices in high value targets (such Agency overview as presidential palaces or embassies).
    [Show full text]
  • ABSTRACT Title of Document: from the BELLY of the HUAC: the RED PROBES of HOLLYWOOD, 1947-1952 Jack D. Meeks, Doctor of Philos
    ABSTRACT Title of Document: FROM THE BELLY OF THE HUAC: THE RED PROBES OF HOLLYWOOD, 1947-1952 Jack D. Meeks, Doctor of Philosophy, 2009 Directed By: Dr. Maurine Beasley, Journalism The House Un-American Activities Committee, popularly known as the HUAC, conducted two investigations of the movie industry, in 1947 and again in 1951-1952. The goal was to determine the extent of communist infiltration in Hollywood and whether communist propaganda had made it into American movies. The spotlight that the HUAC shone on Tinsel Town led to the blacklisting of approximately 300 Hollywood professionals. This, along with the HUAC’s insistence that witnesses testifying under oath identify others that they knew to be communists, contributed to the Committee’s notoriety. Until now, historians have concentrated on offering accounts of the HUAC’s practice of naming names, its scrutiny of movies for propaganda, and its intervention in Hollywood union disputes. The HUAC’s sealed files were first opened to scholars in 2001. This study is the first to draw extensively on these newly available documents in an effort to reevaluate the HUAC’s Hollywood probes. This study assesses four areas in which the new evidence indicates significant, fresh findings. First, a detailed analysis of the Committee’s investigatory methods reveals that most of the HUAC’s information came from a careful, on-going analysis of the communist press, rather than techniques such as surveillance, wiretaps and other cloak and dagger activities. Second, the evidence shows the crucial role played by two brothers, both German communists living as refugees in America during World War II, in motivating the Committee to launch its first Hollywood probe.
    [Show full text]
  • The Role of European States in Us Drone Strikes
    DEADLY ASSISTANCE: THE ROLE OF EUROPEAN STATES IN US DRONE STRIKES Amnesty International is a global movement of more than 7 million people who campaign for a world where human rights are enjoyed by all. Our vision is for every person to enjoy all the rights enshrined in the Universal Declaration of Human Rights and other international human rights standards. We are independent of any government, political ideology, economic interest or religion and are funded mainly by our membership and public donations. © Amnesty International 2018 Cover: Women walk past a graffiti, denouncing strikes by US drones in Yemen, painted Except where otherwise noted, content in this document is licensed on a wall in Sana'a, the capital of Yemen. © REUTERS/Khaled Abdullah under a Creative Commons (attribution, non-commercial, no derivatives, international 4.0) licence. https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode For more information please visit the permissions page on our website: www.amnesty.org Where material is attributed to a copyright owner other than Amnesty International this material is not subject to the Creative Commons licence. First published in 2018 by Amnesty International Ltd Peter Benenson House, 1 Easton Street, London WC1X 0DW, UK Index: ACT 30/8151/2018 Original language: English amnesty.org CONTENTS EXECUTIVE SUMMARY 2 METHODOLOGY 10 1. THE US LETHAL DRONE PROGRAMME: A CONTROVERSIAL AND SECRET HISTORY 11 2. THE US LETHAL DRONE PROGRAMME UNDER THE OBAMA AND TRUMP ADMINISTRATIONS 14 3. US DRONE STRIKES UNDER INTERNATIONAL LAW 21 4. INTERNATIONAL LEGAL FRAMEWORK ON ASSISTANCE 28 5. ASSISTANCE PROVIDED BY THE UNITED KINGDOM 36 6.
    [Show full text]
  • Data Epistemologies / Surveillance and Uncertainty Sun Ha Hong University of Pennsylvania, [email protected]
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 1-1-2016 Data Epistemologies / Surveillance and Uncertainty Sun Ha Hong University of Pennsylvania, [email protected] Follow this and additional works at: http://repository.upenn.edu/edissertations Part of the Communication Commons, Other Sociology Commons, and the Philosophy of Science Commons Recommended Citation Hong, Sun Ha, "Data Epistemologies / Surveillance and Uncertainty" (2016). Publicly Accessible Penn Dissertations. 1766. http://repository.upenn.edu/edissertations/1766 This paper is posted at ScholarlyCommons. http://repository.upenn.edu/edissertations/1766 For more information, please contact [email protected]. Data Epistemologies / Surveillance and Uncertainty Abstract Data Epistemologies studies the changing ways in which ‘knowledge’ is defined, promised, problematised, legitimated vis-á-vis the advent of digital, ‘big’ data surveillance technologies in early twenty-first century America. As part of the period’s fascination with ‘new’ media and ‘big’ data, such technologies intersect ambitious claims to better knowledge with a problematisation of uncertainty. This entanglement, I argue, results in contextual reconfigurations of what ‘counts’ as knowledge and who (or what) is granted authority to produce it – whether it involves proving that indiscriminate domestic surveillance prevents terrorist attacks, to arguing that machinic sensors can know us better than we can ever know ourselves. The present work focuses on two empirical cases. The first is the ‘Snowden Affair’ (2013-Present): the public controversy unleashed through the leakage of vast quantities of secret material on the electronic surveillance practices of the U.S. government. The es cond is the ‘Quantified Self’ (2007-Present), a name which describes both an international community of experimenters and the wider industry built up around the use of data- driven surveillance technology for self-tracking every possible aspect of the individual ‘self’.
    [Show full text]