scholarly journals Before and After Snowden

2015 ◽  
Vol 13 (2) ◽  
pp. 132-138 ◽  
Author(s):  
David Murakami Wood ◽  
Steve Wright

This editorial for the Surveillance and Security Intelligence After Snowden issue provides a very brief history of National Security Agency whistleblowers and investigations before Edward Snowden, and sets the current wave of NSA whistleblowing in the context of a growing demand for openness, transparency and accountability opposing the renewed closures and secrecy of the War on Terror. It also provides some links for further research and reading.

2016 ◽  
Vol 52 (1) ◽  
pp. 183-200
Author(s):  
Sarah L. Townsend

This article examines the post-imperial migration and racial anxieties that underwrite fantasies of national security in postwar British fiction. Focusing on the autocratic educational institutions featured in Muriel Spark’s The Prime of Miss Jean Brodie (1961) and Kazuo Ishiguro’s Never Let Me Go (2005), the article identifies the school as a fraught ideological site wherein conceptions of national insularity collide with the complex pressures of British globalization. Spark’s Marcia Blaine School and Ishiguro’s Hailsham masquerade as microcosms of a homogeneous British nation only through a rigorous process of racial redaction. By adapting Joseph Slaughter’s concept of the “vanishing point”, the article traces two nonwhite immigrant characters whose brief, silent appearances unsettle the novels’ optics of power, thereby intimating a vast history of racial violence disavowed in the name of bodily, cultural, and political security. Connecting the novels’ vanishing acts to the discursive lacunae perpetuated in the war on terror, the article also considers the imperial residues that continue to shape the contemporary security state.


Author(s):  
B. Jack Copeland

The American ENIAC is customarily regarded as the first electronic computer. In this fascinating volume, Jack Copeland rewrites the history of computer science, arguing that in reality Colossus--the giant computer built in Bletchley Park by the British secret service during World War II--predates ENIAC by two years. Until very recently, much about the Colossus machine was shrouded in secrecy, largely because the code-breaking algorithms employed during World War II remained in use by the British security services until a short time ago. Copeland has brought together memoirs of veterans of Bletchley Park--the top-secret headquarters of Britain's secret service--and others who draw on the wealth of declassified information to illuminate the crucial role Colossus played during World War II. A must read for anyone curious about code-breaking or World War II espionage, Colossus offers a fascinating insider's account of the world's first giant computer, the great-great-grandfather of the massive computers used today by the CIA and the National Security Agency.


2016 ◽  
Author(s):  
Jennifer Urban

*Abstract: *This case presents pressing questions regarding the executive's power to collect, store, and use Americans' telephony and other personal data for the purposes of conducting surveillance operations.In the wake of recent disclosures revealing National Security Agency data collection programs, the First Unitarian Church of Los Angeles and 21 other membership and political advocacy organizations filed this lawsuit to challenge the NSA's collection of telephony data as an infringement of their members' First and Fourth Amendment rights.In this amicus brief, experts in the history of American surveillance -- James Bamford, author of The Puzzle Palace; Peter Fenn, who served as Washington Chief of Staff for Senator Frank Church and as a staff member to the Senate Intelligence Committee; and Dr. Loch Johnson, who served as special assistant to the Church Committee chair and as staff director of the House Subcommittee on Intelligence Oversight -- explain the historical parallels between the executive surveillance programs that are presently coming to light and the development of abusive surveillance practices from the 1940s to the 1970s.All amici were directly involved in the comprehensive review of twentieth-century American intelligence operations completed by the Church Committee in the 1970s, giving them a uniquely thorough understanding of these parallels.Drawing from the experts’ extensive knowledge, the brief explains the clear parallels between the development and growth of the abusive practices of the mid-twentieth century -- when American intelligence agencies helped conduct politically motivated surveillance of Americans ranging from ordinary teachers, journalists and peace activists to civil rights leaders, members of Congress, and a Supreme Court justice -- and today’s vast surveillance programs. History shows that abusive surveillance does not require bad actors to grow and flourish: instead, it is the natural outgrowth of too much secrecy and too little oversight by other branches of government.In light of this clear historical pattern, the brief argues that the court should carefully apply existing legal limits on the government’s surveillance powers to address the risks posed by the executive branch and the intelligence agencies’ claims to expansive power to determine the limits of their own activities.Available at SSRN: http://ssrn.com/abstract=2353719


2018 ◽  
Vol 12 (2) ◽  
pp. 2713-2723
Author(s):  
Jamil Ahmed Khan

Terrorism from the longer time has attracted many of the experts in history and present times to work on it with a quest to find out the causes and look for its cure. This article, I have made an endeavor to discuss terrorism from different aspects examining the history of the creation of different terrorist organizations; the research analyzes the latest Talibanization phenomenon. Before and after the 9/11 tragedy, there had been many discussions that seemed to have pondered upon “Good Talibans” and “Bad Talibans”, the study intends to make sense to both these terminologies by giving each of it sufficient time to have a clear understanding by examining through rich literature that illustrates both these terminologies candidly and categorically. The work on this topic is one of its kind that is unbiased that not only explains the mistakes being committed by the countries where the rogue elements like Al-Qaida and Taliban prevailed or are still prevailing, Though Afghanistan is in the focus but it has also pointed out the wrong policy decisions in different phases of time by the United States of America during the fight against terrorism.


Author(s):  
Hariyadi DM ◽  
Athiyah U ◽  
Hendradi E ◽  
Rosita N ◽  
Erawati T ◽  
...  

The prevention of Diabetic Mellitus (DM) and its complications is the main aim of this study, in addition to the training of lotion foot care application and the development of small scale industry. The research team delivered knowledge in the form of training on Diabetic Mellitus, healthy food, treatment and prevention of complications, and small-scale production of cosmetic products. The aim of this study was to determine the correlation between training on diabetic and lotion foot care application as preventive measures against diabetic complications on the patient's blood glucose levels in the community of residents in Banyuurip Jaya, Surabaya. It was expected from this training that the knowledge of the residents increases and people living with diabetic undergo lifestyle changes and therefore blood sugar levels can be controlled. The parameters measured in this research were blood glucose levels, the anti diabetic drug types consumed, and compliance on diabetics. This study used the data taken from 60 patients with DM over a period of one month. Questionnaires and log books was used to retrieve data and changes in blood glucose levels in diabetic patients. The results showed the demographic data of patients with type 2 diabetic of 85% female and 15% male, with the range of patients aged of 61-70 years of 46.67% and had history of diabetic (90%). The history of drugs consumed by respondents was anti diabetic drugs such as metformin (40%), glimepiride (33.37%) and insulin (6.67%). In addition, the increased knowledge of DM patients after being given the training compared to before training was shown in several questions in the questionnaire. A statistical analysis using t-test analyzed a correlation between training provided in order to enhance understanding of the patient, as well as correlation with blood glucose levels. A paired T-test showed that there was a relationship between the knowledge of trainees before and after training (p less than 0.05). An interesting result was that there was no relationship between blood glucose levels before and after training provided (p> 0.05).


Author(s):  
Bashkim Selmani ◽  
Bekim Maksuti

The profound changes within the Albanian society, including Albania, Kosovo and Macedonia, before and after they proclaimed independence (in exception of Albania), with the establishment of the parliamentary system resulted in mass spread social negative consequences such as crime, drugs, prostitution, child beggars on the street etc. As a result of these occurred circumstances emerged a substantial need for changes within the legal system in order to meet and achieve the European standards or behaviors and the need for adoption of many laws imported from abroad, but without actually reading the factual situation of the psycho-economic position of the citizens and the consequences of the peoples’ occupations without proper compensation, as a remedy for the victims of war or peace in these countries. The sad truth is that the perpetrators not only weren’t sanctioned, but these regions remained an untouched haven for further development of criminal activities, be it from the public state officials through property privatization or in the private field. The organized crime groups, almost in all cases, are perceived by the human mind as “Mafia” and it is a fact that this cannot be denied easily. The widely spread term “Mafia” is mostly known around the world to define criminal organizations.The Balkan Peninsula is highly involved in these illegal groups of organized crime whose practice of criminal activities is largely extended through the Balkan countries such as Kosovo, Albania, Macedonia, Serbia, Bosnia, Croatia, Montenegro, etc. Many factors contributed to these strategic countries to be part of these types of activities. In general, some of the countries have been affected more specifically, but in all of the abovementioned countries organized crime has affected all areas of life, leaving a black mark in the history of these states.


Author(s):  
Rebecca Sanders

This chapter explores shifting patterns of intelligence surveillance in the United States. The Fourth Amendment protects Americans from unreasonable search and seizure without a warrant, but foreign spying is subject to few constraints. During the Cold War, surveillance power was abused for political purposes. Operating in a culture of secrecy, American intelligence agencies engaged in extensive illegal domestic spying. The intelligence scandals of the 1970s revealed these abuses, prompting new laws, notably the Foreign Intelligence Surveillance Act. Fearing further recrimination, the national security establishment increasingly demanded legal cover. After 9/11, Congress expanded lawful surveillance powers with the PATRIOT Act. Meanwhile, the Bush administration directed the National Security Agency to conduct warrantless domestic wiretapping. To justify this program, officials sought to redefine unconstrained foreign surveillance to subsume previously protected communications. The Obama administration continued to authorize mass surveillance and data mining programs and legally rationalize bulk collection of Americans’ data.


Sign in / Sign up

Export Citation Format

Share Document