Search:

Moving the bar : my life as a radical lawyer / by Ratner, Michael,1943-2016,author.(CARDINAL)636114;
Truth-tellers -- In the beginning -- Days of law and rage -- Working for the judge -- In the center of the seventies -- The Reagan years -- The end of the twentieth century -- Guantánamo -- New projects -- A visit to Palestine -- Viva Cuba libre!"Michael Ratner (1943-2016) was one of America's leading human rights lawyers. He worked for more than four decades at the Center for Constitutional Rights (CCR) becoming first the Director of Litigation and then the President of what Alexander Cockburn called "a small band of tigerish people." He was also the President of the National Lawyers Guild. Ratner handled some of the most significant cases In American history. This book tells why and how he did it. His last case, which he worked on until he died, was representing truth-telling whistleblower and now political prisoner Julian Assange, the editor of WikiLeaks. Ratner "moved the bar" by organizing some 600 lawyers to successfully defend habeas corpus, that is, the ancient right of someone accused of a crime to have a lawyer and to be brought before a judge. Michael had a piece of paper taped on the wall next to his desk at the CCR. It read: 4 key principles of being a radical lawyer: 1. Do not refuse to take a case just because it is long odds of winning in court. 2. Use cases to publicize a radical critique of US policy and to promote revolutionary transformation. 3. Combine legal work with political advocacy. 4. Love people. Compelling and instructive, Moving the Bar is an indispensable manual for the next generation of activists and their lawyers"--Publisher's description.
Subjects: Autobiographies.; Ratner, Michael, 1943-2016.; Civil rights lawyers; Radicals;
Available copies: 1 / Total copies: 1
unAPI

Architects of the information age / by Curley, Robert,1955-(CARDINAL)497361;
Includes bibliographical references (pages 149-152) and index.
Subjects: Biographies.; Computer scientists; Telecommunications engineers;
Available copies: 1 / Total copies: 1
unAPI

The new digital age : reshaping the future of people, nations and business / by Schmidt, J. Eric,1955-(CARDINAL)405225; Cohen, Jared,1981-(CARDINAL)482325;
Includes bibliographical references (pages 263-301) and index.Our Future Selves -- The Future of Identity, Citizenship and Reporting -- The Future of States -- The Future of Revolution -- The Future of Conflict, Combat and Intervention -- The Future of Reconstruction -- The Future of Terrorism.In collaboration, two leading global thinkers from in technology and foreign affairs from Google give readers their widely anticipated, transformational vision of the future: a world where everyone is connected, a world full of challenges and benefits that are ours to meet and to harness. With their combined knowledge and experiences, the authors are uniquely positioned to take on some of the toughest questions about our future: Who will be more powerful in the future, the citizen or the state? Will technology make terrorism easier or harder to carry out? What is the relationship between privacy and security, and how much will we have to give up to be part of the new digital age? In this they combine observation and insight to outline the promise and peril awaiting us in the coming decades. This is a forward-thinking account of where our world is headed and what this means for people, states and businesses. With the confidence and clarity of visionaries, the authors illustrate just how much we have to look forward to, and beware of, as the greatest information and technology revolution in human history continues to evolve. On individual, community and state levels, across every geographical and socioeconomic spectrum, they reveal the dramatic developments both good and bad, that will transform both our everyday lives and our understanding of self and society, as technology advances and our virtual identities become more and more fundamentally real. As their nuanced vision of the near future unfolds, an urban professional takes his driverless car to work, attends meetings via hologram and dispenses housekeeping robots by voice; a Congolese fisherwoman uses her smart phone to monitor market demand and coordinate sales (saving on costly refrigeration and preventing overfishing); the potential arises for "virtual statehood" and "Internet asylum" to liberate political dissidents and oppressed minorities, but also for tech-savvy autocracies (and perhaps democracies) to exploit their citizens' mobile devices for ever more ubiquitous surveillance. Along the way, we meet a cadre of international figures, including Julian Assange, who explain their own visions of our technology-saturated future. This book is an analysis of how our hyper-connected world will soon look.
Subjects: Digital electronics; Digital electronics; Digital media; Digital media; Information technology; Information technology; Computers and civilization; Technology and civilization;
Available copies: 8 / Total copies: 11
unAPI

State of silence : the Espionage Act and the rise of America's secrecy regime / by Lebovic, Sam,1981-author.(CARDINAL)878133;
Includes bibliographical references and index.The fear of spies -- The speech crimes of Eugene Debs -- 1919, year of the bombs -- The creeping scope of the secrecy laws -- The Nazi spy who wasn't -- Red herrings, or, the Cold War spy games -- Missile gaps -- Papers from the Pentagon -- Long live the secrecy state -- Whistleblowers on the War on Terror -- Conclusion : goodbye to the Espionage Act?"The Espionage Act was passed in 1917 to prosecute spies and critics during World War I. And yet, after a century of piecemeal revisions, the Espionage Act still forms the basis of our national security architecture today - a tool that lets the government keep an untold amount of information secret, without ever justifying the need for that secrecy. In State of Silence, political historian Sam Lebovic uncovers the troubling history of the Espionage Act and the shaky foundations on which our security state was built. The Espionage Act began as a series of vague statutes. Over time and aided by interventions from the executive branch and the courts, it became the basis of a patchwork system for protecting state secrets. Early drafts of the Act gave the president the authority to stop the presses. That provision was struck down after public outcry over freedom of speech, but the resulting legal ambiguities left room for decades of distortion as lawmakers leveraged Cold War paranoia into ever-tightening security. The resulting system for classifying information, Lebovic points out, is absurdly cautious: nearly 80 million documents are classified each year, and the system costs the government more than $18 billion annually to maintain. Aside from being costly, this system is shrouded in secrecy, hiding information from citizens in a way that Lebovic argues is fundamentally antithetical to our democracy. When individuals do try to make this information public, they're punished for it. As Lebovic shows, prosecuting whistleblowers (instead of journalists) has been built into our national security system from the beginning. Far before Julian Assange and Chelsea Manning, he shares with us the near-forgotten story of Colonel John Nickerson, the first whistleblower prosecuted under the Espionage Act in 1956--and a proud Army man who had no idea that his sharing of information could be considered illegal. Finally, Lebovic calls for broad and sweeping reform, proposing a new approach to securing state secrets, one that places the interests of the people first from the very beginning. Shedding new light on the bloated governmental security apparatus that's weighing our democracy down, State of Silence offers the definitive history of America's turn toward secrecy--and its staggering human costs"--
Subjects: United States.; Espionage; Secrecy; Official secrets; Disclosure of information; Whistle blowing; War on Terrorism, 2001-2009.; Transparency (Ethics) in government; Secrecy.;
Available copies: 4 / Total copies: 5
unAPI

Privacy rights in the Digital Age / by Kirtley, Jane E.,editor.(CARDINAL)202631; Shally-Jensen, Michael,editor.(CARDINAL)682936;
Includes bibliographical references (pages 705-737) and index.Customer proprietary network information (CPNI) -- The Cyber Intelligence Sharing and Protection Act (CISPA) H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress) -- Cybersecurity -- Dark web -- Data Breach Notification Laws -- Data breaches -- Data brokers -- Data harvesting -- Data protection regimes -- Data science -- Debt collection -- Defence and Security Media Advisory Committee (DSMA Committee) -- Descartes, Rene -- DNA databases -- Do-not-track legislation -- Douglas, William Orville -- Doxing -- Driver's Privacy Protection Act of 1994 (DDPA), 18 U.S.C. 2271-2725 -- Drones -- Drug and alcohol testing -- Economic arguments for privacy rights -- Education Data Exchange Network (EDEN) -- Educational setting, privacy in an -- Electoral interference and privacy -- Electronic Communications Privacy Act (ECPA), 18 U.S.C. 2510 et seq -- Electronic Frontier Foundation -- Electronic Privacy Information Center (EPIC) -- Electronic surveillance -- Email -- Employment eligibility verification systems -- End-of-life care -- The Enlightenment -- Espionage Act -- Facebook -- Facial recognition technology -- Fair Credit Reporting Act -- Fair information practice principles -- Family Educational Rights and Privacy Act -- Federal Communications Commission -- Federal Communications Commission v. AT&T Inc., 562 U.S. 397 (2011) -- Federal Trade Commission -- Financial information, privacy rights in -- First Amendment to the U.S. Constitution -- Florida Star v. B.J.F., 491 U.S. 524 (1989) -- Foreign Intelligence Surveillance Act of 1978 -- Foreign Intelligence Surveillance Court -- Fourth Amendment to the U.S. Constitution -- Freedom of Information Act --Genome sequencing -- General Data Protection Regulation -- Global positioning system (GPS) tracking -- Godkin, Edwin Lawrence (1831-1902) -- Gonzaga University v. Doe, 536 U.S. 273 (2002) -- Google -- Government Communications Headquarters (GCHQ) -- Gramm-Leach-Bliley Act -- Greenwald, Glenn (1967-) -- Griswold v. State of Connecticut 381 U.S. 479 (1965) -- Hacking, computer -- Harassment -- Health care information -- Health Insurance Portability and Accountability Act -- HIV testing -- Home, privacy of the -- Homeland Security, U.S. Department of -- Homeless people, right to privacy of -- Hustler Magazine v. Falwell, 485 U.S. 46 (1988) -- Identity theft -- In re iPhone Application Litigation, 844 F.Supp.2d 1040 (E.D. Cal. 2012) -- Information Awareness Office (IAO) -- Informative asymmetries -- Instagram -- Integrated Automated Fingerprint Identification System (IAFIS) -- Intellectual property -- International Center for Information Ethics (ICIE) -- Internet cafes -- Internet Service Providers and privacy -- Interrogations -- Invasion of privacy -- Journalism and the protection of sources -- Katz v. United States, 389 U.S. 347 (1967) -- Kyllo v. United States, 533 U.S. 27 (2001) -- Law enforcement -- Lawrence v. Texas, 539 U.S. 558 (2003) -- Legal evolution of privacy rights in the United States -- License plate reader system -- Locke, John (1632-1704) -- Magic Lantern -- Malware -- Manning, Chelsea Elizabeth -- Mapp v. Ohio, 367 U.S. 495 (1961) -- Marketing -- Mass media -- Medical confidentiality, privacy right to -- Metadata -- Meyer v. Nebraska, 262 U.S. 390 (1923) -- Migrants and refugees in the United States, privacy rights of -- Mobile devices -- Model legislation on privacy -- National Archives and Records Aministration v. Favish, 541 U.S. 157 (2004) -- National Instant Criminal Background Check System (NICS) -- National Security Agency (NSA) -- New Jersey v. TLO, 469 U.S. 325 (1985) -- New York Times Co. v. Sullivan, Abernathy, et. al., 376 U.S. 254 (1964) -- New leaks -- Next Generation Identification (NGI) --Obscenity -- Official Secrets Act -- Olmstead v. United States, 277 U.S. 438 (1928) -- Online privacy and protection -- Open data movement -- Open source -- Patient Safety and Quality Improvement Act of 2005 (PSQIA) -- Personal autonomy -- Philosophical basis of privacy -- The Plame Affair -- Poitras, Laura -- Pornography -- PRISM -- Privacy Act of 1974 -- Privacy and Civil Liberties Oversight Board (PCLOB) -- Privacy laws, federal -- Privacy laws, state -- Privacy Protection Act, 42 U.S.C. section aa et seq --Privacy settings -- Privacy torts -- Privacy sphere -- Prosser, William Lloyd (1898-1972) -- Protect America Act of 2007 -- Public morality -- Public records -- Publicity, right of -- Reno v. Condon, 528 U.S. 141 (2000) -- Repository for Individuals of Special Concern (RICS) -- Right to be forgotten -- Right to be let alone -- Riley v. California, 134 S. Ct. 2473 (2014) -- Safe Harbor -- Scientific and medical data sharing -- Search engines -- Search warrants -- Security flaws, computers -- September 11 -- Sexting -- Sexual orientation -- Smart moves -- Smartphones -- Snapchat -- Snooper's Charter -- Snowden, Edward Joseph -- Social media -- Social media profiling -- Social networking technologies -- Social Security numbers -- (SSNs) -- Sorrell v. IMS Health, 131 S. Ct. 2653 (2011) -- Spam -- Spyware -- Stalking -- Stanley v. Georgia, 394 U.S. 557 (1969) -- Stop and frisk policy -- Stored Communications Act (SCA) -- Subpoenas -- Supreme Court of the United States -- Surveillance cameras -- Telephones -- Tempora -- Terrorism and privacy -- Text messaging --- Theoretical basis for privacy -- Time, Inc. v. Hill, 385 U.S. 374 (1967) -- Twitter --Publisher's Note -- Contributors -- Editor's Introduction -- Cross-Cultural Perspectives on Privacy -- Abortion -- Administrative searches -- Airport security systems -- Amazon -- American Civil Liberties Union (ACLU) -- Anonymity and anonymizers -- Anti-Forensics -- APEC Cross Border Privacy Rules System -- Apple, Inc -- Apps -- Assange, Julian -- Automated teller machines (ATMs) -- Background checks -- Bartnicki et ano v. Vopper, et al., 532 U.S. 514 (2001) -- Beliefs, privacy of -- Big data -- Bioethics -- Biometric Center of Excellence -- Biometric Optical Surveillance System -- Biometrics -- Blockchain technologies -- Body, privacy of the -- Border Security, Immigration Reform, and Privacy -- Bots -- Boundless Informant -- Brain-computer interfacing (BCI) -- Brandeis, Louis Dembitz -- Caller ID -- Cantrell v. Forest City Publishing Company, 419 U.S. 245 (1974) -- Cellphones -- Center for Democracy and Technology (CDT) -- Central Security Service -- Children's Online Privacy Protection Act, 15 U.S.C. 6501-6508 -- Children's right to privacy -- City of Ontario, Cal. v. Quon, 506 U.S. 746 (2010) -- City of Sherman v. Otis Henry, 928 S.W.2d 464 (1996) -- Cloud computing -- Computer Fraud and Abuse Act (CFAA) -- Computer harvesting -- Computers and privacy -- Confidential informants -- Confidential Information Protection and Statistical Efficiency Act of 2002 -- Consent -- Constitutional law -- Consumer privacy -- Cookies -- Cox Broadcasting Corporation v. Cohn, 420 U.S. 469 (1975) -- Credit and debit cards -- Credit reporting agencies (CRAs) -- Criminal justice (criminal procedure) -- Cruzan v. Director, Missouri Department of Health, 497 U.S. 261 (1990) --U.S. Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749 (1989) -- U.S. Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749 (1989) -- Unenumerated constitutional right, privacy as an -- United States v. Jones, 132 S. Ct. 945 (2012) -- USA FREEDOM Act, Pub. L No. 114-23 -- USA PATRIOT Act, Pub. L. No. 107-52 -- Video Privacy Protection Act (18 USCA section 2710) -- Voting and privacy rights -- Warren, Earl -- Washington v. Glucksberg, 521 U.S. 702 (1997) -- "We are watching you" Act -- Wearable technology -- Whistleblowers -- WikiLeaks -- Wikipedia -- Wilson v. Layne, 526 U.S. 603 (1999) -- Wiretapping -- Workplace, privacy in the -- Zacchini v. Scripps-Howard Broadcasting Co., 433 U.S. 562 (1977).Discusses the practical, political, psychological, and philosophical challenges of technological advances have changed the landscape of traditional notions of privacy.
Subjects: Encyclopedias.; Privacy, Right of; Electronic surveillance; Computer security; Data protection; Electronic government information;
Available copies: 1 / Total copies: 1
unAPI