For those who find themselves in a battle for public records, Access with Attitude: An Advocate’s Guide to Freedom of Information in Ohio is an indispensable weapon. First Amendment lawyer David Marburger and investigative journalist Karl Idsvoog have written a simply worded, practical guide on how to take full advantage of Ohio’s so-called Sunshine Laws.
Journalists, law firms, labor unions, private investigators, genealogists, realty companies, banks, insurers—anyone who regularly needs access to publicly held information—will find this comprehensive and contentious guide to be invaluable. Marburger, who drafted many of the provisions that Ohio adopted in its open records law, and coauthor Idsvoog have been fighting for broader access to public records their entire careers. They offer field-tested tips on how to avoid “no,” and advise readers on legal strategies if their requests for information go unmet. Step by step, they show how to avoid delays and make the law work.
Whether you’re a citizen, a nonprofit organization, a journalist, or an attorney going after public records, Access with Attitude is an essential resource.
For over sixty million Americans, possessing a criminal record overshadows everything else about their public identity. A rap sheet, or even a court appearance or background report that reveals a run-in with the law, can have fateful consequences for a person’s interactions with just about everyone else. The Eternal Criminal Record makes transparent a pervasive system of police databases and identity screening that has become a routine feature of American life.
The United States is unique in making criminal information easy to obtain by employers, landlords, neighbors, even cyberstalkers. Its nationally integrated rap-sheet system is second to none as an effective law enforcement tool, but it has also facilitated the transfer of ever more sensitive information into the public domain. While there are good reasons for a person’s criminal past to be public knowledge, records of arrests that fail to result in convictions are of questionable benefit. Simply by placing someone under arrest, a police officer has the power to tag a person with a legal history that effectively incriminates him or her for life.
In James Jacobs’s view, law-abiding citizens have a right to know when individuals in their community or workplace represent a potential threat. But convicted persons have rights, too. Jacobs closely examines the problems created by erroneous record keeping, critiques the way the records of individuals who go years without a new conviction are expunged, and proposes strategies for eliminating discrimination based on criminal history, such as certifying the records of those who have demonstrated their rehabilitation.
Roger Douglas compares responses to terrorism by five liberal democracies—the United States, the United Kingdom, Canada, Australia, and New Zealand—over the past 15 years. He examines each nation’s development and implementation of counterterrorism law, specifically in the areas of information-gathering, the definition of terrorist offenses, due process for the accused, detention, and torture and other forms of coercive questioning.
Douglas finds that terrorist attacks elicit pressures for quick responses, often allowing national governments to accrue additional powers. But emergencies are neither a necessary nor a sufficient condition for such laws, which may persist even after fears have eased. He argues that responses are influenced by both institutional interests and prior beliefs, and complicated when the exigencies of office and beliefs point in different directions. He also argues that citizens are wary of government’s impingement on civil liberties and that courts exercise their capacity to restrain the legislative and executive branches. Douglas concludes that the worst antiterror excesses have taken place outside of the law rather than within, and that the legacy of 9/11 includes both laws that expand government powers and judicial decisions that limit those very powers.
Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.
Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war.
Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.
Browse our collection.
See BiblioVault's publisher services.
Files for college accessibility offices.
BiblioVault ® 2001 - 2023
The University of Chicago Press