front cover of Access with Attitude
Access with Attitude
An Advocate’s Guide to Freedom of Information in Ohio
David Marburger
Ohio University Press, 2011

For those who find themselves in a battle for public records, Access with Attitude: An Advocate’s Guide to Freedom of Information in Ohio is an indispensable weapon. First Amendment lawyer David Marburger and investigative journalist Karl Idsvoog have written a simply worded, practical guide on how to take full advantage of Ohio’s so-called Sunshine Laws.

Journalists, law firms, labor unions, private investigators, genealogists, realty companies, banks, insurers—anyone who regularly needs access to publicly held information—will find this comprehensive and contentious guide to be invaluable. Marburger, who drafted many of the provisions that Ohio adopted in its open records law, and coauthor Idsvoog have been fighting for broader access to public records their entire careers. They offer field-tested tips on how to avoid “no,” and advise readers on legal strategies if their requests for information go unmet. Step by step, they show how to avoid delays and make the law work.

Whether you’re a citizen, a nonprofit organization, a journalist, or an attorney going after public records, Access with Attitude is an essential resource.

[more]

logo for University of Minnesota Press
Edited Clean Version
Technology and the Culture of Control
Raiford Guins
University of Minnesota Press, 2009

front cover of The Eternal Criminal Record
The Eternal Criminal Record
James B. Jacobs
Harvard University Press, 2015

For over sixty million Americans, possessing a criminal record overshadows everything else about their public identity. A rap sheet, or even a court appearance or background report that reveals a run-in with the law, can have fateful consequences for a person’s interactions with just about everyone else. The Eternal Criminal Record makes transparent a pervasive system of police databases and identity screening that has become a routine feature of American life.

The United States is unique in making criminal information easy to obtain by employers, landlords, neighbors, even cyberstalkers. Its nationally integrated rap-sheet system is second to none as an effective law enforcement tool, but it has also facilitated the transfer of ever more sensitive information into the public domain. While there are good reasons for a person’s criminal past to be public knowledge, records of arrests that fail to result in convictions are of questionable benefit. Simply by placing someone under arrest, a police officer has the power to tag a person with a legal history that effectively incriminates him or her for life.

In James Jacobs’s view, law-abiding citizens have a right to know when individuals in their community or workplace represent a potential threat. But convicted persons have rights, too. Jacobs closely examines the problems created by erroneous record keeping, critiques the way the records of individuals who go years without a new conviction are expunged, and proposes strategies for eliminating discrimination based on criminal history, such as certifying the records of those who have demonstrated their rehabilitation.

[more]

front cover of Foundations of Information Law
Foundations of Information Law
Paul T. Jaeger, Jonathan Lazar, Ursula Gorham, and Natalie Greene Taylor
American Library Association, 2023
Learning the basic concepts of information law and the many legal concepts that come into play in the field of librarianship can seem like an overwhelming endeavor. Drawing upon the authors’ unique backgrounds in both law and librarianship, this text is designed to empower readers to understand, rather than be intimidated by, the law. It melds essential context, salient examples of best practices, and stimulating discussions to illuminate numerous key legal and social issues directly related to the information professions. Helping readers better understand the role of law in their work, this primer
  • discusses information law as part of a continuum of interrelated issues rather than an assortment of discrete topics;
  • examines information law in the context of different types of libraries;
  • delves into the manifold legal issues raised when interacting with patrons and communities, from intellectual freedom topics like censorship and public activities in the library to the legal issues surrounding materials and information access;
  • elucidates operational and management legal issues, including library security, interacting with law enforcement, advocacy, lobbying, funding, human resources, and liability;
  • promotes literacy of the law, its structures, and its terminology as a professional skill;
  • gives readers the tools to find and understand different sources of legal authority and demonstrates how to interpret them when they conflict; and
  • explores information law as a national and cross-national issue.
[more]

front cover of Law, Liberty, and the Pursuit of Terrorism
Law, Liberty, and the Pursuit of Terrorism
Roger Douglas
University of Michigan Press, 2014

Roger Douglas compares responses to terrorism by five liberal democracies—the United States, the United Kingdom, Canada, Australia, and New Zealand—over the past 15 years. He examines each nation’s development and implementation of counterterrorism law, specifically in the areas of information-gathering, the definition of terrorist offenses, due process for the accused, detention, and torture and other forms of coercive questioning.

Douglas finds that terrorist attacks elicit pressures for quick responses, often allowing national governments to accrue additional powers. But emergencies are neither a necessary nor a sufficient condition for such laws, which may persist even after fears have eased. He argues that responses are influenced by both institutional interests and prior beliefs, and complicated when the exigencies of office and beliefs point in different directions. He also argues that citizens are wary of government’s impingement on civil liberties and that courts exercise their capacity to restrain the legislative and executive branches. Douglas concludes that the worst antiterror excesses have taken place outside of the law rather than within, and that the legacy of 9/11 includes both laws that expand government powers and judicial decisions that limit those very powers.

[more]

front cover of Legal Records at Risk
Legal Records at Risk
A Strategy for Safeguarding our Legal Heritage
Clare Cowling
University of London Press, 2019
Why do so few institutions in the legal sector have professional records managers or archivists on their staff? This book is the culmination of a three year project by experienced archivist and records managers on private sector legal records at risk in England at Wales. It summarises the work of the Legal Records at Risk (LRAR) project and its predecessors, diagnoses the problems of preservation of archives in the legal sector in England and Wales and outlines a national strategy for such records.
[more]

front cover of Net Neutrality and the Battle for the Open Internet
Net Neutrality and the Battle for the Open Internet
Danny Kimball
University of Michigan Press, 2022
“Net neutrality,” a dry but crucial standard of openness in network access, began as a technical principle informing obscure policy debates but became the flashpoint for an all-out political battle for the future of communications and culture. Net Neutrality and the Battle for the Open Internet is a critical cultural history of net neutrality that reveals how this intentionally “boring” world of internet infrastructure and regulation hides a fascinating and pivotal sphere of power, with lessons for communication and media scholars, activists, and anyone interested in technology and politics. While previous studies and academic discussions of net neutrality have been dominated by legal, economic, and technical perspectives, Net Neutrality and the Battle for the Open Internet offers a humanities-based critical theoretical approach, telling the story of how activists and millions of everyday people, online and in the streets, were able to challenge the power of the phone and cable corporations that historically dominated communications policy-making to advance equality and justice in media and technology.
[more]

front cover of Passwords
Passwords
Philology, Security, Authentication
Brian Lennon
Harvard University Press, 2018

Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.

Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war.

Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.

[more]

logo for Society of American Archivists
Privacy and Confidentiality Perspectives
Archivists and Archival Records
Menzi Behrnd-Klodt
Society of American Archivists, 2005
A diverse selection of thoughtful and provocative essays that explore the legal, ethical, administrative, and institutional considerations that shape archival debates concerning the administration of access to records containing personal information.
[more]

front cover of Restricted Data
Restricted Data
The History of Nuclear Secrecy in the United States
Alex Wellerstein
University of Chicago Press, 2021
The first full history of US nuclear secrecy, from its origins in the late 1930s to our post–Cold War present.

The American atomic bomb was born in secrecy. From the moment scientists first conceived of its possibility to the bombings of Hiroshima and Nagasaki and beyond, there were efforts to control the spread of nuclear information and the newly discovered scientific facts that made such powerful weapons possible. The totalizing scientific secrecy that the atomic bomb appeared to demand was new, unusual, and very nearly unprecedented. It was foreign to American science and American democracy—and potentially incompatible with both. From the beginning, this secrecy was controversial, and it was always contested. The atomic bomb was not merely the application of science to war, but the result of decades of investment in scientific education, infrastructure, and global collaboration. If secrecy became the norm, how would science survive? 

Drawing on troves of declassified files, including records released by the government for the first time through the author’s efforts, Restricted Data traces the complex evolution of the US nuclear secrecy regime from the first whisper of the atomic bomb through the mounting tensions of the Cold War and into the early twenty-first century. A compelling history of powerful ideas at war, it tells a story that feels distinctly American: rich, sprawling, and built on the conflict between high-minded idealism and ugly, fearful power. 
[more]

front cover of Unsettling Archival Research
Unsettling Archival Research
Engaging Critical, Communal, and Digital Archives
Edited by Gesa E. Kirsch, Romeo García, Caitlin Burns Allen, and Walker P. Smith
Southern Illinois University Press, 2023
HONORABLE MENTION, 2024 Conference on College Composition and Communication Outstanding Book Award in Edited Collection!

A collection of accessible, interdisciplinary essays that explore archival practices to unsettle traditional archival theories and methodologies.
 
What would it mean to unsettle the archives? How can we better see the wounded and wounding places and histories that produce absence and silence in the name of progress and knowledge? Unsettling Archival Research sets out to answer these urgent questions and more, with essays that chart a more just path for archival work.
 
Unsettling Archival Research is one of the first publications in rhetoric and writing studies dedicated to scholarship that unsettles disciplinary knowledge of archival research by drawing on decolonial, Indigenous, antiracist, queer, and community perspectives. Written by established and emerging scholars, essays critique not only the practices, ideologies, and conventions of archiving, but also offer new tactics for engaging critical, communal, and digital archiving within and against systems of power. Contributors reflect on efforts to unsettle and counteract racist, colonial histories, confront the potentials and pitfalls of common archival methodologies, and chart a path for the future of archival research otherwise. Unsettling Archival Research intervenes in a critical issue: whether the discipline’s assumptions about the archives serve or fail the communities they aim to represent and what can be done to center missing voices and perspectives. The aim is to explore the ethos and praxis of bearing witness in unsettling ways, carried out as a project of queering and/or decolonizing the archives.
 
Unsettling Archival Research takes seriously the rhetorical force of place and wrestles honestly with histories that still haunt our nation, including the legacies of slavery, colonial violence, and systemic racism.
 
[more]

front cover of Zero Days, Thousands of Nights
Zero Days, Thousands of Nights
The Life and Times of Zero-Day Vulnerabilities and Their Exploits
Lillian Ablon
RAND Corporation, 2017
Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
[more]


Send via email Share on Facebook Share on Twitter