The Third Troll Prerequisite, Part 1

Cyberwar ◽  
2020 ◽  
pp. 91-104
Author(s):  
Kathleen Hall Jamieson

Chapter 5 examines the third prerequisite for Russian stolen or generated content to influence the U.S. election: did it address the interests of vital constituencies whose mobilization or demobilization was critical to a Trump Electoral College victory? The chapter details how troll messaging and the release of hacked content aimed to influence two key traditional Republican voting blocs that Trump needed in order to win: white Christians and veterans. Jamieson explores the trolls’ appeals to evangelical Protestants and conservative Catholics, including the use of a hacked exchange involving a Clinton communications director. In a similar fashion, the chapter shows how the trolls worked to mobilize veterans by attacking Clinton’s record on military affairs.

2017 ◽  
Vol 63 (7) ◽  
pp. 856-887 ◽  
Author(s):  
Pamela S. Shockley-Zalabak ◽  
Sherwyn P. Morreale ◽  
Carmen Stavrositu

This study explored voters’ perceptions of Hillary Clinton and Donald Trump regarding their general trust in the two 2016 presidential candidates, voters’ demographics, five underlying drivers of trust, and important campaign issues. The study also examined how perceptions of trust on issues were evidenced in the popular vote and in key swing states and the Electoral College. The study used two online census-representative surveys to examine registered voters’ perceptions: one survey of 1,500 respondents conducted immediately before the first presidential debate (September 7-15, 2016) and a second survey of a different sample of 1,500 immediately after the third debate (October 20-31), 2016. Analysis of the results confirmed relatively low-trust levels for both Hillary Clinton and Donald Trump and an electorate divided demographically about their trust in the two candidates. The five trust drivers yielded statistically significant differences between the candidates. Clinton was evaluated as more competent, concerned, and reliable, and a person with whom participants identified. With the second survey, Trump statistically surpassed Clinton for openness and honesty. Regarding the three issues of most importance in the campaign, Clinton and Trump had equivalent trust evaluations for dealing with the U.S. economy/jobs, but Trump was more trusted regarding terrorism/national security and Clinton was more trusted regarding health care. The overall trust evaluations for Clinton, coupled with intentions to vote, contribute to understanding Clinton’s popular vote victory. However, the importance of terrorism/national security in swing states and Trump’s trust advantage on that issue contributes to understanding the Electoral College vote by comparison with the popular vote.


Author(s):  
George C. Edwards

This is the third edition of the definitive book on the unique system by which Americans choose a presidents, and why that system should be changed. It is a critique of the U.S. electoral college and includes a new chapter focusing on the 2016 election. The book examines the function of the electoral college during the 2016 presidential elections and argues that the electoral college did not work as it should have. The book claims that the electoral college distorted the electoral process and gave the candidates strong incentives to ignore most of the country. It did not guarantee victory to the candidate receiving the most votes, nor ensure national harmony, nor provide the winner a broad coalition and a mandate to govern. The book asserts that there is a need to focus directly and systematically on the core questions surrounding the electoral college and assess whether its role in American democracy is justified.


Author(s):  
Elisa Eastwood Pulido

A spiritual biography, this book chronicles the journey of Margarito Bautista (1878–1961) from Mormonism to the Third Convention, a Latter-day Saint (Mormon) splinter group he fomented in 1935–1936, to Colonia Industrial/Nueva Jerusalén, a polygamist utopia Bautista founded in 1947. It argues that Bautista embraced Mormon belief in indigenous exceptionalism in 1901 and rapidly rose through the ranks of Mormon priesthood until convinced that the Mormon hierarchy was not invested in the development of native American peoples, as promoted in the Church’s canon. This realization resulted in tensions over indigenous self-governance within the Church of Jesus Christ of Latter-day Saints (Mormon Church) and Bautista’s 1937 excommunication. The book contextualizes Bautista’s thought with a chapter on the spiritual conquest of Mexico in 1513 and another on the arrival of Mormons in Mexico. In addition to accounts of Bautista’s congregation-building on both sides of the U.S. border, this volume includes an examination of Bautista’s magnum opus, a 564-page tome hybridizing Aztec history and Book of Mormon narratives, and his prophetic plan for the recovery of indigenous authority in the Americas. Bautista’s excommunication catapulted him into his final spiritual career, that of a utopian founder. In the establishment of his colony, Bautista found a religious home, free from Euro-American oversight, where he implemented his prophetic plan for Mexico’s redemption. His plan included obedience to early Mormonism’s most stringent practices, polygamy and communalism. Bautista nonetheless hoped his community would provide a model for Mexicans willing to prepare the world for Christ’s millennial reign.


Author(s):  
James E. Baker

This article discusses covert action within the context of the U.S. law. The first section describes the main elements of the U.S. legal regime, including the definition of covert action and the “traditional activity” exceptions, the elements of a covert action finding, and the thresholds and requirements for congressional notification. The second section describes some of the significant limitations on the conduct of covert action. The third section discusses the nature of executive branch legal practice in this area of the law. And the last section draws conclusions about the role of national security law within the context of covert action.


2021 ◽  
pp. 1-21
Author(s):  
Kevin D. Benish

On May 18, 2020, the United States Supreme Court denied a request by the Bolivarian Republic of Venezuela and its state-owned oil company, Petróleos de Venezuela, S.A. (PDVSA), to review the merits of Crystallex Int'l Corp. v. Bolivarian Republic of Venezuela, a decision by the U.S. Court of Appeals for the Third Circuit. In Crystallex, the Third Circuit affirmed a trial court's determination that PDVSA is the “alter ego” of Venezuela itself, thus permitting Crystallex to enforce a $1.4 billion judgment against Venezuela by attaching property held in PDVSA's name. Given the Supreme Court's decision to leave the Third Circuit's opinion undisturbed, Crystallex is a significant decision that may affect parties involved in transnational litigation for years to come—especially those pursuing or defending against U.S. enforcement proceedings involving the property of foreign states.


2018 ◽  
Vol 81 (5) ◽  
pp. 799-805 ◽  
Author(s):  
LAUREN E. LIPCSEI ◽  
LAURA G. BROWN ◽  
E. RICKAMER HOOVER ◽  
BRENDA V. FAW ◽  
NICOLE HEDEEN ◽  
...  

ABSTRACT The Centers for Disease Control and Prevention (CDC) estimates that 3,000 people die in the United States each year from foodborne illness, and Listeria monocytogenes causes the third highest number of deaths. Risk assessment data indicate that L. monocytogenes contamination of particularly delicatessen meats sliced at retail is a significant contributor to human listeriosis. Mechanical deli slicers are a major source of L. monocytogenes cross-contamination and growth. In an attempt to prevent pathogen cross-contamination and growth, the U.S. Food and Drug Administration (FDA) created guidance to promote good slicer cleaning and inspection practices. The CDC's Environmental Health Specialists Network conducted a study to learn more about retail deli practices concerning these prevention strategies. The present article includes data from this study on the frequency with which retail delis met the FDA recommendation that slicers should be inspected each time they are properly cleaned (defined as disassembling, cleaning, and sanitizing the slicer every 4 h). Data from food worker interviews in 197 randomly selected delis indicate that only 26.9% of workers (n = 53) cleaned and inspected their slicers at this frequency. Chain delis and delis that serve more than 300 customers on their busiest day were more likely to have properly cleaned and inspected slicers. Data also were collected on the frequency with which delis met the FDA Food Code provision that slicers should be undamaged. Data from observations of 685 slicers in 298 delis indicate that only 37.9% of delis (n = 113) had slicers that were undamaged. Chain delis and delis that provide worker training were more likely to have slicers with no damage. To improve slicer practices, food safety programs and the retail food industry may wish to focus on worker training and to focus interventions on independent and smaller delis, given that these delis were less likely to properly inspect their slicers and to have undamaged slicers.


2015 ◽  
Vol 12 (4) ◽  
pp. 801-808
Author(s):  
Kenneth Carlberg

Abstract This paper proposes a new direction for U.S. Government cyber policy focusing on stimulus that indirectly incites actions by others to improve cybersecurity protection. To date, the U.S. government has relied on two directions to establish a foundation for cyber security policy: legislative and informative. The former is realized as legislative laws or regulation that provide specific direction to companies or the general public. The latter involves the production and dissemination of information, which is realized in three forms: guidelines, response efforts, and testbeds/pilots. This paper proposes a new “carrot and stick approach” that incorporates both taxes and tax rebates to stimulate solutions that address problems without the government dictating a specific solution.


Author(s):  
Adrian Miller

This chapter itemizes and elaborates on four different component parts (described in the book as "ingredients") that make-up presidential foodways. The first ingredient relates to the president: his or her palate, food philosophy, schedule, wealth and prerogative. The second ingredient involves the people who surround the president: the First Lady, the president's physician, and those who procure food for the White House. The third ingredient is White House culture: the workspace, kitchen equipment and technology, co-workers, perks, presidential pets, wildlife in and outside of the White House and racial attitudes. The fourth ingredient is the unexpected influences: the U.S. Congress, public perception, food gifts from the public, and the climate in Washington, D.C. The chapter includes recipes for roast ducks, popovers (a quick bread), and sweet potato cheesecake.


Worldview ◽  
1982 ◽  
Vol 25 (7) ◽  
pp. 11-12
Author(s):  
Ved P. Nanda

When, on April 30. the United States rejected the Law of the Sea Convention, it dealt a blow to its own best interest: the orderly development of rules to govern navigation and exploitation of the oceans.During the last days of an eight-week session of the third United Nations conference on the Law of the Sea, the Third World majority had made a last-ditch effort to obtain U.S. approval of the treaty. The U.S. delegate, James Malone acknowledged that their concessions offered “modest improvements” but also that they failed to satisfy U.S. demands on the mining of highly valued manganese nodules. Whatever hope remained for a consensus on the draft treaty was shattered when the U.S. pressed for a forrnai roll call vote on the final day. Disappointment, frustration, and even shock was registered by many of the assembled delegates.


Sign in / Sign up

Export Citation Format

Share Document