The Indefinite Archive

Author(s):  
Sun-ha Hong

The Snowden affair dramatizes a growing contradiction: technologies such as the National Security Agency’s surveillance systems increasingly withdraw from public visibility, even as they promise better knowledge for a more rational public. This asymmetry provokes new patterns of paranoid and speculative politics, where the faith in transparency as disinfect places impossible expectations on the public to “know for themselves.”

2016 ◽  
Vol 2016 ◽  
pp. 1-7 ◽  
Author(s):  
Yaovi M. G. Hounmanou ◽  
Murielle S. S. Agonsanou ◽  
Victorien Dougnon ◽  
Mahougnon H. B. Vodougnon ◽  
Ephraim M. Achoh ◽  
...  

A cross-sectional study was conducted in March 2016 to assess the need of mobile phone technologies for health surveillance and interventions in Benin. Questionnaires were administered to 130 individuals comprising 25 medical professionals, 33 veterinarians, and 72 respondents from the public. All respondents possess cell phones and 75%, 84%, and 100% of the public, medical professionals, and veterinarians, respectively, generally use them for medical purposes. 75% of respondents including 68% of medics, 84.8% of veterinarians, and 72.2% of the public acknowledged that the current surveillance systems are ineffective and do not capture and share real-time information. More than 92% of the all respondents confirmed that mobile phones have the potential to improve health surveillance in the country. All respondents reported adhering to a nascent project of mobile phone-based health surveillance and confirmed that there is no existing similar approach in the country. The most preferred methods by all respondents for effective implementation of such platform are phone calls (96.92%) followed by SMS (49.23%) and smart phone digital forms (41.53%). This study revealed urgent needs of mobile phone technologies for health surveillance and interventions in Benin for real-time surveillance and efficient disease prevention.


2018 ◽  
Vol 14 (3) ◽  
pp. 55
Author(s):  
Rami Saleh Abdelrazeq Musleh ◽  
Mahmoud Ismail ◽  
Dala Mahmoud

The study focused on the Palestinian state as depicted in the Israeli political discourse. It showed that the Israeli strategy is based on denying the establishment of a Palestinian state alongside the Israeli one. Israel's main concern is to protect its national security at all costs. The study showed the Israeli political factions' opposition to the formation of an independent Palestinian state in addition to their refusal to give up certain parts of the West Bank due to religious and geopolitical reasons. To discuss this topic and achieve the required results, the analytical descriptive approach is adopted by the researcher. The study concluded that the Israeli leadership and its projects to solve the Palestinian issue do not amount to the establishment of a Palestinian state. This leadership simply aims to impress the international public opinion that Israel wants peace. In contrast, the Israeli public has shown that it cannot accept a Palestinian state, and the public opinion of the Palestinian state is not different from that of the political parties and leaders in Israel.


2016 ◽  
Author(s):  
Annemarie Bridy

In Bring in the Nerds: Secrecy, National Security, and the Creation of Intellectual Property Law, David Levine juxtaposes two starkly different copyright policymaking processes: the closed international process that produced the Anti-Counterfeiting Trade Agreement (ACTA) and the relatively open domestic process that led quite dramatically to the scuttling of the Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA). He reads the two processes against each other as a prelude to recommending Freedom of Information Act (FOIA) reform. The amendment to FOIA that Professor Levine proposes would open the international IP policymaking process to greater public scrutiny by creating a qualified public right to "foreign relations" national security information, which was systematically withheld from the public during the ACTA negotiations. This article, prepared for the Cardozo Arts and Entertainment Law Journal's 2012 Symposium, "Piracy and the Politics of Policing: Legislating and Enforcing Copyright Law," is a response to Professor Levine that draws on Jürgen Habermas' discourse theory of procedural democracy to examine the policymaking dynamics of ACTA and SOPA/PIPA and to assess the democracy-enhancing potential of the FOIA reform Professor Levine proposes.Annemarie BridyProfessor<http://www.uidaho.edu/law/faculty/annemariebridy>|University of Idaho College of Law|PO Box 83720-0051|Boise, ID 83720|Ph. 208.364.4583Affiliate Scholar<https://cyberlaw.stanford.edu/about/people/annemarie-bridy>|Stanford Center for Internet and SocietyAffiliate Fellow<http://isp.yale.edu/people-directory?type=19>|Yale Information Society ProjectSSRN<http://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=630766>|HeinOnline<http://heinonline.org/HOL/AuthorProfile?collection=journals&search_name=Bridy,%20Annemarie&base=js>|LinkedIn<https://www.linkedin.com/in/annemariebridy>|Twitter<https://twitter.com/AnnemarieBridy>


2015 ◽  
Author(s):  
Craig Forcese

The expression "national security" or its close similes lacks a precise meaning, even in the public policy literature. Nevertheless, the concept appears in over 30 federal statutes. In most instances, the term is undefined, an important oversight in light of the significant powers these statutes accord the government. Under these circumstances, how courts review government invocations of "national security" is of real importance. With some exceptions, courts applying s. 7 of the Charter and standard administrative law doctrines have accorded substantial deference to government national security determinations. When largely deferential substantive review of the ambiguous concept of national security is coupled with the ex parti and in camera context in which these cases are often heard, the net effect is to leave government with a freer hand in national security matters than in other domains of administrative decision making. Several possible responses to this problem are proposed.


Author(s):  
Ellen Nakashima

This essay examines how the Washington Post dealt with the tension between its duty to inform the public and its desire to protect national security when it received documents leaked by Edward Snowden. The essay describes the push-and-pull between the media and the government. Journalists try to advance the public’s right to know, particularly about potential government encroachment on civil liberties, and the government tries to defend the security of the country while respecting civil liberties. Reporters with a bias for public disclosure voluntarily withhold certain documents and details based on a careful consideration of harm, and intelligence officials with a bias toward secrecy do not fight every disclosure. The Post’s coverage of the Snowden leaks provides an opportunity to gain insights into how to navigate the inevitable conflicts between journalists’ desire to inform the public and the government’s desire to protect its secrets from foreign powers.


Author(s):  
Clooney Amal ◽  
Webb Philippa

This chapter examines the right to a public trial, which protects both the defendant in a criminal trial and the interests of society as a whole in having a fair system of open justice. Under international human rights law, the right requires that a criminal trial should be held in public and that the court’s judgment is pronounced publicly. However, the right to a public trial is not absolute. The right may, for instance, be limited by valid national security concerns, or to protect the interests of a child or victim of sexual assault. This chapter examines the circumstances in which international bodies have found that exceptions to the right to a public trial are justified, and the additional measures that may be required to ensure that a criminal trial remains fair when there are restrictions on the public nature of proceedings. right to fair trial


Author(s):  
Mary-Rose Papandrea

Balancing the equally important but sometimes conflicting priorities of government transparency for public accountability versus government secrecy for national security seems intractable. One possibility is to recognize a constitutional right of access to government information. This would support democratic self-governance, allow the public to engage in meaningful oversight, and provide access to necessary information without the game of leaks. It could radically refocus arguments regarding the rights of government employees to reveal national security information and of third parties to publish it. Recognizing this right faces an uphill battle against decades of First Amendment jurisprudence. It also faces innumerable logistical and practical obstacles. It would not eliminate the need to determine when the public, the press, and government insiders can disclose national security information. Nevertheless, the ongoing collapse of press access norms and government’s increasing desire to operate outside public view may warrant dramatically rethinking First Amendment scope and protections.


Author(s):  
J. Bagby

Public policy constraints impact deployment of most technology underlying the convergence of digital technologies in telecommunications, e-commerce, and e-government. Networked computers increase the vulnerability of confidential data, transaction processing infrastructure and national security. Compliance regulation imposes complex constrains on data management by government, the private-sector and their personnel. Privacy and security are a balance between individual interests in secrecy/solitude and society’s interests in security, order, and efficiency. This chapter explores the key political, legal, and regulatory methods for resolving conflicts between privacy rights and security methods to encourage convergence success. The “Privacy-Security Conundrum” is framed, then set against the more cross-dependant relationships of a “Privacy-Security Complement.” Security law illustrates that the conundrum-complement dilemma serves to define convergence as constrained and induced by the legal and policy perspectives or privacy, intellectual property, technology transfer, electronic records management, torts, criminal law, fiduciary and contractual duties and professional ethics regulating privacy and security.


Sign in / Sign up

Export Citation Format

Share Document