Catalog Search Results
Description
Common returns to his hometown of Chicago - a city on fire in the aftermath of the brutal police killing of teenager Laquan McDonald. With thousands of people in the streets, Chicago has become the epicenter of national debates around police violence, racism and accountability. Working with community activists and whistleblowers, Common discovers a decades-long pattern of police corruption and sophisticated cover-ups that stretch all the way to the...
Description
The construction of Mount Rushmore was looked upon unfavorably by Native Americans who were promised the Black Hills in a treaty later broken by the United States. In order to honor the legacy of the Native Americans who lived in western South Dakota, an even larger monument of Crazy Horse is currently under construction..
Description
"Let us place there, carved high, as close to heaven as we can, the words of our leaders, their faces, to show posterity what manner of men they were. Then breathe a prayer that these records will endure until the wind and the rain alone shall wear them away." - Gutzon Borglum, Sculptor of Mount Rushmore. Towering above the Black Hills of South Dakota stands America's most treasured monument...a crowning testament to the great leaders who symbolize...
Description
An impressionistic documentary essay as well as a web platform about non-violent forms of protest and civil disobedience in the 21st century. A project about methods of resistance supported by technology, seen not only through the current movements of the Arabian and Iranian uprisings, but also through former successful and less successful revolts. The film describes the everyday conscious and subconscious of resistance of societies fighting suppression...
11) Anonymity
Description
With the pervasiveness of government and corporate surveillance, some people feel the urge to go off the grid. This lecture explores the benefits and challenges of anonymity for individuals and for society, delving into issues such as the freedom of political speech and the privacy of personal searches and communication. Take a look at two tools people use in pursuit of Internet anonymity: TOR networks and Bitcoin currency.
Description
What happens when we know we are under observation? Or when we know we are anonymous? The "observer effect"has a significant psychological impact on someone being watched, whether it is a corporation under public scrutiny or someone chastised on social media. Consider the psychological implications of observation—on both the observed and the observer.
Description
See what measures the American government took during the Cold War to prevent our devolution into a Stasi-like state. While the CIA and the FBI had several unauthorized surveillance programs in the 1950s and 1960s, Congress and the Supreme Court stepped in to oversee the intelligence world with several powerful measures in the 1970s.
Description
After 9/11, the CIA and the FBI were faulted for not sharing intelligence in advance of the attacks. But the two agencies faced stringent legal restrictions on sharing information, going back to the 1978 FISA legislation, which erected a "wall"between intelligence gathering and criminal investigations. Review the reasons for and the history of this legislation and the changes that happened after 9/11.
Description
Dr. Rutledge and his team take an in depth look into a disease that has killed more people than any disease ever known -- Malaria. They interview African, Indian, and US Governments, charitable organizations, scientists, politicians, doctors, clinics, victims, and survivors. They explore and expose the politics of domestic and international policies and find the evidence that the public never truly understood. What they find is astonishing. ..The...
Description
Shift your attention to electronic surveillance, and see how the monitoring of web searches and emails allows the government to gain insights into potential security risks from abroad. But even though the surveillance program has oversight, some people fear the potential for abuse is high. Look at both sides of the issue.
Description
Drones—unmanned aerial vehicles—are flooding our skies, bringing with them a variety of concerns about safety and privacy. Review some of the many public and private uses of drones, and then consider policy issues such as: what constitutes permissible use of drone video footage? What safety regulations are appropriate? How can we reconcile civil liberties with the right to privacy?
Description
Continue your study of surveillance and the law with a look at constitutional law. After exploring cases from the 1960s and 1970s about privacy and police informants, you’ll turn to the computer era. Find out what expectations of privacy we have regarding email and phone metadata, airport travel, and our smart phones.
Description
The democratization of newsgathering and the expansion of the surveillance state have amplified tensions over the transparency of government operations. Trace the recent history of the news media from the Pentagon Papers to Wikileaks, and draw your own conclusions about what information should be published and who should be allowed to publish it.
In Interlibrary Loan
Didn't find what you need? Items not owned by Ajax Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request