Posted by: Elizabeth A. (Betty) Thomas | April 10, 2016

Lots of Ways to Renew Books from the Library

Did you know that you can renew your library book through the library’s catalog in the comfort of your own home? All books other than Course Reserves and 3 hour Study Aids can be renewed one time online.

(If your materials are overdue, you will need to call or visit the LUX desk directly for renewal.)

  • Renew through the Library’s Catalog
  • Renew using My Cousin Vinny
  • Renew by Calling the LUX Desk
  • Renew by Visiting the LUX Desk

Renew through the Library’s Catalog

Log into OrgSync and click on the link to the Library’s Catalog on the left side.

renewal1

Click on Login in the top right corner of the landing page.

renewal2

Enter your name and the barcode from the back of your Charlotte Law identification badge. Submit.

renewal3

Now you can just click on your name that appears at the top of the screen.

renewal4

And then Checkouts on the left side of the screen.

renewal5

Check the box next to the item(s) that you want to renew and then click the Renew All or Renew Marked buttons.

ENCORE will ask you if you really do want to renew those items. Choose YES.

renewal6

The item is successfully renewed for either 3 or 28 days depending on the type of item.

renewal7

All books other than Course Reserves and 3 hour Study Aids can be renewed one time.

Course Reserves and 3 hour Study Aids can be returned to the LUX desk and checked out again after a 30 minute wait if no one else needs the item during the waiting period.

Renew using My Cousin Vinny (Our Self-CheckOut Machine)

renewal8

Located next to the LUX desk on the 5th Floor.

Renew by calling the Library User Experience (LUX) Desk

704-971-8573

Renew by visiting the Library User Experience (LUX) Desk

Mondays – Thursdays                                          8 am – 8 pm        

Fridays                                                                       8 am – 6 pm

Saturdays                                                                  Noon – 5pm

Sundays                                                                      2 pm – 8 pm

Note:  Library hours are subject to change.

To download a copy of these instructions, click here: Students – Lots of Ways to Renew Library Books.

Advertisements
Posted by: Elizabeth A. (Betty) Thomas | March 13, 2016

New Horizons: Metrolina Library Association Conference

New Horizons

Metrolina Library Association Conference

Thursday, June 9, 2016 Conference Registration Prices Poster and Presenters $50 Members $65 Non-members $80 We are currently accepting proposals for presenters and posters. Proposals will be due on March 25th. The link for the proposal forms can be found here: http://goo.gl/forms/9fcFNTr5VK

 

Location: CPCC Harris Conference Center

3216 CPCC Harris Campus Conference Drive

Charlotte, NC 28208

Keynote Speaker: Cal Shepard

Cal Shepard

Caroline (Cal) Shepard is the State Librarian of North Carolina. Formerly she was Program Director of Consulting Services and Regional Director for the Southeast at LYRASIS. In this role she managed the consulting program and also served as a consultant. From 1999 to 2006, she managed the Educational Services program at SOLINET. Prior to joining SOLINET, Cal served as Chief of Library Development at the State Library of North Carolina. Previous experience includes positions at the Forsyth County Public Library in Winston-Salem and a rural multi-county public library headquartered in Murphy, North Carolina.

Cal has a MLS degree from the University of North Carolina at Chapel Hill and a BA degree from the University of Colorado at Boulder. She is active in the American Library Association and the Chief Officers of State Library Agencies organization where she serves on the board. She serves on the boards of the Association for Rural and Small Libraries and the North Carolina Center for After School Programs. She received the Distinguished Alumni Award from the University of North Carolina – Chapel Hill in 2013.

 

 

Posted by: Elizabeth A. (Betty) Thomas | February 25, 2016

Antonin Scalia, Associate Justice of the United States Supreme Court – 1936-2016

Antonin Scalia, Associate Justice of the United States Supreme Court 1936-2016

Antonin Gregory Scalia died on Saturday, February 13th 2016 in his sleep of an apparent heart attack at a resort in West Texas. He was 79 years old.

Justice Scalia was born March 11, 1936 in Trenton, New Jersey. He was the only child of Salvadore Eugene and Catherine Panaro Scalia. His father emigrated from Sicily and his mother was a first generation Italian-American. He married Maureen McCarthy in 1960 and they have nine children and 28 grandchildren.

Education

Antonin Scalia graduated first in his class from Xavier High School in Manhattan. He graduated valedictorian and summa cum laude with an A.B. in History from Georgetown University and the University of Fribourg (Switzerland) in 1957. He earned his L.L.B from Harvard Law School, graduating magna cum laude in 1960. While at law school he was note editor for the Harvard Law Review and later a Sheldon Fellow from 1960-1961.

Experience

After law school, Antonin Scalia went into private practice with the corporate law firm of Jones, Day, Cockley & Reavis in Cleveland, Ohio (1961-1967). Although he had been offered a partnership in the firm, Antonin Scalia resigned to accept a teaching position at the University of Virginia Law School (1967-1974) where he became an expert in administrative law.

He served the federal government as General Counsel of the Office of Telecommunications Policy (1971-1972), Chairman of the Administrative Conference of the United States, an agency that advises federal regulators on administrative procedure (1972-1974), and Assistant Attorney General for the Office of Legal Counsel for the U.S. Department of Justice (1974-1977). The latter office provides legal advice to the president and attorney general and during Scalia’s time advised President Nixon on Watergate issues.

At the end of President Ford’s presidency, Scalia became a Visiting Professor of Law at Georgetown University and Scholar in Residence at the American Enterprise Institute. From 1977 to 1982, he was a Professor of Law at the University of Chicago. Between 1980 and 1981, he was also a Visiting Professor of Law at Stanford University.

As a result of his conservative opinions, President Reagan appointed Scalia to Judge of the United States Court of Appeals for the District of Columbia Circuit in 1982.

Supreme Court

President Ronald Reagan nominated him as an Associate Justice of the U.S. Supreme Court. He was confirmed by the Senate by a vote of 98 to 0 and took the oath of office on September 26, 1986. He was the first Italian-American justice on the U.S. Supreme Court.

As the court’s longest serving active member, Justice Scalia often set the tone of a hearing by confronting the attorneys and intellectually challenging them and his colleagues. He liked making sessions engaging and entertaining and would make jokes and extreme comments to make people think.  His writing showed a keen wit with a sense of humor. His dissents are readable, clear, logical, and sometimes blunt.

Justice Scalia followed a judicial philosophy of “originalism” which holds the belief that the Constitution should be interpreted in its original form as it was when ratified over two hundred years ago by the country’s founders. He opposed “judicial activism,” believing instead in “judicial restraint” where the legislature as representatives of the people should be responsible for implementing change, not the judiciary. Although considered the conservative intellectual of the justices, he did not always vote in that direction. For example, in United States v. Eichman, he voted to overturn laws that prohibited flag burning, citing it as a constitutionally protected right of free speech.

While Justice Scalia is more known for his controversial dissents, some of his more important majority opinions follow:

Blakely v. Washington, 542 U.S. 296 (2004).

The Supreme Court held that the state trial court’s sentencing of the defendant to more than the statutory maximum on the basis of the judge’s finding that the defendant acted with deliberate cruelty violated the defendant’s Sixth Amendment right to trial by jury.

District of Columbia v. Heller, 554 U.S. 570 (2008).

In this case, the Supreme Court held that the Second Amendment conferred an individual right to keep and bear arms; that statutes banning handgun possession violated the Second Amendment; and that a statute that prohibited a lawful firearm for the purpose of self-defense violated the Second Amendment.

Melendez-Diaz v. Massachusetts, 557 U.S. 305 (2009).

The Supreme Court held that the Sixth Amendment guarantees the defendant’s right to confront those who testify against him or her. Unless the witness, in this case a lab technician in a drug case, appears in court or is otherwise available for cross examination, his/her testimony is inadmissible.

AT&T v. Concepcion, 563 U.S. 333 (2011); Am. Express Co. v. Italian Colors Rest., 133 S.Ct. 2304 (2013).

The Supreme Court held in the AT&T case that the Federal Arbitration Act preempts California’s judicial rule regarding the unconscionability of class arbitration waivers in consumer contracts. In American Express, the Court determined that a contractual waiver of class arbitration was enforceable despite high costs of individual arbitration. Both of these cases impact class actions and alternative dispute resolution.

Writings by Justice Scalia can be found through the Legal Information Institute at Cornell University Law School.

While Justice Scalia would have intense arguments with other justices, he maintained strong close relationships with them too. Upon his death Justice Ruth Bader Ginsburg, one of his closest friends and ideological opposite, praised him by stating:

“Toward the end of the opera Scalia/Ginsburg, tenor Scalia and soprano Ginsburg sing a duet: “We are different, we are one,” different in our interpretation of written texts, one in our reverence for the Constitution and the institution we serve. From our years together at the D.C. Circuit, we were best buddies. We disagreed now and then, but when I wrote for the Court and received a Scalia dissent, the opinion ultimately released was notably better than my initial circulation. Justice Scalia nailed all the weak spots-the “applesauce” and “argle bargle”-and gave me just what I needed to strengthen the majority opinion. He was a jurist of captivating brilliance and wit, with a rare talent to make even the most sober judge laugh. The press referred to his “energetic fervor,” “astringent intellect,” “peppery prose,” “acumen,” and “affability,” all apt descriptions. He was eminently quotable, his pungent opinions so clearly stated that his words never slipped from the reader’s grasp.

Justice Scalia once described as the peak of his days on the bench an evening at the Opera Ball when he joined two Washington National Opera tenors at the piano for a medley of songs. He called it the famous Three Tenors performance. He was, indeed, a magnificent performer. It was my great good fortune to have known him as working colleague and treasured friend.”

scalia2

References

Liptak, A. (2016, February 13). Antonin Scalia, Justice on the Supreme Court, Dies at 79. The New York Times. Retrieved from http://www.nytimes.com/2016/02/14/us/antonin-scalia-death.html?_r=0

Legal Information Institute (LII). (2016). Writings by Justice Scalia. Retrieved from https://www.law.cornell.edu/supct/justices/scalia.dec.html

Overley, J. (2016, February 14). Scalia took on gun control, class actions in top opinions. Law360. Retrieved from https://advance.lexis.com/historylist/?pdmfid=1000516&crid=173070cb-f01a-4190-9760-36d712d0cfc7&ecomp=htf_k&prid=61402be2-eb68-458b-9b43-41608bdad4f4

Scalia, Antonin. (2010). Biography Reference Bank.

Supreme Court of the United States. (2016). Retrieved from http://www.supremecourt.gov/.

Posted by: Elizabeth A. (Betty) Thomas | February 18, 2016

Black History Month Displays in the Library

If you are interested in more information about black history, come check out the Law Library’s Black History Month Displays in the East Reading Room on the 5th floor of the library and the door to the Administrative offices.

You can also view our earlier post on The History of Black History Month for more information!

Posted by: Elizabeth A. (Betty) Thomas | February 14, 2016

The History of Black History Month

Black History Month, also known as African American History Month, celebrates the contributions that African Americans have made to American history and recognizes the struggle for freedom and equality.

black_history_month_1
Historian and former Dean of Howard University, Dr. Carter G. Woodson founded the Association for the Study of Negro Life and History (now known as the Association for the Study of African American Life and History (ASALH)) in 1915. Negro History Week was first initiated by Woodson in 1926 to focus on the need for historical recognition about African American achievements.  Negro History Week encompassed the birthdays of Abraham Lincoln and Frederick Douglass, two important men in the history of African Americans

Dr. Carter G. Woodson

Dr. Carter G. Woodson

In 1972 the ASALH changed Negro History Week to Afro-American History Week. In his Message on the Observance of Black History Week, President Ford in 1975 urged Americans to “recognize the important contribution made to our nation’s life and culture by black citizens.” In 1976 the ASALH expanded the week to a month, Black History Month. Interestingly, Woodson had hoped that one day historical information about African Americans would be incorporated in school curriculums so that a special, set aside remembrance would not be needed. We still celebrate Black History Month each February.

black_history_month_3

Further Reading

  • Anonymous. “Introduction.” Black History Bulletin 65.1/2 (Jan-Jun 2002): 2. History Study Center. Web. 4 Feb. 2016.
  • Crowder, Ralph L. “Historical significance of Black History Month.” Black History Bulletin 65.1/2 (Jan-Jun 2002): 39-41. History Study Center. Web. 4 Feb. 2016.
  • Peace, J Leon Jr. “..And for as long as it takes.” Black History Bulletin 65.1/2 (Jan-Jun 2002): 50-51. History Study Center. Web. 4 Feb. 2016.
  • Woodson, Carter G. “Observances of Negro History Week.” Black History Bulletin 65.1/2 (Jan-Jun 2002): 21-33. History Study Center. Web. 4 Feb. 2016.
Posted by: Elizabeth A. (Betty) Thomas | January 29, 2016

Sunday Access to Charlotte Law Library

Hours

The Charlotte School of Law Library is open on Sundays from 1 pm to 10 pm.

The Library User Experience (LUX) Desk is open from 2 pm to 8 pm.

Reference Services are provided by a librarian from 2 pm to 6 pm.

Access

Getting in. All the entrances to the building are locked on Sundays. To get in, there is a badge reader on the wall outside the College Street entrance near the revolving doors. Swipe your card to get into the building.

Getting out. To leave the building, there is red button to push located on the wall between the glass doors on the College Street entrance/exit.

If anyone has a problem getting into the building, there is a button at the badge reader that connects to Security. Please do not let other people into the building. These measures are for your safety.

 

reference_librarian

 

Posted by: Elizabeth A. (Betty) Thomas | January 21, 2016

Using Tech to Make Tenure

tenure1

Like many academicians, librarians in academic environments also go through a promotion and tenure process. Deborah Tritt of the University of South Carolina Aiken and Kaetrena Davis Kendrick of the University South Carolina Lancaster presented their Guide on the T&P Side: Using Tech to Make Tenure at the 10th annual Metrolina Library Association Conference. They shared a number of great no-cost tools that anyone could use.

As a side note, the Association of College and Research Libraries supports tenure track academic librarians. Two websites of interest: ACRL Joint Statement on Faculty Status of College & University Librarians and ACRL’s Guideline for the Appointment, Promotion, and Tenure of Academic Librarians.

Rule 1: Stay Focused

These tools can help you achieve that objective. Part of the process is writing narratives. Take chunks of time to work on the project.

eggtimer  E.gg Timer. E.gg Timer.com is a simple countdown timer. Set the timer for a specific amount of time like 25/5 minute cycles and focus on the work for that amount of time before taking a break.

 

noisli  Noisli is a background noise and color generator for productivity or relaxation. There are background noises like White noise, Rain, and Coffee Shop. I am listening to birds singing and water in a babbling brook. Now it’s thundering. I am switching to the coffee shop to wake up.  Noisli also includes a distraction-free Text Editor as well as a timer.

coffivity  Coffitivity is another tool that streams the sounds of a coffee shop. The site claims research showing moderate ambient noise helps enhance creative cognition. You can even choose from different types of cafes. I am hoping the University Undertones helps me get this blog post written.

rainymood Rainy Mood is a rain simulator. You can even add their recommended mix or one from You Tube. Today’s recommendation is Rainy Mood + Beethoven. It’s very pleasant.

momentumMomentum through Chrome Web Store is a tab homepage replacement. When you open the tab, it asks you to type in your focus for the day. The photography is awesome.

Rule 2: Keep Yourself Organized

kanbanflow  Kanbanflow is a project management tool. The Kanban board provides a way to have an overview of your current work and collaborate in real-time. Kanban can also use the Pomodoro technique of working with full focus for 25 minutes before taking a short break. Then you repeat the cycle.

kanbanflow2

trello Trello is a board with lists of lists filled with cards used by a group or on your own.

trello2

milkRemember the Milk is an on-line to-do list. This tool was one of the first.

milk2

wunderlist Wunderlist is good for a grocery list and to set due dates and reminders.

 wunderlist2

Rule 3: Keep Everything

evernoteEvernote is a good tool for collecting information off the internet like a web article, handwritten notes, or photos of your projects.

googledocsGoogle Docs is a way to create and share online documents, spreadsheets and presentations.

 

dropboxDropbox is a secure file sharing and storage solution. Dropbox is great for collecting your work and using it on various computers.

 

zoteroZotero is a free, easy-to-use tool to help you collect, organize, cite, and share your research sources. It is good for information management in that you can store articles.

 

Rule 4: Track Everything

academiaAcademia.edu is a free platform for academics to share research papers and get feedback on working papers. Academia provides in depth analytics and statistics.

researchgateResearchGate is a like a social networking site for researchers to share papers and find collaborators. The site provides statistics on downloads and citations.

journoJourno Portfolio is a platform geared to journalists to capture their writing and photographs. JP also tracks how many people visit the site, how long they spent there, and where they are located.

digitalcommons Digital Commons is a hosted institutional repository that some universities and law schools use.  According to their website, DC hosts everything from faculty papers, student scholarship, and annual reports to open access journals, conference proceedings and monographs.

figshareFigshare is another open repository where research documents can be uploaded and the site makes research “citable, shareable and discoverable” while also creating a DOI.

googlescholarGoogle Scholar Citations is a way for authors to track citations of articles. Through Google Scholar Citations, a researcher can check who is citing your publications, graph citations over time and compute other metrics.

Other Tools for Keeping and Tracking Scholarship Activity

preziPrezi is free presentation software that uses motion, zoom and spatial relationships to add to presentations.

 

 

screencastScreencast-O-Matic is a free screen recording platform that comes with statistics. It can also be added to academic.edu.

 

googlefusionGoogle Fusion Tables is a data visualization application to gather, visualize and share data tables. The presenters use Google Fusion Tables for reference analytics.

 

wordpressWordPress is an open source blogging and website content management system. It also provides analytics about who visits the site.

 

Most tenure and promotion processes require candidates to provide justification and evidence of the academic activities such as librarianship, teaching, scholarship and service. These free tech tools can help in sharing activities, collecting metrics, and organizing files for anyone.

Posted by: Elizabeth A. (Betty) Thomas | January 11, 2016

Know Your Law Library: Reference Carolinas Collection

The Reference Carolinas Collection has resources that are particularly useful for students working in clinics and attorney members of the library. The resources in this area of the library are state specific materials for both North and South Carolina. They are available for use in the library only. They are not available for check out.

The Reference Carolinas Collection can be found on the 5th floor of the library adjacent to the Study Aids Collection.

csrc1

The Reference Carolinas Collection includes….

Legal encyclopedias: Strong’s North Carolina Index 4th and South Carolina Jurisprudence are located here.

csrc2

State Statutes: Both the General Statutes of North Carolina Annotated (Official) and West’s North Carolina General Statutes Annotated for North Carolina are in this section as well as The Code of Laws of South Carolina.

csrc3

Digests: West’s North Carolina Digest and South Carolina Digest.

csrc4

Practice Materials: These include everything from Pattern Jury Instructions and Douglas Forms to more specific treatises like Lee’s North Carolina Family Law and Shuford North Carolina Civil Practice and Procedure.

csrc5

The collection is arranged in Library of Congress Classification System (LC), so check the Charlotte School of Law Library’s online catalog, ENCORE to find the location of a state specific resource.

Interested in becoming an attorney member? Check the Charlotte School of Law website and complete a Membership Application.

Posted by: Elizabeth A. (Betty) Thomas | January 11, 2016

Attention Bar Studiers: A New Resource!

The Charlotte Law Library now has flashcards.

Law in a Flash: Multistate Bar Exam

This two part set is available for 3 day checkout from the LUX desk.

Come Check Them Out!

Posted by: Elizabeth A. (Betty) Thomas | December 17, 2015

The Library Freedom Project: Surveillance threats and technology tools

Recently there was an article in the Washington Post about the FBI using planes with thermal imaging technology to spy on protestors in Baltimore during the Freddie Gray unrest. Only through a Freedom of Information Act request made by the American Civil Liberties Union (ACLU) did privacy advocates learn of these new advances in surveillance technology.

This is the sort of surveillance threat that Alison Macrina and the Library Freedom Project highlight. During her recent presentation in Charlotte to the Metrolina Library Association, Macrina taught librarians about surveillance threats and privacy-protecting technology tools. Usually an ACLU representative reviews some of the major surveillance programs and another staff attorney for ACLU conducts a “Know Your Rights” training session on how to respond when served with a National Security Letter, administrative subpoena, or warrant.  Macrina covered all this information in a three hour workshop.

freedom1

Threat Assessment

Macrina started the presentation by walking us through a hypothetical threat assessment for a LGBTQ teenager using the Electronic Frontier Foundation’s Surveillance Self-Defense:  Introduction to Threat Modeling. The guiding questions of the model follow:

  • What do you want to protect? (assets: like computer, phone, text messages)
  • Who do you want to protect it from? (parents, other students, bullies)
  • How likely is it that you will need to protect it? (capabilities)
  • How bad are the consequences if you fail? (being bullied at school, relationship with family)
  • How much trouble are you willing to go through in order to try to prevent those?

The Threats

Macrina then highlighted a variety of surveillance threat models. Some of those she mentioned follow:

The Drone Papers – documents leaked by a whistleblower about the U.S. military’s targeted assassination program in Afghanistan, Yemen, and Somalia.

National Security Agency’s XKeyscore software which allows analysts to narrow reams of intercepted internet data to focus on selected targets and Prism which is a system where NSA gains access to all the private communications of users of nine popular Internet services including Microsoft, Yahoo, Google, and Facebook. NSA collects bulk cell phone records to harvest data traveling over fiber optic cables. These are examples of “collect it all” type programs. While there is nothing wrong with a properly served search warrant based on individual leads, routine government surveillance into everyone’s lives is another matter.

Federal Bureau of Investigation (FBI). According to Macrina, the FBI is monitoring lawful First Amendment activities of Muslim college students by trawling websites and planting bugs in meeting rooms. Furthermore, she says an FBI Joint Terrorism Task Force tracked a Black Lives Matter protest at the Mall of America. Finally, the government has had software companies create “backdoors” in software to gain access to information. However when software is designed to provide law enforcement with access to everyone’s personal information, there are potential security gaps that can be exploited by hackers.

Local Police. Macrina listed counterterrorism fusion centers and the militarization of local police through the 1033 military surplus program as threats. And the ACLU website adds the following:

  • Stingrays, also known as “cell site simulators” or “IMSI catchers,” are invasive cell phone surveillance devices that mimic cell phone towers and send out signals to trick cell phones in the area into transmitting their locations and identifying information. When used to track a suspect’s cell phone, they also gather information about the phones of countless bystanders who happen to be nearby.1
  • Automatic license plate readers, mounted on police cars or on objects like road signs and bridges, use small, high-speed cameras to photograph thousands of plates per minute. The information captured by the readers – including the license plate number, and the date, time, and location of every scan – is being collected and sometimes pooled into regional sharing systems. As a result, enormous databases of innocent motorists’ location information are growing rapidly.2

Corporate Entities. Facebook knows our relationship networks and has developed facial recognition software.  Google has seven advertising agencies and has acquired Boston Dynamics, a military robotics company. Online advertising is learning everything about us. The hacking industry is selling malware to other sovereign states, police, campus police, and others. Online ads track you even if you do not click on them.

Technology Solutions

These are just a few of the technology solutions offered by Alison Macrina to ensure privacy. Some are more extreme than others and all depend on the level of your own risk assessment.

  1. Keep your software up-to-date.
  2. Use free software (FOSS) that is open source rather than proprietary. Source code shared openly can be examined by people who can identify backdoors.
  3. Realize that storage in the cloud is just storage on a server somewhere out of your control. Secure and encrypted connections should be a concern.
  4. Passwords. Use 5 random common words so computer cannot figure out pattern. People are creatures of habit and that is how computers figure out patterns. Check out KeePassX, an open source, cross platform password manager that also includes a password generator. Roll a die five times and using Diceware’s list get your first word.
  5. Use encryption. The Electronic Frontier Foundation has a good explanation about encryption at https://ssd.eff.org/en/module/what-encryption and how strong encryption can avoid online surveillance.
    freedom2
  6. Install Tor Browser. The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, Tor prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
    freedom3
  7. Add HTTPS Everywhere. HTTPS Everywhere is produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. HTTPS Everywhere is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure.
    freedom4
  1. Change default browser to DuckDuckGo. DuckDuckGo does not track your searching and sell your information.
    freedom5
  1. Have only one antivirus software because having two lessens effectiveness. Check out ClamAV, an open source mail gateway scanning software. Malwarebytes is an anti-malware product but it is not free or open source. Malwarebytes only works on Windows; however, there are very few attacks on Macs. If your risk of surveillance is high, there is Detekt , a free tool which checks for governmental surveillance spyware.
  2. Look into Firefox privacy extensions like Privacy Badger, uBlock Origin, or NoScript which block ads and trackers.
    freedom6

These are just some of the technology tools and threats that Alison Macrina mentioned in her presentation. The Library Freedom Project website https://libraryfreedomproject.org/ has many more tools and information to consider.

Conclusion

So are you wondering why these surveillance threats are an issue for librarians?  Intellectual freedom and the right to privacy are core values of the library profession. The Code of Ethics of our profession has two applicable principles:3

  • We uphold the principles of intellectual freedom and resist all efforts to censor   library resources.
  • We protect each library user’s right to privacy and confidentiality with respect    to information sought or received and resources consulted, borrowed, acquired or transmitted.

The threats and tools detailed in this article are those of Alison Macrina and the ACLU. Each librarian and each library will have to make their own threat risk assessments. There are trade-offs for using these technology tools. For example, even though DuckDuckGo does not track your search results, this search engine has a lot to be desired in returning extensive search results. And while Lebanon Public Library in New Hampshire decided to continue with their TOR relay after being challenged by the Department of Homeland Security, some law enforcement  officials cite examples of TOR’s use by child pornographers and in illegal sales of large quantities of drugs and firearms.

Alison Macrina travels across the country giving her workshop, funded by a grant from the Knight Foundation, to train librarians about the threats to privacy and how to use various technology tools  to educate and protect patrons. The threats to privacy and the increasing amount of unchallenged surveillance gives impetus to all of us to be more aware and learn more about this issue and these tools. The Library Freedom Project gives us much to consider.

Note: This blog post was written prior to the terror attack by ISIS in Paris. While we have to be vigilant in making sure our government stays within the law with respect to the threats identified in this presentation, balance is needed between safeguarding our basic rights and enabling our government to protect us from events like those in Paris. This point of balance is something that deserves thorough and thoughtful consideration.

freedom7

1American Civil Liberties Union [ACLU]. (2015). Stingray tracking devices: Who’s got them? Retrieved from https://www.aclu.org/map/stingray-tracking-devices-whos-got-them

2ACLU. (2015). You are being tracked. Retrieved from https://www.aclu.org/feature/you-are-being-tracked

3American Library Association. (2015). Code of ethics of the American Library Association. Retrieved from http://www.ala.org/advocacy/proethics/codeofethics/codeethics

« Newer Posts - Older Posts »

Categories