A Blog Bulletin introducing current ideas on cyber-security, crime, Orientalist cultural criticism, philosophy, surveillance, and poetry and religion, social-legal cyber/criminology. E-GOVERNANCE/BUSINESS-Peremptory/Preventive Information Systems IN re Global Security Decision Applied THEORETICAL MODELING & Police Criminal Intelligence--Culture Critique-History-Case-historical narratvive+ Abstracts+ Concept Models--
Monday, June 3, 2013
On THRESHOLD OF NEW MILENNIAL VIOLENCE, WORLD AND PEACE: IN REGARDS TO MASTERS OF TRADITON-CLASSICAL AND PHILOSOPHY AS TACTICAL PHILSOPHY AND NATURALIST PREDICTIVE FULFILLMENT
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
for Albert Einstein,
"The weapons of war is a sign of ill omens"--Sun Tzu
And the Master said-who will triumph in world wide wars!
He who follows what is most essential for ordering the sum total of all divisons
of political economy, and gives the penultimate admonition-
that nation who first threatens total mass weapons of destruction
will be destroyed.
Is this not simple common sense reasoning.
We must then colonize for a trek to a new beginning of time and space travel
if the Reign of God, does not overshadow the darkness of Man,
which God turns Darkness into Light.
The axis of the recapitulation of history.
Pray for the Peace of Jerasulem for all who Claims
her Mother Earth!
RSY ANDREWESON CYPRIANNE KIM, OSSTB-M-A, PHD
Abbot Society
Thursday, May 30, 2013
Neutraliization: Orientalism as Criminologie and Deviance: Bullets W/O Revolver
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE The question of the "Outsider" as secondary deviant labeling theory may reach a point of whether there is essentialist question of whether criminal or deviant behavior is in part of human nature. Then why is that then some people commit crime and some don't. How do we social stratify crimes in a parallel way of thinking that both law abiding and law offending crimes cross culture variants and hierarchy of social economic status, gender, race, ethnicity, and religion. It is like asking Carl Hempel's question on the null hypothesis, with the result that the our conclusion's result is false positive--"does a black swan exist?"
It is not labeling or human trait theory, but an interpretation of making a theoretical contruct appeal to how we undersand not the phenomena of criminal offending or behavior, and deviance, but explaning for how we explain or justify our theories and hypothesis with empirical data, and data-analtyic structures of what is tangible to make a claim as to what cause crime, and the deviant behaviior.
This is applied to problem of Orientalism applied to criminal as other, and deviant. In dire means of desperation, and loss of self worth, loss of conscious self-regard of self worth and love of neighbor, and stranded on the docks of society--all things are permissible, if Nietzche following Dostoeveky-"If God is dead, and we have murdered him"==
Richard S.Y.R. Kim, PhD
Philosophy of Logic, Ideogram, Abbot Society
Fellow, JJC/CUNY Research Founation
Thursday, May 23, 2013
Memory of Optics a Sense of Homecoming w/o Sound
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
What is memory without optics of sight
and sound, or sense-touch or feeling,
of smell, perception, of and without heart,
a ember without fire, but with fire,
and the long way journey to
a final destination, between the cross-road
of heaven, earth, and purgation here, heaven
and hell, tainted by pain, to release the poison
of living, which releass an exit bullet wound,
of ricoche, in this life and the next.
Not shrapnel, bullet mark, but kaledeiscope
of a some kind of homecoming, which
we hopefully anticipate on our final voyage
home in Late May.
Saturday, May 18, 2013
SCPC, GOOGLE CHROME SEARCH-APPLIED ASIAN MATHEMATICS & CULTURE, AND STATISTIC FOR MONITORING OF PUBLIC HEALTH-OXFORD PROGRAMME
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Scholarly articles for SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE, APPLIED ASIAN MATHEMATICS
… Mafia in America: Immigration, Culture, and Crime - Finckenauer - Cited by 103
Western and Asian business ethics - Koehn - Cited by 3
Crime and punishment in contemporary culture - Valier - Cited by 46
Search Results
Alive & Kickin, OM_PAX_SHANTIH_PEACE-IN Defense of Paradox ...
surveillancecrimephilosophy.blogspot.com/.../alive-kickinm-on-asiatic-q...
Apr 4, 2013 – SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE Is not saying ... This is very interesting line of Asian practical thinking and reasoning as you ... Philosophy of Logic--Quantum Asiatic Philosophy and Math for Mechanics, My global . ... Applied THEORETICAL MODELING & Police Criminal Intelligence ...
"FRAGMENT" POOMSE IDEIN-FORM - surveillance, crime ...
surveillancecrimephilosophy.blogspot.com/.../surveillance-crime-philosp...
Jul 27, 2012 – SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE Words of ... neither Not False-CEHC, A True Teacher of Slav Amer-Asia-Replies to ...
You've visited this page 2 times. Last visit: 8/25/12
Public Health Surveillance : Applied EpidemiologyTheory to practice ...
www.oxfordscholarship.com/viewByDoi/10.../9780195187410.003.000...
This chapter begins by reviewing the definition of public health surveillance and giving a brief history of recent developments in surveillance. It then considers ...
Making Public Places Safer - Oxford Scholarship Online
www.oxfordscholarship.com/view/10.1093/.../acprof-9780195326215
Making Public Places Safer: Surveillance and Crime Prevention. Brandon C. Welsh and David P. Farrington. Abstract. The United Kingdom has more than 4.2 ...
How Might Surveillance Measures Reduce Crime : Making Public ...
www.oxfordscholarship.com/view/.../acprof-9780195326215-chapter-3
This chapter investigates how surveillance measures can reduce crime. It explains that public-area surveillance falls under the category of situational-crime ...
Principles & Practice of Public Health Surveillance - Oxford ...
www.oxfordscholarship.com/view/10.1093/.../acprof-9780195372922
3 Economic and Policy Justification for Public Health Surveillance · 4 Collecting Public Health Surveillance Data: Creating a Surveillance System ...
Monitoring and Surveillance - Oxford Scholarship Online
www.oxfordscholarship.com/view/.../acprof-9780195380002-chapter-5
Mandated surveillance is when the surveillance program is required by law or ... Medical surveillance evaluates the health of individual workers through medical ...
Public Health Surveillance for Chronic Diseases, Injuries, and Birth ...
www.oxfordscholarship.com/.../acprof-9780195372922-chapter-12
Principles & Practice of Public Health Surveillance$. Users without a subscription are not able to see the full content. Principles & Practice of Public Health ...
Results for similar searches
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
surveillancecrimephilosophy.blogspot.com/
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE Words of Wisdom "the ... neither Not False-CEHC, A True Teacher of Slav Amer-Asia-Replies to RSY ...
More results for surveillance crime & philosophy & culture applied asian mathematics
Ortho-doxatic Logic of the Simple Belief Proposition - surveillance ...
surveillancecrimephilosophy.blogspot.com/.../ortho-doxatic-logic-of-...
Apr 21, 2013 – SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE For Rev'd Fr. Apollo, ... Applied THEORETICAL MODELING & Police Criminal Intelligence ... neither Not False-CEHC, A True Teacher of Slav Amer-Asia-Replies to RSY ...
More results for surveillance crime & philosophy & culture applied asian mathematics
1
2
3
4
5
6
7
8
9
10
Next
Advanced searchSearch HelpSend feedback
Google HomeAdvertising ProgramsBusiness Solutions
2nd Equation-Zen Philosophy + Mathematics
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
another equation: F(X)=7XY2 [Squared] x 3XY[CUBED]/1/empty set<----------------------> lemma ( inverse ratio above minima curve]/below-optima curve )==1
Showing results for SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE, ZEN PHILOSOPHICAL MATHEMATICS
Search instead for SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE, ZEN PHILOSPHICAL MATHEMATICS
Scholarly articles for SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE, ZEN PHILOSOPHICAL MATHEMATICS
… masculinity in city-form: Philosophical urbanism as a … - Akkerman - Cited by 8
In different spaces: place and memory in visual culture - Burgin - Cited by 271
The flight from ambiguity: Essays in social and cultural … - Levine - Cited by 395
Search Results
wittgenstein's "philosophical investigations" in re vajra/zen ...
surveillancecrimephilosophy.blogspot.com/.../wittgensteins-philosophical...
CachedDec 20, 2010 – WITTGENSTEIN'S "PHILOSOPHICAL INVESTIGATIONS" IN RE VAJRA/ZEN MATHEMATICAL LOGIC-FUNDAMENTAL ... SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE What is a "referent against referent-where the ...
Alive & Kickin, OM_PAX_SHANTIH_PEACE-IN Defense of Paradox ...
surveillancecrimephilosophy.blogspot.com/.../alive-kickinm-on-asiatic-q...
CachedApr 4, 2013 – SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE Is not saying yes, ... Philosophy of Logic--Quantum Asiatic Philosophy and Math for Mechanics, My global . ... of quantum mechanics and the accompanying philosophical disputes. .... 101/010=Abott-RSYKim-Shin-Kyo-Lectio/Divina=Vajra/Zen ...
The Philosophy of Science Fiction Film (The ... - New-Territories
www.new-territories.com/.../0813124727.University.Press_.of_.Kentucky....
enthusiasm with which many philosophers now embrace popular culture. The authors of ...... understand. They are not guilty of the crimes they are accused of but find ...... excesses of Stalinist central planning and deployment of surveillance and terror as ...... We need, says Descartes, a certainty on the level of mathematics, ...
Results for similar searches
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
surveillancecrimephilosophy.blogspot.com/Cached - Similar
You +1'd this publicly. UndoSURVEILLANCE, CRIME & PHILOSOPHY & CULTURE Words of Wisdom "the heart has its .... 101/010=Abott-RSYKim-Shin-Kyo-Lectio/Divina=Vajra/Zen Diamond Blue & White- Star and ... Method in Criminology: A Philosophical Primer.
More results for surveillance crime philosophy culture
Chinese philosophy - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Chinese_philosophyCached
You +1'd this publicly. UndoThe largest philosophical rivals to Confucianism were Legalism and Mohism before the Han dynasty. Legalism as a coherent philosophy disappeared largely ...
More results for crime & philosophy & culture zen philosophical mathematics
Ancient philosophy - Wikipedia, the free encyclopedia
en.wikipedia.org/wiki/Ancient_philosophyCached - Similar
You +1'd this publicly. UndoThe Hundred Schools of Thought were philosophers and schools that flourished from 770 to 221 BCE, an era of great cultural and intellectual expansion in ...
More results for & philosophy & culture zen philosophical mathematics
1 2 3 4 5 6 7 8 9 10 Next
You +1'd this publicly.
You
Advanced searchSearch HelpSend feedback
Google HomeAdvertising ProgramsBusiness SolutionsPrivacy
Send EmailAdd to ContactsEdit Contact
Send SMS/MMSAdd to ContactsEdit Contact
About Us | Store Locator | Support | Site Map | Send Feedback | Careers | Verizon Thinkfinity | Contact Us | About Our Ads | Privacy Policy | Terms and Conditions
Use of Verizon websites is subject to user compliance with our Website Terms of Use.
Thursday, May 9, 2013
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
SCPC THANKS THE HOST WEBSITE SECURITY-CYBER FOR THEIR POST-TAG OF OUR WEBSITE.
WE JOIN YOU IN ATTEMPTING TO BE AS INFORMATIVE ON THE GLOBAL AND US CYBER-SECURITY ISSUES, WITHOUT FORM OR DEGREE OF LEAKAGE,WHICH WE SHARE AS FOREMOST
NATIONAL SECURITY, AND CONSTITUTIONAL LIBERTIES CONCERNS.
GOD BLESS U, AND THE USA, AND THE WHOLE WORLD.
RSYCAK, PhD
PRO-LIST MEMBER, SCPC INST.,:-ABBOT, PHILOSOPHY OF LOGIC, AND IDEOGRAM SOCIETY, FILEPIEUS.COM
Outcome as Eternal End: A Reflection on Ludwig Wittgenstein's-"ETHICS, FAITH & SILENCE"
In Honor of Late Retirement of James P. Levine & Takashi Tanikawa & Roger Deakins
For F. Warren Ned Benton & John Kleinig, Christina H.E.C. MG, A.S.
What words bear significane in our lives, if the triviality of worldly pursuit can only lead to the consideration of humanity's mortality?
A spiritual, and reasonable mind that guided by what is charitable via Heart of the Gospel: which is a truthful remainder of what one should pursue, as an art and a way of Life.
To pray for peaceful a just retirement, and a final peaceful after-life.
Is this not an aim of philosophy, as now, a "discarded image"-
the Jack of all Trades, trade to none, until\
the Heavens rescue and deliver him so!
The holy indifference of Ignatious of Loyola. SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Abbotus RsCyAK, PhD
Abbot Society
Monday, May 6, 2013
A Reality test on "Mind"-Why we shouldn't try to remember everything-when in fact-we can't-and remain skeptical to how much we remember in re total memory, re-call---even if this may enhance an uncertain knowledge-the "good salt"-of naturalist epistemological gap of knowledge, which makes us loveably fallible human, and humble our intellectual pride-that we can know everything!
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Words of Wisdom
"the heart has its reason"-Blaise Pascal
Why over-think, or be hyper-critical, or analytical???
"Just Breathe!"--American Pop Song-
"Knowledge puffeths up, love full of rest"--CLOUD OF UNKNOWING-"ON PRIVY COUNSEL"
Sunday, April 28, 2013
In Honor of John I. Kleinig's Late Great Work: An Late Modern-Millenial Interpretation: of Philo-Theological-Politico-Ethics of Quantum Nano-Technology: A Blessing & Curse-
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
technology-and the Horrorific Prediction of "Mind as Brain as Materiatist World" of Human Kind--"What is a Cyborg" of Quantum Nano-Tech Save All
Images are not displayedDisplay Images
cf. 17 C CAMBRIDGE PLATONIST-MA, DD, and/or-Divinty, Philosophy-
As I "reckon" so-of the Language of the South-"Trinity College"?????
Love Much-
Richard
----------Original Message----------
From: rsyk38@verizon.net
Date: Apr 28, 2013 1:00:27 PM
Subject: Fwd: Fwd: In Honor of John Kleinig's Philsophical Methodology in his Late Years Magnum Opus of Lepton Years of a Future Milenia on "Ethics of Perils"--the Most Beautiful Works against what the Cambridge-Christian-(17th Century) Anglican Philosphical Theologians in light of the INKLINGS, and sci-fi adventure MIND of CS Lewis, and one of my favorite Shows--Dr. WHO-"against" Scientism" of the Nano-technology-and the Horrorific Prediction of "Mind as Brain as Materiatist World" of Human Kind--"What is a Cyborg" of Quantum Nano-Tech
----------Original Message----------
From: rsyk38@verizon.net
Date: Apr 28, 2013 12:57:03 PM
Subject: Fwd: In Honor of John Kleinig's Philsophical Methodology in his Late Years Magnum Opus of Lepton Years of a Future Milenia on "Ethics of Perils"--the Most Beautiful Works against what the Cambridge-Christian-(17th Century) Anglican Philosphical Theologians in light of the INKLINGS, and sci-fi adventure MIND of CS Lewis, and one of my favorite Shows--Dr. WHO-"against" Scientism" of the Nano-technology-and the Horrorific Prediction of "Mind as Brain as Materialist World" of Human Kind--"What is a Cyborg" of Quantum Nano-Tech
----------Original Message----------
From: rsyk38@verizon.net
Date: Apr 28, 2013 12:53:48 PM
Subject: In Honor of John Kleinig's Philsophical Methodology in his Late Years Magnum Opus of Lepton Years of a Future Milenia on "Ethics of Perils"--the Most Beautiful Works against what the Cambridge-Christian-(17th Century) Anglican Philosphical Theologians in light of the INKLINGS, and sci-fi adventure MIND of CS Lewis, and one of my favorite Shows--Dr. WHO-"against" Scientism" of the Nano-technology-and the Horrorific Prediction of "Mind as Brain as Materiatist World" of Human Kind--"What is a Cyborg" of Quantum Nano-Tec
Tuesday, April 23, 2013
Sunday, April 21, 2013
1 Aspect of Linguistic_Non-Discursive-Verbal-Western Buddhists Anglo-American -Iconic Reference Textualitie Theory: Roger Deakins, Nicholas Birns & John Maynard-NYU Textual and Critical Theory-WSUC-1989-1994 & Ned Benton & John Kleinig
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
What is a "referent against referent-where the referent is not and never can be signified or represented"
Enter the howling bark of a dog, and his tears and laugher-"the Icon of the Buddha's silence, and merriment of joy, of the blissful nirvanic heaven's against what Trungpa calls "the spiritual materialism": of not only the West but now of Eastern world. Buddhism is on the decline, and classical learning ig the East of Sanskrit, Pali and classical Chinese are done by scholars,esp. in the West. The I ask you--:"Why did the Boddhidharma go West, and not East t to Germany,, France, England and US roughtly in the Mid to Late 1800's. What is time without space, space without either matter or space. It is silence of love, the conflict of desperate soul,the annihilation of the mind, and most painful hope of awakening from a nightmare, not which is our common day history, but WHAT ONE MAKES OF IT! IT IS NOW WHAT YOU SAY, OR WHAT YOU WRITE AS CORRESPONDANT TO WHAT YOU DO-AS ACT OR ALL LEST IS HYPROCRISY, WHICH IS FAR INFERNAL THAN THE PRANKSTER GOD-HERMES OF--- A MEAN CARD GAME OF B.S.!
Monastaries are turning into bars, dives, and dance halls---
Love much, jIN_SHIL_MAEUM-MAKOTO-In the Heart, which Means :Truthful Spirit of SIncerity" (TR. SINO-KOREAN & JAPANESE )
Morning Star Angel of the Eastern Sea: St Augustine CONFESSION: WHAT IS TIME? Harold Bloom-On Shakeperian Admonition-"Do Not pit a Jew against a Christian" or for any believers or non-believers, or any race, creed, or ethicity, status, class, or race, gender.--for Roger Deakins, Nicholas Birns, John Maynard-NYU Textual and Critical Theory-WSUC-89-94-John Jay College of Criminal Justice PhD Program-CUNY-Ned Benton, James P. Levine, Christina Czechowicz, Ma0ry Gibson, John Kleinig, Barry Latzer, Adina Schwartz-Theoretikon-Prolepsis-Gnosis-Research Methods, Experimental-Behavioral Science-Praxis and Philosophy and History of Criminology and Criminal Justice Managment and Public Policy-E-Governance and Accountablity-1995-2010' & Psychiatric Clinical Studies-Adolf Soto
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
FASCIMILIE TEXT: 1 FOLIO
A Lyric of Angel of the Morning Star of the Eastern Seas: St. Augustine: "What is Time?"
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE By ocean side of river bed of weeping willows- then as the song of joy in the heart of threshing millstones, I saw angels reading from the Book of Life- and my lover of more than 3 aons, bloomed in times, for she was enshrined as the azalea lotos petals of an Empyrean unfolded the cosmological Hosts of Eternity. I was neither in Heaven, nor in Purgatorio, that she had passed, and has no memory of me, but a Voice from the heavens say her intent and desire is to forever pray for me, and lead me to Paradisal gates, when I will see her face to face, why Here now, in deserted, desert strand, off the Moutain cliffs, of the Hermit Kingdom, Korea, of the Southern Islands, will pray for me as a thunder vehicle diamond bolt, that I may be restored to health, and remaining poor to serve Thy Great Eternal Majesty, the Lord of Heaven & Earth. The Morning Star of East, an Angel, said I have no memory of Thee, but for you to be where I am, when there is no time, but the Salvation of Sun, and land of Mourning Calm, where the Fire and the Rose are equiposed and unanimously of Same, Null and Void& One. Richard S.Y. Kim, MA, MPhil, PhD John Jay College Fellow, CUNY Research Foundation-- Public Management, Cyber-Security & Philosophy
Posted just now by S.Y.R. Kim
A Lyric of Angel of the Morning Star of the Eastern Seas: St. Augustine: "What is Time?"
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE By ocean side of river bed of weeping willows- then as the song of joy in the heart of threshing millstones, I saw angels reading from the Book of Life- and my lover of more than 3 aons, bloomed in times, for she was enshrined as the azalea lotos petals of an Empyrean folded the cosmological Hosts of Eternity. I was neither in Heaven, nor in Purgatorio, that she had passed, and has no memory of me, but a Voice from the heavens say her intent and desire is to forever pray for me, and lead me to Paradisal gates, when I will see her face to face, why Here now, in deserted, desert strand, off the Moutain cliffs, of the Hermit Kingdom, Korea, of the Southern Islands, will pray for me as a thunder vehicle diamond bolt, that I may be restored to health, and remaining poor to serve Thy Great Eternal Majesty, the Lord of Heaven & Earth. The Morning Star of Eastern Seas, an Angel, said I have no memory of Thee, but for you to be where I am, when there is no time, but the Salvation of Sun, and land of Mourning Calm, where the Fire and the Rose are equiposed and unanimously of Same, Null and Void& Made One. Richard S.Y. Kim, MA, MPhil, PhD John Jay College Fellow, CUNY Research Foundation Public Management, Cyber-Security & Philosophy
Posted just now by S.Y.R. Kim
Q TEXT-1.763L128++++++
By ocean side of river bed of weeping willows-
then as the song of joy in the heart of threshing
millstones, I saw angels reading from the Book of Life-
and my lover of more than 3 aons, bloomed in times,
for she was enshrined as the azalea lotos petals
of an Empyrean folded the cosmological Hosts of Eternity.
I was neither in Heaven, nor in Purgatorio,
that she had passed, and has no memory of my countenance,
other than to pray and interced for a poor peregrine soul.
She was the Morningstar Angler of Morning Calm of East,
and she died, for whatever reason, for me the light was
too bright to see her form, image,
Dr. S.Y.R. Kim
Ortho-doxatic Logic of the Simple Belief Proposition
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
For Rev'd Fr. Apollo, Spiritual Director, Our Lady of Good Counsel, NY, NY, and Lucy and Tom Tucker
What is predictable is never the same as stating that it will happen or it will not happen.
Then what is predictive validity. It is really a coin toss enumerated by number of times
that you may think it will happen, which will never happen, because of doubt, to which one doubts, as it leads to bad faith and karma,
rather than belief.
For Rev'd Fr. Apollo, Spiritual Director, Our Lady of Good Counsel, NY, NY, and Lucy and Tom Tucker
What is predictable is never the same as stating that it will happen or it will not happen. Then what is predictive validity? It is really a coin toss enumerated by number of times that you may think what will happen, which will never happen, because of doubt, to which one doubts, because it may happen, if one would only believe-This vicious cycle-which Albert Camus terms the existential struggle of nihilistic existentialism and despair as "Myth of Sisyphus"--- as it leads to bad faith and karma, rather than belief. St. Peter: "Lord Jesus, help me with my unbelief." Peter then believed. And Peter walked on Water with Christ, as Lord, Master.
And at the term of phrase, it not to predict at all the circustances of the turn of events, so just be prepared and get ready-at all times, as to a degree of vigilance. As Buddhist say: "Shit happens!" Whether good or bad. It is an event, repeated in annals of history and times.
St. Augustine, CONFESSIO-"WHAT IS TIME?"
Peter: "Lord Jesus, help me with my unbelief."
Peter then believed.
And Peter walked on Water with Christ, as his Master.
Thursday, April 4, 2013
Alive & Kickin, OM_PAX_SHANTIH_PEACE-IN Defense of Paradox of "Truth Condition" and Varieties of Asiatic Quantum Logic in RE Hamlet's "Appearance V. Reality" of True but, neither Not False-CEHC, A True Teacher of Slav Amer-Asia-Replies to RSY Kim--1.5 Hybrid Korean American
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Is not saying yes, or making a "show of face"-an visible, and physical mental act? Christina. Aunty CHC-you're quite a realist-mentalist thinker. You divert the problem of Wittgenstein in Re that what Bertrand Russell edited out, was the "last lines left"__"Wherefore I cannot speak I must remain silent." But in Korean classical tradition of non-verbal culture, and communication as to postures.... So when he is quiet, still, and refinely calm, mannered, and with all his bearing-and groomed-he remains still, and and knows only too well that language creates problem of both reference and meaning--- as to contradict both fact and evidence of what appears to be the case-"that is what Hamlet's quips to Court of Elsinore"--Nay, seems, and not "is"--both contra negative, and false positive. This is very interesting line of Asian practical thinking and reasoning as you last say to, so to speak, "say and confirm the contrary as mental game." Vivre, Auntie-C!
Love-
RSYCA Kim
Most people say “how are you” but don’t stay around for an answer or don’t really expect an honest answer. So if we all say “FINE” But you can see from appearance etc. that the person is not fine so yes.. you doubt what someone says and this is often contrary to what is!
Sincerely,
C..E.H..C
<b>Subject: In Re Any Consideraiton of Judgements and Presumption of Hubris-A Propositional No Brainer--on Menal Acts Quid Pro Quo Action-: Already Live & Kicking-Fwd: Filepieus.com Philosophy of Logic--Quantum Asiatic Philosophy and Math for Mechanics, My global ...
If a man says he is fine, and is fine. Would you or anyone doubt that how he appears and what he says is what is real or false or true.
And if you say to him, neither or both. Then by challenging him you have entrapped yourself by the very own strategment of your verbal entrapment.
Not quid est qua quid? No difference other than severing off what is not real to make any moral, psychological or spiritual, political judgement's of one or another's account,
without making claim to know the mind, or heart of others. This is the Tuke or Luck of Bad Karma-Infinite Years of Bad Faith for every dastard deed, or pretense of nonsense.
Not anger, or wrath, but the doldrums of neo-orthodox, dialectical irony of the total innate depravity of Karl Barth.
Is will to believe to be now secularized outside of church?
-__SYRCA Kim
----------Original Message----------
From: rsyk38@verizon.net
Date: Apr 4, 2013 2:35:50 PM
Subject: Already Live & Kicking-Fwd: Filepieus.com Philosphy of Logic--Quantum Asiatic Philosophy and Math for Mechanics, My global WWW rank #27
Scholarly articles for surveillance, crime & philosophy & culture, Asian quantum philosophy
Political philosophy: A very short introduction - Miller - Cited by 81
… society: social exclusion, crime and difference in late … - Young - Cited by 1269
Strange weather: Culture, science, and technology in … - Ross - Cited by 459
Search Results
1. SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
surveillancecrimephilosophy.blogspot.com/
... and "War & Peace". SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE Gospel According to St. .... Timeslide. Home. Jazz and Quantum Indic Philosophy ...
2. SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE: On Mongol ...
surveillancecrimephilosophy.blogspot.com/.../on-mongol-dongyi-ko...
May 8, 2011 – SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE ... QuantumMathematical Statistictical Logic and the Criminal Justice Sancturary and ... I am first generation American Asian hybrid in culture, philosophy and heritage ...
3. in the greatest ad aeternam tribute and in - surveillance, crime ...
surveillancecrimephilosophy.blogspot.com/.../in-greatest-ad-aeterna...
Jul 26, 2012 – SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE: IN THE ....ARCH ABBOT, AND QUANTUM MATHEMATICAL PHILOSPHER, LINGUIST, AND ...AND CLASSICAL WORKS IN EAST ASIAN CIVILIZATION STUDIES.\ ...
4. SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE ...
surveillancecrimephilosophy.blogspot.com/.../heterodox-philosophic...
Dec 4, 2010 – SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE ... SUTRA ARE THE BLUE PRINTS TO THE MAKING OF A QUANTUM ATOMIC BOMB, IN THEIR MATHEMATICAL PHYSICS! ... PAN AMERICAN ASIAN INST.
5. FRAGMENT - surveillance, crime & philosophy & culture
surveillancecrimephilosophy.blogspot.com/.../surveillance-crime-phil...
Jul 27, 2012 – A Blog Bulletin introducing current ideas on cyber-security, crime, Orientalist cultural criticism, philosophy, surveillance, and poetry and religion, ...
6. Results for similar searches
1. SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE: Abrahamic ...
www.scoop.it/.../surveillance-crime-philosophy-culture-abrahamic-...
and poetry and religion, social-legal cyber/criminology. E-GOVERNANCE/BUSINESS-Peremptory/Preventive Information Systems IN re Global Security ...
More results for surveillance crime philosophy culture philosophy
2. List of academic disciplines - Wikipedia, the free encyclopedia
en.wikipedia.org/wiki/List_of_academic_disciplines
2.1 History; 2.2 Linguistics; 2.3 Literature; 2.4 Performing arts; 2.5 Philosophy; 2.6 Religion; 2.7 Visual arts. 3 Social sciences. 3.1 Anthropology; 3.2 Archaeology; 3.3 Area studies; 3.4 Cultural and ethnic studies; 3.5 .... East Asian religions ....Quantum computing · Computer graphics .... Criminal procedure · Criminal justice ...
More results for crime & philosophy & culture asian quantumphilosophy
3. Outside Electives - UC Berkeley - Department of Philosophy
philosophy.berkeley.edu/undergraduate/outside_electives
Also listed as East Asian Languages and Cultures C130. ..... theories of relativity on to the creation of quantum mechanics and the accompanying philosophical disputes. ....Criminal law raises fundamental theoretical issues that have occupied ...
More results for crime & philosophy & culture asian quantumphilosophy
1
2
3
4
5
6
7
8
9
10
Next
Advanced searchSearch HelpSend feedback
Google HomeAdvertising ProgramsBusiness SolutionsPrivacy & TermsAbout Google
Saturday, March 30, 2013
Easter Vigil-to and for Christian and Sic Anon "Christian Readers"---Toward a Orthodoxatica-Orthodox-Liberalis Orientalis Church-Reading On Cardinal Avery Dulles understanding of the doctrine of Christian faith of the Early Patristics-"where there is no psistis" "there cannot be gnosis" and what is Faith--"A hope in lieu of what assured for what we seek and desire the Kingdom of God" which Jesus Says is Within-"--I.E. the Count Lev Tolstoy-an Supreme Russian Orientalist Orthodox Christian "Kingdom of God is Within" and "War & Peace"
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Gospel According to St. Thomas (An pseudo-Apocraphral Gnostic Gospel)--"The Kingdom of Heaven has been Here, Nunc, Now--in the Time, Space, Matter Continuum" esconced in the heart, by which through Baptism we make approximation to the re-generated or re-newed, and purified soul through the Easter-Good New of the Resurrection of Jesus Christ.
Thursday, March 28, 2013
SCPC BLOG BULLETIN WOULD LIKE MOST GRATEFULLY THANK AND WISH THE VERY BEST OF THE HOL (Y) DAY OF PASSOVER & EASTER IN BLESSED, AND BLISSFUL FESTIVITIES, AS TO THANK "PHILOSOPHIES-WEBGUILD"--LOGIC AND RATIONAL INTERACTION & INFRA OTHER PHILOSOPHY WEBSTIES, AND 15,7000 POST TAG CITATIONS ON GOOGLE CHROM SEARCH ENGINES, AS WE LOVE ALL OUR E-READING SUPPORTER FURTHERMORE FOR YOUR SUPPORT, AS WE WRITE FOR YOU-AND FOR CONONDRUMS OF RESTLESS MIND AND HEART, SOUL AND ESSE ET POTENTIA WHICH IN FAITH AND HOPE AND LOVE, AS ALL THINGS WHICH MAY RISE TO THE APEX, COVERGE--IPSO CONVERSE-WESTERN AND EASTERN, NORTH AND SOUTH--------------------------------->
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Tuesday, March 26, 2013
For Bryant McGill, Fellow-Wiki Project Poet & Essayist+++++In the sub-altern caverns-the fires of shadow against the winds blow-- Raj carrying not a bejeweled scimitar, but straw hat not to be burnt against the Invisible rays of the Yellow Moon Sun-is she Evening, Morning or Noon Day calm or stillness, when a fish hook readily catches Leviat00000000000than, Illuminating Blue and Gold and Silver Magdala Star of David and Yeshua Tree, and Cross: to which trying is better than what we seek most, a silent rest, the consolation of Broken God, nor I, and not myself nor I--- forever in Resurrection, whose hope lies in everything, of the good stead of St. Mikal-the Eternal Lady with Twelve Moon & Stars. into the desert twilight I go, that God cannot die, and in the healed body from sorrow, only the Palaver soil from Life giving zealous toil, once then the palaver of the soul, with the spirit of Rose of Andalucia, Majorca, of the Spanish Isle, in time, matter, form, substance, abyss of empty bones, in communicado with Choir and Dominion of All Angels, and Saints, of Ipso Converso West & East, soul buried in the Scorched Earth, Post Fall, the soul resurrected bears fruit, in hidden soil, ever calm as movement centripetal gravitas, but in the Light of the Late Harvest, blossoms azaleas & geraniums, daffadils in the naked woods, by the ancestral forest and grotto.
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Sunday, March 24, 2013
Richard Sang Yeong Cyprianne Andreweson Kim, Ph.D, Fellow, John Jay College of Criminal Justice/City University of New Research Foundation GSUC would most grateful thank University of Pittsburgh Health Science-Medical Humanities Center-History of Science & Technology Division for admitting his Dissertation Reference Manual to Digital Archive Catalog! Dan Dan Hee Kamsa Hamni Da-trans. Korean- Thank you mas muy most gratefully!
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Friday, March 22, 2013
Editor in Chief and Publisher RSY Kim, Ph.D, Fellow, John Jay College of Criminal Justice-CUNY GSUC Research Founation-Dept. Public Management/Crim J/Law/Econ-Philosphy would like to graciously and in earnest great Thanks TO______ University of Hong Digital Library, Hong Kong Poly Tech Inst. (Doctoral Research Dissertation Consortium), and Villanova University Digital Libary in Criminal Justice/Law/Public Policy, and Social Science-Polical Science Digital Archive for admittning his E-Dissertation Reference-Manual-"Cyber-Surveillance: A Case Study in Policy and Development"
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Dad, Ki Suk Steve Kim, RIP, I miss you--I hope you are proud of me, in my early middle age.
Bok Yun Jane Kim, Grace, and Julie and Sang-Hyub, Michelle and Anna Lee, and my family in South Korea and LA, California.\
-----------------------------''
And F.Warren Ned Benton, James P. Levine, John Maynard, Roger Deakins, John Kleinig, Christina Czechowicz, Adina Schwartz, Mary Gibson, Barry Latzer, Gautam Ramakrishna &the Ramakrishna Family, Adolf Soto, Nicholas Birns, and Michele Lowrie, all my Distinguished Professors and Tutors, Lucy Tucker, Rev'd Fr. AP Kowolski & Benjamin X. Liu & John T. Choi, Mary McManus, John H. Morgan-in futura post-Fall In Memoriam-
Ruth Rosenblum, Mary Louise-Diaz Matos, William Strauss, Jeremy Gardos, Ardsley High School Alumni-1989'
To NYU,WSUC-89-94'
JJC/CUNY GSUC-1995=2010
Psalms-"In God's Light, we shall see light."
Snyoptic Gospel, Koine Scripture-"Love one another, as I have loved you."
Buddhist Maxim: "A lotos blossoms in the river-bed of mud."
Charlie Parker-"Complete Collected Vols."
John Coltrane-"Inter-Stellar Space" "Transitions-Supreme Love"
Miles Davis-"Smile"
Wes Montgomery-"Around Mid-Night"
33/1=Lemma<----->0/1 <=+/-=> 1..2..3..
Thursday, February 21, 2013
In this dark winter's night of our discontent, why not wait for day break out in the snow, and play in the yard, where the river and Sun shines and flows, by the Meadow Pond, and to Warm Your Heart, by the Deer Brook's Manor-
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
"what is the opposite of knowledge, O ananda"
"I don't know"
"It is freedom"
"Which is so frightening that you really don't know"
"Take the first step, followed by another, and in repetition"
"Up the hill like a merry go round"
"The infinite cycles of rhythm and sleep cycles, will humble you as a beginner,and
that IS WHAT ONB needs for a journey"
"The rest is going through the motions, and repeat ritual, where there is no repitition"
"where form is emptiness, emptiness,
nothing which is not empty nor full-
and all things full and also full"
To and for AE M--- Dae Doe Sa Seung Sahn, and Shin Ryu Suzuki, and Raimon Pannikar, and Avery Cardinal Dulles,
and In Memoriam Soren Kierkegaard and Regina, AE_M-JRR TOLKIEN, TS ELIOT, THOMAS MERTION-RABBI MOSES IDEL OF ESPANA-THE KABALIST CIRCLE OF DONGYI/UNGARITIC/SLAV OF PRAGUE-KIEV, WRITTEN IN ARAMAIC COMMENTARY-M. BUBER-F. ROSENWWEIG, SACRED SCRIPTURES, AND PARABLE AND TALES, DEAN ALAN WATTS, ON HINDU-ZEN BUDDHISM, DONALD KEEFE, SJ, AND "INTER-COVENANTAL THEOLOGY" AND THE DEUTERO-CANONICAL OF THE THE 12 TRIBES OF ISRAEL, VIZ. DANUBE, AND EMPEROR DAN-GUN, 2,333 BC, PRE-AXIOLOGICAL AGE-
and Seoul National University, School of Business, Class of 17'
Tuesday, February 19, 2013
Hebrew Prov. "In God's Light, we shall Light"-Lux Fiat-Genesis 1,
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
"I hope, I die, because I cannot die."--San Juan De La Cruz, Mystical Doctor of the Church, Patron Saints of Espana Poets
Sunday, February 17, 2013
Sean Van Beverhaudt-New Senior Associate Editor in Chief of SCPC-BLOG BULLETIN JOURNAL
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
DR. ROBERT MCPHILLIPS, BA. COLGATE UNIVERSITY, ENGLISH LIT. & PSYCH; PHD U-MINNESOTA, MINNEAPOLIS, ENGLISH AND COMPARATIVE LIT.
IONA COLLEGE, NEW ROCHELLE.
"WHEEL IN THE SKY KEEPS ON TURNING. I JUST....DON'T KNOW."--JOURNEY
We thank our Inter alia Post Tag Website SECURITY_CYBER_RSY KIM
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Thursday, February 14, 2013
Regent's Birth under star of the Heart-Mysterium Fidei from Gyeoung Ju and Hein Period-Foundation Kwanju Buddhist Mt. Temple to Kyoto-Kamakura-Knight Errant-White Light Under the Morning Calm of the Sun-Rising
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
T0 AND FOR ST. VINCENT'S-ST. JOSEPH'S HOSPITAL-CENTER, MD, PHD, LMSW-CW-MS, Staff, Harrison-Yonkers, NY;
Westchester County Medical Center, Behavioral Science Center, New York Medical College, Faculty, and Staff, Valhalla, NY; E-CONFERENCE CHAIRS, AND ADVISORY BOARD, DIGITAL PRO-LIST INST.,: SURVEILLANCE, CRIME & PHIL.,
TO RLD, JM, AS, NB, JL, BL, JIK, AS, MMM, N.B. CEC, MG, GR, M.L., AND JHM, LT-TT, Rev'D Fr.K
JOHNNY'S TAXI
TRANSPORTATION TO THE STARS
8 AVONDALE Road\Harrison, NY 10528
914.835.2222
JOHNNYTAXI.NET
=============88888888888888888888888888888888888888888888********************************************
Joe Inn had been born of unknown parents and lineage,
but had been adopted by the Chief Regent of Kwangju, and whose noble wife
was the Duchess of Puyo, Paekche. She was so beautiful that among the many wives
of the Monarch-he honored the purity of her beauty and devotion in oblation the to Buddhha,
and ancestral divinities. The abbot falsely claimed that she broke her vows of celibacy
as a novice contemplative nun, and had a child with another high monk.
Who was this infant baby, and who was his mother and father.
The regent than fearing for her to be enslaved to house of indentured servants, "exiled" her and her son
to the Duke of Kyoto, which was ancestral in line of his first-second cousin, to be a Unknown Hermitess,
since her reputation and her life was at jeopardy.
She died, so the Duke raise Joe Inn as his son, but as knight of Bushido, which attacked during the Sam-Guk-Sagi
period and Heian, which their was Universal Peace between Tang, Silla, Koryeo, and Paekche, Yamato-Fujiwara-
The abbot in Kwang-ju had been officially declared to be a villian, and a corrupt, black-lama-of demons, and devil worship.
Joe Inn became General at the age of 14, which by Silla and Tang Standards was meritorious.
But what appeared in his mind, was not the vain-most hateful glory of geneological trumps of miltary royalty and descent, but mysterious death
of this, beautiful virtuous woman, whom he knew was the wreckoning of divine retribution as the Orthodoxatica-Vinayana-Praxis Teaching of the "One who slays a Buddha or a Boddhisattva, burns in the bottom of Hell."
And in the 999 Ronin Wars of the Avatars of Chaos-wars between Late Koryeo, China, and Japan-
Joe Inn had declared the True Teaching By Heart was defend the Innocent and defenseless, and protect the orphan.
Like his mother who went off into Mt. Diamond by Manchuria and China, he sided with no one other than to defend the Most Merciful, and ONE who is Not fllled with Hatred, and Bloodthirst, in the Full Act of War.
HOW JO-INN DIED-
When their was pillage, in Gae-Sung and Nanjing, who saw a women who his eyed loved which was White Pale-Milk Color face of the Twilight Full Moon, and her children being attacked by demonic foot soldiers of Hell.
He flew down form a 999 feet Mt. clff, and drew his sword severed the heads of 700 men in one stroke.
Joe-Inn no longer knew how his mother was buried that her ashes in which the lives he saved in their place was to made to be built into a Golden Temple of Universal Mercy snd
Justification of Peace on Earth, and to Kill Sparingly with Mercy upon the Heart of the Death of Perceptory Faculty of Sunyatta-Kenosis, Prajna-Void-Metta Sutta-Sa-Lang, Ruah: SHAKINA: Shamlom-
Ppeut-GKwa-Abyss of Virtue, Mater Afflictorum, O Schema, Salvador Mundi, Mediatrix, no occulos, nisi modo nolo--CHUNG GUEK NA LA JUN JENG.
IN PEACE HE LIVED, HIS HEART AND MIND, UNKNOWN TO WORLD, BUT TO BUILD A TEMPLE IN SKY WHICH BURNS BRIGHTER THAN THE SUN BEYOND-CROSS YONDER THE STARS, OCEANS AND SEAS.
AVE MARIA, STELLA MARIS, AVILOETHSHVERA, CANNON=JIZO, MARY OF EGYPT
Psalm-"A broken contrite heart he will not despise or turn away, nor fail to punish the House of the Wicked"
The Dharma Tao Eye of Y_H_W_H, God of Abraham, Issac, Ishameal and Jesus & Ezekiel and House of David.
"Pray for the peace of Jerasulem"
"All Israel will be saved"-St. Paul of Tarsus
ABBOTUS PRIMATUS HERMITICUS RSY KIM, OSSTB-M-A, SHIN-KYO- Lectio-Divina--CONTEMPLATIO-
Wednesday, February 6, 2013
Resurrection de Sancta Valentine on Feast of Saint's Banquet
"He who is holy is no more for this world, for the Eternal Flame of the Fire of the Holy Spirit" has consumed his body, mind, and soul in the throes and threshold of pain-abandoning as what Christ his Father, Mother, and Family, and his teachers, and lovers, and friends, other than the course of Providential Writ and Crede; the rat's ass tom-follery of claiming all that is counter-feit of the Holy Law of Moses, Buddha and the Gospel of Christ. As to abandon all things to care of God, in turmoil, but not woe. Liars and cheats, who in inner wreckoning of guile and false righteousness claim the throne of God, Christ and Church--as to lie, and prevaricate the Verbum Dei to make fodder for canon ball drive of deceit, to be homeless, toothless beggar, a mental cripple, limbless and voiceless and mute to inherit the Kingdom of God, and the Beatific Vison! Lies, to tell her sum total to counter-feit the Dharma-Dei-Logos Veritas as Lux.
My final words, to some, to others, and rather all to none.
A Blessed St. Valentine to my few mistresses and lovers, whom I have left on the Road to Damascus of Paul of Tarsus=
but she whom to was Church, burning with the BridEgroom, whom He cleansed as Like Old in the New ARK OF THE CONVENANT-AS IN THE HOST OF THE BANQUET WHO BROUGHT THE ROYAL TREASURY OF THE ANCIENT AND THE NEO-LIGHTS OF THE SACRED HEART,
WHICH BLEEDS IN MINE EYES, THAT WERE SHE TO SUCK THE MISERY OF LIFE via In )Roads of PLEASURE, FOR SHE WON IN THE BREAKING BREAD OF BREAD TO WHICH HER LONG ELVEN BLACK BROWN HAIR-BREAD, WHERE ADORE DEVOTE, LOVE THE SOUL IN THE BUCKLE OF HER SHOES, WHERE IN THE LADY CHAPEL-WAS THE VESTAL SAINTS BANQUET FEAST OF THE BREAKING OF BRIDE, BEYOND THE LAST CANTICA OF HEAVEN, NOT OF GANGES, BUT OF THE TIGRIS, AND EUPHRATES, WHERE SHE WORE GREY, WHITE AND BLUE, AND HER NAME, WHICH I NO KNOW NOT HOW TO SPELL, READ, BUT SAY OF ROSE OF SHARON, IN WHICH HER NAME WAS THE FIRST OF DICKINSON, AND SECOND to none EMILY.
Farewell--
the last line of Resurrection of St. Valentine on the Feast of Love of Banquet of the Saints-
Bosom of Abraham, of the endowed breast of Sarah that fed the Children of Israel, and the Heavenly Israel in which Xia-Yhuan Paradise of the Highest Spheres
of the Son of David, Jesus, and of Mary, was the Breast Plate of Fire of His God of Issac, and Jacob, and the Fiery Obital Wheel of Ezekiel and Ashoka the Greats's the Wheel of the Dharma-which went east of Indo-Nepal, my Mom's Matriachal Tribe Lineage-
in the Hebraic Diaspora to Dharamsala, India of the Celt Bretons of to which Ungaritic Dongyi/the Finnish Noridic via Slavs
was my breast plate of Pascal's Tropological Derivative Calculus, that in his premature death-his "libertine" love of whom he walked and escorted to lake and pond of Provinciale
was the Torah and the Gospel of St. John, and loved his strict Orthodox Catholic Father, who would have cained, and perhaps thrown him out of the house of breaking family tradtion, and fight the Jesuits, and becoming a Jansenist, which Eliots', was a "Calvinist in Vestments"--
to whom I have loved and admired and adored, to equipe in my missive the the Diamond-Sutra Mikal-Sword of the Dongyi-Chinese-logicians of what once was the Orient of Vienna, Cambridge, C.C.N.Y., hidden among child hood loves-, late loves, all hidden under an Irish Clover,
smoking cloves, and Tiley Tea Leaves of London, on TOPS, Parisian tobacco paper, and to whom I sing a ode
of vestal virgnin prayers-to whom all you fill my heart with spiritualist sensuality of
Da, Datta, Dyamatta, Shantih, Shantih, Shantih, Dyahdam-Diamond Cross Star Metta Sutra---
She who I hold a a dagger to my own to tongue to remain ever verdant green to remain hidden in SACRUM SILENTIUM, CHIN_MUEK_CHIN_MOKU-
St. Michael's Missalette-Tridentium Missal-
Cyprianne Bueo Ywheol Andreweson SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Thursday, January 31, 2013
Among Misc. David Gilbert IN Re Jewish Philsophy+?()101/010=Abott-RSYKim-Shin-Kyo-Lectio/Divina=Vajra/Zen Diamond Blue & White- Star and Cross of and Genesis-Flatliners AMIDST "TWL" and Metaphysics of Hope=Spes-Shalom=Psistis/Gnosis/Prolepsis/THEORETIKON
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE & E-CONFERENCES, LETTERS, DIGITAL PRO-LIST INST., SURVEILLANCE, CRIME & PHILOSOPH (SPC) WELCOMES
FOR JOHANNES VON NEUMANN, AND HILARY PUTNAM, AND YALE DIVINITY SCHOOL, AND FOUNDATION HOUSE/OXFORD-CHRIST CHURCH COLLEGE-ADVANCED COGNATE-PHD PROGRAM IN THEOLOGICAL AND PHILSOPHY OF BEHAVIORAL SCIENCE STUDIES, OF HEART OF CHRIST SUTRA, AND MY OJI-SAN TAK TANIKAWA--WHO TAUGHT ME THE "JESUS SUTRA" OF AKIRA KUROSAWA'S "RASHOMON" AND "SEVEN SAMURAI" AND "RAN" AND "SEVEN SAMURAI" AND "DREAMS"
DAVID GILBERT, LMSW (CAND) HUNTER COLLEGE-cuny-LITERATURE, FILM, FILM, SOCIAL WELFARE POLICY-JEWISH PHILOSOPHY AND SCIENCE
AS E-CONFERENCE CHAIR INFRA ADVISORY BOARD.
WE THANK GOOGLE AD PREFERENCE MANAGER FOR GLOBAL CORP. AD SPONSOR IN INDUSTRIAL SECURITY DATA ANALYTICS, AND E-GOVERNANCE OVERSIGHT POLICY-ARCHITECTURE, AS WELL E-POLICING-POLICE CONFERENCE, AND ESP. IBM COGNOS-SECURITY ANALYTIC SYSTEMS;
UNISYX DIGITAL SYSTEMS FOR THEIR AD SPONSORSHIP INTER ALIA GOOGLE AD PREFERENCE MANAGERIAL ACCOUNT, NON GRATISSE, TO WHICH SCPC, AND D-PRO-LIST INST.,:SCP, AND BING.COM FOR THE MOST EXTENSIVE CONTEMPORARY CLASSICAL, BUT-NEO LATE MODERN-
OF ELIOT, YEATS, JOYCE, TAGORE OF THEIR W-E. INDO-EUROPEAN-URAL-ALTAIC-JEWISH DIASPORA OF "DEUTERO-CANONICAL" HELLINIST HEBRAISM OF TRIBE OF JUDAH, BENJAMIN, DAN, AND JACOB-WHICH IS NOW IN APROCPHRYAL AS MYTH AS LORE AND HAGIOGRAPHICAL HISTORIAGRAPHY OF BOTH JEWISH, EARLY CHRISTIAN AND MEDIEVAL SAINT'S LIVES IS THE BEING RESEARCHED, AS WELL IN THE CIRCLE OF TRIANGLE, SQUARE OF SPHERES OF BUDDHIST, TAOIST, AND HINDU AND MUSLIM SAINTS ON THE VEILED HEART OF RIGHTEOUSNESS, AND PATIENCE, AND WISDOM OF WHAT JOHN STEINBECK'S HEART BROKE OF THE "WRETCHED OF THE EARTH" OF OPPRESSED, AND AFFLICTED, POOR, AND PRISONER, AND MENTALLY AFFLICTED, AND URBA IN TERRAM, DISPOSSED TO WHICH, TO WHICH IN MODEST HOMEAGE TO MY MOTHER "COERCED" MADE TO READ STEINBECK'S SHORT WORK'S IN 2ND AND THIRD GRADE-
"THE PEARL" AND "OF MICE AND MEN"--AND NOVEL AND FILM TO WHICH A HEART, AND SOUL, AND BODY CAN BE BROKEN-"THE GRAPES OF WRATH"--"ST. PAUL'S" OP.CIT. "TO THE/UNKNOWN GOD" AERCROPOLIS-POLIS-TRAVELS AND MISSIONS TO GREECE, TO WHICH DAVID GILBERT, ONE OF HIS FAVORITE AUTHORS, AS AMONG THE CANON OF THE AMERICAN GREATS, WAS THE VAJRA/ZEN/TAOIST CONFUCIAN DIRGE OF THE "CHANG-BEUO TARYEONG"--"THE SONG OF THE GI-SAENG"--THAT IS IN SINO-JAPANESE-CHINESE-KOREAN PICTOGRAM-AS ICON OF ICON OF THE BUDDHA--WHICH IS MIROR OF THE "WORD" OF "WORD" WHICH GREAT ZEN MASTER TRAN NICHT HAN, CALLS A PARALLAX WORLD-WHICH DAVID GILBERT AND MYSELF-DISCUSSED ABOUT THE SEMINAL FLOW OF WHAT WAS CONCEIVED AS THE "FLAT THEORY OF PLANES, AND PARALLEGRAM" STEMED ITS ORIGINS IN BOOK OF GENESIS TO WHICH HOW MANY DIMENSIONS OF TIME, SPACE, AND MATTER TO WHICH IN THE SIX DAYS OF CREATION, HOW MANY DIMENSION OF METAPHYSICAL WORLD IN THE ACT-CREATION OF THE WORLD, PRECEDING THE BIRTH OF MAN AND WOMEN AND CHILD. MR. DAVID GILBERT SAID THAT IS THE RUB OF QUANTUM METAPHYSICS OF JEWISH PHILOSPHICAL TRADITION OF GENESIS & ANTI-METAPHYSICAL QUANTUM DIAMOND SUTRA PHILOSOPHY OF THE ONE STREAM MIND-CONSCIOUSNESS OF THE HEART OF GOD!
-----David Gilbert & Abbotus Hermeticus Primatus RSY Kim-SHIN-KYO-LECTIO/DIVINA-ABBOT SOCIETY, JERASULEM, EGYPT, ROME, INSTANBUL, SHANGHAI, SEOUL, TOKYO, AND ST. PATRICK'S CATHEDRAL, ARCH-DIOCESE OF NEW YORK, SECULAR MONASTIC INST. VATICANA, URBA IN PACEM, ROMA
Sunday, December 23, 2012
St. Thomas Aquinas: Summa Theologic In Relatio to Actus [Action]-Relation to Virtue- Goodness and Power
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
"What is called good is either the end or is ordered to the end, Thus, since the good of the agent consists in actus (action), by the very fact the virtue of actus makes the agent good>>>>>and is referred to a bonus actus--and action in relation to goodness and power, which is virtuous....and for this makes one's soul virtuous." (pp. 62)
Interpreation and exegesis of Thomist doctrine of Actus-Action and Virtue Philosophia of the Love of Wisdom of Aristotle, Pseudo-Dionysisius-trans.
by
Trans. Michael P. Grace Uiversity Professor (Late) Ralph Mcinery, University of Notre Dame, Philosophy Dept. Selected Writings of St. Thomas Aquinas, Penguin Classics, 1998, All Rights Reserved. And also secondary Trans. bt Abbott DO SA-Richard Cyprianne Andrewes Sang Yeong Kim: Shin-Kyo Abbotus Primatus Abconditus,OSSTB-M-
A-K: EASTERN LATIN ASIATIC MONASTIC INST. SINO-KOREA-JAPAN-INDO-NEPAL--SHIN--FAITH/HEARTE/MENS-MIND---MA=EUM-SPIRITUALISSME: AS FIND-KYO-FAITH-AS INTER ALIA FAITH-SCHOOL-LECTIO-DIVINA-ST. BENEDDETO OF ITALIA, ROME, VATICANA-IN COMMUNIO-
Saturday, December 22, 2012
On Soren Kierkeggard as "Subjectivity" as Truth and Inwardness and What is "Real" as "Works on Love"
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
"God does not exist. He is eternal"
"Subjectivity is truth...SUBJECTIVITY IS REALITY"
EXPLANANS EXPLANANDUM-DIVINA NATURA NATURANS-
"TO WHAT IS SPIRIT, AND BODY AND SOUL OF INWARD PASSION MANIFEST IN DOMINION
AS VIRTUE AND POWERS-IS THE REAL AS INWARDNESS TO IMMORTAL, AND HOLY ONE OF ISRAEL, GOD OF ABRAHAM, ISSAC, JACOB AND JESUS."
A BLESSED AND MERRY HAPPY SAFE, AND PROSPEROUS HANAKAH, AND CHRISTMAS AND HAPPY NEW YEAR-2013'
"LOVE COVERS A MULTITUDE OF SINS"--ST. PAUL
Thursday, December 20, 2012
Stars A fire 9
Nine burning stars at Nine sun down-
whether at dusk, the moon rises beyond the sun.
When I think of you-
there are fiery lake beams dancing unicorns
in the blue whites of your luminiscent eyes-
mortal, not an angel, but yet so divine-
how at tis moment I can't niether mime your mind,
nor count the time.
Is this love of women?
Or perhaps, a Doe Sa hermit in beata solitudine-
in the stark morning break dreaming of noon day
of Heaven the 7th Paradise of Heaven. Dream of
Sunyatta of Blue and White Sky!
Wednesday, December 19, 2012
IFF AND WHENS'T I HAVE MASTER THE CLASSICAL SINO-KOREAN VIA JAPANESE IDEOGRAM-I WILL BE MADE O PHANTOM CITY RUIN OF AN EMPIRE OF GHOSTS
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
"Whe all things have past and done-All thing will pass away, but My Word Shall never
Perish or Pass Away"--Logos-Verbum Dei-Shakina-Interconvenantal Mystagogicus-Philosphical Mysterium-Tremens et Inscrutabilis-
to and for Late Ki Suk Stephen Kim, Young Joshua Sik Kim (Late), Carl Weidemann, Christina Czechowicz, Michele Lowrie, Mary Gibson, F. Warren Ned Benton, Roger Deakins, John Maynard, John H. Morgan, Emily "Q", James P. Levine, Adina Schwartz,
Byranna Ramakrishna (Late), John Kleinig, Bok Yun Jane Kim, Huh Sook, Keum Soon, Tae Yul, Nicholas Birns, Adolf Soto, Jr, Elinore Kramer---with Memoria-Amor-St. Augustines- In Re Non Christiana Doctrina as TAO-
SO I MOURN THE SORROWFUL DEPARTURE OF MY LATE FATHER-
THE CLASSICAL TRADITION TO NOT CUT MY TOP HAIR AND KNOT
FOR 7 YEARS, AND GROW A BEARD-
AND ANOTHER 1 YEAR FOR 8--for Iconic Eastern Orthodox No. of New Creation-Post Rededmption I AM HERMIT-MONK ABBOT-"DOE SA"
OF THE SS THOMAS & BARTHOLOMEW-SS. METHODIUS-ST. ANDREW DAE KYEON
KIM & CARDINAL KUNG-
THE JESUIT ORIENTALIST OF CHINA THE PATRON APOSTOLIC SAINTS OF
INDO-CHINA, KOREA & JAPAN-
O ST. FANCIS XAVIER, WHO BELIVED THE JAPANESE WERE MORE ENLIGHTENED
AND COURTEOUS AND POLITE THAN EVEN HIS ILK OF O EUROPA-
SO WHAT IS TO BE SAID AND TO BE LEFT NOT A WORD, THAT A A TRUE MAN
WHO HAS INFINITE TOURS OF DUTY IN LOGOS-DHARMA-TAO COMBAT
WINS HIS ENLIGHTMENT AS ABBOT RSYCCAK SHIN-KYO DO SA,
THAT THE TEARS AND LAUGHTER OF A LITTLE DOG WITH EMBRACING HIS
MASTER IS THE IS IDEOGRAM OF CHIN-CHIN-MOK-KU OF THE SILENCE
OF THE WAY OF THE CHRIST OF THE SILENCE OF THE BUDDHA-
SO HE HEVER SHEDS TEARS, BUT CRIES IN THE HEARTE-
THE RUIN AND FALL AND EMPIRE OF METROPOLITAN OF CRUEL LOTS
OF CITIES, THE BLOOD OF GHOSTS IN THE RIVERS OF
RED DUST, ASHES AND SMOKE TO THE ALTAR OF GODS, AGNI, AGNI-
ALTAR, FIRE, DIVINE SACRFICE,
SALVE, THEOTOKOS, NOS
KYRIE ELEISON,
CHRISTE, ELEISON,
BUDDHA-O TATAGATHA, TO THE END OF CESSATION OF CRAVING DESIERE
OF THE PURJURED MIND'S EYE OF THE SEA OF BLOOD
WHICH REBELS AGAINST PSISITIS, SOMA, METANOIA, SANCTUS SPITIUS OF
OF THE TRUE AND ONMIS OMIUM OF THE DHAMR EYE OF CHRIST!!
WHICH
WHICH
Sunday, August 12, 2012
QUIZZICAL QUIP IN RE ALFRED TARSKI'S "SEMANTIC THEORY OF TRUTH" & WHY DEAN NYU ENLGISH PROF. JOHN MAYNARD CLAIMS THE IDENTITY-SHIL-CHUN ACTION/PRACITCE/OF LANGUAGE AS RESPONSIBILTY AND MERRIMENT--
SURWe did not say much other talking about Dean John Maynard lecture
presentation on 19th C. American Irish Victorian Literature @ DAE JEON UNIVERSITY, S. KOREA***
and his visit to ancient burial tombs of Paekche-Silla tomb@NYU
of the burial shroud of Kings,
& Maynard said joyfully & delightfully-"I do what I do and say, and teach@
in English, because***I am an ENGLish Professor at NYU"
The over simplicities of reading of Foucault's DISCIPLINE & PUNISH-,
and his latest work on "peripheries of the Empire"
which is Bruce Cummings muse for Ancient Yalu River ]
bridge of ancient China & Korea alliance & relationS,
though Korea in the late 18th C. turned into a tributary
system against Japan.
Against Raymond William-on Materialism AND TO AND FOR-AND NEITHER BOTH AND OR-SAID ABOUT "MATERIALIST DISCOURSE[S]"
AS CRITICAL HISTORICAL TEXUALIS INTERPRETATIO-- -
The scholastic INTEGRAL-HOLISTIC ecological spiritualism,
LOGOI-DHARMA-DAO OF St. Bonaventure, the Francisan brown
robed friar and philosopher, mystagogU,
and monastic theologian.
Rinpoche Lama Choygam Trumpa--"Contra spiritual materialis of philosphy & discourse"****
Great landmark hermetic Indo-Tibetan, mind spirit body one mind heart stream consciounsess.
To be awakened and resurrect, for truly LAZARUS, SHALL NEVER DIE,
BUT IS NOT DEAD, BUT EVER ALIVE*********
VEILLANCE, CRIME & PHILOSOPHY & CULTURE
Tuesday, August 7, 2012
"PILGRIM BY THE WAY SIDE" by Richard S. Kim
SURVE
Viaticum
Deacon Steward addressed her
as a crack whore flower planted
in the primrose path by the garden
of memory and delight. Almost bled to
death, had he not pulled the stolen
syringe out from muscular skeletal veins
and rushed her to the hospital during Mass.
She wanted to be rescued by a homicidal
male with patriarchal sensibilities,
when he referred to her as what she knew
herself to be in her delirium.
your dagger pierced my cold quivering entrails.
Ora pro nobis, in youth my ruptured aorta
and spleen the sacrifice. Father.
The desert is pressed between the
enflamed loins of your sulking brother.
She desired to confess, but was enamored
with the idea of the viaticum and the tomb
of St. Peter in the Basilica. She dreamed more
about the relics and ruins of the Holy Roman Empire
and burning votive candle offerings than
of heaven,.
ILLANCE, CRIME & PHILOSOPHY & CULTURE
Monday, August 6, 2012
"CYBER-SURVEILLANCE: A CASE STUDY IN DEVELOPMENT & POLICY"-REFERENCES-REV. PROPOSAL-Richard S.Y. Kim, Ph.D. City Unversity of New York, All Rights Reserved, 2008
SUR References
Alderman v. United States, 394 U.S. 165 (1969)
Alberti, A. (2002). Wiretaps: a complete guide for law and criminal justice professionals. Ft. Lauderdale: Austin & Winfield Publishers.
Ballard, J.D., Hornik, J.G., Mckenzie, D. (2002). Technological facilitation of terrorism: definitional, legal and policy issues. American Behavioral Scientist, 45,958-989.
Barker, J. (2004). “Comment: Society’s carnivore, both good and bad, why we need it, and how to regulate it.” 74 UMKC L. Rev. 945.
Benn, S. (1971). Privacy, freedom, and respect for persons. In J. Pennock and J. Chapman. (Eds.) Privacy. (pp.1-27). New York: Atherton.
Bereano, P. (1999). Technology and human freedom. In M.D. Ermann, M.B. Williams, C. Gutierrez. (Eds.). Computer, ethics, society. (pp.278-84). New York: Oxford University Press.
Berger v. New York, 388 U.S.41 (1967)
Borsook, P. (2000). Cyberselfish: A critical romp through a terribly libertarian culture of high tech. New York: Public Affairs.
Center for Strategic & International Studies. (1998, November). Cybercrime……cyberterrorism……cyberwarfare: Averting an electronic waterloo. Retrieved June 1, 2001, from http://www.csis.org/pubs/cyberfor.html
Carol, G. (1997). “Federal agencies open unified hard drive to control mafia.” New York Times, February 22.
DeCew , J. (1986) The scope of privacy in law and ethics. Law and Philosophy, 5,145-173.
DeCew, J. (1997). In pursuit of privacy: Law, ethics and the rise of technology. New York: Cornell University Press.
Denning, D. (2000). Statement of Dorothy E. Denning. Retrieved June 4,2001, from http://www.house.gov/hasc/testimony/106thcongress/00-05-23denning.htm
Denning, D. (2001). Information warfare and security. Boston: Addison and Wesley.
Denzin, Norman K. and Yvonna S. Lincoln (eds.) (1994). Handbook of qualitative Research. Thousand Oaks, CA: Sage.
Denzin, Norman K. and Yvonna S. Lincoln (eds.) (1998b). The Landmark of qualitative Research. Thousands Oaks, CA: Sage.
Denzin, Norman K. Yvonna S. Lincoln (eds.) (1998c). Strategies of qualitative Inquiry. Thousand Oaks, CA: Sage.
Ditzion, R. (2003). “Electronic surveillance in the internet age: a strange case of pen registers.” 41 Am. Crim. L. Rev. 1321.
Dowley, M. (2002). Government surveillance under the U.S.A. PATRIOT ACT: Is it possible to protect national security and privacy at the same time? A constitutional tug of war. 36 Suffolk U. L. Rev. 165,182.
Douglas, J.D. (Ed.). (1971). The technological threat. Englewood Cliffs: Prentice Hall.
Drozdova, E.A. (2001). Civil liberties and security in cyberspace. In. A. Sofaer & S.E. Goodman (Eds.). Transnational dimensions of cybercrime and terrorism (pp.265-286). Stanford: Hoover Institution Press.
Dunham, G. (2002), Carnivore, the FBI e-mail surveillance system: devouring criminals, not privacy. 54 Fed. Comm. L.J. 543, 566.
Erbschloe, M. (2000). Business on the web is not worldwide. Retrieved July 7, 2002, from http://www.businesseconomic.com/cei/press.index.
index.html
Electronic Frontier Foundation, NSA spying FAQ, http://eff.org./nsa/faq
Ellul, J. (1964). The technological society. New York: Vintage.
Etzioni, A. (2002). Implications of select new technologies for individual rights and public safety. 15 Harv. J. Law & Tech 257. 290/
Etzioni, A. (1999). The Limits of privacy. New York: Basic Books.
Fowler, G. (1977).Unmailable. Athens: University of Georgia Press.
I
Freedman vs. America On Line, Inc. 412 F. Supp.2nd (D. Conn, .2005).
Freeh, L. (1997, June 4). Excerpts from testimony to the senate judiciary Committee. Retreived June 5, 2003, from Center for Democracy and Technology Web site: http://www.cdt.org/digi_tele/970604_Freeh.html
Grabosky, P. (2001). Computer crime: A criminological overview. Forum on Crime and Society, 1, 2-53.
Grabosky, P., Smith, R.G., Dempsey, G. (2001). Electronic theft: crimes of acquisition in cyperspace. Boston: Cambridge University Press.
Gross, H. (1971). Privacy and autonomy. In J. Pennock and J. Chapman. (Eds.). Privacy. pp. 169-182. New York: Atherton.
Gruber, A. (2007-2008). “Garbage pails and puppy dog tails: is that what Katz is made of?” 72 U.C. Davis L. Rev. 781.
Gubin, T. (2008). “Note: Warshak v. United States: the Katz for electronic communication.” 23 Berkely Tech. L.J. 723.
Haas. T.C. (2001). Carnivore and the fourth amendment. 34 Conn. L. Rev. 261, 290.
Henderson, S. (2003-2004). “Nothing new under the sun: a technologically rational doctrine of fourth amendment search.” 72 Geo. Wash. L.J. 805.
Hartzog, N. (2002). The “magic lantern” revealed: a report on the FBI’s new “key logging” Trojan analysis of possible treament in dynamic legal landscape. 20 J. Marshall J. Computer and Info. L. 287.
Horn, K.A. (2002). Privacy versus protection: Exploring the boundaries of electronic surveillance in the internet age. 29 Fordham. Urb. L.J. 2223, 2274.
Huberman, Michael A and Mathew B. Miles (1994) “Data management and analysis Methods” in Denzin, Norman K. and Yvonna S. Lincoln (eds). Handbook of qualitative research. Thousands Oaks, CA: Sage.
Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books.
Katz v. United States, 389 U.S. 347 (1967).
Kleinig, J. “Ethical perils of knowledge acquisition.”
Kerr, O. (2002-2003). “Lifting the fog of internet surveillance: how a suppression remedy would change computer crime law.” 54 Hasting L.J. 805.
Kerr, O. (2007) .http//www.volokh.com/archives/archive2007 02 04=2007 10/shtml#1170708253.
Kerr, D.M. (2000). Statement for the record on internet and data interception capabilities developed by FBI before the United States House of Representatives. Retrieved December 8, 2002, from http://www.fbi.gov/congress00/kerr0724000. htm
Krenn, P., Bem,D., Weissmann, A., (2008). “Mail Covers” (personal communications) USPIS. Washington DC, and New York City.
Kubic, T. (2001). Statement for the record before the house committee on the judiciary subcommittee on crime. Retrieved July 29, 2002, from Information Warfare Web sites: http://wwww. iwar.org.uk.ecoespionage/use-cybercrime/kubic_061201.htm
Kushner, H. (Ed.). (2002). Cyberterrorism in the 21st Century. Amer.ican Behavioral Scientist, 45.
Lukas.S (2001). “Current and future capabilities.” Eds. A.Sofaer & S. Goodman, The tranational dimension of cyber crime and terrorism. Stanford University Press: Hoover Insitute.
Merl, S. R. (2001). Internet communication standards for the 21st century: International terrorism must force the U.S. to adopt “carnivore” and new electronic surveillance standard. 27 Brooklyn. J. Int’l.
245, 278.
Markoff, J. (2009). Worms infects millions of computers worldwide. New York Times, January 22. http//www.nytimes.com/2009/01/23/technology/internet/23worm.html.
Markoff.J. (2009). Vast Spy System loots computers in 103 countries. New York Times, March 28. http://www.nytimes.com/2009/03/29/technology/29spy.html?_r=1
Marx, G. (1988). Undercover: Police surveillance. Berkeley: University California Press.
Marx, G.( 1996). Privacy and technology. Teletronik, 1996.
Marx, G. (1998). An ethics for the new surveillance. Information society, 3,
pp. 77-54.
Marx, G. (2001). Murky conceptual waters: public and the private
Ethics and information technology, 3, 272-286.
Mulgan, T. (2001). The demand of consequentialism. New York: Oxford University Press.
Nance, A. (2002). Taking the fear out of electronic surveillance in the new age of terror. 70 UMKC. L. Rev. 751, 779.
Nardone v. United States, 308, U.S. 338 (1939).
Nisbet, R. (1971). The impact of technology on ethical decision making.” In J.A. Douglas (Ed.). The technological threat. Englewood Cliffs: Prentice Hall.
Nissenbaum, H. (1998). Protecting privacy in the information age. Law and Philosophy. 17, 559-56.
O’Connell, Paul. (2002). Intellectual history of COMPSTAT. Ph.D. Dissertation, CUNY Graduate Center, Department of Criminal Justice
Olmstead v. United States, 277 U.S. 438 (1928)
Oyama, K. (2006) “Note: E-mail privacy after United States v. Councilman: legislative options for amending ECPA.” 21 Berkely Tech. L.J. 499.
Peterson, M. (1994). Sources in crime analysis. Westport: Greenwood Press.
Pikowsky, R.A. (2002). An overview of the law of electronic surveillance post September 11, 2001. 94 Law Libr. J. 601, 619.
Pipkin, D. (2000). Information Security. Upper Saddle River: Prentice Hall.
Pollitt, M. (2001). Cyberterrorism---fact or fancy? Retrieved May 30, 2001from, http://cosc.georgetown.edu/~denning/infosec/pollitt/htm
Power, R. (2000). The tangled web. Indianapolis: Que.
Power, R. (2002). CSI/FBI computer crime and security survey. Computer Security: Issues and Trends, 7,1-17.
Redina, P. (2008). Personal communication. USPIS. Washington D.C.
Regan, P. (1995). Legistlating privacy. Chapel Hill: University of Carolina Press.
Rein, M.,& Schon, D, (1977). Problem setting in policy research. In C. Weiss (Ed.) Using Social Policy Research in Public Policy. Lexington, MA: DC, Heath.
Rosen, J. (2001). The unwanted gaze: The destruction of privacy in america.Vintage: New York, 2001.
Sager, I., Hamm, S., Gross, N., Carey, J. (2001, February 12). Cybercrime. Business Week Online. Retrieved June 7, 2003, from Web site:
http://businessweek.com/2000/00_08/b3669001.htm?scriptFramed.
Salkever, A. (2001). A dark side to the FBI’s Magic Lantern: http://www.businessweek.com/bw.daily/dnflash/nov2001/nf20011127 5011.htm
Sofaer, A., Goodman, S. (Eds.). (2001). The transnational dimension of cybercrime and terrorism. Stanford: Hoover Institution Press.
Smith v. Maryland, 442 U.S. 735 (1979)
Solove, D. (2002). Conceptualizing privacy. 90 Calif. L. Rev. 1087,1155.
Solove, D. (2003-2004). “Reconstructing electronic surveillance law.” 72 Geo. Wash. L.J. 1264.
Source Watch, RESTORE Act (2007). http.//sourcewatch.org/index.php?title=Restore_Act(2007_FISA_bill)
Streeman, M. (2001). Cybercrime: liberty for security. Duke L. & Tech. Rev. 36
Strauss, Anselm and Juliet Corbin (1990). Basics of qualitative research: grounded theory procedures and techniques. Newbury Park. CA: Sage.
Sunstein, C. (2000). Republic.com. Princeton: Princeton U P.
Sutton, J.R. (2001). Law/society. Thousand Oaks: Sage.
Thomson, J. (1974). The right to privacy. Philosophy and Public Affairs, 4, 295-
313.
United States v. Choate, 567, F.2nd, 177 (9th Circ., 1978).
United States v, Councilman, 418 F. 3rd 67 (1st Circ. 2005) ( en banc).
United States v. Jacobsen, 466 U.S. 109 (1984).
United States v. Herenandez, 313 F.3rd 1209 (9th Circ. 2002).
United States v, Leon Van Leewen, 387 U.S, U.S. 249 (1970).
United States v. Mark Stephen Forrester, 512 F.3d 500 (9th Circ. 2007)
United States v. Ramsey, 431 U.S. 606 (1977).
United States Department of State. (1996). The pattern of global terrorism. Washington, DC: Author.
U.S. Department of Justice. (2002). Searching and seizing and obtaining electronic evidence in criminal investigation.
United States Foreign Intelligence Surveillance Court of Review In Re Directives
Pursuant to Section 105B of the Foreign Intelligence Act (2008).
National Criminal Justice Reference Services. Federal wiretap manual.
Van Den Haag, E. (1971). On privacy. In J. Pennock and J. Chapman.(Eds.). Privacy. (pp.149-169). New York: Atherton.
Wall, D. (Ed.). (2002). Crime and the internet. London: Routledge.
Weber, M. (1978). Economy and society: An outline of interpretive Sociology. Berkeley: University of California Press.
Westin, A. (1967). Privacy and freedom. New York: Atheneum.
Weinstein, W. (1971). The private and free: A conceptual inquiry. J. Chapman and J. Pennock. (Eds.). Privacy. (pp.27-56). New York: Atherton.
Winner, Langdon. (1977). Autonomous technology: Technics as a theme in political thought. Cambridge: MIT Press.
Williams, P. (2001). Organized crime, cybercrime: synergies, trends,Responses. Office of International Programs, U.S. Department of State. Retrieved June 7, 2003, from Information Warfare Website: http://www.iwar.org.uk/ecoespionage/resources/state/internet-crime.htm
Wilson. C. (2008) CRS REPORT FOR CONGRESS; botnets, cybercrime, and cyberterrorism: vulnerabilities and policy issues for Congress. Congressional Research Service.
Yeats, J. (2002). “CALEA and RIPA: the U.S. and U.K. technologies in the wireless world.” 12 Albany L.J. Sci and Technology Rev.
Yin, Robert K. (1984). Case study research: design and methods. Newbury Park, CA: Sage.
Yin, Robert K.(2003). Applications of case study research.
Newbury Park, CA: Sage.
Young, M. (2001). What big eyes and ears you have!: a new regime for covert governmental surveillance. 70 Fordham. L. Rev. 1017, 1109
VEILLANCE, CRIME & PHILOSOPHY & CULTURE
ORALS READING LIST-DR. ADINA SCHWARTZ, DR. MICHEAL JACOBSON, CHAIRS, DR. DENNIS KENNY, PHD, ADVISOR, DR. SIDNEY MORGENBESSER, 4TH MEMBER ADVISOR-JOHN JAY COLLEGE OF CRIMINAL JUSTICE/CUNY GRADUATE SCHOOL & UNIVERSITY CENTER-FIELDS/SPECIALIZATION
SURRichard S. Kim
Prof. Schwartz
Reading List
Oct. 12, 2000
DiCristina, Bruce. Method in Criminology: A Philosophical Primer. (Albany, NY: Harrow and Heston, 1995).
Durkheim, E. The Rules of Sociological Method. Glencoe: (New York: Free Press, 1964)
Kaplan, A. The Conduct of Inquiry: Methodology for the Behavioral Science. (San Francisco: Chandler, 1964)
Kincaid, Harold. Philosophical Foundations of the Social Science: Analyzing Controversies in Social Research. (New York: Cambridge University Press, 1996).
Lakatos, Imre, and Musgrave, Alan. Criticism and Growth of Knowledge. (New York: Cambridge Univeristy Press).
Popper, Karl. Logic of Scientific Discovery. (New York: Routledge, 1992).
Hempel, Carl. Aspects of Scientific Explanation and Other Essays in the Philosophy of Science. (New York: Free Press, 1965).
Martin, M. and McIntyre, C. Readings in the Philosophy of Social Science. (MIT Press, 1994)
Mills, C. Sociological Imagination. (New York: Oxford University Press, 1959)
Nagel, E. Structure of Science. (Harcourt, Brace: 1961)
Putnam, Hilary. Mathematics, Matter and Method. (New York: Cambridge University Press, 1979)
Weber, Max. Methodology of the Social Sciences. (Glencoe: Free Press, 1992).
Richard S. Kim
Prof. Kenney
Reading List
Blalock, H. and Blalock, A. eds. Methodology in Social Research. (New York: McGraw-Hill, 1968).
Kaplan, A. The Conduct of Inquiry: Methodology for the Behavioral Science. (San Francisco: Chandler, 1964
Lazarsfield, P. and Reitz, J. An Introduction to Applied Sociology. (New York: Elvesier, 1975). Ch.4. Translating a Practical Problem into Research”
Maxfield, M. and Babbie, E. Research Methods for Criminal Justice and Criminology. (Belmont: Wadsworth, 1995).
Miller, D. Handbook of Research Design and Social Measurement. (Newbury Park: Sage, 5th ed. 1991)
Roesch, R., Corrado, R. Evaluation and Criminal Justice Policy. (Beverly Hills: Sage, 1981).
+++++++++++++++++++++++++++
LUDWIG WITTGENSTEIN, FOUNDATIONS OF MATHEMATICS;
E. NAGEL, GODEL & PHILOSOPHY;
RUSSELL, B & WHITEHEAD, A., PRINCIPIA MATHEMETICA;
EINSTEIN, ALBERT, THEORY OF RELATIIVITY; SCIENTIST**-PHILOSOPHER*******;
"TAO OF POOH"**************************
.
VEILLANCE, CRIME & PHILOSOPHY & CULTURE
Sunday, August 5, 2012
Il-ae Han-Maeum eae Peie Noon Meuel Heyuem kghyua s=jubg shin kyg do
IL. GYI-DO
1/11/04
Vala delya-onaysatay-vyel--dmytr-velya.
Fala, teralvtxa—sem--daya-crevn-elya-quintembril!.
Ut-gretya-letsim-hra-ysel-dnaye--ensal--a,
Gen-ratdysttya—utne-veli-kyad--emtri_metismyattvya.
Itte-lan-smydr-vallen-skyl-di-tya-nayal-re-fi-xquintr!
O HOW THE MIGHTY HAVE FALLEN!
Herein lies their GRAVE!
By the Waters……
By the waters
By the River of……
SHILOI..
Wept and slept;
Slept and wept.
That which lies between
the fast:
And the grapes of wrath,
Of the feast in Cannan,
Blood, wine and bread.
Of the Phat Body, neither
Hollow, nor made of straw:
Man, Woman, and Child.
The Beloved, Lady in White,
Regina Caeli, pray for your
Children of the Promise,
Hear all supplicants,
Steadfast in joyful and sorrowful
prayer,
crush___of time so thin….
Vituperous snares.
For Thine is the Power & Glory!
For Thy Throne!
Greater the sin and defilement ,
The greater Mercy,
Santa Faustina pray---
Uleashing Terror, hence,
Unyielding----
Lord, Have Mercy……..
Say the Word, and so shall I be healed…..
Oh! On Moriah, Sinai, Carmel,
Olive, Golgatha, the road to Emmaus!
Travels toward Jerusalem, Rome,
Constantinople,
Kyong-ju and Shaolin.
P_X!
48374938743874837506-4-5949458-5=604850
274639059388593475849573-5-=6=5496789285
347839473847387495038483748596-6=79=5968
19567409384938475647586960-594859485904.
Ki-no-ta-ryu-no-shin-han-no-kyo.
Mu-no-ka-ryu-no-shin-han-mu-do!
Saecula saeculorum!
P__N___A_M !
R.S.C. Kim
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
2.2. Law of Telephonic Surveillance Communication Privacy
According to LaFave(1993), though the Supreme
Court never authorized Title III, since it was passed by Congress in 1968, U.S.C.A. 2510-2520, Osborn v. U.S. by (1966) upheld a judicial authorized use of a secret agent using a tape recorder; and Berger v. N.Y. (1967) holding the eavesdropping law unconstitutional-as well as-- Katz v. U.S.(1967) stating that it was unconstitutional if a warrant is not obtained for the wiretapping.
Under Title III, as long there is probable cause, and issuance of a warrant is authorized by Attorney General designated down to Assistant Attorney General of the criminal division, the destination and privacy to which a telephonic message and content is to be monitored must follow certain rules that of Title III---which Pikowsky (2003: 13) refers to as the “Modern Federal Statutory Limitations on Wiretaps.”
As LaFave, Israel and King summarizes the statutory limitation (1999, Pikowsky, 2003:14):
1) There must be probable cause, contingent on the premises that all means of investigations have been exhausted.
2) Identification of the suspect, and telephonic
communication between persons, groups or parties
must be enumerated and made cognizant.
3) The period of time (“minimization”) must be recorded, and limits must be set according to how
the telephonic interception must be proceed according Title III, and the up-dated form of it-Electronic Communication Privacy Act (ECPA).
3) Extensions of an order may be granted for like
Periods, but only by resort to procedures required required in the initial order.
"law of international & domestic APP. of Telephonic Surveillance--NOUS-NOMOS-IUS Y Legis---" Richard S.Y. Kim, Mentor & Supervisor-F. Warren Ned Benton, PhD, Chair, DIrector-Public Management Dept. John Jay College of Criminal Justice/ CUNY GUC, MPA-I-G Program-CF-FBI Law Bulletin-Supra Op. Cit. ?????2000-2009
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
2.2.1. International v. Domestic Application Telephonic Surveillance Law
As stated in the previous section the statutory
Limitations, rules and law of Title III, and ECPCA
poses restrictions on how telephonic wiretapping is conducted. Such regulatory laws are limited to U.S. and Federal and State jurisdiction.
The only exception is FISA rules of wiretaps. It must first observed that (Rasch, 2006) that FISA wiretaps were intended to be applied to foreign political subversives, namely terrorist, and U.S. citizens committing treason. Wiretaps must be conducted under classified intelligence, investigation reports under a warrant with a Secret Foreign Intelligence Court. It is all secret, and classified information. But according to Rasch, FISA wiretap must immunize innocent U.S. citizen from wiretaps. But that has not been the case in Hepting v. U.S.(2007). Other that that, all facts and intelligence gathering to prosecute terrorists, the treasonous, and foreign political subversives in terms of how the wiretaps are conducted are not known and accessible to public scrutingy.
Saturday, August 4, 2012
PHILOSOPHICAL & ETHICAL CONSIDERATIONS OF INFORMATION-CYBER-WARFARE:Richard S.Y. Kim PhD, 1st Doctoral Thesis Proposal--Mentor: John Ian Kleinig, BDiV, PHD, F.Warren Ned Benton, PhD, Adina Schwartz, JD. PhD
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Richard S. Kim
Prof. John Kleinig
Preliminary Introduction (Part 1)
March 11, 2002
Socio-Political and Ethical Aspects of Information Warfare and Policy
Computers, information systems and telecommunications have globally structured and digitized how technology has been used for the maintenance of national defense, infrastructure, and financial institutions. These are the three primary sectors where security issues are of considerable importance because of the interactive and global nature of information warfare (cyberterrorism, cyberwarfare and financial crimes committed through the use of computers) which policy analysts and scholars believe poses a threat in the near future in the U.S and abroad.
Information Warfare (IW) “involves action taken to achieve information superiority by affecting adversary information, information-based processes, information systems, and computer-based networks while defending one’s own information, information-based processes, information systems, and computer-based networks.” Cyberwarfare involves defending information and computer networks, deterring information attacks, as well as denying an adversary ability to do the same. It can include offense information operations mounted against an adversary, or even dominating information on the battlefield. Cyberwar often refers to information-military oriented warfare involving high intensity conflicts. Information warfare on lesser scale is classified as Netwar. Netwar is referred to as low intensity conflict involving operations other than war (as in terrorist activities), and non-military modes of conflict and crime. These threats may pose a significant harm to various institutions that heavily rely on informational technology.
A global theory of “informationalism” and a “network society,” which analyzed the changing of the global socio-political economy due to informational technology, was advanced by Manuel Castells. Castells argues that there was a growing shift towards the electronic use of information, which had a revolutionary affect on how society and nation states conducts it economic and political affairs, tantamount to the momentous changes brought about the Industrial Revolution. Informationalism grew with the emergence of a new economy,
“because of the productivity and competitiveness of units or agents in this economy (be it firms, regions or nations) fundamentally depend upon the capacity to generate, produce and apply efficiently knowledge based information.” Castells defines “networks” as the productivity that is generated through a network of linkages between competing economic agents.
This mode of analysis extends to a political landscape, where competing or conflicting political agents or institutions may engage in war for the purposes of military and political dominance. The information revolution has made an impact on terrorists, and non-state agent group, and organized crime syndicates conduct their military campaigns and criminal enterprises. The use of networks in such organizations organize themselves into sprawling multi-organizational networks, sectioning themselves off into nodes , as for example the Al-Qaeda network, who communicate to each other in cells and public internet cafes across the world.
Terrorists suppose that information operations may be useful as a traditional military operative for achieving their goal for achieving their goals, systematic disruption as much as destruction. Terrorist activity employing network strategies reap the advantages of utilizing such resources to facilitate its campaigns and use cyber technology as made evident in the 9/11 attack of World Trade Center and the Pentagon. Electronic financial information was destroyed prior to the attack on the World Trade Center.
Michael Vatis, former director of the FBI’s National Infrastructure Protection Center (NIPC) writes:
American and allied military strikes are likely to lead to further terrorist strikes
against Americans and allied citizens and interests, both in the U.S. and abroad.
This aggression will likely take a variety of forms and may include cyber attacks
by terrorist groups themselves or targeted by nation-states. Even more likely are
cyber attacks by sympathizers of terrorists, hackers with general anti-U.S. or allied sentiments………During the past five years, the world has witnessed a clear
escalation in the number of politically motivated cyber attacks, often embroiling
hackers from around the world in regional disputes.
One instance of cyberwarfare between two nation-states reveals a terrifying example of how cyber technology can be used to increase military and political conflict. The affects of mid air collision between an American surveillance plane and a Chinese fighter aircraft in April 1, 2001 shows the potential for international conflict between nation states.
The resulting political conflict between the two major powers was accompanied by an online campaign of mutual cyber attacks and web defacement, with both sides receiving support from hackers around the globe. Chinese hacker groups, such as the Honker Union of China and the Chinese Red Guest Network Security Technology Alliance, organized a massive and sustained week-long campaign of cyber attacks against American targets, which led NIPC in the U.S. to issue an advisory on April 26, 2001, warning the “potential for increased hacker activity directed at the U.S. systems in the April and May of 2001. After approximately 1,200 U.S. sites including those belonging to the White House, U.S. Air force and the Department of Energy had been subjected to denial of service attacks, the attacks stopped.
Analysts and experts report that cyber attacks will precede a military use of force as perceived in the conflicts between the Israelis and the Palestinians, Muslims Indian and the Indian government, and the conflict in Kosovo directed against NATO. It is important to note that the “U.S. does not expect to detect much hard evidence when these cyber threats exists; indeed the more serious the less likely there is to be a priori evidence.” Such a threat would be logically unseen, as the secrecy and the undetectable nature of a cyber attack would preclude an assessment of the immediate harm.
Moreover, there have been few studies of the ethics in justifying the use of cyber technology in support policies implementing security measures in respect to information warfare. Is the ethical and policy question: can a ethical framework be applied to uses of cyber weaponry used by the state and criminal justice agencies to certain scenarios and events when security and interests are involved? And if an ethical framework can be applied, what would be the justifications and conditions for engaging in war, where cyber technology plays a key role in policy formulations? In addition, what would be the rules governing how such a war is to be conducted, where military or police action is involved? What actions would be classified as “acts of war” in cyber attack situations?
James Moor, a leading figure in computer ethics, argues for the application of computer ethics in need to justify how computer are used in supporting social, legal and governmental policies. Moor believes that there is currently “a policy and a conceptual vacuum.” Often either no policies for conduct in these situations exist or existing one are inadequate.
Moor argues for the “formulation and justification of policies for the ethical use of technology.” Some scholars have argued that a state is justified in using cyber weapons in a state of political conflict, when a state is attacked by terrorists or other states, where the use of such technology is necessary to protect, defend, prevent and deter hostile agents from making further attack. Other scholars have applied the traditional just war theory to the use of cyber technology as a moral category in framing a policy response to how nations and organizations would engage in cyber attacks when in midst of military conflict or when victimized through the use of computer technology by hackers , organized criminal groups, terrorists, and other nation states. The concepts of jus ad bellum and jus in bello are primarily confined to definitional concepts of when a war is defensive/offensive, and what type of technological weaponry, when used, constitutes an “act of war” when there is political conflict between hostile nations…………...
(IN PROGRESS)
Sone Fundamentals of Criminological Theory: An Introductory Notes: Lectcure-CRIMINAL JUSTICE-101--John Jay College of Criminal Justice-CUNY, North Hall, NY, New York
SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Criminological Theory Lecture, Part II
p.94 Theory/Hypothesis process. Review the theory—Poverty causes crime. (questions, how does the process work?)
Criminological Schools
1. Classical—review. (Enlightenment) Cesare Beccaria and Jeremy Bentham. Free wil, Hedonistic calculus, deterrence, retributivism. Neo—classical criminology---Rational Choice, Routine Activity,
2. Biological
3. Psychobiological
4. Psycological
5. Sociological
6. Conflict
7. Phenomenological
8. Emergent Theory.
Interdisciplinary Theory? –the integration of mutiple disciplines in explaining crime causation and criminal behavior.
Postivistic theory---free will vs. determinism. (philosophical question). Causal theory. No agency---criminal behavior is not a result of free will or choice, but caused by external factors like, i.e, physiology, social environment, genetics, economic-class structure, biological, sociological, economic—use of scientific methods or treatments to prevent or cure or rehabilitate criminal behavior. (educational--vocational, psychological, psychopharmocalogical treatment, social service and etc,)----
1)Biological Theory---criminal behavior has physiological and a genetic basis. (causal theory)
Historical origins. Franz Joseph Gall(1776-1535)--Phrenology----study of shape to determine correlates of human behavior, mainly, the study of the cranium, the bumps in one’s head, the facial, and anatomical characteristic is determinative of criminal behavior. “One looks like a criminal”.
A criminal type---a difference between criminal and non-criminal according to physiological and anatomical characteristic.
Cesare Lombroso (1835-1909). Father of Modern Criminology. Biological Positivism. A psychiatrist and criminal anthropologist.
He studied the anatomy of criminals and correlates his physiological foundings with a criminal type, and found physical anomalies, and found these physical deviations from the non-criminal type, and theorized these physical development were due to not evolving from earlier period of human evolution (were devolved). Primitive characteristics---savage and primitive physical characteristic-----Atavism---Atavistic Anomolies. Long arm, large lips, crooked noses, lot of body hair, lobeless ears, high cheek bones---
Political-Cultural Critique----Orientalist critique-(Edward Said)--the criminals were Southern Italians----were isolated from main currents of Western Europe, and were considered primitive, dark skinned, tribal people, and hence, (non-Western European) and were not civilized, or cultivated and were subhuman……lesser people than Western Europeans, who were to controlled and dominated politically and culturally.
Theory of the “Born Criminal” or “moral lunatic” late 19th and early Twentieth C. Western European and American theory of criminality--intellectual inferior, feeble minded, physiologically anomalous, who passed down heredity trait of criminality-----the legal and social control response was sterilization of the born criminal and the moral lunatic----Eugenics movement.
The methodological critique of Lombroso---English Charles Goring, medical doctor, Karl Pearson (1914), a statistician. Compared 3000 the physiological characteristics of criminals with soldiers in British army and found that there was little physical differences. Importantly, Lombroso did not have a control group (a comparison group).
Earest Hooten (1939)---created a anthropometric data base of criminals and compared them with non-criminals. He found out that criminal suffered from various physical inferiority; however, he reason that they were the sub-group of criminal population, who were captured by the authority, while the remainders of the criminals, who were not captured, may have been measured with conformist population.
Criminal Families---the Jukes study, the Richard Dugdale, traced the family tree of Jukes family that traced 75 years of criminality and social degeneracy within the Jukes geneology, of which 1200 people within the family were considered social degenerates and non-conformist.
Kallikak Families---Henry Goddard, compared the descendents from the offspring of Martin Kallikak who had an affair with a barmaid, and a marriage to a virtuous Quaker women. The affair with bairmaid produced produced more than half of social degenerate offspings. Where as out of 496 off springs from the marriage with the Quaker woman, only three were non-conformist.
Somatyping---the body type was cause of criminality. Ectomporph, endomorph, mesmomorph.
William Sheldon.
2. PsychoBiological Theory. Highlights the role of genetics, environmental contaminants, nutrition, hormones, biochemistry as variable in the causation of crime and criminal behavior.
a)Chromozone theory---the chromozonal structure determines behavior in favor of criminal offending. Xyy—supermale theory. The extra male chromozone leads to high level of aggression and violence which leads males to commit crime. (The klinefeld syndrome)/. Another characteristic of the Klinefeld syndrome is low intelligence and feeble mindedness.
Brain dysfunction, cognitive deficits, low level of serotonins, high level of testerone, low levels of certain transmitters, low level of thyroid hormones, brain damage/injury.
High level of sugars---Twinkie defense.
Richard Hernstein and James Q. Wilson, “Crime and Human Nature”—certain psychological characteristics as aggressiveness, impulsivity, and aggression, and certain physiological attributes interact with environmental factors as family, schooling, media which causes crime.
Social Policy: What type of policy would be implemented if the biological-psycho-biological theory was the cause of the crime? (Class question)
3.Psychological Theory. Personality and mental faculties of the offender is the cause of crime or criminal behavior.
a.)Behavioral Conditioning. Pavlov experiment. Salivating dog when the bell rings. Rewards and punishment motivates individual from offending or not.
b)Freudian Psychoanalysis. The theory of consciousness---ego, id, superego. Ego---the source of the conscious self, id—source of sexual drive and gratification, superego---the moral conscience---source of right and wrong.
Weak super ego---as explanation of law violating. Conscience is discounted in violating norma.---Pleasure principle---or the id----gratification, perhaps, sex crimes or sexual harassment---or lust murders..
Thanatos principles---death principle (death wish)---engaging self-destructive behavior. Smoking, taking drugs, prostitution, violating the law----
Psychopathology—the study of mental illness. Psycho-mind, pathology-disease.
Psychopathy---A person with a personality disorder related to anti-social behavior due to poorly developed superego. Charles Manson.
Psychosis---the psychotic offender. A mental illness in which the person is out of touch with reality or is delusional. Schizophrenia….a type of psychosis. (A person thinks he is being chased by vampires, and kills the person under the delusion.)
Psychological Profiling----profiling the psychological and cognitive, motivational characteristic of offenders to investigate crime, an investigative tool. As it were, going into the mind of offender to calculate how he or she may act or do.
Dangerousness: the likelihood that a given individual will harm society measured in terms of recidivism. Anti-social personality, psychopathic disorder---“incureable” hence, not released from custodial environment.
Social Policy: what kind of policy will be implemented if such a theory are proven to be true.
4. Sociological Theory.
"A PATHOLOGICAL PERSPECTIVE: POLICE TACTICS, SURVEILLANCE & COERCION"-CONCEPTUAL FOUNDATION OF CRIMINAL PROCEDURE BY RICHARD SY KIM, PHD, JOHN JAY COLLEGE OF CRIMINAL JUSTICE/CUNY GRADUATE SCHOOL AND UNVERSITY CENTER0--ALL RIGHTS RESERVED*******
SURThe primary design of constitutions is to control future events of legal and governmental decision making as to how constitutional doctrines and provisions are interpreted and adjudicated within a polity. Such events, according to Vincent Blasi, are political, where in the past restrictive and closed interpretations of the first amendment have scandalously made permissible the repression and uprooting of unorthodox ideas in pathological periods of American legal and political history. The fundamental question of interpreting the first amendment is how courts should adjudicate first amendment disputes and fashion first amendment doctrines.
The courts should adopt a “pathological perspective,” considers Blasi, a view that holds that first amendment protection should not be compromised in the advent of social and political intolerance and judicial conservatism during the worst of times. The overriding objective of the pathological perspective is to equip the first amendment to maximum service in those historical periods when intolerance of unorthodox ideas is most prevalent and when governments are most able and most likely to stifle dissent systematically. Interestingly, the prophylactic qualities of this perspective, which aims to resolve and deter first amendment abuses extend beyond the preservative function of the basic governmental structures to normative, political commitment and constitutional ideals.
As an analytic distinction, the pathological perspective distinguishes the provisions of the Constitution that establish the basic structure of government and the most significant relationship to the political regime, from provisions that embody more discrete, and less essential often no less important normative commitments or aspirations. Moreover, the conceptual underpinning of the perspective is situated in a right’s discourse that holds fundamental civil liberties such against and tantamount with constitutional provisions that establishes the basic structures of government and political regimes. The core proposition of rights cannot be violated without a system of adjudicatory interpretation and decision making degenerating into a state of governmental and social pathology. What, hence, allows for the legal and governmental pathology is the egregious abuse of fundamental procedural rights, which through a transgression of normative and constitutional requirements makes diseased the juridical and political body.
However, it seems doubtful that the pathological perspective makes a claim of unlimited rights of speech and expression, but can be understood as a diagnosis of the extent to which the repression and control of unorthodox ideas through adjudicatory decision making vis-Ã -vis courts and political regimes have significantly contributed to such a pathology. Such a perspective of the first amendment can be applied to other amendments (fourth, fifth and the sixth) where procedural rights of persons must be afforded protection within constitutional provisions and fashioned doctrines during abnormal periods in criminal justice history. Importantly, one must consider that the defining feature of a pathological period is a shift in basic attitudes, among certain influential actors if not the public at large, concerning the desirability of the central norms of the fourth, fifth and sixth amendments.
I
Criminal procedure founded on the fourth, fifth and sixth amendment affords protection to the accused so that governmental interests in seeking truth and proof of culpability remain within the limits of preserving bodily integrity and without obtaining confessions through coercion. Since the Wickersham report during the 1920’s, which repudiated the excessive use of force and coercion, a pathological shift towards more deceptive strategies and methods of obtaining criminal evidence and information followed decades later. Thus, over the last fifty to sixty years the investigative operations and police interrogations have adopted more subtle and clandestine tactics and stratagems which have transformed how evidence and information is gained and produced. Unlike the abuses of fourth amendment protection deceptive practices such as electronic surveillance, undercover agents and psychologically coercive methods of confessions have superseded a pathological period towards a more technologically sophisticated and powerful mode of crime control. It will be argued here that the overriding objective of the pathological perspective is to equip the fourth, fifth and sixth amendment to full service so that privacy and liberty interests do not become threatened by governmental abuses of due process and concomitant normative standards.
II
The question of the fourth amendment protection from electronic surveillance has remained problematic since Katz as to whether evidence obtained through such means is constitutional. Prior to Katz, the rationale of the Olmstead and Goldman Court authorizing police use of wiretapping and bugging were justified by two reasons: (1) the police did not trespass upon the defendant’s premise, and hence did not constitute a “search”; and (2) only conversations were obtained, and so no “things” were seized. It was not until the Katz decision that the physical trespass doctrine had been rejected on grounds that privacy interests of the defendant within the meaning of the fourth amendment had been violated. A new rationale was provided: an unauthorized wiretap violates the fourth amendment if the subject places justifiable reliance on the privacy of a particular place. Katz thus made it clear, that with the possible exception of the case in which a conversation is overheard or recorded with the consent of a party to conversation, wiretapping and electronic surveillance are subject to the limitations of the fourth amendment.
However, such constitutional limitations on electronic surveillance were no longer applicable when it involved under cover agents. In United States v. White, the Court held that government’s use of agent who may themselves reveal the content of the conversation does not violate the Fourth Amendment; and that Katz did not disturb the rationale of On Lee because agents used electronic surveillance to transmit the conversation to other agents. In a plurality opinion by Justice White, it was concluded that (1) one may not have a justifiable expectation that a defendant’s associates neither are nor will become police agents, and (2) that a different result is not called for when the agent has recorded or transmitted the conversation. The White decision rejected the criteria for the protection of privacy interests vis-Ã -vis electronic surveillance established in Katz, and furthermore failed to overrule On Lee and Lopez on such grounds.
It appears that the conflation between electronic surveillance and undercover agency problematizes the way in which privacy claims are adjudicated. The conclusions reached by White holds that one cannot reasonably expect that a defendant’s associate may betray confidence and may be informant to the policy seems to be independent claim from one that justifies electronic surveillance as a legally permissible and constitutionally valid practice. Moreover, the logic of wagering an argument in favor of fourth amendment protections of privacy interests hinges on a disjunctive propositon: electronic surveillance should be rejected because it violates the justifiable reliance standard established in Katz or because the physical trespass standard violates fifth and sixth amendment protection of self-incrimination and right to counsel where surveillance is conducted without a warrant, wherein secret agents are involved. Such procedural protection should not be situated within an aim of suppressing illicit activity that is construed within the aegis of the criminal law, but within teleological means which ascribe the right of the accused to standards of equity and fairness. If such practices are deemed a necessary evil, our normative commitments to the right of privacy may have disturbing aftereffects as to how personal communications and social exchanges entail misplaced trust and countless betrayals by individuals and the state.
III
Confession and interrogation pose an epistemological presumption of ascertaining truth, which underscore how fifth and sixth amendment protection have been undermined by the police and the courts. It seems the internal contradiction of criminal procedure lies between the policy dilemma between the need to protect the individual against coercive law enforcement tactics, and to have effective means of crime control. Justice Goldberg in Escobedo v. Illinois comments that “no system of criminal law enforcement which comes to depend on `confession’ will, in the long run, be less reliable and more subject to abuses than a system which depends on extrinsic evidence secured through skill investigation.”
Moreover, an important question in analyzing the rationale of police investigation and interrogation (custodial and post-indictment) may be understanding to what extent psychological tactics are employed that may induce confession. The problem of mapping out the legal and ethical boundaries in which police deception violate Miranda rights and due process protection have been documented. Interrogatory deception may stand as the functional equivalent of coercion since both strategies may induce involuntary behavior. In the absence of definitive guidelines and per se rules from the Supreme Court, the police officer may naturally adopt strategies advocated in a standard manual such as Criminal Interrogation and Confession. The Court in Miranda commenting on the pressures of such police tactics pointed to the deleterious effects of psychological coercion inherent in the process:
We stress that the modern practice of in custody interrogation is psychologically oriented rather than physically oriented . . .This court has recognized that coercion can be mental as physical, and that the blood of the accused is not the only hallmark of unconstitutional inquisition.
Interrogations utilizing psychological tactics with the threat of criminal sanction seems to make it less plausible that a suspect may voluntarily confess where fifth and sixth amendment protection is systematically denied. The voluntariness doctrine falls short of weighing the likelihood that miscarriage of justice may follow when fundamental protections are overlooked. However, such a doctrine appears problematic on epistemological and normative grounds: (1) the veracity of a confession cannot be ascertained when extrinsic evidence is lacking, (2) there is no causal relationship that demonstrates that an act of confession presupposes a free and rational choice on the part of the accused to incriminate him or herself, and (3) the capacity to discern the mental capacity to which psychologically coercive and deceptive interrogation induces a innocent person to make a false confession remains empirically unverified and inconclusive.
IV
A pathological perspective applied to certain elements of criminal procedure presents a novel manner of analyzing fourth, fifth and sixth amendment protections. The fundamental and rather dramatic shift in criminal law enforcement practices in modern criminal justice history have established a new paradigm that have called constitutional provisions and doctrines into epistemological skepticism and ideological conflict. To some it is apparent that such larger issues must refer back to the interpretation of the Constitution as a foundationalist and living text. However, the pervasive doubt that subverts such legal and judicial inquiry would be a rejection of criminal procedure as external to the preservative function and governance of the state and its embedded political ideology and concomitant social structures. A pathological perspective in ideologically polarized times call to attention the violation of due process protections as a corrective, perhaps, to reconfigure and renegotiate the claims of constitutional protections within a more holistic and axiological framework of criminal law and social policy.
A Pathological Perspective: Police Tactics, Surveillance & Coercion
Richard S. Kim
Conceptual Foundations of Criminal Procedure
Professor Heffernan
January 5, 1998
VEILLANCE, CRIME & PHILOSOPHY & CULTURE
"{EDIFICARE y MISC."
SUEDIFICARE ET EDUCARE ET DELECTARE!
RATIO ET SIMPLICATAS ET CLARITAS!
IUS ET PAX ET MISERCORDIA!
GO FOR IT!
RVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Friday, August 3, 2012
IN PRAYER OF "ETERNAL CONSOLATION AND TRUE COMFORT OF PEACE: "PEACE I GIVE YOU, AND PEACE LEAVE, NOT OF THIS WORLD"--
SU
Eternal Consolation: “My Peace I Give You.”
7/1/2003
A prayer for Grace, my beloved sister
The wounds that last forever
Move toward the heart of eternity.
Inexorable love,
Burning house of love
Burnt like the ashes of a barn fire,
A rising Phoenix.
If I have died many times over,
It was your voice that guided
Me to the house of your holy dwelling,
His sanctuary and refuge.
Where I found peace
In torment, duress and confusion,
I abandoned myself to look for
Thee. But how can I find something
That which I knew the moment
I conceived the thought.
It was you, Holy Lord, Jesu,
So I remain holding a supreme
Faith and confidence in your love
For me, that I may do your will,
And to ask for forgiveness, and
Forgive the sins of others…
Holy and Awesome is the Power
of Almighty God,
Who created the Heavens and the Earth,
And He reigns and governs the world
And universe. Holy, Holy, Holy is He.
Let me adore and worship you in
the silence and tranquil bliss of Truth,
that only you will be Glorified
forever in my frail mind
And body. Hosanna, Hosanna
in the Highest! Blessed is he who
comes in the Name of the Lord!
Blessed is my sister who comes
In the Name of the Lord, who
Is girded with buckler and shield
Under the sign of the warring Lamb.
Truth, faith, purity, hope, love, silence,
chastity, piety, prudence, modesty,
endurance and courage
Towards that road which we
Traverse so far to follow Thee.
Protect her and guide evermore
In the ever deep pastures
And hills to which you guide
Her with the staff
Of Thy Cross------
Against all harm, all darkness, misfortune,
And sickness, and doubt, spiritual and mortal.
That Thy Divine Light shall grant her peace
And comfort in all care, anxiety,
And affliction.
Holy Mother of God, pray for
Us, and lead us to the blessed
Fruit of Thy womb, Jesus.
Send, O Good Lord, Thy
Spirit of Healing, that we
May endure and be grateful
For all Thy bounties, for thy
Boundless Mercy, all your gifts
That our quick lives may reflect
And radiate with joy in
Thy eternal love and glory!
--Richard S.C. Kim
RVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Thursday, August 2, 2012
In Tempore CHAIROS, For Paul Tillich, Romano Gaurdini, S.J,. Gabriel Marcel, S.J. Vatican II Spiritualist RC Theologians
to Ben X. Liu
“Chronos”
To discourse
On the fallings stars,
Chaos of stellar spheres.
The captive dragonfly,
With their wings plucked
At the center of gravity.
The harvest was late,
Elements melt
And burn away.
Sleep of death.
The wounded eagle
Descends from a pale
murdered sky.
Torrential winds and
And the tumultuous
seas discipline
the peregrine
soul in despair:
Beyond transitory
Nodes of bones, flesh
and ashes, desiring
only good.
URVEILLANCE, CRIME & PHILOSOPHY & CULTURE
Subscribe to:
Posts (Atom)
Koryeo(Executive) Senior Editor, Robert Turly--Asian Art & Humanities
- S.Y.R. Kim
- R.S.Y Kim, Ph.D., Order & Society of SS. Thomas and Bartholomew, who studied Law,_LIT, Math @ NYU; John Jay College of Criminal Justice/CUNY Graduate Center Research Foundation Fellow (Dept.Management, Law, Criminal Justice; CO-Editor-BEN LIU, BROWN U< West/East PSYCH: Senior Math/Stats Editor, Editor. S. VAN BEVERHAUT; Assoc. Communications Ed. Michael Reyes, Hamilton College: Hon. Supreme THEORETICAL MATHEMATICS ED. ALGIRDAS.T. University at LITHUANIA-POLAND;Film Editor-"Voltaire," SUNY-BINGHAMTON U. SR Assoc. Math.Ed. Arsen Yakubov, U of Israel-Princeton U----Advisory Board--Gautam Ramakrishna, MD,(EMERITUS) Executive Secretary, Nada Pues Nada (Mayo Clinic Research Group)- C. Lieberman, PhD, NYPD, Terrorism and Counter-Terrorism, Investigation and Policing Philosophy, John Jay College-University of New Haven(EMERITUS) *AFFIL=DULLES/BENTON/KLEINIG/SCHWARTZ/LEVINE/KIM/WANG PAN AMERICAN-ASIAN INSTITUTE FOR PEACE, WAR, ECONOMICS & JUSTICE-Legal and Political Advisor: Barry Latzer, JD, PhD (EMERITUS); ; ;Nicholas Birns PhD GPBNEW SCH0OL U=Executive V. President, B.Liu. Senior Ed. Glen Slaby--