Transcripts For CSPAN3 American History TV 20240622 : vimars

Transcripts For CSPAN3 American History TV 20240622

Special favorite of the law comment in the validation of the public accommodations provision reaches less far than has been conventionally imagined. Bradley is preserving the availability of the statement concept. He is preserving it in a context where the republican administrations are making headway and are using Voting Rights theory that he has already provided. He is saying, in this context where you are already using 16th amendment exemption in federal amendment law, im keeping the state neglect law available. He is the one that first made it available in 1874. It was the klan lawyers that attacked his theory before the court in 1876. This was his first chance since then to be articulated and re articulate it he does. Its vital to see that. Newspapers see this. Newspaper coverage sees this concept of the state neglect in civil rights cases. Again, i give you an excerpt from the chicago tribune. Lots of coverage of the Supreme Court cases in the reconstruction era. The tribune the black citizen deserves the same civil rights, they are calling about a political rights. The black citizen enjoys everywhere the same clinical and civil rights under the law that a white citizen enjoys. Any person who interferes with these rights is subject to the same penalties as if he had interfered with the right of the white citizens. If there are state or local laws which decree otherwise or if there are state or local officers who refuse to extend to black citizens the protection they deserve, it is the function of the u. S. Court to dispense rights. One year later we get the jumper of decision. We get the yarborough decision. I want to conclude by asking what follows from a racism when we make, or if we make assumptions about what follows necessarily from bradleys racism in civil rights cases. If we make 20th century a something that people who articulate racist views when it comes to public accommodation right are not going to support rights for black physical safety or black contracted property or black voting. If we make that assumption that contemporary assumption, it is an anachronistic assumption. We are going to miss the possibilities for protecting lack right black rights that were present in these state action cases. We do see the death of the reconstruction. The 1884 election was won by a democrat. Grover cleveland wins. He stopped voting right enforcement. He stops it dead in its tracks. On last gasp of reconstruction we deal with the large election belt. Republicans win in the election again in 1888, one more push for any elections bill. This fails by one vote. At this point, the Republican Party is turning over to other things. It is at this point that the Republican Party does, in fact, abandon blacks in the south. What happens in the wake of this is that the Supreme Court gives us the legal edifice for jim crow. It extends through the first decade of the 20th century. In some littleknown cases, u. S. Versus hodges in 1906, a critical case that dismantles the Civil Rights Act of 1866. This is the one that bradley just spoke about providing this very robust theory. It is at this time that the 16th amendment exception is gone. Reconstruction dies. It dies for many many reason. It dies, first and foremost, because of massive klan violence. There is massive violence and intimidation. Theres also the economic panic of 1873, the Great Recession of the 1870s, there is grossly inadequate bureaucratic machinery. Not nearly enough money. Also obviously declining white commitment to black rights in the north. Reconstruction dies for a host of reasons. But, a closed doctrine of state actor state action is not among those reasons. Thank you very much. [applause] the civil war airs here every saturday at six clark and 10 00 p. M. Eastern time. To watch more of our civil war programming anytime, visit our website cspan. Org history. You are watching American History tv. All weekend, every weekend on cspan3. You are watching American History tv. All weekend, every weekend on a cspan3. To mark the 60th anniversary of the capitol hill newspaper roll call cspan is featuring the papers reporters to talk about how roll call featured news events of the last 60 years. When roll call went to press for the june 6 edition in 1968, they didnt yet know what would be the fate of Bobby Kennedy. They knew that he had been shot and had been rushed to a hospital in los angeles. But they went to press not knowing exactly what the outcome would be. And so the roll call Editorial Staff at the top at the time and the founder went ahead with a frontpage editorial in which they addressed the broader issues of the day regarding violence particularly as it came related to guns, but also more generally. It was a topic of concern for roll call throughout the 1960s. In those days, the newspaper ran a regular series of editorial features and had an editorial column in each weeks edition. One of the topics of concern for a lot of people in washington, both on capitol hill and elsewhere, was the more general violence of the era. That included the rights that were going on in the city. The riots that were going on in the city. When rfk was shot, it became an obvious time to return to that topic. As it was happening, it turned out that the next edition of rollcall would not be for another week. They had a situation where they do not actually have an opportunity to report the news of the funeral itself or of, in fact, Bobby Kennedys death in print. When roll call went to print a week after Bobby Kennedy had been assassinated, roll call was back to its coverage of the way it is covered washington since its inception. That meant there were two lead stories on the subject related to the death of rfk. One of which was the speculation about whom would be appointed to fill out the unexpired term of his senate seat in new york. That was a situation where the newspaper correctly speculated that the best candidate on paper was Charles Caddell a congressman from upstate. Viewers will know that he was the father of the current commissioner of the National Football league, roger goodell. He didnt serve very long in the senate, but with the republican governors appointee to fill out the seat after there had been some speculation that the mayor of new york city might have been appointed. The other story that roll call explored goes back to the newspapers traditional focus on the capitol hill immunity. Capitol hill community. And campus rights for those on the health. There were new security concerns obviously following the assassination of someone who had been a u. S. Senator, running for president , but at the time a u. S. Senator. There was both action taken to introduce legislation designed to make it a federal crime or to ensure that it was a federal crime, when a number of congress or executive range official was assassinated. That was not something that would need to be handled at the state level, but the federal government could indeed step in. The other thing that was a matter of concern was how exactly to contact the folks in the Capitol Police in the event of a Security Threat on the hill. Roll call was locust, as we have throughout our history was focused, as we have throughout our history, on Police Matters and how members of congress could get a hold of Law Enforcement personnel on the hill. Considered underrated by many first lady historians, Caroline Harrison was an accomplished artist and took up china painting. She carried that interest to the white house, establishing its china collection. She was interested in womens issues and help raise funds for Johns Hopkins university on the condition that it admit women. She was the first president general of the daughters of the American Revolution until she died in the white house tuberculosis. Caroline harrison, this sunday night at 8 p. M. Eastern on cspans original series. First ladies influence an image. Examining the public and private lives of those who served as first lady. From Martha Washington to michelle obama. Sundays at 8 00 p. M. Eastern on American History tv on cspan3. Each week, American History tvs reel america brings you archival films that helps tell the story of the 20th century. I have today ordered to vietnam the upper division, and certain other forces which will bring our fighting strength from 75,000 to 125,000 men almost immediately. Additional forces will be needed later, and will be sent as requested. This will make it necessary to increase our active fighting forces by raising the monthly drop quota from 17,000 over a period of time to 35,000 a month. And forced to step up our campaign for voluntary investments. Voluntary enlistments. Talk about a timetable in connection to vietnam. You have repeated today that the u. S. Will not be defeated, will not grow tired. Donald johnson, National Commander of the american legion, went to vietnam in the spring and laid a call on you. He told white house reporters that he could imagine the war going on for 5, 76, or 7 years. Have you thought about the possibility, sir . And do you think the American People ought to think about that possibility . Yes i think the American People ought to understand there is no quick solution to the problem that we face there. I would not want to prophesies, predict whether it is a matter of months or years or decades. I do not know if we have any active timetable on how long it will take to win a victory in world war i. I dont think anyone really knew it would be 4 years or 6 years to meet the success in world war ii. I do think our cause is just, and i do think our purpose is and our objectives are beyond any question. I do believe that america will stand united behind the manner that are there. Behind the men that are there. As long as im president i plan to see that our forces are Strong Enough to protect our national interests. And are deployed and political negotiations are constantly attempting to find some solution that would substitute words for bombs. And as i have said sometimes, if anyone questions our good faith and asks us to meet them to try and reason this matter out, they will find us at the appointed place at the appointed time any proper chair. 00 in the proper chair. Coming up next on American History tv, u. S. Army Cyber Command historian Lawrence Kaplan talks about the history of computers and the emergence of hackers and other computer abuses. Beginning with the use of Government Computers mr. Kaplan discusses steve jobs, students at m. I. T. Who established the term hacker, and the onset of viruses that began in the 1980s. This 40 minute event was hosted by the military Cyber Protection association. This presentation weekly traces a key milestone in the history of computers and computer abuse including a variety of internal external to define computer abuses and hackers, which help lead the way to u. S. Army Cyber Command as you continue to evolve as an ongoing cyber threat. I will go with a braver with an overview of cyber history before i move on to hacking. Any act the electronic numerical integrator and computer was the first electronic generalpurpose computer. It was developed by the u. S. Army from 19431946, initially to calculate artillery firing tables for the armys Ballistic Research laboratory. A quiver form 5000 operations per second, and at 18,000, it took up 1000 feet of floor space and weight 30 times. Population of firing table for a gun calculation of a firing people for a gun, which took staff two months, could be completed by any act by a day. The proliferation of computers through commercial, scientific, and military purposes spread in the 1950s with a number of firms entering the computer field. Between 19541959, for example computers increased 700 675 . Ibm controlled about 70 of the global computer market. By 1977, computer sales reached 41 billion in continued to climb. Even so, the high cost of computers remains the limiting factor on sales. In 1975, micro instrumentation telemetry systems introduced a mail order build it yourself 256 byte computer. It began the personal computer revolution. Thousands of people bought the kit for 400, making it the first commercially successful home computer. Its a success led to the first Computer Store being opened that year. And the start of a number of computer clubs asian wife. Computer clubs nationwide. They minute deleted data by flipping toggle switches. The following year, 1976, Steve Wozniak and steve jobs, both engineers in the Homebrew Computer Club in Silicon Valley, california, built a homemade computer called the apple 1 that was more sophisticated than the altair could be hooked up to a Color Television and store its data on a external cassette tape. Apple letter replaced those tapes with lobby desks. They sold 200 total units at 66 six dollars and to make the apple 2 as useful as possible the company encourage programmers to create applications for it. For example, the spreadsheet called busycalc made the apple practical tool for all kinds of people and businesses, not just hobbyists. The apple 2 soon became a leader in the growing personal computer market. By 1978, the proliferation of personal computers was turning america into a computerized society. In february, 1978, 2 chicago pc users reportedly established the nations first electronic bulletin board, which allowed multiple computer users to share and exchange information. As the conceptual preserve precursor to an internet webpage, Bulletin Boards spread widely and were operated by disparate groups and individuals. Anyone with a pc could set up an electronic bulletin board. In 1959, the department of defense 1969 arpa demonstrated the practicality of interconnected Computer Networks that initially allowed University Researchers to communicate with each other. It later expanded to include government, industry, and major universities in the u. S. And europe. The number of networks gradually grew in the 1970s, increased significant as the personal computer revolution spread. For example, there were 61 arpanet computers in 1955, 2000 by the beginning of 1986, nearly 30,000 by the end of 1987, when arpanet became known as the internet and over 160,000 at the end of 1989. In 1989, timothy bernerslee, an english Computer Scientist working at the European Council for Nuclear Research, successfully implanted the use of hypertext to facilitate sharing and updating information on the internet, earning him the distention of inventing the world wide web. The European Council for Nuclear Research built the first website, which went online august 6, 1991. When commercial computers were first developed in the 1950s, people assumed it to be a benign environment. However, computer crime involved handinhand with computer development. Beginning in the early 1950s, unscrupulous insiders successfully began using computers for fraud and embezzlement. There are not many recorded cases of computer abuse from the 1950s and early 1960s. Since companies. Embarrassment and lost Public Confidence rarely reported computer abuses. A strain a trend that still exists. At a new york brokerage firm, someone siphoned off 250,000 from the company between 19511959. By the time it was uncovered, he had become a vice president. Later, the spread of personal computers in the late 1970s coupled with the developed and spread of the internet fostered the spread of unscrupulous external abusers hackers who thought to gain unauthorized access to Computer Systems. The Defense Department became concerned with Computer Security in 1957 as resource sharing to peter systems spread to dod. That your, the defense Science Board recommended computer safeguards that would protect classified information and multiaccess resource sharing Computer Systems. The task force report, published in february 1970, showed how corrupt insiders and despised could actively insiders and spies could actively steal or copy information. They succeeded in every attempt. Dod soon established uniform policy for protecting classified information ons Computer Systems. One of the first computer abuse cases publicized in the u. S. Army occurred in 1971 when of the army uncovered a sophisticated scam involving one of its computers south korea. A group of u. S. Army personnel and south korean blackmailers, excuse me, black marketeers, use the computer to siphon off as much as achingly dollars of u. S. Military supplies per year. As they sold the stolen items sometimes back to the u. S. Army, they manipulated computer files to cover traces of the fraud. Amid rising concerns of computer abuse, jerry and snyder attained National A

© 2025 Vimarsana