See Disclaimer Below.

Archive for November, 2014|Monthly archive page

Review of “Emigration to Liberia” by Matthew F.K. McDaniel

In American History, Arts & Letters, Book Reviews, Books, Georgia, Historicism, History, Humanities, Laws of Slavery, Politics, Scholarship, Slavery, Southern History, Southern Literary Review, The South, Writing on November 26, 2014 at 8:45 am

Allen 2

This review originally appeared here at Southern Literary Review.

Emigration to Liberia is the story of the nearly 500 African-Americans who left Columbus, Georgia, and Eufaula, Alabama, from 1853 to 1903, to emigrate to Liberia, the West African nation that was founded in 1822 by United States colonization.

Matthew F.K. McDaniel marshals evidence from written correspondence and newspapers to piece together the first narrative treatment of those African-American emigrants from this specific region, which he calls the “Chattahoochee Valley.” He contends that the establishment of Liberia united many Northerners and Southerners for different reasons, namely, in the North, for the gradual abolition of slavery, and, in the South, for the stability of the slave system once freed African-Americans were removed from the purview of their brothers and sisters in bondage.

Liberian emigrants from the Chattahoochee Valley made up roughly ten percent of the total number of emigrants to Liberia from the entire United States; therefore, the story of the migration from this region reveals much about the overall characteristics of the entire emigrant movement and provides clues as to why many emigrants decided to leave in the first place.

“To blacks,” McDaniel explains, “the prospect of Liberia was escape, safety, and opportunity. They could own their own land in their own country and be governed by their own people. Liberia was a new start and a new future for families, far from the whites who had oppressed them.”

McDaniel supplies enough historiography to interest and benefit historians working in the field, but enough narrative to engage non-specialists. At only 64 pages, excluding the highly useful notes and bibliography, his book can be read in a single sitting. Its brevity has to do with the fact that it began as a 2007 master’s thesis in history at the Louisiana State University. Credit must be given to the editors at NewSouth Books for having the wisdom, faith, and generosity to take a chance on such a short but important work.

Settled by Europeans between 1816 and 1823, Eufaula fell into the hands of whites after the 1832 Treaty of Cusseta forced the Creek Indians off their ancestral land. Columbus was founded in 1828, six years after the founding of Liberia. The future of the African Americans who remained in Eufaula and Columbus turned out to be much different from that of the emigrants to Liberia, many of whom suffered or returned to America.

“Liberia was neither American or African,” McDaniel submits, “but a strange medley of the two worlds, and it disappointed many of the Chattahoochee Valley emigrants,” who became stuck “within a stringent social hierarchy” that was “similar to the one they had escaped from.” They were not used to the tropical climate and were not skilled in the work that was specific to the region; they discovered, too, that the native Liberian elite “mimicked the customs and styles of the whites who had once looked down upon them.”

An appendix rounds out McDaniel’s research by listing the names, ages, sexes, and, among other things, occupations of all the emigrants who sailed in either the 1867 or 1868 voyages to Liberia aboard the ship Golconda. To run your finger down the list, slowly, is to invite questions about who these people were, what they were like, what they did for entertainment, what their wishes and dreams were, what they were leaving behind and hoping to accomplish with their move to Africa, and what happened to them after they arrived there. Facts and data are limited, so, in many cases, we cannot know for sure.

McDaniel has done well with what information he had available to him. Let’s hope he’s inspired others to pick up where he left off. This is a story worth telling and knowing.

Is Hacking the Future of Scholarship?

In Arts & Letters, Books, Communication, Ethics, Historicism, History, Humanities, Information Design, Property, Scholarship on November 19, 2014 at 8:45 am

Allen 2

This piece originally appeared here in Pacific Standard in 2013.

Most attorneys are familiar with e-discovery, a method for obtaining computer and electronic information during litigation. E-discovery has been around a long time. It has grown more complex and controversial, however, with the rise of new technologies and the growing awareness that just about anything you do online or with your devices can be made available to the public. Emails, search histories, voicemails, instant messages, text messages, call history, music playlists, private Facebook conversations (not just wall posts)—if relevant to a lawsuit, these and other latent evidence, for better or worse, can be exposed, even if you think they’ve been hidden or discarded.

Anyone who has conducted or been involved with e-discovery realizes how much personal, privileged, and confidential information is stored on our devices. When you “delete” files and documents from your computer, they do not go away. They remain embedded in the hard drive; they may become difficult to find, but they’re there. Odds are, someone can access them. Even encrypted files can be traced back to the very encryption keys that created them.

E-discovery has been used to uncover registries and cache data showing that murderers had been planning their crimes, spouses had been cheating, perverts had been downloading illegal images, and employees had been stealing or compromising sensitive company data or destroying intellectual property. Computer forensics were even used to reveal medical documents from Dr. Conrad Murray’s computer during the so-called “Michael Jackson death trial.”

More information is good; it helps us to understand our universe and the people in it. The tracking and amassing of computer and electronic data are inevitable; the extent and details of their operation, however, cannot yet be known.

Computer forensics can teach you a lot about a person: the websites he visits, the people he chats with, the rough drafts he abandons, the videos he watches, the advertisements he clicks, the magazines he reads, the news networks he prefers, the places he shops, the profiles he views, the songs he listens to, and so on. It is fair to say that given a laptop hard drive, a forensic expert could nearly piece together an individual’s personality and perhaps come to know more about that person—secret fetishes, guilty pleasures, and criminal activities—than his friends and family do.

In light of this potential access to people’s most private activities, one wonders how long it will be until academics turn to computer forensics for research purposes. This is already being done in scientific and technology fields, which is not surprising because the subject matter is the machine and not the human, but imagine what it would mean for the humanities? If Jefferson had used a computer, perhaps we would know the details of his relationship with Sally Hemings. If we could get ahold of Shakespeare’s iPad, we could learn whether he wrote all those plays by himself. By analyzing da Vinci’s browsing history, we might know which images he studied and which people he interacted with before and during his work on the Mona Lisa—and thus might discover her identity.

There are, of course, government safeguards in place to prevent the abuse of, and unauthorized access to, computer and electronic data: the Wiretap Act, the Pen Registers and Trap and Trace Devices Statute, and the Stored Wired and Electronic Communication Act come to mind. Not just anyone can access everything on another person’s computer, at least not without some form of authorization. But what if researchers could obtain authorization to mine computer and electronic data for the personal and sensitive information of historical figures? What if computer forensics could be used in controlled settings and with the consent of the individual whose electronic data are being analyzed?

Consent, to me, is crucial: It is not controversial to turn up information on a person if he voluntarily authorized you to go snooping, never mind that you might turn up something he did not expect you to find. But under what circumstances could computer forensics be employed on a non-consensual basis? And what sort of integrity does computer or electronic information require and deserve? Is extracting data from a person’s laptop akin to drilling through a precious fresco to search for lost paintings, to excavating tombs for evidence that might challenge the foundations of organized religion and modern civilization, or to exhuming the bodies of dead presidents? Surely not. But why not?

We have been combing through letters by our dead predecessors for some time. Even these, however, were meant for transmission and had, to that end, intended audiences. E-discovery, by contrast, provides access to things never meant to be received, let alone preserved or recorded. It is the tool that comes closest to revealing what an individual actually thinks, not just what he says he thinks, or for that matter, how and why he says he thinks it. Imagine retracing the Internet browsing history of President Obama, Billy Graham, Kenneth Branagh, Martha Nussbaum, Salmon Rushdie, Nancy Pelosi, Richard Dawkins, Toni Morrison, Ai Weiwei, or Harold Bloom. Imagine reading the private emails of Bruno Latour, Ron Paul, Pope Francis, Noam Chomsky, Lady Gaga, Roger Scruton, Paul Krugman, Justice Scalia, or Queen Elizabeth II. What would you find out about your favorite novelists, poets, musicians, politicians, theologians, academics, actors, pastors, judges, and playwrights if you could expose what they did when no one else was around, when no audience was anticipated, or when they believed that the details of their activity were limited to their person?

This is another reason why computer and electronic data mining is not like sifting through the notes and letters of a deceased person: having written the notes and letters, a person is aware of their content and can, before death, destroy or revise what might appear unseemly or counter to the legacy he wants to promote. Computer and electronic data, however, contain information that the person probably doesn’t know exists.

More information is good; it helps us to understand our universe and the people in it. The tracking and amassing of computer and electronic data are inevitable; the extent and details of their operation, however, cannot yet be known. We should embrace—although we don’t have to celebrate—the technologies that enable us to produce this wealth of knowledge previously unattainable to scholars, even if they mean, in the end, that our heroes, idols, and mentors are demystified, their flaws and prejudices and conceits brought to light.

The question is, when will we have crossed the line? How much snooping goes too far and breaches standards of decency and respect? It is one thing for a person to leave behind a will that says, in essence, “Here’s my computer. Do what you want with it. Find anything you can and tell your narrative however you wish.” It is quite another thing for a person never to consent to such a search and then to pass away and have his computer scanned for revealing or incriminating data.

It’s hard to say what crosses the line because it’s hard to know where the line should be drawn. As Justice Potter Stewart said of hard-core pornography, “I shall not today attempt further to define the kinds of material I understand to be embraced within that shorthand description; and perhaps I could never succeed in intelligibly doing so. But I know it when I see it.” Once scholars begin—and the day is coming—hacking devices to find out more about influential people, the courts and the academic community will be faced with privacy decisions to make. We will have to ask if computer and electronic data are substantially similar to private correspondence such as letters, to balance the need for information with the desire for privacy, to define what information is “private” or “public,” and to honor the requests of those savvy enough to anticipate the consequences of this coming age of research.

Amid this ambiguity, one thing will be certain: Soon we can all join with Princess Margaret in proclaiming, “I have as much privacy as a goldfish in a bowl.” That is good and bad news.

Paul H. Fry on Deconstruction, Part II

In American Literature, Arts & Letters, Books, Epistemology, Fiction, History, Humanities, Literary Theory & Criticism, Literature, Pedagogy, Philosophy, Politics, Postmodernism, Rhetoric, Scholarship, Semiotics, Teaching, The Academy, Western Civilization, Western Philosophy, Writing on November 12, 2014 at 8:45 am

Below is the ninth installment in the lecture series on literary theory and criticism by Paul H. Fry.  The previous lectures are here, here, here, here, here, here, here, here, here, and here.

Remedies for Breach of Contract

In Advocacy, Humanities, Jurisprudence, Law, Legal Education & Pedagogy, Philosophy on November 5, 2014 at 8:45 am

Allen 2

A breach of contract occasions potential damages traditionally measured in the form of three remedies: “expectation,” “restitution,” or “reliance.” The goal of the expectation remedy, which is the most common measure of damages for a breach of contract and is popularly said to confer the “benefit of the bargain,” is to put the non-breaching party in as good of a position as he or she would have been in had the breaching party performed the contract.

When a breaching party has defectively performed a contract, for instance, the non-breaching party can recover the cost of remedying the defective performance, i.e., the cost of completion. In a breach of contract lawsuit for the delivery of personal property at a fixed time and place, the proper measure of damages is the contract price subtracted by the market price at the place and time of delivery. By comparison, the proper measure of damages for the failure to complete a construction contract is the cost of completion subtracted by the amount that remains unpaid under the contract.

Restitution remedies are designed to prevent “unjust enrichment.” They represent the interest of a non-breaching party in recovering the value that was conferred upon the breaching party through the effort to perform a contract. In other words, restitution seeks to restore what was lost to the non-breaching party or to make the non-breaching party whole again.

Reliance remedies, finally, aim to put the non-breaching party in as good a position as he or she was in before the promise or agreement was made. Whereas expectation damages are “forward-looking” and consider what position the non-breaching party would have been in had the contract been performed, reliance damages are “backward-looking” and consider what position the non-breaching party would have been in had the contract never been contemplated.

These are not the only remedies available when a breach of contract occurs, but they are the most widely recognized and commonly implemented of such remedies.